/* Tests imported from Project Wycheproof (https://github.com/google/wycheproof) * The following vectors have been extracted from the json files in: * https://github.com/google/wycheproof/tree/master/testvectors * */ /** * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except * in compliance with the License. You may obtain a copy of the License at * *
http://www.apache.org/licenses/LICENSE-2.0 * *
Unless required by applicable law or agreed to in writing, software distributed under the * License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing permissions and * limitations under the License. */ /* Test 0 for ECDSA, tcId is 1 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_0_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_0_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_0_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x13, 0x9c, 0x78, 0x24, 0x3a, 0x6e, 0x36, 0xe1, 0x24, 0xd5, 0xf5, 0xe1, 0x4b, 0x4c, 0xb8, 0x75, 0x4a, 0xbd, 0xf2, 0x0f, 0xf1, 0xa5, 0x01, 0xd5, 0x66, 0x6a, 0x42, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_0 = { .name = "ecdsa_brainpoolp224r1_sha224_0", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_0_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_0_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_0_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 1 for ECDSA, tcId is 2 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_1_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_1_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_1_sig[] = { 0x01, 0xa3, 0x29, 0xe1, 0x41, 0x8c, 0x0a, 0xca, 0x9d, 0xaf, 0xf7, 0x53, 0xa4, 0x0f, 0x22, 0xdc, 0xdb, 0x66, 0x98, 0x43, 0xe6, 0x60, 0x41, 0xd1, 0x03, 0xaa, 0x30, 0xf5, 0x72, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_1 = { .name = "ecdsa_brainpoolp224r1_sha224_1", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_1_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_1_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_1_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2 for ECDSA, tcId is 3 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_2_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_2_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_2_sig[] = { 0x0c, 0x58, 0x88, 0x12, 0xc0, 0x7c, 0x02, 0x6e, 0xa4, 0x39, 0x0c, 0xa6, 0xdc, 0x7f, 0x1a, 0x56, 0x3b, 0x95, 0x34, 0xb0, 0x7b, 0x7b, 0xa8, 0x43, 0xa1, 0x1e, 0x31, 0xcc, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_2 = { .name = "ecdsa_brainpoolp224r1_sha224_2", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_2_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_2_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_2_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 3 for ECDSA, tcId is 4 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_3_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_3_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_3_sig[] = { 0x01, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_3 = { .name = "ecdsa_brainpoolp224r1_sha224_3", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_3_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_3_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_3_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 4 for ECDSA, tcId is 5 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_4_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_4_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_4_sig[] = { 0x34, 0x97, 0x53, 0x68, 0x9a, 0x38, 0x9b, 0xe8, 0x7a, 0x20, 0xdc, 0x81, 0x66, 0xae, 0x1e, 0xbd, 0x6a, 0x7e, 0x78, 0x65, 0x0d, 0x9c, 0xeb, 0x9f, 0xfb, 0x76, 0x9e, 0x2d, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_4 = { .name = "ecdsa_brainpoolp224r1_sha224_4", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_4_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_4_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_4_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 5 for ECDSA, tcId is 6 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_5_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_5_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_5_sig[] = { 0x00, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x01, 0x9b, 0xe5, 0xf1, 0x30, 0x12, 0x18, 0x96, 0x2b, 0x2f, 0x5a, 0x6a, 0x69, 0xa0, 0x55, 0x3e, 0xbc, 0x57, 0x6f, 0x86, 0x86, 0xea, 0x18, 0x77, 0x71, 0xe4, 0xe4, 0xe4, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_5 = { .name = "ecdsa_brainpoolp224r1_sha224_5", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_5_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_5_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_5_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 6 for ECDSA, tcId is 7 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_6_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_6_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_6_sig[] = { 0x00, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x01, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_6 = { .name = "ecdsa_brainpoolp224r1_sha224_6", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_6_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_6_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_6_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 7 for ECDSA, tcId is 8 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_7_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_7_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_7_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x3b, 0xdb, 0x43, 0x7a, 0x14, 0x2a, 0xd0, 0x5a, 0xfa, 0xbd, 0xc5, 0xbb, 0xd5, 0x7b, 0xbc, 0xdc, 0x79, 0xa7, 0x35, 0xc4, 0x83, 0xc6, 0x45, 0x31, 0xc0, 0xc2, 0xae, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_7 = { .name = "ecdsa_brainpoolp224r1_sha224_7", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_7_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_7_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_7_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 8 for ECDSA, tcId is 9 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_8_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_8_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_8_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_8 = { .name = "ecdsa_brainpoolp224r1_sha224_8", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_8_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_8_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_8_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 9 for ECDSA, tcId is 10 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_9_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_9_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_9_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_9 = { .name = "ecdsa_brainpoolp224r1_sha224_9", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_9_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_9_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_9_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 10 for ECDSA, tcId is 11 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_10_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_10_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_10_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_10 = { .name = "ecdsa_brainpoolp224r1_sha224_10", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_10_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_10_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_10_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 11 for ECDSA, tcId is 12 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_11_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_11_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_11_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_11 = { .name = "ecdsa_brainpoolp224r1_sha224_11", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_11_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_11_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_11_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 12 for ECDSA, tcId is 13 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_12_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_12_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_12_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_12 = { .name = "ecdsa_brainpoolp224r1_sha224_12", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_12_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_12_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_12_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 13 for ECDSA, tcId is 14 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_13_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_13_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_13_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_13 = { .name = "ecdsa_brainpoolp224r1_sha224_13", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_13_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_13_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_13_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 14 for ECDSA, tcId is 15 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_14_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_14_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_14_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_14 = { .name = "ecdsa_brainpoolp224r1_sha224_14", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_14_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_14_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_14_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 15 for ECDSA, tcId is 16 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_15_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_15_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_15_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_15 = { .name = "ecdsa_brainpoolp224r1_sha224_15", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_15_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_15_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_15_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 16 for ECDSA, tcId is 17 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_16_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_16_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_16_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_16 = { .name = "ecdsa_brainpoolp224r1_sha224_16", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_16_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_16_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_16_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 17 for ECDSA, tcId is 18 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_17_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_17_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_17_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_17 = { .name = "ecdsa_brainpoolp224r1_sha224_17", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_17_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_17_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_17_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 18 for ECDSA, tcId is 19 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_18_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_18_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_18_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_18 = { .name = "ecdsa_brainpoolp224r1_sha224_18", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_18_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_18_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_18_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 19 for ECDSA, tcId is 20 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_19_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_19_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_19_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_19 = { .name = "ecdsa_brainpoolp224r1_sha224_19", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_19_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_19_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_19_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 20 for ECDSA, tcId is 21 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_20_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_20_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_20_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_20 = { .name = "ecdsa_brainpoolp224r1_sha224_20", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_20_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_20_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_20_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 21 for ECDSA, tcId is 22 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_21_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_21_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_21_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_21 = { .name = "ecdsa_brainpoolp224r1_sha224_21", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_21_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_21_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_21_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 22 for ECDSA, tcId is 23 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_22_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_22_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_22_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_22 = { .name = "ecdsa_brainpoolp224r1_sha224_22", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_22_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_22_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_22_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 23 for ECDSA, tcId is 24 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_23_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_23_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_23_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_23 = { .name = "ecdsa_brainpoolp224r1_sha224_23", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_23_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_23_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_23_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 24 for ECDSA, tcId is 25 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_24_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_24_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_24_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_24 = { .name = "ecdsa_brainpoolp224r1_sha224_24", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_24_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_24_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_24_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 25 for ECDSA, tcId is 26 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_25_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_25_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_25_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_25 = { .name = "ecdsa_brainpoolp224r1_sha224_25", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_25_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_25_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_25_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 26 for ECDSA, tcId is 27 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_26_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_26_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_26_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_26 = { .name = "ecdsa_brainpoolp224r1_sha224_26", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_26_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_26_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_26_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 27 for ECDSA, tcId is 28 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_27_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_27_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_27_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_27 = { .name = "ecdsa_brainpoolp224r1_sha224_27", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_27_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_27_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_27_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 28 for ECDSA, tcId is 29 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_28_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_28_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_28_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_28 = { .name = "ecdsa_brainpoolp224r1_sha224_28", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_28_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_28_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_28_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 29 for ECDSA, tcId is 30 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_29_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_29_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_29_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_29 = { .name = "ecdsa_brainpoolp224r1_sha224_29", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_29_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_29_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_29_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 30 for ECDSA, tcId is 31 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_30_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_30_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_30_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_30 = { .name = "ecdsa_brainpoolp224r1_sha224_30", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_30_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_30_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_30_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 31 for ECDSA, tcId is 32 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_31_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_31_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_31_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_31 = { .name = "ecdsa_brainpoolp224r1_sha224_31", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_31_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_31_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_31_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 32 for ECDSA, tcId is 33 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_32_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_32_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_32_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_32 = { .name = "ecdsa_brainpoolp224r1_sha224_32", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_32_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_32_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_32_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 33 for ECDSA, tcId is 34 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_33_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_33_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_33_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_33 = { .name = "ecdsa_brainpoolp224r1_sha224_33", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_33_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_33_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_33_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 34 for ECDSA, tcId is 35 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_34_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_34_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_34_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_34 = { .name = "ecdsa_brainpoolp224r1_sha224_34", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_34_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_34_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_34_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 35 for ECDSA, tcId is 36 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_35_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_35_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_35_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_35 = { .name = "ecdsa_brainpoolp224r1_sha224_35", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_35_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_35_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_35_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 36 for ECDSA, tcId is 37 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_36_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_36_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_36_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_36 = { .name = "ecdsa_brainpoolp224r1_sha224_36", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_36_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_36_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_36_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 37 for ECDSA, tcId is 38 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_37_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_37_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_37_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_37 = { .name = "ecdsa_brainpoolp224r1_sha224_37", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_37_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_37_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_37_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 38 for ECDSA, tcId is 39 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_38_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_38_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_38_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_38 = { .name = "ecdsa_brainpoolp224r1_sha224_38", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_38_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_38_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_38_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 39 for ECDSA, tcId is 40 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_39_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_39_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_39_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_39 = { .name = "ecdsa_brainpoolp224r1_sha224_39", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_39_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_39_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_39_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 40 for ECDSA, tcId is 41 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_40_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_40_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_40_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_40 = { .name = "ecdsa_brainpoolp224r1_sha224_40", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_40_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_40_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_40_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 41 for ECDSA, tcId is 42 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_41_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_41_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_41_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_41 = { .name = "ecdsa_brainpoolp224r1_sha224_41", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_41_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_41_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_41_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 42 for ECDSA, tcId is 43 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_42_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_42_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_42_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_42 = { .name = "ecdsa_brainpoolp224r1_sha224_42", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_42_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_42_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_42_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 43 for ECDSA, tcId is 44 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_43_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_43_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_43_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_43 = { .name = "ecdsa_brainpoolp224r1_sha224_43", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_43_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_43_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_43_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 44 for ECDSA, tcId is 45 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_44_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_44_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_44_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_44 = { .name = "ecdsa_brainpoolp224r1_sha224_44", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_44_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_44_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_44_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 45 for ECDSA, tcId is 46 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_45_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_45_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_45_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_45 = { .name = "ecdsa_brainpoolp224r1_sha224_45", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_45_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_45_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_45_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 46 for ECDSA, tcId is 47 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_46_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_46_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_46_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_46 = { .name = "ecdsa_brainpoolp224r1_sha224_46", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_46_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_46_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_46_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 47 for ECDSA, tcId is 48 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_47_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_47_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_47_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_47 = { .name = "ecdsa_brainpoolp224r1_sha224_47", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_47_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_47_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_47_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 48 for ECDSA, tcId is 49 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_48_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_48_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_48_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_48 = { .name = "ecdsa_brainpoolp224r1_sha224_48", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_48_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_48_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_48_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 49 for ECDSA, tcId is 50 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_49_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_49_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_49_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_49 = { .name = "ecdsa_brainpoolp224r1_sha224_49", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_49_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_49_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_49_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 50 for ECDSA, tcId is 51 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_50_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_50_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_50_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_50 = { .name = "ecdsa_brainpoolp224r1_sha224_50", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_50_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_50_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_50_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 51 for ECDSA, tcId is 52 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_51_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_51_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_51_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_51 = { .name = "ecdsa_brainpoolp224r1_sha224_51", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_51_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_51_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_51_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 52 for ECDSA, tcId is 53 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_52_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_52_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_52_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_52 = { .name = "ecdsa_brainpoolp224r1_sha224_52", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_52_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_52_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_52_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 53 for ECDSA, tcId is 54 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_53_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_53_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_53_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_53 = { .name = "ecdsa_brainpoolp224r1_sha224_53", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_53_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_53_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_53_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 54 for ECDSA, tcId is 55 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_54_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_54_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_54_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_54 = { .name = "ecdsa_brainpoolp224r1_sha224_54", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_54_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_54_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_54_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 55 for ECDSA, tcId is 56 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_55_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_55_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_55_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_55 = { .name = "ecdsa_brainpoolp224r1_sha224_55", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_55_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_55_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_55_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 56 for ECDSA, tcId is 57 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_56_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_56_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_56_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_56 = { .name = "ecdsa_brainpoolp224r1_sha224_56", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_56_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_56_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_56_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 57 for ECDSA, tcId is 58 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_57_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_57_msg[] = { 0x39, 0x35, 0x33, 0x38, 0x38, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_57_sig[] = { 0x0e, 0x7e, 0xca, 0xb2, 0x27, 0x6f, 0x03, 0x5c, 0x0d, 0xc7, 0x05, 0x20, 0xeb, 0xd5, 0xae, 0x3c, 0xb7, 0xb7, 0xa8, 0xf2, 0x1f, 0xa5, 0x68, 0x7e, 0xee, 0x92, 0xc4, 0x62, 0x85, 0xa8, 0x53, 0x32, 0xf8, 0xc8, 0x99, 0xb5, 0x3d, 0x43, 0x09, 0x1b, 0x02, 0xe6, 0x95, 0x6b, 0x39, 0x18, 0x17, 0xe1, 0x75, 0xa8, 0xb1, 0xf4, 0x0d, 0xca, 0x7e, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_57 = { .name = "ecdsa_brainpoolp224r1_sha224_57", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_57_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_57_msg, .msglen = 5, .sig = ecdsa_brainpoolp224r1_sha224_57_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 58 for ECDSA, tcId is 59 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_58_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_58_msg[] = { 0x32, 0x32, 0x35, 0x34, 0x36, 0x32, 0x38, 0x39, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_58_sig[] = { 0x2f, 0xc2, 0xef, 0x9f, 0x76, 0x63, 0xf6, 0x6f, 0x13, 0xb0, 0x4e, 0x49, 0xf2, 0x06, 0xc2, 0x24, 0x41, 0xeb, 0x3e, 0xe1, 0x91, 0x7b, 0x8b, 0xf8, 0x1a, 0x9b, 0x53, 0x76, 0xd1, 0xdf, 0x3d, 0xd0, 0x27, 0x0e, 0x58, 0x84, 0xe9, 0x84, 0x8e, 0xa2, 0x81, 0x2b, 0x66, 0xf5, 0x01, 0x5b, 0xe9, 0x6d, 0x25, 0x85, 0xfe, 0xd3, 0x95, 0x7b, 0x31, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_58 = { .name = "ecdsa_brainpoolp224r1_sha224_58", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_58_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_58_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_58_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 59 for ECDSA, tcId is 60 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_59_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_59_msg[] = { 0x31, 0x38, 0x32, 0x37, 0x38, 0x37, 0x38, 0x36, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_59_sig[] = { 0xc6, 0x82, 0x58, 0x7b, 0xf4, 0x3e, 0x0c, 0x95, 0x4e, 0xb5, 0x8b, 0xbc, 0xfe, 0xb9, 0x4d, 0xfa, 0xc8, 0xba, 0xd4, 0x04, 0x99, 0x5a, 0xc2, 0x6e, 0x8e, 0x51, 0xff, 0x20, 0x92, 0xbf, 0x10, 0xda, 0x10, 0x32, 0x4c, 0xc3, 0x22, 0xf7, 0x9c, 0x41, 0x2d, 0xae, 0xd3, 0x05, 0xb2, 0x75, 0xfc, 0x19, 0x93, 0xbf, 0x3a, 0xf5, 0x23, 0xde, 0xd6, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_59 = { .name = "ecdsa_brainpoolp224r1_sha224_59", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_59_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_59_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_59_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 60 for ECDSA, tcId is 61 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_60_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_60_msg[] = { 0x31, 0x35, 0x31, 0x38, 0x38, 0x36, 0x31, 0x37, 0x30, 0x39, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_60_sig[] = { 0x02, 0x5d, 0x1c, 0xf1, 0x6f, 0x03, 0x34, 0x1f, 0x3c, 0x8d, 0x16, 0xa7, 0x78, 0x39, 0xb5, 0xc1, 0xd6, 0x96, 0x36, 0x3d, 0xae, 0x89, 0x8d, 0x91, 0xe1, 0x4a, 0xd5, 0x22, 0xb7, 0x37, 0x9c, 0xc3, 0x5c, 0x97, 0xa8, 0xf0, 0x8b, 0x0e, 0xfb, 0x32, 0xee, 0x82, 0xce, 0x0e, 0x19, 0x11, 0x69, 0x5d, 0x37, 0x2e, 0xe6, 0xd6, 0x79, 0xec, 0x54, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_60 = { .name = "ecdsa_brainpoolp224r1_sha224_60", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_60_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_60_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_60_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 61 for ECDSA, tcId is 62 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_61_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_61_msg[] = { 0x32, 0x31, 0x32, 0x39, 0x32, 0x33, 0x33, 0x34, 0x32, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_61_sig[] = { 0xc0, 0xc9, 0x49, 0xe0, 0xf0, 0xf8, 0x57, 0x18, 0x02, 0xea, 0x7e, 0x02, 0x61, 0x7c, 0xa9, 0x25, 0xb9, 0x5d, 0x29, 0x0a, 0x17, 0x4f, 0x68, 0x6d, 0x80, 0xbb, 0xa1, 0xd4, 0xb9, 0x66, 0x17, 0x3c, 0xe3, 0xf1, 0x3c, 0xa5, 0x4c, 0xcd, 0xc8, 0xa2, 0x49, 0xfe, 0xa7, 0x2e, 0x32, 0x60, 0xad, 0x3e, 0x78, 0x54, 0xa7, 0x31, 0x05, 0x1d, 0x8c, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_61 = { .name = "ecdsa_brainpoolp224r1_sha224_61", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_61_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_61_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_61_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 62 for ECDSA, tcId is 63 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_62_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_62_msg[] = { 0x31, 0x32, 0x32, 0x31, 0x39, 0x37, 0x39, 0x30, 0x35, 0x39, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_62_sig[] = { 0x5d, 0x57, 0xf1, 0x42, 0x75, 0x94, 0x7c, 0x9b, 0xff, 0xea, 0x66, 0xf9, 0xf3, 0x0a, 0xe2, 0x03, 0x19, 0x45, 0x35, 0xf8, 0x02, 0x0c, 0x42, 0xbb, 0xc1, 0xef, 0xec, 0x73, 0xc3, 0x58, 0x65, 0x1b, 0xa2, 0x52, 0x7c, 0x32, 0xd8, 0x58, 0x65, 0x7c, 0xcf, 0x08, 0xe5, 0x35, 0xd3, 0x28, 0x51, 0xfb, 0xd8, 0xc3, 0x54, 0x77, 0xba, 0x17, 0x56, 0x80, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_62 = { .name = "ecdsa_brainpoolp224r1_sha224_62", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_62_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_62_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_62_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 63 for ECDSA, tcId is 64 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_63_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_63_msg[] = { 0x32, 0x33, 0x30, 0x32, 0x35, 0x36, 0x37, 0x36, 0x31, 0x31, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_63_sig[] = { 0x13, 0x3b, 0xb1, 0x2f, 0x10, 0x96, 0x98, 0x9d, 0xc8, 0x67, 0xd8, 0x74, 0xf6, 0x75, 0xfd, 0xf9, 0xe9, 0x79, 0x75, 0xc2, 0xe2, 0x2c, 0x71, 0xe4, 0x4f, 0x59, 0xbf, 0x35, 0x65, 0x57, 0xee, 0xb2, 0xb5, 0xb4, 0xf1, 0xf7, 0xc8, 0x51, 0x84, 0xdc, 0xc6, 0x53, 0x85, 0x0c, 0x34, 0xb1, 0xc3, 0x48, 0x0d, 0x2f, 0x32, 0xd1, 0x56, 0x7c, 0x25, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_63 = { .name = "ecdsa_brainpoolp224r1_sha224_63", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_63_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_63_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_63_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 64 for ECDSA, tcId is 65 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_64_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_64_msg[] = { 0x31, 0x31, 0x30, 0x35, 0x38, 0x36, 0x38, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_64_sig[] = { 0xd1, 0xdc, 0x7d, 0x1c, 0xc8, 0x86, 0xca, 0x90, 0xe0, 0xd9, 0x60, 0xb6, 0xc7, 0xfd, 0xa9, 0x2e, 0xd5, 0x82, 0xec, 0x61, 0x6c, 0x1c, 0x79, 0xb1, 0x71, 0xef, 0x31, 0x08, 0x41, 0xa7, 0xd2, 0x14, 0x38, 0xe7, 0xc3, 0x4b, 0x27, 0x17, 0x60, 0x05, 0xef, 0x67, 0xc0, 0x4a, 0x63, 0xf3, 0x62, 0xd2, 0xda, 0xf1, 0x0b, 0x62, 0xc5, 0x3b, 0x88, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_64 = { .name = "ecdsa_brainpoolp224r1_sha224_64", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_64_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_64_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_64_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 65 for ECDSA, tcId is 66 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_65_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_65_msg[] = { 0x31, 0x34, 0x36, 0x36, 0x36, 0x31, 0x34, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_65_sig[] = { 0x9e, 0xc3, 0xb7, 0xb4, 0xa0, 0xf1, 0x23, 0x51, 0x69, 0xb6, 0x4a, 0x20, 0x58, 0x4d, 0x36, 0xb9, 0x6b, 0xb7, 0xa2, 0xbd, 0xe0, 0x0d, 0x23, 0x16, 0x3c, 0xc3, 0xb1, 0xbf, 0xac, 0x32, 0xef, 0x3b, 0x9e, 0x94, 0x8d, 0x96, 0x7f, 0x96, 0xcd, 0x08, 0x50, 0x78, 0x09, 0xe3, 0xb9, 0xa0, 0xe0, 0x93, 0xbe, 0x3e, 0x76, 0xb8, 0x18, 0x33, 0x1d, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_65 = { .name = "ecdsa_brainpoolp224r1_sha224_65", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_65_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_65_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_65_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 66 for ECDSA, tcId is 67 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_66_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_66_msg[] = { 0x34, 0x34, 0x31, 0x39, 0x35, 0x36, 0x34, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_66_sig[] = { 0x39, 0x2a, 0xe3, 0x81, 0xda, 0x4c, 0xcf, 0xd9, 0xd5, 0xad, 0x09, 0x3d, 0x49, 0xb2, 0x2d, 0x57, 0x94, 0x11, 0xf7, 0xc1, 0xcd, 0x04, 0xe8, 0x84, 0x73, 0xab, 0x6e, 0xf5, 0xa2, 0x89, 0x8b, 0x8b, 0xf1, 0x20, 0xd1, 0x8e, 0x4e, 0xe0, 0xd1, 0x5c, 0x41, 0x90, 0x44, 0x32, 0x4d, 0xe3, 0xc0, 0x92, 0x7e, 0xe9, 0x0f, 0xd6, 0xf3, 0x87, 0x11, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_66 = { .name = "ecdsa_brainpoolp224r1_sha224_66", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_66_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_66_msg, .msglen = 9, .sig = ecdsa_brainpoolp224r1_sha224_66_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 67 for ECDSA, tcId is 68 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_67_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_67_msg[] = { 0x31, 0x39, 0x36, 0x39, 0x34, 0x38, 0x36, 0x30, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_67_sig[] = { 0xa3, 0x7b, 0x0c, 0xc8, 0x7f, 0x6d, 0x46, 0x20, 0x30, 0x30, 0x30, 0xd7, 0xac, 0x4a, 0x65, 0x72, 0xf9, 0x4c, 0x0c, 0xf4, 0x4f, 0x0a, 0x03, 0x5c, 0x0e, 0x59, 0xd0, 0x7c, 0x30, 0xc7, 0xac, 0xd8, 0xdb, 0x9e, 0x72, 0x01, 0x22, 0x08, 0xf0, 0x8d, 0xb5, 0x38, 0x1a, 0x1e, 0x54, 0xfa, 0x09, 0x8c, 0x03, 0x14, 0xa0, 0x9a, 0x30, 0x58, 0xc4, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_67 = { .name = "ecdsa_brainpoolp224r1_sha224_67", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_67_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_67_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_67_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 68 for ECDSA, tcId is 69 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_68_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_68_msg[] = { 0x32, 0x32, 0x33, 0x35, 0x36, 0x37, 0x32, 0x38, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_68_sig[] = { 0x62, 0xf6, 0x60, 0xd9, 0x3a, 0x45, 0xdf, 0xa3, 0xb6, 0x61, 0xf8, 0xb6, 0xa4, 0xd5, 0xe0, 0x6e, 0x5a, 0x1e, 0xe8, 0xa8, 0x85, 0x5a, 0xba, 0xfa, 0x40, 0x73, 0xb5, 0x13, 0xd6, 0x97, 0x8f, 0x5d, 0xa8, 0xaf, 0xcc, 0x5b, 0x39, 0x5f, 0xd4, 0xb5, 0xf3, 0xc0, 0xfd, 0xb7, 0xa2, 0x68, 0x9e, 0x6d, 0xe4, 0x6d, 0x08, 0xfb, 0x9d, 0xe7, 0x18, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_68 = { .name = "ecdsa_brainpoolp224r1_sha224_68", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_68_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_68_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_68_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 69 for ECDSA, tcId is 70 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_69_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_69_msg[] = { 0x32, 0x32, 0x35, 0x37, 0x38, 0x34, 0x33, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_69_sig[] = { 0x61, 0xaf, 0x9a, 0x2c, 0xa2, 0x05, 0x03, 0xfd, 0x62, 0xbc, 0x3c, 0x6f, 0x84, 0x34, 0x99, 0x5c, 0x6c, 0xf3, 0x03, 0x7e, 0xb6, 0xf9, 0xff, 0x62, 0x13, 0x48, 0xcf, 0x53, 0x09, 0xf8, 0xf6, 0x47, 0x13, 0x87, 0x69, 0x54, 0x8d, 0xb4, 0x60, 0xef, 0xdd, 0x83, 0x23, 0xf8, 0xca, 0xd1, 0x8a, 0x70, 0x71, 0xd3, 0xd0, 0x4d, 0x6a, 0xd3, 0x3d, 0x82, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_69 = { .name = "ecdsa_brainpoolp224r1_sha224_69", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_69_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_69_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_69_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 70 for ECDSA, tcId is 71 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_70_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_70_msg[] = { 0x39, 0x34, 0x34, 0x35, 0x30, 0x30, 0x39, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_70_sig[] = { 0x0e, 0x45, 0x9c, 0xfe, 0x37, 0x01, 0x7c, 0x8b, 0x60, 0x5e, 0x38, 0xbf, 0x5d, 0x25, 0x17, 0x65, 0x76, 0xd4, 0x75, 0xfa, 0x88, 0xde, 0xd2, 0x7b, 0xe2, 0x6a, 0xbc, 0xa7, 0xb1, 0xbb, 0x6a, 0x60, 0xcc, 0xc3, 0xd4, 0x8e, 0x8d, 0x1d, 0x4c, 0x53, 0xf9, 0x01, 0x42, 0x80, 0x6e, 0x44, 0xd9, 0x94, 0x9e, 0xbc, 0xaa, 0x05, 0xb8, 0x3e, 0x20, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_70 = { .name = "ecdsa_brainpoolp224r1_sha224_70", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_70_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_70_msg, .msglen = 9, .sig = ecdsa_brainpoolp224r1_sha224_70_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 71 for ECDSA, tcId is 72 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_71_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_71_msg[] = { 0x31, 0x36, 0x38, 0x37, 0x37, 0x38, 0x39, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_71_sig[] = { 0xd0, 0x18, 0x48, 0x82, 0xbd, 0xd6, 0xfa, 0x09, 0x99, 0x6c, 0x2f, 0xec, 0xf3, 0xcd, 0x26, 0xed, 0x86, 0xa3, 0xce, 0x15, 0x98, 0x7e, 0x06, 0xdb, 0x85, 0x0b, 0x8b, 0x2b, 0xcf, 0xf0, 0x72, 0xb2, 0x7c, 0x33, 0xf9, 0x16, 0x81, 0xd3, 0xe9, 0x5a, 0x47, 0xbe, 0xc0, 0x00, 0xcc, 0x96, 0xc5, 0xdc, 0x91, 0xf6, 0x8e, 0xcc, 0xc2, 0x1c, 0xa3, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_71 = { .name = "ecdsa_brainpoolp224r1_sha224_71", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_71_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_71_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_71_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 72 for ECDSA, tcId is 73 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_72_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_72_msg[] = { 0x33, 0x39, 0x33, 0x32, 0x36, 0x31, 0x32, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_72_sig[] = { 0x35, 0x7e, 0x96, 0xab, 0x54, 0xf4, 0xdb, 0xb3, 0xa6, 0xa3, 0xa9, 0xd1, 0xed, 0xe6, 0xdf, 0x52, 0x94, 0x63, 0x9a, 0xed, 0xfd, 0xea, 0x96, 0xe7, 0xff, 0xc9, 0xda, 0x31, 0x24, 0xeb, 0x6b, 0x7f, 0x55, 0x90, 0x67, 0x39, 0x31, 0x3e, 0xa2, 0x66, 0x5a, 0x05, 0x04, 0xa3, 0xb0, 0xbf, 0x7a, 0x9b, 0x32, 0x9c, 0x69, 0x0f, 0x4a, 0x2e, 0xdf, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_72 = { .name = "ecdsa_brainpoolp224r1_sha224_72", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_72_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_72_msg, .msglen = 9, .sig = ecdsa_brainpoolp224r1_sha224_72_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 73 for ECDSA, tcId is 74 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_73_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_73_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x35, 0x37, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_73_sig[] = { 0x0b, 0xaa, 0xf7, 0x9d, 0x52, 0x35, 0xe3, 0x26, 0x8e, 0x55, 0x43, 0x1c, 0xbd, 0x79, 0x00, 0x46, 0xc2, 0x58, 0x1e, 0xbd, 0x3f, 0x8b, 0x90, 0x62, 0x7b, 0xd4, 0x6b, 0x8b, 0x83, 0xd5, 0x6f, 0x6b, 0x56, 0xca, 0x93, 0x81, 0xb1, 0x4c, 0xa8, 0x88, 0x28, 0x1b, 0x48, 0x1c, 0xf8, 0x28, 0xe9, 0xb4, 0x3b, 0x0d, 0x41, 0x81, 0x08, 0xe8, 0x2d, 0x58, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_73 = { .name = "ecdsa_brainpoolp224r1_sha224_73", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_73_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_73_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_73_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 74 for ECDSA, tcId is 75 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_74_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_74_msg[] = { 0x36, 0x30, 0x38, 0x38, 0x37, 0x34, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_74_sig[] = { 0x7e, 0xbe, 0xf1, 0xad, 0x41, 0xde, 0x94, 0x34, 0xeb, 0x3f, 0x6f, 0x83, 0x33, 0x8f, 0x01, 0x09, 0x66, 0x6c, 0x26, 0x4d, 0x89, 0x12, 0x33, 0x42, 0xb0, 0x90, 0x0f, 0x05, 0x78, 0xa3, 0xa9, 0xfa, 0x72, 0x01, 0xc4, 0x8f, 0x92, 0x83, 0x44, 0x00, 0x4a, 0x1f, 0x51, 0x80, 0x53, 0x09, 0x9d, 0xf8, 0x69, 0x08, 0xde, 0x29, 0xee, 0xb7, 0x6a, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_74 = { .name = "ecdsa_brainpoolp224r1_sha224_74", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_74_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_74_msg, .msglen = 8, .sig = ecdsa_brainpoolp224r1_sha224_74_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 75 for ECDSA, tcId is 76 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_75_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_75_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x35, 0x36, 0x39, 0x39, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_75_sig[] = { 0x9f, 0x20, 0xab, 0xef, 0xf0, 0xaf, 0x96, 0x5d, 0xa9, 0xc5, 0x1c, 0x99, 0x50, 0x7c, 0xf5, 0xf9, 0x1d, 0x75, 0xf2, 0x3f, 0xe0, 0x2b, 0x61, 0x15, 0x02, 0x96, 0x16, 0x7c, 0xbf, 0x6f, 0xed, 0x8a, 0x8e, 0xf7, 0x26, 0xf2, 0xf6, 0x62, 0x9c, 0x4e, 0x4b, 0x50, 0xb3, 0xc2, 0xce, 0x14, 0xff, 0x43, 0x9f, 0xe9, 0xbf, 0xe6, 0x15, 0x78, 0x68, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_75 = { .name = "ecdsa_brainpoolp224r1_sha224_75", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_75_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_75_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_75_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 76 for ECDSA, tcId is 77 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_76_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_76_msg[] = { 0x39, 0x30, 0x30, 0x37, 0x36, 0x30, 0x39, 0x33, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_76_sig[] = { 0x5a, 0xd6, 0x7f, 0xf0, 0xdd, 0xf8, 0xcb, 0x88, 0x40, 0x79, 0x74, 0xf8, 0x3f, 0xea, 0x43, 0xd9, 0xd1, 0x47, 0xcb, 0xb2, 0x3d, 0xba, 0x26, 0x1f, 0xad, 0xad, 0xae, 0xdb, 0x7f, 0xd3, 0x1c, 0xcc, 0x4b, 0x36, 0x05, 0xdb, 0x42, 0xb7, 0x00, 0xa2, 0x45, 0xdf, 0x8f, 0xc6, 0x0e, 0xfb, 0xf1, 0x40, 0x6a, 0xfb, 0x4d, 0x6c, 0x8c, 0x16, 0xe0, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_76 = { .name = "ecdsa_brainpoolp224r1_sha224_76", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_76_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_76_msg, .msglen = 8, .sig = ecdsa_brainpoolp224r1_sha224_76_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 77 for ECDSA, tcId is 78 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_77_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_77_msg[] = { 0x31, 0x36, 0x30, 0x32, 0x38, 0x33, 0x36, 0x31, 0x33, 0x37, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_77_sig[] = { 0x40, 0xe0, 0xbd, 0x9a, 0x2f, 0xa5, 0xa8, 0x86, 0x78, 0xc8, 0x5c, 0x3f, 0x4d, 0x27, 0xe2, 0xae, 0x2d, 0xd0, 0x46, 0xf2, 0x9a, 0x36, 0x39, 0xec, 0x2f, 0xf2, 0x51, 0x1a, 0x16, 0xcd, 0x49, 0x21, 0x5c, 0xb0, 0x05, 0x33, 0xfd, 0x13, 0x9a, 0xe1, 0xd3, 0x63, 0x1d, 0x45, 0xfb, 0x06, 0xd5, 0xec, 0xd1, 0x13, 0x8a, 0xb4, 0x6c, 0x48, 0xa4, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_77 = { .name = "ecdsa_brainpoolp224r1_sha224_77", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_77_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_77_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_77_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 78 for ECDSA, tcId is 79 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_78_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_78_msg[] = { 0x32, 0x30, 0x38, 0x30, 0x32, 0x34, 0x35, 0x36, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_78_sig[] = { 0x9a, 0x70, 0x5d, 0xdc, 0x87, 0x67, 0xe5, 0x4c, 0xec, 0x4d, 0x1c, 0x37, 0xa2, 0x46, 0x0b, 0x3c, 0x0b, 0x31, 0xe9, 0x81, 0x1c, 0x3a, 0x42, 0x75, 0x26, 0x49, 0x9c, 0x01, 0x36, 0xa6, 0xb9, 0xdc, 0xd7, 0xc8, 0xa8, 0x1e, 0x34, 0xaf, 0xdf, 0x84, 0x5c, 0x4c, 0xc0, 0xe7, 0x34, 0x55, 0x01, 0x1b, 0xbc, 0xd7, 0x98, 0x7f, 0x88, 0x72, 0x58, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_78 = { .name = "ecdsa_brainpoolp224r1_sha224_78", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_78_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_78_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_78_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 79 for ECDSA, tcId is 80 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_79_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_79_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x37, 0x34, 0x36, 0x35, 0x39, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_79_sig[] = { 0xa5, 0x1a, 0x62, 0x5b, 0x99, 0x56, 0x8d, 0x00, 0x3e, 0x4b, 0x96, 0xe6, 0x93, 0x13, 0x6b, 0xa7, 0x52, 0x21, 0xe8, 0xe5, 0x6c, 0x9a, 0xb5, 0xe9, 0xec, 0x68, 0x16, 0xee, 0x7e, 0x20, 0x89, 0x18, 0x78, 0x55, 0x16, 0xcd, 0xa7, 0xcf, 0x70, 0x87, 0x0d, 0xd8, 0x12, 0xe8, 0x0e, 0x8f, 0x9f, 0x1b, 0x52, 0x48, 0xd9, 0x19, 0xb1, 0xff, 0x1d, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_79 = { .name = "ecdsa_brainpoolp224r1_sha224_79", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_79_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_79_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_79_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 80 for ECDSA, tcId is 81 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_80_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_80_msg[] = { 0x31, 0x31, 0x35, 0x35, 0x35, 0x37, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_80_sig[] = { 0x47, 0x20, 0xf9, 0x37, 0x10, 0x0d, 0xf5, 0x2e, 0x6a, 0xe1, 0xba, 0xf4, 0x0f, 0x8b, 0xc9, 0x50, 0xe5, 0xaf, 0x2b, 0x1f, 0x94, 0x7d, 0x04, 0x17, 0x80, 0x4a, 0x82, 0x25, 0x8b, 0x82, 0x22, 0x73, 0xfb, 0x5d, 0x47, 0x3c, 0x9c, 0x88, 0xaa, 0x3c, 0x8d, 0xde, 0xa1, 0x67, 0x61, 0x9c, 0xda, 0x12, 0xee, 0x41, 0xce, 0x65, 0xde, 0x26, 0x8a, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_80 = { .name = "ecdsa_brainpoolp224r1_sha224_80", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_80_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_80_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_80_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 81 for ECDSA, tcId is 82 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_81_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_81_msg[] = { 0x32, 0x34, 0x33, 0x32, 0x34, 0x37, 0x34, 0x36, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_81_sig[] = { 0x3d, 0x28, 0x1d, 0x98, 0xb6, 0xa6, 0x76, 0xa6, 0xed, 0xa7, 0x57, 0x0d, 0x7b, 0x4f, 0x9a, 0x08, 0xe9, 0x24, 0xc7, 0x1a, 0xfd, 0x2c, 0xb6, 0xe0, 0x62, 0xa7, 0xeb, 0xfd, 0x84, 0x46, 0xe4, 0x27, 0x47, 0xa3, 0x52, 0x51, 0x8e, 0xf6, 0x8e, 0xff, 0x05, 0x56, 0x95, 0xb4, 0x76, 0x6b, 0xdc, 0x2a, 0xd8, 0xd3, 0xfa, 0x97, 0xbc, 0x20, 0x2b, 0x43, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_81 = { .name = "ecdsa_brainpoolp224r1_sha224_81", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_81_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_81_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_81_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 82 for ECDSA, tcId is 83 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_82_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_82_msg[] = { 0x32, 0x34, 0x31, 0x37, 0x32, 0x38, 0x32, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_82_sig[] = { 0x4d, 0x34, 0x69, 0xe9, 0x39, 0xff, 0xea, 0xd9, 0x41, 0xe3, 0xcb, 0xce, 0xbc, 0xa3, 0xbc, 0xb6, 0xf3, 0xc0, 0x29, 0x64, 0x1f, 0x97, 0x70, 0x0e, 0x02, 0x81, 0x77, 0x38, 0x42, 0xcb, 0x87, 0xa1, 0x0e, 0xa1, 0x7c, 0x0e, 0x58, 0xc3, 0x82, 0x2f, 0x6a, 0xe1, 0xf3, 0xa8, 0x91, 0x8d, 0x86, 0xa8, 0x32, 0x5d, 0xef, 0x4a, 0x8c, 0x80, 0x82, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_82 = { .name = "ecdsa_brainpoolp224r1_sha224_82", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_82_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_82_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_82_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 83 for ECDSA, tcId is 84 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_83_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_83_msg[] = { 0x37, 0x37, 0x38, 0x37, 0x34, 0x37, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_83_sig[] = { 0x21, 0xe5, 0x1b, 0x79, 0xe8, 0x55, 0x4e, 0x22, 0x93, 0x7c, 0x3e, 0x5b, 0x19, 0x83, 0xb3, 0x77, 0x62, 0x59, 0x1e, 0x21, 0xf5, 0x70, 0x6e, 0x5c, 0x19, 0x82, 0xa5, 0x0c, 0x4b, 0xcd, 0xbd, 0x23, 0xb0, 0xa4, 0x71, 0xdb, 0x84, 0xd1, 0xee, 0x3e, 0xdf, 0x76, 0x77, 0xbb, 0xb1, 0x43, 0x07, 0xec, 0xc5, 0xe1, 0x02, 0x31, 0x74, 0xec, 0x5b, 0x8c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_83 = { .name = "ecdsa_brainpoolp224r1_sha224_83", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_83_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_83_msg, .msglen = 8, .sig = ecdsa_brainpoolp224r1_sha224_83_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 84 for ECDSA, tcId is 85 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_84_pubkey[] = { 0xa0, 0xef, 0x7d, 0xb1, 0xbe, 0xe0, 0xae, 0xdb, 0x5a, 0x56, 0x34, 0xf4, 0xf3, 0xb1, 0xb8, 0x8d, 0x97, 0xd2, 0xa0, 0x7f, 0x80, 0x6a, 0x71, 0x8e, 0xfe, 0x19, 0x01, 0x4d, 0xae, 0xe1, 0x04, 0x3f, 0x9e, 0x92, 0x9c, 0x32, 0xd7, 0x4a, 0xb0, 0xe4, 0xee, 0xba, 0x26, 0x23, 0xf1, 0x7b, 0xa2, 0x81, 0xb6, 0xbe, 0x87, 0x74, 0x5b, 0x59, 0xf6, 0x0e, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_84_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_84_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xdb, 0xee, 0xdf, 0x88, 0x4b, 0x0c, 0x29, 0xfb, 0xcd, 0x51, 0xd9, 0x21, 0x2d, 0x5f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_84 = { .name = "ecdsa_brainpoolp224r1_sha224_84", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_84_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_84_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_84_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 85 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 85 for ECDSA, tcId is 86 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_85_pubkey[] = { 0xa0, 0xef, 0x7d, 0xb1, 0xbe, 0xe0, 0xae, 0xdb, 0x5a, 0x56, 0x34, 0xf4, 0xf3, 0xb1, 0xb8, 0x8d, 0x97, 0xd2, 0xa0, 0x7f, 0x80, 0x6a, 0x71, 0x8e, 0xfe, 0x19, 0x01, 0x4d, 0xae, 0xe1, 0x04, 0x3f, 0x9e, 0x92, 0x9c, 0x32, 0xd7, 0x4a, 0xb0, 0xe4, 0xee, 0xba, 0x26, 0x23, 0xf1, 0x7b, 0xa2, 0x81, 0xb6, 0xbe, 0x87, 0x74, 0x5b, 0x59, 0xf6, 0x0e, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_85_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_85_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xfe, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_85 = { .name = "ecdsa_brainpoolp224r1_sha224_85", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_85_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_85_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_85_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 86 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 86 for ECDSA, tcId is 87 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_86_pubkey[] = { 0x3a, 0xdd, 0xa4, 0x07, 0xba, 0xd7, 0xf5, 0x93, 0xe8, 0x3d, 0x7d, 0x48, 0x4f, 0xd1, 0x4c, 0x23, 0xdd, 0xa1, 0x7f, 0x8d, 0x46, 0x0c, 0x22, 0x2a, 0xa7, 0x25, 0x75, 0x77, 0xcd, 0x62, 0x44, 0x3b, 0x2b, 0x77, 0x02, 0x91, 0xf6, 0x59, 0x04, 0xda, 0xcf, 0x75, 0xff, 0x97, 0x5f, 0x1a, 0x66, 0x71, 0x87, 0xe0, 0xe4, 0xf5, 0x0c, 0x14, 0x88, 0x9c, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_86_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_86_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_86 = { .name = "ecdsa_brainpoolp224r1_sha224_86", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_86_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_86_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_86_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 87 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 87 for ECDSA, tcId is 88 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_87_pubkey[] = { 0x24, 0x58, 0x7c, 0xe1, 0xdb, 0xff, 0x28, 0x1d, 0xca, 0xb1, 0x79, 0x45, 0x19, 0x80, 0x62, 0x81, 0xad, 0x4e, 0x09, 0x97, 0x49, 0x25, 0x10, 0x67, 0x7f, 0xb6, 0x51, 0x06, 0x92, 0x96, 0x99, 0x6e, 0x83, 0xb8, 0x08, 0x67, 0x6c, 0xbf, 0x6f, 0x28, 0xc9, 0x2b, 0x84, 0x30, 0x33, 0x14, 0xb6, 0x3a, 0x03, 0x08, 0x13, 0x4f, 0x22, 0x2d, 0x0e, 0xc2, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_87_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_87_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x63, 0xf0, 0xe3, 0x42, 0x58, 0xbb, 0x90, 0x61, 0x54, 0x79, 0x06, 0xd0, 0xc3, 0x82, 0x7c, 0x50, 0x44, 0x22, 0xc1, 0x39, 0xe6, 0xd6, 0xe1, 0x07, 0x8b, 0x37, 0xaa, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_87 = { .name = "ecdsa_brainpoolp224r1_sha224_87", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_87_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_87_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_87_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 88 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 88 for ECDSA, tcId is 89 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_88_pubkey[] = { 0xc4, 0x5c, 0x51, 0xd5, 0xa9, 0xb2, 0x13, 0xe4, 0x1c, 0xa6, 0xf1, 0x5c, 0xb8, 0xaa, 0x1b, 0xc0, 0xb8, 0xb7, 0x3d, 0x3a, 0x8a, 0x23, 0xa1, 0x4f, 0x5a, 0x3d, 0xa4, 0xdf, 0xbc, 0x78, 0xcc, 0x61, 0x76, 0xd3, 0xb8, 0x31, 0xe6, 0x88, 0x00, 0x67, 0x17, 0x68, 0x04, 0x3c, 0x11, 0xbf, 0x63, 0xa6, 0x95, 0x91, 0x8d, 0xf6, 0xec, 0x87, 0x37, 0x8a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_88_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_88_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x6e, 0xb1, 0xfb, 0xfa, 0x8d, 0xf8, 0x7d, 0x4f, 0xa1, 0x0c, 0x83, 0x3f, 0x7d, 0xd1, 0xbb, 0xe7, 0xef, 0x01, 0x44, 0xff, 0x71, 0x53, 0x79, 0x75, 0x37, 0x8f, 0x91, 0xec, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_88 = { .name = "ecdsa_brainpoolp224r1_sha224_88", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_88_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_88_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_88_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 89 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 89 for ECDSA, tcId is 90 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_89_pubkey[] = { 0x36, 0xa5, 0x34, 0x4d, 0xa0, 0x8a, 0x42, 0x1e, 0xdc, 0x6c, 0x3b, 0xeb, 0x7d, 0xe9, 0x7a, 0x75, 0x59, 0xfc, 0x10, 0x1c, 0x14, 0x89, 0xff, 0x2b, 0x50, 0x36, 0xd8, 0xf6, 0x20, 0x7b, 0xf4, 0x66, 0x6e, 0x4d, 0xf6, 0x06, 0xbd, 0x0d, 0x98, 0x23, 0xa5, 0x2b, 0x58, 0xdd, 0xfd, 0xfc, 0x1d, 0xa7, 0x05, 0x13, 0xc5, 0xf9, 0x99, 0x0f, 0x80, 0x85, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_89_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_89_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_89 = { .name = "ecdsa_brainpoolp224r1_sha224_89", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_89_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_89_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_89_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 90 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 90 for ECDSA, tcId is 91 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_90_pubkey[] = { 0x36, 0xa5, 0x34, 0x4d, 0xa0, 0x8a, 0x42, 0x1e, 0xdc, 0x6c, 0x3b, 0xeb, 0x7d, 0xe9, 0x7a, 0x75, 0x59, 0xfc, 0x10, 0x1c, 0x14, 0x89, 0xff, 0x2b, 0x50, 0x36, 0xd8, 0xf6, 0x20, 0x7b, 0xf4, 0x66, 0x6e, 0x4d, 0xf6, 0x06, 0xbd, 0x0d, 0x98, 0x23, 0xa5, 0x2b, 0x58, 0xdd, 0xfd, 0xfc, 0x1d, 0xa7, 0x05, 0x13, 0xc5, 0xf9, 0x99, 0x0f, 0x80, 0x85, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_90_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_90_sig[] = { 0x01, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_90 = { .name = "ecdsa_brainpoolp224r1_sha224_90", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_90_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_90_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_90_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 91 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 91 for ECDSA, tcId is 92 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_91_pubkey[] = { 0x40, 0x95, 0xc0, 0x95, 0xa9, 0x64, 0x89, 0x51, 0xda, 0x35, 0x2b, 0x83, 0x7f, 0x36, 0x8e, 0x0b, 0xe6, 0x7d, 0x79, 0xfd, 0x57, 0xea, 0xdf, 0xff, 0xed, 0xdf, 0xb4, 0x55, 0xcc, 0xdc, 0xfa, 0xbe, 0xa1, 0x9e, 0x96, 0xd4, 0xd2, 0x0e, 0x42, 0xb8, 0xae, 0x23, 0xc2, 0x51, 0x94, 0x26, 0x01, 0x8e, 0x25, 0xa6, 0x4d, 0xea, 0x85, 0xd8, 0xa6, 0x8b, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_91_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_91_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_91 = { .name = "ecdsa_brainpoolp224r1_sha224_91", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_91_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_91_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_91_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 92 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 92 for ECDSA, tcId is 93 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_92_pubkey[] = { 0x40, 0x95, 0xc0, 0x95, 0xa9, 0x64, 0x89, 0x51, 0xda, 0x35, 0x2b, 0x83, 0x7f, 0x36, 0x8e, 0x0b, 0xe6, 0x7d, 0x79, 0xfd, 0x57, 0xea, 0xdf, 0xff, 0xed, 0xdf, 0xb4, 0x55, 0xcc, 0xdc, 0xfa, 0xbe, 0xa1, 0x9e, 0x96, 0xd4, 0xd2, 0x0e, 0x42, 0xb8, 0xae, 0x23, 0xc2, 0x51, 0x94, 0x26, 0x01, 0x8e, 0x25, 0xa6, 0x4d, 0xea, 0x85, 0xd8, 0xa6, 0x8b, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_92_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_92_sig[] = { 0x01, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_92 = { .name = "ecdsa_brainpoolp224r1_sha224_92", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_92_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_92_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_92_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 93 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 93 for ECDSA, tcId is 94 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_93_pubkey[] = { 0xcc, 0x35, 0x2a, 0xc4, 0x8a, 0xac, 0xb6, 0x49, 0x5e, 0xc3, 0x83, 0x1b, 0x21, 0xcc, 0xd4, 0xd3, 0x19, 0x71, 0x36, 0x29, 0x2b, 0xf6, 0xf2, 0x0f, 0x22, 0x80, 0x25, 0x66, 0x64, 0x32, 0x19, 0x91, 0xe6, 0x7f, 0x7d, 0xbc, 0x22, 0x60, 0x2e, 0xcb, 0xdb, 0x31, 0x22, 0xed, 0xce, 0x5f, 0xf8, 0x5d, 0x92, 0x31, 0x43, 0xce, 0xcc, 0x0d, 0x4f, 0x6d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_93_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_93_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_93 = { .name = "ecdsa_brainpoolp224r1_sha224_93", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_93_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_93_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_93_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 94 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 94 for ECDSA, tcId is 95 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_94_pubkey[] = { 0xcc, 0x35, 0x2a, 0xc4, 0x8a, 0xac, 0xb6, 0x49, 0x5e, 0xc3, 0x83, 0x1b, 0x21, 0xcc, 0xd4, 0xd3, 0x19, 0x71, 0x36, 0x29, 0x2b, 0xf6, 0xf2, 0x0f, 0x22, 0x80, 0x25, 0x66, 0x64, 0x32, 0x19, 0x91, 0xe6, 0x7f, 0x7d, 0xbc, 0x22, 0x60, 0x2e, 0xcb, 0xdb, 0x31, 0x22, 0xed, 0xce, 0x5f, 0xf8, 0x5d, 0x92, 0x31, 0x43, 0xce, 0xcc, 0x0d, 0x4f, 0x6d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_94_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_94_sig[] = { 0x01, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_94 = { .name = "ecdsa_brainpoolp224r1_sha224_94", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_94_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_94_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_94_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 95 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 95 for ECDSA, tcId is 96 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_95_pubkey[] = { 0xcc, 0x35, 0x2a, 0xc4, 0x8a, 0xac, 0xb6, 0x49, 0x5e, 0xc3, 0x83, 0x1b, 0x21, 0xcc, 0xd4, 0xd3, 0x19, 0x71, 0x36, 0x29, 0x2b, 0xf6, 0xf2, 0x0f, 0x22, 0x80, 0x25, 0x66, 0x64, 0x32, 0x19, 0x91, 0xe6, 0x7f, 0x7d, 0xbc, 0x22, 0x60, 0x2e, 0xcb, 0xdb, 0x31, 0x22, 0xed, 0xce, 0x5f, 0xf8, 0x5d, 0x92, 0x31, 0x43, 0xce, 0xcc, 0x0d, 0x4f, 0x6d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_95_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_95_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_95 = { .name = "ecdsa_brainpoolp224r1_sha224_95", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_95_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_95_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_95_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 96 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 96 for ECDSA, tcId is 97 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_96_pubkey[] = { 0x91, 0x48, 0xf2, 0x9c, 0x67, 0xf8, 0x3c, 0x70, 0x5e, 0xef, 0xb5, 0x9c, 0x92, 0x95, 0x47, 0x75, 0xf9, 0x0c, 0x15, 0xe2, 0x25, 0xda, 0x2e, 0x99, 0x6a, 0xbc, 0xdd, 0x1d, 0xc9, 0xdb, 0x1a, 0xa1, 0xe1, 0x52, 0x77, 0xc4, 0x55, 0x5d, 0x24, 0x11, 0x82, 0x39, 0xe5, 0x3f, 0xd2, 0xf0, 0xb5, 0xe7, 0xea, 0x80, 0x7e, 0xb3, 0xde, 0x1e, 0xe3, 0x50, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_96_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_96_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xba, 0x6a, 0x26, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_96 = { .name = "ecdsa_brainpoolp224r1_sha224_96", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_96_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_96_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_96_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 97 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 97 for ECDSA, tcId is 98 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_97_pubkey[] = { 0x9b, 0xf0, 0x45, 0xa4, 0x3a, 0x5f, 0x14, 0xd5, 0xe4, 0x12, 0xee, 0x18, 0x1f, 0x11, 0x1d, 0x6e, 0x53, 0x96, 0x11, 0x20, 0x53, 0x1f, 0x3c, 0x50, 0xca, 0x70, 0x1e, 0x78, 0xbe, 0x9e, 0xb9, 0x51, 0x46, 0xf4, 0xf2, 0xbe, 0x96, 0x94, 0x99, 0x76, 0xa7, 0xaa, 0x49, 0xd3, 0x15, 0x93, 0xa7, 0xda, 0x2e, 0xdd, 0x90, 0x76, 0x52, 0x39, 0x8c, 0x3a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_97_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_97_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x9d, 0xfe, 0x5c, 0xfd, 0x9b, 0x02, 0xfe, 0x7a, 0x6f, 0x74, 0x7b, 0xf3, 0x1d, 0xd5, 0x81, 0xd0, 0xa9, 0x3c, 0xfe, 0xcc, 0x66, 0xa1, 0x17, 0x3d, 0x61, 0x1d, 0xfd, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_97 = { .name = "ecdsa_brainpoolp224r1_sha224_97", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_97_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_97_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_97_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 98 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 98 for ECDSA, tcId is 99 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_98_pubkey[] = { 0x87, 0x73, 0x9e, 0x28, 0x21, 0xed, 0x95, 0x67, 0xe8, 0x87, 0x02, 0xfa, 0x8c, 0x6d, 0x08, 0x3c, 0x97, 0xc1, 0xf3, 0xf1, 0xeb, 0x32, 0xd1, 0x3f, 0x75, 0x1f, 0xb0, 0x73, 0x6d, 0x02, 0xeb, 0xa0, 0x5e, 0x8c, 0xb9, 0x46, 0x72, 0xd0, 0x9e, 0xbc, 0x11, 0x05, 0x1d, 0x52, 0xec, 0x7b, 0xd4, 0xdc, 0x77, 0x67, 0x30, 0x1b, 0x67, 0x03, 0x42, 0x12, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_98_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_98_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x43, 0xe2, 0x35, 0x74, 0x8b, 0xd3, 0xb1, 0xbf, 0xa1, 0x4c, 0x92, 0x23, 0x4a, 0x90, 0x26, 0x1a, 0xcc, 0x3e, 0x90, 0x86, 0x81, 0x08, 0x01, 0xa3, 0x67, 0x46, 0xbc, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_98 = { .name = "ecdsa_brainpoolp224r1_sha224_98", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_98_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_98_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_98_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 99 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 99 for ECDSA, tcId is 100 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_99_pubkey[] = { 0x1a, 0x51, 0x5c, 0xbe, 0x95, 0x7b, 0xfc, 0x07, 0x0e, 0x4c, 0x4a, 0x75, 0xd6, 0xfd, 0x5e, 0x7c, 0x15, 0xb1, 0xe2, 0x55, 0xeb, 0x42, 0xfe, 0xad, 0x06, 0xc9, 0xd2, 0x63, 0x62, 0x52, 0xcc, 0x0d, 0x23, 0x43, 0x18, 0x39, 0x4d, 0xf7, 0xdb, 0x65, 0xb0, 0xa5, 0x2e, 0x06, 0x95, 0x3c, 0xa6, 0xc2, 0x1e, 0xc9, 0x57, 0x74, 0xd3, 0x9e, 0xfd, 0xc9, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_99_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_99_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0xa8, 0xbd, 0xf4, 0x65, 0x32, 0xd8, 0x13, 0x6b, 0xeb, 0x21, 0xdb, 0xf1, 0x78, 0x09, 0x0c, 0x7e, 0x7d, 0xad, 0x2c, 0xaa, 0x8e, 0xb5, 0x2c, 0xef, 0x8d, 0x83, 0x0f, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_99 = { .name = "ecdsa_brainpoolp224r1_sha224_99", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_99_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_99_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_99_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 100 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 100 for ECDSA, tcId is 101 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_100_pubkey[] = { 0xd6, 0xa1, 0x6e, 0x19, 0x4e, 0x12, 0xb9, 0x6d, 0xb8, 0xe1, 0xbb, 0x02, 0x50, 0xd9, 0x50, 0xf7, 0xb3, 0x12, 0x9b, 0x14, 0xbb, 0xa0, 0xef, 0xb1, 0x57, 0xc4, 0x42, 0x3e, 0x62, 0x5a, 0x0c, 0x8c, 0x20, 0x83, 0x8b, 0xd9, 0x7f, 0xbc, 0x89, 0xf1, 0x67, 0x00, 0x28, 0x75, 0x4a, 0x09, 0xad, 0x28, 0xf6, 0x2d, 0xe5, 0xee, 0xa6, 0xe0, 0x7b, 0xc1, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_100_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_100_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x73, 0x16, 0x8a, 0x89, 0x94, 0xe5, 0xf7, 0x17, 0x93, 0x08, 0x1c, 0xb7, 0xaf, 0xbe, 0x3c, 0x0a, 0xf4, 0xbf, 0x7a, 0xa3, 0x36, 0xcf, 0x9d, 0xe3, 0x1e, 0xf8, 0x53, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_100 = { .name = "ecdsa_brainpoolp224r1_sha224_100", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_100_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_100_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_100_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 101 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 101 for ECDSA, tcId is 102 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_101_pubkey[] = { 0xc0, 0x12, 0x95, 0x0d, 0x07, 0x4b, 0xb0, 0x1b, 0x0a, 0x19, 0x88, 0xa5, 0xb5, 0x9b, 0x95, 0x91, 0x04, 0x27, 0x5b, 0xaf, 0x75, 0x7e, 0x53, 0x02, 0x9b, 0x04, 0x6a, 0x15, 0x42, 0xf5, 0x0f, 0xe2, 0x7f, 0x3e, 0xba, 0xc9, 0x03, 0x65, 0x58, 0xef, 0x30, 0xeb, 0xcb, 0x81, 0x20, 0x27, 0xbf, 0x0e, 0xf4, 0x6c, 0xda, 0x51, 0x96, 0x95, 0x41, 0xbb, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_101_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_101_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0x73, 0x16, 0x8a, 0x89, 0x94, 0xe5, 0xf7, 0x17, 0x93, 0x08, 0x1c, 0xb7, 0xaf, 0xbe, 0x3c, 0x0a, 0xf4, 0xbf, 0x7a, 0xa3, 0x36, 0xcf, 0x9d, 0xe3, 0x1e, 0xf8, 0x53, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_101 = { .name = "ecdsa_brainpoolp224r1_sha224_101", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_101_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_101_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_101_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 102 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 102 for ECDSA, tcId is 103 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_102_pubkey[] = { 0xd1, 0x5c, 0x13, 0xa1, 0xbe, 0x99, 0xd9, 0xeb, 0x77, 0xd6, 0x88, 0x10, 0x4a, 0x18, 0xe2, 0x42, 0x42, 0xd2, 0x05, 0xa4, 0x02, 0x6f, 0x4a, 0x65, 0x62, 0x9e, 0x59, 0xee, 0x7e, 0x3d, 0xdf, 0x9a, 0xbb, 0xb7, 0xd5, 0x32, 0xb6, 0xe8, 0x1a, 0x6e, 0x11, 0xf3, 0x0d, 0x5b, 0x55, 0xfe, 0xb8, 0xee, 0x70, 0x7c, 0x4f, 0xed, 0xf9, 0x9c, 0x06, 0x07, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_102_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_102_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x1f, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_102 = { .name = "ecdsa_brainpoolp224r1_sha224_102", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_102_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_102_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_102_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 103 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 103 for ECDSA, tcId is 104 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_103_pubkey[] = { 0x3f, 0xe0, 0x19, 0x72, 0xc0, 0x62, 0x2e, 0xa8, 0x12, 0xd3, 0x06, 0x52, 0xc9, 0xfe, 0x2f, 0xeb, 0xee, 0x70, 0x81, 0x23, 0xb1, 0x62, 0x6d, 0x74, 0x4f, 0x87, 0xdb, 0x0d, 0xa5, 0x72, 0xc7, 0xe1, 0xe3, 0xa4, 0x81, 0x95, 0xe6, 0x22, 0x1d, 0x98, 0x3f, 0x78, 0x2f, 0xdc, 0x9e, 0x7c, 0x55, 0xbd, 0x5f, 0xdf, 0x7b, 0x67, 0x9b, 0x0f, 0x87, 0x56, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_103_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_103_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_103 = { .name = "ecdsa_brainpoolp224r1_sha224_103", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_103_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_103_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_103_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 104 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 104 for ECDSA, tcId is 105 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_104_pubkey[] = { 0x3f, 0xe0, 0x19, 0x72, 0xc0, 0x62, 0x2e, 0xa8, 0x12, 0xd3, 0x06, 0x52, 0xc9, 0xfe, 0x2f, 0xeb, 0xee, 0x70, 0x81, 0x23, 0xb1, 0x62, 0x6d, 0x74, 0x4f, 0x87, 0xdb, 0x0d, 0xa5, 0x72, 0xc7, 0xe1, 0xe3, 0xa4, 0x81, 0x95, 0xe6, 0x22, 0x1d, 0x98, 0x3f, 0x78, 0x2f, 0xdc, 0x9e, 0x7c, 0x55, 0xbd, 0x5f, 0xdf, 0x7b, 0x67, 0x9b, 0x0f, 0x87, 0x56, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_104_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_104_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_104 = { .name = "ecdsa_brainpoolp224r1_sha224_104", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_104_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_104_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_104_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 105 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 105 for ECDSA, tcId is 106 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_105_pubkey[] = { 0xd4, 0xb6, 0xe5, 0x11, 0x24, 0x06, 0xfb, 0x74, 0x3b, 0x6b, 0xb5, 0x5f, 0x49, 0xea, 0x20, 0x30, 0xd9, 0x04, 0x42, 0x08, 0x31, 0xeb, 0xdd, 0xac, 0xd6, 0x7b, 0xba, 0x89, 0x65, 0x22, 0x65, 0x38, 0x4b, 0x75, 0xd8, 0x50, 0xe7, 0xc2, 0x7f, 0x4e, 0x33, 0xed, 0x6c, 0x57, 0x6d, 0xf0, 0xff, 0x96, 0x94, 0x70, 0xa9, 0xef, 0x25, 0xff, 0xaf, 0xcd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_105_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_105_sig[] = { 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xcf, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_105 = { .name = "ecdsa_brainpoolp224r1_sha224_105", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_105_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_105_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_105_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 106 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 106 for ECDSA, tcId is 107 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_106_pubkey[] = { 0x16, 0xc2, 0x12, 0x9d, 0x54, 0xb9, 0x34, 0x79, 0xb5, 0x6a, 0x9f, 0xf5, 0xb8, 0x3e, 0x4c, 0x75, 0x0b, 0xb4, 0xf3, 0x3e, 0xe1, 0xe7, 0x0f, 0x38, 0xb5, 0x44, 0x9f, 0x2d, 0x34, 0xcc, 0xaf, 0x79, 0xc5, 0x1c, 0x7d, 0xff, 0x3a, 0x7f, 0x9a, 0x05, 0xcd, 0x15, 0xa3, 0x96, 0xe0, 0xcf, 0xfe, 0x25, 0x42, 0x1c, 0x37, 0xe9, 0xb8, 0x0e, 0x14, 0x89, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_106_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_106_sig[] = { 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xd0, 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_106 = { .name = "ecdsa_brainpoolp224r1_sha224_106", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_106_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_106_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_106_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 107 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 107 for ECDSA, tcId is 108 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_107_pubkey[] = { 0x65, 0xab, 0xa0, 0xe4, 0x42, 0x7a, 0x0a, 0xe5, 0x58, 0x72, 0x1a, 0x5a, 0x8e, 0x72, 0xcb, 0x37, 0x62, 0xeb, 0x50, 0x22, 0x3b, 0xbe, 0x4c, 0x41, 0xa4, 0x50, 0xfe, 0x49, 0xc8, 0x1d, 0x3a, 0xe4, 0x86, 0x47, 0x8b, 0x42, 0x98, 0xc9, 0x43, 0x28, 0x3d, 0x2e, 0xc2, 0x13, 0x0b, 0xac, 0x22, 0xfa, 0xbc, 0x52, 0xf7, 0x43, 0xb1, 0xab, 0x7f, 0xa7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_107_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_107_sig[] = { 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xd0, 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_107 = { .name = "ecdsa_brainpoolp224r1_sha224_107", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_107_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_107_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_107_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 108 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 108 for ECDSA, tcId is 109 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_108_pubkey[] = { 0x55, 0xa7, 0xb0, 0x10, 0x06, 0x13, 0xfa, 0xbd, 0x95, 0x7b, 0x42, 0x60, 0x08, 0x35, 0xc6, 0xd4, 0x2e, 0x01, 0xe0, 0x42, 0x52, 0x59, 0x3b, 0xdd, 0xe3, 0xb1, 0x72, 0x78, 0x87, 0x70, 0x8a, 0x05, 0xab, 0xa2, 0xf9, 0x3f, 0x1a, 0x1e, 0x1e, 0xcb, 0x70, 0x3e, 0xc9, 0xa8, 0xee, 0x6d, 0x60, 0x13, 0xa1, 0x01, 0xd3, 0x97, 0x01, 0x2a, 0x8c, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_108_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_108_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_108 = { .name = "ecdsa_brainpoolp224r1_sha224_108", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_108_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_108_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_108_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 109 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 109 for ECDSA, tcId is 110 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_109_pubkey[] = { 0x1a, 0xda, 0x54, 0xdc, 0x01, 0x58, 0x61, 0x68, 0x0d, 0x8b, 0xb2, 0xd3, 0x11, 0xb9, 0x0e, 0x82, 0xdb, 0x75, 0xaa, 0x9e, 0x82, 0x17, 0xb9, 0x26, 0x11, 0xfa, 0x03, 0xcb, 0x84, 0xc6, 0x11, 0x55, 0x11, 0x97, 0x29, 0x8b, 0x32, 0x74, 0x87, 0x5c, 0xb9, 0x46, 0x86, 0xe7, 0x58, 0xf0, 0xa1, 0xa9, 0x67, 0x5c, 0x0b, 0xc1, 0x57, 0x45, 0x1a, 0x76, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_109_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_109_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x62, 0x85, 0x80, 0xa9, 0xad, 0xb0, 0x26, 0x04, 0x52, 0x5b, 0x1e, 0xe6, 0xb1, 0x35, 0xe1, 0xa9, 0xc7, 0x45, 0x02, 0x18, 0x24, 0x58, 0x2c, 0x52, 0x38, 0x5a, 0x81, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_109 = { .name = "ecdsa_brainpoolp224r1_sha224_109", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_109_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_109_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_109_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 110 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 110 for ECDSA, tcId is 111 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_110_pubkey[] = { 0xc6, 0x7b, 0x64, 0x29, 0x78, 0x53, 0x34, 0xa6, 0x08, 0xdd, 0xe9, 0x49, 0xa8, 0xab, 0xe6, 0x41, 0xdb, 0xd3, 0x60, 0x1e, 0xbc, 0xe1, 0xe6, 0x75, 0xfe, 0x71, 0xa8, 0xe5, 0x27, 0xd2, 0xe8, 0x72, 0x7d, 0xc4, 0xf6, 0x18, 0x49, 0x35, 0x50, 0xbb, 0x94, 0x01, 0x51, 0xbc, 0xa6, 0x82, 0x6f, 0x71, 0x4c, 0x5b, 0x31, 0x85, 0x40, 0x38, 0xf4, 0x4d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_110_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_110_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_110 = { .name = "ecdsa_brainpoolp224r1_sha224_110", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_110_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_110_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_110_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 111 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 111 for ECDSA, tcId is 112 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_111_pubkey[] = { 0x1d, 0xcc, 0x7a, 0x5a, 0xd1, 0x11, 0xa3, 0x36, 0x27, 0xf9, 0x2d, 0xd8, 0x75, 0xba, 0x4a, 0x06, 0xf6, 0xa7, 0xc2, 0xbe, 0xfd, 0xd1, 0x05, 0x04, 0x88, 0xd0, 0x57, 0xa7, 0x34, 0x1c, 0xae, 0x0b, 0xe7, 0x2a, 0x99, 0x77, 0x6d, 0xb5, 0xbd, 0x79, 0xb4, 0x63, 0xe2, 0xd3, 0x88, 0x27, 0x64, 0xaf, 0x9c, 0x02, 0x45, 0xd0, 0x84, 0xa3, 0x34, 0x2d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_111_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_111_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x8f, 0xd6, 0x23, 0x1c, 0x19, 0x82, 0x44, 0x59, 0x71, 0x65, 0x75, 0x6e, 0x4e, 0x8b, 0x52, 0x65, 0xe0, 0xb9, 0xd2, 0xdc, 0xf3, 0xe9, 0xd3, 0x17, 0xc3, 0xc5, 0x0d, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_111 = { .name = "ecdsa_brainpoolp224r1_sha224_111", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_111_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_111_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_111_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 112 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 112 for ECDSA, tcId is 113 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_112_pubkey[] = { 0xbd, 0xf7, 0x08, 0xa0, 0x1c, 0x6a, 0x81, 0x47, 0x28, 0xd3, 0x94, 0xb7, 0xf2, 0x9b, 0xf6, 0x57, 0x97, 0x34, 0x86, 0x2d, 0x8a, 0xf8, 0xe6, 0xff, 0x78, 0x6f, 0xbe, 0x49, 0x90, 0x1c, 0xd4, 0x62, 0x94, 0x6e, 0x5e, 0x36, 0xcc, 0x97, 0xc9, 0x89, 0x6d, 0xf2, 0xe1, 0x81, 0x77, 0x45, 0x6d, 0x28, 0x2a, 0x7a, 0x26, 0xa3, 0x80, 0x84, 0xc0, 0x86, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_112_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_112_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0xb6, 0xea, 0x09, 0xc6, 0xec, 0x5e, 0x04, 0x84, 0xb9, 0x4f, 0x25, 0xd8, 0x90, 0x14, 0x5b, 0x0a, 0xe3, 0xff, 0xbb, 0x98, 0xb7, 0x16, 0xad, 0xdd, 0x92, 0xde, 0xbd, 0xce, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_112 = { .name = "ecdsa_brainpoolp224r1_sha224_112", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_112_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_112_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_112_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 113 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 113 for ECDSA, tcId is 114 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_113_pubkey[] = { 0x0c, 0x53, 0x1f, 0xb3, 0xd9, 0x96, 0xfa, 0xa2, 0x24, 0x07, 0xdf, 0x13, 0x05, 0xff, 0x6a, 0xe0, 0xbf, 0xe9, 0x4e, 0x1c, 0x20, 0x22, 0xf4, 0x73, 0x0d, 0x0f, 0x8a, 0x4a, 0xbd, 0x80, 0x73, 0x95, 0x04, 0x59, 0x56, 0x2e, 0x53, 0x9a, 0xc0, 0x89, 0x54, 0x33, 0x75, 0x7e, 0x25, 0x20, 0x9b, 0x12, 0x53, 0x4f, 0xf3, 0x0f, 0xe3, 0xd3, 0x7c, 0x71, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_113_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_113_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x2f, 0x62, 0xa9, 0xcf, 0x48, 0xe3, 0xca, 0x60, 0x2e, 0xef, 0x4e, 0x33, 0xaf, 0xa4, 0x3f, 0x2d, 0xce, 0xb9, 0x22, 0xa4, 0x0a, 0x67, 0xde, 0x79, 0xf7, 0xb1, 0xae, 0x38, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_113 = { .name = "ecdsa_brainpoolp224r1_sha224_113", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_113_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_113_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_113_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 114 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 114 for ECDSA, tcId is 115 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_114_pubkey[] = { 0x67, 0x82, 0x95, 0x40, 0x82, 0x41, 0x8e, 0x00, 0x02, 0xa0, 0x81, 0x26, 0x72, 0xac, 0x21, 0x23, 0xb6, 0x33, 0x4b, 0x34, 0x13, 0x40, 0x55, 0x50, 0x96, 0xbc, 0xf6, 0xc6, 0x1f, 0x6f, 0xa1, 0xa8, 0xfe, 0xa6, 0x17, 0xd9, 0xdd, 0xa1, 0x44, 0x61, 0xd6, 0x3a, 0xa4, 0x48, 0xf2, 0x05, 0xa3, 0x9b, 0x25, 0x50, 0x1a, 0x6b, 0x1d, 0x42, 0xee, 0x5f, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_114_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_114_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x61, 0x8d, 0xfc, 0x54, 0x40, 0x8b, 0xec, 0x1c, 0xb3, 0x7c, 0x7e, 0xe5, 0x2b, 0x60, 0xad, 0xbc, 0x8d, 0x3a, 0x6c, 0x26, 0x45, 0x7c, 0x39, 0xd0, 0x13, 0xe8, 0x8e, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_114 = { .name = "ecdsa_brainpoolp224r1_sha224_114", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_114_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_114_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_114_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 115 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 115 for ECDSA, tcId is 116 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_115_pubkey[] = { 0x5b, 0x5e, 0x6e, 0xab, 0xa7, 0x59, 0x7a, 0xe6, 0x41, 0x42, 0x0a, 0xce, 0x6a, 0xf2, 0x57, 0x58, 0x39, 0xf1, 0x61, 0xb2, 0x7b, 0x91, 0xb2, 0x70, 0xf1, 0x8b, 0xf7, 0xd0, 0x49, 0x6a, 0xb3, 0xc3, 0x07, 0x2f, 0xa6, 0xee, 0x55, 0x78, 0xfc, 0x81, 0x4f, 0x74, 0xd1, 0x48, 0xec, 0xbc, 0x2a, 0x98, 0xcf, 0xdc, 0x5d, 0x40, 0xec, 0x7e, 0x69, 0x80, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_115_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_115_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x01, 0x0d, 0xe5, 0x71, 0x24, 0xc0, 0x93, 0x0e, 0xf8, 0x00, 0xe7, 0x64, 0xb5, 0x58, 0x59, 0x27, 0x97, 0x7e, 0x2a, 0xd2, 0xd8, 0xb8, 0x2e, 0x7c, 0xb6, 0x48, 0xaf, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_115 = { .name = "ecdsa_brainpoolp224r1_sha224_115", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_115_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_115_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_115_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 116 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 116 for ECDSA, tcId is 117 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_116_pubkey[] = { 0x8e, 0x66, 0x1a, 0x06, 0xad, 0x55, 0xb5, 0x22, 0x78, 0x01, 0xea, 0x43, 0x09, 0xa7, 0x2b, 0x9c, 0xd9, 0x49, 0x73, 0xbc, 0x87, 0x3c, 0x04, 0x05, 0xe1, 0x24, 0x7d, 0x1e, 0x64, 0x89, 0x8b, 0x82, 0x2c, 0x36, 0x3c, 0xac, 0x88, 0x21, 0x30, 0x2d, 0xe3, 0x8a, 0x91, 0x42, 0x68, 0xaa, 0xa6, 0x7d, 0xb2, 0x56, 0x18, 0x78, 0xf0, 0xf9, 0x0a, 0x02, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_116_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_116_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x03, 0x3e, 0xf5, 0x01, 0x0b, 0xec, 0xed, 0x04, 0xc4, 0x92, 0x88, 0x68, 0x51, 0x3e, 0xd1, 0x87, 0x8c, 0xe6, 0x77, 0xa6, 0xed, 0x81, 0x0e, 0x9b, 0x99, 0xdd, 0x97, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_116 = { .name = "ecdsa_brainpoolp224r1_sha224_116", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_116_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_116_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_116_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 117 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 117 for ECDSA, tcId is 118 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_117_pubkey[] = { 0xb3, 0xd2, 0xb9, 0x3f, 0x14, 0x88, 0x65, 0x72, 0x62, 0x14, 0x0f, 0x96, 0xc1, 0x08, 0xaa, 0x04, 0x85, 0x93, 0x9b, 0xd9, 0x94, 0x40, 0x24, 0x0a, 0x7a, 0x7d, 0x54, 0xe3, 0x88, 0x96, 0x81, 0x74, 0xb0, 0x61, 0x85, 0x37, 0x39, 0xf8, 0xb0, 0x47, 0x1c, 0x76, 0x12, 0x65, 0x39, 0xdc, 0x57, 0xcc, 0x6d, 0x7c, 0x1f, 0x53, 0x9f, 0x68, 0x66, 0x74, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_117_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_117_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x06, 0x7d, 0xea, 0x02, 0x17, 0xd9, 0xda, 0x09, 0x89, 0x25, 0x10, 0xd0, 0xa2, 0x7d, 0xa3, 0x0f, 0x19, 0xcc, 0xef, 0x4d, 0xdb, 0x02, 0x1d, 0x37, 0x33, 0xbb, 0x2f, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_117 = { .name = "ecdsa_brainpoolp224r1_sha224_117", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_117_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_117_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_117_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 118 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 118 for ECDSA, tcId is 119 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_118_pubkey[] = { 0xba, 0x83, 0x0d, 0xbf, 0x83, 0x07, 0x5c, 0xd1, 0x82, 0xbc, 0x93, 0x22, 0xc1, 0xf6, 0x29, 0x9a, 0x4c, 0xe3, 0xcf, 0x4d, 0xdd, 0xe0, 0xe6, 0xfc, 0xee, 0x50, 0xf0, 0xd6, 0x2b, 0x15, 0x3f, 0x6f, 0x37, 0x7a, 0x88, 0x80, 0x9c, 0x9d, 0xd5, 0x0d, 0x8d, 0x61, 0xeb, 0x67, 0x94, 0x51, 0x44, 0x48, 0x16, 0x57, 0x86, 0xa7, 0xc6, 0x55, 0x8d, 0xcc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_118_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_118_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x45, 0x84, 0x7e, 0x02, 0xfd, 0x01, 0xa3, 0xcc, 0x9e, 0x06, 0x3f, 0x96, 0x1f, 0xb9, 0x20, 0xab, 0x32, 0x71, 0xec, 0x09, 0x99, 0x6f, 0x75, 0xbc, 0xa7, 0xfe, 0x6d, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_118 = { .name = "ecdsa_brainpoolp224r1_sha224_118", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_118_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_118_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_118_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 119 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 119 for ECDSA, tcId is 120 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_119_pubkey[] = { 0x77, 0xf4, 0x02, 0x22, 0xe4, 0xa7, 0x9a, 0x0f, 0xa7, 0xe5, 0x10, 0x88, 0x7e, 0x69, 0xeb, 0xa3, 0x1f, 0x6d, 0xd7, 0x06, 0x71, 0x21, 0xda, 0xfe, 0x73, 0x9b, 0xbe, 0x13, 0xd0, 0xff, 0xab, 0x72, 0x22, 0xcf, 0x6d, 0x82, 0x7c, 0x51, 0xeb, 0x53, 0xab, 0xac, 0x50, 0x6b, 0xc0, 0xa5, 0xd7, 0xc1, 0xa5, 0xa7, 0xe1, 0x68, 0x3d, 0x49, 0xe4, 0x3e, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_119_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_119_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x0b, 0x4c, 0xbe, 0x86, 0x6d, 0x19, 0x20, 0x63, 0x41, 0x38, 0xc8, 0x79, 0x8f, 0xcc, 0x41, 0x47, 0x94, 0x47, 0xe5, 0xae, 0x76, 0x07, 0x94, 0xe1, 0xe5, 0x79, 0x79, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_119 = { .name = "ecdsa_brainpoolp224r1_sha224_119", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_119_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_119_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_119_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 120 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 120 for ECDSA, tcId is 121 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_120_pubkey[] = { 0x59, 0x7b, 0x5a, 0x3c, 0x10, 0x6b, 0x8c, 0x4e, 0x9a, 0x7e, 0x7a, 0x51, 0x7c, 0xd7, 0x40, 0xe7, 0x76, 0x67, 0xc8, 0xa2, 0xd0, 0x6c, 0x51, 0x0e, 0x5e, 0x3b, 0x72, 0x8d, 0x9c, 0xc2, 0x49, 0xe8, 0x27, 0xf5, 0xff, 0xf9, 0x02, 0x12, 0x2e, 0xb2, 0x6b, 0xad, 0xc4, 0xa7, 0xda, 0x65, 0x55, 0xb4, 0x89, 0xba, 0x98, 0x98, 0x2d, 0x38, 0x81, 0x25, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_120_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_120_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x20, 0xd7, 0x2a, 0xe3, 0x39, 0xe5, 0x62, 0x01, 0x70, 0xc9, 0x0a, 0x4c, 0xe5, 0xbc, 0xa0, 0x8d, 0xed, 0x17, 0x00, 0xb2, 0xb6, 0xc8, 0x0e, 0xc6, 0x12, 0xc8, 0xd5, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_120 = { .name = "ecdsa_brainpoolp224r1_sha224_120", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_120_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_120_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_120_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 121 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 121 for ECDSA, tcId is 122 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_121_pubkey[] = { 0x0f, 0x24, 0x53, 0xe7, 0x58, 0x5c, 0xb1, 0x39, 0x2f, 0xf4, 0xfa, 0x11, 0x86, 0x9f, 0x8c, 0x10, 0xb2, 0xf9, 0xcf, 0x4f, 0x2a, 0x18, 0xb8, 0x66, 0xe8, 0xf3, 0x7c, 0x2b, 0xd1, 0x56, 0x6e, 0xf0, 0x49, 0x28, 0x79, 0x75, 0x79, 0xd4, 0x0f, 0x33, 0x10, 0xeb, 0xaf, 0x47, 0x7a, 0x4e, 0x78, 0xa2, 0x35, 0x86, 0x19, 0x28, 0x32, 0x86, 0x34, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_121_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_121_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x9d, 0x23, 0x5a, 0xa9, 0xe9, 0xf9, 0xc6, 0x45, 0x3e, 0x39, 0xa7, 0x86, 0x13, 0x83, 0x6e, 0xa1, 0x4c, 0x2d, 0xdf, 0x31, 0xc9, 0x1b, 0x74, 0x7a, 0xef, 0x01, 0x0a, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_121 = { .name = "ecdsa_brainpoolp224r1_sha224_121", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_121_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_121_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_121_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 122 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 122 for ECDSA, tcId is 123 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_122_pubkey[] = { 0x10, 0xcb, 0x3d, 0xbc, 0xe4, 0xda, 0x51, 0x8e, 0x04, 0xeb, 0x12, 0x5c, 0xf3, 0xb4, 0x4b, 0xef, 0x04, 0x51, 0xba, 0xd3, 0xe7, 0xcb, 0xba, 0xd5, 0x32, 0x8b, 0x85, 0xbb, 0x35, 0x86, 0x51, 0xb4, 0x78, 0xbc, 0xf2, 0x00, 0x68, 0x4f, 0xd3, 0x10, 0xe6, 0xd1, 0x4a, 0xcd, 0x23, 0xdc, 0x2a, 0x76, 0x04, 0x75, 0xdf, 0x0f, 0x5b, 0x8a, 0x75, 0x8c, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_122_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_122_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x9c, 0xa7, 0x98, 0x7f, 0x33, 0x67, 0xa9, 0x51, 0x6e, 0xca, 0x57, 0x85, 0x50, 0x98, 0xd4, 0xaa, 0xaf, 0x28, 0x94, 0x38, 0xd9, 0xad, 0x7b, 0x39, 0xdc, 0xc8, 0x11, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_122 = { .name = "ecdsa_brainpoolp224r1_sha224_122", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_122_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_122_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_122_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 123 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 123 for ECDSA, tcId is 124 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_123_pubkey[] = { 0x2c, 0x27, 0x73, 0x2a, 0xaa, 0xa3, 0xf8, 0xb1, 0x66, 0x64, 0xa4, 0x8a, 0x1d, 0xd0, 0x6f, 0xc0, 0xfe, 0x40, 0xf6, 0x57, 0x42, 0x75, 0x1e, 0x5c, 0x04, 0xb7, 0xef, 0xf5, 0x07, 0x80, 0x4b, 0x2d, 0xbe, 0xe7, 0x9f, 0xfe, 0x56, 0xdc, 0x4f, 0x4a, 0x60, 0x62, 0xce, 0xd6, 0xf3, 0x75, 0xb8, 0x0b, 0x5a, 0xd2, 0xcf, 0x3a, 0x29, 0x21, 0xb3, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_123_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_123_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x72, 0x95, 0xbc, 0x38, 0xb7, 0x6b, 0xcc, 0xd7, 0x63, 0x5d, 0x65, 0x61, 0xd1, 0xf0, 0x53, 0xdd, 0x9b, 0x07, 0x94, 0x19, 0x24, 0x9f, 0x94, 0x36, 0x8c, 0x8d, 0x31, 0x33, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_123 = { .name = "ecdsa_brainpoolp224r1_sha224_123", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_123_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_123_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_123_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 124 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 124 for ECDSA, tcId is 125 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_124_pubkey[] = { 0x8c, 0xed, 0x55, 0x68, 0x77, 0xee, 0x15, 0xaf, 0x31, 0x4a, 0xed, 0x5d, 0xfc, 0x43, 0xa0, 0x0f, 0xbb, 0x76, 0x26, 0xfb, 0xdc, 0x7b, 0x81, 0xff, 0x7d, 0xbe, 0xa2, 0xf8, 0x98, 0xf5, 0xe2, 0x6f, 0x7f, 0xc3, 0x27, 0x6d, 0xa2, 0xa8, 0xe8, 0x69, 0xb0, 0xaf, 0xbc, 0x41, 0xef, 0x3b, 0x40, 0x32, 0x60, 0x80, 0xaa, 0x85, 0xce, 0x62, 0xc2, 0xab, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_124_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_124_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x93, 0x8f, 0x2d, 0xb2, 0xb7, 0x20, 0x61, 0xab, 0xd7, 0xeb, 0x6e, 0x5c, 0x8f, 0xe6, 0x85, 0x39, 0x1e, 0x96, 0x6e, 0xc0, 0xc7, 0x69, 0xd0, 0xc5, 0x38, 0xe0, 0x67, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_124 = { .name = "ecdsa_brainpoolp224r1_sha224_124", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_124_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_124_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_124_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 125 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 125 for ECDSA, tcId is 126 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_125_pubkey[] = { 0x42, 0xb1, 0x9b, 0x22, 0x50, 0x6c, 0x4f, 0xd8, 0x9f, 0xa2, 0x8c, 0x59, 0x09, 0xd9, 0x7f, 0x8f, 0xfe, 0xbd, 0xc8, 0x28, 0x04, 0xdc, 0xc7, 0xbf, 0x6a, 0x57, 0x0a, 0xe2, 0x1a, 0x97, 0x4e, 0xe0, 0x8b, 0x48, 0x4f, 0xa0, 0x5e, 0x1f, 0xbb, 0x89, 0xc4, 0x8c, 0x50, 0x75, 0x4b, 0xa1, 0xe4, 0x0a, 0x65, 0x8a, 0x5c, 0xed, 0x40, 0x9c, 0x63, 0x61, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_125_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_125_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x7f, 0x90, 0x7c, 0x8e, 0x32, 0xe6, 0x0e, 0x2b, 0xa4, 0x03, 0x3e, 0xe7, 0xd6, 0x5f, 0x3f, 0xe8, 0xfd, 0x23, 0x71, 0x9c, 0x7a, 0x9c, 0x6f, 0x5e, 0x52, 0xf1, 0x8c, 0x47, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_125 = { .name = "ecdsa_brainpoolp224r1_sha224_125", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_125_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_125_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_125_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 126 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 126 for ECDSA, tcId is 127 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_126_pubkey[] = { 0x20, 0x95, 0xe1, 0x21, 0x16, 0xce, 0xbd, 0xd4, 0xe8, 0xbc, 0x1c, 0xc1, 0x84, 0xb5, 0x38, 0xb1, 0x51, 0x5f, 0x78, 0x9e, 0x3b, 0xe4, 0xb0, 0x3a, 0x41, 0x83, 0xfa, 0xe5, 0xd0, 0x92, 0x6e, 0x44, 0x68, 0x75, 0xab, 0xdc, 0xd1, 0x2c, 0x82, 0x39, 0xe6, 0x07, 0x96, 0x1c, 0xad, 0xd0, 0x0a, 0x2e, 0x89, 0x9d, 0x82, 0x1d, 0xb1, 0x1d, 0x56, 0x79, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_126_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_126_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x34, 0xc3, 0x97, 0x8c, 0x3a, 0x1d, 0xac, 0x92, 0x1f, 0x62, 0x35, 0xc8, 0x2a, 0x02, 0xed, 0xb9, 0x34, 0x22, 0x85, 0x46, 0x94, 0x26, 0xbb, 0x10, 0xf8, 0x28, 0x97, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_126 = { .name = "ecdsa_brainpoolp224r1_sha224_126", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_126_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_126_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_126_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 127 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 127 for ECDSA, tcId is 128 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_127_pubkey[] = { 0x58, 0xf8, 0x2e, 0xb2, 0xca, 0x6e, 0x34, 0x74, 0xa9, 0x0e, 0x29, 0xac, 0x56, 0xdc, 0xb6, 0x3d, 0x88, 0xe6, 0x69, 0xe0, 0xa4, 0x02, 0x04, 0xe6, 0x20, 0x2a, 0xf7, 0xc5, 0xa0, 0xe8, 0x5e, 0x40, 0x39, 0xf3, 0x43, 0x25, 0x5b, 0x4f, 0xe4, 0xbd, 0xc1, 0x19, 0x1a, 0x78, 0x45, 0xbd, 0xd7, 0xeb, 0x90, 0x8e, 0xcd, 0x87, 0x79, 0xa2, 0x79, 0x63, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_127_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_127_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x97, 0x01, 0xd6, 0x52, 0x3d, 0x3d, 0x3f, 0x5b, 0x8a, 0xc8, 0x40, 0x26, 0x80, 0xb3, 0xca, 0xb8, 0x96, 0x6e, 0x26, 0x51, 0xcf, 0xc1, 0x73, 0x9f, 0xcd, 0x3c, 0x07, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_127 = { .name = "ecdsa_brainpoolp224r1_sha224_127", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_127_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_127_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_127_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 128 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 128 for ECDSA, tcId is 129 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_128_pubkey[] = { 0x71, 0xf2, 0xc4, 0xa7, 0xc3, 0xf7, 0x13, 0x11, 0xa7, 0x93, 0x45, 0x8f, 0xf1, 0x22, 0x62, 0xa8, 0x63, 0x51, 0x8f, 0xb3, 0x0d, 0xbb, 0x7a, 0x80, 0x70, 0x10, 0x30, 0xb8, 0xb6, 0xb0, 0x84, 0x28, 0xfa, 0xbd, 0xb6, 0x9c, 0x8a, 0x8e, 0x9e, 0x32, 0x7d, 0xae, 0xd0, 0x79, 0x5f, 0xb8, 0x4e, 0x0d, 0x88, 0x17, 0x08, 0x60, 0x22, 0xd3, 0xb2, 0x3b, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_128_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_128_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x56, 0x42, 0x77, 0xfa, 0x54, 0x37, 0x18, 0x30, 0xeb, 0x78, 0x50, 0x27, 0x8b, 0x96, 0x99, 0xd8, 0x5b, 0xc5, 0x90, 0x58, 0x31, 0xa4, 0x2a, 0x9b, 0xf4, 0xd0, 0x7a, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_128 = { .name = "ecdsa_brainpoolp224r1_sha224_128", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_128_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_128_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_128_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 129 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 129 for ECDSA, tcId is 130 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_129_pubkey[] = { 0x3c, 0xfc, 0xf6, 0x4e, 0xec, 0xe9, 0x94, 0xc3, 0x5c, 0x56, 0xe9, 0x15, 0xe4, 0xed, 0x18, 0x83, 0xba, 0x6e, 0xc3, 0x4f, 0xe3, 0x96, 0xc1, 0x1a, 0xcd, 0x8f, 0x47, 0xd2, 0x63, 0xcd, 0xfb, 0xaa, 0x34, 0x40, 0x11, 0x00, 0xb5, 0xb1, 0x0a, 0xf7, 0x71, 0xbb, 0x46, 0xc0, 0xd5, 0x34, 0x46, 0xf7, 0xaa, 0x84, 0x79, 0x56, 0xc9, 0x36, 0x34, 0x94, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_129_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_129_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x77, 0x94, 0xfb, 0xde, 0xe6, 0x38, 0xf6, 0x57, 0xac, 0x1e, 0x4c, 0x65, 0x28, 0x4c, 0x14, 0x4b, 0x3e, 0xfa, 0x7b, 0xf4, 0x10, 0x9e, 0x6c, 0xca, 0x60, 0x5c, 0x4f, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_129 = { .name = "ecdsa_brainpoolp224r1_sha224_129", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_129_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_129_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_129_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 130 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 130 for ECDSA, tcId is 131 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_130_pubkey[] = { 0x4c, 0x40, 0x4d, 0xec, 0xbc, 0x06, 0x97, 0xb2, 0x07, 0xfa, 0x08, 0x98, 0x2e, 0xf0, 0xfe, 0xdb, 0x00, 0x1e, 0xeb, 0x43, 0xf3, 0x74, 0x04, 0xda, 0xb9, 0x7a, 0x9a, 0x77, 0x47, 0x19, 0x1b, 0xc2, 0x40, 0xdf, 0xd4, 0x40, 0x27, 0x4e, 0x06, 0x95, 0x56, 0x11, 0xf9, 0x92, 0x3f, 0xad, 0x69, 0x49, 0xb2, 0xcc, 0x15, 0x7a, 0x18, 0x5c, 0x82, 0x29, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_130_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_130_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0xb5, 0x20, 0x0d, 0xa7, 0xa4, 0x58, 0x37, 0xf5, 0xb7, 0x1c, 0x47, 0xe1, 0xb9, 0x4c, 0x78, 0x62, 0xa1, 0xe4, 0xbe, 0xcb, 0xa3, 0x0a, 0x90, 0x8a, 0xda, 0x21, 0x94, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_130 = { .name = "ecdsa_brainpoolp224r1_sha224_130", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_130_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_130_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_130_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 131 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 131 for ECDSA, tcId is 132 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_131_pubkey[] = { 0x7b, 0xe4, 0xb0, 0xea, 0x0b, 0x15, 0xb9, 0x6f, 0x91, 0x31, 0x2c, 0x15, 0xc8, 0x16, 0x29, 0xe4, 0x0c, 0x44, 0x18, 0xf7, 0x0b, 0x86, 0xc5, 0xbc, 0xdc, 0x25, 0x8f, 0xd9, 0x79, 0xcb, 0xef, 0x8e, 0xa2, 0xa7, 0x7c, 0xa0, 0x92, 0xdb, 0x0e, 0xb9, 0x54, 0xa9, 0xe3, 0x3e, 0x82, 0xb9, 0xc5, 0xf1, 0x10, 0xc8, 0xc9, 0x90, 0xb9, 0x23, 0x5a, 0x57, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_131_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_131_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x65, 0x2b, 0x78, 0x71, 0x6e, 0xd7, 0x99, 0xae, 0xc6, 0xba, 0xca, 0xc3, 0xa3, 0xe0, 0xa7, 0xbb, 0x36, 0x0f, 0x28, 0x32, 0x49, 0x3f, 0x28, 0x6d, 0x19, 0x1a, 0x62, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_131 = { .name = "ecdsa_brainpoolp224r1_sha224_131", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_131_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_131_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_131_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 132 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 132 for ECDSA, tcId is 133 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_132_pubkey[] = { 0x64, 0xa6, 0x4c, 0xff, 0xa5, 0x40, 0x66, 0x49, 0x92, 0x64, 0x99, 0x1e, 0x47, 0xa0, 0xf1, 0x4b, 0xca, 0x63, 0x19, 0xa1, 0xc2, 0x7e, 0x15, 0x08, 0xe2, 0x01, 0x6b, 0x56, 0xbd, 0xa7, 0xc1, 0x7a, 0x04, 0xd9, 0xcb, 0x88, 0xea, 0xdb, 0x72, 0x96, 0xcf, 0x87, 0xdf, 0xbf, 0xad, 0xfe, 0x65, 0x05, 0x68, 0x37, 0xa7, 0x97, 0xd6, 0x69, 0x97, 0xdd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_132_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_132_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x97, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_132 = { .name = "ecdsa_brainpoolp224r1_sha224_132", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_132_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_132_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_132_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 133 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 133 for ECDSA, tcId is 134 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_133_pubkey[] = { 0x3d, 0x4c, 0x4e, 0x3c, 0x5b, 0xa7, 0xa5, 0x33, 0xc8, 0xa3, 0x38, 0x6d, 0x6f, 0xf7, 0x7a, 0x81, 0x35, 0x13, 0x46, 0xe1, 0x89, 0x4b, 0x25, 0x60, 0xb4, 0x06, 0xa6, 0x3e, 0xa3, 0x49, 0x77, 0x59, 0x46, 0x79, 0x9e, 0xeb, 0x27, 0x49, 0x26, 0xb4, 0xd9, 0x57, 0x32, 0x8f, 0x6c, 0x7d, 0x50, 0xf6, 0x76, 0x02, 0x91, 0xac, 0xda, 0xeb, 0x11, 0x4f, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_133_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_133_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0xab, 0xa8, 0xd8, 0x9c, 0x2c, 0x94, 0xba, 0x58, 0xe7, 0x0d, 0xb7, 0x86, 0xa6, 0x18, 0x1d, 0xc0, 0xe7, 0x1d, 0x16, 0xf3, 0xf4, 0x3d, 0x96, 0x00, 0xfc, 0x4c, 0x8f, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_133 = { .name = "ecdsa_brainpoolp224r1_sha224_133", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_133_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_133_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_133_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 134 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 134 for ECDSA, tcId is 135 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_134_pubkey[] = { 0x4d, 0xb8, 0xe8, 0xac, 0x43, 0xf2, 0x2d, 0xf7, 0x5c, 0x9c, 0x09, 0xfe, 0x19, 0x3b, 0x9c, 0xd8, 0x3d, 0x5c, 0x9b, 0x73, 0xf3, 0x7d, 0x14, 0x94, 0x76, 0x17, 0x24, 0xb0, 0xa7, 0x60, 0x82, 0xc3, 0x5d, 0xa8, 0x62, 0xa1, 0xe2, 0xe8, 0x62, 0x6f, 0xfa, 0x94, 0xed, 0x18, 0xfc, 0xb1, 0xd8, 0x97, 0xec, 0x7a, 0xb5, 0x2c, 0x32, 0x25, 0x53, 0xff, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_134_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_134_sig[] = { 0x7a, 0xf2, 0x95, 0xe6, 0xe4, 0x78, 0x72, 0x52, 0xf3, 0x4c, 0x52, 0x7a, 0xf5, 0x62, 0xca, 0x27, 0x21, 0x4a, 0x66, 0xf6, 0xd6, 0xdb, 0x4f, 0xd2, 0xc1, 0x12, 0xb5, 0x64, 0xb1, 0xd0, 0x10, 0xf7, 0x40, 0x62, 0xee, 0xaa, 0xc0, 0xce, 0xcb, 0x2c, 0x3c, 0x2c, 0x4d, 0x28, 0x8a, 0x57, 0x6b, 0xf6, 0xf0, 0xa0, 0x03, 0x47, 0xc6, 0xa5, 0xb5, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_134 = { .name = "ecdsa_brainpoolp224r1_sha224_134", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_134_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_134_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_134_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 135 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 135 for ECDSA, tcId is 136 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_135_pubkey[] = { 0x4d, 0xb8, 0xe8, 0xac, 0x43, 0xf2, 0x2d, 0xf7, 0x5c, 0x9c, 0x09, 0xfe, 0x19, 0x3b, 0x9c, 0xd8, 0x3d, 0x5c, 0x9b, 0x73, 0xf3, 0x7d, 0x14, 0x94, 0x76, 0x17, 0x24, 0xb0, 0x30, 0x60, 0xb1, 0xe6, 0xc8, 0x9b, 0x03, 0xe4, 0x47, 0x2f, 0xcd, 0xb5, 0x7b, 0x3c, 0xea, 0x6e, 0xb3, 0xed, 0x2e, 0xbf, 0xab, 0x5f, 0xd4, 0xc9, 0x4c, 0xa3, 0x6d, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_135_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_135_sig[] = { 0x7a, 0xf2, 0x95, 0xe6, 0xe4, 0x78, 0x72, 0x52, 0xf3, 0x4c, 0x52, 0x7a, 0xf5, 0x62, 0xca, 0x27, 0x21, 0x4a, 0x66, 0xf6, 0xd6, 0xdb, 0x4f, 0xd2, 0xc1, 0x12, 0xb5, 0x64, 0xb1, 0xd0, 0x10, 0xf7, 0x40, 0x62, 0xee, 0xaa, 0xc0, 0xce, 0xcb, 0x2c, 0x3c, 0x2c, 0x4d, 0x28, 0x8a, 0x57, 0x6b, 0xf6, 0xf0, 0xa0, 0x03, 0x47, 0xc6, 0xa5, 0xb5, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_135 = { .name = "ecdsa_brainpoolp224r1_sha224_135", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_135_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_135_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_135_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 136 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 136 for ECDSA, tcId is 137 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_136_pubkey[] = { 0x2b, 0x92, 0x26, 0x82, 0x08, 0xd5, 0x22, 0x45, 0x0c, 0x42, 0xf3, 0xfc, 0xbd, 0xa4, 0x09, 0xc3, 0xac, 0xe2, 0xa5, 0xf8, 0x57, 0xea, 0x10, 0x61, 0x2c, 0x60, 0x93, 0xf8, 0x31, 0x5e, 0xb2, 0xd4, 0x48, 0x13, 0x4e, 0x71, 0x6b, 0x03, 0x20, 0x78, 0xb6, 0x83, 0x01, 0x62, 0x2e, 0x3c, 0x21, 0x86, 0xab, 0x58, 0x3d, 0x97, 0x6e, 0x76, 0x9f, 0xeb, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_136_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_136_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x2b, 0x26, 0xa4, 0x22, 0x07, 0xa7, 0x14, 0x81, 0x3b, 0x9e, 0x70, 0x07, 0x7d, 0xf6, 0x98, 0xb8, 0x29, 0xd1, 0x58, 0xdb, 0xe2, 0xc6, 0x25, 0xba, 0x54, 0x54, 0xb7, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_136 = { .name = "ecdsa_brainpoolp224r1_sha224_136", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_136_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_136_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_136_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 137 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 137 for ECDSA, tcId is 138 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_137_pubkey[] = { 0x4d, 0x4b, 0xd5, 0x69, 0x3d, 0x86, 0xdd, 0x9a, 0x60, 0x16, 0xba, 0x80, 0x6d, 0x80, 0x31, 0xf9, 0x4d, 0xc8, 0xe2, 0xd3, 0x3c, 0x6f, 0x58, 0x71, 0xa0, 0x0b, 0x64, 0x73, 0x2a, 0x46, 0x62, 0xf2, 0x95, 0x24, 0xec, 0xe7, 0x54, 0x82, 0x8b, 0x9d, 0x82, 0x9c, 0x0a, 0x07, 0x24, 0xd9, 0xbd, 0x9d, 0x28, 0x8d, 0x21, 0xf8, 0x7e, 0x3f, 0xb1, 0xfa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_137_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_137_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_137 = { .name = "ecdsa_brainpoolp224r1_sha224_137", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_137_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_137_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_137_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 138 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 138 for ECDSA, tcId is 139 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_138_pubkey[] = { 0xbe, 0x0e, 0xfb, 0x48, 0x41, 0xdf, 0x37, 0xab, 0xcd, 0xcf, 0x3f, 0x28, 0xdd, 0xb0, 0xd5, 0x75, 0x1a, 0x92, 0xa0, 0xfe, 0x7a, 0x3e, 0x88, 0xd1, 0xab, 0x02, 0x83, 0x2c, 0xbb, 0x53, 0xcc, 0xd6, 0x6b, 0x9c, 0x0e, 0x42, 0x43, 0x80, 0x69, 0x3d, 0x64, 0x16, 0xfc, 0x2e, 0x1a, 0x3c, 0x79, 0x3a, 0x35, 0x5f, 0x7d, 0x05, 0xf9, 0x63, 0xf4, 0x35, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_138_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_138_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0xb8, 0xee, 0xbf, 0x6d, 0x45, 0x5e, 0x57, 0xe0, 0xb6, 0x5d, 0xe0, 0x20, 0x1b, 0xd7, 0xb3, 0x15, 0x45, 0x81, 0x33, 0xae, 0x5e, 0x2c, 0xa1, 0xb0, 0xd7, 0x21, 0xec, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_138 = { .name = "ecdsa_brainpoolp224r1_sha224_138", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_138_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_138_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_138_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 139 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 139 for ECDSA, tcId is 140 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_139_pubkey[] = { 0xbc, 0x02, 0x72, 0xe3, 0x69, 0x3a, 0x05, 0xe7, 0x88, 0x39, 0x2c, 0x88, 0x0f, 0x9d, 0xe9, 0x5c, 0x72, 0xe2, 0x93, 0xfd, 0x1b, 0x13, 0xf1, 0xe2, 0x2a, 0x99, 0x07, 0xa3, 0x69, 0x95, 0x06, 0xe4, 0x59, 0x0f, 0xa9, 0x0c, 0x62, 0x57, 0xb1, 0xc4, 0xe3, 0x63, 0x2c, 0xcc, 0x48, 0x6c, 0xb8, 0x33, 0xcb, 0xbc, 0xbf, 0x21, 0xb4, 0xa2, 0x60, 0x41, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_139_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_139_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0xac, 0x9a, 0x90, 0x88, 0x1e, 0x9c, 0x52, 0x04, 0xee, 0x79, 0xc0, 0x1d, 0xf7, 0xda, 0x62, 0xe0, 0xa7, 0x45, 0x63, 0x6f, 0x8b, 0x18, 0x96, 0xe9, 0x51, 0x52, 0xdc, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_139 = { .name = "ecdsa_brainpoolp224r1_sha224_139", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_139_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_139_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_139_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 140 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 140 for ECDSA, tcId is 141 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_140_pubkey[] = { 0xa8, 0x3b, 0xc3, 0xe9, 0x04, 0x3c, 0xb9, 0x38, 0xda, 0xe1, 0x67, 0xbb, 0xea, 0x2f, 0x7d, 0x62, 0x34, 0x86, 0xf4, 0x03, 0x8d, 0xf4, 0x53, 0x12, 0xe8, 0x46, 0x7b, 0xda, 0x73, 0x63, 0xfa, 0x58, 0xaf, 0x36, 0x3a, 0x71, 0x83, 0x5d, 0xa0, 0x94, 0x13, 0xc8, 0x82, 0x27, 0x84, 0x9c, 0x6f, 0x0f, 0xfe, 0x8e, 0x4e, 0x40, 0xaf, 0xf5, 0x10, 0x23, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_140_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_140_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x2b, 0x26, 0xa4, 0x22, 0x07, 0xa7, 0x14, 0x81, 0x3b, 0x9e, 0x70, 0x07, 0x7d, 0xf6, 0x98, 0xb8, 0x29, 0xd1, 0x58, 0xdb, 0xe2, 0xc6, 0x25, 0xba, 0x54, 0x54, 0xb7, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_140 = { .name = "ecdsa_brainpoolp224r1_sha224_140", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_140_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_140_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_140_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 141 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 141 for ECDSA, tcId is 142 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_141_pubkey[] = { 0x3b, 0xd0, 0x8a, 0x1c, 0x46, 0x63, 0x85, 0x64, 0x52, 0x1d, 0xed, 0x3f, 0xa7, 0x7c, 0xe9, 0xc9, 0x55, 0x38, 0xe4, 0x97, 0x03, 0xeb, 0xb9, 0xf8, 0xd3, 0x6b, 0xe6, 0xf7, 0x27, 0x6f, 0xfa, 0x12, 0x80, 0x51, 0x67, 0x1f, 0x7e, 0x4c, 0x63, 0xe9, 0xb8, 0x13, 0x2d, 0xe9, 0xf3, 0x38, 0x9c, 0xc5, 0x25, 0xd7, 0x26, 0x82, 0xb6, 0x01, 0x9e, 0xc3, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_141_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_141_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_141 = { .name = "ecdsa_brainpoolp224r1_sha224_141", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_141_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_141_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_141_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 142 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 142 for ECDSA, tcId is 143 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_142_pubkey[] = { 0xa3, 0xdb, 0x2b, 0x3e, 0x2c, 0x62, 0xc4, 0x2b, 0xf4, 0xfb, 0x0e, 0x11, 0xc2, 0x90, 0x8f, 0xd1, 0x7f, 0xe8, 0x3d, 0xa3, 0xac, 0x9c, 0x09, 0x80, 0x23, 0x4e, 0xfd, 0xbd, 0x3c, 0xbe, 0xec, 0x40, 0x27, 0xbd, 0x7c, 0x10, 0x9b, 0x27, 0xae, 0x2f, 0x7c, 0xf0, 0x4d, 0xc6, 0x5e, 0xea, 0xf1, 0x3f, 0xaa, 0x22, 0x4d, 0x32, 0xa2, 0x0f, 0x31, 0x63, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_142_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_142_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x58, 0xe3, 0x75, 0x18, 0xc6, 0xe4, 0x7a, 0x84, 0xde, 0x10, 0xcc, 0xb2, 0x54, 0xc0, 0x36, 0x93, 0x27, 0x11, 0x45, 0xf1, 0x3e, 0x00, 0xa9, 0x12, 0x37, 0xa4, 0xa5, 0x47, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_142 = { .name = "ecdsa_brainpoolp224r1_sha224_142", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_142_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_142_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_142_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 143 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 143 for ECDSA, tcId is 144 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_143_pubkey[] = { 0x60, 0x6c, 0xe6, 0xf8, 0xc7, 0x7a, 0xc1, 0x7d, 0x5b, 0x75, 0x15, 0xd5, 0x85, 0x1e, 0xed, 0x15, 0x5e, 0xa1, 0x20, 0xcd, 0x07, 0xca, 0x42, 0x77, 0xb3, 0x5b, 0x8d, 0x36, 0x5f, 0x71, 0x6b, 0x62, 0xae, 0xe9, 0xa8, 0x1a, 0x01, 0x1b, 0xd1, 0xd2, 0xbc, 0xea, 0xf3, 0x7d, 0x5f, 0x3a, 0x61, 0xe5, 0xf7, 0x30, 0x7e, 0x0b, 0xb9, 0xc8, 0x92, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_143_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_143_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_143 = { .name = "ecdsa_brainpoolp224r1_sha224_143", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_143_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_143_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_143_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 144 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 144 for ECDSA, tcId is 145 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_144_pubkey[] = { 0x2a, 0xff, 0xbb, 0x82, 0x69, 0xcb, 0x78, 0x83, 0xda, 0xda, 0x33, 0x50, 0x39, 0x45, 0x79, 0x91, 0x2e, 0xf7, 0x56, 0xa8, 0xdf, 0x6b, 0xdd, 0x7d, 0xa3, 0x5d, 0x39, 0x8e, 0x90, 0x21, 0x3d, 0x93, 0x82, 0xb3, 0xd5, 0xfb, 0x9d, 0xde, 0x82, 0x72, 0x4d, 0x38, 0xe5, 0x67, 0x8c, 0x17, 0xe6, 0x10, 0xf4, 0x17, 0xcf, 0xe6, 0xf7, 0xef, 0xcd, 0x91, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_144_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_144_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0xb8, 0xee, 0xbf, 0x6d, 0x45, 0x5e, 0x57, 0xe0, 0xb6, 0x5d, 0xe0, 0x20, 0x1b, 0xd7, 0xb3, 0x15, 0x45, 0x81, 0x33, 0xae, 0x5e, 0x2c, 0xa1, 0xb0, 0xd7, 0x21, 0xec, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_144 = { .name = "ecdsa_brainpoolp224r1_sha224_144", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_144_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_144_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_144_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 145 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 145 for ECDSA, tcId is 146 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_145_pubkey[] = { 0x19, 0xcd, 0xd4, 0x4e, 0x2a, 0x33, 0x11, 0x3a, 0x88, 0x45, 0x58, 0xe7, 0xee, 0x0e, 0xfb, 0x41, 0xba, 0xfe, 0x1a, 0xdc, 0xdc, 0xf9, 0x5d, 0xf6, 0xde, 0x6a, 0x25, 0x11, 0x5f, 0x42, 0x8e, 0xe9, 0x98, 0xa3, 0x48, 0x56, 0xf2, 0xac, 0x3f, 0x6f, 0x39, 0xc7, 0x23, 0x7b, 0xf1, 0xf9, 0xde, 0x23, 0x21, 0x75, 0xd7, 0x47, 0xb5, 0xcd, 0x97, 0xfe, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_145_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_145_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0xac, 0x9a, 0x90, 0x88, 0x1e, 0x9c, 0x52, 0x04, 0xee, 0x79, 0xc0, 0x1d, 0xf7, 0xda, 0x62, 0xe0, 0xa7, 0x45, 0x63, 0x6f, 0x8b, 0x18, 0x96, 0xe9, 0x51, 0x52, 0xdc, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_145 = { .name = "ecdsa_brainpoolp224r1_sha224_145", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_145_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_145_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_145_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 146 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 146 for ECDSA, tcId is 147 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_146_pubkey[] = { 0xb7, 0x2f, 0x7c, 0x1a, 0x3c, 0x85, 0x62, 0xcb, 0x8d, 0xe9, 0x92, 0x5e, 0xec, 0x04, 0x1c, 0xcc, 0x26, 0x36, 0x49, 0xc6, 0x52, 0x47, 0x62, 0xb9, 0xf4, 0x58, 0x5e, 0xe3, 0x9d, 0xf7, 0x56, 0xda, 0x08, 0xd1, 0x27, 0x4a, 0xd7, 0x2d, 0x8c, 0xac, 0x29, 0x3a, 0xa6, 0x0d, 0x15, 0x0c, 0x77, 0x13, 0x1f, 0x9f, 0xa2, 0x8c, 0xcd, 0xff, 0xdf, 0xa0, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_146_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_146_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x2b, 0x26, 0xa4, 0x22, 0x07, 0xa7, 0x14, 0x81, 0x3b, 0x9e, 0x70, 0x07, 0x7d, 0xf6, 0x98, 0xb8, 0x29, 0xd1, 0x58, 0xdb, 0xe2, 0xc6, 0x25, 0xba, 0x54, 0x54, 0xb7, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_146 = { .name = "ecdsa_brainpoolp224r1_sha224_146", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_146_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_146_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_146_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 147 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 147 for ECDSA, tcId is 148 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_147_pubkey[] = { 0x9d, 0x37, 0x03, 0xb3, 0x20, 0x5b, 0x12, 0x3c, 0x90, 0x3a, 0x04, 0x46, 0x97, 0x32, 0x47, 0xc1, 0x6a, 0x88, 0xd1, 0x03, 0xfe, 0xa9, 0xd0, 0x4d, 0xd0, 0x2a, 0x70, 0x2b, 0x65, 0x18, 0x6b, 0x77, 0x7b, 0x57, 0xea, 0xde, 0xe8, 0x15, 0x4c, 0x02, 0xfc, 0xe0, 0xe9, 0x5c, 0x3f, 0x06, 0x14, 0x68, 0x49, 0x9b, 0xac, 0x3d, 0xc6, 0x02, 0x9e, 0x8c, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_147_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_147_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_147 = { .name = "ecdsa_brainpoolp224r1_sha224_147", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_147_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_147_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_147_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 148 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 148 for ECDSA, tcId is 149 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_148_pubkey[] = { 0x3e, 0xa5, 0x72, 0x50, 0x5a, 0x48, 0xb1, 0xbe, 0xd0, 0x85, 0x95, 0x3d, 0xa7, 0xd4, 0xc9, 0x63, 0xc2, 0xc5, 0xb6, 0xad, 0x99, 0x77, 0x9d, 0x9d, 0x54, 0xba, 0x40, 0x12, 0x94, 0x47, 0x00, 0x74, 0xe0, 0x25, 0x2d, 0xa1, 0x59, 0xa0, 0xc0, 0xd0, 0xb2, 0xf8, 0xd4, 0xc2, 0x42, 0xcb, 0x94, 0xba, 0xb2, 0xc2, 0x02, 0x0c, 0x4b, 0x2d, 0xf4, 0x99, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_148_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_148_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x58, 0xe3, 0x75, 0x18, 0xc6, 0xe4, 0x7a, 0x84, 0xde, 0x10, 0xcc, 0xb2, 0x54, 0xc0, 0x36, 0x93, 0x27, 0x11, 0x45, 0xf1, 0x3e, 0x00, 0xa9, 0x12, 0x37, 0xa4, 0xa5, 0x47, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_148 = { .name = "ecdsa_brainpoolp224r1_sha224_148", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_148_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_148_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_148_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 149 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 149 for ECDSA, tcId is 150 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_149_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x58, 0xaa, 0x56, 0xf7, 0x72, 0xc0, 0x72, 0x6f, 0x24, 0xc6, 0xb8, 0x9e, 0x4e, 0xcd, 0xac, 0x24, 0x35, 0x4b, 0x9e, 0x99, 0xca, 0xa3, 0xf6, 0xd3, 0x76, 0x14, 0x02, 0xcd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_149_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_149_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_149 = { .name = "ecdsa_brainpoolp224r1_sha224_149", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_149_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_149_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_149_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 150 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 150 for ECDSA, tcId is 151 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_150_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x58, 0xaa, 0x56, 0xf7, 0x72, 0xc0, 0x72, 0x6f, 0x24, 0xc6, 0xb8, 0x9e, 0x4e, 0xcd, 0xac, 0x24, 0x35, 0x4b, 0x9e, 0x99, 0xca, 0xa3, 0xf6, 0xd3, 0x76, 0x14, 0x02, 0xcd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_150_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_150_sig[] = { 0x62, 0x85, 0x80, 0xa9, 0xad, 0xb0, 0x26, 0x04, 0x52, 0x5b, 0x1e, 0xe6, 0xb1, 0x35, 0xe1, 0xa9, 0xc7, 0x45, 0x02, 0x18, 0x24, 0x58, 0x2c, 0x52, 0x38, 0x5a, 0x81, 0x73, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_150 = { .name = "ecdsa_brainpoolp224r1_sha224_150", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_150_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_150_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_150_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 151 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 151 for ECDSA, tcId is 152 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_151_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x7f, 0x16, 0xdd, 0xb2, 0xb3, 0x82, 0xf4, 0x17, 0x05, 0x51, 0x77, 0x87, 0x27, 0x04, 0x2b, 0x63, 0x7b, 0x53, 0x68, 0xbd, 0xcd, 0x36, 0x93, 0x22, 0x08, 0xb4, 0xbe, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_151_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_151_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_151 = { .name = "ecdsa_brainpoolp224r1_sha224_151", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_151_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_151_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_151_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 152 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 152 for ECDSA, tcId is 153 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_152_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x7f, 0x16, 0xdd, 0xb2, 0xb3, 0x82, 0xf4, 0x17, 0x05, 0x51, 0x77, 0x87, 0x27, 0x04, 0x2b, 0x63, 0x7b, 0x53, 0x68, 0xbd, 0xcd, 0x36, 0x93, 0x22, 0x08, 0xb4, 0xbe, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_152_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_152_sig[] = { 0x62, 0x85, 0x80, 0xa9, 0xad, 0xb0, 0x26, 0x04, 0x52, 0x5b, 0x1e, 0xe6, 0xb1, 0x35, 0xe1, 0xa9, 0xc7, 0x45, 0x02, 0x18, 0x24, 0x58, 0x2c, 0x52, 0x38, 0x5a, 0x81, 0x73, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_152 = { .name = "ecdsa_brainpoolp224r1_sha224_152", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_152_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_152_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_152_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 153 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 153 for ECDSA, tcId is 154 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_153_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_153_sig[] = { 0xb9, 0x82, 0xbe, 0xa8, 0x0d, 0x10, 0x81, 0x6b, 0xb4, 0x50, 0xa3, 0xfa, 0xaa, 0xed, 0x4e, 0xd5, 0x4f, 0xb1, 0x97, 0xb3, 0xbf, 0xf9, 0x5a, 0xf2, 0x5d, 0x7d, 0x37, 0x86, 0x9e, 0x6e, 0xa2, 0xe5, 0x87, 0x13, 0xf1, 0x30, 0x4d, 0x29, 0xde, 0xbf, 0x85, 0x59, 0xa7, 0x4a, 0x89, 0xe0, 0x18, 0xba, 0xe2, 0x8b, 0x05, 0x55, 0x6e, 0x54, 0x82, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_153 = { .name = "ecdsa_brainpoolp224r1_sha224_153", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_153_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp224r1_sha224_153_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 154 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 154 for ECDSA, tcId is 155 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_154_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_154_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_154_sig[] = { 0x4d, 0xab, 0xc5, 0xfe, 0x96, 0x2b, 0x5f, 0x8a, 0x66, 0x81, 0xe9, 0x4a, 0x21, 0x65, 0xd9, 0xb6, 0xbe, 0x19, 0x40, 0xf2, 0x0e, 0x27, 0xce, 0xb7, 0x3f, 0xc4, 0xea, 0x7d, 0x74, 0x6e, 0x9b, 0xba, 0x7e, 0xfb, 0x90, 0xfc, 0xec, 0xc2, 0x63, 0xc2, 0x29, 0xa1, 0x6d, 0x80, 0x9d, 0x35, 0x47, 0xc2, 0x8a, 0x26, 0xcd, 0x71, 0xa5, 0x2a, 0xbd, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_154 = { .name = "ecdsa_brainpoolp224r1_sha224_154", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_154_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_154_msg, .msglen = 3, .sig = ecdsa_brainpoolp224r1_sha224_154_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 155 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 155 for ECDSA, tcId is 156 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_155_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_155_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_155_sig[] = { 0x95, 0xb1, 0x1e, 0x32, 0x00, 0x07, 0xa2, 0xe0, 0xf8, 0xce, 0x00, 0xf9, 0x05, 0x8c, 0xa9, 0xb9, 0x19, 0xe8, 0xd6, 0xaa, 0xd5, 0x44, 0xa8, 0xf9, 0x80, 0x8b, 0x44, 0xa1, 0x15, 0xa9, 0x62, 0x01, 0x9c, 0x85, 0xa5, 0xb1, 0xfa, 0x74, 0x74, 0x16, 0x2d, 0x03, 0xcd, 0x0e, 0x52, 0x8e, 0x8b, 0x93, 0xbc, 0xc8, 0x49, 0x20, 0xaf, 0x57, 0x9f, 0x61, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_155 = { .name = "ecdsa_brainpoolp224r1_sha224_155", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_155_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_155_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_155_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 156 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 156 for ECDSA, tcId is 157 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_156_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_156_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_156_sig[] = { 0x9e, 0x4d, 0xab, 0x9e, 0x0b, 0x00, 0x97, 0xe3, 0x65, 0x78, 0x3f, 0xc0, 0x5f, 0x01, 0x0c, 0x16, 0x0d, 0x36, 0x1d, 0xf7, 0x92, 0x5b, 0x0d, 0xdb, 0xdf, 0xec, 0xe8, 0x8b, 0x84, 0x06, 0xa3, 0x65, 0xf0, 0x78, 0xf0, 0x31, 0xe6, 0xfa, 0xd6, 0x51, 0x1d, 0x69, 0xf8, 0xa6, 0x54, 0x83, 0xc1, 0x9a, 0x5a, 0x80, 0x0c, 0x39, 0x49, 0x0f, 0x75, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_156 = { .name = "ecdsa_brainpoolp224r1_sha224_156", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_156_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_156_msg, .msglen = 20, .sig = ecdsa_brainpoolp224r1_sha224_156_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 157 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 157 for ECDSA, tcId is 158 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_157_pubkey[] = { 0x80, 0x2a, 0x0f, 0x51, 0x20, 0x4e, 0xf6, 0xa8, 0x29, 0x21, 0x1b, 0xc0, 0x74, 0x08, 0x87, 0x46, 0x1e, 0xe4, 0xab, 0xa7, 0x36, 0xe9, 0xca, 0xee, 0x00, 0x00, 0x00, 0x00, 0x7f, 0xb9, 0x31, 0xe0, 0x63, 0x00, 0x45, 0x13, 0x62, 0xd4, 0x44, 0x10, 0x6e, 0xeb, 0x5d, 0xab, 0xdd, 0xca, 0x65, 0x0f, 0xec, 0x4b, 0xe5, 0x5f, 0xc5, 0x45, 0xf7, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_157_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_157_sig[] = { 0x0c, 0x93, 0xfd, 0x7f, 0x6d, 0xd0, 0xb6, 0x97, 0xd5, 0xc2, 0x87, 0xee, 0x61, 0xae, 0xe4, 0xdc, 0xbe, 0xdc, 0xc2, 0x08, 0x85, 0xc1, 0xe6, 0x21, 0x5b, 0x8b, 0x36, 0x08, 0x3b, 0xc7, 0xa1, 0xbe, 0xcc, 0xf1, 0xa8, 0xe8, 0x3a, 0xf2, 0xf5, 0x16, 0x2f, 0xc5, 0x39, 0xa1, 0xd0, 0x62, 0xbd, 0x63, 0x9a, 0x2f, 0xbe, 0xc5, 0x12, 0x90, 0x7a, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_157 = { .name = "ecdsa_brainpoolp224r1_sha224_157", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_157_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_157_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_157_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 158 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 158 for ECDSA, tcId is 159 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_158_pubkey[] = { 0x80, 0x2a, 0x0f, 0x51, 0x20, 0x4e, 0xf6, 0xa8, 0x29, 0x21, 0x1b, 0xc0, 0x74, 0x08, 0x87, 0x46, 0x1e, 0xe4, 0xab, 0xa7, 0x36, 0xe9, 0xca, 0xee, 0x00, 0x00, 0x00, 0x00, 0x7f, 0xb9, 0x31, 0xe0, 0x63, 0x00, 0x45, 0x13, 0x62, 0xd4, 0x44, 0x10, 0x6e, 0xeb, 0x5d, 0xab, 0xdd, 0xca, 0x65, 0x0f, 0xec, 0x4b, 0xe5, 0x5f, 0xc5, 0x45, 0xf7, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_158_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_158_sig[] = { 0x9e, 0x0b, 0x62, 0x0a, 0x2f, 0x31, 0x3a, 0xda, 0x75, 0x64, 0x63, 0xa2, 0x29, 0x88, 0xaf, 0xb6, 0x57, 0x1b, 0x3b, 0x03, 0x0a, 0x42, 0x85, 0xb1, 0x85, 0xe1, 0xcc, 0x80, 0xc3, 0xeb, 0xa0, 0x4c, 0x42, 0xe6, 0x4d, 0x40, 0x28, 0xac, 0xab, 0xcd, 0xcb, 0x7b, 0x2e, 0xed, 0x1b, 0x3c, 0xfb, 0x56, 0x0b, 0x8d, 0x7d, 0x14, 0xfb, 0x26, 0xac, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_158 = { .name = "ecdsa_brainpoolp224r1_sha224_158", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_158_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_158_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_158_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 159 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 159 for ECDSA, tcId is 160 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_159_pubkey[] = { 0x80, 0x2a, 0x0f, 0x51, 0x20, 0x4e, 0xf6, 0xa8, 0x29, 0x21, 0x1b, 0xc0, 0x74, 0x08, 0x87, 0x46, 0x1e, 0xe4, 0xab, 0xa7, 0x36, 0xe9, 0xca, 0xee, 0x00, 0x00, 0x00, 0x00, 0x7f, 0xb9, 0x31, 0xe0, 0x63, 0x00, 0x45, 0x13, 0x62, 0xd4, 0x44, 0x10, 0x6e, 0xeb, 0x5d, 0xab, 0xdd, 0xca, 0x65, 0x0f, 0xec, 0x4b, 0xe5, 0x5f, 0xc5, 0x45, 0xf7, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_159_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_159_sig[] = { 0xa3, 0x06, 0xf5, 0x00, 0xda, 0x4f, 0x0a, 0x30, 0x94, 0x64, 0x79, 0x93, 0x6a, 0xaf, 0x9c, 0x63, 0x76, 0x76, 0xb0, 0xf0, 0x2d, 0x20, 0xae, 0x0d, 0x98, 0x1c, 0x25, 0xeb, 0x01, 0x56, 0x47, 0xf2, 0x50, 0x0b, 0xcb, 0xe3, 0x20, 0x4b, 0xdb, 0x80, 0x49, 0x72, 0xb8, 0x41, 0x89, 0x0b, 0x4e, 0x53, 0x19, 0x6c, 0xd8, 0xb1, 0x88, 0x99, 0x31, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_159 = { .name = "ecdsa_brainpoolp224r1_sha224_159", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_159_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_159_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_159_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 160 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 160 for ECDSA, tcId is 161 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_160_pubkey[] = { 0xcb, 0x32, 0x0c, 0x84, 0xf2, 0x6c, 0x00, 0xa1, 0xb4, 0xad, 0x71, 0x46, 0x91, 0x4c, 0xae, 0x12, 0x65, 0x29, 0x16, 0x5d, 0xe7, 0x36, 0x3d, 0x8a, 0xef, 0x9a, 0xbd, 0x05, 0xa3, 0x97, 0xd4, 0x6b, 0x87, 0x28, 0x31, 0x76, 0xb7, 0xf6, 0x9d, 0xa1, 0xf9, 0x46, 0x15, 0xca, 0x44, 0x31, 0xfc, 0x47, 0xb2, 0xa0, 0xe6, 0x0c, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_160_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_160_sig[] = { 0x04, 0xf0, 0x0d, 0xd4, 0x4f, 0xdd, 0x8a, 0xe6, 0xb0, 0x8b, 0x86, 0xcc, 0xbd, 0xd7, 0xd6, 0x15, 0xaa, 0x9e, 0x49, 0x8a, 0x89, 0xb3, 0x50, 0x94, 0xc8, 0xa9, 0xa6, 0xfe, 0x49, 0x61, 0x7a, 0x16, 0x17, 0xc5, 0x6c, 0xe9, 0x0d, 0x41, 0xc5, 0x3e, 0xef, 0x4e, 0x62, 0x8f, 0x24, 0xc0, 0x47, 0xa0, 0x6e, 0x02, 0xc1, 0xf9, 0x21, 0x23, 0x44, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_160 = { .name = "ecdsa_brainpoolp224r1_sha224_160", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_160_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_160_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_160_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 161 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 161 for ECDSA, tcId is 162 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_161_pubkey[] = { 0xcb, 0x32, 0x0c, 0x84, 0xf2, 0x6c, 0x00, 0xa1, 0xb4, 0xad, 0x71, 0x46, 0x91, 0x4c, 0xae, 0x12, 0x65, 0x29, 0x16, 0x5d, 0xe7, 0x36, 0x3d, 0x8a, 0xef, 0x9a, 0xbd, 0x05, 0xa3, 0x97, 0xd4, 0x6b, 0x87, 0x28, 0x31, 0x76, 0xb7, 0xf6, 0x9d, 0xa1, 0xf9, 0x46, 0x15, 0xca, 0x44, 0x31, 0xfc, 0x47, 0xb2, 0xa0, 0xe6, 0x0c, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_161_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_161_sig[] = { 0x12, 0x86, 0xf6, 0xa7, 0x37, 0x5b, 0xf6, 0x80, 0x51, 0xe3, 0x1b, 0x2e, 0x32, 0xb5, 0xf6, 0xc0, 0x98, 0x8c, 0x91, 0x89, 0x79, 0x92, 0x56, 0xe7, 0xce, 0x64, 0xe2, 0x91, 0x52, 0xd3, 0xc1, 0xf9, 0xe7, 0x77, 0xf2, 0x3c, 0x17, 0xcb, 0xc8, 0x32, 0xd0, 0xe5, 0xa8, 0x4b, 0xb6, 0x8b, 0x13, 0xde, 0xbf, 0x39, 0x38, 0x78, 0xd1, 0xa0, 0x64, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_161 = { .name = "ecdsa_brainpoolp224r1_sha224_161", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_161_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_161_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_161_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 162 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 162 for ECDSA, tcId is 163 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_162_pubkey[] = { 0xcb, 0x32, 0x0c, 0x84, 0xf2, 0x6c, 0x00, 0xa1, 0xb4, 0xad, 0x71, 0x46, 0x91, 0x4c, 0xae, 0x12, 0x65, 0x29, 0x16, 0x5d, 0xe7, 0x36, 0x3d, 0x8a, 0xef, 0x9a, 0xbd, 0x05, 0xa3, 0x97, 0xd4, 0x6b, 0x87, 0x28, 0x31, 0x76, 0xb7, 0xf6, 0x9d, 0xa1, 0xf9, 0x46, 0x15, 0xca, 0x44, 0x31, 0xfc, 0x47, 0xb2, 0xa0, 0xe6, 0x0c, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_162_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_162_sig[] = { 0x58, 0x28, 0x25, 0xdf, 0x23, 0x68, 0xdc, 0xb9, 0x2f, 0xbb, 0xa3, 0xfa, 0x64, 0x54, 0xd1, 0x49, 0xd3, 0xb8, 0x60, 0xe3, 0xff, 0x32, 0x6a, 0xfe, 0x36, 0x21, 0x58, 0x13, 0x49, 0x33, 0x4f, 0xc6, 0xa7, 0x04, 0x18, 0xdb, 0xc4, 0x54, 0xda, 0x6a, 0x99, 0x7b, 0xc8, 0x37, 0x62, 0x70, 0xc3, 0xa3, 0x88, 0x63, 0xad, 0xb2, 0xaa, 0x70, 0xbb, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_162 = { .name = "ecdsa_brainpoolp224r1_sha224_162", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_162_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_162_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_162_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 163 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 163 for ECDSA, tcId is 164 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_163_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0x81, 0xdf, 0x97, 0x17, 0x44, 0xa2, 0x5a, 0xc9, 0x94, 0x72, 0xc3, 0xff, 0x5a, 0x8f, 0xc4, 0x9b, 0x86, 0xfc, 0x9f, 0xb5, 0x70, 0x44, 0x8f, 0xf9, 0x77, 0xf2, 0xd0, 0x7c, 0x1c, 0x92, 0x96, 0xb2, 0xf7, 0x74, 0x78, 0xd1, 0x3d, 0x5a, 0xb1, 0xc6, 0x39, 0x93, 0x96, 0x2f, 0x2d, 0xd0, 0x8e, 0xe7, 0xc3, 0x13, 0xde, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_163_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_163_sig[] = { 0x5a, 0x11, 0x71, 0x8c, 0x90, 0xa0, 0x24, 0x59, 0x80, 0x0f, 0x10, 0x9e, 0x4e, 0x84, 0x0c, 0xc2, 0x61, 0xd7, 0x82, 0xd6, 0x4e, 0x1c, 0x8a, 0x47, 0x12, 0xdd, 0x90, 0x81, 0xd2, 0x83, 0xb1, 0xc1, 0xe1, 0x10, 0xa4, 0x62, 0x0a, 0x69, 0x6f, 0xdf, 0x74, 0xa9, 0xc7, 0x79, 0x23, 0x52, 0x13, 0x9d, 0x54, 0xcc, 0xed, 0x8c, 0x97, 0x3d, 0x9e, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_163 = { .name = "ecdsa_brainpoolp224r1_sha224_163", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_163_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_163_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_163_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 164 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 164 for ECDSA, tcId is 165 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_164_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0x81, 0xdf, 0x97, 0x17, 0x44, 0xa2, 0x5a, 0xc9, 0x94, 0x72, 0xc3, 0xff, 0x5a, 0x8f, 0xc4, 0x9b, 0x86, 0xfc, 0x9f, 0xb5, 0x70, 0x44, 0x8f, 0xf9, 0x77, 0xf2, 0xd0, 0x7c, 0x1c, 0x92, 0x96, 0xb2, 0xf7, 0x74, 0x78, 0xd1, 0x3d, 0x5a, 0xb1, 0xc6, 0x39, 0x93, 0x96, 0x2f, 0x2d, 0xd0, 0x8e, 0xe7, 0xc3, 0x13, 0xde, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_164_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_164_sig[] = { 0xd5, 0x77, 0xf2, 0x3e, 0x59, 0x24, 0x14, 0xe3, 0x51, 0xb3, 0x92, 0x8a, 0x59, 0x3c, 0x5d, 0x2f, 0x89, 0xf0, 0xc7, 0x2d, 0xf5, 0x13, 0xbf, 0xbc, 0x65, 0x35, 0xba, 0xbb, 0x1b, 0xb0, 0x9d, 0xd2, 0x35, 0x12, 0x4a, 0x14, 0xe0, 0x24, 0x69, 0x46, 0xf2, 0x80, 0x45, 0x0f, 0x15, 0x57, 0x69, 0x12, 0xae, 0xb7, 0x35, 0xb7, 0x3c, 0xe8, 0x28, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_164 = { .name = "ecdsa_brainpoolp224r1_sha224_164", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_164_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_164_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_164_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 165 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 165 for ECDSA, tcId is 166 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_165_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0x81, 0xdf, 0x97, 0x17, 0x44, 0xa2, 0x5a, 0xc9, 0x94, 0x72, 0xc3, 0xff, 0x5a, 0x8f, 0xc4, 0x9b, 0x86, 0xfc, 0x9f, 0xb5, 0x70, 0x44, 0x8f, 0xf9, 0x77, 0xf2, 0xd0, 0x7c, 0x1c, 0x92, 0x96, 0xb2, 0xf7, 0x74, 0x78, 0xd1, 0x3d, 0x5a, 0xb1, 0xc6, 0x39, 0x93, 0x96, 0x2f, 0x2d, 0xd0, 0x8e, 0xe7, 0xc3, 0x13, 0xde, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_165_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_165_sig[] = { 0xaf, 0x8f, 0x83, 0x6e, 0x63, 0x99, 0x5d, 0xc7, 0x15, 0xa4, 0xd3, 0xc6, 0x84, 0x2c, 0x4e, 0x6c, 0x6c, 0xf4, 0x58, 0x6d, 0xf7, 0x6e, 0x46, 0x59, 0xd8, 0x09, 0xee, 0xc9, 0x85, 0xbe, 0xfd, 0x0b, 0x1b, 0xb8, 0xae, 0x18, 0x2c, 0x05, 0xd0, 0x71, 0xda, 0xd1, 0x80, 0x22, 0x4d, 0x22, 0x53, 0x3d, 0xce, 0x73, 0x7d, 0x4d, 0xda, 0x74, 0xd5, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_165 = { .name = "ecdsa_brainpoolp224r1_sha224_165", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_165_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_165_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_165_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 166 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 166 for ECDSA, tcId is 167 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_166_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0x00, 0x00, 0x00, 0x00, 0x28, 0x01, 0xd4, 0x83, 0x82, 0x86, 0x16, 0x84, 0xb8, 0xd2, 0xcb, 0xd7, 0xe5, 0x98, 0x9a, 0x0d, 0x7c, 0x15, 0xa7, 0xe8, 0x19, 0xb5, 0x73, 0xaa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_166_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_166_sig[] = { 0x15, 0x6a, 0xa7, 0x86, 0x92, 0xc7, 0x8e, 0x97, 0x69, 0xab, 0xa7, 0x28, 0xc9, 0xee, 0xa7, 0x88, 0x35, 0xb5, 0x50, 0x00, 0x90, 0x1b, 0xa5, 0x07, 0x94, 0xa3, 0x3e, 0xfc, 0xb9, 0x78, 0x5d, 0xf4, 0x0a, 0x22, 0x13, 0x37, 0x74, 0x81, 0x31, 0x1b, 0x1a, 0x81, 0xd3, 0x10, 0xe7, 0x63, 0x41, 0x92, 0x7b, 0x8f, 0xba, 0x0d, 0x6e, 0x3e, 0xc7, 0xad, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_166 = { .name = "ecdsa_brainpoolp224r1_sha224_166", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_166_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_166_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_166_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 167 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 167 for ECDSA, tcId is 168 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_167_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0x00, 0x00, 0x00, 0x00, 0x28, 0x01, 0xd4, 0x83, 0x82, 0x86, 0x16, 0x84, 0xb8, 0xd2, 0xcb, 0xd7, 0xe5, 0x98, 0x9a, 0x0d, 0x7c, 0x15, 0xa7, 0xe8, 0x19, 0xb5, 0x73, 0xaa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_167_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_167_sig[] = { 0x92, 0x74, 0xd4, 0x6a, 0x7f, 0xfa, 0x12, 0x99, 0xa3, 0x72, 0xe8, 0x21, 0xbd, 0x89, 0x72, 0x8d, 0xe8, 0x3e, 0xf8, 0x7c, 0x46, 0xaf, 0x67, 0x04, 0x3a, 0x63, 0x4b, 0x02, 0x19, 0xe4, 0xbb, 0xec, 0x8b, 0x03, 0xfa, 0x77, 0x2a, 0x36, 0x22, 0xbf, 0x48, 0x93, 0xe5, 0x81, 0xef, 0xad, 0xf9, 0xd2, 0x0b, 0xd6, 0x08, 0x06, 0xd8, 0x26, 0x76, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_167 = { .name = "ecdsa_brainpoolp224r1_sha224_167", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_167_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_167_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_167_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 168 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 168 for ECDSA, tcId is 169 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_168_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0x00, 0x00, 0x00, 0x00, 0x28, 0x01, 0xd4, 0x83, 0x82, 0x86, 0x16, 0x84, 0xb8, 0xd2, 0xcb, 0xd7, 0xe5, 0x98, 0x9a, 0x0d, 0x7c, 0x15, 0xa7, 0xe8, 0x19, 0xb5, 0x73, 0xaa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_168_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_168_sig[] = { 0xcf, 0x6a, 0x9c, 0xba, 0x28, 0x5e, 0x56, 0x49, 0x3c, 0xbb, 0x46, 0x2b, 0x7b, 0x16, 0x12, 0x8a, 0x0c, 0xf1, 0xc7, 0x05, 0x84, 0x47, 0x94, 0x5d, 0xae, 0xf3, 0x41, 0x49, 0x29, 0xa6, 0x87, 0x83, 0x9e, 0x8e, 0xe0, 0x3c, 0x53, 0x72, 0xa1, 0x13, 0x73, 0x3c, 0x08, 0x1f, 0x41, 0x3d, 0x1f, 0x94, 0x05, 0xdd, 0xfe, 0x47, 0xe1, 0x8f, 0xcc, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_168 = { .name = "ecdsa_brainpoolp224r1_sha224_168", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_168_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_168_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_168_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 169 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 169 for ECDSA, tcId is 170 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_169_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0xd7, 0xc1, 0x34, 0xa9, 0xfe, 0x41, 0x92, 0x02, 0xa7, 0x92, 0x19, 0xa0, 0xbc, 0xff, 0x0b, 0xaf, 0xcb, 0x06, 0x6d, 0x4a, 0x1b, 0xc4, 0xe2, 0x0d, 0x65, 0x13, 0x4d, 0x55, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_169_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_169_sig[] = { 0x59, 0x2e, 0x54, 0xa0, 0xea, 0x95, 0x0a, 0xc7, 0xcd, 0x83, 0x0f, 0x56, 0xc7, 0x95, 0x4a, 0x76, 0x9f, 0x81, 0xaa, 0x55, 0xe8, 0xe1, 0x01, 0xbe, 0xe1, 0x9b, 0x3b, 0x27, 0x48, 0x37, 0x5f, 0xdd, 0x4d, 0x90, 0x14, 0xc9, 0xb6, 0x0b, 0x63, 0xc7, 0x0b, 0xfe, 0x98, 0xc8, 0x44, 0xbe, 0x66, 0x8f, 0x2d, 0x3a, 0x2e, 0x25, 0x92, 0x62, 0xb9, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_169 = { .name = "ecdsa_brainpoolp224r1_sha224_169", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_169_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_169_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_169_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 170 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 170 for ECDSA, tcId is 171 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_170_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0xd7, 0xc1, 0x34, 0xa9, 0xfe, 0x41, 0x92, 0x02, 0xa7, 0x92, 0x19, 0xa0, 0xbc, 0xff, 0x0b, 0xaf, 0xcb, 0x06, 0x6d, 0x4a, 0x1b, 0xc4, 0xe2, 0x0d, 0x65, 0x13, 0x4d, 0x55, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_170_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_170_sig[] = { 0x1e, 0xc0, 0xef, 0x4d, 0x5b, 0xed, 0xaf, 0xe5, 0x08, 0x1f, 0x7a, 0xda, 0xe3, 0x2d, 0xb4, 0xd0, 0xaa, 0x94, 0x6f, 0x13, 0x0a, 0xce, 0xda, 0xba, 0xe2, 0x6d, 0x90, 0xdc, 0x62, 0x7e, 0x81, 0xd7, 0xeb, 0x35, 0x8f, 0x59, 0xe8, 0xa8, 0x63, 0x05, 0x27, 0xd4, 0xe8, 0x94, 0x6d, 0x1c, 0xad, 0x21, 0x96, 0x76, 0x18, 0x36, 0xd9, 0x7d, 0x95, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_170 = { .name = "ecdsa_brainpoolp224r1_sha224_170", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_170_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_170_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_170_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 171 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 171 for ECDSA, tcId is 172 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_171_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0xd7, 0xc1, 0x34, 0xa9, 0xfe, 0x41, 0x92, 0x02, 0xa7, 0x92, 0x19, 0xa0, 0xbc, 0xff, 0x0b, 0xaf, 0xcb, 0x06, 0x6d, 0x4a, 0x1b, 0xc4, 0xe2, 0x0d, 0x65, 0x13, 0x4d, 0x55, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_171_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_171_sig[] = { 0x5f, 0xaf, 0x03, 0x5e, 0xd5, 0x77, 0x4e, 0xeb, 0x0a, 0xdc, 0x18, 0x7f, 0xf4, 0x85, 0xa8, 0x46, 0xaa, 0x2a, 0xbc, 0xf1, 0xe7, 0xf8, 0x59, 0xb1, 0xb9, 0x10, 0xf2, 0x5c, 0x8b, 0xf1, 0x2a, 0x1c, 0x00, 0xb1, 0x8f, 0x66, 0xc2, 0x28, 0x35, 0x2d, 0xe4, 0x9c, 0xc4, 0xfb, 0x82, 0x7a, 0x09, 0xfc, 0x86, 0xf7, 0x22, 0xce, 0x56, 0x1b, 0xa5, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_171 = { .name = "ecdsa_brainpoolp224r1_sha224_171", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_171_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_171_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_171_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 172 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 172 for ECDSA, tcId is 173 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_172_pubkey[] = { 0x51, 0x2e, 0x58, 0x17, 0x31, 0xc9, 0xc4, 0x60, 0xbb, 0x70, 0x5b, 0x60, 0xda, 0x97, 0x6c, 0xcb, 0x1b, 0x0e, 0xf4, 0x21, 0x78, 0x51, 0x06, 0xba, 0x2c, 0xcd, 0xd2, 0x38, 0x0f, 0x21, 0xd5, 0xba, 0xcd, 0xf8, 0x1c, 0x0c, 0xb7, 0x8f, 0xa1, 0x51, 0x23, 0x7d, 0xb3, 0x13, 0x0a, 0xd4, 0xde, 0xf3, 0x73, 0xf3, 0xe5, 0x23, 0x39, 0x8c, 0x2c, 0xf7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_172_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_172_sig[] = { 0x52, 0xb2, 0xd3, 0x69, 0xf1, 0x8d, 0xf5, 0x63, 0x72, 0xaf, 0xe7, 0xfe, 0xb3, 0x84, 0x13, 0xf2, 0x32, 0xb4, 0xfb, 0x9c, 0xa1, 0x6c, 0x6f, 0x6f, 0xed, 0xc6, 0x41, 0x89, 0xc1, 0xb1, 0x9f, 0x13, 0x77, 0x73, 0xef, 0x32, 0x01, 0xcd, 0x34, 0x1c, 0x38, 0x1e, 0x4f, 0x94, 0x49, 0xcc, 0x0e, 0x6c, 0x68, 0x8a, 0x35, 0x1d, 0x7a, 0x60, 0x70, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_172 = { .name = "ecdsa_brainpoolp224r1_sha224_172", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_172_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_172_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_172_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 173 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 173 for ECDSA, tcId is 174 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_173_pubkey[] = { 0x51, 0x2e, 0x58, 0x17, 0x31, 0xc9, 0xc4, 0x60, 0xbb, 0x70, 0x5b, 0x60, 0xda, 0x97, 0x6c, 0xcb, 0x1b, 0x0e, 0xf4, 0x21, 0x78, 0x51, 0x06, 0xba, 0x2c, 0xcd, 0xd2, 0x38, 0x0f, 0x21, 0xd5, 0xba, 0xcd, 0xf8, 0x1c, 0x0c, 0xb7, 0x8f, 0xa1, 0x51, 0x23, 0x7d, 0xb3, 0x13, 0x0a, 0xd4, 0xde, 0xf3, 0x73, 0xf3, 0xe5, 0x23, 0x39, 0x8c, 0x2c, 0xf7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_173_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_173_sig[] = { 0x5b, 0x88, 0x9d, 0x28, 0x8a, 0xaa, 0x81, 0x67, 0x4d, 0x32, 0x00, 0x6e, 0x81, 0x27, 0x9c, 0x57, 0xed, 0x56, 0xa0, 0x35, 0xc8, 0x78, 0xd3, 0xe2, 0xb6, 0x87, 0xbe, 0xc3, 0x0d, 0xa6, 0x21, 0xd5, 0xfa, 0x98, 0x13, 0x26, 0x3c, 0x7f, 0x58, 0xf8, 0xe0, 0x15, 0x5d, 0x6f, 0x0c, 0x33, 0x0a, 0x56, 0xc5, 0x94, 0xde, 0xfc, 0x2e, 0xbd, 0xf0, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_173 = { .name = "ecdsa_brainpoolp224r1_sha224_173", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_173_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_173_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_173_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 174 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 174 for ECDSA, tcId is 175 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_174_pubkey[] = { 0x51, 0x2e, 0x58, 0x17, 0x31, 0xc9, 0xc4, 0x60, 0xbb, 0x70, 0x5b, 0x60, 0xda, 0x97, 0x6c, 0xcb, 0x1b, 0x0e, 0xf4, 0x21, 0x78, 0x51, 0x06, 0xba, 0x2c, 0xcd, 0xd2, 0x38, 0x0f, 0x21, 0xd5, 0xba, 0xcd, 0xf8, 0x1c, 0x0c, 0xb7, 0x8f, 0xa1, 0x51, 0x23, 0x7d, 0xb3, 0x13, 0x0a, 0xd4, 0xde, 0xf3, 0x73, 0xf3, 0xe5, 0x23, 0x39, 0x8c, 0x2c, 0xf7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_174_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_174_sig[] = { 0xb6, 0xf8, 0xa8, 0x01, 0x87, 0x18, 0x0a, 0xad, 0x8a, 0x5c, 0x89, 0x6b, 0xe2, 0x14, 0x31, 0x46, 0x01, 0xa1, 0x58, 0x5f, 0x2c, 0xcb, 0x28, 0xbc, 0x7e, 0x8e, 0x8f, 0x01, 0xa9, 0x0c, 0x68, 0xc1, 0x4a, 0x67, 0xf5, 0xd5, 0x9c, 0xec, 0x70, 0xdc, 0x0f, 0x47, 0x3b, 0x5c, 0x14, 0x01, 0x3b, 0x05, 0x6d, 0x12, 0xcb, 0xc0, 0xf7, 0x15, 0x3b, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_174 = { .name = "ecdsa_brainpoolp224r1_sha224_174", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_174_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_174_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_174_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 175 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 175 for ECDSA, tcId is 176 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_175_pubkey[] = { 0xac, 0x55, 0xd1, 0xb3, 0xfe, 0xd4, 0xae, 0xe0, 0x3f, 0xa3, 0x61, 0x5d, 0x22, 0x5a, 0x9c, 0xba, 0x5c, 0x02, 0x84, 0x41, 0x6f, 0xba, 0xf9, 0xa7, 0x61, 0x35, 0xf7, 0x62, 0x17, 0xa8, 0x88, 0x39, 0x5b, 0xce, 0xd3, 0x49, 0x77, 0xa8, 0x48, 0x23, 0x70, 0xd5, 0x6e, 0xbc, 0x62, 0xaa, 0x1c, 0xa8, 0x1b, 0xc3, 0x30, 0xf4, 0x9d, 0x4a, 0x14, 0x1d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_175_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_175_sig[] = { 0x16, 0xd4, 0xa8, 0x50, 0x9c, 0x9b, 0xce, 0x2c, 0x73, 0xf8, 0xdb, 0x4b, 0x73, 0x25, 0x7c, 0x7e, 0x33, 0xf4, 0x17, 0x26, 0xc2, 0x5c, 0x4c, 0x64, 0x54, 0x6b, 0x1d, 0xcc, 0x79, 0xba, 0x35, 0xa9, 0x6d, 0x23, 0x45, 0xad, 0x19, 0x4f, 0x39, 0x10, 0x91, 0x20, 0x9d, 0xfc, 0xce, 0xd7, 0x99, 0x17, 0xe0, 0x4d, 0xf3, 0xb6, 0x5f, 0x44, 0xd1, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_175 = { .name = "ecdsa_brainpoolp224r1_sha224_175", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_175_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_175_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_175_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP224t1, tcId is 176 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 176 for ECDSA, tcId is 177 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_176_pubkey[] = { 0xac, 0x55, 0xd1, 0xb3, 0xfe, 0xd4, 0xae, 0xe0, 0x3f, 0xa3, 0x61, 0x5d, 0x22, 0x5a, 0x9c, 0xba, 0x5c, 0x02, 0x84, 0x41, 0x6f, 0xba, 0xf9, 0xa7, 0x61, 0x35, 0xf7, 0x62, 0x17, 0xa8, 0x88, 0x39, 0x5b, 0xce, 0xd3, 0x49, 0x77, 0xa8, 0x48, 0x23, 0x70, 0xd5, 0x6e, 0xbc, 0x62, 0xaa, 0x1c, 0xa8, 0x1b, 0xc3, 0x30, 0xf4, 0x9d, 0x4a, 0x14, 0x1d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_176_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_176_sig[] = { 0x5d, 0xa1, 0x56, 0x97, 0xbb, 0xe4, 0xeb, 0xa7, 0x70, 0x7e, 0x34, 0x9f, 0xf3, 0x23, 0x9d, 0x50, 0x84, 0x55, 0x37, 0x81, 0x13, 0xd2, 0x4e, 0x7e, 0x1d, 0x7a, 0x02, 0x0c, 0x45, 0xbe, 0x44, 0xa5, 0x70, 0xfb, 0x53, 0x0c, 0x49, 0xd7, 0x59, 0x71, 0x2c, 0x10, 0x04, 0x13, 0x45, 0xf7, 0xc0, 0x89, 0x0a, 0x79, 0x46, 0xd9, 0x1d, 0x32, 0xba, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_176 = { .name = "ecdsa_brainpoolp224r1_sha224_176", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_176_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_176_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_176_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP224t1, tcId is 177 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 177 for ECDSA, tcId is 178 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_177_pubkey[] = { 0xac, 0x55, 0xd1, 0xb3, 0xfe, 0xd4, 0xae, 0xe0, 0x3f, 0xa3, 0x61, 0x5d, 0x22, 0x5a, 0x9c, 0xba, 0x5c, 0x02, 0x84, 0x41, 0x6f, 0xba, 0xf9, 0xa7, 0x61, 0x35, 0xf7, 0x62, 0x17, 0xa8, 0x88, 0x39, 0x5b, 0xce, 0xd3, 0x49, 0x77, 0xa8, 0x48, 0x23, 0x70, 0xd5, 0x6e, 0xbc, 0x62, 0xaa, 0x1c, 0xa8, 0x1b, 0xc3, 0x30, 0xf4, 0x9d, 0x4a, 0x14, 0x1d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_177_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_177_sig[] = { 0xc1, 0xf8, 0xd4, 0x34, 0x79, 0xc4, 0xf2, 0x9b, 0x19, 0xb9, 0xb2, 0xc7, 0xb5, 0x74, 0x70, 0x10, 0x49, 0x14, 0x40, 0x74, 0x6c, 0xc8, 0x00, 0xd5, 0xbe, 0x89, 0xb0, 0x11, 0x81, 0x54, 0x34, 0x8b, 0x7c, 0x37, 0xf0, 0x50, 0x4d, 0xca, 0x2b, 0x11, 0x59, 0x41, 0xf7, 0xba, 0x58, 0x57, 0x32, 0x1e, 0xae, 0x8f, 0x64, 0x17, 0x5b, 0xe9, 0xcb, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_177 = { .name = "ecdsa_brainpoolp224r1_sha224_177", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_177_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_177_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_177_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP224t1, tcId is 178 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 178 for ECDSA, tcId is 179 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_178_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0x12, 0x0f, 0x96, 0x34, 0x3d, 0xeb, 0x80, 0x09, 0x3e, 0xcb, 0x76, 0x95, 0xc2, 0xd2, 0xa5, 0xbe, 0x99, 0x37, 0xa2, 0x58, 0x72, 0x3d, 0x78, 0xed, 0x00, 0xaa, 0x1e, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_178_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_178_sig[] = { 0x87, 0x15, 0x81, 0xb5, 0x00, 0x92, 0x57, 0x82, 0x11, 0x16, 0x0e, 0x47, 0x0d, 0xdd, 0xaa, 0x64, 0x0d, 0x5a, 0x2d, 0x9e, 0x22, 0x4f, 0xaf, 0xca, 0x87, 0x91, 0x06, 0xd4, 0xbe, 0x70, 0xfd, 0x5c, 0x75, 0x91, 0xa3, 0x13, 0x0f, 0x5c, 0x2a, 0xf5, 0x36, 0xff, 0xff, 0x8e, 0x72, 0xc1, 0x62, 0x51, 0x74, 0x4c, 0x97, 0x96, 0x8f, 0x92, 0x17, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_178 = { .name = "ecdsa_brainpoolp224r1_sha224_178", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_178_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_178_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_178_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP224t1, tcId is 179 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 179 for ECDSA, tcId is 180 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_179_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0x12, 0x0f, 0x96, 0x34, 0x3d, 0xeb, 0x80, 0x09, 0x3e, 0xcb, 0x76, 0x95, 0xc2, 0xd2, 0xa5, 0xbe, 0x99, 0x37, 0xa2, 0x58, 0x72, 0x3d, 0x78, 0xed, 0x00, 0xaa, 0x1e, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_179_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_179_sig[] = { 0xa9, 0x87, 0x35, 0xe5, 0x65, 0x90, 0x22, 0xb0, 0x27, 0x4a, 0xe6, 0xf7, 0xbc, 0xb1, 0x64, 0x6e, 0x9e, 0x6b, 0x4b, 0x88, 0x40, 0x8d, 0xb3, 0xf9, 0x26, 0xec, 0xcc, 0x89, 0xa9, 0x23, 0xff, 0x5e, 0x15, 0xe0, 0xd7, 0x64, 0xcd, 0x5c, 0xef, 0xff, 0xc5, 0xc4, 0x0c, 0x08, 0x2c, 0x6e, 0xb7, 0x72, 0xdb, 0x76, 0x62, 0xfb, 0x1b, 0x82, 0xd5, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_179 = { .name = "ecdsa_brainpoolp224r1_sha224_179", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_179_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_179_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_179_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP224t1, tcId is 180 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 180 for ECDSA, tcId is 181 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_180_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0x12, 0x0f, 0x96, 0x34, 0x3d, 0xeb, 0x80, 0x09, 0x3e, 0xcb, 0x76, 0x95, 0xc2, 0xd2, 0xa5, 0xbe, 0x99, 0x37, 0xa2, 0x58, 0x72, 0x3d, 0x78, 0xed, 0x00, 0xaa, 0x1e, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_180_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_180_sig[] = { 0xa9, 0x6b, 0x5c, 0x24, 0xe3, 0x3d, 0x59, 0x00, 0x4c, 0xf3, 0x1a, 0xae, 0xf4, 0x4a, 0xe4, 0xc7, 0x57, 0x9e, 0x0b, 0x5b, 0x21, 0x9a, 0xb2, 0x5d, 0x7f, 0x1c, 0x69, 0x0a, 0x88, 0xc0, 0x13, 0x78, 0x84, 0x7c, 0x38, 0x41, 0xf4, 0x9e, 0xc1, 0x48, 0x40, 0xe2, 0xd0, 0x23, 0xd7, 0xb9, 0x12, 0xb5, 0x03, 0xf2, 0xd9, 0x8a, 0x92, 0x3b, 0xe8, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_180 = { .name = "ecdsa_brainpoolp224r1_sha224_180", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_180_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_180_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_180_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP224t1, tcId is 181 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 181 for ECDSA, tcId is 182 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_181_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0xc5, 0xb1, 0x9e, 0x75, 0xe8, 0x57, 0xe6, 0x7c, 0xeb, 0x4c, 0xb9, 0x8f, 0xb2, 0xff, 0x31, 0xc9, 0x17, 0x67, 0x64, 0xff, 0x25, 0x9d, 0x11, 0x08, 0x7e, 0x1e, 0xa2, 0x20, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_181_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_181_sig[] = { 0x6b, 0x57, 0xb7, 0x3a, 0xb7, 0xc3, 0x9b, 0x56, 0x98, 0x54, 0x9d, 0xd5, 0xcd, 0xd4, 0xdf, 0x73, 0x98, 0x18, 0x1b, 0x55, 0x6e, 0x7c, 0x72, 0x83, 0x37, 0x5e, 0x3f, 0x86, 0x9f, 0x59, 0xd1, 0x86, 0x3d, 0x6f, 0xd6, 0x01, 0x32, 0x47, 0xd4, 0xe6, 0x78, 0xa1, 0xc4, 0xfc, 0x1d, 0x89, 0x6d, 0xc6, 0x61, 0xfa, 0x31, 0xfb, 0x73, 0xc3, 0x3f, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_181 = { .name = "ecdsa_brainpoolp224r1_sha224_181", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_181_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_181_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_181_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP224t1, tcId is 182 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 182 for ECDSA, tcId is 183 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_182_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0xc5, 0xb1, 0x9e, 0x75, 0xe8, 0x57, 0xe6, 0x7c, 0xeb, 0x4c, 0xb9, 0x8f, 0xb2, 0xff, 0x31, 0xc9, 0x17, 0x67, 0x64, 0xff, 0x25, 0x9d, 0x11, 0x08, 0x7e, 0x1e, 0xa2, 0x20, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_182_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_182_sig[] = { 0x2f, 0x85, 0xaf, 0x7e, 0x53, 0x5f, 0x66, 0xcf, 0xc9, 0xa9, 0xda, 0xb7, 0xbe, 0x78, 0x16, 0x31, 0xdd, 0x62, 0x2b, 0xe4, 0x35, 0xd7, 0x64, 0x2b, 0x5b, 0x51, 0xfc, 0xc7, 0x61, 0x93, 0x01, 0xc2, 0x1c, 0x93, 0x42, 0x55, 0xdf, 0x93, 0xee, 0xdd, 0x5b, 0x45, 0x9c, 0x8d, 0xd2, 0x80, 0xfd, 0xd0, 0x7e, 0xe6, 0x56, 0xa7, 0x14, 0x7d, 0x4d, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_182 = { .name = "ecdsa_brainpoolp224r1_sha224_182", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_182_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_182_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_182_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP224t1, tcId is 183 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 183 for ECDSA, tcId is 184 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_183_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0xc5, 0xb1, 0x9e, 0x75, 0xe8, 0x57, 0xe6, 0x7c, 0xeb, 0x4c, 0xb9, 0x8f, 0xb2, 0xff, 0x31, 0xc9, 0x17, 0x67, 0x64, 0xff, 0x25, 0x9d, 0x11, 0x08, 0x7e, 0x1e, 0xa2, 0x20, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_183_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_183_sig[] = { 0x98, 0xa8, 0xa9, 0x8f, 0xcc, 0x82, 0xf8, 0x04, 0xa8, 0x23, 0xcc, 0x91, 0x07, 0x24, 0x37, 0xcf, 0xd8, 0x83, 0x22, 0xb8, 0x67, 0x16, 0x86, 0x51, 0x7f, 0x19, 0x78, 0xab, 0x6a, 0xc3, 0xe8, 0x37, 0x76, 0x68, 0x5b, 0xce, 0xce, 0xfe, 0xba, 0xe4, 0x73, 0xac, 0x07, 0xc7, 0x71, 0xe8, 0x3b, 0x0c, 0x5a, 0x55, 0x7e, 0xfe, 0x83, 0x50, 0x20, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_183 = { .name = "ecdsa_brainpoolp224r1_sha224_183", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_183_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_183_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_183_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP224t1, tcId is 184 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 184 for ECDSA, tcId is 185 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_184_pubkey[] = { 0xc5, 0xdc, 0x51, 0x35, 0xf0, 0x50, 0xa9, 0x6b, 0xbb, 0x0d, 0x21, 0x88, 0x51, 0x95, 0xb4, 0x9a, 0x57, 0x4d, 0x51, 0x98, 0xba, 0xac, 0x4b, 0x46, 0x02, 0xb2, 0x1b, 0xc8, 0xb5, 0xf3, 0x8b, 0x7f, 0xe6, 0x61, 0x00, 0x3f, 0xae, 0xe1, 0xb7, 0xaf, 0x67, 0x0e, 0x16, 0x5b, 0xfa, 0xb7, 0x0b, 0x01, 0x89, 0x65, 0xe8, 0x33, 0x29, 0xd4, 0x05, 0xbc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_184_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_184_sig[] = { 0x69, 0x9c, 0x40, 0xb7, 0x35, 0x23, 0x6b, 0xd9, 0x23, 0x97, 0x70, 0xa5, 0xde, 0x2c, 0x1a, 0x75, 0x54, 0x63, 0x1e, 0x6b, 0xa6, 0xef, 0x51, 0x2f, 0x85, 0x53, 0xd0, 0x2f, 0x0b, 0xca, 0x9c, 0x51, 0x6c, 0xa4, 0x05, 0xff, 0xc9, 0xae, 0x2d, 0xce, 0xe1, 0x2a, 0xd7, 0xd9, 0x6b, 0x58, 0x6b, 0xfd, 0xc8, 0x18, 0xa3, 0xd4, 0x5d, 0xcf, 0xcf, 0x26, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_184 = { .name = "ecdsa_brainpoolp224r1_sha224_184", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_184_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_184_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_184_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP224t1, tcId is 185 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 185 for ECDSA, tcId is 186 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_185_pubkey[] = { 0xc5, 0xdc, 0x51, 0x35, 0xf0, 0x50, 0xa9, 0x6b, 0xbb, 0x0d, 0x21, 0x88, 0x51, 0x95, 0xb4, 0x9a, 0x57, 0x4d, 0x51, 0x98, 0xba, 0xac, 0x4b, 0x46, 0x02, 0xb2, 0x1b, 0xc8, 0xb5, 0xf3, 0x8b, 0x7f, 0xe6, 0x61, 0x00, 0x3f, 0xae, 0xe1, 0xb7, 0xaf, 0x67, 0x0e, 0x16, 0x5b, 0xfa, 0xb7, 0x0b, 0x01, 0x89, 0x65, 0xe8, 0x33, 0x29, 0xd4, 0x05, 0xbc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_185_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_185_sig[] = { 0x76, 0x8a, 0x81, 0x9d, 0x39, 0x43, 0xfc, 0x30, 0x78, 0x1a, 0xae, 0xf2, 0x8f, 0xa1, 0x20, 0x18, 0x4c, 0x72, 0x12, 0xd0, 0x91, 0x1f, 0xe0, 0x3d, 0xfc, 0x8c, 0x62, 0x60, 0x51, 0xb3, 0xdb, 0x0e, 0x1c, 0x3e, 0x93, 0x91, 0x49, 0xcc, 0xbf, 0x9d, 0x46, 0x19, 0xbb, 0xbf, 0xf0, 0xe2, 0xe1, 0x74, 0x11, 0x0f, 0x6e, 0xce, 0x43, 0x13, 0xb4, 0xca, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_185 = { .name = "ecdsa_brainpoolp224r1_sha224_185", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_185_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_185_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_185_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP224t1, tcId is 186 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 186 for ECDSA, tcId is 187 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_186_pubkey[] = { 0xc5, 0xdc, 0x51, 0x35, 0xf0, 0x50, 0xa9, 0x6b, 0xbb, 0x0d, 0x21, 0x88, 0x51, 0x95, 0xb4, 0x9a, 0x57, 0x4d, 0x51, 0x98, 0xba, 0xac, 0x4b, 0x46, 0x02, 0xb2, 0x1b, 0xc8, 0xb5, 0xf3, 0x8b, 0x7f, 0xe6, 0x61, 0x00, 0x3f, 0xae, 0xe1, 0xb7, 0xaf, 0x67, 0x0e, 0x16, 0x5b, 0xfa, 0xb7, 0x0b, 0x01, 0x89, 0x65, 0xe8, 0x33, 0x29, 0xd4, 0x05, 0xbc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_186_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_186_sig[] = { 0x58, 0xfc, 0xc0, 0xff, 0xb1, 0x25, 0xc2, 0x3c, 0x43, 0x57, 0x35, 0xb7, 0xc3, 0x90, 0x69, 0x20, 0x37, 0xc0, 0x3a, 0x67, 0x65, 0xef, 0x7b, 0x53, 0x65, 0xa1, 0x7d, 0xd4, 0x95, 0x18, 0xd2, 0x9d, 0x78, 0xed, 0xa9, 0xcb, 0x25, 0x03, 0xfd, 0xe3, 0x8d, 0x3b, 0x73, 0xd6, 0xfb, 0x90, 0xa0, 0xd4, 0x0a, 0x23, 0xf0, 0xec, 0x26, 0x16, 0x69, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_186 = { .name = "ecdsa_brainpoolp224r1_sha224_186", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_186_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_186_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_186_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP224t1, tcId is 187 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 187 for ECDSA, tcId is 188 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_187_pubkey[] = { 0xc1, 0xb5, 0x6a, 0x1a, 0xd1, 0x54, 0xe1, 0x15, 0x56, 0xb7, 0x23, 0xfc, 0x74, 0x93, 0xf3, 0x6e, 0x66, 0x50, 0x9d, 0x8f, 0x68, 0xfa, 0xd0, 0xe6, 0x2c, 0x40, 0xf0, 0x85, 0x9b, 0x04, 0x78, 0x0a, 0x85, 0xe6, 0x9a, 0xbf, 0x98, 0xde, 0xf3, 0x33, 0x5c, 0xe6, 0x43, 0xcd, 0x35, 0x54, 0x16, 0x7a, 0x8b, 0x50, 0xd5, 0x96, 0xb9, 0x53, 0x88, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_187_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_187_sig[] = { 0xd1, 0x93, 0xee, 0x0a, 0x3d, 0x42, 0xa2, 0x3a, 0xf0, 0x18, 0xab, 0x90, 0x89, 0x6b, 0x35, 0xd5, 0xc2, 0x50, 0x18, 0x7b, 0xf9, 0xfb, 0x1c, 0xca, 0xc3, 0x64, 0x74, 0x8c, 0xa0, 0x92, 0x2a, 0xcc, 0xc7, 0x56, 0x2d, 0x01, 0x71, 0x09, 0xe9, 0x1d, 0x2f, 0x83, 0xe4, 0x8b, 0xfa, 0x3c, 0x1f, 0xa2, 0xee, 0x04, 0xd8, 0x46, 0x9b, 0xe9, 0x40, 0x33, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_187 = { .name = "ecdsa_brainpoolp224r1_sha224_187", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_187_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_187_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_187_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 188 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 188 for ECDSA, tcId is 189 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_188_pubkey[] = { 0xc1, 0xb5, 0x6a, 0x1a, 0xd1, 0x54, 0xe1, 0x15, 0x56, 0xb7, 0x23, 0xfc, 0x74, 0x93, 0xf3, 0x6e, 0x66, 0x50, 0x9d, 0x8f, 0x68, 0xfa, 0xd0, 0xe6, 0x2c, 0x40, 0xf0, 0x85, 0x9b, 0x04, 0x78, 0x0a, 0x85, 0xe6, 0x9a, 0xbf, 0x98, 0xde, 0xf3, 0x33, 0x5c, 0xe6, 0x43, 0xcd, 0x35, 0x54, 0x16, 0x7a, 0x8b, 0x50, 0xd5, 0x96, 0xb9, 0x53, 0x88, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_188_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_188_sig[] = { 0x09, 0x74, 0x52, 0x1d, 0x7c, 0xe7, 0x53, 0xde, 0xa5, 0xd1, 0x15, 0x6f, 0xb4, 0xd9, 0x92, 0xcc, 0x61, 0x40, 0x79, 0xeb, 0x86, 0x77, 0xab, 0x36, 0xa4, 0x07, 0x8a, 0x4f, 0x83, 0x74, 0xdf, 0xba, 0xe8, 0xd0, 0x42, 0x9a, 0x6f, 0xba, 0x60, 0xfb, 0xb5, 0xd2, 0xfd, 0x55, 0x98, 0x56, 0xa5, 0xd7, 0x39, 0xf3, 0x9a, 0xa2, 0xbf, 0x1d, 0xa1, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_188 = { .name = "ecdsa_brainpoolp224r1_sha224_188", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_188_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_188_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_188_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 189 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 189 for ECDSA, tcId is 190 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_189_pubkey[] = { 0xc1, 0xb5, 0x6a, 0x1a, 0xd1, 0x54, 0xe1, 0x15, 0x56, 0xb7, 0x23, 0xfc, 0x74, 0x93, 0xf3, 0x6e, 0x66, 0x50, 0x9d, 0x8f, 0x68, 0xfa, 0xd0, 0xe6, 0x2c, 0x40, 0xf0, 0x85, 0x9b, 0x04, 0x78, 0x0a, 0x85, 0xe6, 0x9a, 0xbf, 0x98, 0xde, 0xf3, 0x33, 0x5c, 0xe6, 0x43, 0xcd, 0x35, 0x54, 0x16, 0x7a, 0x8b, 0x50, 0xd5, 0x96, 0xb9, 0x53, 0x88, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_189_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_189_sig[] = { 0x62, 0x5f, 0x47, 0x3c, 0xa2, 0xd1, 0x5b, 0xb7, 0xf1, 0x2d, 0xa1, 0x23, 0x5f, 0x90, 0xad, 0xcb, 0x69, 0xed, 0x48, 0x18, 0x74, 0x6c, 0xae, 0x2e, 0x2d, 0xb2, 0x6f, 0xe6, 0x4a, 0xb8, 0x17, 0xf6, 0xf1, 0xb9, 0xc8, 0xc4, 0x9f, 0x68, 0x1b, 0xed, 0x15, 0x68, 0x34, 0x6f, 0x53, 0xec, 0xbf, 0xac, 0xfd, 0x52, 0xd4, 0x5e, 0x27, 0xab, 0xcb, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_189 = { .name = "ecdsa_brainpoolp224r1_sha224_189", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_189_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_189_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_189_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 190 in file ecdsa_brainpoolP224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 190 for ECDSA, tcId is 1 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_190_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_190_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_190_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x13, 0x9c, 0x78, 0x24, 0x3a, 0x6e, 0x36, 0xe1, 0x24, 0xd5, 0xf5, 0xe1, 0x4b, 0x4c, 0xb8, 0x75, 0x4a, 0xbd, 0xf2, 0x0f, 0xf1, 0xa5, 0x01, 0xd5, 0x66, 0x6a, 0x42, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_190 = { .name = "ecdsa_brainpoolp224r1_sha224_190", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_190_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_190_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_190_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 191 for ECDSA, tcId is 2 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_191_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_191_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_191_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_191 = { .name = "ecdsa_brainpoolp224r1_sha224_191", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_191_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_191_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_191_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of r misses leading 0, tcId is 2 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 192 for ECDSA, tcId is 3 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_192_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_192_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_192_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_192 = { .name = "ecdsa_brainpoolp224r1_sha224_192", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_192_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_192_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_192_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of s misses leading 0, tcId is 3 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 193 for ECDSA, tcId is 4 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_193_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_193_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_193_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_193 = { .name = "ecdsa_brainpoolp224r1_sha224_193", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_193_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_193_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_193_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 4 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 194 for ECDSA, tcId is 5 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_194_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_194_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_194_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_194 = { .name = "ecdsa_brainpoolp224r1_sha224_194", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_194_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_194_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_194_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 5 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 195 for ECDSA, tcId is 6 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_195_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_195_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_195_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_195 = { .name = "ecdsa_brainpoolp224r1_sha224_195", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_195_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_195_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_195_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 6 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 196 for ECDSA, tcId is 69 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_196_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_196_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_196_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_196 = { .name = "ecdsa_brainpoolp224r1_sha224_196", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_196_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_196_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_196_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 197 for ECDSA, tcId is 70 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_197_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_197_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_197_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_197 = { .name = "ecdsa_brainpoolp224r1_sha224_197", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_197_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_197_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_197_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 70 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 198 for ECDSA, tcId is 71 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_198_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_198_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_198_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_198 = { .name = "ecdsa_brainpoolp224r1_sha224_198", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_198_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_198_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_198_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 199 for ECDSA, tcId is 72 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_199_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_199_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_199_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_199 = { .name = "ecdsa_brainpoolp224r1_sha224_199", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_199_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_199_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_199_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 72 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 200 for ECDSA, tcId is 94 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_200_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_200_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_200_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x00, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_200 = { .name = "ecdsa_brainpoolp224r1_sha224_200", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_200_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_200_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_200_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 201 for ECDSA, tcId is 95 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_201_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_201_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_201_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_201 = { .name = "ecdsa_brainpoolp224r1_sha224_201", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_201_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_201_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_201_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 95 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 202 for ECDSA, tcId is 96 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_202_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_202_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_202_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_202 = { .name = "ecdsa_brainpoolp224r1_sha224_202", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_202_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_202_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_202_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 203 for ECDSA, tcId is 97 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_203_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_203_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_203_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_203 = { .name = "ecdsa_brainpoolp224r1_sha224_203", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_203_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_203_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_203_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 97 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 204 for ECDSA, tcId is 99 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_204_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_204_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_204_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x05, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_204 = { .name = "ecdsa_brainpoolp224r1_sha224_204", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_204_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_204_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_204_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 205 for ECDSA, tcId is 100 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_205_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_205_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_205_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_205 = { .name = "ecdsa_brainpoolp224r1_sha224_205", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_205_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_205_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_205_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 100 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 206 for ECDSA, tcId is 115 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_206_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_206_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_206_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_206 = { .name = "ecdsa_brainpoolp224r1_sha224_206", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_206_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_206_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_206_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 207 for ECDSA, tcId is 116 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_207_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_207_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_207_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_207 = { .name = "ecdsa_brainpoolp224r1_sha224_207", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_207_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_207_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_207_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 116 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 208 for ECDSA, tcId is 119 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_208_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_208_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_208_sig[] = { 0x02, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_208 = { .name = "ecdsa_brainpoolp224r1_sha224_208", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_208_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_208_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_208_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 209 for ECDSA, tcId is 120 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_209_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_209_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_209_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x02, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_209 = { .name = "ecdsa_brainpoolp224r1_sha224_209", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_209_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_209_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_209_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 120 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 210 for ECDSA, tcId is 121 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_210_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_210_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_210_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0x53, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_210 = { .name = "ecdsa_brainpoolp224r1_sha224_210", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_210_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_210_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_210_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 211 for ECDSA, tcId is 122 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_211_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_211_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_211_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x90, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_211 = { .name = "ecdsa_brainpoolp224r1_sha224_211", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_211_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_211_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_211_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 122 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 212 for ECDSA, tcId is 123 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_212_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_212_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_212_sig[] = { 0x00, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_212 = { .name = "ecdsa_brainpoolp224r1_sha224_212", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_212_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_212_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_212_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 213 for ECDSA, tcId is 124 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_213_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_213_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_213_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_213 = { .name = "ecdsa_brainpoolp224r1_sha224_213", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_213_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_213_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_213_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 214 for ECDSA, tcId is 125 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_214_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_214_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_214_sig[] = { 0x00, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_214 = { .name = "ecdsa_brainpoolp224r1_sha224_214", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_214_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_214_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_214_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 215 for ECDSA, tcId is 126 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_215_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_215_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_215_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_215 = { .name = "ecdsa_brainpoolp224r1_sha224_215", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_215_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_215_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_215_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_brainpoolP224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 216 for ECDSA, tcId is 129 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_216_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_216_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_216_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_216 = { .name = "ecdsa_brainpoolp224r1_sha224_216", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_216_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_216_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_216_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 217 for ECDSA, tcId is 130 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_217_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_217_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_217_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_217 = { .name = "ecdsa_brainpoolp224r1_sha224_217", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_217_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_217_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_217_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 218 for ECDSA, tcId is 131 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_218_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_218_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_218_sig[] = { 0x01, 0xa3, 0x29, 0xe1, 0x41, 0x8c, 0x0a, 0xca, 0x9d, 0xaf, 0xf7, 0x53, 0xa4, 0x0f, 0x22, 0xdc, 0xdb, 0x66, 0x98, 0x43, 0xe6, 0x60, 0x41, 0xd1, 0x03, 0xaa, 0x30, 0xf5, 0x72, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_218 = { .name = "ecdsa_brainpoolp224r1_sha224_218", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_218_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_218_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_218_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 219 for ECDSA, tcId is 132 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_219_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_219_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_219_sig[] = { 0xf3, 0xa7, 0x77, 0xed, 0x3f, 0x83, 0xfd, 0x91, 0x5b, 0xc6, 0xf3, 0x59, 0x23, 0x80, 0xe5, 0xa9, 0xc4, 0x6a, 0xcb, 0x4f, 0x84, 0x84, 0x57, 0xbc, 0x5e, 0xe1, 0xce, 0x34, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_219 = { .name = "ecdsa_brainpoolp224r1_sha224_219", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_219_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_219_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_219_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 220 for ECDSA, tcId is 133 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_220_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_220_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_220_sig[] = { 0x34, 0x97, 0x53, 0x68, 0x9a, 0x38, 0x9b, 0xe8, 0x7a, 0x20, 0xdc, 0x81, 0x66, 0xae, 0x1e, 0xbd, 0x6a, 0x7e, 0x78, 0x65, 0x0d, 0x9c, 0xeb, 0x9f, 0xfb, 0x76, 0x9e, 0x2d, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_220 = { .name = "ecdsa_brainpoolp224r1_sha224_220", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_220_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_220_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_220_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 221 for ECDSA, tcId is 134 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_221_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_221_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_221_sig[] = { 0x0c, 0x58, 0x88, 0x12, 0xc0, 0x7c, 0x02, 0x6e, 0xa4, 0x39, 0x0c, 0xa6, 0xdc, 0x7f, 0x1a, 0x56, 0x3b, 0x95, 0x34, 0xb0, 0x7b, 0x7b, 0xa8, 0x43, 0xa1, 0x1e, 0x31, 0xcc, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_221 = { .name = "ecdsa_brainpoolp224r1_sha224_221", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_221_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_221_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_221_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 222 for ECDSA, tcId is 135 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_222_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_222_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_222_sig[] = { 0xfe, 0x5c, 0xd6, 0x1e, 0xbe, 0x73, 0xf5, 0x35, 0x62, 0x50, 0x08, 0xac, 0x5b, 0xf0, 0xdd, 0x23, 0x24, 0x99, 0x67, 0xbc, 0x19, 0x9f, 0xbe, 0x2e, 0xfc, 0x55, 0xcf, 0x0a, 0x8e, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_222 = { .name = "ecdsa_brainpoolp224r1_sha224_222", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_222_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_222_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_222_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 223 for ECDSA, tcId is 136 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_223_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_223_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_223_sig[] = { 0x01, 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_223 = { .name = "ecdsa_brainpoolp224r1_sha224_223", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_223_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_223_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_223_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 224 for ECDSA, tcId is 137 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_224_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_224_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_224_sig[] = { 0x34, 0x97, 0x53, 0x68, 0x9a, 0x38, 0x9b, 0xe8, 0x7a, 0x20, 0xdc, 0x81, 0x66, 0xae, 0x1e, 0xbd, 0x6a, 0x7e, 0x78, 0x65, 0x0d, 0x9c, 0xeb, 0x9f, 0xfb, 0x76, 0x9e, 0x2d, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_224 = { .name = "ecdsa_brainpoolp224r1_sha224_224", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_224_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_224_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_224_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 225 for ECDSA, tcId is 138 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_225_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_225_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_225_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x01, 0x9b, 0xe5, 0xf1, 0x30, 0x12, 0x18, 0x96, 0x2b, 0x2f, 0x5a, 0x6a, 0x69, 0xa0, 0x55, 0x3e, 0xbc, 0x57, 0x6f, 0x86, 0x86, 0xea, 0x18, 0x77, 0x71, 0xe4, 0xe4, 0xe4, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_225 = { .name = "ecdsa_brainpoolp224r1_sha224_225", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_225_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_225_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_225_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 226 for ECDSA, tcId is 139 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_226_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_226_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_226_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xec, 0x63, 0x87, 0xdb, 0xc5, 0x91, 0xc9, 0x1e, 0xdb, 0x2a, 0x0a, 0x1e, 0xb4, 0xb3, 0x47, 0x8a, 0xb5, 0x42, 0x0d, 0xf0, 0x0e, 0x5a, 0xfe, 0x2a, 0x99, 0x95, 0xbd, 0x71, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_226 = { .name = "ecdsa_brainpoolp224r1_sha224_226", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_226_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_226_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_226_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 227 for ECDSA, tcId is 140 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_227_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_227_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_227_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x3b, 0xdb, 0x43, 0x7a, 0x14, 0x2a, 0xd0, 0x5a, 0xfa, 0xbd, 0xc5, 0xbb, 0xd5, 0x7b, 0xbc, 0xdc, 0x79, 0xa7, 0x35, 0xc4, 0x83, 0xc6, 0x45, 0x31, 0xc0, 0xc2, 0xae, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_227 = { .name = "ecdsa_brainpoolp224r1_sha224_227", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_227_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_227_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_227_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 228 for ECDSA, tcId is 141 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_228_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_228_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_228_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0xfe, 0x64, 0x1a, 0x0e, 0xcf, 0xed, 0xe7, 0x69, 0xd4, 0xd0, 0xa5, 0x95, 0x96, 0x5f, 0xaa, 0xc1, 0x43, 0xa8, 0x90, 0x79, 0x79, 0x15, 0xe7, 0x88, 0x8e, 0x1b, 0x1b, 0x1b, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_228 = { .name = "ecdsa_brainpoolp224r1_sha224_228", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_228_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_228_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_228_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 229 for ECDSA, tcId is 142 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_229_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_229_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_229_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x01, 0xc4, 0x24, 0xbc, 0x85, 0xeb, 0xd5, 0x2f, 0xa5, 0x05, 0x42, 0x3a, 0x44, 0x2a, 0x84, 0x43, 0x23, 0x86, 0x58, 0xca, 0x3b, 0x7c, 0x39, 0xba, 0xce, 0x3f, 0x3d, 0x51, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_229 = { .name = "ecdsa_brainpoolp224r1_sha224_229", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_229_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_229_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_229_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 230 for ECDSA, tcId is 143 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_230_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_230_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_230_sig[] = { 0xcb, 0x68, 0xac, 0x97, 0x65, 0xc7, 0x64, 0x17, 0x85, 0xdf, 0x23, 0x7e, 0x99, 0x51, 0xe1, 0x42, 0x95, 0x81, 0x87, 0x9a, 0xf2, 0x63, 0x14, 0x60, 0x04, 0x89, 0x61, 0xd3, 0x3b, 0xdb, 0x43, 0x7a, 0x14, 0x2a, 0xd0, 0x5a, 0xfa, 0xbd, 0xc5, 0xbb, 0xd5, 0x7b, 0xbc, 0xdc, 0x79, 0xa7, 0x35, 0xc4, 0x83, 0xc6, 0x45, 0x31, 0xc0, 0xc2, 0xae, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_230 = { .name = "ecdsa_brainpoolp224r1_sha224_230", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_230_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_230_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_230_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 231 for ECDSA, tcId is 144 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_231_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_231_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_231_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_231 = { .name = "ecdsa_brainpoolp224r1_sha224_231", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_231_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_231_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_231_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 232 for ECDSA, tcId is 145 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_232_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_232_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_232_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_232 = { .name = "ecdsa_brainpoolp224r1_sha224_232", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_232_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_232_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_232_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 233 for ECDSA, tcId is 146 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_233_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_233_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_233_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_233 = { .name = "ecdsa_brainpoolp224r1_sha224_233", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_233_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_233_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_233_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 234 for ECDSA, tcId is 147 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_234_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_234_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_234_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_234 = { .name = "ecdsa_brainpoolp224r1_sha224_234", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_234_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_234_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_234_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 235 for ECDSA, tcId is 148 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_235_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_235_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_235_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_235 = { .name = "ecdsa_brainpoolp224r1_sha224_235", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_235_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_235_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_235_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 236 for ECDSA, tcId is 149 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_236_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_236_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_236_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_236 = { .name = "ecdsa_brainpoolp224r1_sha224_236", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_236_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_236_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_236_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 237 for ECDSA, tcId is 150 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_237_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_237_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_237_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_237 = { .name = "ecdsa_brainpoolp224r1_sha224_237", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_237_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_237_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_237_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 238 for ECDSA, tcId is 151 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_238_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_238_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_238_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_238 = { .name = "ecdsa_brainpoolp224r1_sha224_238", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_238_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_238_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_238_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 239 for ECDSA, tcId is 154 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_239_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_239_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_239_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_239 = { .name = "ecdsa_brainpoolp224r1_sha224_239", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_239_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_239_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_239_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 240 for ECDSA, tcId is 155 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_240_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_240_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_240_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_240 = { .name = "ecdsa_brainpoolp224r1_sha224_240", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_240_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_240_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_240_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 241 for ECDSA, tcId is 156 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_241_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_241_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_241_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_241 = { .name = "ecdsa_brainpoolp224r1_sha224_241", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_241_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_241_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_241_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 242 for ECDSA, tcId is 157 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_242_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_242_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_242_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_242 = { .name = "ecdsa_brainpoolp224r1_sha224_242", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_242_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_242_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_242_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 243 for ECDSA, tcId is 158 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_243_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_243_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_243_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_243 = { .name = "ecdsa_brainpoolp224r1_sha224_243", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_243_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_243_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_243_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 244 for ECDSA, tcId is 159 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_244_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_244_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_244_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_244 = { .name = "ecdsa_brainpoolp224r1_sha224_244", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_244_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_244_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_244_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 245 for ECDSA, tcId is 160 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_245_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_245_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_245_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_245 = { .name = "ecdsa_brainpoolp224r1_sha224_245", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_245_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_245_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_245_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 246 for ECDSA, tcId is 161 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_246_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_246_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_246_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_246 = { .name = "ecdsa_brainpoolp224r1_sha224_246", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_246_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_246_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_246_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 247 for ECDSA, tcId is 164 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_247_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_247_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_247_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_247 = { .name = "ecdsa_brainpoolp224r1_sha224_247", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_247_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_247_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_247_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 248 for ECDSA, tcId is 165 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_248_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_248_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_248_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_248 = { .name = "ecdsa_brainpoolp224r1_sha224_248", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_248_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_248_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_248_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 249 for ECDSA, tcId is 166 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_249_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_249_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_249_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_249 = { .name = "ecdsa_brainpoolp224r1_sha224_249", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_249_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_249_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_249_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 250 for ECDSA, tcId is 167 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_250_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_250_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_250_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_250 = { .name = "ecdsa_brainpoolp224r1_sha224_250", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_250_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_250_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_250_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 251 for ECDSA, tcId is 168 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_251_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_251_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_251_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_251 = { .name = "ecdsa_brainpoolp224r1_sha224_251", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_251_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_251_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_251_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 252 for ECDSA, tcId is 169 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_252_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_252_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_252_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_252 = { .name = "ecdsa_brainpoolp224r1_sha224_252", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_252_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_252_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_252_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 253 for ECDSA, tcId is 170 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_253_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_253_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_253_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_253 = { .name = "ecdsa_brainpoolp224r1_sha224_253", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_253_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_253_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_253_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 254 for ECDSA, tcId is 171 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_254_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_254_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_254_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_254 = { .name = "ecdsa_brainpoolp224r1_sha224_254", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_254_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_254_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_254_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 255 for ECDSA, tcId is 174 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_255_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_255_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_255_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_255 = { .name = "ecdsa_brainpoolp224r1_sha224_255", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_255_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_255_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_255_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 256 for ECDSA, tcId is 175 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_256_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_256_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_256_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_256 = { .name = "ecdsa_brainpoolp224r1_sha224_256", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_256_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_256_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_256_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 257 for ECDSA, tcId is 176 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_257_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_257_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_257_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_257 = { .name = "ecdsa_brainpoolp224r1_sha224_257", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_257_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_257_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_257_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 258 for ECDSA, tcId is 177 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_258_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_258_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_258_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_258 = { .name = "ecdsa_brainpoolp224r1_sha224_258", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_258_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_258_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_258_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 259 for ECDSA, tcId is 178 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_259_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_259_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_259_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_259 = { .name = "ecdsa_brainpoolp224r1_sha224_259", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_259_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_259_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_259_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 260 for ECDSA, tcId is 179 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_260_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_260_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_260_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_260 = { .name = "ecdsa_brainpoolp224r1_sha224_260", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_260_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_260_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_260_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 261 for ECDSA, tcId is 180 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_261_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_261_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_261_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_261 = { .name = "ecdsa_brainpoolp224r1_sha224_261", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_261_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_261_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_261_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 262 for ECDSA, tcId is 181 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_262_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_262_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_262_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_262 = { .name = "ecdsa_brainpoolp224r1_sha224_262", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_262_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_262_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_262_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 263 for ECDSA, tcId is 184 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_263_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_263_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_263_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_263 = { .name = "ecdsa_brainpoolp224r1_sha224_263", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_263_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_263_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_263_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 264 for ECDSA, tcId is 185 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_264_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_264_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_264_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_264 = { .name = "ecdsa_brainpoolp224r1_sha224_264", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_264_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_264_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_264_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 265 for ECDSA, tcId is 186 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_265_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_265_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_265_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_265 = { .name = "ecdsa_brainpoolp224r1_sha224_265", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_265_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_265_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_265_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 266 for ECDSA, tcId is 187 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_266_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_266_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_266_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_266 = { .name = "ecdsa_brainpoolp224r1_sha224_266", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_266_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_266_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_266_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 267 for ECDSA, tcId is 188 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_267_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_267_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_267_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_267 = { .name = "ecdsa_brainpoolp224r1_sha224_267", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_267_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_267_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_267_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 268 for ECDSA, tcId is 189 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_268_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_268_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_268_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_268 = { .name = "ecdsa_brainpoolp224r1_sha224_268", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_268_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_268_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_268_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 269 for ECDSA, tcId is 190 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_269_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_269_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_269_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_269 = { .name = "ecdsa_brainpoolp224r1_sha224_269", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_269_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_269_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_269_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 270 for ECDSA, tcId is 191 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_270_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_270_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_270_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_270 = { .name = "ecdsa_brainpoolp224r1_sha224_270", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_270_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_270_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_270_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 271 for ECDSA, tcId is 194 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_271_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_271_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_271_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_271 = { .name = "ecdsa_brainpoolp224r1_sha224_271", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_271_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_271_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_271_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 272 for ECDSA, tcId is 195 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_272_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_272_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_272_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_272 = { .name = "ecdsa_brainpoolp224r1_sha224_272", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_272_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_272_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_272_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 273 for ECDSA, tcId is 196 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_273_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_273_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_273_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_273 = { .name = "ecdsa_brainpoolp224r1_sha224_273", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_273_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_273_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_273_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 274 for ECDSA, tcId is 197 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_274_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_274_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_274_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_274 = { .name = "ecdsa_brainpoolp224r1_sha224_274", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_274_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_274_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_274_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 275 for ECDSA, tcId is 198 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_275_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_275_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_275_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_275 = { .name = "ecdsa_brainpoolp224r1_sha224_275", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_275_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_275_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_275_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 276 for ECDSA, tcId is 199 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_276_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_276_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_276_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_276 = { .name = "ecdsa_brainpoolp224r1_sha224_276", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_276_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_276_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_276_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 277 for ECDSA, tcId is 200 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_277_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_277_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_277_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_277 = { .name = "ecdsa_brainpoolp224r1_sha224_277", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_277_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_277_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_277_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 278 for ECDSA, tcId is 201 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_278_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_278_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_278_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_278 = { .name = "ecdsa_brainpoolp224r1_sha224_278", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_278_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_278_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_278_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 279 for ECDSA, tcId is 204 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_279_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_279_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_279_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_279 = { .name = "ecdsa_brainpoolp224r1_sha224_279", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_279_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_279_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_279_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 280 for ECDSA, tcId is 205 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_280_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_280_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_280_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_280 = { .name = "ecdsa_brainpoolp224r1_sha224_280", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_280_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_280_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_280_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 281 for ECDSA, tcId is 206 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_281_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_281_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_281_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_281 = { .name = "ecdsa_brainpoolp224r1_sha224_281", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_281_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_281_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_281_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 282 for ECDSA, tcId is 207 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_282_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_282_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_282_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_282 = { .name = "ecdsa_brainpoolp224r1_sha224_282", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_282_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_282_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_282_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 283 for ECDSA, tcId is 208 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_283_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_283_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_283_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_283 = { .name = "ecdsa_brainpoolp224r1_sha224_283", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_283_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_283_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_283_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 284 for ECDSA, tcId is 209 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_284_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_284_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_284_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_284 = { .name = "ecdsa_brainpoolp224r1_sha224_284", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_284_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_284_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_284_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 285 for ECDSA, tcId is 210 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_285_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_285_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_285_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_285 = { .name = "ecdsa_brainpoolp224r1_sha224_285", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_285_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_285_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_285_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 286 for ECDSA, tcId is 211 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_286_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_286_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_286_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_286 = { .name = "ecdsa_brainpoolp224r1_sha224_286", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_286_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_286_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_286_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 287 for ECDSA, tcId is 214 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_287_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_287_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_287_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_287 = { .name = "ecdsa_brainpoolp224r1_sha224_287", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_287_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_287_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_287_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 288 for ECDSA, tcId is 215 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_288_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_288_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_288_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_288 = { .name = "ecdsa_brainpoolp224r1_sha224_288", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_288_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_288_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_288_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 289 for ECDSA, tcId is 216 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_289_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_289_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_289_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_289 = { .name = "ecdsa_brainpoolp224r1_sha224_289", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_289_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_289_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_289_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 290 for ECDSA, tcId is 217 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_290_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_290_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_290_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_290 = { .name = "ecdsa_brainpoolp224r1_sha224_290", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_290_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_290_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_290_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 291 for ECDSA, tcId is 218 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_291_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_291_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_291_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_291 = { .name = "ecdsa_brainpoolp224r1_sha224_291", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_291_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_291_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_291_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 292 for ECDSA, tcId is 219 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_292_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_292_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_292_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_292 = { .name = "ecdsa_brainpoolp224r1_sha224_292", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_292_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_292_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_292_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 293 for ECDSA, tcId is 220 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_293_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_293_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_293_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_293 = { .name = "ecdsa_brainpoolp224r1_sha224_293", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_293_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_293_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_293_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 294 for ECDSA, tcId is 221 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_294_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_294_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_294_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc1, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_294 = { .name = "ecdsa_brainpoolp224r1_sha224_294", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_294_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_294_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_294_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 295 for ECDSA, tcId is 230 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_295_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_295_msg[] = { 0x39, 0x35, 0x33, 0x38, 0x38, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_295_sig[] = { 0x0e, 0x7e, 0xca, 0xb2, 0x27, 0x6f, 0x03, 0x5c, 0x0d, 0xc7, 0x05, 0x20, 0xeb, 0xd5, 0xae, 0x3c, 0xb7, 0xb7, 0xa8, 0xf2, 0x1f, 0xa5, 0x68, 0x7e, 0xee, 0x92, 0xc4, 0x62, 0x85, 0xa8, 0x53, 0x32, 0xf8, 0xc8, 0x99, 0xb5, 0x3d, 0x43, 0x09, 0x1b, 0x02, 0xe6, 0x95, 0x6b, 0x39, 0x18, 0x17, 0xe1, 0x75, 0xa8, 0xb1, 0xf4, 0x0d, 0xca, 0x7e, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_295 = { .name = "ecdsa_brainpoolp224r1_sha224_295", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_295_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_295_msg, .msglen = 5, .sig = ecdsa_brainpoolp224r1_sha224_295_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 296 for ECDSA, tcId is 231 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_296_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_296_msg[] = { 0x32, 0x32, 0x35, 0x34, 0x36, 0x32, 0x38, 0x39, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_296_sig[] = { 0x2f, 0xc2, 0xef, 0x9f, 0x76, 0x63, 0xf6, 0x6f, 0x13, 0xb0, 0x4e, 0x49, 0xf2, 0x06, 0xc2, 0x24, 0x41, 0xeb, 0x3e, 0xe1, 0x91, 0x7b, 0x8b, 0xf8, 0x1a, 0x9b, 0x53, 0x76, 0xd1, 0xdf, 0x3d, 0xd0, 0x27, 0x0e, 0x58, 0x84, 0xe9, 0x84, 0x8e, 0xa2, 0x81, 0x2b, 0x66, 0xf5, 0x01, 0x5b, 0xe9, 0x6d, 0x25, 0x85, 0xfe, 0xd3, 0x95, 0x7b, 0x31, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_296 = { .name = "ecdsa_brainpoolp224r1_sha224_296", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_296_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_296_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_296_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 297 for ECDSA, tcId is 232 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_297_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_297_msg[] = { 0x31, 0x38, 0x32, 0x37, 0x38, 0x37, 0x38, 0x36, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_297_sig[] = { 0xc6, 0x82, 0x58, 0x7b, 0xf4, 0x3e, 0x0c, 0x95, 0x4e, 0xb5, 0x8b, 0xbc, 0xfe, 0xb9, 0x4d, 0xfa, 0xc8, 0xba, 0xd4, 0x04, 0x99, 0x5a, 0xc2, 0x6e, 0x8e, 0x51, 0xff, 0x20, 0x92, 0xbf, 0x10, 0xda, 0x10, 0x32, 0x4c, 0xc3, 0x22, 0xf7, 0x9c, 0x41, 0x2d, 0xae, 0xd3, 0x05, 0xb2, 0x75, 0xfc, 0x19, 0x93, 0xbf, 0x3a, 0xf5, 0x23, 0xde, 0xd6, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_297 = { .name = "ecdsa_brainpoolp224r1_sha224_297", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_297_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_297_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_297_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 298 for ECDSA, tcId is 233 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_298_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_298_msg[] = { 0x31, 0x35, 0x31, 0x38, 0x38, 0x36, 0x31, 0x37, 0x30, 0x39, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_298_sig[] = { 0x02, 0x5d, 0x1c, 0xf1, 0x6f, 0x03, 0x34, 0x1f, 0x3c, 0x8d, 0x16, 0xa7, 0x78, 0x39, 0xb5, 0xc1, 0xd6, 0x96, 0x36, 0x3d, 0xae, 0x89, 0x8d, 0x91, 0xe1, 0x4a, 0xd5, 0x22, 0xb7, 0x37, 0x9c, 0xc3, 0x5c, 0x97, 0xa8, 0xf0, 0x8b, 0x0e, 0xfb, 0x32, 0xee, 0x82, 0xce, 0x0e, 0x19, 0x11, 0x69, 0x5d, 0x37, 0x2e, 0xe6, 0xd6, 0x79, 0xec, 0x54, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_298 = { .name = "ecdsa_brainpoolp224r1_sha224_298", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_298_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_298_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_298_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 299 for ECDSA, tcId is 234 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_299_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_299_msg[] = { 0x32, 0x31, 0x32, 0x39, 0x32, 0x33, 0x33, 0x34, 0x32, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_299_sig[] = { 0xc0, 0xc9, 0x49, 0xe0, 0xf0, 0xf8, 0x57, 0x18, 0x02, 0xea, 0x7e, 0x02, 0x61, 0x7c, 0xa9, 0x25, 0xb9, 0x5d, 0x29, 0x0a, 0x17, 0x4f, 0x68, 0x6d, 0x80, 0xbb, 0xa1, 0xd4, 0xb9, 0x66, 0x17, 0x3c, 0xe3, 0xf1, 0x3c, 0xa5, 0x4c, 0xcd, 0xc8, 0xa2, 0x49, 0xfe, 0xa7, 0x2e, 0x32, 0x60, 0xad, 0x3e, 0x78, 0x54, 0xa7, 0x31, 0x05, 0x1d, 0x8c, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_299 = { .name = "ecdsa_brainpoolp224r1_sha224_299", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_299_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_299_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_299_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 300 for ECDSA, tcId is 235 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_300_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_300_msg[] = { 0x31, 0x32, 0x32, 0x31, 0x39, 0x37, 0x39, 0x30, 0x35, 0x39, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_300_sig[] = { 0x5d, 0x57, 0xf1, 0x42, 0x75, 0x94, 0x7c, 0x9b, 0xff, 0xea, 0x66, 0xf9, 0xf3, 0x0a, 0xe2, 0x03, 0x19, 0x45, 0x35, 0xf8, 0x02, 0x0c, 0x42, 0xbb, 0xc1, 0xef, 0xec, 0x73, 0xc3, 0x58, 0x65, 0x1b, 0xa2, 0x52, 0x7c, 0x32, 0xd8, 0x58, 0x65, 0x7c, 0xcf, 0x08, 0xe5, 0x35, 0xd3, 0x28, 0x51, 0xfb, 0xd8, 0xc3, 0x54, 0x77, 0xba, 0x17, 0x56, 0x80, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_300 = { .name = "ecdsa_brainpoolp224r1_sha224_300", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_300_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_300_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_300_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 301 for ECDSA, tcId is 236 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_301_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_301_msg[] = { 0x32, 0x33, 0x30, 0x32, 0x35, 0x36, 0x37, 0x36, 0x31, 0x31, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_301_sig[] = { 0x13, 0x3b, 0xb1, 0x2f, 0x10, 0x96, 0x98, 0x9d, 0xc8, 0x67, 0xd8, 0x74, 0xf6, 0x75, 0xfd, 0xf9, 0xe9, 0x79, 0x75, 0xc2, 0xe2, 0x2c, 0x71, 0xe4, 0x4f, 0x59, 0xbf, 0x35, 0x65, 0x57, 0xee, 0xb2, 0xb5, 0xb4, 0xf1, 0xf7, 0xc8, 0x51, 0x84, 0xdc, 0xc6, 0x53, 0x85, 0x0c, 0x34, 0xb1, 0xc3, 0x48, 0x0d, 0x2f, 0x32, 0xd1, 0x56, 0x7c, 0x25, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_301 = { .name = "ecdsa_brainpoolp224r1_sha224_301", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_301_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_301_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_301_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 302 for ECDSA, tcId is 237 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_302_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_302_msg[] = { 0x31, 0x31, 0x30, 0x35, 0x38, 0x36, 0x38, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_302_sig[] = { 0xd1, 0xdc, 0x7d, 0x1c, 0xc8, 0x86, 0xca, 0x90, 0xe0, 0xd9, 0x60, 0xb6, 0xc7, 0xfd, 0xa9, 0x2e, 0xd5, 0x82, 0xec, 0x61, 0x6c, 0x1c, 0x79, 0xb1, 0x71, 0xef, 0x31, 0x08, 0x41, 0xa7, 0xd2, 0x14, 0x38, 0xe7, 0xc3, 0x4b, 0x27, 0x17, 0x60, 0x05, 0xef, 0x67, 0xc0, 0x4a, 0x63, 0xf3, 0x62, 0xd2, 0xda, 0xf1, 0x0b, 0x62, 0xc5, 0x3b, 0x88, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_302 = { .name = "ecdsa_brainpoolp224r1_sha224_302", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_302_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_302_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_302_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 303 for ECDSA, tcId is 238 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_303_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_303_msg[] = { 0x31, 0x34, 0x36, 0x36, 0x36, 0x31, 0x34, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_303_sig[] = { 0x9e, 0xc3, 0xb7, 0xb4, 0xa0, 0xf1, 0x23, 0x51, 0x69, 0xb6, 0x4a, 0x20, 0x58, 0x4d, 0x36, 0xb9, 0x6b, 0xb7, 0xa2, 0xbd, 0xe0, 0x0d, 0x23, 0x16, 0x3c, 0xc3, 0xb1, 0xbf, 0xac, 0x32, 0xef, 0x3b, 0x9e, 0x94, 0x8d, 0x96, 0x7f, 0x96, 0xcd, 0x08, 0x50, 0x78, 0x09, 0xe3, 0xb9, 0xa0, 0xe0, 0x93, 0xbe, 0x3e, 0x76, 0xb8, 0x18, 0x33, 0x1d, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_303 = { .name = "ecdsa_brainpoolp224r1_sha224_303", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_303_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_303_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_303_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 304 for ECDSA, tcId is 239 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_304_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_304_msg[] = { 0x34, 0x34, 0x31, 0x39, 0x35, 0x36, 0x34, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_304_sig[] = { 0x39, 0x2a, 0xe3, 0x81, 0xda, 0x4c, 0xcf, 0xd9, 0xd5, 0xad, 0x09, 0x3d, 0x49, 0xb2, 0x2d, 0x57, 0x94, 0x11, 0xf7, 0xc1, 0xcd, 0x04, 0xe8, 0x84, 0x73, 0xab, 0x6e, 0xf5, 0xa2, 0x89, 0x8b, 0x8b, 0xf1, 0x20, 0xd1, 0x8e, 0x4e, 0xe0, 0xd1, 0x5c, 0x41, 0x90, 0x44, 0x32, 0x4d, 0xe3, 0xc0, 0x92, 0x7e, 0xe9, 0x0f, 0xd6, 0xf3, 0x87, 0x11, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_304 = { .name = "ecdsa_brainpoolp224r1_sha224_304", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_304_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_304_msg, .msglen = 9, .sig = ecdsa_brainpoolp224r1_sha224_304_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 305 for ECDSA, tcId is 240 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_305_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_305_msg[] = { 0x31, 0x39, 0x36, 0x39, 0x34, 0x38, 0x36, 0x30, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_305_sig[] = { 0xa3, 0x7b, 0x0c, 0xc8, 0x7f, 0x6d, 0x46, 0x20, 0x30, 0x30, 0x30, 0xd7, 0xac, 0x4a, 0x65, 0x72, 0xf9, 0x4c, 0x0c, 0xf4, 0x4f, 0x0a, 0x03, 0x5c, 0x0e, 0x59, 0xd0, 0x7c, 0x30, 0xc7, 0xac, 0xd8, 0xdb, 0x9e, 0x72, 0x01, 0x22, 0x08, 0xf0, 0x8d, 0xb5, 0x38, 0x1a, 0x1e, 0x54, 0xfa, 0x09, 0x8c, 0x03, 0x14, 0xa0, 0x9a, 0x30, 0x58, 0xc4, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_305 = { .name = "ecdsa_brainpoolp224r1_sha224_305", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_305_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_305_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_305_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 306 for ECDSA, tcId is 241 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_306_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_306_msg[] = { 0x32, 0x32, 0x33, 0x35, 0x36, 0x37, 0x32, 0x38, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_306_sig[] = { 0x62, 0xf6, 0x60, 0xd9, 0x3a, 0x45, 0xdf, 0xa3, 0xb6, 0x61, 0xf8, 0xb6, 0xa4, 0xd5, 0xe0, 0x6e, 0x5a, 0x1e, 0xe8, 0xa8, 0x85, 0x5a, 0xba, 0xfa, 0x40, 0x73, 0xb5, 0x13, 0xd6, 0x97, 0x8f, 0x5d, 0xa8, 0xaf, 0xcc, 0x5b, 0x39, 0x5f, 0xd4, 0xb5, 0xf3, 0xc0, 0xfd, 0xb7, 0xa2, 0x68, 0x9e, 0x6d, 0xe4, 0x6d, 0x08, 0xfb, 0x9d, 0xe7, 0x18, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_306 = { .name = "ecdsa_brainpoolp224r1_sha224_306", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_306_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_306_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_306_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 307 for ECDSA, tcId is 242 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_307_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_307_msg[] = { 0x32, 0x32, 0x35, 0x37, 0x38, 0x34, 0x33, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_307_sig[] = { 0x61, 0xaf, 0x9a, 0x2c, 0xa2, 0x05, 0x03, 0xfd, 0x62, 0xbc, 0x3c, 0x6f, 0x84, 0x34, 0x99, 0x5c, 0x6c, 0xf3, 0x03, 0x7e, 0xb6, 0xf9, 0xff, 0x62, 0x13, 0x48, 0xcf, 0x53, 0x09, 0xf8, 0xf6, 0x47, 0x13, 0x87, 0x69, 0x54, 0x8d, 0xb4, 0x60, 0xef, 0xdd, 0x83, 0x23, 0xf8, 0xca, 0xd1, 0x8a, 0x70, 0x71, 0xd3, 0xd0, 0x4d, 0x6a, 0xd3, 0x3d, 0x82, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_307 = { .name = "ecdsa_brainpoolp224r1_sha224_307", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_307_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_307_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_307_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 308 for ECDSA, tcId is 243 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_308_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_308_msg[] = { 0x39, 0x34, 0x34, 0x35, 0x30, 0x30, 0x39, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_308_sig[] = { 0x0e, 0x45, 0x9c, 0xfe, 0x37, 0x01, 0x7c, 0x8b, 0x60, 0x5e, 0x38, 0xbf, 0x5d, 0x25, 0x17, 0x65, 0x76, 0xd4, 0x75, 0xfa, 0x88, 0xde, 0xd2, 0x7b, 0xe2, 0x6a, 0xbc, 0xa7, 0xb1, 0xbb, 0x6a, 0x60, 0xcc, 0xc3, 0xd4, 0x8e, 0x8d, 0x1d, 0x4c, 0x53, 0xf9, 0x01, 0x42, 0x80, 0x6e, 0x44, 0xd9, 0x94, 0x9e, 0xbc, 0xaa, 0x05, 0xb8, 0x3e, 0x20, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_308 = { .name = "ecdsa_brainpoolp224r1_sha224_308", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_308_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_308_msg, .msglen = 9, .sig = ecdsa_brainpoolp224r1_sha224_308_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 309 for ECDSA, tcId is 244 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_309_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_309_msg[] = { 0x31, 0x36, 0x38, 0x37, 0x37, 0x38, 0x39, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_309_sig[] = { 0xd0, 0x18, 0x48, 0x82, 0xbd, 0xd6, 0xfa, 0x09, 0x99, 0x6c, 0x2f, 0xec, 0xf3, 0xcd, 0x26, 0xed, 0x86, 0xa3, 0xce, 0x15, 0x98, 0x7e, 0x06, 0xdb, 0x85, 0x0b, 0x8b, 0x2b, 0xcf, 0xf0, 0x72, 0xb2, 0x7c, 0x33, 0xf9, 0x16, 0x81, 0xd3, 0xe9, 0x5a, 0x47, 0xbe, 0xc0, 0x00, 0xcc, 0x96, 0xc5, 0xdc, 0x91, 0xf6, 0x8e, 0xcc, 0xc2, 0x1c, 0xa3, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_309 = { .name = "ecdsa_brainpoolp224r1_sha224_309", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_309_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_309_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_309_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 310 for ECDSA, tcId is 245 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_310_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_310_msg[] = { 0x33, 0x39, 0x33, 0x32, 0x36, 0x31, 0x32, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_310_sig[] = { 0x35, 0x7e, 0x96, 0xab, 0x54, 0xf4, 0xdb, 0xb3, 0xa6, 0xa3, 0xa9, 0xd1, 0xed, 0xe6, 0xdf, 0x52, 0x94, 0x63, 0x9a, 0xed, 0xfd, 0xea, 0x96, 0xe7, 0xff, 0xc9, 0xda, 0x31, 0x24, 0xeb, 0x6b, 0x7f, 0x55, 0x90, 0x67, 0x39, 0x31, 0x3e, 0xa2, 0x66, 0x5a, 0x05, 0x04, 0xa3, 0xb0, 0xbf, 0x7a, 0x9b, 0x32, 0x9c, 0x69, 0x0f, 0x4a, 0x2e, 0xdf, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_310 = { .name = "ecdsa_brainpoolp224r1_sha224_310", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_310_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_310_msg, .msglen = 9, .sig = ecdsa_brainpoolp224r1_sha224_310_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 311 for ECDSA, tcId is 246 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_311_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_311_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x35, 0x37, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_311_sig[] = { 0x0b, 0xaa, 0xf7, 0x9d, 0x52, 0x35, 0xe3, 0x26, 0x8e, 0x55, 0x43, 0x1c, 0xbd, 0x79, 0x00, 0x46, 0xc2, 0x58, 0x1e, 0xbd, 0x3f, 0x8b, 0x90, 0x62, 0x7b, 0xd4, 0x6b, 0x8b, 0x83, 0xd5, 0x6f, 0x6b, 0x56, 0xca, 0x93, 0x81, 0xb1, 0x4c, 0xa8, 0x88, 0x28, 0x1b, 0x48, 0x1c, 0xf8, 0x28, 0xe9, 0xb4, 0x3b, 0x0d, 0x41, 0x81, 0x08, 0xe8, 0x2d, 0x58, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_311 = { .name = "ecdsa_brainpoolp224r1_sha224_311", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_311_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_311_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_311_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 312 for ECDSA, tcId is 247 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_312_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_312_msg[] = { 0x36, 0x30, 0x38, 0x38, 0x37, 0x34, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_312_sig[] = { 0x7e, 0xbe, 0xf1, 0xad, 0x41, 0xde, 0x94, 0x34, 0xeb, 0x3f, 0x6f, 0x83, 0x33, 0x8f, 0x01, 0x09, 0x66, 0x6c, 0x26, 0x4d, 0x89, 0x12, 0x33, 0x42, 0xb0, 0x90, 0x0f, 0x05, 0x78, 0xa3, 0xa9, 0xfa, 0x72, 0x01, 0xc4, 0x8f, 0x92, 0x83, 0x44, 0x00, 0x4a, 0x1f, 0x51, 0x80, 0x53, 0x09, 0x9d, 0xf8, 0x69, 0x08, 0xde, 0x29, 0xee, 0xb7, 0x6a, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_312 = { .name = "ecdsa_brainpoolp224r1_sha224_312", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_312_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_312_msg, .msglen = 8, .sig = ecdsa_brainpoolp224r1_sha224_312_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 313 for ECDSA, tcId is 248 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_313_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_313_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x35, 0x36, 0x39, 0x39, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_313_sig[] = { 0x9f, 0x20, 0xab, 0xef, 0xf0, 0xaf, 0x96, 0x5d, 0xa9, 0xc5, 0x1c, 0x99, 0x50, 0x7c, 0xf5, 0xf9, 0x1d, 0x75, 0xf2, 0x3f, 0xe0, 0x2b, 0x61, 0x15, 0x02, 0x96, 0x16, 0x7c, 0xbf, 0x6f, 0xed, 0x8a, 0x8e, 0xf7, 0x26, 0xf2, 0xf6, 0x62, 0x9c, 0x4e, 0x4b, 0x50, 0xb3, 0xc2, 0xce, 0x14, 0xff, 0x43, 0x9f, 0xe9, 0xbf, 0xe6, 0x15, 0x78, 0x68, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_313 = { .name = "ecdsa_brainpoolp224r1_sha224_313", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_313_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_313_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_313_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 314 for ECDSA, tcId is 249 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_314_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_314_msg[] = { 0x39, 0x30, 0x30, 0x37, 0x36, 0x30, 0x39, 0x33, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_314_sig[] = { 0x5a, 0xd6, 0x7f, 0xf0, 0xdd, 0xf8, 0xcb, 0x88, 0x40, 0x79, 0x74, 0xf8, 0x3f, 0xea, 0x43, 0xd9, 0xd1, 0x47, 0xcb, 0xb2, 0x3d, 0xba, 0x26, 0x1f, 0xad, 0xad, 0xae, 0xdb, 0x7f, 0xd3, 0x1c, 0xcc, 0x4b, 0x36, 0x05, 0xdb, 0x42, 0xb7, 0x00, 0xa2, 0x45, 0xdf, 0x8f, 0xc6, 0x0e, 0xfb, 0xf1, 0x40, 0x6a, 0xfb, 0x4d, 0x6c, 0x8c, 0x16, 0xe0, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_314 = { .name = "ecdsa_brainpoolp224r1_sha224_314", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_314_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_314_msg, .msglen = 8, .sig = ecdsa_brainpoolp224r1_sha224_314_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 315 for ECDSA, tcId is 250 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_315_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_315_msg[] = { 0x31, 0x36, 0x30, 0x32, 0x38, 0x33, 0x36, 0x31, 0x33, 0x37, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_315_sig[] = { 0x40, 0xe0, 0xbd, 0x9a, 0x2f, 0xa5, 0xa8, 0x86, 0x78, 0xc8, 0x5c, 0x3f, 0x4d, 0x27, 0xe2, 0xae, 0x2d, 0xd0, 0x46, 0xf2, 0x9a, 0x36, 0x39, 0xec, 0x2f, 0xf2, 0x51, 0x1a, 0x16, 0xcd, 0x49, 0x21, 0x5c, 0xb0, 0x05, 0x33, 0xfd, 0x13, 0x9a, 0xe1, 0xd3, 0x63, 0x1d, 0x45, 0xfb, 0x06, 0xd5, 0xec, 0xd1, 0x13, 0x8a, 0xb4, 0x6c, 0x48, 0xa4, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_315 = { .name = "ecdsa_brainpoolp224r1_sha224_315", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_315_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_315_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_315_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 316 for ECDSA, tcId is 251 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_316_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_316_msg[] = { 0x32, 0x30, 0x38, 0x30, 0x32, 0x34, 0x35, 0x36, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_316_sig[] = { 0x9a, 0x70, 0x5d, 0xdc, 0x87, 0x67, 0xe5, 0x4c, 0xec, 0x4d, 0x1c, 0x37, 0xa2, 0x46, 0x0b, 0x3c, 0x0b, 0x31, 0xe9, 0x81, 0x1c, 0x3a, 0x42, 0x75, 0x26, 0x49, 0x9c, 0x01, 0x36, 0xa6, 0xb9, 0xdc, 0xd7, 0xc8, 0xa8, 0x1e, 0x34, 0xaf, 0xdf, 0x84, 0x5c, 0x4c, 0xc0, 0xe7, 0x34, 0x55, 0x01, 0x1b, 0xbc, 0xd7, 0x98, 0x7f, 0x88, 0x72, 0x58, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_316 = { .name = "ecdsa_brainpoolp224r1_sha224_316", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_316_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_316_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_316_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 317 for ECDSA, tcId is 252 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_317_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_317_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x37, 0x34, 0x36, 0x35, 0x39, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_317_sig[] = { 0xa5, 0x1a, 0x62, 0x5b, 0x99, 0x56, 0x8d, 0x00, 0x3e, 0x4b, 0x96, 0xe6, 0x93, 0x13, 0x6b, 0xa7, 0x52, 0x21, 0xe8, 0xe5, 0x6c, 0x9a, 0xb5, 0xe9, 0xec, 0x68, 0x16, 0xee, 0x7e, 0x20, 0x89, 0x18, 0x78, 0x55, 0x16, 0xcd, 0xa7, 0xcf, 0x70, 0x87, 0x0d, 0xd8, 0x12, 0xe8, 0x0e, 0x8f, 0x9f, 0x1b, 0x52, 0x48, 0xd9, 0x19, 0xb1, 0xff, 0x1d, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_317 = { .name = "ecdsa_brainpoolp224r1_sha224_317", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_317_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_317_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_317_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 318 for ECDSA, tcId is 253 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_318_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_318_msg[] = { 0x31, 0x31, 0x35, 0x35, 0x35, 0x37, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_318_sig[] = { 0x47, 0x20, 0xf9, 0x37, 0x10, 0x0d, 0xf5, 0x2e, 0x6a, 0xe1, 0xba, 0xf4, 0x0f, 0x8b, 0xc9, 0x50, 0xe5, 0xaf, 0x2b, 0x1f, 0x94, 0x7d, 0x04, 0x17, 0x80, 0x4a, 0x82, 0x25, 0x8b, 0x82, 0x22, 0x73, 0xfb, 0x5d, 0x47, 0x3c, 0x9c, 0x88, 0xaa, 0x3c, 0x8d, 0xde, 0xa1, 0x67, 0x61, 0x9c, 0xda, 0x12, 0xee, 0x41, 0xce, 0x65, 0xde, 0x26, 0x8a, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_318 = { .name = "ecdsa_brainpoolp224r1_sha224_318", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_318_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_318_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_318_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 319 for ECDSA, tcId is 254 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_319_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_319_msg[] = { 0x32, 0x34, 0x33, 0x32, 0x34, 0x37, 0x34, 0x36, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_319_sig[] = { 0x3d, 0x28, 0x1d, 0x98, 0xb6, 0xa6, 0x76, 0xa6, 0xed, 0xa7, 0x57, 0x0d, 0x7b, 0x4f, 0x9a, 0x08, 0xe9, 0x24, 0xc7, 0x1a, 0xfd, 0x2c, 0xb6, 0xe0, 0x62, 0xa7, 0xeb, 0xfd, 0x84, 0x46, 0xe4, 0x27, 0x47, 0xa3, 0x52, 0x51, 0x8e, 0xf6, 0x8e, 0xff, 0x05, 0x56, 0x95, 0xb4, 0x76, 0x6b, 0xdc, 0x2a, 0xd8, 0xd3, 0xfa, 0x97, 0xbc, 0x20, 0x2b, 0x43, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_319 = { .name = "ecdsa_brainpoolp224r1_sha224_319", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_319_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_319_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_319_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 320 for ECDSA, tcId is 255 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_320_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_320_msg[] = { 0x32, 0x34, 0x31, 0x37, 0x32, 0x38, 0x32, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_320_sig[] = { 0x4d, 0x34, 0x69, 0xe9, 0x39, 0xff, 0xea, 0xd9, 0x41, 0xe3, 0xcb, 0xce, 0xbc, 0xa3, 0xbc, 0xb6, 0xf3, 0xc0, 0x29, 0x64, 0x1f, 0x97, 0x70, 0x0e, 0x02, 0x81, 0x77, 0x38, 0x42, 0xcb, 0x87, 0xa1, 0x0e, 0xa1, 0x7c, 0x0e, 0x58, 0xc3, 0x82, 0x2f, 0x6a, 0xe1, 0xf3, 0xa8, 0x91, 0x8d, 0x86, 0xa8, 0x32, 0x5d, 0xef, 0x4a, 0x8c, 0x80, 0x82, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_320 = { .name = "ecdsa_brainpoolp224r1_sha224_320", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_320_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_320_msg, .msglen = 10, .sig = ecdsa_brainpoolp224r1_sha224_320_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 321 for ECDSA, tcId is 256 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_321_pubkey[] = { 0x57, 0x2e, 0xab, 0x73, 0x76, 0xd0, 0x52, 0xdf, 0xc4, 0x09, 0x23, 0xdb, 0x25, 0x34, 0x2e, 0xa9, 0xcb, 0xfc, 0xe4, 0xb8, 0x58, 0x1e, 0x10, 0x4a, 0x4c, 0x8f, 0x37, 0xc9, 0x4a, 0x70, 0x0e, 0xc5, 0xdc, 0x05, 0xa4, 0x81, 0xb2, 0xb6, 0x95, 0x32, 0x0c, 0x6f, 0x1a, 0xd2, 0xdd, 0x86, 0x28, 0x63, 0x3c, 0xdb, 0x75, 0xa9, 0x12, 0x45, 0xc2, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_321_msg[] = { 0x37, 0x37, 0x38, 0x37, 0x34, 0x37, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_321_sig[] = { 0x21, 0xe5, 0x1b, 0x79, 0xe8, 0x55, 0x4e, 0x22, 0x93, 0x7c, 0x3e, 0x5b, 0x19, 0x83, 0xb3, 0x77, 0x62, 0x59, 0x1e, 0x21, 0xf5, 0x70, 0x6e, 0x5c, 0x19, 0x82, 0xa5, 0x0c, 0x4b, 0xcd, 0xbd, 0x23, 0xb0, 0xa4, 0x71, 0xdb, 0x84, 0xd1, 0xee, 0x3e, 0xdf, 0x76, 0x77, 0xbb, 0xb1, 0x43, 0x07, 0xec, 0xc5, 0xe1, 0x02, 0x31, 0x74, 0xec, 0x5b, 0x8c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_321 = { .name = "ecdsa_brainpoolp224r1_sha224_321", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_321_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_321_msg, .msglen = 8, .sig = ecdsa_brainpoolp224r1_sha224_321_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 322 for ECDSA, tcId is 257 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_322_pubkey[] = { 0xa0, 0xef, 0x7d, 0xb1, 0xbe, 0xe0, 0xae, 0xdb, 0x5a, 0x56, 0x34, 0xf4, 0xf3, 0xb1, 0xb8, 0x8d, 0x97, 0xd2, 0xa0, 0x7f, 0x80, 0x6a, 0x71, 0x8e, 0xfe, 0x19, 0x01, 0x4d, 0xae, 0xe1, 0x04, 0x3f, 0x9e, 0x92, 0x9c, 0x32, 0xd7, 0x4a, 0xb0, 0xe4, 0xee, 0xba, 0x26, 0x23, 0xf1, 0x7b, 0xa2, 0x81, 0xb6, 0xbe, 0x87, 0x74, 0x5b, 0x59, 0xf6, 0x0e, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_322_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_322_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xdb, 0xee, 0xdf, 0x88, 0x4b, 0x0c, 0x29, 0xfb, 0xcd, 0x51, 0xd9, 0x21, 0x2d, 0x5f, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_322 = { .name = "ecdsa_brainpoolp224r1_sha224_322", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_322_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_322_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_322_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 257 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 323 for ECDSA, tcId is 258 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_323_pubkey[] = { 0xa0, 0xef, 0x7d, 0xb1, 0xbe, 0xe0, 0xae, 0xdb, 0x5a, 0x56, 0x34, 0xf4, 0xf3, 0xb1, 0xb8, 0x8d, 0x97, 0xd2, 0xa0, 0x7f, 0x80, 0x6a, 0x71, 0x8e, 0xfe, 0x19, 0x01, 0x4d, 0xae, 0xe1, 0x04, 0x3f, 0x9e, 0x92, 0x9c, 0x32, 0xd7, 0x4a, 0xb0, 0xe4, 0xee, 0xba, 0x26, 0x23, 0xf1, 0x7b, 0xa2, 0x81, 0xb6, 0xbe, 0x87, 0x74, 0x5b, 0x59, 0xf6, 0x0e, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_323_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_323_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd1, 0xd7, 0x87, 0xb0, 0x9f, 0x07, 0x57, 0x97, 0xda, 0x89, 0xf5, 0x7e, 0xc8, 0xc0, 0xfe, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_323 = { .name = "ecdsa_brainpoolp224r1_sha224_323", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_323_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_323_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_323_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 258 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 324 for ECDSA, tcId is 259 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_324_pubkey[] = { 0x3a, 0xdd, 0xa4, 0x07, 0xba, 0xd7, 0xf5, 0x93, 0xe8, 0x3d, 0x7d, 0x48, 0x4f, 0xd1, 0x4c, 0x23, 0xdd, 0xa1, 0x7f, 0x8d, 0x46, 0x0c, 0x22, 0x2a, 0xa7, 0x25, 0x75, 0x77, 0xcd, 0x62, 0x44, 0x3b, 0x2b, 0x77, 0x02, 0x91, 0xf6, 0x59, 0x04, 0xda, 0xcf, 0x75, 0xff, 0x97, 0x5f, 0x1a, 0x66, 0x71, 0x87, 0xe0, 0xe4, 0xf5, 0x0c, 0x14, 0x88, 0x9c, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_324_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_324_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9e, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_324 = { .name = "ecdsa_brainpoolp224r1_sha224_324", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_324_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_324_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_324_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 259 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 325 for ECDSA, tcId is 260 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_325_pubkey[] = { 0x24, 0x58, 0x7c, 0xe1, 0xdb, 0xff, 0x28, 0x1d, 0xca, 0xb1, 0x79, 0x45, 0x19, 0x80, 0x62, 0x81, 0xad, 0x4e, 0x09, 0x97, 0x49, 0x25, 0x10, 0x67, 0x7f, 0xb6, 0x51, 0x06, 0x92, 0x96, 0x99, 0x6e, 0x83, 0xb8, 0x08, 0x67, 0x6c, 0xbf, 0x6f, 0x28, 0xc9, 0x2b, 0x84, 0x30, 0x33, 0x14, 0xb6, 0x3a, 0x03, 0x08, 0x13, 0x4f, 0x22, 0x2d, 0x0e, 0xc2, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_325_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_325_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x63, 0xf0, 0xe3, 0x42, 0x58, 0xbb, 0x90, 0x61, 0x54, 0x79, 0x06, 0xd0, 0xc3, 0x82, 0x7c, 0x50, 0x44, 0x22, 0xc1, 0x39, 0xe6, 0xd6, 0xe1, 0x07, 0x8b, 0x37, 0xaa, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_325 = { .name = "ecdsa_brainpoolp224r1_sha224_325", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_325_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_325_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_325_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 260 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 326 for ECDSA, tcId is 261 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_326_pubkey[] = { 0xc4, 0x5c, 0x51, 0xd5, 0xa9, 0xb2, 0x13, 0xe4, 0x1c, 0xa6, 0xf1, 0x5c, 0xb8, 0xaa, 0x1b, 0xc0, 0xb8, 0xb7, 0x3d, 0x3a, 0x8a, 0x23, 0xa1, 0x4f, 0x5a, 0x3d, 0xa4, 0xdf, 0xbc, 0x78, 0xcc, 0x61, 0x76, 0xd3, 0xb8, 0x31, 0xe6, 0x88, 0x00, 0x67, 0x17, 0x68, 0x04, 0x3c, 0x11, 0xbf, 0x63, 0xa6, 0x95, 0x91, 0x8d, 0xf6, 0xec, 0x87, 0x37, 0x8a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_326_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_326_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x6e, 0xb1, 0xfb, 0xfa, 0x8d, 0xf8, 0x7d, 0x4f, 0xa1, 0x0c, 0x83, 0x3f, 0x7d, 0xd1, 0xbb, 0xe7, 0xef, 0x01, 0x44, 0xff, 0x71, 0x53, 0x79, 0x75, 0x37, 0x8f, 0x91, 0xec, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_326 = { .name = "ecdsa_brainpoolp224r1_sha224_326", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_326_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_326_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_326_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 261 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 327 for ECDSA, tcId is 262 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_327_pubkey[] = { 0x36, 0xa5, 0x34, 0x4d, 0xa0, 0x8a, 0x42, 0x1e, 0xdc, 0x6c, 0x3b, 0xeb, 0x7d, 0xe9, 0x7a, 0x75, 0x59, 0xfc, 0x10, 0x1c, 0x14, 0x89, 0xff, 0x2b, 0x50, 0x36, 0xd8, 0xf6, 0x20, 0x7b, 0xf4, 0x66, 0x6e, 0x4d, 0xf6, 0x06, 0xbd, 0x0d, 0x98, 0x23, 0xa5, 0x2b, 0x58, 0xdd, 0xfd, 0xfc, 0x1d, 0xa7, 0x05, 0x13, 0xc5, 0xf9, 0x99, 0x0f, 0x80, 0x85, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_327_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_327_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_327 = { .name = "ecdsa_brainpoolp224r1_sha224_327", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_327_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_327_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_327_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 262 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 328 for ECDSA, tcId is 263 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_328_pubkey[] = { 0x40, 0x95, 0xc0, 0x95, 0xa9, 0x64, 0x89, 0x51, 0xda, 0x35, 0x2b, 0x83, 0x7f, 0x36, 0x8e, 0x0b, 0xe6, 0x7d, 0x79, 0xfd, 0x57, 0xea, 0xdf, 0xff, 0xed, 0xdf, 0xb4, 0x55, 0xcc, 0xdc, 0xfa, 0xbe, 0xa1, 0x9e, 0x96, 0xd4, 0xd2, 0x0e, 0x42, 0xb8, 0xae, 0x23, 0xc2, 0x51, 0x94, 0x26, 0x01, 0x8e, 0x25, 0xa6, 0x4d, 0xea, 0x85, 0xd8, 0xa6, 0x8b, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_328_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_328_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_328 = { .name = "ecdsa_brainpoolp224r1_sha224_328", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_328_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_328_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_328_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 263 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 329 for ECDSA, tcId is 264 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_329_pubkey[] = { 0xcc, 0x35, 0x2a, 0xc4, 0x8a, 0xac, 0xb6, 0x49, 0x5e, 0xc3, 0x83, 0x1b, 0x21, 0xcc, 0xd4, 0xd3, 0x19, 0x71, 0x36, 0x29, 0x2b, 0xf6, 0xf2, 0x0f, 0x22, 0x80, 0x25, 0x66, 0x64, 0x32, 0x19, 0x91, 0xe6, 0x7f, 0x7d, 0xbc, 0x22, 0x60, 0x2e, 0xcb, 0xdb, 0x31, 0x22, 0xed, 0xce, 0x5f, 0xf8, 0x5d, 0x92, 0x31, 0x43, 0xce, 0xcc, 0x0d, 0x4f, 0x6d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_329_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_329_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_329 = { .name = "ecdsa_brainpoolp224r1_sha224_329", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_329_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_329_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_329_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 264 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 330 for ECDSA, tcId is 265 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_330_pubkey[] = { 0xcc, 0x35, 0x2a, 0xc4, 0x8a, 0xac, 0xb6, 0x49, 0x5e, 0xc3, 0x83, 0x1b, 0x21, 0xcc, 0xd4, 0xd3, 0x19, 0x71, 0x36, 0x29, 0x2b, 0xf6, 0xf2, 0x0f, 0x22, 0x80, 0x25, 0x66, 0x64, 0x32, 0x19, 0x91, 0xe6, 0x7f, 0x7d, 0xbc, 0x22, 0x60, 0x2e, 0xcb, 0xdb, 0x31, 0x22, 0xed, 0xce, 0x5f, 0xf8, 0x5d, 0x92, 0x31, 0x43, 0xce, 0xcc, 0x0d, 0x4f, 0x6d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_330_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_330_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_330 = { .name = "ecdsa_brainpoolp224r1_sha224_330", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_330_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_330_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_330_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 265 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 331 for ECDSA, tcId is 266 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_331_pubkey[] = { 0x91, 0x48, 0xf2, 0x9c, 0x67, 0xf8, 0x3c, 0x70, 0x5e, 0xef, 0xb5, 0x9c, 0x92, 0x95, 0x47, 0x75, 0xf9, 0x0c, 0x15, 0xe2, 0x25, 0xda, 0x2e, 0x99, 0x6a, 0xbc, 0xdd, 0x1d, 0xc9, 0xdb, 0x1a, 0xa1, 0xe1, 0x52, 0x77, 0xc4, 0x55, 0x5d, 0x24, 0x11, 0x82, 0x39, 0xe5, 0x3f, 0xd2, 0xf0, 0xb5, 0xe7, 0xea, 0x80, 0x7e, 0xb3, 0xde, 0x1e, 0xe3, 0x50, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_331_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_331_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xba, 0x6a, 0x26, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_331 = { .name = "ecdsa_brainpoolp224r1_sha224_331", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_331_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_331_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_331_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 266 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 332 for ECDSA, tcId is 267 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_332_pubkey[] = { 0x9b, 0xf0, 0x45, 0xa4, 0x3a, 0x5f, 0x14, 0xd5, 0xe4, 0x12, 0xee, 0x18, 0x1f, 0x11, 0x1d, 0x6e, 0x53, 0x96, 0x11, 0x20, 0x53, 0x1f, 0x3c, 0x50, 0xca, 0x70, 0x1e, 0x78, 0xbe, 0x9e, 0xb9, 0x51, 0x46, 0xf4, 0xf2, 0xbe, 0x96, 0x94, 0x99, 0x76, 0xa7, 0xaa, 0x49, 0xd3, 0x15, 0x93, 0xa7, 0xda, 0x2e, 0xdd, 0x90, 0x76, 0x52, 0x39, 0x8c, 0x3a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_332_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_332_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x9d, 0xfe, 0x5c, 0xfd, 0x9b, 0x02, 0xfe, 0x7a, 0x6f, 0x74, 0x7b, 0xf3, 0x1d, 0xd5, 0x81, 0xd0, 0xa9, 0x3c, 0xfe, 0xcc, 0x66, 0xa1, 0x17, 0x3d, 0x61, 0x1d, 0xfd, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_332 = { .name = "ecdsa_brainpoolp224r1_sha224_332", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_332_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_332_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_332_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 267 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 333 for ECDSA, tcId is 268 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_333_pubkey[] = { 0x87, 0x73, 0x9e, 0x28, 0x21, 0xed, 0x95, 0x67, 0xe8, 0x87, 0x02, 0xfa, 0x8c, 0x6d, 0x08, 0x3c, 0x97, 0xc1, 0xf3, 0xf1, 0xeb, 0x32, 0xd1, 0x3f, 0x75, 0x1f, 0xb0, 0x73, 0x6d, 0x02, 0xeb, 0xa0, 0x5e, 0x8c, 0xb9, 0x46, 0x72, 0xd0, 0x9e, 0xbc, 0x11, 0x05, 0x1d, 0x52, 0xec, 0x7b, 0xd4, 0xdc, 0x77, 0x67, 0x30, 0x1b, 0x67, 0x03, 0x42, 0x12, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_333_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_333_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x43, 0xe2, 0x35, 0x74, 0x8b, 0xd3, 0xb1, 0xbf, 0xa1, 0x4c, 0x92, 0x23, 0x4a, 0x90, 0x26, 0x1a, 0xcc, 0x3e, 0x90, 0x86, 0x81, 0x08, 0x01, 0xa3, 0x67, 0x46, 0xbc, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_333 = { .name = "ecdsa_brainpoolp224r1_sha224_333", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_333_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_333_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_333_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 268 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 334 for ECDSA, tcId is 269 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_334_pubkey[] = { 0x1a, 0x51, 0x5c, 0xbe, 0x95, 0x7b, 0xfc, 0x07, 0x0e, 0x4c, 0x4a, 0x75, 0xd6, 0xfd, 0x5e, 0x7c, 0x15, 0xb1, 0xe2, 0x55, 0xeb, 0x42, 0xfe, 0xad, 0x06, 0xc9, 0xd2, 0x63, 0x62, 0x52, 0xcc, 0x0d, 0x23, 0x43, 0x18, 0x39, 0x4d, 0xf7, 0xdb, 0x65, 0xb0, 0xa5, 0x2e, 0x06, 0x95, 0x3c, 0xa6, 0xc2, 0x1e, 0xc9, 0x57, 0x74, 0xd3, 0x9e, 0xfd, 0xc9, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_334_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_334_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0xa8, 0xbd, 0xf4, 0x65, 0x32, 0xd8, 0x13, 0x6b, 0xeb, 0x21, 0xdb, 0xf1, 0x78, 0x09, 0x0c, 0x7e, 0x7d, 0xad, 0x2c, 0xaa, 0x8e, 0xb5, 0x2c, 0xef, 0x8d, 0x83, 0x0f, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_334 = { .name = "ecdsa_brainpoolp224r1_sha224_334", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_334_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_334_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_334_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 269 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 335 for ECDSA, tcId is 270 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_335_pubkey[] = { 0xd6, 0xa1, 0x6e, 0x19, 0x4e, 0x12, 0xb9, 0x6d, 0xb8, 0xe1, 0xbb, 0x02, 0x50, 0xd9, 0x50, 0xf7, 0xb3, 0x12, 0x9b, 0x14, 0xbb, 0xa0, 0xef, 0xb1, 0x57, 0xc4, 0x42, 0x3e, 0x62, 0x5a, 0x0c, 0x8c, 0x20, 0x83, 0x8b, 0xd9, 0x7f, 0xbc, 0x89, 0xf1, 0x67, 0x00, 0x28, 0x75, 0x4a, 0x09, 0xad, 0x28, 0xf6, 0x2d, 0xe5, 0xee, 0xa6, 0xe0, 0x7b, 0xc1, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_335_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_335_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x02, 0x73, 0x16, 0x8a, 0x89, 0x94, 0xe5, 0xf7, 0x17, 0x93, 0x08, 0x1c, 0xb7, 0xaf, 0xbe, 0x3c, 0x0a, 0xf4, 0xbf, 0x7a, 0xa3, 0x36, 0xcf, 0x9d, 0xe3, 0x1e, 0xf8, 0x53, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_335 = { .name = "ecdsa_brainpoolp224r1_sha224_335", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_335_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_335_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_335_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 270 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 336 for ECDSA, tcId is 271 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_336_pubkey[] = { 0xc0, 0x12, 0x95, 0x0d, 0x07, 0x4b, 0xb0, 0x1b, 0x0a, 0x19, 0x88, 0xa5, 0xb5, 0x9b, 0x95, 0x91, 0x04, 0x27, 0x5b, 0xaf, 0x75, 0x7e, 0x53, 0x02, 0x9b, 0x04, 0x6a, 0x15, 0x42, 0xf5, 0x0f, 0xe2, 0x7f, 0x3e, 0xba, 0xc9, 0x03, 0x65, 0x58, 0xef, 0x30, 0xeb, 0xcb, 0x81, 0x20, 0x27, 0xbf, 0x0e, 0xf4, 0x6c, 0xda, 0x51, 0x96, 0x95, 0x41, 0xbb, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_336_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_336_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0x73, 0x16, 0x8a, 0x89, 0x94, 0xe5, 0xf7, 0x17, 0x93, 0x08, 0x1c, 0xb7, 0xaf, 0xbe, 0x3c, 0x0a, 0xf4, 0xbf, 0x7a, 0xa3, 0x36, 0xcf, 0x9d, 0xe3, 0x1e, 0xf8, 0x53, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_336 = { .name = "ecdsa_brainpoolp224r1_sha224_336", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_336_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_336_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_336_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 271 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 337 for ECDSA, tcId is 272 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_337_pubkey[] = { 0xd1, 0x5c, 0x13, 0xa1, 0xbe, 0x99, 0xd9, 0xeb, 0x77, 0xd6, 0x88, 0x10, 0x4a, 0x18, 0xe2, 0x42, 0x42, 0xd2, 0x05, 0xa4, 0x02, 0x6f, 0x4a, 0x65, 0x62, 0x9e, 0x59, 0xee, 0x7e, 0x3d, 0xdf, 0x9a, 0xbb, 0xb7, 0xd5, 0x32, 0xb6, 0xe8, 0x1a, 0x6e, 0x11, 0xf3, 0x0d, 0x5b, 0x55, 0xfe, 0xb8, 0xee, 0x70, 0x7c, 0x4f, 0xed, 0xf9, 0x9c, 0x06, 0x07, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_337_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_337_sig[] = { 0xd7, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0x1f, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_337 = { .name = "ecdsa_brainpoolp224r1_sha224_337", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_337_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_337_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_337_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 272 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 338 for ECDSA, tcId is 273 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_338_pubkey[] = { 0x3f, 0xe0, 0x19, 0x72, 0xc0, 0x62, 0x2e, 0xa8, 0x12, 0xd3, 0x06, 0x52, 0xc9, 0xfe, 0x2f, 0xeb, 0xee, 0x70, 0x81, 0x23, 0xb1, 0x62, 0x6d, 0x74, 0x4f, 0x87, 0xdb, 0x0d, 0xa5, 0x72, 0xc7, 0xe1, 0xe3, 0xa4, 0x81, 0x95, 0xe6, 0x22, 0x1d, 0x98, 0x3f, 0x78, 0x2f, 0xdc, 0x9e, 0x7c, 0x55, 0xbd, 0x5f, 0xdf, 0x7b, 0x67, 0x9b, 0x0f, 0x87, 0x56, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_338_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_338_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_338 = { .name = "ecdsa_brainpoolp224r1_sha224_338", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_338_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_338_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_338_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 273 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 339 for ECDSA, tcId is 274 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_339_pubkey[] = { 0x3f, 0xe0, 0x19, 0x72, 0xc0, 0x62, 0x2e, 0xa8, 0x12, 0xd3, 0x06, 0x52, 0xc9, 0xfe, 0x2f, 0xeb, 0xee, 0x70, 0x81, 0x23, 0xb1, 0x62, 0x6d, 0x74, 0x4f, 0x87, 0xdb, 0x0d, 0xa5, 0x72, 0xc7, 0xe1, 0xe3, 0xa4, 0x81, 0x95, 0xe6, 0x22, 0x1d, 0x98, 0x3f, 0x78, 0x2f, 0xdc, 0x9e, 0x7c, 0x55, 0xbd, 0x5f, 0xdf, 0x7b, 0x67, 0x9b, 0x0f, 0x87, 0x56, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_339_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_339_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_339 = { .name = "ecdsa_brainpoolp224r1_sha224_339", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_339_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_339_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_339_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 274 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 340 for ECDSA, tcId is 275 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_340_pubkey[] = { 0xd4, 0xb6, 0xe5, 0x11, 0x24, 0x06, 0xfb, 0x74, 0x3b, 0x6b, 0xb5, 0x5f, 0x49, 0xea, 0x20, 0x30, 0xd9, 0x04, 0x42, 0x08, 0x31, 0xeb, 0xdd, 0xac, 0xd6, 0x7b, 0xba, 0x89, 0x65, 0x22, 0x65, 0x38, 0x4b, 0x75, 0xd8, 0x50, 0xe7, 0xc2, 0x7f, 0x4e, 0x33, 0xed, 0x6c, 0x57, 0x6d, 0xf0, 0xff, 0x96, 0x94, 0x70, 0xa9, 0xef, 0x25, 0xff, 0xaf, 0xcd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_340_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_340_sig[] = { 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xcf, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_340 = { .name = "ecdsa_brainpoolp224r1_sha224_340", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_340_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_340_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_340_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 275 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 341 for ECDSA, tcId is 276 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_341_pubkey[] = { 0x16, 0xc2, 0x12, 0x9d, 0x54, 0xb9, 0x34, 0x79, 0xb5, 0x6a, 0x9f, 0xf5, 0xb8, 0x3e, 0x4c, 0x75, 0x0b, 0xb4, 0xf3, 0x3e, 0xe1, 0xe7, 0x0f, 0x38, 0xb5, 0x44, 0x9f, 0x2d, 0x34, 0xcc, 0xaf, 0x79, 0xc5, 0x1c, 0x7d, 0xff, 0x3a, 0x7f, 0x9a, 0x05, 0xcd, 0x15, 0xa3, 0x96, 0xe0, 0xcf, 0xfe, 0x25, 0x42, 0x1c, 0x37, 0xe9, 0xb8, 0x0e, 0x14, 0x89, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_341_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_341_sig[] = { 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xd0, 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_341 = { .name = "ecdsa_brainpoolp224r1_sha224_341", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_341_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_341_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_341_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 276 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 342 for ECDSA, tcId is 277 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_342_pubkey[] = { 0x65, 0xab, 0xa0, 0xe4, 0x42, 0x7a, 0x0a, 0xe5, 0x58, 0x72, 0x1a, 0x5a, 0x8e, 0x72, 0xcb, 0x37, 0x62, 0xeb, 0x50, 0x22, 0x3b, 0xbe, 0x4c, 0x41, 0xa4, 0x50, 0xfe, 0x49, 0xc8, 0x1d, 0x3a, 0xe4, 0x86, 0x47, 0x8b, 0x42, 0x98, 0xc9, 0x43, 0x28, 0x3d, 0x2e, 0xc2, 0x13, 0x0b, 0xac, 0x22, 0xfa, 0xbc, 0x52, 0xf7, 0x43, 0xb1, 0xab, 0x7f, 0xa7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_342_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_342_sig[] = { 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xd0, 0x6b, 0xe0, 0x9a, 0x55, 0x13, 0x21, 0xb3, 0x43, 0x15, 0x0c, 0x18, 0x12, 0xba, 0xe8, 0x7d, 0xcc, 0x68, 0x8b, 0x5e, 0x25, 0xb6, 0xef, 0x5e, 0x51, 0xd2, 0xd3, 0xc9, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_342 = { .name = "ecdsa_brainpoolp224r1_sha224_342", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_342_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_342_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_342_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 277 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 343 for ECDSA, tcId is 278 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_343_pubkey[] = { 0x55, 0xa7, 0xb0, 0x10, 0x06, 0x13, 0xfa, 0xbd, 0x95, 0x7b, 0x42, 0x60, 0x08, 0x35, 0xc6, 0xd4, 0x2e, 0x01, 0xe0, 0x42, 0x52, 0x59, 0x3b, 0xdd, 0xe3, 0xb1, 0x72, 0x78, 0x87, 0x70, 0x8a, 0x05, 0xab, 0xa2, 0xf9, 0x3f, 0x1a, 0x1e, 0x1e, 0xcb, 0x70, 0x3e, 0xc9, 0xa8, 0xee, 0x6d, 0x60, 0x13, 0xa1, 0x01, 0xd3, 0x97, 0x01, 0x2a, 0x8c, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_343_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_343_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_343 = { .name = "ecdsa_brainpoolp224r1_sha224_343", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_343_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_343_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_343_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 278 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 344 for ECDSA, tcId is 279 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_344_pubkey[] = { 0x1a, 0xda, 0x54, 0xdc, 0x01, 0x58, 0x61, 0x68, 0x0d, 0x8b, 0xb2, 0xd3, 0x11, 0xb9, 0x0e, 0x82, 0xdb, 0x75, 0xaa, 0x9e, 0x82, 0x17, 0xb9, 0x26, 0x11, 0xfa, 0x03, 0xcb, 0x84, 0xc6, 0x11, 0x55, 0x11, 0x97, 0x29, 0x8b, 0x32, 0x74, 0x87, 0x5c, 0xb9, 0x46, 0x86, 0xe7, 0x58, 0xf0, 0xa1, 0xa9, 0x67, 0x5c, 0x0b, 0xc1, 0x57, 0x45, 0x1a, 0x76, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_344_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_344_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x62, 0x85, 0x80, 0xa9, 0xad, 0xb0, 0x26, 0x04, 0x52, 0x5b, 0x1e, 0xe6, 0xb1, 0x35, 0xe1, 0xa9, 0xc7, 0x45, 0x02, 0x18, 0x24, 0x58, 0x2c, 0x52, 0x38, 0x5a, 0x81, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_344 = { .name = "ecdsa_brainpoolp224r1_sha224_344", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_344_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_344_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_344_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 279 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 345 for ECDSA, tcId is 280 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_345_pubkey[] = { 0xc6, 0x7b, 0x64, 0x29, 0x78, 0x53, 0x34, 0xa6, 0x08, 0xdd, 0xe9, 0x49, 0xa8, 0xab, 0xe6, 0x41, 0xdb, 0xd3, 0x60, 0x1e, 0xbc, 0xe1, 0xe6, 0x75, 0xfe, 0x71, 0xa8, 0xe5, 0x27, 0xd2, 0xe8, 0x72, 0x7d, 0xc4, 0xf6, 0x18, 0x49, 0x35, 0x50, 0xbb, 0x94, 0x01, 0x51, 0xbc, 0xa6, 0x82, 0x6f, 0x71, 0x4c, 0x5b, 0x31, 0x85, 0x40, 0x38, 0xf4, 0x4d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_345_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_345_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_345 = { .name = "ecdsa_brainpoolp224r1_sha224_345", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_345_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_345_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_345_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 280 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 346 for ECDSA, tcId is 281 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_346_pubkey[] = { 0x1d, 0xcc, 0x7a, 0x5a, 0xd1, 0x11, 0xa3, 0x36, 0x27, 0xf9, 0x2d, 0xd8, 0x75, 0xba, 0x4a, 0x06, 0xf6, 0xa7, 0xc2, 0xbe, 0xfd, 0xd1, 0x05, 0x04, 0x88, 0xd0, 0x57, 0xa7, 0x34, 0x1c, 0xae, 0x0b, 0xe7, 0x2a, 0x99, 0x77, 0x6d, 0xb5, 0xbd, 0x79, 0xb4, 0x63, 0xe2, 0xd3, 0x88, 0x27, 0x64, 0xaf, 0x9c, 0x02, 0x45, 0xd0, 0x84, 0xa3, 0x34, 0x2d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_346_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_346_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x8f, 0xd6, 0x23, 0x1c, 0x19, 0x82, 0x44, 0x59, 0x71, 0x65, 0x75, 0x6e, 0x4e, 0x8b, 0x52, 0x65, 0xe0, 0xb9, 0xd2, 0xdc, 0xf3, 0xe9, 0xd3, 0x17, 0xc3, 0xc5, 0x0d, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_346 = { .name = "ecdsa_brainpoolp224r1_sha224_346", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_346_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_346_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_346_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 281 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 347 for ECDSA, tcId is 282 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_347_pubkey[] = { 0xbd, 0xf7, 0x08, 0xa0, 0x1c, 0x6a, 0x81, 0x47, 0x28, 0xd3, 0x94, 0xb7, 0xf2, 0x9b, 0xf6, 0x57, 0x97, 0x34, 0x86, 0x2d, 0x8a, 0xf8, 0xe6, 0xff, 0x78, 0x6f, 0xbe, 0x49, 0x90, 0x1c, 0xd4, 0x62, 0x94, 0x6e, 0x5e, 0x36, 0xcc, 0x97, 0xc9, 0x89, 0x6d, 0xf2, 0xe1, 0x81, 0x77, 0x45, 0x6d, 0x28, 0x2a, 0x7a, 0x26, 0xa3, 0x80, 0x84, 0xc0, 0x86, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_347_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_347_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0xb6, 0xea, 0x09, 0xc6, 0xec, 0x5e, 0x04, 0x84, 0xb9, 0x4f, 0x25, 0xd8, 0x90, 0x14, 0x5b, 0x0a, 0xe3, 0xff, 0xbb, 0x98, 0xb7, 0x16, 0xad, 0xdd, 0x92, 0xde, 0xbd, 0xce, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_347 = { .name = "ecdsa_brainpoolp224r1_sha224_347", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_347_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_347_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_347_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 282 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 348 for ECDSA, tcId is 283 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_348_pubkey[] = { 0x0c, 0x53, 0x1f, 0xb3, 0xd9, 0x96, 0xfa, 0xa2, 0x24, 0x07, 0xdf, 0x13, 0x05, 0xff, 0x6a, 0xe0, 0xbf, 0xe9, 0x4e, 0x1c, 0x20, 0x22, 0xf4, 0x73, 0x0d, 0x0f, 0x8a, 0x4a, 0xbd, 0x80, 0x73, 0x95, 0x04, 0x59, 0x56, 0x2e, 0x53, 0x9a, 0xc0, 0x89, 0x54, 0x33, 0x75, 0x7e, 0x25, 0x20, 0x9b, 0x12, 0x53, 0x4f, 0xf3, 0x0f, 0xe3, 0xd3, 0x7c, 0x71, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_348_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_348_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x2f, 0x62, 0xa9, 0xcf, 0x48, 0xe3, 0xca, 0x60, 0x2e, 0xef, 0x4e, 0x33, 0xaf, 0xa4, 0x3f, 0x2d, 0xce, 0xb9, 0x22, 0xa4, 0x0a, 0x67, 0xde, 0x79, 0xf7, 0xb1, 0xae, 0x38, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_348 = { .name = "ecdsa_brainpoolp224r1_sha224_348", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_348_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_348_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_348_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 283 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 349 for ECDSA, tcId is 284 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_349_pubkey[] = { 0x67, 0x82, 0x95, 0x40, 0x82, 0x41, 0x8e, 0x00, 0x02, 0xa0, 0x81, 0x26, 0x72, 0xac, 0x21, 0x23, 0xb6, 0x33, 0x4b, 0x34, 0x13, 0x40, 0x55, 0x50, 0x96, 0xbc, 0xf6, 0xc6, 0x1f, 0x6f, 0xa1, 0xa8, 0xfe, 0xa6, 0x17, 0xd9, 0xdd, 0xa1, 0x44, 0x61, 0xd6, 0x3a, 0xa4, 0x48, 0xf2, 0x05, 0xa3, 0x9b, 0x25, 0x50, 0x1a, 0x6b, 0x1d, 0x42, 0xee, 0x5f, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_349_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_349_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x61, 0x8d, 0xfc, 0x54, 0x40, 0x8b, 0xec, 0x1c, 0xb3, 0x7c, 0x7e, 0xe5, 0x2b, 0x60, 0xad, 0xbc, 0x8d, 0x3a, 0x6c, 0x26, 0x45, 0x7c, 0x39, 0xd0, 0x13, 0xe8, 0x8e, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_349 = { .name = "ecdsa_brainpoolp224r1_sha224_349", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_349_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_349_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_349_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 284 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 350 for ECDSA, tcId is 285 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_350_pubkey[] = { 0x5b, 0x5e, 0x6e, 0xab, 0xa7, 0x59, 0x7a, 0xe6, 0x41, 0x42, 0x0a, 0xce, 0x6a, 0xf2, 0x57, 0x58, 0x39, 0xf1, 0x61, 0xb2, 0x7b, 0x91, 0xb2, 0x70, 0xf1, 0x8b, 0xf7, 0xd0, 0x49, 0x6a, 0xb3, 0xc3, 0x07, 0x2f, 0xa6, 0xee, 0x55, 0x78, 0xfc, 0x81, 0x4f, 0x74, 0xd1, 0x48, 0xec, 0xbc, 0x2a, 0x98, 0xcf, 0xdc, 0x5d, 0x40, 0xec, 0x7e, 0x69, 0x80, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_350_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_350_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x01, 0x0d, 0xe5, 0x71, 0x24, 0xc0, 0x93, 0x0e, 0xf8, 0x00, 0xe7, 0x64, 0xb5, 0x58, 0x59, 0x27, 0x97, 0x7e, 0x2a, 0xd2, 0xd8, 0xb8, 0x2e, 0x7c, 0xb6, 0x48, 0xaf, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_350 = { .name = "ecdsa_brainpoolp224r1_sha224_350", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_350_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_350_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_350_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 285 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 351 for ECDSA, tcId is 286 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_351_pubkey[] = { 0x8e, 0x66, 0x1a, 0x06, 0xad, 0x55, 0xb5, 0x22, 0x78, 0x01, 0xea, 0x43, 0x09, 0xa7, 0x2b, 0x9c, 0xd9, 0x49, 0x73, 0xbc, 0x87, 0x3c, 0x04, 0x05, 0xe1, 0x24, 0x7d, 0x1e, 0x64, 0x89, 0x8b, 0x82, 0x2c, 0x36, 0x3c, 0xac, 0x88, 0x21, 0x30, 0x2d, 0xe3, 0x8a, 0x91, 0x42, 0x68, 0xaa, 0xa6, 0x7d, 0xb2, 0x56, 0x18, 0x78, 0xf0, 0xf9, 0x0a, 0x02, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_351_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_351_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x03, 0x3e, 0xf5, 0x01, 0x0b, 0xec, 0xed, 0x04, 0xc4, 0x92, 0x88, 0x68, 0x51, 0x3e, 0xd1, 0x87, 0x8c, 0xe6, 0x77, 0xa6, 0xed, 0x81, 0x0e, 0x9b, 0x99, 0xdd, 0x97, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_351 = { .name = "ecdsa_brainpoolp224r1_sha224_351", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_351_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_351_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_351_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 286 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 352 for ECDSA, tcId is 287 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_352_pubkey[] = { 0xb3, 0xd2, 0xb9, 0x3f, 0x14, 0x88, 0x65, 0x72, 0x62, 0x14, 0x0f, 0x96, 0xc1, 0x08, 0xaa, 0x04, 0x85, 0x93, 0x9b, 0xd9, 0x94, 0x40, 0x24, 0x0a, 0x7a, 0x7d, 0x54, 0xe3, 0x88, 0x96, 0x81, 0x74, 0xb0, 0x61, 0x85, 0x37, 0x39, 0xf8, 0xb0, 0x47, 0x1c, 0x76, 0x12, 0x65, 0x39, 0xdc, 0x57, 0xcc, 0x6d, 0x7c, 0x1f, 0x53, 0x9f, 0x68, 0x66, 0x74, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_352_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_352_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x06, 0x7d, 0xea, 0x02, 0x17, 0xd9, 0xda, 0x09, 0x89, 0x25, 0x10, 0xd0, 0xa2, 0x7d, 0xa3, 0x0f, 0x19, 0xcc, 0xef, 0x4d, 0xdb, 0x02, 0x1d, 0x37, 0x33, 0xbb, 0x2f, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_352 = { .name = "ecdsa_brainpoolp224r1_sha224_352", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_352_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_352_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_352_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 287 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 353 for ECDSA, tcId is 288 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_353_pubkey[] = { 0xba, 0x83, 0x0d, 0xbf, 0x83, 0x07, 0x5c, 0xd1, 0x82, 0xbc, 0x93, 0x22, 0xc1, 0xf6, 0x29, 0x9a, 0x4c, 0xe3, 0xcf, 0x4d, 0xdd, 0xe0, 0xe6, 0xfc, 0xee, 0x50, 0xf0, 0xd6, 0x2b, 0x15, 0x3f, 0x6f, 0x37, 0x7a, 0x88, 0x80, 0x9c, 0x9d, 0xd5, 0x0d, 0x8d, 0x61, 0xeb, 0x67, 0x94, 0x51, 0x44, 0x48, 0x16, 0x57, 0x86, 0xa7, 0xc6, 0x55, 0x8d, 0xcc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_353_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_353_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x45, 0x84, 0x7e, 0x02, 0xfd, 0x01, 0xa3, 0xcc, 0x9e, 0x06, 0x3f, 0x96, 0x1f, 0xb9, 0x20, 0xab, 0x32, 0x71, 0xec, 0x09, 0x99, 0x6f, 0x75, 0xbc, 0xa7, 0xfe, 0x6d, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_353 = { .name = "ecdsa_brainpoolp224r1_sha224_353", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_353_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_353_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_353_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 288 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 354 for ECDSA, tcId is 289 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_354_pubkey[] = { 0x77, 0xf4, 0x02, 0x22, 0xe4, 0xa7, 0x9a, 0x0f, 0xa7, 0xe5, 0x10, 0x88, 0x7e, 0x69, 0xeb, 0xa3, 0x1f, 0x6d, 0xd7, 0x06, 0x71, 0x21, 0xda, 0xfe, 0x73, 0x9b, 0xbe, 0x13, 0xd0, 0xff, 0xab, 0x72, 0x22, 0xcf, 0x6d, 0x82, 0x7c, 0x51, 0xeb, 0x53, 0xab, 0xac, 0x50, 0x6b, 0xc0, 0xa5, 0xd7, 0xc1, 0xa5, 0xa7, 0xe1, 0x68, 0x3d, 0x49, 0xe4, 0x3e, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_354_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_354_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x0b, 0x4c, 0xbe, 0x86, 0x6d, 0x19, 0x20, 0x63, 0x41, 0x38, 0xc8, 0x79, 0x8f, 0xcc, 0x41, 0x47, 0x94, 0x47, 0xe5, 0xae, 0x76, 0x07, 0x94, 0xe1, 0xe5, 0x79, 0x79, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_354 = { .name = "ecdsa_brainpoolp224r1_sha224_354", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_354_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_354_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_354_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 289 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 355 for ECDSA, tcId is 290 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_355_pubkey[] = { 0x59, 0x7b, 0x5a, 0x3c, 0x10, 0x6b, 0x8c, 0x4e, 0x9a, 0x7e, 0x7a, 0x51, 0x7c, 0xd7, 0x40, 0xe7, 0x76, 0x67, 0xc8, 0xa2, 0xd0, 0x6c, 0x51, 0x0e, 0x5e, 0x3b, 0x72, 0x8d, 0x9c, 0xc2, 0x49, 0xe8, 0x27, 0xf5, 0xff, 0xf9, 0x02, 0x12, 0x2e, 0xb2, 0x6b, 0xad, 0xc4, 0xa7, 0xda, 0x65, 0x55, 0xb4, 0x89, 0xba, 0x98, 0x98, 0x2d, 0x38, 0x81, 0x25, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_355_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_355_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x20, 0xd7, 0x2a, 0xe3, 0x39, 0xe5, 0x62, 0x01, 0x70, 0xc9, 0x0a, 0x4c, 0xe5, 0xbc, 0xa0, 0x8d, 0xed, 0x17, 0x00, 0xb2, 0xb6, 0xc8, 0x0e, 0xc6, 0x12, 0xc8, 0xd5, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_355 = { .name = "ecdsa_brainpoolp224r1_sha224_355", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_355_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_355_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_355_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 290 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 356 for ECDSA, tcId is 291 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_356_pubkey[] = { 0x0f, 0x24, 0x53, 0xe7, 0x58, 0x5c, 0xb1, 0x39, 0x2f, 0xf4, 0xfa, 0x11, 0x86, 0x9f, 0x8c, 0x10, 0xb2, 0xf9, 0xcf, 0x4f, 0x2a, 0x18, 0xb8, 0x66, 0xe8, 0xf3, 0x7c, 0x2b, 0xd1, 0x56, 0x6e, 0xf0, 0x49, 0x28, 0x79, 0x75, 0x79, 0xd4, 0x0f, 0x33, 0x10, 0xeb, 0xaf, 0x47, 0x7a, 0x4e, 0x78, 0xa2, 0x35, 0x86, 0x19, 0x28, 0x32, 0x86, 0x34, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_356_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_356_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x9d, 0x23, 0x5a, 0xa9, 0xe9, 0xf9, 0xc6, 0x45, 0x3e, 0x39, 0xa7, 0x86, 0x13, 0x83, 0x6e, 0xa1, 0x4c, 0x2d, 0xdf, 0x31, 0xc9, 0x1b, 0x74, 0x7a, 0xef, 0x01, 0x0a, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_356 = { .name = "ecdsa_brainpoolp224r1_sha224_356", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_356_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_356_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_356_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 291 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 357 for ECDSA, tcId is 292 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_357_pubkey[] = { 0x10, 0xcb, 0x3d, 0xbc, 0xe4, 0xda, 0x51, 0x8e, 0x04, 0xeb, 0x12, 0x5c, 0xf3, 0xb4, 0x4b, 0xef, 0x04, 0x51, 0xba, 0xd3, 0xe7, 0xcb, 0xba, 0xd5, 0x32, 0x8b, 0x85, 0xbb, 0x35, 0x86, 0x51, 0xb4, 0x78, 0xbc, 0xf2, 0x00, 0x68, 0x4f, 0xd3, 0x10, 0xe6, 0xd1, 0x4a, 0xcd, 0x23, 0xdc, 0x2a, 0x76, 0x04, 0x75, 0xdf, 0x0f, 0x5b, 0x8a, 0x75, 0x8c, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_357_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_357_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x9c, 0xa7, 0x98, 0x7f, 0x33, 0x67, 0xa9, 0x51, 0x6e, 0xca, 0x57, 0x85, 0x50, 0x98, 0xd4, 0xaa, 0xaf, 0x28, 0x94, 0x38, 0xd9, 0xad, 0x7b, 0x39, 0xdc, 0xc8, 0x11, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_357 = { .name = "ecdsa_brainpoolp224r1_sha224_357", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_357_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_357_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_357_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 292 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 358 for ECDSA, tcId is 293 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_358_pubkey[] = { 0x2c, 0x27, 0x73, 0x2a, 0xaa, 0xa3, 0xf8, 0xb1, 0x66, 0x64, 0xa4, 0x8a, 0x1d, 0xd0, 0x6f, 0xc0, 0xfe, 0x40, 0xf6, 0x57, 0x42, 0x75, 0x1e, 0x5c, 0x04, 0xb7, 0xef, 0xf5, 0x07, 0x80, 0x4b, 0x2d, 0xbe, 0xe7, 0x9f, 0xfe, 0x56, 0xdc, 0x4f, 0x4a, 0x60, 0x62, 0xce, 0xd6, 0xf3, 0x75, 0xb8, 0x0b, 0x5a, 0xd2, 0xcf, 0x3a, 0x29, 0x21, 0xb3, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_358_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_358_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x72, 0x95, 0xbc, 0x38, 0xb7, 0x6b, 0xcc, 0xd7, 0x63, 0x5d, 0x65, 0x61, 0xd1, 0xf0, 0x53, 0xdd, 0x9b, 0x07, 0x94, 0x19, 0x24, 0x9f, 0x94, 0x36, 0x8c, 0x8d, 0x31, 0x33, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_358 = { .name = "ecdsa_brainpoolp224r1_sha224_358", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_358_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_358_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_358_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 293 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 359 for ECDSA, tcId is 294 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_359_pubkey[] = { 0x8c, 0xed, 0x55, 0x68, 0x77, 0xee, 0x15, 0xaf, 0x31, 0x4a, 0xed, 0x5d, 0xfc, 0x43, 0xa0, 0x0f, 0xbb, 0x76, 0x26, 0xfb, 0xdc, 0x7b, 0x81, 0xff, 0x7d, 0xbe, 0xa2, 0xf8, 0x98, 0xf5, 0xe2, 0x6f, 0x7f, 0xc3, 0x27, 0x6d, 0xa2, 0xa8, 0xe8, 0x69, 0xb0, 0xaf, 0xbc, 0x41, 0xef, 0x3b, 0x40, 0x32, 0x60, 0x80, 0xaa, 0x85, 0xce, 0x62, 0xc2, 0xab, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_359_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_359_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x93, 0x8f, 0x2d, 0xb2, 0xb7, 0x20, 0x61, 0xab, 0xd7, 0xeb, 0x6e, 0x5c, 0x8f, 0xe6, 0x85, 0x39, 0x1e, 0x96, 0x6e, 0xc0, 0xc7, 0x69, 0xd0, 0xc5, 0x38, 0xe0, 0x67, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_359 = { .name = "ecdsa_brainpoolp224r1_sha224_359", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_359_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_359_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_359_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 294 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 360 for ECDSA, tcId is 295 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_360_pubkey[] = { 0x42, 0xb1, 0x9b, 0x22, 0x50, 0x6c, 0x4f, 0xd8, 0x9f, 0xa2, 0x8c, 0x59, 0x09, 0xd9, 0x7f, 0x8f, 0xfe, 0xbd, 0xc8, 0x28, 0x04, 0xdc, 0xc7, 0xbf, 0x6a, 0x57, 0x0a, 0xe2, 0x1a, 0x97, 0x4e, 0xe0, 0x8b, 0x48, 0x4f, 0xa0, 0x5e, 0x1f, 0xbb, 0x89, 0xc4, 0x8c, 0x50, 0x75, 0x4b, 0xa1, 0xe4, 0x0a, 0x65, 0x8a, 0x5c, 0xed, 0x40, 0x9c, 0x63, 0x61, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_360_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_360_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x7f, 0x90, 0x7c, 0x8e, 0x32, 0xe6, 0x0e, 0x2b, 0xa4, 0x03, 0x3e, 0xe7, 0xd6, 0x5f, 0x3f, 0xe8, 0xfd, 0x23, 0x71, 0x9c, 0x7a, 0x9c, 0x6f, 0x5e, 0x52, 0xf1, 0x8c, 0x47, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_360 = { .name = "ecdsa_brainpoolp224r1_sha224_360", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_360_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_360_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_360_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 295 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 361 for ECDSA, tcId is 296 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_361_pubkey[] = { 0x20, 0x95, 0xe1, 0x21, 0x16, 0xce, 0xbd, 0xd4, 0xe8, 0xbc, 0x1c, 0xc1, 0x84, 0xb5, 0x38, 0xb1, 0x51, 0x5f, 0x78, 0x9e, 0x3b, 0xe4, 0xb0, 0x3a, 0x41, 0x83, 0xfa, 0xe5, 0xd0, 0x92, 0x6e, 0x44, 0x68, 0x75, 0xab, 0xdc, 0xd1, 0x2c, 0x82, 0x39, 0xe6, 0x07, 0x96, 0x1c, 0xad, 0xd0, 0x0a, 0x2e, 0x89, 0x9d, 0x82, 0x1d, 0xb1, 0x1d, 0x56, 0x79, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_361_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_361_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x34, 0xc3, 0x97, 0x8c, 0x3a, 0x1d, 0xac, 0x92, 0x1f, 0x62, 0x35, 0xc8, 0x2a, 0x02, 0xed, 0xb9, 0x34, 0x22, 0x85, 0x46, 0x94, 0x26, 0xbb, 0x10, 0xf8, 0x28, 0x97, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_361 = { .name = "ecdsa_brainpoolp224r1_sha224_361", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_361_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_361_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_361_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 296 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 362 for ECDSA, tcId is 297 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_362_pubkey[] = { 0x58, 0xf8, 0x2e, 0xb2, 0xca, 0x6e, 0x34, 0x74, 0xa9, 0x0e, 0x29, 0xac, 0x56, 0xdc, 0xb6, 0x3d, 0x88, 0xe6, 0x69, 0xe0, 0xa4, 0x02, 0x04, 0xe6, 0x20, 0x2a, 0xf7, 0xc5, 0xa0, 0xe8, 0x5e, 0x40, 0x39, 0xf3, 0x43, 0x25, 0x5b, 0x4f, 0xe4, 0xbd, 0xc1, 0x19, 0x1a, 0x78, 0x45, 0xbd, 0xd7, 0xeb, 0x90, 0x8e, 0xcd, 0x87, 0x79, 0xa2, 0x79, 0x63, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_362_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_362_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x97, 0x01, 0xd6, 0x52, 0x3d, 0x3d, 0x3f, 0x5b, 0x8a, 0xc8, 0x40, 0x26, 0x80, 0xb3, 0xca, 0xb8, 0x96, 0x6e, 0x26, 0x51, 0xcf, 0xc1, 0x73, 0x9f, 0xcd, 0x3c, 0x07, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_362 = { .name = "ecdsa_brainpoolp224r1_sha224_362", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_362_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_362_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_362_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 297 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 363 for ECDSA, tcId is 298 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_363_pubkey[] = { 0x71, 0xf2, 0xc4, 0xa7, 0xc3, 0xf7, 0x13, 0x11, 0xa7, 0x93, 0x45, 0x8f, 0xf1, 0x22, 0x62, 0xa8, 0x63, 0x51, 0x8f, 0xb3, 0x0d, 0xbb, 0x7a, 0x80, 0x70, 0x10, 0x30, 0xb8, 0xb6, 0xb0, 0x84, 0x28, 0xfa, 0xbd, 0xb6, 0x9c, 0x8a, 0x8e, 0x9e, 0x32, 0x7d, 0xae, 0xd0, 0x79, 0x5f, 0xb8, 0x4e, 0x0d, 0x88, 0x17, 0x08, 0x60, 0x22, 0xd3, 0xb2, 0x3b, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_363_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_363_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x56, 0x42, 0x77, 0xfa, 0x54, 0x37, 0x18, 0x30, 0xeb, 0x78, 0x50, 0x27, 0x8b, 0x96, 0x99, 0xd8, 0x5b, 0xc5, 0x90, 0x58, 0x31, 0xa4, 0x2a, 0x9b, 0xf4, 0xd0, 0x7a, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_363 = { .name = "ecdsa_brainpoolp224r1_sha224_363", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_363_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_363_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_363_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 298 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 364 for ECDSA, tcId is 299 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_364_pubkey[] = { 0x3c, 0xfc, 0xf6, 0x4e, 0xec, 0xe9, 0x94, 0xc3, 0x5c, 0x56, 0xe9, 0x15, 0xe4, 0xed, 0x18, 0x83, 0xba, 0x6e, 0xc3, 0x4f, 0xe3, 0x96, 0xc1, 0x1a, 0xcd, 0x8f, 0x47, 0xd2, 0x63, 0xcd, 0xfb, 0xaa, 0x34, 0x40, 0x11, 0x00, 0xb5, 0xb1, 0x0a, 0xf7, 0x71, 0xbb, 0x46, 0xc0, 0xd5, 0x34, 0x46, 0xf7, 0xaa, 0x84, 0x79, 0x56, 0xc9, 0x36, 0x34, 0x94, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_364_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_364_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x77, 0x94, 0xfb, 0xde, 0xe6, 0x38, 0xf6, 0x57, 0xac, 0x1e, 0x4c, 0x65, 0x28, 0x4c, 0x14, 0x4b, 0x3e, 0xfa, 0x7b, 0xf4, 0x10, 0x9e, 0x6c, 0xca, 0x60, 0x5c, 0x4f, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_364 = { .name = "ecdsa_brainpoolp224r1_sha224_364", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_364_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_364_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_364_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 299 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 365 for ECDSA, tcId is 300 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_365_pubkey[] = { 0x4c, 0x40, 0x4d, 0xec, 0xbc, 0x06, 0x97, 0xb2, 0x07, 0xfa, 0x08, 0x98, 0x2e, 0xf0, 0xfe, 0xdb, 0x00, 0x1e, 0xeb, 0x43, 0xf3, 0x74, 0x04, 0xda, 0xb9, 0x7a, 0x9a, 0x77, 0x47, 0x19, 0x1b, 0xc2, 0x40, 0xdf, 0xd4, 0x40, 0x27, 0x4e, 0x06, 0x95, 0x56, 0x11, 0xf9, 0x92, 0x3f, 0xad, 0x69, 0x49, 0xb2, 0xcc, 0x15, 0x7a, 0x18, 0x5c, 0x82, 0x29, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_365_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_365_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0xb5, 0x20, 0x0d, 0xa7, 0xa4, 0x58, 0x37, 0xf5, 0xb7, 0x1c, 0x47, 0xe1, 0xb9, 0x4c, 0x78, 0x62, 0xa1, 0xe4, 0xbe, 0xcb, 0xa3, 0x0a, 0x90, 0x8a, 0xda, 0x21, 0x94, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_365 = { .name = "ecdsa_brainpoolp224r1_sha224_365", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_365_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_365_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_365_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 300 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 366 for ECDSA, tcId is 301 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_366_pubkey[] = { 0x7b, 0xe4, 0xb0, 0xea, 0x0b, 0x15, 0xb9, 0x6f, 0x91, 0x31, 0x2c, 0x15, 0xc8, 0x16, 0x29, 0xe4, 0x0c, 0x44, 0x18, 0xf7, 0x0b, 0x86, 0xc5, 0xbc, 0xdc, 0x25, 0x8f, 0xd9, 0x79, 0xcb, 0xef, 0x8e, 0xa2, 0xa7, 0x7c, 0xa0, 0x92, 0xdb, 0x0e, 0xb9, 0x54, 0xa9, 0xe3, 0x3e, 0x82, 0xb9, 0xc5, 0xf1, 0x10, 0xc8, 0xc9, 0x90, 0xb9, 0x23, 0x5a, 0x57, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_366_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_366_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x65, 0x2b, 0x78, 0x71, 0x6e, 0xd7, 0x99, 0xae, 0xc6, 0xba, 0xca, 0xc3, 0xa3, 0xe0, 0xa7, 0xbb, 0x36, 0x0f, 0x28, 0x32, 0x49, 0x3f, 0x28, 0x6d, 0x19, 0x1a, 0x62, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_366 = { .name = "ecdsa_brainpoolp224r1_sha224_366", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_366_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_366_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_366_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 301 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 367 for ECDSA, tcId is 302 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_367_pubkey[] = { 0x64, 0xa6, 0x4c, 0xff, 0xa5, 0x40, 0x66, 0x49, 0x92, 0x64, 0x99, 0x1e, 0x47, 0xa0, 0xf1, 0x4b, 0xca, 0x63, 0x19, 0xa1, 0xc2, 0x7e, 0x15, 0x08, 0xe2, 0x01, 0x6b, 0x56, 0xbd, 0xa7, 0xc1, 0x7a, 0x04, 0xd9, 0xcb, 0x88, 0xea, 0xdb, 0x72, 0x96, 0xcf, 0x87, 0xdf, 0xbf, 0xad, 0xfe, 0x65, 0x05, 0x68, 0x37, 0xa7, 0x97, 0xd6, 0x69, 0x97, 0xdd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_367_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_367_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x97, 0xc1, 0x34, 0xaa, 0x26, 0x43, 0x66, 0x86, 0x2a, 0x18, 0x30, 0x25, 0x75, 0xd0, 0xfb, 0x98, 0xd1, 0x16, 0xbc, 0x4b, 0x6d, 0xde, 0xbc, 0xa3, 0xa5, 0xa7, 0x93, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_367 = { .name = "ecdsa_brainpoolp224r1_sha224_367", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_367_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_367_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_367_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 302 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 368 for ECDSA, tcId is 303 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_368_pubkey[] = { 0x3d, 0x4c, 0x4e, 0x3c, 0x5b, 0xa7, 0xa5, 0x33, 0xc8, 0xa3, 0x38, 0x6d, 0x6f, 0xf7, 0x7a, 0x81, 0x35, 0x13, 0x46, 0xe1, 0x89, 0x4b, 0x25, 0x60, 0xb4, 0x06, 0xa6, 0x3e, 0xa3, 0x49, 0x77, 0x59, 0x46, 0x79, 0x9e, 0xeb, 0x27, 0x49, 0x26, 0xb4, 0xd9, 0x57, 0x32, 0x8f, 0x6c, 0x7d, 0x50, 0xf6, 0x76, 0x02, 0x91, 0xac, 0xda, 0xeb, 0x11, 0x4f, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_368_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_368_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0xab, 0xa8, 0xd8, 0x9c, 0x2c, 0x94, 0xba, 0x58, 0xe7, 0x0d, 0xb7, 0x86, 0xa6, 0x18, 0x1d, 0xc0, 0xe7, 0x1d, 0x16, 0xf3, 0xf4, 0x3d, 0x96, 0x00, 0xfc, 0x4c, 0x8f, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_368 = { .name = "ecdsa_brainpoolp224r1_sha224_368", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_368_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_368_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_368_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 303 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 369 for ECDSA, tcId is 304 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_369_pubkey[] = { 0x4d, 0xb8, 0xe8, 0xac, 0x43, 0xf2, 0x2d, 0xf7, 0x5c, 0x9c, 0x09, 0xfe, 0x19, 0x3b, 0x9c, 0xd8, 0x3d, 0x5c, 0x9b, 0x73, 0xf3, 0x7d, 0x14, 0x94, 0x76, 0x17, 0x24, 0xb0, 0xa7, 0x60, 0x82, 0xc3, 0x5d, 0xa8, 0x62, 0xa1, 0xe2, 0xe8, 0x62, 0x6f, 0xfa, 0x94, 0xed, 0x18, 0xfc, 0xb1, 0xd8, 0x97, 0xec, 0x7a, 0xb5, 0x2c, 0x32, 0x25, 0x53, 0xff, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_369_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_369_sig[] = { 0x7a, 0xf2, 0x95, 0xe6, 0xe4, 0x78, 0x72, 0x52, 0xf3, 0x4c, 0x52, 0x7a, 0xf5, 0x62, 0xca, 0x27, 0x21, 0x4a, 0x66, 0xf6, 0xd6, 0xdb, 0x4f, 0xd2, 0xc1, 0x12, 0xb5, 0x64, 0xb1, 0xd0, 0x10, 0xf7, 0x40, 0x62, 0xee, 0xaa, 0xc0, 0xce, 0xcb, 0x2c, 0x3c, 0x2c, 0x4d, 0x28, 0x8a, 0x57, 0x6b, 0xf6, 0xf0, 0xa0, 0x03, 0x47, 0xc6, 0xa5, 0xb5, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_369 = { .name = "ecdsa_brainpoolp224r1_sha224_369", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_369_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_369_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_369_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 304 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 370 for ECDSA, tcId is 305 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_370_pubkey[] = { 0x4d, 0xb8, 0xe8, 0xac, 0x43, 0xf2, 0x2d, 0xf7, 0x5c, 0x9c, 0x09, 0xfe, 0x19, 0x3b, 0x9c, 0xd8, 0x3d, 0x5c, 0x9b, 0x73, 0xf3, 0x7d, 0x14, 0x94, 0x76, 0x17, 0x24, 0xb0, 0x30, 0x60, 0xb1, 0xe6, 0xc8, 0x9b, 0x03, 0xe4, 0x47, 0x2f, 0xcd, 0xb5, 0x7b, 0x3c, 0xea, 0x6e, 0xb3, 0xed, 0x2e, 0xbf, 0xab, 0x5f, 0xd4, 0xc9, 0x4c, 0xa3, 0x6d, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_370_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_370_sig[] = { 0x7a, 0xf2, 0x95, 0xe6, 0xe4, 0x78, 0x72, 0x52, 0xf3, 0x4c, 0x52, 0x7a, 0xf5, 0x62, 0xca, 0x27, 0x21, 0x4a, 0x66, 0xf6, 0xd6, 0xdb, 0x4f, 0xd2, 0xc1, 0x12, 0xb5, 0x64, 0xb1, 0xd0, 0x10, 0xf7, 0x40, 0x62, 0xee, 0xaa, 0xc0, 0xce, 0xcb, 0x2c, 0x3c, 0x2c, 0x4d, 0x28, 0x8a, 0x57, 0x6b, 0xf6, 0xf0, 0xa0, 0x03, 0x47, 0xc6, 0xa5, 0xb5, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_370 = { .name = "ecdsa_brainpoolp224r1_sha224_370", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_370_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_370_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_370_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 305 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 371 for ECDSA, tcId is 306 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_371_pubkey[] = { 0x2b, 0x92, 0x26, 0x82, 0x08, 0xd5, 0x22, 0x45, 0x0c, 0x42, 0xf3, 0xfc, 0xbd, 0xa4, 0x09, 0xc3, 0xac, 0xe2, 0xa5, 0xf8, 0x57, 0xea, 0x10, 0x61, 0x2c, 0x60, 0x93, 0xf8, 0x31, 0x5e, 0xb2, 0xd4, 0x48, 0x13, 0x4e, 0x71, 0x6b, 0x03, 0x20, 0x78, 0xb6, 0x83, 0x01, 0x62, 0x2e, 0x3c, 0x21, 0x86, 0xab, 0x58, 0x3d, 0x97, 0x6e, 0x76, 0x9f, 0xeb, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_371_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_371_sig[] = { 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, 0x2b, 0x26, 0xa4, 0x22, 0x07, 0xa7, 0x14, 0x81, 0x3b, 0x9e, 0x70, 0x07, 0x7d, 0xf6, 0x98, 0xb8, 0x29, 0xd1, 0x58, 0xdb, 0xe2, 0xc6, 0x25, 0xba, 0x54, 0x54, 0xb7, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_371 = { .name = "ecdsa_brainpoolp224r1_sha224_371", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_371_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_371_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_371_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 306 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 372 for ECDSA, tcId is 307 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_372_pubkey[] = { 0x4d, 0x4b, 0xd5, 0x69, 0x3d, 0x86, 0xdd, 0x9a, 0x60, 0x16, 0xba, 0x80, 0x6d, 0x80, 0x31, 0xf9, 0x4d, 0xc8, 0xe2, 0xd3, 0x3c, 0x6f, 0x58, 0x71, 0xa0, 0x0b, 0x64, 0x73, 0x2a, 0x46, 0x62, 0xf2, 0x95, 0x24, 0xec, 0xe7, 0x54, 0x82, 0x8b, 0x9d, 0x82, 0x9c, 0x0a, 0x07, 0x24, 0xd9, 0xbd, 0x9d, 0x28, 0x8d, 0x21, 0xf8, 0x7e, 0x3f, 0xb1, 0xfa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_372_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_372_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_372 = { .name = "ecdsa_brainpoolp224r1_sha224_372", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_372_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_372_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_372_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 307 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 373 for ECDSA, tcId is 308 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_373_pubkey[] = { 0xbe, 0x0e, 0xfb, 0x48, 0x41, 0xdf, 0x37, 0xab, 0xcd, 0xcf, 0x3f, 0x28, 0xdd, 0xb0, 0xd5, 0x75, 0x1a, 0x92, 0xa0, 0xfe, 0x7a, 0x3e, 0x88, 0xd1, 0xab, 0x02, 0x83, 0x2c, 0xbb, 0x53, 0xcc, 0xd6, 0x6b, 0x9c, 0x0e, 0x42, 0x43, 0x80, 0x69, 0x3d, 0x64, 0x16, 0xfc, 0x2e, 0x1a, 0x3c, 0x79, 0x3a, 0x35, 0x5f, 0x7d, 0x05, 0xf9, 0x63, 0xf4, 0x35, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_373_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_373_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0xb8, 0xee, 0xbf, 0x6d, 0x45, 0x5e, 0x57, 0xe0, 0xb6, 0x5d, 0xe0, 0x20, 0x1b, 0xd7, 0xb3, 0x15, 0x45, 0x81, 0x33, 0xae, 0x5e, 0x2c, 0xa1, 0xb0, 0xd7, 0x21, 0xec, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_373 = { .name = "ecdsa_brainpoolp224r1_sha224_373", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_373_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_373_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_373_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 308 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 374 for ECDSA, tcId is 309 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_374_pubkey[] = { 0xbc, 0x02, 0x72, 0xe3, 0x69, 0x3a, 0x05, 0xe7, 0x88, 0x39, 0x2c, 0x88, 0x0f, 0x9d, 0xe9, 0x5c, 0x72, 0xe2, 0x93, 0xfd, 0x1b, 0x13, 0xf1, 0xe2, 0x2a, 0x99, 0x07, 0xa3, 0x69, 0x95, 0x06, 0xe4, 0x59, 0x0f, 0xa9, 0x0c, 0x62, 0x57, 0xb1, 0xc4, 0xe3, 0x63, 0x2c, 0xcc, 0x48, 0x6c, 0xb8, 0x33, 0xcb, 0xbc, 0xbf, 0x21, 0xb4, 0xa2, 0x60, 0x41, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_374_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_374_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0xac, 0x9a, 0x90, 0x88, 0x1e, 0x9c, 0x52, 0x04, 0xee, 0x79, 0xc0, 0x1d, 0xf7, 0xda, 0x62, 0xe0, 0xa7, 0x45, 0x63, 0x6f, 0x8b, 0x18, 0x96, 0xe9, 0x51, 0x52, 0xdc, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_374 = { .name = "ecdsa_brainpoolp224r1_sha224_374", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_374_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_374_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_374_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 309 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 375 for ECDSA, tcId is 310 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_375_pubkey[] = { 0xa8, 0x3b, 0xc3, 0xe9, 0x04, 0x3c, 0xb9, 0x38, 0xda, 0xe1, 0x67, 0xbb, 0xea, 0x2f, 0x7d, 0x62, 0x34, 0x86, 0xf4, 0x03, 0x8d, 0xf4, 0x53, 0x12, 0xe8, 0x46, 0x7b, 0xda, 0x73, 0x63, 0xfa, 0x58, 0xaf, 0x36, 0x3a, 0x71, 0x83, 0x5d, 0xa0, 0x94, 0x13, 0xc8, 0x82, 0x27, 0x84, 0x9c, 0x6f, 0x0f, 0xfe, 0x8e, 0x4e, 0x40, 0xaf, 0xf5, 0x10, 0x23, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_375_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_375_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x2b, 0x26, 0xa4, 0x22, 0x07, 0xa7, 0x14, 0x81, 0x3b, 0x9e, 0x70, 0x07, 0x7d, 0xf6, 0x98, 0xb8, 0x29, 0xd1, 0x58, 0xdb, 0xe2, 0xc6, 0x25, 0xba, 0x54, 0x54, 0xb7, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_375 = { .name = "ecdsa_brainpoolp224r1_sha224_375", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_375_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_375_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_375_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 310 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 376 for ECDSA, tcId is 311 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_376_pubkey[] = { 0x3b, 0xd0, 0x8a, 0x1c, 0x46, 0x63, 0x85, 0x64, 0x52, 0x1d, 0xed, 0x3f, 0xa7, 0x7c, 0xe9, 0xc9, 0x55, 0x38, 0xe4, 0x97, 0x03, 0xeb, 0xb9, 0xf8, 0xd3, 0x6b, 0xe6, 0xf7, 0x27, 0x6f, 0xfa, 0x12, 0x80, 0x51, 0x67, 0x1f, 0x7e, 0x4c, 0x63, 0xe9, 0xb8, 0x13, 0x2d, 0xe9, 0xf3, 0x38, 0x9c, 0xc5, 0x25, 0xd7, 0x26, 0x82, 0xb6, 0x01, 0x9e, 0xc3, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_376_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_376_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_376 = { .name = "ecdsa_brainpoolp224r1_sha224_376", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_376_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_376_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_376_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 311 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 377 for ECDSA, tcId is 312 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_377_pubkey[] = { 0xa3, 0xdb, 0x2b, 0x3e, 0x2c, 0x62, 0xc4, 0x2b, 0xf4, 0xfb, 0x0e, 0x11, 0xc2, 0x90, 0x8f, 0xd1, 0x7f, 0xe8, 0x3d, 0xa3, 0xac, 0x9c, 0x09, 0x80, 0x23, 0x4e, 0xfd, 0xbd, 0x3c, 0xbe, 0xec, 0x40, 0x27, 0xbd, 0x7c, 0x10, 0x9b, 0x27, 0xae, 0x2f, 0x7c, 0xf0, 0x4d, 0xc6, 0x5e, 0xea, 0xf1, 0x3f, 0xaa, 0x22, 0x4d, 0x32, 0xa2, 0x0f, 0x31, 0x63, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_377_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_377_sig[] = { 0x33, 0xb7, 0xe4, 0x98, 0xbc, 0xda, 0x1a, 0x33, 0xe6, 0x1a, 0x67, 0xaf, 0x56, 0xa3, 0x6d, 0x12, 0xdf, 0x70, 0x32, 0x25, 0x5d, 0xdf, 0x5e, 0x1e, 0xc6, 0x5a, 0x56, 0x69, 0x58, 0xe3, 0x75, 0x18, 0xc6, 0xe4, 0x7a, 0x84, 0xde, 0x10, 0xcc, 0xb2, 0x54, 0xc0, 0x36, 0x93, 0x27, 0x11, 0x45, 0xf1, 0x3e, 0x00, 0xa9, 0x12, 0x37, 0xa4, 0xa5, 0x47, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_377 = { .name = "ecdsa_brainpoolp224r1_sha224_377", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_377_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_377_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_377_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 312 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 378 for ECDSA, tcId is 313 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_378_pubkey[] = { 0x60, 0x6c, 0xe6, 0xf8, 0xc7, 0x7a, 0xc1, 0x7d, 0x5b, 0x75, 0x15, 0xd5, 0x85, 0x1e, 0xed, 0x15, 0x5e, 0xa1, 0x20, 0xcd, 0x07, 0xca, 0x42, 0x77, 0xb3, 0x5b, 0x8d, 0x36, 0x5f, 0x71, 0x6b, 0x62, 0xae, 0xe9, 0xa8, 0x1a, 0x01, 0x1b, 0xd1, 0xd2, 0xbc, 0xea, 0xf3, 0x7d, 0x5f, 0x3a, 0x61, 0xe5, 0xf7, 0x30, 0x7e, 0x0b, 0xb9, 0xc8, 0x92, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_378_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_378_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x47, 0xeb, 0x11, 0x8e, 0x0c, 0xc1, 0x22, 0x2c, 0xb8, 0xb2, 0xba, 0xb7, 0x27, 0x45, 0xa9, 0x32, 0xf0, 0x5c, 0xe9, 0x6e, 0x79, 0xf4, 0xe9, 0x8b, 0xe1, 0xe2, 0x86, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_378 = { .name = "ecdsa_brainpoolp224r1_sha224_378", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_378_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_378_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_378_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 313 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 379 for ECDSA, tcId is 314 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_379_pubkey[] = { 0x2a, 0xff, 0xbb, 0x82, 0x69, 0xcb, 0x78, 0x83, 0xda, 0xda, 0x33, 0x50, 0x39, 0x45, 0x79, 0x91, 0x2e, 0xf7, 0x56, 0xa8, 0xdf, 0x6b, 0xdd, 0x7d, 0xa3, 0x5d, 0x39, 0x8e, 0x90, 0x21, 0x3d, 0x93, 0x82, 0xb3, 0xd5, 0xfb, 0x9d, 0xde, 0x82, 0x72, 0x4d, 0x38, 0xe5, 0x67, 0x8c, 0x17, 0xe6, 0x10, 0xf4, 0x17, 0xcf, 0xe6, 0xf7, 0xef, 0xcd, 0x91, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_379_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_379_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0xb8, 0xee, 0xbf, 0x6d, 0x45, 0x5e, 0x57, 0xe0, 0xb6, 0x5d, 0xe0, 0x20, 0x1b, 0xd7, 0xb3, 0x15, 0x45, 0x81, 0x33, 0xae, 0x5e, 0x2c, 0xa1, 0xb0, 0xd7, 0x21, 0xec, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_379 = { .name = "ecdsa_brainpoolp224r1_sha224_379", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_379_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_379_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_379_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 314 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 380 for ECDSA, tcId is 315 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_380_pubkey[] = { 0x19, 0xcd, 0xd4, 0x4e, 0x2a, 0x33, 0x11, 0x3a, 0x88, 0x45, 0x58, 0xe7, 0xee, 0x0e, 0xfb, 0x41, 0xba, 0xfe, 0x1a, 0xdc, 0xdc, 0xf9, 0x5d, 0xf6, 0xde, 0x6a, 0x25, 0x11, 0x5f, 0x42, 0x8e, 0xe9, 0x98, 0xa3, 0x48, 0x56, 0xf2, 0xac, 0x3f, 0x6f, 0x39, 0xc7, 0x23, 0x7b, 0xf1, 0xf9, 0xde, 0x23, 0x21, 0x75, 0xd7, 0x47, 0xb5, 0xcd, 0x97, 0xfe, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_380_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_380_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0xac, 0x9a, 0x90, 0x88, 0x1e, 0x9c, 0x52, 0x04, 0xee, 0x79, 0xc0, 0x1d, 0xf7, 0xda, 0x62, 0xe0, 0xa7, 0x45, 0x63, 0x6f, 0x8b, 0x18, 0x96, 0xe9, 0x51, 0x52, 0xdc, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_380 = { .name = "ecdsa_brainpoolp224r1_sha224_380", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_380_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_380_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_380_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 315 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 381 for ECDSA, tcId is 316 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_381_pubkey[] = { 0xb7, 0x2f, 0x7c, 0x1a, 0x3c, 0x85, 0x62, 0xcb, 0x8d, 0xe9, 0x92, 0x5e, 0xec, 0x04, 0x1c, 0xcc, 0x26, 0x36, 0x49, 0xc6, 0x52, 0x47, 0x62, 0xb9, 0xf4, 0x58, 0x5e, 0xe3, 0x9d, 0xf7, 0x56, 0xda, 0x08, 0xd1, 0x27, 0x4a, 0xd7, 0x2d, 0x8c, 0xac, 0x29, 0x3a, 0xa6, 0x0d, 0x15, 0x0c, 0x77, 0x13, 0x1f, 0x9f, 0xa2, 0x8c, 0xcd, 0xff, 0xdf, 0xa0, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_381_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_381_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x2b, 0x26, 0xa4, 0x22, 0x07, 0xa7, 0x14, 0x81, 0x3b, 0x9e, 0x70, 0x07, 0x7d, 0xf6, 0x98, 0xb8, 0x29, 0xd1, 0x58, 0xdb, 0xe2, 0xc6, 0x25, 0xba, 0x54, 0x54, 0xb7, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_381 = { .name = "ecdsa_brainpoolp224r1_sha224_381", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_381_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_381_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_381_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 316 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 382 for ECDSA, tcId is 317 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_382_pubkey[] = { 0x9d, 0x37, 0x03, 0xb3, 0x20, 0x5b, 0x12, 0x3c, 0x90, 0x3a, 0x04, 0x46, 0x97, 0x32, 0x47, 0xc1, 0x6a, 0x88, 0xd1, 0x03, 0xfe, 0xa9, 0xd0, 0x4d, 0xd0, 0x2a, 0x70, 0x2b, 0x65, 0x18, 0x6b, 0x77, 0x7b, 0x57, 0xea, 0xde, 0xe8, 0x15, 0x4c, 0x02, 0xfc, 0xe0, 0xe9, 0x5c, 0x3f, 0x06, 0x14, 0x68, 0x49, 0x9b, 0xac, 0x3d, 0xc6, 0x02, 0x9e, 0x8c, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_382_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_382_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_382 = { .name = "ecdsa_brainpoolp224r1_sha224_382", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_382_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_382_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_382_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 317 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 383 for ECDSA, tcId is 318 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_383_pubkey[] = { 0x3e, 0xa5, 0x72, 0x50, 0x5a, 0x48, 0xb1, 0xbe, 0xd0, 0x85, 0x95, 0x3d, 0xa7, 0xd4, 0xc9, 0x63, 0xc2, 0xc5, 0xb6, 0xad, 0x99, 0x77, 0x9d, 0x9d, 0x54, 0xba, 0x40, 0x12, 0x94, 0x47, 0x00, 0x74, 0xe0, 0x25, 0x2d, 0xa1, 0x59, 0xa0, 0xc0, 0xd0, 0xb2, 0xf8, 0xd4, 0xc2, 0x42, 0xcb, 0x94, 0xba, 0xb2, 0xc2, 0x02, 0x0c, 0x4b, 0x2d, 0xf4, 0x99, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_383_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_383_sig[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x58, 0xe3, 0x75, 0x18, 0xc6, 0xe4, 0x7a, 0x84, 0xde, 0x10, 0xcc, 0xb2, 0x54, 0xc0, 0x36, 0x93, 0x27, 0x11, 0x45, 0xf1, 0x3e, 0x00, 0xa9, 0x12, 0x37, 0xa4, 0xa5, 0x47, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_383 = { .name = "ecdsa_brainpoolp224r1_sha224_383", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_383_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_383_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_383_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 318 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 384 for ECDSA, tcId is 319 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_384_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x58, 0xaa, 0x56, 0xf7, 0x72, 0xc0, 0x72, 0x6f, 0x24, 0xc6, 0xb8, 0x9e, 0x4e, 0xcd, 0xac, 0x24, 0x35, 0x4b, 0x9e, 0x99, 0xca, 0xa3, 0xf6, 0xd3, 0x76, 0x14, 0x02, 0xcd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_384_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_384_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_384 = { .name = "ecdsa_brainpoolp224r1_sha224_384", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_384_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_384_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_384_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 319 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 385 for ECDSA, tcId is 320 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_385_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x58, 0xaa, 0x56, 0xf7, 0x72, 0xc0, 0x72, 0x6f, 0x24, 0xc6, 0xb8, 0x9e, 0x4e, 0xcd, 0xac, 0x24, 0x35, 0x4b, 0x9e, 0x99, 0xca, 0xa3, 0xf6, 0xd3, 0x76, 0x14, 0x02, 0xcd, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_385_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_385_sig[] = { 0x62, 0x85, 0x80, 0xa9, 0xad, 0xb0, 0x26, 0x04, 0x52, 0x5b, 0x1e, 0xe6, 0xb1, 0x35, 0xe1, 0xa9, 0xc7, 0x45, 0x02, 0x18, 0x24, 0x58, 0x2c, 0x52, 0x38, 0x5a, 0x81, 0x73, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_385 = { .name = "ecdsa_brainpoolp224r1_sha224_385", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_385_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_385_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_385_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 320 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 386 for ECDSA, tcId is 321 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_386_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x7f, 0x16, 0xdd, 0xb2, 0xb3, 0x82, 0xf4, 0x17, 0x05, 0x51, 0x77, 0x87, 0x27, 0x04, 0x2b, 0x63, 0x7b, 0x53, 0x68, 0xbd, 0xcd, 0x36, 0x93, 0x22, 0x08, 0xb4, 0xbe, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_386_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_386_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_386 = { .name = "ecdsa_brainpoolp224r1_sha224_386", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_386_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_386_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_386_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 321 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 387 for ECDSA, tcId is 322 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_387_pubkey[] = { 0x0d, 0x90, 0x29, 0xad, 0x2c, 0x7e, 0x5c, 0xf4, 0x34, 0x08, 0x23, 0xb2, 0xa8, 0x7d, 0xc6, 0x8c, 0x9e, 0x4c, 0xe3, 0x17, 0x4c, 0x1e, 0x6e, 0xfd, 0xee, 0x12, 0xc0, 0x7d, 0x7f, 0x16, 0xdd, 0xb2, 0xb3, 0x82, 0xf4, 0x17, 0x05, 0x51, 0x77, 0x87, 0x27, 0x04, 0x2b, 0x63, 0x7b, 0x53, 0x68, 0xbd, 0xcd, 0x36, 0x93, 0x22, 0x08, 0xb4, 0xbe, 0x32, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_387_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_387_sig[] = { 0x62, 0x85, 0x80, 0xa9, 0xad, 0xb0, 0x26, 0x04, 0x52, 0x5b, 0x1e, 0xe6, 0xb1, 0x35, 0xe1, 0xa9, 0xc7, 0x45, 0x02, 0x18, 0x24, 0x58, 0x2c, 0x52, 0x38, 0x5a, 0x81, 0x73, 0x1e, 0xd2, 0x75, 0x3c, 0xe0, 0xe5, 0x0e, 0xa5, 0x73, 0xba, 0x50, 0x05, 0x59, 0xf9, 0x48, 0x83, 0x8b, 0x95, 0x88, 0x9d, 0x0f, 0xb2, 0x1a, 0xf2, 0xce, 0x85, 0xa7, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_387 = { .name = "ecdsa_brainpoolp224r1_sha224_387", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_387_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_387_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_387_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 322 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 388 for ECDSA, tcId is 323 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_388_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_388_sig[] = { 0xb9, 0x82, 0xbe, 0xa8, 0x0d, 0x10, 0x81, 0x6b, 0xb4, 0x50, 0xa3, 0xfa, 0xaa, 0xed, 0x4e, 0xd5, 0x4f, 0xb1, 0x97, 0xb3, 0xbf, 0xf9, 0x5a, 0xf2, 0x5d, 0x7d, 0x37, 0x86, 0x9e, 0x6e, 0xa2, 0xe5, 0x87, 0x13, 0xf1, 0x30, 0x4d, 0x29, 0xde, 0xbf, 0x85, 0x59, 0xa7, 0x4a, 0x89, 0xe0, 0x18, 0xba, 0xe2, 0x8b, 0x05, 0x55, 0x6e, 0x54, 0x82, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_388 = { .name = "ecdsa_brainpoolp224r1_sha224_388", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_388_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp224r1_sha224_388_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 323 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 389 for ECDSA, tcId is 324 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_389_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_389_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_389_sig[] = { 0x4d, 0xab, 0xc5, 0xfe, 0x96, 0x2b, 0x5f, 0x8a, 0x66, 0x81, 0xe9, 0x4a, 0x21, 0x65, 0xd9, 0xb6, 0xbe, 0x19, 0x40, 0xf2, 0x0e, 0x27, 0xce, 0xb7, 0x3f, 0xc4, 0xea, 0x7d, 0x74, 0x6e, 0x9b, 0xba, 0x7e, 0xfb, 0x90, 0xfc, 0xec, 0xc2, 0x63, 0xc2, 0x29, 0xa1, 0x6d, 0x80, 0x9d, 0x35, 0x47, 0xc2, 0x8a, 0x26, 0xcd, 0x71, 0xa5, 0x2a, 0xbd, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_389 = { .name = "ecdsa_brainpoolp224r1_sha224_389", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_389_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_389_msg, .msglen = 3, .sig = ecdsa_brainpoolp224r1_sha224_389_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 324 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 390 for ECDSA, tcId is 325 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_390_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_390_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_390_sig[] = { 0x95, 0xb1, 0x1e, 0x32, 0x00, 0x07, 0xa2, 0xe0, 0xf8, 0xce, 0x00, 0xf9, 0x05, 0x8c, 0xa9, 0xb9, 0x19, 0xe8, 0xd6, 0xaa, 0xd5, 0x44, 0xa8, 0xf9, 0x80, 0x8b, 0x44, 0xa1, 0x15, 0xa9, 0x62, 0x01, 0x9c, 0x85, 0xa5, 0xb1, 0xfa, 0x74, 0x74, 0x16, 0x2d, 0x03, 0xcd, 0x0e, 0x52, 0x8e, 0x8b, 0x93, 0xbc, 0xc8, 0x49, 0x20, 0xaf, 0x57, 0x9f, 0x61, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_390 = { .name = "ecdsa_brainpoolp224r1_sha224_390", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_390_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_390_msg, .msglen = 6, .sig = ecdsa_brainpoolp224r1_sha224_390_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 325 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 391 for ECDSA, tcId is 326 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_391_pubkey[] = { 0xb5, 0x54, 0xfc, 0x25, 0xe9, 0xf0, 0x98, 0xea, 0xf1, 0x46, 0x6c, 0x35, 0x32, 0x8c, 0x97, 0x30, 0x5d, 0x0d, 0x4a, 0xa0, 0xe4, 0x46, 0x2e, 0x8b, 0xaf, 0x7a, 0x8e, 0x7e, 0xd0, 0x8f, 0xc4, 0x0e, 0xb0, 0x1d, 0xc8, 0x55, 0x57, 0x7b, 0xae, 0xa9, 0xe3, 0x07, 0x07, 0x70, 0x61, 0x6f, 0x57, 0xb1, 0x7e, 0xa9, 0x85, 0x4c, 0xad, 0x93, 0x88, 0x1a, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_391_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_391_sig[] = { 0x9e, 0x4d, 0xab, 0x9e, 0x0b, 0x00, 0x97, 0xe3, 0x65, 0x78, 0x3f, 0xc0, 0x5f, 0x01, 0x0c, 0x16, 0x0d, 0x36, 0x1d, 0xf7, 0x92, 0x5b, 0x0d, 0xdb, 0xdf, 0xec, 0xe8, 0x8b, 0x84, 0x06, 0xa3, 0x65, 0xf0, 0x78, 0xf0, 0x31, 0xe6, 0xfa, 0xd6, 0x51, 0x1d, 0x69, 0xf8, 0xa6, 0x54, 0x83, 0xc1, 0x9a, 0x5a, 0x80, 0x0c, 0x39, 0x49, 0x0f, 0x75, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_391 = { .name = "ecdsa_brainpoolp224r1_sha224_391", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_391_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_391_msg, .msglen = 20, .sig = ecdsa_brainpoolp224r1_sha224_391_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 326 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 392 for ECDSA, tcId is 327 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_392_pubkey[] = { 0x80, 0x2a, 0x0f, 0x51, 0x20, 0x4e, 0xf6, 0xa8, 0x29, 0x21, 0x1b, 0xc0, 0x74, 0x08, 0x87, 0x46, 0x1e, 0xe4, 0xab, 0xa7, 0x36, 0xe9, 0xca, 0xee, 0x00, 0x00, 0x00, 0x00, 0x7f, 0xb9, 0x31, 0xe0, 0x63, 0x00, 0x45, 0x13, 0x62, 0xd4, 0x44, 0x10, 0x6e, 0xeb, 0x5d, 0xab, 0xdd, 0xca, 0x65, 0x0f, 0xec, 0x4b, 0xe5, 0x5f, 0xc5, 0x45, 0xf7, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_392_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_392_sig[] = { 0x0c, 0x93, 0xfd, 0x7f, 0x6d, 0xd0, 0xb6, 0x97, 0xd5, 0xc2, 0x87, 0xee, 0x61, 0xae, 0xe4, 0xdc, 0xbe, 0xdc, 0xc2, 0x08, 0x85, 0xc1, 0xe6, 0x21, 0x5b, 0x8b, 0x36, 0x08, 0x3b, 0xc7, 0xa1, 0xbe, 0xcc, 0xf1, 0xa8, 0xe8, 0x3a, 0xf2, 0xf5, 0x16, 0x2f, 0xc5, 0x39, 0xa1, 0xd0, 0x62, 0xbd, 0x63, 0x9a, 0x2f, 0xbe, 0xc5, 0x12, 0x90, 0x7a, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_392 = { .name = "ecdsa_brainpoolp224r1_sha224_392", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_392_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_392_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_392_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 327 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 393 for ECDSA, tcId is 328 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_393_pubkey[] = { 0x80, 0x2a, 0x0f, 0x51, 0x20, 0x4e, 0xf6, 0xa8, 0x29, 0x21, 0x1b, 0xc0, 0x74, 0x08, 0x87, 0x46, 0x1e, 0xe4, 0xab, 0xa7, 0x36, 0xe9, 0xca, 0xee, 0x00, 0x00, 0x00, 0x00, 0x7f, 0xb9, 0x31, 0xe0, 0x63, 0x00, 0x45, 0x13, 0x62, 0xd4, 0x44, 0x10, 0x6e, 0xeb, 0x5d, 0xab, 0xdd, 0xca, 0x65, 0x0f, 0xec, 0x4b, 0xe5, 0x5f, 0xc5, 0x45, 0xf7, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_393_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_393_sig[] = { 0x9e, 0x0b, 0x62, 0x0a, 0x2f, 0x31, 0x3a, 0xda, 0x75, 0x64, 0x63, 0xa2, 0x29, 0x88, 0xaf, 0xb6, 0x57, 0x1b, 0x3b, 0x03, 0x0a, 0x42, 0x85, 0xb1, 0x85, 0xe1, 0xcc, 0x80, 0xc3, 0xeb, 0xa0, 0x4c, 0x42, 0xe6, 0x4d, 0x40, 0x28, 0xac, 0xab, 0xcd, 0xcb, 0x7b, 0x2e, 0xed, 0x1b, 0x3c, 0xfb, 0x56, 0x0b, 0x8d, 0x7d, 0x14, 0xfb, 0x26, 0xac, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_393 = { .name = "ecdsa_brainpoolp224r1_sha224_393", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_393_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_393_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_393_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 328 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 394 for ECDSA, tcId is 329 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_394_pubkey[] = { 0x80, 0x2a, 0x0f, 0x51, 0x20, 0x4e, 0xf6, 0xa8, 0x29, 0x21, 0x1b, 0xc0, 0x74, 0x08, 0x87, 0x46, 0x1e, 0xe4, 0xab, 0xa7, 0x36, 0xe9, 0xca, 0xee, 0x00, 0x00, 0x00, 0x00, 0x7f, 0xb9, 0x31, 0xe0, 0x63, 0x00, 0x45, 0x13, 0x62, 0xd4, 0x44, 0x10, 0x6e, 0xeb, 0x5d, 0xab, 0xdd, 0xca, 0x65, 0x0f, 0xec, 0x4b, 0xe5, 0x5f, 0xc5, 0x45, 0xf7, 0xc8, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_394_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_394_sig[] = { 0xa3, 0x06, 0xf5, 0x00, 0xda, 0x4f, 0x0a, 0x30, 0x94, 0x64, 0x79, 0x93, 0x6a, 0xaf, 0x9c, 0x63, 0x76, 0x76, 0xb0, 0xf0, 0x2d, 0x20, 0xae, 0x0d, 0x98, 0x1c, 0x25, 0xeb, 0x01, 0x56, 0x47, 0xf2, 0x50, 0x0b, 0xcb, 0xe3, 0x20, 0x4b, 0xdb, 0x80, 0x49, 0x72, 0xb8, 0x41, 0x89, 0x0b, 0x4e, 0x53, 0x19, 0x6c, 0xd8, 0xb1, 0x88, 0x99, 0x31, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_394 = { .name = "ecdsa_brainpoolp224r1_sha224_394", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_394_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_394_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_394_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 329 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 395 for ECDSA, tcId is 330 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_395_pubkey[] = { 0xcb, 0x32, 0x0c, 0x84, 0xf2, 0x6c, 0x00, 0xa1, 0xb4, 0xad, 0x71, 0x46, 0x91, 0x4c, 0xae, 0x12, 0x65, 0x29, 0x16, 0x5d, 0xe7, 0x36, 0x3d, 0x8a, 0xef, 0x9a, 0xbd, 0x05, 0xa3, 0x97, 0xd4, 0x6b, 0x87, 0x28, 0x31, 0x76, 0xb7, 0xf6, 0x9d, 0xa1, 0xf9, 0x46, 0x15, 0xca, 0x44, 0x31, 0xfc, 0x47, 0xb2, 0xa0, 0xe6, 0x0c, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_395_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_395_sig[] = { 0x04, 0xf0, 0x0d, 0xd4, 0x4f, 0xdd, 0x8a, 0xe6, 0xb0, 0x8b, 0x86, 0xcc, 0xbd, 0xd7, 0xd6, 0x15, 0xaa, 0x9e, 0x49, 0x8a, 0x89, 0xb3, 0x50, 0x94, 0xc8, 0xa9, 0xa6, 0xfe, 0x49, 0x61, 0x7a, 0x16, 0x17, 0xc5, 0x6c, 0xe9, 0x0d, 0x41, 0xc5, 0x3e, 0xef, 0x4e, 0x62, 0x8f, 0x24, 0xc0, 0x47, 0xa0, 0x6e, 0x02, 0xc1, 0xf9, 0x21, 0x23, 0x44, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_395 = { .name = "ecdsa_brainpoolp224r1_sha224_395", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_395_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_395_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_395_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 330 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 396 for ECDSA, tcId is 331 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_396_pubkey[] = { 0xcb, 0x32, 0x0c, 0x84, 0xf2, 0x6c, 0x00, 0xa1, 0xb4, 0xad, 0x71, 0x46, 0x91, 0x4c, 0xae, 0x12, 0x65, 0x29, 0x16, 0x5d, 0xe7, 0x36, 0x3d, 0x8a, 0xef, 0x9a, 0xbd, 0x05, 0xa3, 0x97, 0xd4, 0x6b, 0x87, 0x28, 0x31, 0x76, 0xb7, 0xf6, 0x9d, 0xa1, 0xf9, 0x46, 0x15, 0xca, 0x44, 0x31, 0xfc, 0x47, 0xb2, 0xa0, 0xe6, 0x0c, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_396_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_396_sig[] = { 0x12, 0x86, 0xf6, 0xa7, 0x37, 0x5b, 0xf6, 0x80, 0x51, 0xe3, 0x1b, 0x2e, 0x32, 0xb5, 0xf6, 0xc0, 0x98, 0x8c, 0x91, 0x89, 0x79, 0x92, 0x56, 0xe7, 0xce, 0x64, 0xe2, 0x91, 0x52, 0xd3, 0xc1, 0xf9, 0xe7, 0x77, 0xf2, 0x3c, 0x17, 0xcb, 0xc8, 0x32, 0xd0, 0xe5, 0xa8, 0x4b, 0xb6, 0x8b, 0x13, 0xde, 0xbf, 0x39, 0x38, 0x78, 0xd1, 0xa0, 0x64, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_396 = { .name = "ecdsa_brainpoolp224r1_sha224_396", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_396_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_396_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_396_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 331 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 397 for ECDSA, tcId is 332 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_397_pubkey[] = { 0xcb, 0x32, 0x0c, 0x84, 0xf2, 0x6c, 0x00, 0xa1, 0xb4, 0xad, 0x71, 0x46, 0x91, 0x4c, 0xae, 0x12, 0x65, 0x29, 0x16, 0x5d, 0xe7, 0x36, 0x3d, 0x8a, 0xef, 0x9a, 0xbd, 0x05, 0xa3, 0x97, 0xd4, 0x6b, 0x87, 0x28, 0x31, 0x76, 0xb7, 0xf6, 0x9d, 0xa1, 0xf9, 0x46, 0x15, 0xca, 0x44, 0x31, 0xfc, 0x47, 0xb2, 0xa0, 0xe6, 0x0c, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_397_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_397_sig[] = { 0x58, 0x28, 0x25, 0xdf, 0x23, 0x68, 0xdc, 0xb9, 0x2f, 0xbb, 0xa3, 0xfa, 0x64, 0x54, 0xd1, 0x49, 0xd3, 0xb8, 0x60, 0xe3, 0xff, 0x32, 0x6a, 0xfe, 0x36, 0x21, 0x58, 0x13, 0x49, 0x33, 0x4f, 0xc6, 0xa7, 0x04, 0x18, 0xdb, 0xc4, 0x54, 0xda, 0x6a, 0x99, 0x7b, 0xc8, 0x37, 0x62, 0x70, 0xc3, 0xa3, 0x88, 0x63, 0xad, 0xb2, 0xaa, 0x70, 0xbb, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_397 = { .name = "ecdsa_brainpoolp224r1_sha224_397", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_397_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_397_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_397_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 332 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 398 for ECDSA, tcId is 333 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_398_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0x81, 0xdf, 0x97, 0x17, 0x44, 0xa2, 0x5a, 0xc9, 0x94, 0x72, 0xc3, 0xff, 0x5a, 0x8f, 0xc4, 0x9b, 0x86, 0xfc, 0x9f, 0xb5, 0x70, 0x44, 0x8f, 0xf9, 0x77, 0xf2, 0xd0, 0x7c, 0x1c, 0x92, 0x96, 0xb2, 0xf7, 0x74, 0x78, 0xd1, 0x3d, 0x5a, 0xb1, 0xc6, 0x39, 0x93, 0x96, 0x2f, 0x2d, 0xd0, 0x8e, 0xe7, 0xc3, 0x13, 0xde, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_398_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_398_sig[] = { 0x5a, 0x11, 0x71, 0x8c, 0x90, 0xa0, 0x24, 0x59, 0x80, 0x0f, 0x10, 0x9e, 0x4e, 0x84, 0x0c, 0xc2, 0x61, 0xd7, 0x82, 0xd6, 0x4e, 0x1c, 0x8a, 0x47, 0x12, 0xdd, 0x90, 0x81, 0xd2, 0x83, 0xb1, 0xc1, 0xe1, 0x10, 0xa4, 0x62, 0x0a, 0x69, 0x6f, 0xdf, 0x74, 0xa9, 0xc7, 0x79, 0x23, 0x52, 0x13, 0x9d, 0x54, 0xcc, 0xed, 0x8c, 0x97, 0x3d, 0x9e, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_398 = { .name = "ecdsa_brainpoolp224r1_sha224_398", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_398_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_398_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_398_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 333 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 399 for ECDSA, tcId is 334 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_399_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0x81, 0xdf, 0x97, 0x17, 0x44, 0xa2, 0x5a, 0xc9, 0x94, 0x72, 0xc3, 0xff, 0x5a, 0x8f, 0xc4, 0x9b, 0x86, 0xfc, 0x9f, 0xb5, 0x70, 0x44, 0x8f, 0xf9, 0x77, 0xf2, 0xd0, 0x7c, 0x1c, 0x92, 0x96, 0xb2, 0xf7, 0x74, 0x78, 0xd1, 0x3d, 0x5a, 0xb1, 0xc6, 0x39, 0x93, 0x96, 0x2f, 0x2d, 0xd0, 0x8e, 0xe7, 0xc3, 0x13, 0xde, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_399_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_399_sig[] = { 0xd5, 0x77, 0xf2, 0x3e, 0x59, 0x24, 0x14, 0xe3, 0x51, 0xb3, 0x92, 0x8a, 0x59, 0x3c, 0x5d, 0x2f, 0x89, 0xf0, 0xc7, 0x2d, 0xf5, 0x13, 0xbf, 0xbc, 0x65, 0x35, 0xba, 0xbb, 0x1b, 0xb0, 0x9d, 0xd2, 0x35, 0x12, 0x4a, 0x14, 0xe0, 0x24, 0x69, 0x46, 0xf2, 0x80, 0x45, 0x0f, 0x15, 0x57, 0x69, 0x12, 0xae, 0xb7, 0x35, 0xb7, 0x3c, 0xe8, 0x28, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_399 = { .name = "ecdsa_brainpoolp224r1_sha224_399", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_399_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_399_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_399_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 334 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 400 for ECDSA, tcId is 335 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_400_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0x81, 0xdf, 0x97, 0x17, 0x44, 0xa2, 0x5a, 0xc9, 0x94, 0x72, 0xc3, 0xff, 0x5a, 0x8f, 0xc4, 0x9b, 0x86, 0xfc, 0x9f, 0xb5, 0x70, 0x44, 0x8f, 0xf9, 0x77, 0xf2, 0xd0, 0x7c, 0x1c, 0x92, 0x96, 0xb2, 0xf7, 0x74, 0x78, 0xd1, 0x3d, 0x5a, 0xb1, 0xc6, 0x39, 0x93, 0x96, 0x2f, 0x2d, 0xd0, 0x8e, 0xe7, 0xc3, 0x13, 0xde, 0xce, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_400_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_400_sig[] = { 0xaf, 0x8f, 0x83, 0x6e, 0x63, 0x99, 0x5d, 0xc7, 0x15, 0xa4, 0xd3, 0xc6, 0x84, 0x2c, 0x4e, 0x6c, 0x6c, 0xf4, 0x58, 0x6d, 0xf7, 0x6e, 0x46, 0x59, 0xd8, 0x09, 0xee, 0xc9, 0x85, 0xbe, 0xfd, 0x0b, 0x1b, 0xb8, 0xae, 0x18, 0x2c, 0x05, 0xd0, 0x71, 0xda, 0xd1, 0x80, 0x22, 0x4d, 0x22, 0x53, 0x3d, 0xce, 0x73, 0x7d, 0x4d, 0xda, 0x74, 0xd5, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_400 = { .name = "ecdsa_brainpoolp224r1_sha224_400", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_400_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_400_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_400_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 335 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 401 for ECDSA, tcId is 336 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_401_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0x00, 0x00, 0x00, 0x00, 0x28, 0x01, 0xd4, 0x83, 0x82, 0x86, 0x16, 0x84, 0xb8, 0xd2, 0xcb, 0xd7, 0xe5, 0x98, 0x9a, 0x0d, 0x7c, 0x15, 0xa7, 0xe8, 0x19, 0xb5, 0x73, 0xaa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_401_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_401_sig[] = { 0x15, 0x6a, 0xa7, 0x86, 0x92, 0xc7, 0x8e, 0x97, 0x69, 0xab, 0xa7, 0x28, 0xc9, 0xee, 0xa7, 0x88, 0x35, 0xb5, 0x50, 0x00, 0x90, 0x1b, 0xa5, 0x07, 0x94, 0xa3, 0x3e, 0xfc, 0xb9, 0x78, 0x5d, 0xf4, 0x0a, 0x22, 0x13, 0x37, 0x74, 0x81, 0x31, 0x1b, 0x1a, 0x81, 0xd3, 0x10, 0xe7, 0x63, 0x41, 0x92, 0x7b, 0x8f, 0xba, 0x0d, 0x6e, 0x3e, 0xc7, 0xad, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_401 = { .name = "ecdsa_brainpoolp224r1_sha224_401", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_401_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_401_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_401_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 336 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 402 for ECDSA, tcId is 337 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_402_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0x00, 0x00, 0x00, 0x00, 0x28, 0x01, 0xd4, 0x83, 0x82, 0x86, 0x16, 0x84, 0xb8, 0xd2, 0xcb, 0xd7, 0xe5, 0x98, 0x9a, 0x0d, 0x7c, 0x15, 0xa7, 0xe8, 0x19, 0xb5, 0x73, 0xaa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_402_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_402_sig[] = { 0x92, 0x74, 0xd4, 0x6a, 0x7f, 0xfa, 0x12, 0x99, 0xa3, 0x72, 0xe8, 0x21, 0xbd, 0x89, 0x72, 0x8d, 0xe8, 0x3e, 0xf8, 0x7c, 0x46, 0xaf, 0x67, 0x04, 0x3a, 0x63, 0x4b, 0x02, 0x19, 0xe4, 0xbb, 0xec, 0x8b, 0x03, 0xfa, 0x77, 0x2a, 0x36, 0x22, 0xbf, 0x48, 0x93, 0xe5, 0x81, 0xef, 0xad, 0xf9, 0xd2, 0x0b, 0xd6, 0x08, 0x06, 0xd8, 0x26, 0x76, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_402 = { .name = "ecdsa_brainpoolp224r1_sha224_402", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_402_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_402_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_402_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 337 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 403 for ECDSA, tcId is 338 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_403_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0x00, 0x00, 0x00, 0x00, 0x28, 0x01, 0xd4, 0x83, 0x82, 0x86, 0x16, 0x84, 0xb8, 0xd2, 0xcb, 0xd7, 0xe5, 0x98, 0x9a, 0x0d, 0x7c, 0x15, 0xa7, 0xe8, 0x19, 0xb5, 0x73, 0xaa, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_403_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_403_sig[] = { 0xcf, 0x6a, 0x9c, 0xba, 0x28, 0x5e, 0x56, 0x49, 0x3c, 0xbb, 0x46, 0x2b, 0x7b, 0x16, 0x12, 0x8a, 0x0c, 0xf1, 0xc7, 0x05, 0x84, 0x47, 0x94, 0x5d, 0xae, 0xf3, 0x41, 0x49, 0x29, 0xa6, 0x87, 0x83, 0x9e, 0x8e, 0xe0, 0x3c, 0x53, 0x72, 0xa1, 0x13, 0x73, 0x3c, 0x08, 0x1f, 0x41, 0x3d, 0x1f, 0x94, 0x05, 0xdd, 0xfe, 0x47, 0xe1, 0x8f, 0xcc, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_403 = { .name = "ecdsa_brainpoolp224r1_sha224_403", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_403_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_403_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_403_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 338 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 404 for ECDSA, tcId is 339 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_404_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0xd7, 0xc1, 0x34, 0xa9, 0xfe, 0x41, 0x92, 0x02, 0xa7, 0x92, 0x19, 0xa0, 0xbc, 0xff, 0x0b, 0xaf, 0xcb, 0x06, 0x6d, 0x4a, 0x1b, 0xc4, 0xe2, 0x0d, 0x65, 0x13, 0x4d, 0x55, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_404_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_404_sig[] = { 0x59, 0x2e, 0x54, 0xa0, 0xea, 0x95, 0x0a, 0xc7, 0xcd, 0x83, 0x0f, 0x56, 0xc7, 0x95, 0x4a, 0x76, 0x9f, 0x81, 0xaa, 0x55, 0xe8, 0xe1, 0x01, 0xbe, 0xe1, 0x9b, 0x3b, 0x27, 0x48, 0x37, 0x5f, 0xdd, 0x4d, 0x90, 0x14, 0xc9, 0xb6, 0x0b, 0x63, 0xc7, 0x0b, 0xfe, 0x98, 0xc8, 0x44, 0xbe, 0x66, 0x8f, 0x2d, 0x3a, 0x2e, 0x25, 0x92, 0x62, 0xb9, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_404 = { .name = "ecdsa_brainpoolp224r1_sha224_404", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_404_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_404_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_404_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 339 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 405 for ECDSA, tcId is 340 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_405_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0xd7, 0xc1, 0x34, 0xa9, 0xfe, 0x41, 0x92, 0x02, 0xa7, 0x92, 0x19, 0xa0, 0xbc, 0xff, 0x0b, 0xaf, 0xcb, 0x06, 0x6d, 0x4a, 0x1b, 0xc4, 0xe2, 0x0d, 0x65, 0x13, 0x4d, 0x55, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_405_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_405_sig[] = { 0x1e, 0xc0, 0xef, 0x4d, 0x5b, 0xed, 0xaf, 0xe5, 0x08, 0x1f, 0x7a, 0xda, 0xe3, 0x2d, 0xb4, 0xd0, 0xaa, 0x94, 0x6f, 0x13, 0x0a, 0xce, 0xda, 0xba, 0xe2, 0x6d, 0x90, 0xdc, 0x62, 0x7e, 0x81, 0xd7, 0xeb, 0x35, 0x8f, 0x59, 0xe8, 0xa8, 0x63, 0x05, 0x27, 0xd4, 0xe8, 0x94, 0x6d, 0x1c, 0xad, 0x21, 0x96, 0x76, 0x18, 0x36, 0xd9, 0x7d, 0x95, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_405 = { .name = "ecdsa_brainpoolp224r1_sha224_405", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_405_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_405_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_405_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 340 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 406 for ECDSA, tcId is 341 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_406_pubkey[] = { 0x0d, 0x28, 0xb4, 0xf7, 0xfe, 0x1f, 0x6c, 0x6f, 0xa6, 0xa7, 0x7d, 0x11, 0xe4, 0x3b, 0xd3, 0xe9, 0x27, 0x17, 0x58, 0xdf, 0x34, 0xc6, 0x5f, 0xa5, 0x77, 0xa6, 0xdd, 0x3b, 0xd7, 0xc1, 0x34, 0xa9, 0xfe, 0x41, 0x92, 0x02, 0xa7, 0x92, 0x19, 0xa0, 0xbc, 0xff, 0x0b, 0xaf, 0xcb, 0x06, 0x6d, 0x4a, 0x1b, 0xc4, 0xe2, 0x0d, 0x65, 0x13, 0x4d, 0x55, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_406_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_406_sig[] = { 0x5f, 0xaf, 0x03, 0x5e, 0xd5, 0x77, 0x4e, 0xeb, 0x0a, 0xdc, 0x18, 0x7f, 0xf4, 0x85, 0xa8, 0x46, 0xaa, 0x2a, 0xbc, 0xf1, 0xe7, 0xf8, 0x59, 0xb1, 0xb9, 0x10, 0xf2, 0x5c, 0x8b, 0xf1, 0x2a, 0x1c, 0x00, 0xb1, 0x8f, 0x66, 0xc2, 0x28, 0x35, 0x2d, 0xe4, 0x9c, 0xc4, 0xfb, 0x82, 0x7a, 0x09, 0xfc, 0x86, 0xf7, 0x22, 0xce, 0x56, 0x1b, 0xa5, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_406 = { .name = "ecdsa_brainpoolp224r1_sha224_406", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_406_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_406_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_406_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 341 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 407 for ECDSA, tcId is 342 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_407_pubkey[] = { 0x51, 0x2e, 0x58, 0x17, 0x31, 0xc9, 0xc4, 0x60, 0xbb, 0x70, 0x5b, 0x60, 0xda, 0x97, 0x6c, 0xcb, 0x1b, 0x0e, 0xf4, 0x21, 0x78, 0x51, 0x06, 0xba, 0x2c, 0xcd, 0xd2, 0x38, 0x0f, 0x21, 0xd5, 0xba, 0xcd, 0xf8, 0x1c, 0x0c, 0xb7, 0x8f, 0xa1, 0x51, 0x23, 0x7d, 0xb3, 0x13, 0x0a, 0xd4, 0xde, 0xf3, 0x73, 0xf3, 0xe5, 0x23, 0x39, 0x8c, 0x2c, 0xf7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_407_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_407_sig[] = { 0x52, 0xb2, 0xd3, 0x69, 0xf1, 0x8d, 0xf5, 0x63, 0x72, 0xaf, 0xe7, 0xfe, 0xb3, 0x84, 0x13, 0xf2, 0x32, 0xb4, 0xfb, 0x9c, 0xa1, 0x6c, 0x6f, 0x6f, 0xed, 0xc6, 0x41, 0x89, 0xc1, 0xb1, 0x9f, 0x13, 0x77, 0x73, 0xef, 0x32, 0x01, 0xcd, 0x34, 0x1c, 0x38, 0x1e, 0x4f, 0x94, 0x49, 0xcc, 0x0e, 0x6c, 0x68, 0x8a, 0x35, 0x1d, 0x7a, 0x60, 0x70, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_407 = { .name = "ecdsa_brainpoolp224r1_sha224_407", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_407_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_407_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_407_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 342 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 408 for ECDSA, tcId is 343 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_408_pubkey[] = { 0x51, 0x2e, 0x58, 0x17, 0x31, 0xc9, 0xc4, 0x60, 0xbb, 0x70, 0x5b, 0x60, 0xda, 0x97, 0x6c, 0xcb, 0x1b, 0x0e, 0xf4, 0x21, 0x78, 0x51, 0x06, 0xba, 0x2c, 0xcd, 0xd2, 0x38, 0x0f, 0x21, 0xd5, 0xba, 0xcd, 0xf8, 0x1c, 0x0c, 0xb7, 0x8f, 0xa1, 0x51, 0x23, 0x7d, 0xb3, 0x13, 0x0a, 0xd4, 0xde, 0xf3, 0x73, 0xf3, 0xe5, 0x23, 0x39, 0x8c, 0x2c, 0xf7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_408_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_408_sig[] = { 0x5b, 0x88, 0x9d, 0x28, 0x8a, 0xaa, 0x81, 0x67, 0x4d, 0x32, 0x00, 0x6e, 0x81, 0x27, 0x9c, 0x57, 0xed, 0x56, 0xa0, 0x35, 0xc8, 0x78, 0xd3, 0xe2, 0xb6, 0x87, 0xbe, 0xc3, 0x0d, 0xa6, 0x21, 0xd5, 0xfa, 0x98, 0x13, 0x26, 0x3c, 0x7f, 0x58, 0xf8, 0xe0, 0x15, 0x5d, 0x6f, 0x0c, 0x33, 0x0a, 0x56, 0xc5, 0x94, 0xde, 0xfc, 0x2e, 0xbd, 0xf0, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_408 = { .name = "ecdsa_brainpoolp224r1_sha224_408", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_408_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_408_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_408_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 343 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 409 for ECDSA, tcId is 344 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_409_pubkey[] = { 0x51, 0x2e, 0x58, 0x17, 0x31, 0xc9, 0xc4, 0x60, 0xbb, 0x70, 0x5b, 0x60, 0xda, 0x97, 0x6c, 0xcb, 0x1b, 0x0e, 0xf4, 0x21, 0x78, 0x51, 0x06, 0xba, 0x2c, 0xcd, 0xd2, 0x38, 0x0f, 0x21, 0xd5, 0xba, 0xcd, 0xf8, 0x1c, 0x0c, 0xb7, 0x8f, 0xa1, 0x51, 0x23, 0x7d, 0xb3, 0x13, 0x0a, 0xd4, 0xde, 0xf3, 0x73, 0xf3, 0xe5, 0x23, 0x39, 0x8c, 0x2c, 0xf7, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_409_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_409_sig[] = { 0xb6, 0xf8, 0xa8, 0x01, 0x87, 0x18, 0x0a, 0xad, 0x8a, 0x5c, 0x89, 0x6b, 0xe2, 0x14, 0x31, 0x46, 0x01, 0xa1, 0x58, 0x5f, 0x2c, 0xcb, 0x28, 0xbc, 0x7e, 0x8e, 0x8f, 0x01, 0xa9, 0x0c, 0x68, 0xc1, 0x4a, 0x67, 0xf5, 0xd5, 0x9c, 0xec, 0x70, 0xdc, 0x0f, 0x47, 0x3b, 0x5c, 0x14, 0x01, 0x3b, 0x05, 0x6d, 0x12, 0xcb, 0xc0, 0xf7, 0x15, 0x3b, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_409 = { .name = "ecdsa_brainpoolp224r1_sha224_409", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_409_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_409_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_409_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 344 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 410 for ECDSA, tcId is 345 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_410_pubkey[] = { 0xac, 0x55, 0xd1, 0xb3, 0xfe, 0xd4, 0xae, 0xe0, 0x3f, 0xa3, 0x61, 0x5d, 0x22, 0x5a, 0x9c, 0xba, 0x5c, 0x02, 0x84, 0x41, 0x6f, 0xba, 0xf9, 0xa7, 0x61, 0x35, 0xf7, 0x62, 0x17, 0xa8, 0x88, 0x39, 0x5b, 0xce, 0xd3, 0x49, 0x77, 0xa8, 0x48, 0x23, 0x70, 0xd5, 0x6e, 0xbc, 0x62, 0xaa, 0x1c, 0xa8, 0x1b, 0xc3, 0x30, 0xf4, 0x9d, 0x4a, 0x14, 0x1d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_410_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_410_sig[] = { 0x16, 0xd4, 0xa8, 0x50, 0x9c, 0x9b, 0xce, 0x2c, 0x73, 0xf8, 0xdb, 0x4b, 0x73, 0x25, 0x7c, 0x7e, 0x33, 0xf4, 0x17, 0x26, 0xc2, 0x5c, 0x4c, 0x64, 0x54, 0x6b, 0x1d, 0xcc, 0x79, 0xba, 0x35, 0xa9, 0x6d, 0x23, 0x45, 0xad, 0x19, 0x4f, 0x39, 0x10, 0x91, 0x20, 0x9d, 0xfc, 0xce, 0xd7, 0x99, 0x17, 0xe0, 0x4d, 0xf3, 0xb6, 0x5f, 0x44, 0xd1, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_410 = { .name = "ecdsa_brainpoolp224r1_sha224_410", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_410_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_410_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_410_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP224t1, tcId is 345 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 411 for ECDSA, tcId is 346 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_411_pubkey[] = { 0xac, 0x55, 0xd1, 0xb3, 0xfe, 0xd4, 0xae, 0xe0, 0x3f, 0xa3, 0x61, 0x5d, 0x22, 0x5a, 0x9c, 0xba, 0x5c, 0x02, 0x84, 0x41, 0x6f, 0xba, 0xf9, 0xa7, 0x61, 0x35, 0xf7, 0x62, 0x17, 0xa8, 0x88, 0x39, 0x5b, 0xce, 0xd3, 0x49, 0x77, 0xa8, 0x48, 0x23, 0x70, 0xd5, 0x6e, 0xbc, 0x62, 0xaa, 0x1c, 0xa8, 0x1b, 0xc3, 0x30, 0xf4, 0x9d, 0x4a, 0x14, 0x1d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_411_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_411_sig[] = { 0x5d, 0xa1, 0x56, 0x97, 0xbb, 0xe4, 0xeb, 0xa7, 0x70, 0x7e, 0x34, 0x9f, 0xf3, 0x23, 0x9d, 0x50, 0x84, 0x55, 0x37, 0x81, 0x13, 0xd2, 0x4e, 0x7e, 0x1d, 0x7a, 0x02, 0x0c, 0x45, 0xbe, 0x44, 0xa5, 0x70, 0xfb, 0x53, 0x0c, 0x49, 0xd7, 0x59, 0x71, 0x2c, 0x10, 0x04, 0x13, 0x45, 0xf7, 0xc0, 0x89, 0x0a, 0x79, 0x46, 0xd9, 0x1d, 0x32, 0xba, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_411 = { .name = "ecdsa_brainpoolp224r1_sha224_411", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_411_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_411_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_411_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP224t1, tcId is 346 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 412 for ECDSA, tcId is 347 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_412_pubkey[] = { 0xac, 0x55, 0xd1, 0xb3, 0xfe, 0xd4, 0xae, 0xe0, 0x3f, 0xa3, 0x61, 0x5d, 0x22, 0x5a, 0x9c, 0xba, 0x5c, 0x02, 0x84, 0x41, 0x6f, 0xba, 0xf9, 0xa7, 0x61, 0x35, 0xf7, 0x62, 0x17, 0xa8, 0x88, 0x39, 0x5b, 0xce, 0xd3, 0x49, 0x77, 0xa8, 0x48, 0x23, 0x70, 0xd5, 0x6e, 0xbc, 0x62, 0xaa, 0x1c, 0xa8, 0x1b, 0xc3, 0x30, 0xf4, 0x9d, 0x4a, 0x14, 0x1d, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_412_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_412_sig[] = { 0xc1, 0xf8, 0xd4, 0x34, 0x79, 0xc4, 0xf2, 0x9b, 0x19, 0xb9, 0xb2, 0xc7, 0xb5, 0x74, 0x70, 0x10, 0x49, 0x14, 0x40, 0x74, 0x6c, 0xc8, 0x00, 0xd5, 0xbe, 0x89, 0xb0, 0x11, 0x81, 0x54, 0x34, 0x8b, 0x7c, 0x37, 0xf0, 0x50, 0x4d, 0xca, 0x2b, 0x11, 0x59, 0x41, 0xf7, 0xba, 0x58, 0x57, 0x32, 0x1e, 0xae, 0x8f, 0x64, 0x17, 0x5b, 0xe9, 0xcb, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_412 = { .name = "ecdsa_brainpoolp224r1_sha224_412", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_412_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_412_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_412_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP224t1, tcId is 347 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 413 for ECDSA, tcId is 348 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_413_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0x12, 0x0f, 0x96, 0x34, 0x3d, 0xeb, 0x80, 0x09, 0x3e, 0xcb, 0x76, 0x95, 0xc2, 0xd2, 0xa5, 0xbe, 0x99, 0x37, 0xa2, 0x58, 0x72, 0x3d, 0x78, 0xed, 0x00, 0xaa, 0x1e, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_413_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_413_sig[] = { 0x87, 0x15, 0x81, 0xb5, 0x00, 0x92, 0x57, 0x82, 0x11, 0x16, 0x0e, 0x47, 0x0d, 0xdd, 0xaa, 0x64, 0x0d, 0x5a, 0x2d, 0x9e, 0x22, 0x4f, 0xaf, 0xca, 0x87, 0x91, 0x06, 0xd4, 0xbe, 0x70, 0xfd, 0x5c, 0x75, 0x91, 0xa3, 0x13, 0x0f, 0x5c, 0x2a, 0xf5, 0x36, 0xff, 0xff, 0x8e, 0x72, 0xc1, 0x62, 0x51, 0x74, 0x4c, 0x97, 0x96, 0x8f, 0x92, 0x17, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_413 = { .name = "ecdsa_brainpoolp224r1_sha224_413", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_413_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_413_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_413_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP224t1, tcId is 348 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 414 for ECDSA, tcId is 349 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_414_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0x12, 0x0f, 0x96, 0x34, 0x3d, 0xeb, 0x80, 0x09, 0x3e, 0xcb, 0x76, 0x95, 0xc2, 0xd2, 0xa5, 0xbe, 0x99, 0x37, 0xa2, 0x58, 0x72, 0x3d, 0x78, 0xed, 0x00, 0xaa, 0x1e, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_414_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_414_sig[] = { 0xa9, 0x87, 0x35, 0xe5, 0x65, 0x90, 0x22, 0xb0, 0x27, 0x4a, 0xe6, 0xf7, 0xbc, 0xb1, 0x64, 0x6e, 0x9e, 0x6b, 0x4b, 0x88, 0x40, 0x8d, 0xb3, 0xf9, 0x26, 0xec, 0xcc, 0x89, 0xa9, 0x23, 0xff, 0x5e, 0x15, 0xe0, 0xd7, 0x64, 0xcd, 0x5c, 0xef, 0xff, 0xc5, 0xc4, 0x0c, 0x08, 0x2c, 0x6e, 0xb7, 0x72, 0xdb, 0x76, 0x62, 0xfb, 0x1b, 0x82, 0xd5, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_414 = { .name = "ecdsa_brainpoolp224r1_sha224_414", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_414_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_414_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_414_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP224t1, tcId is 349 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 415 for ECDSA, tcId is 350 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_415_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0x12, 0x0f, 0x96, 0x34, 0x3d, 0xeb, 0x80, 0x09, 0x3e, 0xcb, 0x76, 0x95, 0xc2, 0xd2, 0xa5, 0xbe, 0x99, 0x37, 0xa2, 0x58, 0x72, 0x3d, 0x78, 0xed, 0x00, 0xaa, 0x1e, 0xdf, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_415_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_415_sig[] = { 0xa9, 0x6b, 0x5c, 0x24, 0xe3, 0x3d, 0x59, 0x00, 0x4c, 0xf3, 0x1a, 0xae, 0xf4, 0x4a, 0xe4, 0xc7, 0x57, 0x9e, 0x0b, 0x5b, 0x21, 0x9a, 0xb2, 0x5d, 0x7f, 0x1c, 0x69, 0x0a, 0x88, 0xc0, 0x13, 0x78, 0x84, 0x7c, 0x38, 0x41, 0xf4, 0x9e, 0xc1, 0x48, 0x40, 0xe2, 0xd0, 0x23, 0xd7, 0xb9, 0x12, 0xb5, 0x03, 0xf2, 0xd9, 0x8a, 0x92, 0x3b, 0xe8, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_415 = { .name = "ecdsa_brainpoolp224r1_sha224_415", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_415_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_415_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_415_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP224t1, tcId is 350 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 416 for ECDSA, tcId is 351 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_416_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0xc5, 0xb1, 0x9e, 0x75, 0xe8, 0x57, 0xe6, 0x7c, 0xeb, 0x4c, 0xb9, 0x8f, 0xb2, 0xff, 0x31, 0xc9, 0x17, 0x67, 0x64, 0xff, 0x25, 0x9d, 0x11, 0x08, 0x7e, 0x1e, 0xa2, 0x20, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_416_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_416_sig[] = { 0x6b, 0x57, 0xb7, 0x3a, 0xb7, 0xc3, 0x9b, 0x56, 0x98, 0x54, 0x9d, 0xd5, 0xcd, 0xd4, 0xdf, 0x73, 0x98, 0x18, 0x1b, 0x55, 0x6e, 0x7c, 0x72, 0x83, 0x37, 0x5e, 0x3f, 0x86, 0x9f, 0x59, 0xd1, 0x86, 0x3d, 0x6f, 0xd6, 0x01, 0x32, 0x47, 0xd4, 0xe6, 0x78, 0xa1, 0xc4, 0xfc, 0x1d, 0x89, 0x6d, 0xc6, 0x61, 0xfa, 0x31, 0xfb, 0x73, 0xc3, 0x3f, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_416 = { .name = "ecdsa_brainpoolp224r1_sha224_416", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_416_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_416_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_416_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP224t1, tcId is 351 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 417 for ECDSA, tcId is 352 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_417_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0xc5, 0xb1, 0x9e, 0x75, 0xe8, 0x57, 0xe6, 0x7c, 0xeb, 0x4c, 0xb9, 0x8f, 0xb2, 0xff, 0x31, 0xc9, 0x17, 0x67, 0x64, 0xff, 0x25, 0x9d, 0x11, 0x08, 0x7e, 0x1e, 0xa2, 0x20, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_417_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_417_sig[] = { 0x2f, 0x85, 0xaf, 0x7e, 0x53, 0x5f, 0x66, 0xcf, 0xc9, 0xa9, 0xda, 0xb7, 0xbe, 0x78, 0x16, 0x31, 0xdd, 0x62, 0x2b, 0xe4, 0x35, 0xd7, 0x64, 0x2b, 0x5b, 0x51, 0xfc, 0xc7, 0x61, 0x93, 0x01, 0xc2, 0x1c, 0x93, 0x42, 0x55, 0xdf, 0x93, 0xee, 0xdd, 0x5b, 0x45, 0x9c, 0x8d, 0xd2, 0x80, 0xfd, 0xd0, 0x7e, 0xe6, 0x56, 0xa7, 0x14, 0x7d, 0x4d, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_417 = { .name = "ecdsa_brainpoolp224r1_sha224_417", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_417_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_417_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_417_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP224t1, tcId is 352 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 418 for ECDSA, tcId is 353 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_418_pubkey[] = { 0x8b, 0x31, 0x9f, 0x2e, 0xd0, 0x74, 0xa2, 0x0e, 0xc4, 0x2d, 0x86, 0x9c, 0x7f, 0x99, 0xbd, 0x91, 0x46, 0xed, 0x82, 0x63, 0x29, 0x7b, 0xfe, 0x00, 0x4f, 0x27, 0xc5, 0x9b, 0xc5, 0xb1, 0x9e, 0x75, 0xe8, 0x57, 0xe6, 0x7c, 0xeb, 0x4c, 0xb9, 0x8f, 0xb2, 0xff, 0x31, 0xc9, 0x17, 0x67, 0x64, 0xff, 0x25, 0x9d, 0x11, 0x08, 0x7e, 0x1e, 0xa2, 0x20, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_418_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_418_sig[] = { 0x98, 0xa8, 0xa9, 0x8f, 0xcc, 0x82, 0xf8, 0x04, 0xa8, 0x23, 0xcc, 0x91, 0x07, 0x24, 0x37, 0xcf, 0xd8, 0x83, 0x22, 0xb8, 0x67, 0x16, 0x86, 0x51, 0x7f, 0x19, 0x78, 0xab, 0x6a, 0xc3, 0xe8, 0x37, 0x76, 0x68, 0x5b, 0xce, 0xce, 0xfe, 0xba, 0xe4, 0x73, 0xac, 0x07, 0xc7, 0x71, 0xe8, 0x3b, 0x0c, 0x5a, 0x55, 0x7e, 0xfe, 0x83, 0x50, 0x20, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_418 = { .name = "ecdsa_brainpoolp224r1_sha224_418", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_418_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_418_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_418_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP224t1, tcId is 353 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 419 for ECDSA, tcId is 354 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_419_pubkey[] = { 0xc5, 0xdc, 0x51, 0x35, 0xf0, 0x50, 0xa9, 0x6b, 0xbb, 0x0d, 0x21, 0x88, 0x51, 0x95, 0xb4, 0x9a, 0x57, 0x4d, 0x51, 0x98, 0xba, 0xac, 0x4b, 0x46, 0x02, 0xb2, 0x1b, 0xc8, 0xb5, 0xf3, 0x8b, 0x7f, 0xe6, 0x61, 0x00, 0x3f, 0xae, 0xe1, 0xb7, 0xaf, 0x67, 0x0e, 0x16, 0x5b, 0xfa, 0xb7, 0x0b, 0x01, 0x89, 0x65, 0xe8, 0x33, 0x29, 0xd4, 0x05, 0xbc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_419_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_419_sig[] = { 0x69, 0x9c, 0x40, 0xb7, 0x35, 0x23, 0x6b, 0xd9, 0x23, 0x97, 0x70, 0xa5, 0xde, 0x2c, 0x1a, 0x75, 0x54, 0x63, 0x1e, 0x6b, 0xa6, 0xef, 0x51, 0x2f, 0x85, 0x53, 0xd0, 0x2f, 0x0b, 0xca, 0x9c, 0x51, 0x6c, 0xa4, 0x05, 0xff, 0xc9, 0xae, 0x2d, 0xce, 0xe1, 0x2a, 0xd7, 0xd9, 0x6b, 0x58, 0x6b, 0xfd, 0xc8, 0x18, 0xa3, 0xd4, 0x5d, 0xcf, 0xcf, 0x26, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_419 = { .name = "ecdsa_brainpoolp224r1_sha224_419", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_419_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_419_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_419_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP224t1, tcId is 354 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 420 for ECDSA, tcId is 355 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_420_pubkey[] = { 0xc5, 0xdc, 0x51, 0x35, 0xf0, 0x50, 0xa9, 0x6b, 0xbb, 0x0d, 0x21, 0x88, 0x51, 0x95, 0xb4, 0x9a, 0x57, 0x4d, 0x51, 0x98, 0xba, 0xac, 0x4b, 0x46, 0x02, 0xb2, 0x1b, 0xc8, 0xb5, 0xf3, 0x8b, 0x7f, 0xe6, 0x61, 0x00, 0x3f, 0xae, 0xe1, 0xb7, 0xaf, 0x67, 0x0e, 0x16, 0x5b, 0xfa, 0xb7, 0x0b, 0x01, 0x89, 0x65, 0xe8, 0x33, 0x29, 0xd4, 0x05, 0xbc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_420_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_420_sig[] = { 0x76, 0x8a, 0x81, 0x9d, 0x39, 0x43, 0xfc, 0x30, 0x78, 0x1a, 0xae, 0xf2, 0x8f, 0xa1, 0x20, 0x18, 0x4c, 0x72, 0x12, 0xd0, 0x91, 0x1f, 0xe0, 0x3d, 0xfc, 0x8c, 0x62, 0x60, 0x51, 0xb3, 0xdb, 0x0e, 0x1c, 0x3e, 0x93, 0x91, 0x49, 0xcc, 0xbf, 0x9d, 0x46, 0x19, 0xbb, 0xbf, 0xf0, 0xe2, 0xe1, 0x74, 0x11, 0x0f, 0x6e, 0xce, 0x43, 0x13, 0xb4, 0xca, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_420 = { .name = "ecdsa_brainpoolp224r1_sha224_420", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_420_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_420_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_420_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP224t1, tcId is 355 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 421 for ECDSA, tcId is 356 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_421_pubkey[] = { 0xc5, 0xdc, 0x51, 0x35, 0xf0, 0x50, 0xa9, 0x6b, 0xbb, 0x0d, 0x21, 0x88, 0x51, 0x95, 0xb4, 0x9a, 0x57, 0x4d, 0x51, 0x98, 0xba, 0xac, 0x4b, 0x46, 0x02, 0xb2, 0x1b, 0xc8, 0xb5, 0xf3, 0x8b, 0x7f, 0xe6, 0x61, 0x00, 0x3f, 0xae, 0xe1, 0xb7, 0xaf, 0x67, 0x0e, 0x16, 0x5b, 0xfa, 0xb7, 0x0b, 0x01, 0x89, 0x65, 0xe8, 0x33, 0x29, 0xd4, 0x05, 0xbc, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_421_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_421_sig[] = { 0x58, 0xfc, 0xc0, 0xff, 0xb1, 0x25, 0xc2, 0x3c, 0x43, 0x57, 0x35, 0xb7, 0xc3, 0x90, 0x69, 0x20, 0x37, 0xc0, 0x3a, 0x67, 0x65, 0xef, 0x7b, 0x53, 0x65, 0xa1, 0x7d, 0xd4, 0x95, 0x18, 0xd2, 0x9d, 0x78, 0xed, 0xa9, 0xcb, 0x25, 0x03, 0xfd, 0xe3, 0x8d, 0x3b, 0x73, 0xd6, 0xfb, 0x90, 0xa0, 0xd4, 0x0a, 0x23, 0xf0, 0xec, 0x26, 0x16, 0x69, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_421 = { .name = "ecdsa_brainpoolp224r1_sha224_421", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_421_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_421_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_421_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP224t1, tcId is 356 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 422 for ECDSA, tcId is 357 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_422_pubkey[] = { 0xc1, 0xb5, 0x6a, 0x1a, 0xd1, 0x54, 0xe1, 0x15, 0x56, 0xb7, 0x23, 0xfc, 0x74, 0x93, 0xf3, 0x6e, 0x66, 0x50, 0x9d, 0x8f, 0x68, 0xfa, 0xd0, 0xe6, 0x2c, 0x40, 0xf0, 0x85, 0x9b, 0x04, 0x78, 0x0a, 0x85, 0xe6, 0x9a, 0xbf, 0x98, 0xde, 0xf3, 0x33, 0x5c, 0xe6, 0x43, 0xcd, 0x35, 0x54, 0x16, 0x7a, 0x8b, 0x50, 0xd5, 0x96, 0xb9, 0x53, 0x88, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_422_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_422_sig[] = { 0xd1, 0x93, 0xee, 0x0a, 0x3d, 0x42, 0xa2, 0x3a, 0xf0, 0x18, 0xab, 0x90, 0x89, 0x6b, 0x35, 0xd5, 0xc2, 0x50, 0x18, 0x7b, 0xf9, 0xfb, 0x1c, 0xca, 0xc3, 0x64, 0x74, 0x8c, 0xa0, 0x92, 0x2a, 0xcc, 0xc7, 0x56, 0x2d, 0x01, 0x71, 0x09, 0xe9, 0x1d, 0x2f, 0x83, 0xe4, 0x8b, 0xfa, 0x3c, 0x1f, 0xa2, 0xee, 0x04, 0xd8, 0x46, 0x9b, 0xe9, 0x40, 0x33, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_422 = { .name = "ecdsa_brainpoolp224r1_sha224_422", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_422_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_422_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_422_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 357 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 423 for ECDSA, tcId is 358 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_423_pubkey[] = { 0xc1, 0xb5, 0x6a, 0x1a, 0xd1, 0x54, 0xe1, 0x15, 0x56, 0xb7, 0x23, 0xfc, 0x74, 0x93, 0xf3, 0x6e, 0x66, 0x50, 0x9d, 0x8f, 0x68, 0xfa, 0xd0, 0xe6, 0x2c, 0x40, 0xf0, 0x85, 0x9b, 0x04, 0x78, 0x0a, 0x85, 0xe6, 0x9a, 0xbf, 0x98, 0xde, 0xf3, 0x33, 0x5c, 0xe6, 0x43, 0xcd, 0x35, 0x54, 0x16, 0x7a, 0x8b, 0x50, 0xd5, 0x96, 0xb9, 0x53, 0x88, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_423_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_423_sig[] = { 0x09, 0x74, 0x52, 0x1d, 0x7c, 0xe7, 0x53, 0xde, 0xa5, 0xd1, 0x15, 0x6f, 0xb4, 0xd9, 0x92, 0xcc, 0x61, 0x40, 0x79, 0xeb, 0x86, 0x77, 0xab, 0x36, 0xa4, 0x07, 0x8a, 0x4f, 0x83, 0x74, 0xdf, 0xba, 0xe8, 0xd0, 0x42, 0x9a, 0x6f, 0xba, 0x60, 0xfb, 0xb5, 0xd2, 0xfd, 0x55, 0x98, 0x56, 0xa5, 0xd7, 0x39, 0xf3, 0x9a, 0xa2, 0xbf, 0x1d, 0xa1, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_423 = { .name = "ecdsa_brainpoolp224r1_sha224_423", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_423_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_423_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_423_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 358 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 424 for ECDSA, tcId is 359 in file ecdsa_brainpoolP224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_brainpoolp224r1_sha224_424_pubkey[] = { 0xc1, 0xb5, 0x6a, 0x1a, 0xd1, 0x54, 0xe1, 0x15, 0x56, 0xb7, 0x23, 0xfc, 0x74, 0x93, 0xf3, 0x6e, 0x66, 0x50, 0x9d, 0x8f, 0x68, 0xfa, 0xd0, 0xe6, 0x2c, 0x40, 0xf0, 0x85, 0x9b, 0x04, 0x78, 0x0a, 0x85, 0xe6, 0x9a, 0xbf, 0x98, 0xde, 0xf3, 0x33, 0x5c, 0xe6, 0x43, 0xcd, 0x35, 0x54, 0x16, 0x7a, 0x8b, 0x50, 0xd5, 0x96, 0xb9, 0x53, 0x88, 0x95, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_424_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp224r1_sha224_424_sig[] = { 0x62, 0x5f, 0x47, 0x3c, 0xa2, 0xd1, 0x5b, 0xb7, 0xf1, 0x2d, 0xa1, 0x23, 0x5f, 0x90, 0xad, 0xcb, 0x69, 0xed, 0x48, 0x18, 0x74, 0x6c, 0xae, 0x2e, 0x2d, 0xb2, 0x6f, 0xe6, 0x4a, 0xb8, 0x17, 0xf6, 0xf1, 0xb9, 0xc8, 0xc4, 0x9f, 0x68, 0x1b, 0xed, 0x15, 0x68, 0x34, 0x6f, 0x53, 0xec, 0xbf, 0xac, 0xfd, 0x52, 0xd4, 0x5e, 0x27, 0xab, 0xcb, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp224r1_sha224_424 = { .name = "ecdsa_brainpoolp224r1_sha224_424", .sig_alg = ECDSA, .hash = SHA224, .curve = &brainpoolp224r1_str_params, .pubkey = ecdsa_brainpoolp224r1_sha224_424_pubkey, .pubkeylen = 56, .msg = ecdsa_brainpoolp224r1_sha224_424_msg, .msglen = 7, .sig = ecdsa_brainpoolp224r1_sha224_424_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP224t1, tcId is 359 in file ecdsa_brainpoolP224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP224R1) && defined(WITH_HASH_SHA224) */ /* Test 425 for ECDSA, tcId is 1 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_425_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_425_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_425_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x42, 0x6e, 0x85, 0x7a, 0xad, 0x3f, 0xf7, 0xaa, 0x96, 0xe4, 0xd2, 0x00, 0xc0, 0x3b, 0x45, 0xf1, 0x84, 0x6a, 0x36, 0xd0, 0x89, 0xee, 0x39, 0x17, 0x76, 0x8c, 0xa1, 0xa0, 0xd6, 0xd4, 0xda, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_425 = { .name = "ecdsa_brainpoolp256r1_sha256_425", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_425_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_425_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_425_sig, .siglen = 64, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 426 for ECDSA, tcId is 2 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_426_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_426_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_426_sig[] = { 0xb4, 0x5a, 0xe4, 0x4c, 0x5c, 0x1b, 0xb1, 0xff, 0x14, 0x37, 0x02, 0xd2, 0x8e, 0xe4, 0x3a, 0x86, 0xa5, 0x90, 0xe4, 0x4b, 0xca, 0xfd, 0xa5, 0x60, 0xb6, 0x52, 0xe5, 0xbf, 0xdd, 0xe5, 0x67, 0xc6, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_426 = { .name = "ecdsa_brainpoolp256r1_sha256_426", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_426_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_426_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_426_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 427 for ECDSA, tcId is 3 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_427_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_427_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_427_sig[] = { 0x9f, 0x9b, 0xcb, 0x6a, 0xe7, 0xc1, 0xa1, 0x79, 0x68, 0x95, 0x12, 0x4e, 0xac, 0x22, 0xe0, 0x5c, 0x72, 0xe2, 0x10, 0xfb, 0x9f, 0xc5, 0xa8, 0x8e, 0x69, 0xe9, 0x37, 0x45, 0x50, 0xab, 0x45, 0x88, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_427 = { .name = "ecdsa_brainpoolp256r1_sha256_427", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_427_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_427_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_427_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 428 for ECDSA, tcId is 4 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_428_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_428_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_428_sig[] = { 0x01, 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x00, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_428 = { .name = "ecdsa_brainpoolp256r1_sha256_428", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_428_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_428_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_428_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 429 for ECDSA, tcId is 5 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_429_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_429_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_429_sig[] = { 0xf5, 0xa0, 0x73, 0x8f, 0x45, 0xd2, 0xf7, 0xbd, 0x2a, 0x2f, 0x07, 0xbe, 0x0e, 0x9f, 0x52, 0xea, 0xe6, 0xa8, 0x96, 0x57, 0xea, 0x64, 0x01, 0x96, 0xd9, 0xcb, 0x28, 0xc2, 0xb9, 0x62, 0xee, 0xe1, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_429 = { .name = "ecdsa_brainpoolp256r1_sha256_429", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_429_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_429_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_429_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 430 for ECDSA, tcId is 6 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_430_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_430_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_430_sig[] = { 0x00, 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x01, 0x11, 0x88, 0x2a, 0x3c, 0x96, 0x9d, 0x5b, 0xcd, 0xe5, 0xe7, 0x43, 0x20, 0x7a, 0xcb, 0xd4, 0xf1, 0x94, 0x08, 0xbe, 0x76, 0xe0, 0xd5, 0x14, 0xd7, 0xa9, 0xaf, 0x7b, 0x64, 0x57, 0xbb, 0xd2, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_430 = { .name = "ecdsa_brainpoolp256r1_sha256_430", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_430_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_430_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_430_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 431 for ECDSA, tcId is 7 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_431_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_431_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_431_sig[] = { 0x00, 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x01, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_431 = { .name = "ecdsa_brainpoolp256r1_sha256_431", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_431_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_431_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_431_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 432 for ECDSA, tcId is 8 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_432_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_432_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_432_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x98, 0x73, 0x2d, 0x9f, 0x0b, 0x51, 0x4d, 0xee, 0x58, 0x7e, 0xc7, 0x70, 0x22, 0xb7, 0xb8, 0x7f, 0xf8, 0x30, 0xbc, 0x2c, 0xd4, 0x8c, 0x92, 0x1f, 0xe6, 0x6e, 0x93, 0x1e, 0x3f, 0x8c, 0x83, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_432 = { .name = "ecdsa_brainpoolp256r1_sha256_432", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_432_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_432_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_432_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 433 for ECDSA, tcId is 9 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_433_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_433_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_433_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_433 = { .name = "ecdsa_brainpoolp256r1_sha256_433", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_433_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_433_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_433_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 434 for ECDSA, tcId is 10 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_434_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_434_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_434_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_434 = { .name = "ecdsa_brainpoolp256r1_sha256_434", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_434_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_434_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_434_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 435 for ECDSA, tcId is 11 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_435_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_435_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_435_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_435 = { .name = "ecdsa_brainpoolp256r1_sha256_435", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_435_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_435_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_435_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 436 for ECDSA, tcId is 12 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_436_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_436_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_436_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_436 = { .name = "ecdsa_brainpoolp256r1_sha256_436", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_436_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_436_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_436_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 437 for ECDSA, tcId is 13 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_437_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_437_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_437_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_437 = { .name = "ecdsa_brainpoolp256r1_sha256_437", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_437_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_437_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_437_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 438 for ECDSA, tcId is 14 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_438_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_438_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_438_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_438 = { .name = "ecdsa_brainpoolp256r1_sha256_438", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_438_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_438_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_438_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 439 for ECDSA, tcId is 15 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_439_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_439_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_439_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_439 = { .name = "ecdsa_brainpoolp256r1_sha256_439", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_439_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_439_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_439_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 440 for ECDSA, tcId is 16 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_440_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_440_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_440_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_440 = { .name = "ecdsa_brainpoolp256r1_sha256_440", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_440_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_440_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_440_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 441 for ECDSA, tcId is 17 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_441_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_441_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_441_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_441 = { .name = "ecdsa_brainpoolp256r1_sha256_441", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_441_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_441_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_441_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 442 for ECDSA, tcId is 18 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_442_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_442_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_442_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_442 = { .name = "ecdsa_brainpoolp256r1_sha256_442", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_442_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_442_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_442_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 443 for ECDSA, tcId is 19 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_443_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_443_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_443_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_443 = { .name = "ecdsa_brainpoolp256r1_sha256_443", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_443_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_443_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_443_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 444 for ECDSA, tcId is 20 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_444_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_444_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_444_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_444 = { .name = "ecdsa_brainpoolp256r1_sha256_444", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_444_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_444_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_444_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 445 for ECDSA, tcId is 21 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_445_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_445_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_445_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_445 = { .name = "ecdsa_brainpoolp256r1_sha256_445", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_445_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_445_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_445_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 446 for ECDSA, tcId is 22 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_446_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_446_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_446_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_446 = { .name = "ecdsa_brainpoolp256r1_sha256_446", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_446_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_446_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_446_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 447 for ECDSA, tcId is 23 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_447_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_447_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_447_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_447 = { .name = "ecdsa_brainpoolp256r1_sha256_447", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_447_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_447_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_447_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 448 for ECDSA, tcId is 24 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_448_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_448_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_448_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_448 = { .name = "ecdsa_brainpoolp256r1_sha256_448", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_448_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_448_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_448_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 449 for ECDSA, tcId is 25 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_449_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_449_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_449_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_449 = { .name = "ecdsa_brainpoolp256r1_sha256_449", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_449_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_449_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_449_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 450 for ECDSA, tcId is 26 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_450_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_450_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_450_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_450 = { .name = "ecdsa_brainpoolp256r1_sha256_450", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_450_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_450_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_450_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 451 for ECDSA, tcId is 27 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_451_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_451_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_451_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_451 = { .name = "ecdsa_brainpoolp256r1_sha256_451", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_451_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_451_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_451_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 452 for ECDSA, tcId is 28 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_452_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_452_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_452_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_452 = { .name = "ecdsa_brainpoolp256r1_sha256_452", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_452_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_452_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_452_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 453 for ECDSA, tcId is 29 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_453_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_453_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_453_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_453 = { .name = "ecdsa_brainpoolp256r1_sha256_453", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_453_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_453_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_453_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 454 for ECDSA, tcId is 30 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_454_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_454_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_454_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_454 = { .name = "ecdsa_brainpoolp256r1_sha256_454", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_454_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_454_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_454_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 455 for ECDSA, tcId is 31 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_455_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_455_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_455_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_455 = { .name = "ecdsa_brainpoolp256r1_sha256_455", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_455_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_455_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_455_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 456 for ECDSA, tcId is 32 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_456_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_456_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_456_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_456 = { .name = "ecdsa_brainpoolp256r1_sha256_456", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_456_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_456_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_456_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 457 for ECDSA, tcId is 33 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_457_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_457_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_457_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_457 = { .name = "ecdsa_brainpoolp256r1_sha256_457", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_457_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_457_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_457_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 458 for ECDSA, tcId is 34 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_458_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_458_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_458_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_458 = { .name = "ecdsa_brainpoolp256r1_sha256_458", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_458_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_458_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_458_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 459 for ECDSA, tcId is 35 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_459_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_459_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_459_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_459 = { .name = "ecdsa_brainpoolp256r1_sha256_459", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_459_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_459_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_459_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 460 for ECDSA, tcId is 36 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_460_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_460_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_460_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_460 = { .name = "ecdsa_brainpoolp256r1_sha256_460", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_460_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_460_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_460_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 461 for ECDSA, tcId is 37 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_461_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_461_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_461_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_461 = { .name = "ecdsa_brainpoolp256r1_sha256_461", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_461_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_461_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_461_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 462 for ECDSA, tcId is 38 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_462_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_462_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_462_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_462 = { .name = "ecdsa_brainpoolp256r1_sha256_462", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_462_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_462_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_462_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 463 for ECDSA, tcId is 39 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_463_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_463_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_463_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_463 = { .name = "ecdsa_brainpoolp256r1_sha256_463", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_463_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_463_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_463_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 464 for ECDSA, tcId is 40 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_464_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_464_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_464_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_464 = { .name = "ecdsa_brainpoolp256r1_sha256_464", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_464_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_464_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_464_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 465 for ECDSA, tcId is 41 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_465_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_465_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_465_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_465 = { .name = "ecdsa_brainpoolp256r1_sha256_465", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_465_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_465_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_465_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 466 for ECDSA, tcId is 42 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_466_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_466_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_466_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_466 = { .name = "ecdsa_brainpoolp256r1_sha256_466", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_466_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_466_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_466_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 467 for ECDSA, tcId is 43 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_467_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_467_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_467_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_467 = { .name = "ecdsa_brainpoolp256r1_sha256_467", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_467_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_467_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_467_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 468 for ECDSA, tcId is 44 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_468_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_468_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_468_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_468 = { .name = "ecdsa_brainpoolp256r1_sha256_468", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_468_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_468_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_468_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 469 for ECDSA, tcId is 45 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_469_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_469_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_469_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_469 = { .name = "ecdsa_brainpoolp256r1_sha256_469", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_469_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_469_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_469_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 470 for ECDSA, tcId is 46 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_470_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_470_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_470_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_470 = { .name = "ecdsa_brainpoolp256r1_sha256_470", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_470_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_470_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_470_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 471 for ECDSA, tcId is 47 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_471_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_471_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_471_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_471 = { .name = "ecdsa_brainpoolp256r1_sha256_471", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_471_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_471_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_471_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 472 for ECDSA, tcId is 48 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_472_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_472_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_472_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_472 = { .name = "ecdsa_brainpoolp256r1_sha256_472", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_472_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_472_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_472_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 473 for ECDSA, tcId is 49 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_473_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_473_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_473_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_473 = { .name = "ecdsa_brainpoolp256r1_sha256_473", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_473_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_473_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_473_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 474 for ECDSA, tcId is 50 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_474_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_474_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_474_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_474 = { .name = "ecdsa_brainpoolp256r1_sha256_474", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_474_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_474_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_474_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 475 for ECDSA, tcId is 51 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_475_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_475_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_475_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_475 = { .name = "ecdsa_brainpoolp256r1_sha256_475", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_475_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_475_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_475_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 476 for ECDSA, tcId is 52 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_476_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_476_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_476_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_476 = { .name = "ecdsa_brainpoolp256r1_sha256_476", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_476_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_476_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_476_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 477 for ECDSA, tcId is 53 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_477_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_477_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_477_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_477 = { .name = "ecdsa_brainpoolp256r1_sha256_477", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_477_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_477_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_477_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 478 for ECDSA, tcId is 54 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_478_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_478_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_478_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_478 = { .name = "ecdsa_brainpoolp256r1_sha256_478", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_478_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_478_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_478_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 479 for ECDSA, tcId is 55 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_479_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_479_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_479_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_479 = { .name = "ecdsa_brainpoolp256r1_sha256_479", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_479_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_479_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_479_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 480 for ECDSA, tcId is 56 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_480_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_480_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_480_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_480 = { .name = "ecdsa_brainpoolp256r1_sha256_480", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_480_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_480_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_480_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 481 for ECDSA, tcId is 57 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_481_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_481_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_481_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_481 = { .name = "ecdsa_brainpoolp256r1_sha256_481", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_481_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_481_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_481_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 482 for ECDSA, tcId is 58 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_482_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_482_msg[] = { 0x36, 0x38, 0x39, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_482_sig[] = { 0x0c, 0x93, 0x9a, 0x92, 0x48, 0x6c, 0x6d, 0x0d, 0x61, 0x95, 0x10, 0xb4, 0xa9, 0x41, 0x62, 0xb9, 0x22, 0x1b, 0xe2, 0xeb, 0x15, 0xfa, 0xf8, 0x78, 0xbf, 0xf7, 0x5e, 0x6c, 0xdf, 0x4e, 0x37, 0x07, 0x39, 0x77, 0x61, 0x9b, 0x43, 0xe6, 0xb4, 0xea, 0x18, 0x70, 0xd8, 0x61, 0x20, 0x64, 0x83, 0xb3, 0x06, 0x56, 0x0e, 0x3c, 0x4a, 0x3e, 0xf8, 0x2b, 0x11, 0xa8, 0x02, 0xff, 0x88, 0x92, 0xdc, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_482 = { .name = "ecdsa_brainpoolp256r1_sha256_482", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_482_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_482_msg, .msglen = 5, .sig = ecdsa_brainpoolp256r1_sha256_482_sig, .siglen = 64, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 483 for ECDSA, tcId is 59 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_483_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_483_msg[] = { 0x34, 0x32, 0x36, 0x34, 0x37, 0x39, 0x37, 0x32, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_483_sig[] = { 0x55, 0x83, 0xdd, 0x48, 0x09, 0x64, 0xbd, 0x23, 0x32, 0x88, 0x5f, 0xbb, 0x50, 0xb7, 0x47, 0x5e, 0xbd, 0x42, 0x83, 0x99, 0xe7, 0x16, 0x6f, 0xd9, 0xbd, 0x52, 0x96, 0x11, 0x53, 0x4b, 0x9f, 0x34, 0x0e, 0xd0, 0x35, 0xa0, 0x2c, 0x4b, 0x66, 0x5c, 0xac, 0xb7, 0x0d, 0xe8, 0xe8, 0x22, 0xfa, 0xcd, 0x71, 0x64, 0x5a, 0x15, 0xf9, 0x3f, 0xee, 0x66, 0x13, 0x24, 0xf8, 0x50, 0xb8, 0x47, 0xb5, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_483 = { .name = "ecdsa_brainpoolp256r1_sha256_483", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_483_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_483_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_483_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 484 for ECDSA, tcId is 60 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_484_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_484_msg[] = { 0x37, 0x31, 0x33, 0x38, 0x36, 0x38, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_484_sig[] = { 0x30, 0x0e, 0x26, 0x02, 0x7c, 0xe7, 0xd3, 0xf2, 0x1c, 0x85, 0x71, 0xdc, 0x69, 0x0b, 0x1b, 0xb9, 0x90, 0xe8, 0xfc, 0x49, 0xad, 0x3e, 0x95, 0x37, 0x4b, 0xd5, 0x43, 0xb2, 0xe2, 0x2b, 0xad, 0xc6, 0x22, 0xbc, 0x8f, 0x24, 0x45, 0xcd, 0x49, 0x56, 0xbc, 0x0d, 0xb5, 0x53, 0x96, 0x6a, 0x07, 0x18, 0xae, 0xb5, 0xea, 0xd6, 0x5b, 0xc6, 0x6d, 0xdb, 0x21, 0xfe, 0xa0, 0xe5, 0x71, 0xa8, 0x7e, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_484 = { .name = "ecdsa_brainpoolp256r1_sha256_484", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_484_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_484_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_484_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 485 for ECDSA, tcId is 61 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_485_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_485_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x33, 0x33, 0x31, 0x36, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_485_sig[] = { 0x29, 0x07, 0xcb, 0x01, 0xa8, 0x2a, 0x88, 0x04, 0x66, 0x40, 0xa5, 0x23, 0xf9, 0xb9, 0x85, 0x4d, 0x95, 0xb7, 0xec, 0x2d, 0xdd, 0x67, 0xc2, 0x07, 0x23, 0xd0, 0x58, 0x29, 0xe8, 0x43, 0x8a, 0x77, 0x38, 0xca, 0x08, 0xe5, 0x86, 0x23, 0x56, 0x0f, 0x72, 0x4a, 0x3e, 0x3f, 0x9b, 0xa0, 0xe9, 0xec, 0x79, 0x74, 0x97, 0x6d, 0xd3, 0x4e, 0x69, 0x40, 0xc0, 0xfe, 0x61, 0x68, 0xd5, 0x40, 0xe3, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_485 = { .name = "ecdsa_brainpoolp256r1_sha256_485", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_485_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_485_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_485_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 486 for ECDSA, tcId is 62 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_486_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_486_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x34, 0x30, 0x31, 0x32, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_486_sig[] = { 0x0c, 0x35, 0x84, 0x0f, 0x7b, 0x73, 0x19, 0xf1, 0x9f, 0xd7, 0x2f, 0x29, 0xfe, 0xa4, 0xcf, 0x93, 0x7a, 0xba, 0x2c, 0x3f, 0xe1, 0xdc, 0x01, 0xae, 0xc6, 0x3c, 0x21, 0x09, 0x4c, 0x5d, 0x35, 0x48, 0x7b, 0xf6, 0x99, 0x86, 0x8c, 0x2b, 0x69, 0x45, 0x47, 0xae, 0xbe, 0x9b, 0x98, 0xc0, 0x1c, 0x5e, 0xfb, 0xe9, 0x82, 0xa8, 0x41, 0x50, 0x39, 0x08, 0x94, 0x56, 0x3d, 0x4e, 0x2c, 0xb2, 0x40, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_486 = { .name = "ecdsa_brainpoolp256r1_sha256_486", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_486_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_486_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_486_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 487 for ECDSA, tcId is 63 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_487_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_487_msg[] = { 0x31, 0x33, 0x34, 0x34, 0x32, 0x39, 0x33, 0x30, 0x37, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_487_sig[] = { 0x42, 0x72, 0xff, 0x20, 0xb8, 0xc3, 0xd1, 0x9e, 0x8c, 0x84, 0x14, 0x1f, 0xbe, 0x4d, 0x16, 0x81, 0xfa, 0x71, 0xb5, 0x1f, 0x6c, 0x10, 0x36, 0x0d, 0xb7, 0xaf, 0xfa, 0xc9, 0x89, 0x27, 0x4d, 0x23, 0x67, 0x72, 0xff, 0x76, 0x8e, 0xe6, 0xa3, 0xed, 0xaf, 0x0d, 0xbd, 0xd7, 0xb5, 0xc6, 0x96, 0x2c, 0x2a, 0xcc, 0x8c, 0xb1, 0x4e, 0x63, 0x47, 0x63, 0x1e, 0x25, 0x94, 0x01, 0x89, 0x72, 0x94, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_487 = { .name = "ecdsa_brainpoolp256r1_sha256_487", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_487_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_487_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_487_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 488 for ECDSA, tcId is 64 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_488_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_488_msg[] = { 0x33, 0x37, 0x30, 0x36, 0x32, 0x31, 0x31, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_488_sig[] = { 0x0a, 0x1e, 0x07, 0x2c, 0x48, 0xa6, 0x2a, 0x58, 0x3b, 0xf9, 0x4f, 0xe6, 0x38, 0x09, 0xe9, 0x5f, 0x32, 0x02, 0x17, 0x6b, 0xfa, 0x6d, 0x28, 0xde, 0x8f, 0x75, 0xa4, 0xa3, 0x25, 0x6c, 0xa2, 0x1f, 0x95, 0x14, 0xa6, 0xe5, 0xb2, 0x35, 0xc2, 0x91, 0x52, 0x56, 0x1c, 0xc9, 0x49, 0x2c, 0xf4, 0x74, 0x77, 0xa0, 0xfe, 0x23, 0xf5, 0x60, 0x40, 0xd7, 0x20, 0x6b, 0xfb, 0x4e, 0xb3, 0xe1, 0x87, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_488 = { .name = "ecdsa_brainpoolp256r1_sha256_488", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_488_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_488_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_488_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 489 for ECDSA, tcId is 65 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_489_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_489_msg[] = { 0x33, 0x34, 0x33, 0x36, 0x38, 0x38, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_489_sig[] = { 0x02, 0xbc, 0xbd, 0x38, 0xa3, 0xe3, 0x11, 0x34, 0x45, 0xad, 0x2e, 0xe4, 0x2f, 0xae, 0xae, 0xe9, 0xfe, 0xd0, 0x02, 0x77, 0xe0, 0xb1, 0x55, 0x21, 0x32, 0x9f, 0x4c, 0x27, 0xc9, 0x63, 0xaf, 0x01, 0x06, 0xcf, 0x39, 0x9d, 0xeb, 0x1f, 0x6f, 0xd6, 0x92, 0x07, 0x5d, 0x23, 0x62, 0x72, 0xb9, 0x9c, 0x33, 0x36, 0xae, 0xa2, 0xcf, 0xac, 0x34, 0xd9, 0x04, 0x64, 0x6c, 0xc1, 0xda, 0xf5, 0x4d, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_489 = { .name = "ecdsa_brainpoolp256r1_sha256_489", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_489_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_489_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_489_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 490 for ECDSA, tcId is 66 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_490_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_490_msg[] = { 0x31, 0x33, 0x35, 0x31, 0x35, 0x33, 0x30, 0x33, 0x37, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_490_sig[] = { 0x62, 0xf3, 0xa6, 0xa9, 0xc9, 0xf4, 0x57, 0x21, 0x1b, 0x46, 0xb1, 0xca, 0x3a, 0x78, 0x2f, 0x11, 0xf4, 0x4c, 0xb9, 0x36, 0x0b, 0xb3, 0x07, 0x02, 0xe6, 0x71, 0x36, 0x03, 0x6c, 0xcb, 0xa3, 0x9e, 0x22, 0xf0, 0x2e, 0x5f, 0x64, 0x7c, 0xeb, 0x3d, 0x0c, 0x49, 0xf2, 0xe7, 0xac, 0x9b, 0xbb, 0x31, 0xb7, 0xe3, 0xae, 0x29, 0xa5, 0xed, 0x67, 0x0c, 0x96, 0xca, 0xd6, 0xd0, 0xf4, 0x5d, 0xf3, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_490 = { .name = "ecdsa_brainpoolp256r1_sha256_490", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_490_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_490_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_490_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 491 for ECDSA, tcId is 67 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_491_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_491_msg[] = { 0x36, 0x35, 0x35, 0x33, 0x32, 0x30, 0x33, 0x31, 0x32, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_491_sig[] = { 0x23, 0xd6, 0x79, 0xae, 0xd9, 0x06, 0x6b, 0x61, 0x18, 0x20, 0xa8, 0xe0, 0x2b, 0x3d, 0xaa, 0x92, 0x2b, 0x10, 0xd5, 0x59, 0x6c, 0x8c, 0xeb, 0x7b, 0xd4, 0xe4, 0xfc, 0xd6, 0xe5, 0xe1, 0xdc, 0xa7, 0x96, 0x26, 0xe1, 0xd2, 0x20, 0x5d, 0x60, 0xe3, 0x9b, 0x63, 0x38, 0x52, 0xf6, 0x23, 0xf0, 0xf8, 0xb3, 0x5e, 0x44, 0x79, 0x7e, 0x08, 0xc6, 0xfa, 0xd1, 0x96, 0xc3, 0x3b, 0xe6, 0x9b, 0x5a, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_491 = { .name = "ecdsa_brainpoolp256r1_sha256_491", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_491_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_491_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_491_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 492 for ECDSA, tcId is 68 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_492_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_492_msg[] = { 0x31, 0x35, 0x36, 0x34, 0x33, 0x34, 0x36, 0x36, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_492_sig[] = { 0x0e, 0x4c, 0x5c, 0x07, 0x7f, 0x14, 0xa4, 0xdb, 0x19, 0x76, 0x54, 0xf8, 0x08, 0x1f, 0x10, 0xac, 0x22, 0x29, 0xe6, 0xf2, 0x08, 0x44, 0x05, 0xae, 0xa5, 0x25, 0x67, 0x9e, 0x59, 0x25, 0x39, 0xa9, 0x13, 0x55, 0xd4, 0x36, 0x67, 0x40, 0x2b, 0x9f, 0x01, 0x95, 0x91, 0x40, 0xc4, 0x14, 0xf1, 0x8d, 0x90, 0x8e, 0x25, 0x59, 0xe5, 0x7a, 0xdf, 0x35, 0xce, 0x79, 0x4d, 0xbc, 0x8e, 0x22, 0x20, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_492 = { .name = "ecdsa_brainpoolp256r1_sha256_492", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_492_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_492_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_492_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 493 for ECDSA, tcId is 69 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_493_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_493_msg[] = { 0x34, 0x34, 0x32, 0x39, 0x35, 0x33, 0x39, 0x31, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_493_sig[] = { 0x32, 0x46, 0xb3, 0x39, 0x54, 0xcf, 0x1d, 0xd4, 0xa2, 0x16, 0x21, 0x8d, 0x49, 0xb1, 0x4e, 0x39, 0xdb, 0x82, 0x00, 0x4b, 0xa0, 0x55, 0x6f, 0xb5, 0x91, 0x35, 0x7a, 0xff, 0x76, 0xa1, 0xea, 0x63, 0x5b, 0x5f, 0xcb, 0x72, 0x6e, 0xbf, 0x18, 0xc9, 0x15, 0x1a, 0x26, 0xa5, 0xb0, 0x80, 0x0c, 0xbf, 0x95, 0xb5, 0xed, 0xc0, 0x84, 0xb4, 0x2d, 0xc6, 0xdc, 0x7f, 0xbb, 0x9a, 0x0a, 0xed, 0x84, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_493 = { .name = "ecdsa_brainpoolp256r1_sha256_493", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_493_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_493_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_493_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 494 for ECDSA, tcId is 70 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_494_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_494_msg[] = { 0x31, 0x30, 0x39, 0x35, 0x33, 0x32, 0x36, 0x31, 0x33, 0x35, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_494_sig[] = { 0x36, 0x1a, 0x8d, 0xef, 0x87, 0x40, 0x57, 0xc7, 0x15, 0x42, 0x38, 0x43, 0xbd, 0x7b, 0xf0, 0x77, 0x5b, 0xa6, 0x36, 0x6f, 0xa4, 0x8c, 0xa8, 0x3e, 0x1c, 0xdc, 0xe2, 0x06, 0xbf, 0x94, 0xc2, 0xbf, 0x36, 0x5e, 0x97, 0x49, 0x3d, 0x33, 0x82, 0x68, 0x1f, 0x1d, 0x94, 0x65, 0x7e, 0x98, 0x88, 0x24, 0x5c, 0x9b, 0x07, 0x62, 0xee, 0x7f, 0x4c, 0xa0, 0x2e, 0x73, 0x8a, 0xfd, 0xbb, 0xa2, 0x74, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_494 = { .name = "ecdsa_brainpoolp256r1_sha256_494", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_494_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_494_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_494_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 495 for ECDSA, tcId is 71 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_495_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_495_msg[] = { 0x35, 0x39, 0x38, 0x37, 0x33, 0x35, 0x30, 0x30, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_495_sig[] = { 0x2c, 0x5f, 0x51, 0xbc, 0x91, 0x96, 0x9f, 0xd5, 0xb8, 0x04, 0xe7, 0x51, 0x32, 0x3f, 0xc8, 0x02, 0x94, 0xb0, 0xb5, 0xb1, 0xe2, 0x0e, 0x19, 0x5e, 0xc9, 0xbd, 0xc6, 0xa7, 0x80, 0x6d, 0xa1, 0x3f, 0x4c, 0x24, 0x6c, 0x94, 0x9b, 0xce, 0x43, 0xd3, 0x03, 0x20, 0x1f, 0xa0, 0xd9, 0x89, 0xe7, 0x06, 0x74, 0x76, 0x65, 0x55, 0xe8, 0xd3, 0xa9, 0x9c, 0x26, 0xba, 0xbb, 0x65, 0x8d, 0x1f, 0x7d, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_495 = { .name = "ecdsa_brainpoolp256r1_sha256_495", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_495_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_495_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_495_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 496 for ECDSA, tcId is 72 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_496_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_496_msg[] = { 0x33, 0x34, 0x36, 0x33, 0x30, 0x30, 0x36, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_496_sig[] = { 0xa9, 0xe3, 0xf1, 0xe8, 0x31, 0x08, 0xbe, 0x78, 0x66, 0x8d, 0x4b, 0xac, 0x7f, 0xfb, 0x29, 0x18, 0xd3, 0x81, 0x00, 0xba, 0x01, 0xf3, 0x7d, 0xe5, 0xb9, 0x23, 0xee, 0xca, 0x07, 0xcc, 0x05, 0xe3, 0x3f, 0x0d, 0x81, 0xbc, 0xc0, 0x88, 0x02, 0xa4, 0x35, 0x59, 0x97, 0x59, 0xf5, 0x1c, 0x89, 0xf8, 0x16, 0x74, 0x27, 0x10, 0x88, 0x5b, 0x41, 0x37, 0x75, 0x81, 0x30, 0xe8, 0xac, 0xf7, 0x07, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_496 = { .name = "ecdsa_brainpoolp256r1_sha256_496", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_496_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_496_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_496_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 497 for ECDSA, tcId is 73 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_497_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_497_msg[] = { 0x39, 0x38, 0x31, 0x37, 0x33, 0x32, 0x30, 0x32, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_497_sig[] = { 0x95, 0x9e, 0x98, 0x11, 0xbb, 0x18, 0xb4, 0x86, 0x5f, 0xde, 0x6d, 0x5f, 0x9c, 0x24, 0x6d, 0x67, 0xe4, 0x8d, 0x7a, 0x5c, 0x7c, 0xe4, 0x6d, 0x7a, 0xfb, 0x6f, 0x5e, 0xc0, 0xb2, 0x6d, 0x50, 0x60, 0x00, 0x91, 0xa0, 0x97, 0x61, 0x8f, 0x25, 0x17, 0xad, 0x6d, 0xcf, 0x49, 0xbc, 0xc2, 0x08, 0xe9, 0x4c, 0xb8, 0x1a, 0xf8, 0x7f, 0x65, 0xb7, 0x88, 0x05, 0x80, 0xf9, 0x98, 0x58, 0xa9, 0xa9, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_497 = { .name = "ecdsa_brainpoolp256r1_sha256_497", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_497_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_497_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_497_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 498 for ECDSA, tcId is 74 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_498_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_498_msg[] = { 0x33, 0x32, 0x32, 0x32, 0x30, 0x34, 0x31, 0x30, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_498_sig[] = { 0x4f, 0x92, 0x31, 0xb1, 0xcb, 0xae, 0xa1, 0x83, 0xed, 0x9d, 0x85, 0x91, 0xae, 0x3e, 0x9f, 0x04, 0x39, 0x20, 0x1e, 0x10, 0x67, 0xff, 0x00, 0x53, 0x5a, 0x41, 0x53, 0x96, 0xb7, 0x78, 0x11, 0xd6, 0x98, 0x51, 0xc7, 0x99, 0xa3, 0x11, 0xab, 0xae, 0xfa, 0x08, 0xc4, 0x12, 0xf6, 0xf6, 0x79, 0xa0, 0x00, 0xa6, 0xed, 0xaa, 0x00, 0x5d, 0x05, 0xf5, 0x50, 0xa6, 0x2f, 0xf9, 0xa6, 0xa1, 0xa5, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_498 = { .name = "ecdsa_brainpoolp256r1_sha256_498", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_498_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_498_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_498_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 499 for ECDSA, tcId is 75 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_499_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_499_msg[] = { 0x36, 0x36, 0x36, 0x36, 0x33, 0x30, 0x37, 0x31, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_499_sig[] = { 0x54, 0x79, 0xac, 0xb7, 0x6c, 0x38, 0xd4, 0x7f, 0x21, 0x94, 0x08, 0x55, 0xf1, 0x80, 0x09, 0x78, 0xa5, 0x2f, 0xb1, 0x0b, 0x7c, 0xc9, 0xb0, 0x7c, 0xaf, 0x88, 0xaf, 0x67, 0xf2, 0x69, 0x71, 0x43, 0x24, 0x4f, 0x3c, 0xdd, 0x68, 0x35, 0x55, 0xb8, 0x8a, 0x45, 0xe9, 0x75, 0x07, 0x37, 0x35, 0xd3, 0x87, 0x13, 0xda, 0x4b, 0xde, 0xa3, 0x40, 0xb5, 0xfb, 0x87, 0xd3, 0xc4, 0x43, 0xad, 0xb0, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_499 = { .name = "ecdsa_brainpoolp256r1_sha256_499", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_499_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_499_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_499_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 500 for ECDSA, tcId is 76 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_500_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_500_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x35, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_500_sig[] = { 0x14, 0x99, 0x01, 0x49, 0xd3, 0xa8, 0xf3, 0xc9, 0x6e, 0x9c, 0x62, 0x95, 0x2f, 0x90, 0xef, 0x21, 0xcb, 0xcc, 0x0d, 0x03, 0xda, 0x80, 0x2f, 0x72, 0x43, 0x2a, 0x04, 0x1d, 0xa5, 0x4d, 0xb5, 0xbe, 0x87, 0x42, 0x7b, 0x96, 0xd2, 0x84, 0x99, 0x70, 0x7a, 0x67, 0x88, 0x70, 0x5c, 0xd8, 0xa5, 0xee, 0x9f, 0xd4, 0x2e, 0x2d, 0x1f, 0x12, 0x73, 0x75, 0x23, 0x37, 0xef, 0xcd, 0x06, 0xaa, 0x88, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_500 = { .name = "ecdsa_brainpoolp256r1_sha256_500", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_500_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_500_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_500_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 501 for ECDSA, tcId is 77 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_501_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_501_msg[] = { 0x31, 0x38, 0x34, 0x36, 0x35, 0x39, 0x37, 0x31, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_501_sig[] = { 0x5b, 0xb2, 0x44, 0xb5, 0x11, 0xa9, 0x82, 0x8f, 0xbe, 0x7a, 0x04, 0x1a, 0xf3, 0x41, 0xa9, 0x3b, 0x24, 0x2b, 0x51, 0x33, 0x10, 0xde, 0x9f, 0x4b, 0xc3, 0x66, 0xe1, 0x8b, 0x93, 0xa3, 0xce, 0x34, 0x97, 0x8b, 0xe5, 0xd5, 0x8c, 0xe7, 0x0c, 0x92, 0xde, 0xa7, 0x5c, 0xe2, 0xf8, 0xe8, 0x8f, 0x09, 0x3f, 0x5e, 0x46, 0x75, 0xe7, 0x50, 0xfd, 0x08, 0x87, 0x77, 0xa7, 0x41, 0x15, 0x26, 0xc1, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_501 = { .name = "ecdsa_brainpoolp256r1_sha256_501", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_501_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_501_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_501_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 502 for ECDSA, tcId is 78 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_502_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_502_msg[] = { 0x33, 0x31, 0x33, 0x36, 0x30, 0x34, 0x36, 0x31, 0x38, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_502_sig[] = { 0x07, 0x0e, 0x64, 0xf4, 0xd1, 0x9f, 0x9f, 0xd9, 0xa8, 0xd3, 0xf0, 0xa6, 0x4f, 0x95, 0x1c, 0x41, 0xdb, 0x2f, 0x0e, 0x13, 0x49, 0x0e, 0x7a, 0xc0, 0xb3, 0xf6, 0x06, 0x6b, 0xc1, 0xe5, 0x40, 0xa7, 0x83, 0x5b, 0x25, 0x02, 0x9a, 0x2c, 0xed, 0x8d, 0xf5, 0x7b, 0x03, 0x43, 0xa2, 0xc7, 0x18, 0xdb, 0x72, 0xc2, 0xd3, 0x1f, 0x7e, 0xf6, 0x6b, 0x23, 0x0c, 0x97, 0xd2, 0x02, 0x81, 0xd4, 0x9a, 0x33, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_502 = { .name = "ecdsa_brainpoolp256r1_sha256_502", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_502_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_502_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_502_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 503 for ECDSA, tcId is 79 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_503_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_503_msg[] = { 0x32, 0x36, 0x36, 0x33, 0x37, 0x38, 0x34, 0x32, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_503_sig[] = { 0x2b, 0x5a, 0x6d, 0xc1, 0x4e, 0x98, 0xd2, 0xe6, 0xc0, 0xb6, 0x27, 0x56, 0x8a, 0x74, 0x8b, 0xda, 0x04, 0xc0, 0x95, 0x00, 0xbc, 0x63, 0xbd, 0x74, 0x4f, 0x5d, 0xee, 0x96, 0x7d, 0xb0, 0xf0, 0xb1, 0x34, 0x52, 0xb1, 0x3e, 0xf8, 0xdc, 0x01, 0xa0, 0xb7, 0x85, 0xfb, 0xb4, 0xfc, 0xd0, 0x57, 0xa5, 0x88, 0x0c, 0x41, 0x84, 0x27, 0x28, 0x3a, 0xbc, 0x7a, 0xa7, 0xfa, 0x07, 0xd5, 0x07, 0xee, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_503 = { .name = "ecdsa_brainpoolp256r1_sha256_503", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_503_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_503_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_503_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 504 for ECDSA, tcId is 80 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_504_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_504_msg[] = { 0x31, 0x36, 0x35, 0x32, 0x31, 0x30, 0x30, 0x35, 0x32, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_504_sig[] = { 0x1d, 0x91, 0xbd, 0xa9, 0x0d, 0x08, 0x31, 0xbe, 0x05, 0x8f, 0x61, 0x0f, 0xe3, 0xe6, 0x45, 0x17, 0x91, 0xe0, 0x96, 0x89, 0xc5, 0x2b, 0xd4, 0x66, 0xef, 0x74, 0xdd, 0x85, 0xb3, 0xcb, 0xd1, 0x21, 0x4b, 0xa3, 0x7a, 0x93, 0x41, 0xe5, 0x92, 0x3e, 0xa9, 0x3e, 0x35, 0x73, 0x44, 0xfe, 0x7b, 0x73, 0x44, 0x6e, 0x20, 0x7a, 0x7e, 0x44, 0x96, 0x07, 0xb1, 0x48, 0x2c, 0x51, 0x0e, 0x93, 0xb6, 0x30, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_504 = { .name = "ecdsa_brainpoolp256r1_sha256_504", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_504_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_504_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_504_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 505 for ECDSA, tcId is 81 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_505_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_505_msg[] = { 0x35, 0x37, 0x34, 0x38, 0x30, 0x38, 0x31, 0x36, 0x39, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_505_sig[] = { 0x6a, 0x32, 0xe1, 0x62, 0x5c, 0x1e, 0xb7, 0xd4, 0x0b, 0x31, 0x45, 0xf8, 0x94, 0xc7, 0x13, 0x8d, 0x62, 0x32, 0xa6, 0x11, 0x6d, 0x50, 0xf1, 0x27, 0x0a, 0x0e, 0x97, 0x1e, 0x2b, 0x7a, 0x8e, 0x75, 0x61, 0xb6, 0xaa, 0xe5, 0x68, 0x19, 0x27, 0x28, 0x13, 0x31, 0x9f, 0x7c, 0x21, 0x4f, 0x83, 0xce, 0x5f, 0xcc, 0xdb, 0x58, 0x87, 0x8d, 0x59, 0x2a, 0xb0, 0xf4, 0x47, 0x9a, 0x52, 0xd9, 0x70, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_505 = { .name = "ecdsa_brainpoolp256r1_sha256_505", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_505_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_505_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_505_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 506 for ECDSA, tcId is 82 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_506_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_506_msg[] = { 0x36, 0x33, 0x34, 0x33, 0x39, 0x31, 0x33, 0x34, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_506_sig[] = { 0x5b, 0x75, 0x26, 0xf0, 0x9d, 0xab, 0x24, 0x85, 0x51, 0xed, 0x8b, 0x12, 0x29, 0xc2, 0x44, 0x7a, 0x45, 0x21, 0xd2, 0xd6, 0xe2, 0x29, 0x02, 0xac, 0xbc, 0x17, 0x6c, 0x50, 0x1f, 0x5f, 0x5f, 0x7e, 0x31, 0x86, 0x55, 0x2f, 0x70, 0x0d, 0x9e, 0x6b, 0x55, 0x1c, 0x89, 0x3e, 0xd2, 0xae, 0xd9, 0x55, 0x6b, 0x3f, 0x0a, 0xc2, 0xa5, 0xe2, 0x77, 0x2f, 0x8f, 0xb1, 0xa1, 0x84, 0x94, 0x92, 0x62, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_506 = { .name = "ecdsa_brainpoolp256r1_sha256_506", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_506_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_506_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_506_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 507 for ECDSA, tcId is 83 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_507_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_507_msg[] = { 0x31, 0x35, 0x34, 0x31, 0x31, 0x30, 0x33, 0x35, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_507_sig[] = { 0x30, 0xd0, 0xff, 0xa9, 0xc2, 0xbe, 0x04, 0x2c, 0xcd, 0x2c, 0x9a, 0xdb, 0xcb, 0xbb, 0xa2, 0x2c, 0xc0, 0x44, 0xd6, 0x9a, 0xbf, 0x37, 0xef, 0xf2, 0xbc, 0xab, 0x91, 0xd4, 0x5b, 0xe9, 0xb0, 0xbd, 0x48, 0x2d, 0xd7, 0x2a, 0xa3, 0xb3, 0xf3, 0xf2, 0xe6, 0xdd, 0x4a, 0x07, 0x5f, 0xa9, 0x62, 0xb8, 0xf6, 0xfc, 0x25, 0xe9, 0xd3, 0x2d, 0x0d, 0xcc, 0xbd, 0x80, 0x83, 0x1a, 0xcf, 0x75, 0x95, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_507 = { .name = "ecdsa_brainpoolp256r1_sha256_507", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_507_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_507_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_507_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 508 for ECDSA, tcId is 84 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_508_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_508_msg[] = { 0x31, 0x30, 0x34, 0x37, 0x38, 0x35, 0x38, 0x30, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_508_sig[] = { 0x20, 0x0d, 0x3b, 0x5f, 0x91, 0x58, 0x63, 0xad, 0xa8, 0xc8, 0x4e, 0xf5, 0xeb, 0x50, 0xec, 0xf0, 0xab, 0x43, 0xe2, 0xba, 0xc1, 0x0a, 0x4c, 0x42, 0xcf, 0x37, 0x19, 0x12, 0x1a, 0x8d, 0x37, 0xcd, 0x9d, 0x13, 0x7e, 0x11, 0xa0, 0x50, 0xbf, 0xbb, 0xa7, 0x46, 0xc1, 0x9a, 0xd5, 0xf7, 0x19, 0x5c, 0x86, 0xf2, 0x41, 0x15, 0xd1, 0xfa, 0xdf, 0xb1, 0x9a, 0xd2, 0xcb, 0x56, 0x24, 0x12, 0x6c, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_508 = { .name = "ecdsa_brainpoolp256r1_sha256_508", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_508_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_508_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_508_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 509 for ECDSA, tcId is 85 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_509_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_509_msg[] = { 0x31, 0x30, 0x35, 0x33, 0x36, 0x32, 0x38, 0x35, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_509_sig[] = { 0x4a, 0xc5, 0x54, 0x70, 0x78, 0x90, 0x95, 0xe9, 0xe2, 0x50, 0x33, 0x2f, 0x37, 0x90, 0xf8, 0x65, 0xfb, 0xcc, 0x58, 0x93, 0x45, 0x88, 0xc7, 0x74, 0xba, 0xbf, 0x22, 0xde, 0x6a, 0x8a, 0x69, 0x58, 0x2c, 0xfe, 0xfb, 0x0e, 0x2b, 0xe0, 0x54, 0x2c, 0x97, 0xeb, 0x61, 0x91, 0x4f, 0x23, 0xfb, 0x37, 0xb5, 0x8f, 0xb1, 0x7d, 0x0d, 0x6b, 0x76, 0x6a, 0x8f, 0x63, 0xc8, 0xd0, 0xdc, 0x79, 0xe5, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_509 = { .name = "ecdsa_brainpoolp256r1_sha256_509", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_509_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_509_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_509_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 510 for ECDSA, tcId is 86 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_510_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_510_msg[] = { 0x39, 0x35, 0x33, 0x39, 0x30, 0x34, 0x31, 0x30, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_510_sig[] = { 0x90, 0x8c, 0x1e, 0x6d, 0xa6, 0x25, 0x87, 0x9f, 0xc1, 0x16, 0xdd, 0xb6, 0x51, 0x73, 0xb9, 0x35, 0x5f, 0xa8, 0xeb, 0x03, 0x80, 0x63, 0xde, 0x2c, 0xec, 0x19, 0x34, 0xe8, 0xfb, 0x2b, 0xfc, 0x27, 0x6e, 0x08, 0x4f, 0xf7, 0xc0, 0x43, 0xed, 0xfb, 0x16, 0x1a, 0xea, 0x26, 0x05, 0xa1, 0x11, 0xcf, 0x43, 0xd5, 0x83, 0x88, 0xe0, 0x61, 0xe8, 0x01, 0x9e, 0x99, 0x52, 0x63, 0x76, 0xe4, 0xc7, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_510 = { .name = "ecdsa_brainpoolp256r1_sha256_510", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_510_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_510_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_510_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 511 for ECDSA, tcId is 87 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_511_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_511_msg[] = { 0x39, 0x37, 0x38, 0x38, 0x34, 0x38, 0x30, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_511_sig[] = { 0x97, 0x32, 0x8e, 0x10, 0x50, 0xfc, 0x2d, 0x44, 0xec, 0x89, 0x83, 0x6a, 0x7e, 0xaa, 0xe3, 0x60, 0xd6, 0xf9, 0xd9, 0x96, 0x85, 0x5e, 0x8b, 0x14, 0x4d, 0x0c, 0x27, 0x3c, 0x48, 0x66, 0xd7, 0xfe, 0x39, 0x19, 0xd7, 0xce, 0xd9, 0xf3, 0xe3, 0x28, 0x49, 0x78, 0x54, 0x63, 0x94, 0xfb, 0xb2, 0x77, 0xf8, 0x4d, 0x26, 0x59, 0x8d, 0xbe, 0x83, 0xda, 0x4b, 0xa7, 0xc1, 0xde, 0x37, 0x2b, 0x33, 0x40, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_511 = { .name = "ecdsa_brainpoolp256r1_sha256_511", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_511_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_511_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_511_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 512 for ECDSA, tcId is 88 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_512_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_512_msg[] = { 0x33, 0x36, 0x31, 0x30, 0x36, 0x37, 0x32, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_512_sig[] = { 0x98, 0x81, 0xe8, 0xf7, 0x5d, 0xb8, 0x16, 0x3d, 0x2b, 0xe1, 0xfc, 0x11, 0x49, 0x19, 0x26, 0xc4, 0x12, 0x53, 0x74, 0x44, 0x0d, 0xa9, 0x47, 0x50, 0xa1, 0x9e, 0xca, 0xf8, 0xa8, 0x3b, 0x71, 0xfc, 0x4a, 0x9a, 0x19, 0x1a, 0x9d, 0xa8, 0xfa, 0x3d, 0x56, 0x41, 0xcb, 0xb5, 0xa8, 0x8c, 0xac, 0x5b, 0x37, 0x80, 0xfb, 0xbe, 0xf8, 0xef, 0x1a, 0x44, 0x57, 0x82, 0x39, 0x49, 0x25, 0xef, 0xc5, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_512 = { .name = "ecdsa_brainpoolp256r1_sha256_512", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_512_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_512_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_512_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 513 for ECDSA, tcId is 89 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_513_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_513_msg[] = { 0x31, 0x30, 0x35, 0x34, 0x32, 0x34, 0x30, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_513_sig[] = { 0x70, 0xcb, 0x8b, 0xc7, 0xd5, 0xc3, 0x72, 0xc7, 0x3c, 0xf3, 0x6f, 0xe6, 0x9a, 0xa1, 0xa5, 0x09, 0xfe, 0x0c, 0xf2, 0xbe, 0x64, 0x2e, 0x08, 0x5a, 0xc9, 0x79, 0xd6, 0xee, 0xfd, 0xda, 0xa9, 0xe1, 0x50, 0x04, 0x02, 0xf4, 0x96, 0xdc, 0x8d, 0x90, 0x4c, 0x70, 0x96, 0x95, 0xff, 0x02, 0x71, 0x4e, 0x60, 0x7c, 0x4b, 0xee, 0x9d, 0x06, 0x4c, 0xd4, 0x65, 0x4b, 0x6c, 0x46, 0x6f, 0x40, 0x10, 0xe8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_513 = { .name = "ecdsa_brainpoolp256r1_sha256_513", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_513_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_513_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_513_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 514 for ECDSA, tcId is 90 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_514_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_514_msg[] = { 0x35, 0x31, 0x37, 0x34, 0x34, 0x34, 0x38, 0x31, 0x39, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_514_sig[] = { 0x39, 0xc8, 0xf8, 0x70, 0x18, 0x5f, 0x87, 0x95, 0x7e, 0x00, 0x9d, 0x01, 0xe5, 0x2f, 0xbf, 0x6c, 0x7a, 0xe5, 0x0d, 0x73, 0x4d, 0x39, 0xec, 0x41, 0x13, 0xb3, 0x7b, 0x7b, 0xd1, 0xb6, 0x80, 0x66, 0x73, 0xd6, 0xda, 0x2b, 0x77, 0x7c, 0xe0, 0xc4, 0x3d, 0x49, 0x08, 0x08, 0x57, 0xc6, 0xec, 0x58, 0x54, 0x6f, 0xdd, 0xf1, 0x7d, 0x26, 0x76, 0xf1, 0x0f, 0x88, 0xdd, 0xc9, 0x00, 0xca, 0x18, 0x91, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_514 = { .name = "ecdsa_brainpoolp256r1_sha256_514", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_514_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_514_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_514_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 515 for ECDSA, tcId is 91 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_515_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_515_msg[] = { 0x31, 0x39, 0x36, 0x37, 0x35, 0x36, 0x31, 0x32, 0x35, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_515_sig[] = { 0x2e, 0x95, 0xb7, 0x02, 0xed, 0x13, 0x8f, 0x42, 0x61, 0x4f, 0x07, 0xa1, 0xb2, 0x15, 0x48, 0xea, 0x1d, 0x24, 0x7a, 0x4a, 0x7f, 0xd7, 0x65, 0x62, 0x8b, 0xab, 0x68, 0x55, 0x11, 0x29, 0xad, 0x38, 0x2e, 0x9a, 0x6a, 0xf0, 0x78, 0xb5, 0x18, 0x12, 0xed, 0x71, 0xb0, 0xea, 0xb6, 0x53, 0x50, 0xcd, 0x08, 0x1f, 0x79, 0x99, 0xa2, 0x4a, 0x56, 0xe9, 0x6a, 0xf9, 0xd5, 0xc5, 0xf6, 0xbd, 0xaf, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_515 = { .name = "ecdsa_brainpoolp256r1_sha256_515", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_515_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_515_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_515_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 516 for ECDSA, tcId is 92 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_516_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_516_msg[] = { 0x33, 0x34, 0x34, 0x37, 0x32, 0x35, 0x33, 0x33, 0x34, 0x33, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_516_sig[] = { 0x58, 0x37, 0xb6, 0x87, 0xf2, 0x12, 0x80, 0x63, 0xdc, 0x67, 0xf5, 0x12, 0xcb, 0x66, 0x70, 0xf1, 0x22, 0xb6, 0x11, 0x25, 0x7f, 0x53, 0x6d, 0x45, 0xe3, 0x98, 0x4f, 0x5e, 0xbb, 0xc3, 0xcd, 0x4d, 0x6a, 0x6c, 0x0c, 0x41, 0xb9, 0xcc, 0x37, 0xae, 0x02, 0xc2, 0x21, 0x8d, 0x3b, 0x8c, 0xd8, 0x0c, 0xd3, 0xc4, 0xfc, 0x25, 0x77, 0x1c, 0x0c, 0xaa, 0xb3, 0xb8, 0xed, 0x2c, 0x61, 0x1c, 0xf7, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_516 = { .name = "ecdsa_brainpoolp256r1_sha256_516", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_516_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_516_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_516_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 517 for ECDSA, tcId is 93 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_517_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_517_msg[] = { 0x33, 0x36, 0x38, 0x32, 0x36, 0x34, 0x33, 0x31, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_517_sig[] = { 0x5a, 0x73, 0xc7, 0x5d, 0x2b, 0x5c, 0x48, 0xaf, 0x17, 0xb7, 0x84, 0x72, 0x44, 0x26, 0x2b, 0xb9, 0xb2, 0xc3, 0xf2, 0x69, 0x7a, 0x9d, 0x8c, 0x60, 0x57, 0x58, 0xa2, 0xd3, 0x3c, 0xcc, 0xd1, 0x8f, 0x97, 0xf1, 0x2a, 0xa0, 0x4b, 0x25, 0x82, 0x37, 0x3f, 0x9b, 0xea, 0x64, 0x6b, 0xce, 0x1b, 0x12, 0x90, 0x30, 0xea, 0x5f, 0x35, 0xc9, 0xdc, 0x2a, 0x14, 0x9e, 0x90, 0xaa, 0x3b, 0x56, 0x34, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_517 = { .name = "ecdsa_brainpoolp256r1_sha256_517", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_517_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_517_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_517_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 518 for ECDSA, tcId is 94 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_518_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_518_msg[] = { 0x33, 0x32, 0x36, 0x31, 0x31, 0x39, 0x38, 0x36, 0x30, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_518_sig[] = { 0x32, 0xb6, 0x03, 0x13, 0x2a, 0x96, 0xc5, 0xb9, 0x57, 0xb0, 0x8c, 0x88, 0x53, 0x2e, 0x49, 0xfc, 0xb7, 0x3c, 0xd7, 0xc5, 0xf7, 0x1a, 0x1e, 0x6e, 0xd1, 0x4a, 0x5c, 0xc1, 0x77, 0x6d, 0x2d, 0xa7, 0x93, 0xbe, 0x0e, 0x4c, 0x98, 0x44, 0xbe, 0xc9, 0xd2, 0xb6, 0x2b, 0x42, 0x4e, 0x61, 0x8a, 0x84, 0x5a, 0x98, 0x53, 0x7b, 0x23, 0x56, 0xc1, 0xf4, 0x73, 0xbb, 0xa1, 0x3b, 0x08, 0x45, 0x8e, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_518 = { .name = "ecdsa_brainpoolp256r1_sha256_518", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_518_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_518_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_518_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 519 for ECDSA, tcId is 95 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_519_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_519_msg[] = { 0x39, 0x36, 0x37, 0x38, 0x37, 0x38, 0x31, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_519_sig[] = { 0x9b, 0x76, 0xb7, 0xaa, 0xc0, 0xa1, 0x3b, 0xf2, 0x17, 0xf2, 0x4d, 0x33, 0x5b, 0xc0, 0x46, 0x94, 0xec, 0xdb, 0xd5, 0xac, 0xfe, 0x4e, 0xc2, 0x3c, 0x06, 0x5e, 0xfe, 0xb7, 0x93, 0x6a, 0x1c, 0x62, 0x43, 0x2c, 0xde, 0x74, 0xfd, 0xbb, 0x4f, 0x54, 0x37, 0xcd, 0xec, 0xa5, 0x3c, 0xb7, 0xab, 0x79, 0xf6, 0x92, 0x69, 0x4f, 0x91, 0xed, 0x37, 0x35, 0xfb, 0xc4, 0xe0, 0x8a, 0x3f, 0x52, 0x78, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_519 = { .name = "ecdsa_brainpoolp256r1_sha256_519", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_519_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_519_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_519_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 520 for ECDSA, tcId is 96 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_520_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_520_msg[] = { 0x34, 0x39, 0x35, 0x38, 0x38, 0x32, 0x33, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_520_sig[] = { 0x8f, 0x25, 0x65, 0xb5, 0x17, 0xf6, 0x2a, 0x3b, 0x1e, 0x19, 0xb0, 0x91, 0x7a, 0xb2, 0xb2, 0x23, 0xfc, 0x81, 0x93, 0xcc, 0x0f, 0xdf, 0x3a, 0xb9, 0x69, 0x2b, 0xc4, 0x2c, 0xf4, 0x09, 0x10, 0xe8, 0x1d, 0xcc, 0xfb, 0xed, 0x8b, 0x90, 0xee, 0x53, 0x91, 0xea, 0x74, 0x3e, 0x35, 0xb6, 0x0e, 0xd3, 0x1d, 0x19, 0xed, 0xfb, 0xd9, 0x45, 0x04, 0xba, 0xdc, 0xa4, 0xaa, 0x4c, 0xf2, 0xa7, 0xbb, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_520 = { .name = "ecdsa_brainpoolp256r1_sha256_520", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_520_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_520_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_520_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 521 for ECDSA, tcId is 97 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_521_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_521_msg[] = { 0x38, 0x32, 0x34, 0x36, 0x33, 0x37, 0x38, 0x33, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_521_sig[] = { 0x31, 0xc6, 0x27, 0xfd, 0x79, 0x1f, 0x73, 0x44, 0x21, 0xe5, 0x50, 0x26, 0x18, 0xae, 0xc4, 0x47, 0xc6, 0x70, 0x29, 0xb2, 0x79, 0x4e, 0xe1, 0x2b, 0x08, 0xee, 0xb6, 0xc5, 0x9a, 0xed, 0xb3, 0xee, 0x08, 0xf9, 0x1f, 0x37, 0x89, 0xbd, 0x01, 0xe5, 0xb9, 0xd9, 0x39, 0x41, 0xcf, 0x46, 0x69, 0x8d, 0x5e, 0x1a, 0x27, 0x08, 0xe7, 0x0e, 0xe9, 0xa2, 0x26, 0xe8, 0x1e, 0x7f, 0x4a, 0x41, 0x4e, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_521 = { .name = "ecdsa_brainpoolp256r1_sha256_521", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_521_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_521_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_521_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 522 for ECDSA, tcId is 98 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_522_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_522_msg[] = { 0x31, 0x31, 0x30, 0x32, 0x30, 0x38, 0x33, 0x33, 0x37, 0x37, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_522_sig[] = { 0x60, 0x05, 0x29, 0x31, 0x32, 0xd7, 0xea, 0xc0, 0xe7, 0x2b, 0x9b, 0x21, 0x8d, 0x03, 0x21, 0x26, 0x75, 0xd5, 0xaa, 0xe0, 0xda, 0x97, 0xbc, 0xcd, 0xf1, 0xa5, 0xff, 0x78, 0x4d, 0xe5, 0xcd, 0xe6, 0x13, 0xa1, 0x55, 0xc7, 0x4a, 0x9a, 0xb2, 0x7c, 0xbd, 0xf6, 0xca, 0xe1, 0x8d, 0x4d, 0x1f, 0x18, 0xb8, 0x21, 0x2d, 0x80, 0x18, 0x55, 0x1e, 0x2b, 0xae, 0xc9, 0x19, 0x79, 0xea, 0x5b, 0x4c, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_522 = { .name = "ecdsa_brainpoolp256r1_sha256_522", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_522_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_522_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_522_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 523 for ECDSA, tcId is 99 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_523_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_523_msg[] = { 0x31, 0x33, 0x33, 0x38, 0x37, 0x31, 0x36, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_523_sig[] = { 0x3a, 0x6d, 0xab, 0x51, 0xed, 0x90, 0x27, 0xf5, 0xca, 0xe1, 0x92, 0xe0, 0x58, 0x6a, 0x32, 0xc8, 0xef, 0x22, 0x76, 0xce, 0xba, 0x3b, 0x79, 0x60, 0x59, 0xdc, 0xa1, 0x35, 0xe3, 0x61, 0x79, 0x5d, 0x4b, 0xf1, 0x6b, 0x0e, 0x62, 0xe3, 0x2a, 0x94, 0x50, 0x88, 0xf5, 0x5f, 0xb4, 0x28, 0x15, 0x9a, 0xf7, 0x82, 0x96, 0xdd, 0x4f, 0x8d, 0xfd, 0x97, 0x13, 0xbd, 0xb2, 0xf6, 0x77, 0xcb, 0xcd, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_523 = { .name = "ecdsa_brainpoolp256r1_sha256_523", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_523_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_523_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_523_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 524 for ECDSA, tcId is 100 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_524_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_524_msg[] = { 0x33, 0x32, 0x32, 0x31, 0x34, 0x34, 0x31, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_524_sig[] = { 0x96, 0x1d, 0xe7, 0x7e, 0xd9, 0xcf, 0x61, 0x70, 0xd9, 0x25, 0xc2, 0x33, 0xbd, 0x3e, 0x20, 0xee, 0xf9, 0xbb, 0xe6, 0xd6, 0xc8, 0xda, 0xc2, 0x8a, 0xcd, 0xe4, 0x60, 0x11, 0xf9, 0x9f, 0x8b, 0xff, 0x97, 0x7d, 0xe0, 0x47, 0x79, 0xff, 0xe3, 0xaf, 0xe7, 0x08, 0xd8, 0x1c, 0xe8, 0xa1, 0xed, 0x6c, 0x7d, 0x2a, 0x9a, 0x25, 0xef, 0x99, 0x59, 0xc7, 0xa9, 0x51, 0xa0, 0x55, 0x5a, 0x6d, 0x37, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_524 = { .name = "ecdsa_brainpoolp256r1_sha256_524", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_524_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_524_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_524_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 525 for ECDSA, tcId is 101 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_525_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_525_msg[] = { 0x31, 0x30, 0x36, 0x38, 0x36, 0x36, 0x35, 0x35, 0x35, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_525_sig[] = { 0x77, 0x85, 0x81, 0xb3, 0xd4, 0x03, 0x00, 0x31, 0x14, 0x1e, 0x55, 0x5f, 0xa1, 0xdb, 0xeb, 0xae, 0xf0, 0xee, 0xd0, 0x19, 0xe0, 0xb8, 0x97, 0xb5, 0x07, 0x65, 0x44, 0xab, 0x80, 0x49, 0x8b, 0x9c, 0x71, 0x32, 0xc8, 0xd1, 0x09, 0xc1, 0xf1, 0xa6, 0xc1, 0x0f, 0x81, 0xe9, 0xfc, 0x11, 0xad, 0xea, 0x4b, 0x9c, 0xff, 0x59, 0x92, 0x08, 0xb6, 0xd9, 0xcb, 0x4e, 0x4b, 0x27, 0xf1, 0x97, 0x28, 0x46, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_525 = { .name = "ecdsa_brainpoolp256r1_sha256_525", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_525_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_525_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_525_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 526 for ECDSA, tcId is 102 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_526_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_526_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x35, 0x32, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_526_sig[] = { 0x9e, 0xea, 0xc8, 0xf0, 0x7c, 0x40, 0xcc, 0x8e, 0xe3, 0xcb, 0xa1, 0x07, 0xaf, 0x49, 0xd5, 0x26, 0x73, 0x1d, 0x8b, 0x7c, 0x70, 0x13, 0x0c, 0xbb, 0x6e, 0xfa, 0x3c, 0x61, 0x50, 0x5d, 0x63, 0x37, 0x62, 0xdb, 0x38, 0x22, 0x6b, 0x71, 0xf6, 0x4a, 0x5b, 0x59, 0x8a, 0xb7, 0xc4, 0xe3, 0xf8, 0x98, 0x80, 0xfe, 0x0d, 0x07, 0x49, 0xdf, 0xd5, 0xc7, 0xa3, 0x8a, 0x3e, 0xec, 0x3c, 0x79, 0x38, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_526 = { .name = "ecdsa_brainpoolp256r1_sha256_526", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_526_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_526_msg, .msglen = 8, .sig = ecdsa_brainpoolp256r1_sha256_526_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 527 for ECDSA, tcId is 103 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_527_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_527_msg[] = { 0x37, 0x30, 0x33, 0x30, 0x38, 0x31, 0x38, 0x37, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_527_sig[] = { 0x67, 0x3d, 0x41, 0xc1, 0x7e, 0x72, 0x7f, 0x01, 0x25, 0x17, 0x5b, 0x2a, 0x9f, 0x05, 0x61, 0xec, 0xc5, 0xcf, 0x9c, 0xd4, 0x90, 0x35, 0x82, 0x8b, 0xa7, 0xc4, 0x75, 0x45, 0xa0, 0xb3, 0x38, 0xf4, 0x00, 0x45, 0x9e, 0xf9, 0x78, 0xe7, 0xb0, 0x34, 0x68, 0xc8, 0x0f, 0xd4, 0x53, 0x3a, 0x33, 0x47, 0x55, 0xa0, 0x82, 0x6b, 0xf5, 0xa3, 0x0d, 0xf9, 0x19, 0x12, 0x9e, 0x35, 0x2d, 0x34, 0x75, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_527 = { .name = "ecdsa_brainpoolp256r1_sha256_527", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_527_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_527_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_527_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 528 for ECDSA, tcId is 104 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_528_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_528_msg[] = { 0x35, 0x39, 0x32, 0x34, 0x35, 0x32, 0x33, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_528_sig[] = { 0x8a, 0x97, 0xf1, 0x9b, 0x08, 0x09, 0x04, 0x2c, 0xda, 0xfe, 0x9c, 0x32, 0xbc, 0x0b, 0x0b, 0x01, 0x21, 0x8a, 0x49, 0x86, 0x7a, 0x68, 0x82, 0xd6, 0x4d, 0x5b, 0x7b, 0xc2, 0x55, 0xeb, 0x77, 0x3d, 0x90, 0x46, 0x62, 0xb5, 0xdf, 0xd8, 0xcd, 0x94, 0xea, 0xef, 0xd5, 0x7e, 0x5d, 0x4f, 0x2d, 0x14, 0x26, 0x8e, 0x1b, 0x8c, 0x4f, 0xbd, 0x4a, 0xc4, 0xe5, 0x08, 0x0f, 0x79, 0xd5, 0x3f, 0xd2, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_528 = { .name = "ecdsa_brainpoolp256r1_sha256_528", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_528_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_528_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_528_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 529 for ECDSA, tcId is 105 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_529_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_529_msg[] = { 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, 0x36, 0x36, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_529_sig[] = { 0x28, 0x7a, 0x88, 0xbd, 0xb5, 0x61, 0xfa, 0x27, 0x85, 0xca, 0x25, 0x86, 0x63, 0xf8, 0x6d, 0x3b, 0x07, 0xaa, 0xc9, 0x49, 0xf6, 0x47, 0xee, 0x57, 0x26, 0x21, 0xb0, 0xb7, 0x0e, 0xb3, 0xe9, 0xca, 0x4a, 0x6d, 0x79, 0x16, 0x41, 0x84, 0x43, 0xde, 0xb4, 0xc4, 0x3f, 0x5c, 0x69, 0xf6, 0x49, 0x09, 0x52, 0xcf, 0x53, 0xee, 0x69, 0xee, 0xc1, 0xac, 0x69, 0xe1, 0x44, 0xb8, 0xf9, 0xe2, 0x63, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_529 = { .name = "ecdsa_brainpoolp256r1_sha256_529", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_529_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_529_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_529_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 530 for ECDSA, tcId is 106 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_530_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_530_msg[] = { 0x34, 0x30, 0x30, 0x35, 0x33, 0x31, 0x34, 0x34, 0x30, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_530_sig[] = { 0x25, 0x0d, 0xb6, 0xa8, 0xb3, 0x81, 0x3b, 0x13, 0xb6, 0xfb, 0x7b, 0xf1, 0x98, 0x96, 0xf1, 0x3a, 0x50, 0x2b, 0xe4, 0x53, 0xc2, 0x04, 0xe6, 0xa8, 0x13, 0xa1, 0x64, 0xdb, 0xdd, 0x9c, 0x66, 0xca, 0x1d, 0x96, 0x68, 0x3a, 0xc9, 0x7f, 0x58, 0x74, 0xac, 0x95, 0x38, 0xb5, 0x7b, 0xf1, 0xea, 0xa5, 0x0a, 0x11, 0xa3, 0x3e, 0x9a, 0xbb, 0x82, 0x5d, 0x6b, 0x7a, 0x75, 0x46, 0xa6, 0x98, 0x60, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_530 = { .name = "ecdsa_brainpoolp256r1_sha256_530", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_530_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_530_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_530_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 531 for ECDSA, tcId is 107 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_531_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_531_msg[] = { 0x33, 0x30, 0x39, 0x36, 0x34, 0x35, 0x37, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_531_sig[] = { 0xa2, 0x9b, 0x2c, 0x4b, 0xe5, 0x0f, 0x17, 0x24, 0xa1, 0xce, 0x9a, 0xcd, 0x4c, 0x51, 0x29, 0xb3, 0x91, 0xb4, 0xb9, 0x00, 0x9a, 0xbb, 0x58, 0x23, 0x97, 0xa5, 0x22, 0xc7, 0x71, 0xd5, 0x4a, 0xbd, 0x0e, 0xc1, 0xd7, 0xae, 0xdb, 0xfe, 0x4e, 0x74, 0x3d, 0x76, 0x27, 0xea, 0x8d, 0x20, 0x7c, 0x24, 0x60, 0xae, 0x4c, 0x9f, 0x21, 0x34, 0xb0, 0xf8, 0x4a, 0x02, 0x55, 0x20, 0x5a, 0xc2, 0x34, 0x82, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_531 = { .name = "ecdsa_brainpoolp256r1_sha256_531", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_531_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_531_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_531_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 532 for ECDSA, tcId is 108 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_532_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_532_msg[] = { 0x32, 0x37, 0x38, 0x34, 0x30, 0x32, 0x35, 0x36, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_532_sig[] = { 0x14, 0x9f, 0x05, 0x08, 0xae, 0xf9, 0xfb, 0xcc, 0xf3, 0x2e, 0x1b, 0xd3, 0x19, 0x9d, 0x63, 0x02, 0x40, 0xbb, 0x65, 0x77, 0x59, 0x3e, 0x87, 0x56, 0x6b, 0x0a, 0x14, 0xa5, 0xb6, 0xf2, 0x09, 0x99, 0x5d, 0x37, 0xb4, 0x09, 0xc0, 0x1f, 0xb9, 0xb6, 0xcf, 0x4e, 0xa1, 0x44, 0x32, 0xc3, 0x56, 0x31, 0x69, 0x44, 0x02, 0xd2, 0x87, 0x5a, 0x30, 0x1d, 0x76, 0x1d, 0x81, 0x81, 0x14, 0x69, 0x62, 0x8d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_532 = { .name = "ecdsa_brainpoolp256r1_sha256_532", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_532_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_532_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_532_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 533 for ECDSA, tcId is 109 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_533_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_533_msg[] = { 0x32, 0x36, 0x31, 0x38, 0x37, 0x38, 0x37, 0x34, 0x31, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_533_sig[] = { 0x6c, 0x9b, 0x11, 0x0d, 0x8e, 0x44, 0x53, 0xd8, 0x2e, 0xc5, 0x1a, 0x5a, 0x69, 0x1b, 0x15, 0x2e, 0xdf, 0x9f, 0xb1, 0xa9, 0x94, 0x7b, 0xd0, 0x01, 0xbe, 0xb2, 0x4d, 0x56, 0xf3, 0xbf, 0x27, 0xaf, 0x2a, 0x80, 0xbb, 0xd2, 0xf8, 0x27, 0xcc, 0x23, 0x15, 0x75, 0x26, 0xdf, 0x6e, 0xa4, 0xe0, 0xe3, 0x24, 0xb7, 0x65, 0xa5, 0x0b, 0xe7, 0x7f, 0x7e, 0x96, 0x67, 0x55, 0x8a, 0x16, 0x5e, 0xb6, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_533 = { .name = "ecdsa_brainpoolp256r1_sha256_533", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_533_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_533_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_533_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 534 for ECDSA, tcId is 110 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_534_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_534_msg[] = { 0x31, 0x36, 0x34, 0x32, 0x36, 0x32, 0x35, 0x32, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_534_sig[] = { 0x90, 0x86, 0xa5, 0xc9, 0x38, 0x23, 0xb1, 0xdf, 0x21, 0xf6, 0x39, 0x51, 0xed, 0x6e, 0x70, 0x7f, 0xba, 0x0d, 0x89, 0x9e, 0xef, 0x71, 0x11, 0x00, 0xe3, 0x2f, 0x2d, 0x60, 0x17, 0xda, 0x65, 0x90, 0x1f, 0x83, 0x1e, 0xd3, 0x0c, 0x12, 0x9d, 0xab, 0x42, 0x66, 0x27, 0x2e, 0x01, 0x28, 0x32, 0x10, 0xed, 0x82, 0x3c, 0x55, 0x90, 0x7a, 0xc5, 0xec, 0xda, 0x85, 0xd7, 0x0b, 0xd8, 0x02, 0x79, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_534 = { .name = "ecdsa_brainpoolp256r1_sha256_534", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_534_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_534_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_534_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 535 for ECDSA, tcId is 111 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_535_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_535_msg[] = { 0x36, 0x38, 0x32, 0x34, 0x31, 0x38, 0x39, 0x34, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_535_sig[] = { 0x2a, 0xf6, 0x35, 0x47, 0xdc, 0x5f, 0xfc, 0x8b, 0xa4, 0xd1, 0x68, 0xd3, 0x68, 0xd9, 0x22, 0x81, 0x32, 0xa0, 0xef, 0xa2, 0x0e, 0x32, 0x55, 0xc3, 0x32, 0x21, 0x9f, 0xec, 0xed, 0x80, 0x03, 0x95, 0x36, 0x42, 0xf5, 0x3c, 0xe9, 0x52, 0x1f, 0xab, 0x75, 0x4b, 0xe7, 0x71, 0x1f, 0x00, 0xaf, 0x78, 0x88, 0x22, 0x2b, 0xf2, 0xbb, 0xf1, 0xed, 0x89, 0x95, 0xe0, 0x3b, 0x55, 0xc9, 0x8a, 0x60, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_535 = { .name = "ecdsa_brainpoolp256r1_sha256_535", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_535_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_535_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_535_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 536 for ECDSA, tcId is 112 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_536_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_536_msg[] = { 0x34, 0x38, 0x34, 0x32, 0x34, 0x35, 0x34, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_536_sig[] = { 0x91, 0xe9, 0xac, 0xef, 0x9b, 0xc2, 0x8c, 0x91, 0x08, 0x91, 0xb8, 0x03, 0x20, 0xaf, 0x36, 0x03, 0xc4, 0x30, 0x61, 0x74, 0xf1, 0x7e, 0x97, 0x05, 0x92, 0x67, 0xfc, 0x81, 0x78, 0x14, 0xff, 0x1f, 0x7a, 0x9c, 0x83, 0x3b, 0xeb, 0x73, 0xbd, 0xd6, 0x2d, 0xf6, 0x49, 0x52, 0xb4, 0xc8, 0x48, 0xd2, 0x18, 0x0f, 0xae, 0x38, 0x5f, 0x80, 0x84, 0xf1, 0xfc, 0x5b, 0x1b, 0x1c, 0x64, 0x57, 0x50, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_536 = { .name = "ecdsa_brainpoolp256r1_sha256_536", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_536_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_536_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_536_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 537 for ECDSA, tcId is 113 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_537_pubkey[] = { 0x4b, 0x40, 0x2a, 0x9a, 0xe1, 0x8f, 0xc1, 0xa8, 0x7c, 0xda, 0x33, 0x74, 0x83, 0x90, 0x04, 0x99, 0xfe, 0x72, 0x9e, 0x47, 0x16, 0x07, 0x67, 0x16, 0x51, 0xa2, 0x63, 0xfb, 0xf0, 0xd9, 0x3f, 0x78, 0x1e, 0xf9, 0xb0, 0xf9, 0x8f, 0xb7, 0x3b, 0xcb, 0x60, 0x5a, 0x78, 0x23, 0xa4, 0x27, 0xea, 0x5f, 0x0d, 0x98, 0x78, 0x8c, 0x7d, 0xae, 0x42, 0xa0, 0x45, 0x36, 0x20, 0x20, 0x22, 0xc0, 0x21, 0xcd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_537_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_537_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe2, 0x02, 0x7b, 0x80, 0x1f, 0xc4, 0x79, 0x30, 0x8f, 0xf5, 0x39, 0x9a, 0x88, 0x25, 0xfc, 0xcf, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_537 = { .name = "ecdsa_brainpoolp256r1_sha256_537", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_537_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_537_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_537_sig, .siglen = 64, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 113 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 538 for ECDSA, tcId is 114 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_538_pubkey[] = { 0x4b, 0x40, 0x2a, 0x9a, 0xe1, 0x8f, 0xc1, 0xa8, 0x7c, 0xda, 0x33, 0x74, 0x83, 0x90, 0x04, 0x99, 0xfe, 0x72, 0x9e, 0x47, 0x16, 0x07, 0x67, 0x16, 0x51, 0xa2, 0x63, 0xfb, 0xf0, 0xd9, 0x3f, 0x78, 0x1e, 0xf9, 0xb0, 0xf9, 0x8f, 0xb7, 0x3b, 0xcb, 0x60, 0x5a, 0x78, 0x23, 0xa4, 0x27, 0xea, 0x5f, 0x0d, 0x98, 0x78, 0x8c, 0x7d, 0xae, 0x42, 0xa0, 0x45, 0x36, 0x20, 0x20, 0x22, 0xc0, 0x21, 0xcd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_538_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_538_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x76, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_538 = { .name = "ecdsa_brainpoolp256r1_sha256_538", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_538_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_538_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_538_sig, .siglen = 64, .result = -1, .comment = "r too large, tcId is 114 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 539 for ECDSA, tcId is 115 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_539_pubkey[] = { 0x40, 0xa2, 0xdf, 0x0f, 0x17, 0xc7, 0x87, 0x34, 0x59, 0xd5, 0xe9, 0xac, 0x11, 0xff, 0xf8, 0x4d, 0xeb, 0x5f, 0x40, 0xff, 0x9a, 0x52, 0xdf, 0x87, 0x45, 0xbb, 0x47, 0x70, 0xf6, 0xdb, 0xf5, 0x81, 0x99, 0xc2, 0xbf, 0x49, 0x20, 0xe9, 0xc8, 0xf7, 0x58, 0xc2, 0xde, 0x69, 0xe4, 0x2c, 0x1c, 0xb7, 0x7c, 0x58, 0x42, 0x5a, 0x9d, 0xaf, 0xa4, 0x1d, 0x7b, 0x08, 0x73, 0xef, 0xa8, 0x94, 0xce, 0xdc, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_539_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_539_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa3, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_539 = { .name = "ecdsa_brainpoolp256r1_sha256_539", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_539_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_539_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_539_sig, .siglen = 64, .result = 1, .comment = "r,s are large, tcId is 115 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 540 for ECDSA, tcId is 116 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_540_pubkey[] = { 0x9d, 0xe6, 0x69, 0xf9, 0x44, 0x4d, 0xa8, 0x2e, 0x42, 0x9f, 0x84, 0x2f, 0x31, 0xc6, 0x44, 0x18, 0xd4, 0xd7, 0xb0, 0x5e, 0x93, 0xf4, 0x1d, 0xad, 0xdd, 0x09, 0xfc, 0x18, 0x1a, 0xc2, 0x27, 0xc6, 0x1c, 0x86, 0x21, 0x0e, 0x82, 0x91, 0xfc, 0x5a, 0xe3, 0x0c, 0x72, 0xe2, 0x01, 0x3e, 0xc2, 0x2b, 0xb9, 0x7d, 0x88, 0xbf, 0x37, 0x6d, 0x4a, 0x85, 0xdd, 0x1b, 0xb7, 0x1b, 0x22, 0x52, 0x6d, 0x1f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_540_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_540_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x4a, 0xb8, 0xde, 0x0a, 0x51, 0x48, 0x1b, 0xc4, 0x57, 0x94, 0xb9, 0x24, 0x51, 0x8f, 0x2d, 0xd6, 0xac, 0x5c, 0xce, 0x31, 0xf3, 0x22, 0x8d, 0x62, 0x4c, 0x5a, 0x89, 0x6f, 0x79, 0xa2, 0xd6, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_540 = { .name = "ecdsa_brainpoolp256r1_sha256_540", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_540_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_540_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_540_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 116 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 541 for ECDSA, tcId is 117 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_541_pubkey[] = { 0x30, 0x34, 0x5b, 0x64, 0x51, 0x37, 0x7b, 0x78, 0xa5, 0x4a, 0xc6, 0xe1, 0x10, 0xf5, 0x0c, 0x7d, 0xe7, 0x1c, 0x2c, 0x76, 0x02, 0x78, 0x37, 0x36, 0x07, 0x72, 0x2c, 0x53, 0xf5, 0x86, 0x79, 0x07, 0x59, 0xac, 0xc4, 0x00, 0x14, 0xc9, 0x3d, 0x4a, 0xd4, 0x47, 0x78, 0xbc, 0x1a, 0x44, 0xeb, 0xae, 0xbe, 0x1a, 0x97, 0xc8, 0x8a, 0xd1, 0x1c, 0x10, 0x25, 0x05, 0x7b, 0x6b, 0xc4, 0x37, 0x7f, 0x2d, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_541_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_541_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x1b, 0x5f, 0x89, 0xf5, 0xbb, 0x74, 0xca, 0xa4, 0x2d, 0x36, 0xe6, 0x01, 0xa9, 0xf3, 0xc2, 0x0b, 0x4e, 0x6c, 0x91, 0xce, 0xb9, 0x8a, 0x52, 0xfb, 0xfa, 0x9f, 0x81, 0x78, 0x1b, 0x8a, 0x17, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_541 = { .name = "ecdsa_brainpoolp256r1_sha256_541", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_541_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_541_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_541_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 117 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 542 for ECDSA, tcId is 118 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_542_pubkey[] = { 0x14, 0x9d, 0x89, 0x3f, 0x13, 0x06, 0xfb, 0x25, 0x3b, 0xbf, 0x3a, 0x86, 0x91, 0xab, 0xa8, 0xa5, 0x00, 0x02, 0xb0, 0xa2, 0x76, 0x93, 0xaa, 0x97, 0x43, 0x5a, 0x7b, 0x5c, 0xb3, 0x3a, 0x55, 0xee, 0x24, 0xb0, 0x75, 0xfc, 0xdb, 0xc1, 0xa7, 0x39, 0xf2, 0xf4, 0x92, 0xdb, 0xe4, 0x79, 0x94, 0x74, 0xee, 0x3a, 0xd3, 0x80, 0x44, 0x47, 0xe7, 0xd5, 0x84, 0xe3, 0x43, 0x0c, 0xe1, 0x5a, 0x96, 0x8a, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_542_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_542_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_542 = { .name = "ecdsa_brainpoolp256r1_sha256_542", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_542_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_542_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_542_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 118 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 543 for ECDSA, tcId is 119 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_543_pubkey[] = { 0x14, 0x9d, 0x89, 0x3f, 0x13, 0x06, 0xfb, 0x25, 0x3b, 0xbf, 0x3a, 0x86, 0x91, 0xab, 0xa8, 0xa5, 0x00, 0x02, 0xb0, 0xa2, 0x76, 0x93, 0xaa, 0x97, 0x43, 0x5a, 0x7b, 0x5c, 0xb3, 0x3a, 0x55, 0xee, 0x24, 0xb0, 0x75, 0xfc, 0xdb, 0xc1, 0xa7, 0x39, 0xf2, 0xf4, 0x92, 0xdb, 0xe4, 0x79, 0x94, 0x74, 0xee, 0x3a, 0xd3, 0x80, 0x44, 0x47, 0xe7, 0xd5, 0x84, 0xe3, 0x43, 0x0c, 0xe1, 0x5a, 0x96, 0x8a, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_543_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_543_sig[] = { 0x01, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_543 = { .name = "ecdsa_brainpoolp256r1_sha256_543", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_543_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_543_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_543_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 119 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 544 for ECDSA, tcId is 120 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_544_pubkey[] = { 0x15, 0x6e, 0x62, 0x66, 0x49, 0xce, 0x82, 0x36, 0x98, 0x22, 0x01, 0xa2, 0x49, 0x35, 0xfb, 0x3d, 0x36, 0xb0, 0xd7, 0x30, 0x41, 0xb6, 0xfd, 0xca, 0x97, 0x99, 0x0a, 0x8d, 0x15, 0x2e, 0xfb, 0x8b, 0x32, 0x6f, 0x4b, 0x20, 0xa0, 0xcc, 0x46, 0x23, 0xb0, 0x2a, 0x6b, 0xb1, 0x71, 0x14, 0x90, 0x1a, 0x01, 0xde, 0x0d, 0xf1, 0x71, 0x6d, 0x66, 0x9d, 0x25, 0x3d, 0xe4, 0x40, 0xcc, 0x8f, 0x9c, 0xdd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_544_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_544_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_544 = { .name = "ecdsa_brainpoolp256r1_sha256_544", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_544_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_544_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_544_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 120 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 545 for ECDSA, tcId is 121 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_545_pubkey[] = { 0x15, 0x6e, 0x62, 0x66, 0x49, 0xce, 0x82, 0x36, 0x98, 0x22, 0x01, 0xa2, 0x49, 0x35, 0xfb, 0x3d, 0x36, 0xb0, 0xd7, 0x30, 0x41, 0xb6, 0xfd, 0xca, 0x97, 0x99, 0x0a, 0x8d, 0x15, 0x2e, 0xfb, 0x8b, 0x32, 0x6f, 0x4b, 0x20, 0xa0, 0xcc, 0x46, 0x23, 0xb0, 0x2a, 0x6b, 0xb1, 0x71, 0x14, 0x90, 0x1a, 0x01, 0xde, 0x0d, 0xf1, 0x71, 0x6d, 0x66, 0x9d, 0x25, 0x3d, 0xe4, 0x40, 0xcc, 0x8f, 0x9c, 0xdd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_545_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_545_sig[] = { 0x01, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_545 = { .name = "ecdsa_brainpoolp256r1_sha256_545", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_545_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_545_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_545_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 121 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 546 for ECDSA, tcId is 122 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_546_pubkey[] = { 0x10, 0xcc, 0x79, 0x92, 0xed, 0xe2, 0x8c, 0x7b, 0x4d, 0xda, 0x5c, 0x35, 0xcb, 0xd7, 0x11, 0x74, 0x91, 0x8e, 0x83, 0xad, 0xab, 0x03, 0x42, 0xcc, 0x3d, 0x55, 0x6a, 0x41, 0x3b, 0x4c, 0xe9, 0x3b, 0x3f, 0x9c, 0x3b, 0x38, 0xae, 0xf0, 0xa0, 0xe6, 0x87, 0xd7, 0xee, 0x6a, 0xfd, 0xe7, 0x0d, 0x47, 0xd6, 0x90, 0x0f, 0xf0, 0xce, 0x62, 0x15, 0x6e, 0x86, 0x45, 0xb8, 0x10, 0x3f, 0xc6, 0x6c, 0xad, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_546_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_546_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_546 = { .name = "ecdsa_brainpoolp256r1_sha256_546", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_546_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_546_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_546_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 122 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 547 for ECDSA, tcId is 123 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_547_pubkey[] = { 0x10, 0xcc, 0x79, 0x92, 0xed, 0xe2, 0x8c, 0x7b, 0x4d, 0xda, 0x5c, 0x35, 0xcb, 0xd7, 0x11, 0x74, 0x91, 0x8e, 0x83, 0xad, 0xab, 0x03, 0x42, 0xcc, 0x3d, 0x55, 0x6a, 0x41, 0x3b, 0x4c, 0xe9, 0x3b, 0x3f, 0x9c, 0x3b, 0x38, 0xae, 0xf0, 0xa0, 0xe6, 0x87, 0xd7, 0xee, 0x6a, 0xfd, 0xe7, 0x0d, 0x47, 0xd6, 0x90, 0x0f, 0xf0, 0xce, 0x62, 0x15, 0x6e, 0x86, 0x45, 0xb8, 0x10, 0x3f, 0xc6, 0x6c, 0xad, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_547_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_547_sig[] = { 0x01, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_547 = { .name = "ecdsa_brainpoolp256r1_sha256_547", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_547_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_547_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_547_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 123 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 548 for ECDSA, tcId is 124 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_548_pubkey[] = { 0x10, 0xcc, 0x79, 0x92, 0xed, 0xe2, 0x8c, 0x7b, 0x4d, 0xda, 0x5c, 0x35, 0xcb, 0xd7, 0x11, 0x74, 0x91, 0x8e, 0x83, 0xad, 0xab, 0x03, 0x42, 0xcc, 0x3d, 0x55, 0x6a, 0x41, 0x3b, 0x4c, 0xe9, 0x3b, 0x3f, 0x9c, 0x3b, 0x38, 0xae, 0xf0, 0xa0, 0xe6, 0x87, 0xd7, 0xee, 0x6a, 0xfd, 0xe7, 0x0d, 0x47, 0xd6, 0x90, 0x0f, 0xf0, 0xce, 0x62, 0x15, 0x6e, 0x86, 0x45, 0xb8, 0x10, 0x3f, 0xc6, 0x6c, 0xad, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_548_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_548_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_548 = { .name = "ecdsa_brainpoolp256r1_sha256_548", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_548_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_548_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_548_sig, .siglen = 64, .result = -1, .comment = "r is larger than n, tcId is 124 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 549 for ECDSA, tcId is 125 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_549_pubkey[] = { 0x2b, 0xa2, 0x8f, 0x62, 0x36, 0xc5, 0xa7, 0x74, 0xcd, 0x10, 0x4b, 0x03, 0x6d, 0x2e, 0x01, 0x67, 0x11, 0xcb, 0x4a, 0x83, 0xfa, 0x07, 0x8b, 0x51, 0x50, 0xf6, 0x9e, 0x50, 0x98, 0xde, 0x7b, 0x4c, 0xa7, 0xc1, 0x3e, 0xf8, 0xc5, 0x7f, 0xcb, 0xe6, 0x84, 0xce, 0xff, 0x31, 0x2e, 0xf5, 0x3a, 0xf1, 0xb1, 0x43, 0x97, 0xd4, 0x15, 0x4b, 0xa6, 0x10, 0x6a, 0x33, 0x83, 0xaa, 0xed, 0x16, 0xec, 0xb1, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_549_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_549_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x5b, 0x2d, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_549 = { .name = "ecdsa_brainpoolp256r1_sha256_549", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_549_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_549_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_549_sig, .siglen = 64, .result = -1, .comment = "s is larger than n, tcId is 125 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 550 for ECDSA, tcId is 126 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_550_pubkey[] = { 0x11, 0x34, 0x89, 0x55, 0x5b, 0xdc, 0x11, 0x23, 0x52, 0xb0, 0x8b, 0x7f, 0xfe, 0xbc, 0xf0, 0x50, 0x90, 0xf9, 0x4d, 0xa6, 0x23, 0x67, 0x64, 0x6b, 0x2e, 0x03, 0xa3, 0x47, 0x88, 0x63, 0x91, 0x4b, 0x4b, 0x4a, 0x0a, 0x43, 0x54, 0x62, 0xa1, 0x22, 0xf6, 0xd9, 0xac, 0x80, 0x13, 0x19, 0xbb, 0xc6, 0xd2, 0xc5, 0x92, 0x28, 0x86, 0x1a, 0x34, 0x14, 0xb5, 0x00, 0xe5, 0xcf, 0x59, 0x43, 0xc9, 0x64, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_550_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_550_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x28, 0x27, 0x37, 0x05, 0x84, 0xfd, 0xeb, 0x9f, 0x5d, 0x5a, 0x9f, 0xb9, 0x57, 0x9a, 0x09, 0x39, 0x0e, 0xfb, 0x6f, 0x9d, 0x99, 0xb6, 0x4f, 0xc1, 0x88, 0xd8, 0xbc, 0xe0, 0x5c, 0x2d, 0x4e, 0xed, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_550 = { .name = "ecdsa_brainpoolp256r1_sha256_550", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_550_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_550_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_550_sig, .siglen = 64, .result = 1, .comment = "small r and s^-1, tcId is 126 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 551 for ECDSA, tcId is 127 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_551_pubkey[] = { 0x34, 0x22, 0x47, 0x46, 0xef, 0xa8, 0xc5, 0xd4, 0xf4, 0xc6, 0xb8, 0x2d, 0xe4, 0xd7, 0x6d, 0x3e, 0x71, 0x50, 0xc1, 0xb6, 0x9e, 0x23, 0x33, 0x9f, 0x09, 0x8f, 0xf7, 0x69, 0xbc, 0xac, 0x94, 0xbf, 0x94, 0x61, 0x8e, 0x36, 0x24, 0xa5, 0x7d, 0x48, 0xd1, 0x9e, 0x72, 0x86, 0x7d, 0xbc, 0x19, 0x1a, 0x0f, 0xd0, 0x5c, 0xf6, 0xf4, 0xb5, 0xec, 0x49, 0x7b, 0x79, 0x76, 0x26, 0xa5, 0x7b, 0xaa, 0x22, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_551_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_551_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xce, 0x49, 0x37, 0xa0, 0x87, 0x73, 0x1d, 0xf4, 0xfe, 0xbc, 0x2c, 0x3a, 0x81, 0xdd, 0xfb, 0xab, 0x5d, 0xc3, 0xaf, 0x95, 0x08, 0x17, 0xf4, 0x1b, 0x59, 0x0d, 0x15, 0x6e, 0xd4, 0x09, 0xad, 0x28, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_551 = { .name = "ecdsa_brainpoolp256r1_sha256_551", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_551_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_551_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_551_sig, .siglen = 64, .result = 1, .comment = "smallish r and s^-1, tcId is 127 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 552 for ECDSA, tcId is 128 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_552_pubkey[] = { 0x6f, 0xb0, 0xcd, 0xf3, 0xb0, 0x8d, 0xc5, 0xd8, 0xb7, 0xe5, 0x25, 0x9c, 0x7d, 0x1b, 0xbd, 0x31, 0xa2, 0x23, 0x53, 0x45, 0xb7, 0xb4, 0x45, 0x63, 0x1e, 0x89, 0x4b, 0x56, 0x7d, 0x23, 0xc0, 0x79, 0x53, 0x24, 0x32, 0x07, 0xdf, 0x5c, 0x44, 0x60, 0x11, 0xc1, 0xcf, 0xed, 0xde, 0x6e, 0x53, 0x51, 0x95, 0x8a, 0xff, 0xa8, 0xf2, 0x74, 0xfe, 0x5a, 0xf4, 0x35, 0x75, 0x9d, 0xe8, 0x7d, 0xb3, 0x43, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_552_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_552_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x91, 0x82, 0x7d, 0x03, 0xbb, 0x6d, 0xac, 0x31, 0x94, 0x0b, 0xa5, 0x6e, 0xd8, 0x84, 0x89, 0x04, 0x8f, 0xf1, 0x73, 0xf0, 0xbf, 0x20, 0xca, 0xb2, 0x0d, 0xcc, 0x08, 0x6f, 0xca, 0x37, 0xf2, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_552 = { .name = "ecdsa_brainpoolp256r1_sha256_552", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_552_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_552_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_552_sig, .siglen = 64, .result = 1, .comment = "100-bit r and small s^-1, tcId is 128 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 553 for ECDSA, tcId is 129 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_553_pubkey[] = { 0x0b, 0x8d, 0x3b, 0xef, 0x12, 0xeb, 0xab, 0x43, 0xf2, 0xf6, 0xf6, 0x61, 0x8f, 0x08, 0x43, 0xd5, 0xf4, 0x5d, 0x97, 0x87, 0x4f, 0x26, 0xf9, 0xa3, 0x6b, 0x78, 0x8c, 0xb7, 0xa6, 0x9e, 0xcf, 0x5f, 0x85, 0x55, 0x88, 0xc9, 0x9b, 0x38, 0x39, 0xca, 0x93, 0x61, 0xdd, 0xc7, 0x76, 0x45, 0xf7, 0x59, 0x2a, 0xd3, 0x71, 0x43, 0x8e, 0xe3, 0xe1, 0x86, 0xc7, 0x40, 0x81, 0xc4, 0x81, 0xdd, 0x52, 0x95, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_553_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_553_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x3e, 0xb3, 0x5f, 0xe7, 0xe8, 0x33, 0x1f, 0x71, 0xe4, 0xc6, 0x3b, 0x45, 0xf3, 0x49, 0xa9, 0x9d, 0x47, 0xa5, 0xe7, 0x81, 0x79, 0x8e, 0x57, 0x9f, 0x23, 0x86, 0x19, 0x5d, 0x38, 0x27, 0xbb, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_553 = { .name = "ecdsa_brainpoolp256r1_sha256_553", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_553_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_553_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_553_sig, .siglen = 64, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 129 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 554 for ECDSA, tcId is 130 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_554_pubkey[] = { 0x6d, 0x24, 0x98, 0x53, 0x42, 0xa4, 0x5a, 0x55, 0xfd, 0x99, 0xe4, 0x75, 0x21, 0xfe, 0x3e, 0x99, 0x1b, 0x8a, 0x1d, 0x37, 0x6f, 0xa7, 0x38, 0x99, 0xd3, 0xba, 0xcc, 0x06, 0x7c, 0x12, 0xee, 0x0d, 0x65, 0x42, 0xf1, 0x48, 0x59, 0x9f, 0xcc, 0xb9, 0x9b, 0x1b, 0xa2, 0x8d, 0x38, 0x05, 0x81, 0x42, 0x92, 0xa9, 0x9b, 0xff, 0xe3, 0x71, 0xdf, 0x27, 0x7b, 0x09, 0xe8, 0xad, 0xa1, 0x25, 0x3d, 0xcd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_554_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_554_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x25, 0x3e, 0xb3, 0x5f, 0xe7, 0xe8, 0x33, 0x1f, 0x71, 0xe4, 0xc6, 0x3b, 0x45, 0xf3, 0x49, 0xa9, 0x9d, 0x47, 0xa5, 0xe7, 0x81, 0x79, 0x8e, 0x57, 0x9f, 0x23, 0x86, 0x19, 0x5d, 0x38, 0x27, 0xbb, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_554 = { .name = "ecdsa_brainpoolp256r1_sha256_554", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_554_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_554_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_554_sig, .siglen = 64, .result = 1, .comment = "100-bit r and s^-1, tcId is 130 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 555 for ECDSA, tcId is 131 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_555_pubkey[] = { 0x41, 0x25, 0xe4, 0x68, 0x20, 0xf4, 0x12, 0x06, 0xb6, 0x70, 0x88, 0x2a, 0x9d, 0x8d, 0x51, 0xb6, 0xba, 0xc3, 0x90, 0x91, 0x15, 0x0c, 0x9c, 0xb3, 0x3b, 0x6d, 0x00, 0x9e, 0x0c, 0xff, 0x52, 0x23, 0x65, 0x74, 0x92, 0x40, 0x62, 0x2b, 0x40, 0xd7, 0x0a, 0x63, 0x40, 0x79, 0x52, 0xc1, 0xb8, 0x76, 0x1c, 0x9f, 0x8e, 0x85, 0xab, 0xa6, 0xf0, 0x3b, 0xbc, 0x72, 0x19, 0xe2, 0x4e, 0x6f, 0xb2, 0x76, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_555_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_555_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0x28, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_555 = { .name = "ecdsa_brainpoolp256r1_sha256_555", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_555_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_555_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_555_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 are close to n, tcId is 131 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 556 for ECDSA, tcId is 132 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_556_pubkey[] = { 0x91, 0xba, 0x17, 0x06, 0xa1, 0x9c, 0xe5, 0x8f, 0xac, 0xa2, 0x63, 0x66, 0xdc, 0xed, 0x29, 0x33, 0x99, 0x45, 0x0e, 0xfa, 0x48, 0x8f, 0x2c, 0x4b, 0xaa, 0x95, 0x69, 0x3b, 0x97, 0x4d, 0x07, 0x5d, 0x5e, 0x84, 0x01, 0x56, 0x5a, 0x37, 0xb0, 0x5b, 0x93, 0x51, 0xe4, 0x08, 0xaf, 0x54, 0x2b, 0xf0, 0xf7, 0x95, 0x7e, 0x5e, 0xed, 0x18, 0x2a, 0xfe, 0xab, 0xea, 0xfa, 0x2b, 0xf7, 0xbb, 0xbb, 0x47, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_556_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_556_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_556 = { .name = "ecdsa_brainpoolp256r1_sha256_556", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_556_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_556_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_556_sig, .siglen = 64, .result = 1, .comment = "s == 1, tcId is 132 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 557 for ECDSA, tcId is 133 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_557_pubkey[] = { 0x91, 0xba, 0x17, 0x06, 0xa1, 0x9c, 0xe5, 0x8f, 0xac, 0xa2, 0x63, 0x66, 0xdc, 0xed, 0x29, 0x33, 0x99, 0x45, 0x0e, 0xfa, 0x48, 0x8f, 0x2c, 0x4b, 0xaa, 0x95, 0x69, 0x3b, 0x97, 0x4d, 0x07, 0x5d, 0x5e, 0x84, 0x01, 0x56, 0x5a, 0x37, 0xb0, 0x5b, 0x93, 0x51, 0xe4, 0x08, 0xaf, 0x54, 0x2b, 0xf0, 0xf7, 0x95, 0x7e, 0x5e, 0xed, 0x18, 0x2a, 0xfe, 0xab, 0xea, 0xfa, 0x2b, 0xf7, 0xbb, 0xbb, 0x47, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_557_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_557_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_557 = { .name = "ecdsa_brainpoolp256r1_sha256_557", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_557_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_557_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_557_sig, .siglen = 64, .result = -1, .comment = "s == 0, tcId is 133 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 558 for ECDSA, tcId is 134 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_558_pubkey[] = { 0x25, 0xd1, 0x75, 0x70, 0xe4, 0xba, 0xe1, 0xe4, 0x68, 0xe6, 0xdd, 0x09, 0x75, 0xb3, 0x82, 0x36, 0x80, 0x61, 0xe0, 0xc7, 0x04, 0x24, 0x1c, 0x1d, 0x18, 0xfd, 0x5b, 0xaa, 0x8c, 0xa8, 0xdc, 0x13, 0x5a, 0xca, 0xdc, 0xd1, 0x39, 0x92, 0xf6, 0x66, 0x5b, 0x46, 0x9c, 0x9f, 0x9a, 0xb7, 0x79, 0x7e, 0x3c, 0x4b, 0x88, 0x1c, 0x6d, 0x7f, 0x4d, 0x26, 0x01, 0xc9, 0x6a, 0x15, 0x36, 0xf7, 0x6d, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_558_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_558_sig[] = { 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_558 = { .name = "ecdsa_brainpoolp256r1_sha256_558", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_558_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_558_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_558_sig, .siglen = 64, .result = -1, .comment = "point at infinity during verify, tcId is 134 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 559 for ECDSA, tcId is 135 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_559_pubkey[] = { 0x1d, 0xc3, 0x32, 0x5f, 0xfa, 0x55, 0xe1, 0x79, 0xe2, 0x17, 0x1a, 0x66, 0xb2, 0xe7, 0x53, 0x4a, 0xe1, 0x2c, 0xfc, 0x29, 0x2a, 0xf2, 0xe0, 0xfb, 0xf1, 0xc3, 0xfc, 0xce, 0x55, 0x58, 0xfc, 0x6a, 0x24, 0x20, 0xab, 0xcd, 0xb7, 0xdf, 0x8c, 0xf3, 0x86, 0x34, 0x64, 0x82, 0x64, 0xa6, 0x81, 0xd5, 0xed, 0x19, 0x5b, 0xf1, 0x6a, 0x97, 0x0f, 0xfa, 0x68, 0xab, 0x25, 0x0b, 0x34, 0xa9, 0x35, 0x14, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_559_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_559_sig[] = { 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_559 = { .name = "ecdsa_brainpoolp256r1_sha256_559", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_559_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_559_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_559_sig, .siglen = 64, .result = 1, .comment = "edge case for signature malleability, tcId is 135 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 560 for ECDSA, tcId is 136 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_560_pubkey[] = { 0x3f, 0xff, 0xa6, 0xdb, 0xaf, 0x66, 0x7b, 0x0a, 0x94, 0xe5, 0xf8, 0x6b, 0x37, 0x74, 0xb9, 0x75, 0x97, 0x1a, 0x4d, 0x24, 0x39, 0x60, 0x7d, 0xef, 0x4e, 0x5d, 0xe1, 0xd1, 0x78, 0x20, 0xa3, 0xb2, 0x1b, 0xf3, 0x66, 0x13, 0xb5, 0x0b, 0x92, 0x52, 0x64, 0x55, 0x18, 0x15, 0xc5, 0xda, 0x78, 0x3b, 0xd1, 0x58, 0xaa, 0xa1, 0xc6, 0x24, 0x4b, 0x40, 0xa9, 0xfa, 0x31, 0xa2, 0xa4, 0x33, 0xf8, 0xe8, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_560_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_560_sig[] = { 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_560 = { .name = "ecdsa_brainpoolp256r1_sha256_560", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_560_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_560_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_560_sig, .siglen = 64, .result = 1, .comment = "edge case for signature malleability, tcId is 136 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 561 for ECDSA, tcId is 137 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_561_pubkey[] = { 0x8a, 0xfd, 0x47, 0xeb, 0x06, 0x67, 0x86, 0x0b, 0xec, 0x98, 0xd5, 0xdc, 0xd2, 0xf6, 0x0d, 0xa9, 0xea, 0xc1, 0xae, 0x99, 0x62, 0x05, 0x69, 0x89, 0x2f, 0x14, 0xe0, 0x94, 0xd6, 0x35, 0x87, 0x2a, 0x5e, 0x8f, 0x0b, 0xc6, 0x7b, 0x98, 0xa2, 0x33, 0xad, 0xe7, 0x15, 0xc0, 0x4d, 0x9d, 0xaa, 0xb1, 0x1a, 0x27, 0x51, 0x7a, 0x92, 0xcf, 0x26, 0x51, 0xc9, 0xe5, 0xf2, 0xfd, 0xe4, 0xe2, 0xdb, 0x98, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_561_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_561_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_561 = { .name = "ecdsa_brainpoolp256r1_sha256_561", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_561_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_561_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_561_sig, .siglen = 64, .result = -1, .comment = "u1 == 1, tcId is 137 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 562 for ECDSA, tcId is 138 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_562_pubkey[] = { 0x08, 0x76, 0x61, 0x66, 0x36, 0xa8, 0xdb, 0xc8, 0x21, 0x60, 0xac, 0x01, 0xaf, 0x29, 0x41, 0x35, 0x3b, 0xa0, 0xee, 0xa4, 0xa3, 0xb8, 0xfe, 0x31, 0x69, 0x6b, 0x47, 0x31, 0x7d, 0x49, 0x72, 0xc9, 0x23, 0x18, 0x00, 0x73, 0x06, 0x1d, 0x27, 0x98, 0x4e, 0xcf, 0x49, 0x1f, 0x39, 0x40, 0x04, 0xc3, 0xa4, 0x84, 0x6d, 0x77, 0x3f, 0x58, 0xdc, 0x2a, 0xb5, 0xe4, 0x3d, 0xcb, 0xf9, 0x68, 0xd0, 0x27, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_562_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_562_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x98, 0x9c, 0x5c, 0xc3, 0x14, 0x40, 0xc1, 0x16, 0x8f, 0x88, 0xb3, 0x2b, 0xa6, 0xe4, 0x79, 0x00, 0x18, 0x3c, 0x0d, 0x84, 0x3f, 0x9c, 0x41, 0x67, 0x18, 0x98, 0x03, 0x06, 0x64, 0x30, 0x5d, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_562 = { .name = "ecdsa_brainpoolp256r1_sha256_562", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_562_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_562_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_562_sig, .siglen = 64, .result = 1, .comment = "u1 == n - 1, tcId is 138 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 563 for ECDSA, tcId is 139 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_563_pubkey[] = { 0x0f, 0xab, 0xb0, 0x52, 0x21, 0x7e, 0xae, 0x8e, 0x63, 0xfe, 0xa4, 0xee, 0xa0, 0x99, 0x53, 0xd5, 0x18, 0x62, 0x42, 0x7f, 0x34, 0x13, 0x07, 0xd8, 0x19, 0xff, 0x6e, 0x93, 0x3b, 0xf7, 0x2b, 0xa9, 0x4b, 0x89, 0x7f, 0x2c, 0x4a, 0x4c, 0xf5, 0x70, 0x54, 0xc3, 0x63, 0xc7, 0x20, 0xda, 0x3d, 0x24, 0x24, 0x71, 0xcc, 0x8e, 0x49, 0x3b, 0xec, 0xb0, 0xde, 0x02, 0x22, 0x51, 0xd2, 0xee, 0x4c, 0x8c, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_563_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_563_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_563 = { .name = "ecdsa_brainpoolp256r1_sha256_563", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_563_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_563_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_563_sig, .siglen = 64, .result = 1, .comment = "u2 == 1, tcId is 139 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 564 for ECDSA, tcId is 140 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_564_pubkey[] = { 0x72, 0xeb, 0xad, 0x74, 0x9b, 0x50, 0x4c, 0x87, 0x4d, 0x21, 0xbc, 0x5e, 0x4b, 0xba, 0x54, 0x5d, 0xd4, 0x2e, 0xb5, 0xfb, 0xf7, 0x8a, 0xf4, 0x20, 0x43, 0xf5, 0xce, 0xf1, 0x0a, 0xeb, 0x3a, 0xd7, 0x45, 0x22, 0x74, 0x64, 0xe1, 0xe9, 0xce, 0xf6, 0x62, 0xf4, 0x3f, 0xc8, 0x0d, 0x4c, 0xe7, 0xeb, 0x7e, 0xb6, 0x15, 0xa2, 0x36, 0x99, 0xd4, 0x8e, 0x89, 0xb2, 0x78, 0xab, 0xd4, 0x6c, 0xcc, 0x46, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_564_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_564_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x71, 0x52, 0x3a, 0x92, 0x6b, 0xf4, 0x71, 0x28, 0x29, 0x99, 0x5c, 0x60, 0x69, 0x02, 0x5e, 0x4b, 0xb2, 0xd0, 0xfc, 0x6d, 0x23, 0x96, 0x6f, 0x4f, 0xb5, 0x69, 0x5f, 0x01, 0xba, 0x30, 0x39, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_564 = { .name = "ecdsa_brainpoolp256r1_sha256_564", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_564_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_564_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_564_sig, .siglen = 64, .result = 1, .comment = "u2 == n - 1, tcId is 140 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 565 for ECDSA, tcId is 141 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_565_pubkey[] = { 0x74, 0x4e, 0x21, 0x8a, 0x04, 0xb3, 0x14, 0x71, 0xb0, 0x5e, 0x67, 0x9c, 0x94, 0x81, 0x44, 0x6b, 0xcd, 0x72, 0xa4, 0xd0, 0xfc, 0xa7, 0xa7, 0xaf, 0x1a, 0x1f, 0xe2, 0xf5, 0x74, 0xd9, 0x36, 0x2f, 0x60, 0xc0, 0xc5, 0x28, 0x43, 0xd8, 0xd7, 0x2c, 0xd6, 0x36, 0x15, 0x3f, 0x0f, 0x51, 0x0a, 0x09, 0x08, 0x9f, 0xc4, 0x47, 0x83, 0x72, 0xdf, 0xc5, 0x0e, 0x5b, 0x91, 0xd5, 0x30, 0x1b, 0xa7, 0x5e, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_565_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_565_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x05, 0xca, 0x53, 0xb2, 0xd9, 0xe4, 0xa2, 0xe1, 0xe4, 0xf4, 0x72, 0x76, 0xfc, 0xdf, 0xb1, 0x7b, 0x26, 0xa9, 0xcf, 0x0a, 0x7c, 0x97, 0x21, 0xda, 0xd2, 0x82, 0x03, 0xd4, 0x11, 0x07, 0xfd, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_565 = { .name = "ecdsa_brainpoolp256r1_sha256_565", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_565_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_565_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_565_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 141 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 566 for ECDSA, tcId is 142 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_566_pubkey[] = { 0x7e, 0xa5, 0x3d, 0x3c, 0x46, 0x35, 0xa4, 0xd5, 0xb6, 0x0d, 0x79, 0xaa, 0xc7, 0x9d, 0x97, 0x4c, 0x75, 0x92, 0x63, 0x36, 0x34, 0x72, 0x14, 0x6a, 0x46, 0x05, 0x28, 0x0d, 0x93, 0x5f, 0xfc, 0x75, 0x59, 0x79, 0x04, 0x03, 0xc9, 0x64, 0x59, 0xb2, 0x04, 0x77, 0xea, 0xa4, 0x37, 0xb3, 0xc7, 0xde, 0xcd, 0x5e, 0x69, 0x0f, 0xaa, 0x94, 0x0c, 0x08, 0x91, 0xde, 0x0c, 0xd0, 0x7d, 0x41, 0x81, 0x3c, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_566_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_566_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x54, 0x48, 0xaa, 0x82, 0xfc, 0x57, 0x74, 0x0b, 0x2e, 0x1e, 0xbd, 0xf9, 0x89, 0xba, 0xa1, 0x45, 0xb0, 0x18, 0xb4, 0x23, 0xb3, 0x76, 0x1f, 0xeb, 0x05, 0x59, 0x59, 0xeb, 0x6a, 0x01, 0xf1, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_566 = { .name = "ecdsa_brainpoolp256r1_sha256_566", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_566_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_566_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_566_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 142 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 567 for ECDSA, tcId is 143 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_567_pubkey[] = { 0x75, 0x04, 0x62, 0xa1, 0x63, 0x65, 0x57, 0x46, 0xaf, 0x66, 0xba, 0x3e, 0xb4, 0x80, 0x09, 0xa4, 0x90, 0xd9, 0x70, 0x79, 0x92, 0x80, 0x58, 0x6c, 0xfe, 0x59, 0x31, 0x63, 0x65, 0xdc, 0x4e, 0xf0, 0xa2, 0xf1, 0x56, 0x72, 0x57, 0xbd, 0x9a, 0xa1, 0xdc, 0xca, 0x3c, 0xd2, 0x76, 0xff, 0xae, 0xb1, 0xdd, 0x85, 0xce, 0xa2, 0x8d, 0x88, 0x8a, 0x98, 0x64, 0x2b, 0xf0, 0x9a, 0x98, 0xf6, 0x9f, 0x11, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_567_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_567_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x65, 0xbf, 0xcc, 0xe6, 0x9b, 0x89, 0xef, 0xf5, 0x45, 0xfb, 0x0a, 0x67, 0xd2, 0x58, 0x1a, 0x5f, 0x25, 0x34, 0x84, 0xef, 0x53, 0x8b, 0x9b, 0x55, 0xfa, 0x86, 0x2d, 0xfd, 0x2d, 0x48, 0x8d, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_567 = { .name = "ecdsa_brainpoolp256r1_sha256_567", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_567_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_567_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_567_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 143 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 568 for ECDSA, tcId is 144 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_568_pubkey[] = { 0x32, 0x3a, 0xe5, 0x75, 0x4b, 0x41, 0x75, 0x52, 0xcf, 0x96, 0x8f, 0x5f, 0x3e, 0xea, 0x71, 0x87, 0xf7, 0xb1, 0x72, 0x6e, 0x8c, 0x2e, 0x51, 0x0f, 0x98, 0xd2, 0x64, 0x30, 0xac, 0x58, 0x49, 0xbc, 0x32, 0x71, 0x01, 0xd8, 0x2a, 0xdf, 0x87, 0xc9, 0x32, 0xe8, 0xea, 0xa6, 0xa5, 0x7e, 0x1d, 0x11, 0xbd, 0x65, 0xdc, 0x8f, 0x40, 0x4c, 0x11, 0x3f, 0x65, 0xab, 0xaa, 0x6e, 0xea, 0xf5, 0xc7, 0xc4, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_568_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_568_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7a, 0x45, 0x9e, 0x04, 0x73, 0x95, 0xd8, 0x1d, 0x3b, 0x00, 0xf4, 0xb8, 0xd5, 0xad, 0x34, 0x44, 0x2b, 0x35, 0xde, 0xc5, 0xe6, 0xc1, 0xb4, 0x5a, 0x06, 0x78, 0xe6, 0x5a, 0x1f, 0xe9, 0xe9, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_568 = { .name = "ecdsa_brainpoolp256r1_sha256_568", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_568_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_568_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_568_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 144 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 569 for ECDSA, tcId is 145 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_569_pubkey[] = { 0x37, 0xa1, 0x05, 0xe3, 0xce, 0x3f, 0xb6, 0x36, 0x73, 0x30, 0x32, 0xd1, 0xca, 0x56, 0xb4, 0xc6, 0x59, 0xb4, 0x51, 0xf6, 0x4f, 0x4b, 0xa7, 0x37, 0x8b, 0x08, 0x79, 0x87, 0xe7, 0xa5, 0x44, 0xd2, 0x78, 0x2b, 0xad, 0x9b, 0x16, 0x54, 0xf2, 0x77, 0x0d, 0x7a, 0x3e, 0xe3, 0x5b, 0x67, 0x2a, 0x36, 0x6f, 0x68, 0x5b, 0xc7, 0x19, 0x18, 0x89, 0xff, 0x2f, 0xa5, 0xc6, 0xb9, 0x4e, 0xbe, 0x7a, 0xb8, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_569_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_569_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3b, 0x77, 0x39, 0xbb, 0xe1, 0x04, 0x8b, 0x69, 0xfd, 0x05, 0xf9, 0x26, 0x2f, 0x62, 0x8e, 0x03, 0xb0, 0x77, 0x0e, 0x7e, 0xcd, 0x82, 0x33, 0x7f, 0x14, 0x82, 0xa7, 0x2d, 0xb0, 0x29, 0x32, 0x32, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_569 = { .name = "ecdsa_brainpoolp256r1_sha256_569", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_569_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_569_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_569_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 145 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 570 for ECDSA, tcId is 146 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_570_pubkey[] = { 0x13, 0xdd, 0x59, 0x45, 0x4f, 0x6a, 0xf3, 0xe9, 0xdb, 0x11, 0x5b, 0x7e, 0xc8, 0xc3, 0xa1, 0xc8, 0xd3, 0x08, 0xfd, 0xcb, 0x49, 0x63, 0xc3, 0xb8, 0xea, 0x12, 0x64, 0xe4, 0xaf, 0xda, 0x65, 0x2c, 0x5d, 0x26, 0x0b, 0x7f, 0xc9, 0xbf, 0xd2, 0x00, 0x89, 0x6d, 0x22, 0x9f, 0x3c, 0x8d, 0xaa, 0xb9, 0xdf, 0x2f, 0x55, 0xaa, 0x9a, 0xd9, 0x5d, 0x4e, 0xa7, 0x6a, 0xed, 0x8d, 0x74, 0xc5, 0x49, 0x4d, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_570_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_570_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x76, 0xee, 0x73, 0x77, 0xc2, 0x09, 0x16, 0xd3, 0xfa, 0x0b, 0xf2, 0x4c, 0x5e, 0xc5, 0x1c, 0x07, 0x60, 0xee, 0x1c, 0xfd, 0x9b, 0x04, 0x66, 0xfe, 0x29, 0x05, 0x4e, 0x5b, 0x60, 0x52, 0x64, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_570 = { .name = "ecdsa_brainpoolp256r1_sha256_570", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_570_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_570_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_570_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 146 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 571 for ECDSA, tcId is 147 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_571_pubkey[] = { 0x2c, 0x1d, 0xc5, 0x64, 0x59, 0xbf, 0x09, 0xdf, 0x50, 0xfb, 0x2d, 0x96, 0x2f, 0x59, 0x89, 0xf3, 0x64, 0x30, 0x21, 0xc5, 0xc3, 0x60, 0x36, 0x3e, 0x10, 0xe6, 0x95, 0xa7, 0x0b, 0x59, 0x42, 0xe8, 0x62, 0x16, 0xd3, 0xca, 0x0c, 0xca, 0x31, 0xdb, 0xd9, 0x2a, 0x4d, 0x28, 0xbf, 0x95, 0x14, 0x37, 0xf6, 0xf4, 0x5d, 0xb4, 0x1e, 0x8e, 0x41, 0xfd, 0xf7, 0x24, 0x14, 0xa2, 0x93, 0xf5, 0x30, 0x87, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_571_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_571_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4a, 0x99, 0x28, 0x24, 0xc7, 0x37, 0xb0, 0x0f, 0x02, 0xd2, 0x3d, 0x2f, 0x2e, 0x3d, 0xec, 0xf0, 0x90, 0xb2, 0x8f, 0xfa, 0x0e, 0x90, 0xe6, 0xd1, 0xe5, 0xdd, 0x15, 0x70, 0x70, 0x71, 0x9f, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_571 = { .name = "ecdsa_brainpoolp256r1_sha256_571", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_571_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_571_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_571_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 147 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 572 for ECDSA, tcId is 148 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_572_pubkey[] = { 0x13, 0x7d, 0x6f, 0xdf, 0x83, 0x6b, 0x18, 0x24, 0x37, 0x8c, 0x08, 0xb3, 0x5f, 0xa7, 0xeb, 0xe4, 0xe8, 0x07, 0xd8, 0xa2, 0x01, 0x05, 0xce, 0x9c, 0xb3, 0xcd, 0x28, 0x1f, 0x0a, 0x47, 0xc9, 0xc3, 0x07, 0xd6, 0x47, 0x5d, 0x49, 0x58, 0xc1, 0x6d, 0x95, 0x0f, 0x04, 0x39, 0xd3, 0xdb, 0xf8, 0x6c, 0x2d, 0x7e, 0x2b, 0x12, 0xe8, 0xb1, 0x37, 0xef, 0xc6, 0x2d, 0xd1, 0xc7, 0x23, 0xb8, 0x3a, 0x62, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_572_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_572_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x9c, 0x09, 0x2d, 0x16, 0x5e, 0xf1, 0xb1, 0x1a, 0x82, 0xb5, 0x9c, 0x73, 0xaa, 0xb3, 0x49, 0x66, 0x31, 0xe3, 0x03, 0x20, 0x38, 0xfe, 0xda, 0x23, 0x6d, 0xb7, 0xb0, 0xf5, 0xa8, 0xe0, 0xca, 0xbb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_572 = { .name = "ecdsa_brainpoolp256r1_sha256_572", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_572_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_572_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_572_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 148 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 573 for ECDSA, tcId is 149 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_573_pubkey[] = { 0x64, 0x02, 0x13, 0xbe, 0x16, 0x98, 0xb1, 0x66, 0xf0, 0xc5, 0x4e, 0x58, 0x8e, 0x1b, 0x57, 0xa6, 0x48, 0x26, 0xbf, 0x84, 0x8a, 0xda, 0xbf, 0xef, 0x60, 0x68, 0x1d, 0x77, 0x74, 0x7d, 0x2c, 0xa8, 0x64, 0x6e, 0x45, 0xd9, 0x61, 0x41, 0x9d, 0x4a, 0xd1, 0x33, 0x8c, 0x36, 0x12, 0x28, 0xe1, 0xc6, 0xb6, 0x61, 0x53, 0x98, 0x58, 0x2c, 0x0e, 0x3e, 0x97, 0xf7, 0xeb, 0xc8, 0x5a, 0x50, 0x44, 0x23, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_573_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_573_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa9, 0x04, 0x49, 0xe8, 0x7d, 0x9d, 0xe3, 0xeb, 0xed, 0x92, 0xa2, 0x27, 0x73, 0x5e, 0x45, 0x32, 0x5b, 0x1d, 0x2d, 0x77, 0x4b, 0x48, 0x76, 0xa8, 0x6d, 0x08, 0x63, 0x34, 0x94, 0x71, 0xac, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_573 = { .name = "ecdsa_brainpoolp256r1_sha256_573", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_573_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_573_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_573_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 149 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 574 for ECDSA, tcId is 150 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_574_pubkey[] = { 0x26, 0x91, 0x54, 0xca, 0x58, 0x31, 0x75, 0x52, 0xc6, 0x55, 0xd2, 0xa9, 0xb3, 0x80, 0x4d, 0xd9, 0x4c, 0x27, 0x11, 0x14, 0x5b, 0x9c, 0xd9, 0x3c, 0x36, 0x0f, 0x2d, 0xfe, 0x34, 0xcc, 0x19, 0x71, 0x98, 0x04, 0x6c, 0xc9, 0x0c, 0xc6, 0xa8, 0xac, 0x48, 0xef, 0x7b, 0xac, 0xc5, 0xcb, 0x7e, 0x57, 0x33, 0x4f, 0xa9, 0x1f, 0xac, 0xba, 0xdb, 0x48, 0x95, 0x2c, 0x9f, 0xee, 0x54, 0x3d, 0x1b, 0xb5, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_574_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_574_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa4, 0x31, 0x04, 0x28, 0xc8, 0x0a, 0x06, 0xda, 0x59, 0x71, 0x98, 0x19, 0xa0, 0xa3, 0xdb, 0xf6, 0x65, 0x8f, 0xab, 0x99, 0x38, 0xca, 0x85, 0x1c, 0xbd, 0x9c, 0x0a, 0xae, 0x86, 0x40, 0x58, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_574 = { .name = "ecdsa_brainpoolp256r1_sha256_574", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_574_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_574_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_574_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 150 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 575 for ECDSA, tcId is 151 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_575_pubkey[] = { 0x24, 0x0e, 0x0b, 0x64, 0xce, 0xe2, 0xe0, 0xb8, 0x89, 0x0c, 0x2f, 0xa8, 0x2d, 0xe5, 0x84, 0x8a, 0x56, 0x42, 0xef, 0x0f, 0x7b, 0x24, 0x14, 0xf8, 0x8f, 0x58, 0x52, 0x81, 0xdf, 0x7a, 0x1f, 0xf5, 0x3a, 0x59, 0x90, 0xf8, 0x60, 0xda, 0x30, 0x53, 0xf8, 0x21, 0xbe, 0xa9, 0x14, 0x05, 0x9c, 0xed, 0x85, 0xc9, 0xc2, 0x39, 0x0b, 0x0d, 0x86, 0x05, 0x32, 0xdb, 0xcc, 0xca, 0x7f, 0xf6, 0x66, 0x92, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_575_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_575_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa1, 0x4b, 0xda, 0x4f, 0x5b, 0x17, 0xb5, 0x69, 0x66, 0xf7, 0x5e, 0xde, 0x22, 0x34, 0x03, 0x38, 0xd2, 0x3a, 0xc4, 0x13, 0xfa, 0x7e, 0xf4, 0x2f, 0x54, 0x5b, 0x08, 0xc4, 0x7d, 0xbc, 0x59, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_575 = { .name = "ecdsa_brainpoolp256r1_sha256_575", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_575_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_575_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_575_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 151 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 576 for ECDSA, tcId is 152 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_576_pubkey[] = { 0x96, 0xf3, 0xcb, 0x5e, 0xb0, 0xc3, 0x3b, 0xe2, 0x05, 0xec, 0x05, 0x8a, 0x22, 0x09, 0x3d, 0x73, 0x9f, 0xe8, 0x0a, 0x7e, 0xcc, 0x87, 0x43, 0x99, 0xc1, 0x4f, 0x7f, 0x6c, 0x38, 0xcf, 0xcc, 0x51, 0x47, 0xb3, 0xec, 0xca, 0xec, 0xc9, 0xad, 0xd2, 0xb1, 0xdf, 0xfc, 0x98, 0x8f, 0x13, 0xdc, 0xab, 0x15, 0xb7, 0xe9, 0x10, 0xd0, 0x25, 0x0e, 0x70, 0xa1, 0xd7, 0x9b, 0x3b, 0x93, 0x1c, 0x32, 0xed, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_576_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_576_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x32, 0xdf, 0xe6, 0x73, 0x4d, 0xc4, 0xf7, 0xfa, 0xa2, 0xfd, 0x85, 0x33, 0xe9, 0x2c, 0x0d, 0x2f, 0x92, 0x9a, 0x42, 0x77, 0xa9, 0xc5, 0xcd, 0xaa, 0xfd, 0x43, 0x16, 0xfe, 0x96, 0xa4, 0x46, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_576 = { .name = "ecdsa_brainpoolp256r1_sha256_576", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_576_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_576_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_576_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 152 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 577 for ECDSA, tcId is 153 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_577_pubkey[] = { 0x10, 0x3b, 0x1b, 0xf6, 0x34, 0x3d, 0x57, 0x26, 0x0f, 0x65, 0x2d, 0x27, 0x2a, 0xae, 0xff, 0x6c, 0xfa, 0x43, 0x9f, 0x15, 0x83, 0x33, 0x5e, 0xba, 0x66, 0xfa, 0x72, 0xd0, 0x0e, 0xff, 0x7f, 0x85, 0x20, 0xf2, 0xbb, 0x03, 0x5b, 0xd0, 0x56, 0xc6, 0x7c, 0xa2, 0x2c, 0xa9, 0x52, 0xab, 0xb5, 0xe1, 0xbc, 0xb6, 0x8d, 0x67, 0xca, 0x81, 0x79, 0x0d, 0x24, 0x09, 0x7f, 0x13, 0xd4, 0x52, 0x09, 0xa1, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_577_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_577_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x63, 0x53, 0xc7, 0xf3, 0xe0, 0xa4, 0xe3, 0x3e, 0xbf, 0x77, 0x58, 0xda, 0xdf, 0x2b, 0xd9, 0xd0, 0x84, 0x13, 0x28, 0xe1, 0x3c, 0x75, 0xe2, 0x52, 0x85, 0x5f, 0x5a, 0x2b, 0x87, 0xc2, 0xc7, 0x8c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_577 = { .name = "ecdsa_brainpoolp256r1_sha256_577", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_577_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_577_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_577_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 153 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 578 for ECDSA, tcId is 154 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_578_pubkey[] = { 0x95, 0x9b, 0x3b, 0xf3, 0x72, 0x30, 0x19, 0x93, 0xb3, 0x7e, 0x20, 0xb4, 0x34, 0x4f, 0x13, 0xc0, 0x6d, 0x5c, 0x1c, 0x53, 0xc7, 0x73, 0x7f, 0x16, 0x6e, 0xfb, 0x94, 0x83, 0x2c, 0x3b, 0x9b, 0xbb, 0x40, 0xd3, 0x5e, 0xf4, 0x6e, 0x4c, 0xfa, 0xd4, 0x75, 0xdd, 0xd1, 0xa1, 0xd9, 0x60, 0x9f, 0xec, 0xa7, 0x06, 0x97, 0x12, 0xd3, 0x0b, 0xdf, 0x46, 0x38, 0xd4, 0xc8, 0x8b, 0xc9, 0xa1, 0x21, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_578_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_578_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x14, 0x89, 0x9b, 0xc6, 0xff, 0x5e, 0x72, 0x33, 0x8f, 0x3c, 0x98, 0x47, 0xfa, 0x65, 0x31, 0xc4, 0x33, 0x7f, 0xde, 0x3f, 0xcf, 0x1c, 0x8c, 0x32, 0xf7, 0x68, 0xfb, 0xa3, 0xa4, 0x02, 0xa9, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_578 = { .name = "ecdsa_brainpoolp256r1_sha256_578", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_578_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_578_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_578_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 154 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 579 for ECDSA, tcId is 155 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_579_pubkey[] = { 0x6e, 0x69, 0xb1, 0x7d, 0x83, 0x89, 0x4e, 0x2e, 0x71, 0xff, 0xce, 0x35, 0x1b, 0x53, 0x45, 0x9c, 0x0b, 0xb2, 0x9b, 0xec, 0x37, 0x9f, 0xf4, 0x35, 0xf2, 0x3c, 0x01, 0xa9, 0xb3, 0x7d, 0xf4, 0x9e, 0x3b, 0xa1, 0x05, 0x3a, 0xd8, 0x42, 0x36, 0xd8, 0x2c, 0xf7, 0xc7, 0x62, 0x36, 0x2b, 0x37, 0xb2, 0x4e, 0x3b, 0x0e, 0xe1, 0xf8, 0xea, 0x6c, 0x54, 0x3a, 0x25, 0x91, 0xdc, 0xb6, 0x68, 0x1a, 0x8f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_579_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_579_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x72, 0x65, 0x5c, 0x5e, 0x4f, 0x1c, 0xef, 0xca, 0x22, 0xf4, 0x13, 0xa6, 0x12, 0xe5, 0xbf, 0xdd, 0x7b, 0xa9, 0xae, 0x71, 0x05, 0x3f, 0x68, 0xb0, 0xc7, 0x4d, 0x9a, 0x73, 0x59, 0x00, 0x13, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_579 = { .name = "ecdsa_brainpoolp256r1_sha256_579", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_579_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_579_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_579_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 155 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 580 for ECDSA, tcId is 156 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_580_pubkey[] = { 0x33, 0x6f, 0xc2, 0x8e, 0x1f, 0x25, 0x04, 0x85, 0x27, 0x67, 0x47, 0xdf, 0xc3, 0x48, 0x59, 0xb4, 0x74, 0x16, 0x67, 0xb3, 0xac, 0x46, 0xa0, 0xf6, 0x38, 0x4d, 0xec, 0xc1, 0xac, 0x79, 0x03, 0x04, 0x40, 0x12, 0x06, 0xb5, 0x50, 0x8a, 0xa0, 0x66, 0x01, 0xa2, 0x24, 0x6e, 0x73, 0x81, 0xdf, 0xec, 0xca, 0x6a, 0xdb, 0x2b, 0x19, 0x7a, 0xe1, 0x45, 0x49, 0xa2, 0x4c, 0x35, 0x5c, 0xd5, 0x3b, 0xe1, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_580_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_580_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa2, 0x03, 0x0d, 0xbf, 0x01, 0xd8, 0xc9, 0xde, 0x29, 0x00, 0xdc, 0x38, 0x45, 0xfd, 0xa4, 0xe4, 0xc6, 0xbc, 0x04, 0x9c, 0x4c, 0xd5, 0x71, 0x7a, 0x9c, 0x62, 0x9b, 0x9e, 0xd2, 0x9d, 0x18, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_580 = { .name = "ecdsa_brainpoolp256r1_sha256_580", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_580_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_580_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_580_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 156 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 581 for ECDSA, tcId is 157 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_581_pubkey[] = { 0x91, 0x3d, 0x9c, 0xe3, 0x5b, 0x9c, 0x73, 0x20, 0x35, 0x78, 0xe2, 0x55, 0xd4, 0xdd, 0x35, 0xff, 0x20, 0x21, 0x2d, 0x35, 0x72, 0x27, 0xd2, 0x6b, 0x8a, 0x95, 0x91, 0x80, 0x66, 0x5b, 0x54, 0x2b, 0xa5, 0x03, 0xd9, 0x22, 0xd3, 0xfd, 0x65, 0xa0, 0x7e, 0xca, 0x18, 0xc0, 0xa4, 0xe2, 0xd3, 0xf2, 0xcf, 0x7c, 0x05, 0x92, 0x8b, 0x40, 0x64, 0x58, 0xcb, 0x28, 0x6e, 0x11, 0xdc, 0x62, 0xdc, 0xb6, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_581_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_581_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa1, 0xdb, 0x72, 0x93, 0xb6, 0xf0, 0x15, 0x94, 0xb8, 0x08, 0x71, 0x8e, 0x61, 0xa4, 0xd6, 0x42, 0xdf, 0xf4, 0xfe, 0xe2, 0xfb, 0x47, 0x11, 0x67, 0xef, 0x7a, 0xb4, 0x29, 0x59, 0xa4, 0x73, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_581 = { .name = "ecdsa_brainpoolp256r1_sha256_581", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_581_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_581_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_581_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 157 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 582 for ECDSA, tcId is 158 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_582_pubkey[] = { 0x6b, 0x76, 0x91, 0x5c, 0xc1, 0xc8, 0x54, 0x74, 0x4a, 0x78, 0xda, 0xc9, 0xba, 0xec, 0xd5, 0x98, 0x45, 0xb9, 0x0a, 0xd9, 0xcd, 0x30, 0x8f, 0x5a, 0x88, 0x7d, 0xcc, 0xc9, 0x09, 0xda, 0xcd, 0x4a, 0x72, 0x60, 0x45, 0x6f, 0x8f, 0x8d, 0x31, 0x76, 0x0d, 0x81, 0xbf, 0x85, 0x34, 0x8d, 0x9f, 0x50, 0xc9, 0x9d, 0x99, 0x18, 0xb4, 0x80, 0xb1, 0xec, 0x25, 0xf4, 0xe2, 0xe3, 0x4d, 0xe0, 0x37, 0x69, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_582_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_582_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x99, 0xbb, 0x8d, 0x4b, 0xcb, 0xf1, 0x81, 0x6d, 0x31, 0xaa, 0xd8, 0x8c, 0x25, 0xc6, 0x1f, 0x14, 0x33, 0xb0, 0x83, 0x22, 0x41, 0x2c, 0x7b, 0xd8, 0x4e, 0xd7, 0x59, 0xd0, 0x1c, 0x00, 0x91, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_582 = { .name = "ecdsa_brainpoolp256r1_sha256_582", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_582_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_582_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_582_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 158 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 583 for ECDSA, tcId is 159 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_583_pubkey[] = { 0x64, 0x7b, 0x37, 0xb7, 0x31, 0xd3, 0xea, 0xd7, 0x59, 0x76, 0x27, 0x51, 0x99, 0x54, 0x83, 0x46, 0x90, 0x31, 0x08, 0x4c, 0xd7, 0x09, 0x88, 0x7c, 0x9b, 0x6b, 0xaf, 0xba, 0x46, 0x2c, 0xbf, 0x84, 0x88, 0x8c, 0x5b, 0x17, 0x1f, 0x2b, 0x2f, 0xb7, 0xbb, 0x2b, 0x9d, 0x88, 0x20, 0x0d, 0x79, 0xac, 0x94, 0xd7, 0xd4, 0x02, 0x5f, 0x79, 0x34, 0x8e, 0x22, 0x83, 0x51, 0x1c, 0x04, 0x78, 0x91, 0xbf, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_583_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_583_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x41, 0xce, 0xe8, 0x2a, 0x69, 0x57, 0xef, 0x02, 0xab, 0x3a, 0xa0, 0x7a, 0x33, 0x15, 0xac, 0xcc, 0x0d, 0x0d, 0x66, 0xc2, 0x08, 0x1d, 0x53, 0x02, 0x46, 0xd6, 0xe6, 0x81, 0x87, 0x3c, 0x90, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_583 = { .name = "ecdsa_brainpoolp256r1_sha256_583", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_583_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_583_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_583_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 159 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 584 for ECDSA, tcId is 160 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_584_pubkey[] = { 0x1f, 0x76, 0x1a, 0x1a, 0xe1, 0xe8, 0x2e, 0x4a, 0xf2, 0x77, 0xb3, 0x99, 0xda, 0x0a, 0x52, 0x3e, 0x85, 0x64, 0x4c, 0xe9, 0x71, 0xc7, 0xb9, 0x02, 0x36, 0xd0, 0x31, 0x15, 0xae, 0xd9, 0x85, 0x5b, 0x55, 0xcd, 0xb3, 0xe1, 0x04, 0x36, 0x1f, 0xd2, 0xe0, 0x97, 0x98, 0x63, 0xf2, 0x9a, 0x3b, 0x0b, 0xf5, 0x54, 0x2c, 0x51, 0x05, 0xc9, 0x1d, 0xfc, 0x7c, 0x94, 0x64, 0x3b, 0x78, 0xa2, 0xb7, 0xf2, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_584_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_584_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x74, 0x6d, 0x61, 0x57, 0x2e, 0xca, 0xe7, 0x74, 0x69, 0x1e, 0x78, 0x09, 0x12, 0x19, 0x86, 0xd9, 0xb9, 0x32, 0x79, 0xb0, 0x09, 0x34, 0xff, 0x1d, 0xef, 0x1f, 0x47, 0x98, 0xda, 0x89, 0xad, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_584 = { .name = "ecdsa_brainpoolp256r1_sha256_584", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_584_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_584_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_584_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 160 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 585 for ECDSA, tcId is 161 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_585_pubkey[] = { 0x63, 0xd3, 0x03, 0x16, 0x25, 0x74, 0x96, 0x28, 0x99, 0xfd, 0x9a, 0x32, 0x3c, 0x5f, 0xe2, 0x4a, 0x09, 0x18, 0x8f, 0xa2, 0x0d, 0x47, 0xa8, 0xd9, 0x2b, 0xa5, 0x02, 0xd4, 0xf8, 0x86, 0xf5, 0xb3, 0x72, 0xcd, 0x0d, 0x82, 0xb3, 0xfd, 0x4f, 0x54, 0xfe, 0xdc, 0x5d, 0x86, 0x18, 0xb1, 0x42, 0xf6, 0x35, 0x53, 0xe4, 0x38, 0xcc, 0x12, 0x69, 0x71, 0x9d, 0xee, 0x3a, 0xbd, 0x33, 0x16, 0xfa, 0x21, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_585_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_585_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x28, 0x1b, 0x26, 0xa0, 0x90, 0x89, 0x68, 0x09, 0x9f, 0x8e, 0x1f, 0x61, 0x0f, 0x4f, 0x35, 0x83, 0x18, 0xba, 0xa2, 0x11, 0x07, 0xb7, 0x91, 0xef, 0x6f, 0x24, 0xcb, 0x24, 0x46, 0x77, 0xa6, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_585 = { .name = "ecdsa_brainpoolp256r1_sha256_585", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_585_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_585_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_585_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 161 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 586 for ECDSA, tcId is 162 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_586_pubkey[] = { 0x3e, 0x1d, 0x96, 0x6e, 0x05, 0xf0, 0x4c, 0x44, 0xe1, 0x62, 0x13, 0x3d, 0x97, 0x73, 0x0f, 0x64, 0x08, 0xa8, 0x8a, 0xd9, 0x90, 0xa2, 0xc6, 0xef, 0xb7, 0xe3, 0xe7, 0x3a, 0x88, 0x6f, 0x7e, 0xd4, 0xa4, 0x0e, 0x3b, 0x3f, 0xd8, 0xb0, 0x05, 0xfc, 0x41, 0x74, 0x37, 0xf2, 0x10, 0x11, 0xd9, 0xfb, 0xe3, 0x8b, 0x32, 0x9a, 0x2e, 0x79, 0x59, 0xed, 0x9b, 0x04, 0x0c, 0x8e, 0x1e, 0xb6, 0x77, 0xfd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_586_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_586_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x46, 0xa7, 0x8f, 0xe7, 0xc1, 0x49, 0xc6, 0x7d, 0x7e, 0xee, 0xb1, 0xb5, 0xbe, 0x57, 0xb3, 0xa1, 0x08, 0x26, 0x51, 0xc2, 0x78, 0xeb, 0xc4, 0xa5, 0x0a, 0xbe, 0xb4, 0x57, 0x0f, 0x85, 0x8f, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_586 = { .name = "ecdsa_brainpoolp256r1_sha256_586", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_586_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_586_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_586_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 162 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 587 for ECDSA, tcId is 163 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_587_pubkey[] = { 0x56, 0xac, 0x8e, 0x49, 0xb3, 0x19, 0xd5, 0xd0, 0x41, 0xae, 0x3d, 0x3f, 0x91, 0xde, 0x22, 0x9c, 0x0a, 0x82, 0x0d, 0x7f, 0xfd, 0x97, 0xea, 0x06, 0x19, 0x6e, 0xee, 0x75, 0x07, 0x36, 0x3f, 0x42, 0x78, 0x7f, 0xc0, 0x5e, 0xba, 0x60, 0x6f, 0x77, 0xb9, 0x84, 0xe5, 0x7c, 0xab, 0xf9, 0x11, 0x20, 0x97, 0x00, 0xb5, 0xd3, 0x91, 0x47, 0xa1, 0x4c, 0x5d, 0x1a, 0x95, 0xf5, 0x6c, 0xd5, 0xfe, 0xb4, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_587_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_587_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x14, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x55, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_587 = { .name = "ecdsa_brainpoolp256r1_sha256_587", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_587_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_587_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_587_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 163 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 588 for ECDSA, tcId is 164 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_588_pubkey[] = { 0x5e, 0x2f, 0x22, 0x86, 0x31, 0xee, 0x7f, 0x00, 0xce, 0xaf, 0x93, 0x62, 0x78, 0xf2, 0xe2, 0x68, 0x1b, 0x42, 0x9f, 0xcf, 0xb8, 0xcb, 0x2c, 0x01, 0x9b, 0x31, 0xf1, 0x88, 0x83, 0x98, 0x84, 0xf5, 0x30, 0xe1, 0x07, 0x9a, 0x6b, 0x88, 0x93, 0x93, 0xcc, 0x83, 0xfa, 0xbb, 0xd5, 0x24, 0xf2, 0x1b, 0xb4, 0x86, 0xc6, 0x5b, 0x83, 0xab, 0x0a, 0xfa, 0xfb, 0x17, 0x26, 0x5d, 0x97, 0x1b, 0xae, 0x91, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_588_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_588_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x8e, 0x30, 0x5a, 0x1c, 0xf8, 0x85, 0xcc, 0xc3, 0x30, 0xad, 0x0f, 0x1b, 0x58, 0x34, 0xa6, 0xa7, 0x83, 0xf1, 0x94, 0x8a, 0x5d, 0x50, 0x87, 0xd4, 0x2b, 0xb5, 0xd4, 0x7a, 0xf8, 0x24, 0x35, 0x35, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_588 = { .name = "ecdsa_brainpoolp256r1_sha256_588", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_588_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_588_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_588_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 164 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 589 for ECDSA, tcId is 165 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_589_pubkey[] = { 0x6d, 0xbc, 0x56, 0x05, 0xb4, 0xe1, 0x13, 0x93, 0x2f, 0xed, 0xe7, 0xb4, 0x74, 0x3f, 0x4d, 0xfc, 0x62, 0xfd, 0xec, 0xae, 0x16, 0x73, 0x5b, 0x51, 0x65, 0x3d, 0x79, 0xee, 0x00, 0x8f, 0x2f, 0xc5, 0x12, 0x88, 0xfb, 0x2c, 0xa0, 0x9e, 0xe3, 0x36, 0xef, 0x31, 0x6b, 0x73, 0x91, 0x9a, 0x7f, 0x3b, 0x32, 0x9f, 0xca, 0x2f, 0x5c, 0x36, 0x5c, 0xc4, 0x27, 0x42, 0x5f, 0xec, 0xf6, 0x4f, 0x7b, 0xf3, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_589_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_589_sig[] = { 0x07, 0x4c, 0x03, 0x56, 0x03, 0xe1, 0xeb, 0x49, 0xab, 0x53, 0x82, 0x81, 0x9b, 0xf8, 0x2a, 0xf8, 0x29, 0x29, 0xb5, 0x00, 0xc6, 0xe7, 0x88, 0x41, 0xc1, 0xb2, 0xc3, 0xff, 0x54, 0xa6, 0x15, 0xdd, 0x20, 0x35, 0xac, 0x9e, 0xa7, 0x11, 0x9e, 0x30, 0xe5, 0x4f, 0x36, 0x9c, 0xd2, 0x2a, 0xa2, 0x7a, 0xf3, 0x8b, 0x56, 0x6a, 0xe6, 0x09, 0x3f, 0x1d, 0xf3, 0x5b, 0x61, 0x2d, 0xe6, 0xf0, 0x75, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_589 = { .name = "ecdsa_brainpoolp256r1_sha256_589", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_589_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_589_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_589_sig, .siglen = 64, .result = 1, .comment = "point duplication during verification, tcId is 165 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 590 for ECDSA, tcId is 166 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_590_pubkey[] = { 0x6d, 0xbc, 0x56, 0x05, 0xb4, 0xe1, 0x13, 0x93, 0x2f, 0xed, 0xe7, 0xb4, 0x74, 0x3f, 0x4d, 0xfc, 0x62, 0xfd, 0xec, 0xae, 0x16, 0x73, 0x5b, 0x51, 0x65, 0x3d, 0x79, 0xee, 0x00, 0x8f, 0x2f, 0xc5, 0x97, 0x72, 0x5c, 0xaf, 0x01, 0x4f, 0xc6, 0x85, 0x4f, 0x34, 0x9f, 0x1d, 0x0b, 0xe9, 0x0e, 0x37, 0x3b, 0x9c, 0x2b, 0xf4, 0x78, 0xef, 0xc3, 0x63, 0xf8, 0xd0, 0xe8, 0x30, 0x29, 0x1e, 0xd7, 0x84, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_590_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_590_sig[] = { 0x07, 0x4c, 0x03, 0x56, 0x03, 0xe1, 0xeb, 0x49, 0xab, 0x53, 0x82, 0x81, 0x9b, 0xf8, 0x2a, 0xf8, 0x29, 0x29, 0xb5, 0x00, 0xc6, 0xe7, 0x88, 0x41, 0xc1, 0xb2, 0xc3, 0xff, 0x54, 0xa6, 0x15, 0xdd, 0x20, 0x35, 0xac, 0x9e, 0xa7, 0x11, 0x9e, 0x30, 0xe5, 0x4f, 0x36, 0x9c, 0xd2, 0x2a, 0xa2, 0x7a, 0xf3, 0x8b, 0x56, 0x6a, 0xe6, 0x09, 0x3f, 0x1d, 0xf3, 0x5b, 0x61, 0x2d, 0xe6, 0xf0, 0x75, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_590 = { .name = "ecdsa_brainpoolp256r1_sha256_590", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_590_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_590_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_590_sig, .siglen = 64, .result = -1, .comment = "duplication bug, tcId is 166 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 591 for ECDSA, tcId is 167 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_591_pubkey[] = { 0x8c, 0x56, 0x35, 0xee, 0xaf, 0x7e, 0x99, 0x4f, 0xf1, 0x63, 0xeb, 0xdc, 0x9a, 0xac, 0xfd, 0xad, 0x1d, 0x50, 0xf9, 0x92, 0x9a, 0x80, 0x35, 0xc3, 0x6c, 0xf1, 0xc1, 0xe1, 0x6d, 0x5b, 0x28, 0xf1, 0x3d, 0xe4, 0x84, 0x31, 0xf3, 0xeb, 0x82, 0x3a, 0x38, 0x4c, 0x94, 0x0b, 0x2b, 0x0a, 0x01, 0x51, 0x2d, 0xa9, 0x8b, 0x8f, 0x72, 0xbd, 0x95, 0x45, 0xd1, 0x79, 0xd6, 0xf1, 0xcd, 0x5a, 0x2a, 0x63, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_591_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_591_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x21, 0xff, 0x11, 0x92, 0x53, 0x96, 0x21, 0xf2, 0x72, 0xe1, 0x35, 0x50, 0x1f, 0x80, 0xb5, 0xe3, 0x82, 0x71, 0xe5, 0x53, 0xf1, 0x13, 0x87, 0xcb, 0x1c, 0xd2, 0xcf, 0xb3, 0xb7, 0xdb, 0x44, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_591 = { .name = "ecdsa_brainpoolp256r1_sha256_591", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_591_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_591_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_591_sig, .siglen = 64, .result = -1, .comment = "comparison with point at infinity , tcId is 167 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 592 for ECDSA, tcId is 168 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_592_pubkey[] = { 0x2b, 0x99, 0x99, 0xcf, 0x86, 0xf1, 0x5a, 0x74, 0x71, 0xff, 0x8d, 0x21, 0x2c, 0xa3, 0xf9, 0xa9, 0x92, 0x25, 0x85, 0x1b, 0x6d, 0x96, 0x08, 0x03, 0x4c, 0xe0, 0xaf, 0x55, 0xfd, 0x53, 0x9b, 0x5a, 0x25, 0xd1, 0xd0, 0x64, 0x49, 0xa6, 0xa9, 0xf4, 0xdb, 0x83, 0x3a, 0xb6, 0x9d, 0x11, 0x70, 0xb4, 0xf0, 0xf0, 0x7d, 0x2e, 0x5f, 0x74, 0xa9, 0xb5, 0x62, 0x12, 0x56, 0x3a, 0x03, 0x56, 0xe0, 0xb6, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_592_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_592_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_592 = { .name = "ecdsa_brainpoolp256r1_sha256_592", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_592_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_592_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_592_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 168 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 593 for ECDSA, tcId is 169 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_593_pubkey[] = { 0x8d, 0x40, 0xdb, 0xb2, 0x64, 0x92, 0x3c, 0x02, 0xa4, 0x84, 0xfd, 0xc7, 0xf0, 0x61, 0x08, 0xc7, 0x27, 0xe5, 0xd1, 0x81, 0x72, 0xc9, 0x09, 0xf7, 0x9a, 0x38, 0x45, 0x48, 0x5c, 0x93, 0x9f, 0x45, 0x94, 0xdd, 0x7b, 0x7c, 0x67, 0x65, 0x3a, 0x71, 0x20, 0x74, 0xd9, 0x48, 0x90, 0xa8, 0xeb, 0x56, 0xa7, 0xd4, 0xb9, 0x75, 0x02, 0x4d, 0x3c, 0x82, 0xa1, 0x15, 0x16, 0x69, 0xa6, 0xb8, 0x38, 0x21, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_593_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_593_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x79, 0x6a, 0x63, 0x53, 0xbc, 0xcf, 0x0b, 0x86, 0x75, 0xb6, 0x99, 0xd5, 0x02, 0xcb, 0xae, 0x2c, 0x88, 0xbb, 0x57, 0x99, 0x81, 0x8e, 0xe4, 0xf9, 0xf9, 0x3a, 0x0a, 0x5d, 0x47, 0x7c, 0xd0, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_593 = { .name = "ecdsa_brainpoolp256r1_sha256_593", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_593_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_593_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_593_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 169 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 594 for ECDSA, tcId is 170 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_594_pubkey[] = { 0x1f, 0xb4, 0x4c, 0x46, 0xfc, 0xdc, 0xfe, 0x8e, 0x37, 0xf0, 0x47, 0xbc, 0xcf, 0x57, 0xba, 0x18, 0x90, 0x64, 0x3f, 0x00, 0x33, 0xd4, 0x92, 0xc4, 0xb1, 0x97, 0xca, 0x70, 0x57, 0xc8, 0x60, 0x67, 0x76, 0x3f, 0x10, 0x41, 0xf8, 0xc3, 0x8b, 0xe3, 0xad, 0x20, 0x94, 0x5a, 0x6f, 0x0f, 0xad, 0x6f, 0x53, 0x0a, 0xf9, 0x6f, 0xed, 0x28, 0x9b, 0x4e, 0x8f, 0x02, 0xab, 0xd8, 0x0b, 0x2f, 0x2d, 0x83, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_594_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_594_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x87, 0xfc, 0x46, 0x49, 0x4e, 0x58, 0x87, 0xc9, 0xcb, 0x84, 0xd5, 0x40, 0x7e, 0x02, 0xd7, 0x8e, 0x09, 0xc7, 0x95, 0x4f, 0xc4, 0x4e, 0x1f, 0x2c, 0x73, 0x4b, 0x3e, 0xce, 0xdf, 0x6d, 0x12, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_594 = { .name = "ecdsa_brainpoolp256r1_sha256_594", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_594_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_594_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_594_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 170 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 595 for ECDSA, tcId is 171 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_595_pubkey[] = { 0x8a, 0x42, 0xae, 0xf3, 0x25, 0x68, 0xd8, 0x45, 0x1e, 0x18, 0x7a, 0x94, 0x41, 0xa6, 0xe8, 0x86, 0x34, 0x2d, 0x00, 0x33, 0xb0, 0x4a, 0xaa, 0x4d, 0xdb, 0xd4, 0xd6, 0x00, 0xc6, 0xa5, 0xc8, 0x6a, 0x85, 0x5f, 0xbb, 0x08, 0x61, 0xc7, 0xa6, 0x42, 0x33, 0x3f, 0x37, 0x23, 0xc6, 0xc3, 0xdd, 0x96, 0x1f, 0x27, 0x9d, 0x99, 0x43, 0x77, 0x9d, 0x4c, 0x23, 0x7d, 0xee, 0xc9, 0x4b, 0xff, 0x84, 0x6e, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_595_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_595_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x21, 0xff, 0x11, 0x92, 0x53, 0x96, 0x21, 0xf2, 0x72, 0xe1, 0x35, 0x50, 0x1f, 0x80, 0xb5, 0xe3, 0x82, 0x71, 0xe5, 0x53, 0xf1, 0x13, 0x87, 0xcb, 0x1c, 0xd2, 0xcf, 0xb3, 0xb7, 0xdb, 0x44, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_595 = { .name = "ecdsa_brainpoolp256r1_sha256_595", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_595_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_595_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_595_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 171 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 596 for ECDSA, tcId is 172 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_596_pubkey[] = { 0x67, 0xf9, 0x99, 0xeb, 0x1a, 0x40, 0xfd, 0xda, 0x28, 0x04, 0x4d, 0x2a, 0xf2, 0x33, 0x57, 0xaa, 0xc0, 0x45, 0x17, 0x2e, 0xf1, 0xe8, 0x9c, 0x64, 0x30, 0xa6, 0x8d, 0xeb, 0x0a, 0x5e, 0x2c, 0x21, 0x55, 0x0d, 0x93, 0x56, 0x5d, 0xfc, 0x6a, 0x0c, 0x5b, 0x5c, 0xf4, 0xe7, 0xd9, 0x11, 0x1b, 0xf4, 0xe3, 0x1a, 0x0d, 0x0f, 0x94, 0xb8, 0xad, 0xfd, 0x9b, 0x80, 0x0c, 0x5b, 0x38, 0xcc, 0x22, 0xb0, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_596_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_596_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x30, 0x90, 0xf4, 0x87, 0xe5, 0x1f, 0x9e, 0x35, 0xc8, 0xaf, 0x70, 0xbb, 0x9a, 0xb7, 0xdf, 0x45, 0x03, 0x7e, 0x23, 0x0a, 0x33, 0xd2, 0xc1, 0xfd, 0x96, 0xe4, 0x04, 0x25, 0x4f, 0xcb, 0x86, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_596 = { .name = "ecdsa_brainpoolp256r1_sha256_596", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_596_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_596_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_596_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 172 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 597 for ECDSA, tcId is 173 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_597_pubkey[] = { 0x7c, 0xbf, 0x2b, 0xd2, 0xc8, 0x90, 0x69, 0xd2, 0x3e, 0xf7, 0x41, 0x7c, 0xb7, 0x83, 0xde, 0xc5, 0x00, 0x89, 0xb3, 0xc4, 0x55, 0x73, 0xad, 0x00, 0xe1, 0x21, 0x4b, 0x0c, 0x6f, 0x51, 0xce, 0xd5, 0x6e, 0xf5, 0xcb, 0xc5, 0x78, 0xda, 0x2f, 0x35, 0xcd, 0x8a, 0x43, 0xcf, 0x01, 0xa7, 0x07, 0x88, 0x41, 0xff, 0xfe, 0xf2, 0xbf, 0xaa, 0x4b, 0x93, 0x19, 0x20, 0xad, 0xa7, 0x92, 0x01, 0x9b, 0x29, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_597_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_597_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x77, 0x47, 0x2d, 0x9a, 0x28, 0xb4, 0xec, 0xe7, 0x1c, 0xf4, 0x13, 0xa6, 0x8e, 0xac, 0x0e, 0xb4, 0x23, 0xa1, 0x6f, 0xb4, 0x62, 0xb1, 0xf4, 0x87, 0x06, 0xfe, 0xd4, 0x8c, 0xa4, 0x37, 0xbd, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_597 = { .name = "ecdsa_brainpoolp256r1_sha256_597", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_597_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_597_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_597_sig, .siglen = 64, .result = 1, .comment = "extreme value for k, tcId is 173 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 598 for ECDSA, tcId is 174 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_598_pubkey[] = { 0x33, 0xd4, 0x25, 0x9f, 0x3a, 0xc0, 0xce, 0x8a, 0x53, 0x4e, 0x76, 0x55, 0xf2, 0x06, 0x8f, 0x80, 0xf4, 0x01, 0xc7, 0x42, 0xec, 0x04, 0x08, 0x47, 0x84, 0xd2, 0x69, 0xc4, 0x9e, 0xf0, 0x70, 0x1f, 0x3e, 0x1d, 0xd6, 0xfc, 0x7c, 0x20, 0x6d, 0x4d, 0x75, 0x9c, 0x80, 0xe3, 0x61, 0x2d, 0xa4, 0xd0, 0xfc, 0xd4, 0x20, 0x0a, 0xfe, 0x7a, 0x68, 0x30, 0x0e, 0x9c, 0x13, 0xf4, 0xef, 0x23, 0xf8, 0x80, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_598_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_598_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_598 = { .name = "ecdsa_brainpoolp256r1_sha256_598", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_598_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_598_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_598_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 174 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 599 for ECDSA, tcId is 175 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_599_pubkey[] = { 0x6e, 0xac, 0xd3, 0xac, 0x7f, 0x7b, 0xe6, 0x39, 0x42, 0xb8, 0x97, 0xb7, 0x5d, 0x28, 0x26, 0x21, 0x05, 0x53, 0xe1, 0x97, 0x3a, 0x5b, 0x38, 0x48, 0x75, 0x31, 0xe0, 0xdb, 0x4a, 0x84, 0x18, 0xcc, 0x6b, 0x78, 0x1f, 0x1e, 0xc2, 0x30, 0x2b, 0xf2, 0x7f, 0x8c, 0x4a, 0x46, 0xc9, 0x17, 0x91, 0x85, 0xb9, 0x2a, 0x53, 0xa2, 0x8b, 0x85, 0xb3, 0xc6, 0x41, 0x71, 0x13, 0x9d, 0xed, 0xe3, 0x5a, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_599_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_599_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x79, 0x6a, 0x63, 0x53, 0xbc, 0xcf, 0x0b, 0x86, 0x75, 0xb6, 0x99, 0xd5, 0x02, 0xcb, 0xae, 0x2c, 0x88, 0xbb, 0x57, 0x99, 0x81, 0x8e, 0xe4, 0xf9, 0xf9, 0x3a, 0x0a, 0x5d, 0x47, 0x7c, 0xd0, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_599 = { .name = "ecdsa_brainpoolp256r1_sha256_599", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_599_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_599_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_599_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 175 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 600 for ECDSA, tcId is 176 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_600_pubkey[] = { 0x49, 0x68, 0x0c, 0x57, 0xa9, 0x64, 0x4a, 0xf8, 0xa3, 0xcb, 0x5d, 0x60, 0xf3, 0x3b, 0xbe, 0xb5, 0x4c, 0x91, 0x0b, 0xd4, 0x0d, 0xab, 0x3f, 0xdb, 0x8d, 0xaa, 0x09, 0x18, 0x2e, 0x4d, 0x79, 0x18, 0x80, 0xfc, 0xa5, 0xd9, 0x24, 0x09, 0x2c, 0x31, 0x6a, 0xe8, 0x26, 0x6b, 0x2a, 0x32, 0xb7, 0x4f, 0x18, 0x6f, 0x6c, 0xf2, 0x2c, 0x29, 0x52, 0x08, 0x71, 0xfb, 0x2a, 0xd2, 0xc4, 0x4e, 0xe7, 0x1a, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_600_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_600_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x87, 0xfc, 0x46, 0x49, 0x4e, 0x58, 0x87, 0xc9, 0xcb, 0x84, 0xd5, 0x40, 0x7e, 0x02, 0xd7, 0x8e, 0x09, 0xc7, 0x95, 0x4f, 0xc4, 0x4e, 0x1f, 0x2c, 0x73, 0x4b, 0x3e, 0xce, 0xdf, 0x6d, 0x12, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_600 = { .name = "ecdsa_brainpoolp256r1_sha256_600", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_600_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_600_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_600_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 176 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 601 for ECDSA, tcId is 177 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_601_pubkey[] = { 0x69, 0x56, 0x6f, 0x1e, 0x46, 0x19, 0x34, 0x6b, 0xf8, 0x1d, 0x4b, 0x7e, 0x76, 0x70, 0x57, 0x81, 0xae, 0x6a, 0x3e, 0x84, 0x70, 0x80, 0x6a, 0xe4, 0xf7, 0x3d, 0x53, 0xbb, 0x03, 0xc2, 0x07, 0xa1, 0x39, 0x6a, 0x54, 0xd5, 0x7b, 0x45, 0x95, 0x1e, 0xbc, 0xe9, 0x98, 0x7f, 0x6a, 0xdb, 0x45, 0x7d, 0x7c, 0xe7, 0x7c, 0x6c, 0x38, 0x20, 0xd6, 0x57, 0xf9, 0xa8, 0x88, 0x2c, 0xdf, 0xad, 0x66, 0xcf, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_601_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_601_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x21, 0xff, 0x11, 0x92, 0x53, 0x96, 0x21, 0xf2, 0x72, 0xe1, 0x35, 0x50, 0x1f, 0x80, 0xb5, 0xe3, 0x82, 0x71, 0xe5, 0x53, 0xf1, 0x13, 0x87, 0xcb, 0x1c, 0xd2, 0xcf, 0xb3, 0xb7, 0xdb, 0x44, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_601 = { .name = "ecdsa_brainpoolp256r1_sha256_601", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_601_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_601_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_601_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 177 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 602 for ECDSA, tcId is 178 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_602_pubkey[] = { 0x46, 0x86, 0x8f, 0xbf, 0xc7, 0x15, 0x0d, 0x0b, 0xdb, 0x1c, 0x8e, 0x99, 0x76, 0xd8, 0x45, 0xdc, 0x4b, 0x88, 0x40, 0xf4, 0xd9, 0x21, 0x29, 0x9b, 0x6d, 0x8f, 0x98, 0x9d, 0x4d, 0xce, 0x86, 0x57, 0x83, 0x92, 0x1b, 0x9a, 0x72, 0x9e, 0x51, 0xd2, 0xde, 0xb5, 0x95, 0x5f, 0x4d, 0x87, 0xcc, 0x2b, 0x29, 0x9c, 0x7f, 0x01, 0x37, 0x2a, 0xe8, 0x2c, 0xd6, 0x3f, 0x52, 0x9a, 0x26, 0x6d, 0x4b, 0x52, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_602_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_602_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x30, 0x90, 0xf4, 0x87, 0xe5, 0x1f, 0x9e, 0x35, 0xc8, 0xaf, 0x70, 0xbb, 0x9a, 0xb7, 0xdf, 0x45, 0x03, 0x7e, 0x23, 0x0a, 0x33, 0xd2, 0xc1, 0xfd, 0x96, 0xe4, 0x04, 0x25, 0x4f, 0xcb, 0x86, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_602 = { .name = "ecdsa_brainpoolp256r1_sha256_602", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_602_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_602_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_602_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 178 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 603 for ECDSA, tcId is 179 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_603_pubkey[] = { 0x4b, 0xa9, 0xff, 0xba, 0xd2, 0x6f, 0x90, 0x9e, 0x59, 0xff, 0x58, 0x11, 0x8f, 0xb2, 0x5d, 0x05, 0xe1, 0xfd, 0x27, 0x22, 0xcf, 0x1b, 0x9d, 0x88, 0xab, 0xfe, 0xb7, 0x16, 0xc9, 0xf5, 0x46, 0x1f, 0x76, 0xb2, 0xf3, 0x95, 0xfd, 0xac, 0xb8, 0x9f, 0x3b, 0x85, 0xfd, 0xf4, 0xcd, 0x73, 0x36, 0x30, 0x40, 0x30, 0x68, 0x55, 0x9b, 0xa1, 0x2c, 0x0f, 0x43, 0x8f, 0x85, 0x62, 0x86, 0x77, 0x3f, 0x9b, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_603_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_603_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x77, 0x47, 0x2d, 0x9a, 0x28, 0xb4, 0xec, 0xe7, 0x1c, 0xf4, 0x13, 0xa6, 0x8e, 0xac, 0x0e, 0xb4, 0x23, 0xa1, 0x6f, 0xb4, 0x62, 0xb1, 0xf4, 0x87, 0x06, 0xfe, 0xd4, 0x8c, 0xa4, 0x37, 0xbd, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_603 = { .name = "ecdsa_brainpoolp256r1_sha256_603", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_603_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_603_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_603_sig, .siglen = 64, .result = 1, .comment = "extreme value for k, tcId is 179 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 604 for ECDSA, tcId is 180 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_604_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9, 0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_604_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_604_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_604 = { .name = "ecdsa_brainpoolp256r1_sha256_604", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_604_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_604_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_604_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 180 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 605 for ECDSA, tcId is 181 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_605_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9, 0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_605_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_605_sig[] = { 0x98, 0x9c, 0x5c, 0xc3, 0x14, 0x40, 0xc1, 0x16, 0x8f, 0x88, 0xb3, 0x2b, 0xa6, 0xe4, 0x79, 0x00, 0x18, 0x3c, 0x0d, 0x84, 0x3f, 0x9c, 0x41, 0x67, 0x18, 0x98, 0x03, 0x06, 0x64, 0x30, 0x5d, 0x2b, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_605 = { .name = "ecdsa_brainpoolp256r1_sha256_605", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_605_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_605_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_605_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 181 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 606 for ECDSA, tcId is 182 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_606_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x55, 0x7c, 0x5f, 0xa5, 0xde, 0x13, 0xe4, 0xbe, 0xa6, 0x6d, 0xc4, 0x76, 0x89, 0x22, 0x6f, 0xa8, 0xab, 0xc4, 0xb1, 0x10, 0xa7, 0x38, 0x91, 0xd3, 0xc3, 0xf5, 0xf3, 0x55, 0xf0, 0x69, 0xe9, 0xe0, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_606_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_606_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_606 = { .name = "ecdsa_brainpoolp256r1_sha256_606", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_606_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_606_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_606_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 182 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 607 for ECDSA, tcId is 183 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_607_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x55, 0x7c, 0x5f, 0xa5, 0xde, 0x13, 0xe4, 0xbe, 0xa6, 0x6d, 0xc4, 0x76, 0x89, 0x22, 0x6f, 0xa8, 0xab, 0xc4, 0xb1, 0x10, 0xa7, 0x38, 0x91, 0xd3, 0xc3, 0xf5, 0xf3, 0x55, 0xf0, 0x69, 0xe9, 0xe0, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_607_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_607_sig[] = { 0x98, 0x9c, 0x5c, 0xc3, 0x14, 0x40, 0xc1, 0x16, 0x8f, 0x88, 0xb3, 0x2b, 0xa6, 0xe4, 0x79, 0x00, 0x18, 0x3c, 0x0d, 0x84, 0x3f, 0x9c, 0x41, 0x67, 0x18, 0x98, 0x03, 0x06, 0x64, 0x30, 0x5d, 0x2b, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_607 = { .name = "ecdsa_brainpoolp256r1_sha256_607", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_607_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_607_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_607_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 183 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 608 for ECDSA, tcId is 184 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_608_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_608_sig[] = { 0x74, 0x5b, 0xe1, 0xda, 0x90, 0x2d, 0x19, 0xc7, 0x6c, 0x8f, 0x57, 0xd4, 0xa1, 0xf3, 0x36, 0x2b, 0x4b, 0x20, 0xed, 0x7c, 0x8d, 0xe8, 0xfc, 0x04, 0x63, 0xd5, 0x66, 0x79, 0x5f, 0x97, 0x9c, 0xea, 0x59, 0x16, 0xc3, 0x17, 0xa1, 0xe3, 0x25, 0xb5, 0x37, 0x35, 0x21, 0x6a, 0x0f, 0xa3, 0x77, 0x37, 0xf0, 0x8b, 0x32, 0x24, 0x5c, 0x88, 0x08, 0x48, 0x17, 0xb4, 0x68, 0xa4, 0x1f, 0x5a, 0xfe, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_608 = { .name = "ecdsa_brainpoolp256r1_sha256_608", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_608_pubkey, .pubkeylen = 64, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp256r1_sha256_608_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 184 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 609 for ECDSA, tcId is 185 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_609_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_609_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_609_sig[] = { 0x0f, 0xf9, 0x27, 0x9a, 0x07, 0x75, 0x74, 0x0b, 0x7d, 0xb8, 0xbe, 0xc0, 0x7f, 0x9a, 0x04, 0x01, 0xb7, 0x90, 0x38, 0x86, 0xcb, 0x19, 0x8c, 0x1b, 0x18, 0xc4, 0x6d, 0xe0, 0x67, 0x3b, 0x31, 0xc3, 0x8b, 0x3c, 0x86, 0x86, 0xbd, 0x1a, 0x15, 0x08, 0xb5, 0xb7, 0x85, 0xe7, 0x62, 0xfe, 0xce, 0x8c, 0x6c, 0xf1, 0x9b, 0x61, 0x56, 0x98, 0x3e, 0x5c, 0x36, 0xb2, 0xbb, 0xe7, 0x24, 0xd6, 0xc2, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_609 = { .name = "ecdsa_brainpoolp256r1_sha256_609", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_609_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_609_msg, .msglen = 3, .sig = ecdsa_brainpoolp256r1_sha256_609_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 185 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 610 for ECDSA, tcId is 186 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_610_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_610_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_610_sig[] = { 0x35, 0x1e, 0x72, 0x70, 0x03, 0x89, 0x6e, 0xc0, 0x29, 0x49, 0xa3, 0xcf, 0x75, 0x22, 0x23, 0xbc, 0xc6, 0xc2, 0xb6, 0x11, 0xb3, 0x03, 0x91, 0xed, 0xd6, 0x0d, 0xc0, 0xc8, 0x3d, 0xc9, 0xc9, 0x8f, 0x92, 0x4a, 0xd9, 0xdc, 0x00, 0x36, 0x4d, 0x4a, 0xa2, 0x09, 0x14, 0x16, 0xd1, 0x73, 0x86, 0x2f, 0x9b, 0x02, 0x96, 0x5f, 0xf1, 0x76, 0xe8, 0x80, 0xea, 0x62, 0xa6, 0x73, 0xe1, 0x6d, 0xb9, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_610 = { .name = "ecdsa_brainpoolp256r1_sha256_610", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_610_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_610_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_610_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 186 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 611 for ECDSA, tcId is 187 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_611_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_611_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_611_sig[] = { 0x44, 0xa8, 0x11, 0xb2, 0x32, 0x1a, 0xcb, 0xc6, 0x5c, 0xac, 0xf8, 0x0d, 0x2d, 0xbe, 0x84, 0x89, 0x46, 0xf1, 0xda, 0xc5, 0x28, 0xf3, 0xe1, 0xae, 0x38, 0xb0, 0xe5, 0x4d, 0x08, 0x3c, 0x25, 0x8f, 0x55, 0xd7, 0xed, 0xfa, 0xec, 0xdd, 0xa3, 0xbb, 0xc0, 0x62, 0xd5, 0x07, 0x4e, 0x3c, 0x37, 0x19, 0xd3, 0x27, 0x61, 0x15, 0x9d, 0x02, 0x7c, 0xa2, 0x7c, 0x17, 0x25, 0xdd, 0xbd, 0x62, 0xf6, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_611 = { .name = "ecdsa_brainpoolp256r1_sha256_611", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_611_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_611_msg, .msglen = 20, .sig = ecdsa_brainpoolp256r1_sha256_611_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 187 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 612 for ECDSA, tcId is 188 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_612_pubkey[] = { 0xa9, 0xfb, 0x57, 0xdb, 0x62, 0x50, 0x13, 0x89, 0x59, 0x4f, 0x0e, 0xe9, 0xfc, 0x16, 0x52, 0xfa, 0x83, 0x37, 0x7f, 0xa3, 0x02, 0xe1, 0x9c, 0xef, 0x64, 0x25, 0x2f, 0xc0, 0xb1, 0x47, 0xf7, 0x74, 0x95, 0x07, 0xac, 0xf5, 0xb0, 0x43, 0x39, 0xed, 0x10, 0x2b, 0x9c, 0xa6, 0x0d, 0xb9, 0x8c, 0x16, 0x5b, 0x94, 0xeb, 0xe8, 0x55, 0xd2, 0x20, 0x2e, 0x46, 0xdc, 0xe1, 0x5b, 0xa1, 0xe0, 0x28, 0xbe, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_612_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_612_sig[] = { 0x62, 0xaa, 0xb4, 0x0a, 0x36, 0xd6, 0xa0, 0xd2, 0x56, 0x44, 0x71, 0x9c, 0xe3, 0x1d, 0xc6, 0x29, 0xec, 0x68, 0x4f, 0x6f, 0x0d, 0xa3, 0x2f, 0x9d, 0xd0, 0x34, 0xcc, 0xc4, 0x21, 0xdb, 0xd0, 0xed, 0xa1, 0xfa, 0x6b, 0x0d, 0xfd, 0x95, 0x58, 0xda, 0x29, 0x37, 0x4f, 0xb7, 0x75, 0x05, 0xee, 0x8a, 0xb3, 0x57, 0x21, 0x61, 0x71, 0x1f, 0x82, 0x1d, 0x11, 0x80, 0x7c, 0x7f, 0xff, 0x91, 0x0c, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_612 = { .name = "ecdsa_brainpoolp256r1_sha256_612", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_612_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_612_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_612_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 188 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 613 for ECDSA, tcId is 189 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_613_pubkey[] = { 0xa9, 0xfb, 0x57, 0xdb, 0x62, 0x50, 0x13, 0x89, 0x59, 0x4f, 0x0e, 0xe9, 0xfc, 0x16, 0x52, 0xfa, 0x83, 0x37, 0x7f, 0xa3, 0x02, 0xe1, 0x9c, 0xef, 0x64, 0x25, 0x2f, 0xc0, 0xb1, 0x47, 0xf7, 0x74, 0x95, 0x07, 0xac, 0xf5, 0xb0, 0x43, 0x39, 0xed, 0x10, 0x2b, 0x9c, 0xa6, 0x0d, 0xb9, 0x8c, 0x16, 0x5b, 0x94, 0xeb, 0xe8, 0x55, 0xd2, 0x20, 0x2e, 0x46, 0xdc, 0xe1, 0x5b, 0xa1, 0xe0, 0x28, 0xbe, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_613_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_613_sig[] = { 0x74, 0x0c, 0xd3, 0xd3, 0xa9, 0xcd, 0x9d, 0xbe, 0x05, 0xea, 0xd4, 0xe3, 0x9e, 0x54, 0xdb, 0x27, 0xc0, 0xf1, 0x57, 0x9d, 0xa6, 0x8e, 0x3a, 0xa5, 0xc9, 0x24, 0x5b, 0x04, 0x7a, 0xeb, 0xc3, 0xb8, 0x8a, 0xe7, 0x8c, 0x12, 0x23, 0x3d, 0x37, 0x8f, 0xe2, 0xce, 0x3c, 0x0f, 0xb2, 0xb7, 0x69, 0xf8, 0x46, 0x38, 0x30, 0xa7, 0x1a, 0x5e, 0x51, 0x87, 0xc1, 0x1b, 0x20, 0xfd, 0xd7, 0xe5, 0x04, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_613 = { .name = "ecdsa_brainpoolp256r1_sha256_613", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_613_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_613_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_613_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 189 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 614 for ECDSA, tcId is 190 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_614_pubkey[] = { 0xa9, 0xfb, 0x57, 0xdb, 0x62, 0x50, 0x13, 0x89, 0x59, 0x4f, 0x0e, 0xe9, 0xfc, 0x16, 0x52, 0xfa, 0x83, 0x37, 0x7f, 0xa3, 0x02, 0xe1, 0x9c, 0xef, 0x64, 0x25, 0x2f, 0xc0, 0xb1, 0x47, 0xf7, 0x74, 0x95, 0x07, 0xac, 0xf5, 0xb0, 0x43, 0x39, 0xed, 0x10, 0x2b, 0x9c, 0xa6, 0x0d, 0xb9, 0x8c, 0x16, 0x5b, 0x94, 0xeb, 0xe8, 0x55, 0xd2, 0x20, 0x2e, 0x46, 0xdc, 0xe1, 0x5b, 0xa1, 0xe0, 0x28, 0xbe, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_614_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_614_sig[] = { 0xa2, 0x8f, 0x30, 0x24, 0x5c, 0x5f, 0xb0, 0xc2, 0x25, 0xfd, 0xec, 0x23, 0x92, 0x4d, 0xc2, 0xcd, 0x4c, 0x2d, 0xa8, 0x88, 0xd1, 0xee, 0x1b, 0xc5, 0x44, 0x58, 0x58, 0xc6, 0x46, 0x01, 0x5c, 0xa8, 0x0e, 0xe3, 0x64, 0xc1, 0x49, 0x1c, 0x45, 0x51, 0xef, 0x35, 0x09, 0xbe, 0x8f, 0x88, 0xdb, 0x0e, 0x04, 0xd0, 0xaf, 0xb3, 0x65, 0x28, 0xae, 0xda, 0x13, 0x01, 0xb1, 0x49, 0x48, 0xcc, 0x9c, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_614 = { .name = "ecdsa_brainpoolp256r1_sha256_614", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_614_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_614_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_614_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 190 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 615 for ECDSA, tcId is 191 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_615_pubkey[] = { 0x35, 0x1a, 0x45, 0xfb, 0x92, 0x0f, 0x2c, 0x9f, 0x1b, 0x17, 0x84, 0x38, 0xfa, 0x3b, 0xf2, 0x72, 0xff, 0x93, 0x28, 0xb8, 0x81, 0xc4, 0x77, 0xa1, 0xf5, 0x6a, 0x8c, 0x0e, 0x88, 0x46, 0x52, 0x76, 0x12, 0x70, 0xf8, 0x06, 0xfe, 0x40, 0xad, 0x97, 0xeb, 0xf7, 0x6c, 0x68, 0x25, 0x38, 0x4b, 0x78, 0x0a, 0xe6, 0xaf, 0xcc, 0xc7, 0x92, 0xb0, 0x5f, 0x2f, 0xb3, 0xeb, 0x7b, 0x7f, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_615_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_615_sig[] = { 0x7f, 0x20, 0x2f, 0x54, 0xf5, 0x91, 0xb5, 0x11, 0x05, 0xb2, 0x27, 0xee, 0x6d, 0x6d, 0xa3, 0xad, 0xdd, 0xfc, 0x4b, 0x5e, 0x81, 0x9e, 0xfc, 0x04, 0xbe, 0xfc, 0xdc, 0xbf, 0x74, 0x84, 0xf7, 0x83, 0x43, 0x60, 0xea, 0x04, 0x50, 0x39, 0x55, 0xfc, 0x3f, 0x02, 0x59, 0x28, 0xb2, 0xdc, 0xe5, 0x0f, 0xf2, 0xd5, 0x8b, 0x90, 0x60, 0xb3, 0x4b, 0xbe, 0xdf, 0xc3, 0xc2, 0x19, 0xb3, 0xb4, 0x35, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_615 = { .name = "ecdsa_brainpoolp256r1_sha256_615", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_615_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_615_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_615_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 191 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 616 for ECDSA, tcId is 192 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_616_pubkey[] = { 0x35, 0x1a, 0x45, 0xfb, 0x92, 0x0f, 0x2c, 0x9f, 0x1b, 0x17, 0x84, 0x38, 0xfa, 0x3b, 0xf2, 0x72, 0xff, 0x93, 0x28, 0xb8, 0x81, 0xc4, 0x77, 0xa1, 0xf5, 0x6a, 0x8c, 0x0e, 0x88, 0x46, 0x52, 0x76, 0x12, 0x70, 0xf8, 0x06, 0xfe, 0x40, 0xad, 0x97, 0xeb, 0xf7, 0x6c, 0x68, 0x25, 0x38, 0x4b, 0x78, 0x0a, 0xe6, 0xaf, 0xcc, 0xc7, 0x92, 0xb0, 0x5f, 0x2f, 0xb3, 0xeb, 0x7b, 0x7f, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_616_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_616_sig[] = { 0x62, 0xe2, 0x18, 0xdc, 0xa3, 0x2e, 0x4e, 0xf3, 0x56, 0x92, 0xe9, 0x31, 0x5e, 0x1e, 0x03, 0x6b, 0xef, 0x17, 0x66, 0x07, 0x3b, 0x84, 0x6e, 0x38, 0xde, 0x20, 0xd2, 0xd2, 0x93, 0x49, 0xf9, 0xfe, 0x51, 0x9d, 0x4d, 0x4c, 0x61, 0x58, 0xd9, 0x54, 0x74, 0xd7, 0x93, 0xa0, 0xee, 0x9c, 0x26, 0x0a, 0x0c, 0x54, 0x69, 0xc5, 0xaa, 0xb7, 0x95, 0x10, 0x97, 0x1b, 0x41, 0xfb, 0x4f, 0xae, 0x4b, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_616 = { .name = "ecdsa_brainpoolp256r1_sha256_616", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_616_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_616_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_616_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 192 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 617 for ECDSA, tcId is 193 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_617_pubkey[] = { 0x35, 0x1a, 0x45, 0xfb, 0x92, 0x0f, 0x2c, 0x9f, 0x1b, 0x17, 0x84, 0x38, 0xfa, 0x3b, 0xf2, 0x72, 0xff, 0x93, 0x28, 0xb8, 0x81, 0xc4, 0x77, 0xa1, 0xf5, 0x6a, 0x8c, 0x0e, 0x88, 0x46, 0x52, 0x76, 0x12, 0x70, 0xf8, 0x06, 0xfe, 0x40, 0xad, 0x97, 0xeb, 0xf7, 0x6c, 0x68, 0x25, 0x38, 0x4b, 0x78, 0x0a, 0xe6, 0xaf, 0xcc, 0xc7, 0x92, 0xb0, 0x5f, 0x2f, 0xb3, 0xeb, 0x7b, 0x7f, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_617_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_617_sig[] = { 0xa3, 0x90, 0x22, 0x95, 0xf6, 0xf7, 0x43, 0xac, 0x75, 0x4d, 0xb7, 0xb3, 0xfc, 0xd8, 0x23, 0xbe, 0x91, 0x7b, 0x11, 0x91, 0xa5, 0x70, 0x57, 0x28, 0xf5, 0x68, 0x24, 0x92, 0x78, 0x4d, 0xa7, 0xf1, 0x43, 0xde, 0xf6, 0x36, 0x66, 0x0e, 0xff, 0x72, 0xe6, 0x43, 0x5e, 0xdb, 0x85, 0x0c, 0x91, 0x26, 0xc7, 0x06, 0x79, 0x38, 0x66, 0x8f, 0x24, 0x99, 0x98, 0xa0, 0xe4, 0x00, 0x6b, 0x8e, 0xe7, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_617 = { .name = "ecdsa_brainpoolp256r1_sha256_617", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_617_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_617_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_617_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 193 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 618 for ECDSA, tcId is 194 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_618_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x29, 0xb2, 0x14, 0x6e, 0x36, 0xfc, 0x05, 0x55, 0x45, 0xbf, 0x8f, 0x2c, 0xc7, 0x0f, 0x8e, 0x73, 0xe8, 0xb2, 0x5e, 0x53, 0x93, 0x65, 0xad, 0x75, 0x77, 0xcc, 0x35, 0x35, 0x4a, 0x2b, 0x8c, 0x03, 0x19, 0xbc, 0x4c, 0xcd, 0x3e, 0x60, 0xda, 0x11, 0x94, 0x77, 0xc2, 0x3f, 0xaf, 0x8f, 0xc2, 0xdc, 0xef, 0xc4, 0x2d, 0x3a, 0xf7, 0x58, 0x27, 0xae, 0xb4, 0x2f, 0x6f, 0x0f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_618_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_618_sig[] = { 0x86, 0xd0, 0x5b, 0x26, 0xa9, 0xca, 0x7e, 0x10, 0xae, 0x06, 0x81, 0xbb, 0x4c, 0x35, 0xa0, 0x6d, 0x7a, 0x4e, 0x91, 0x8f, 0x86, 0x25, 0xe3, 0xdf, 0xa7, 0xac, 0x2d, 0x5a, 0xed, 0xa9, 0x1c, 0x05, 0x08, 0xc5, 0xf4, 0x75, 0xa9, 0x58, 0x88, 0x76, 0x9d, 0xa4, 0xa0, 0xe1, 0xb6, 0x35, 0xc2, 0x29, 0x2f, 0x65, 0x4f, 0x93, 0x4a, 0x5c, 0x50, 0x10, 0xfe, 0x0c, 0x72, 0x9f, 0x3d, 0x11, 0xe1, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_618 = { .name = "ecdsa_brainpoolp256r1_sha256_618", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_618_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_618_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_618_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 194 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 619 for ECDSA, tcId is 195 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_619_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x29, 0xb2, 0x14, 0x6e, 0x36, 0xfc, 0x05, 0x55, 0x45, 0xbf, 0x8f, 0x2c, 0xc7, 0x0f, 0x8e, 0x73, 0xe8, 0xb2, 0x5e, 0x53, 0x93, 0x65, 0xad, 0x75, 0x77, 0xcc, 0x35, 0x35, 0x4a, 0x2b, 0x8c, 0x03, 0x19, 0xbc, 0x4c, 0xcd, 0x3e, 0x60, 0xda, 0x11, 0x94, 0x77, 0xc2, 0x3f, 0xaf, 0x8f, 0xc2, 0xdc, 0xef, 0xc4, 0x2d, 0x3a, 0xf7, 0x58, 0x27, 0xae, 0xb4, 0x2f, 0x6f, 0x0f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_619_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_619_sig[] = { 0x43, 0xc4, 0x47, 0x47, 0x10, 0xd2, 0x50, 0x94, 0xa2, 0xe2, 0x1a, 0x9c, 0xc0, 0x85, 0x85, 0xc2, 0x60, 0x15, 0xf9, 0xf9, 0x40, 0x12, 0xb1, 0x00, 0xe7, 0x2c, 0x07, 0x63, 0xaa, 0x9e, 0x0c, 0xff, 0x83, 0x45, 0xc4, 0x6f, 0xd5, 0x59, 0x2c, 0xef, 0xbd, 0x5e, 0xbb, 0x25, 0x89, 0x65, 0xc0, 0x5d, 0x96, 0x4e, 0x6e, 0x6a, 0x27, 0x81, 0x98, 0xdd, 0xc1, 0xe3, 0x88, 0xcf, 0x1e, 0x75, 0x86, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_619 = { .name = "ecdsa_brainpoolp256r1_sha256_619", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_619_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_619_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_619_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 195 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 620 for ECDSA, tcId is 196 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_620_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x29, 0xb2, 0x14, 0x6e, 0x36, 0xfc, 0x05, 0x55, 0x45, 0xbf, 0x8f, 0x2c, 0xc7, 0x0f, 0x8e, 0x73, 0xe8, 0xb2, 0x5e, 0x53, 0x93, 0x65, 0xad, 0x75, 0x77, 0xcc, 0x35, 0x35, 0x4a, 0x2b, 0x8c, 0x03, 0x19, 0xbc, 0x4c, 0xcd, 0x3e, 0x60, 0xda, 0x11, 0x94, 0x77, 0xc2, 0x3f, 0xaf, 0x8f, 0xc2, 0xdc, 0xef, 0xc4, 0x2d, 0x3a, 0xf7, 0x58, 0x27, 0xae, 0xb4, 0x2f, 0x6f, 0x0f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_620_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_620_sig[] = { 0x6d, 0x27, 0x24, 0x16, 0x7e, 0x81, 0x65, 0x28, 0x49, 0x1c, 0xce, 0x57, 0x4f, 0x05, 0x26, 0x20, 0x9d, 0xe5, 0x2c, 0xd0, 0xf2, 0xaf, 0x00, 0x85, 0x28, 0x4f, 0xd0, 0x50, 0x16, 0x3d, 0x37, 0xc5, 0x76, 0xdd, 0x1d, 0xd5, 0x0f, 0xf9, 0xb5, 0x53, 0xb0, 0xe1, 0x42, 0xb7, 0xe6, 0xc6, 0xbe, 0x8e, 0xdf, 0x37, 0x08, 0xdd, 0x29, 0x2f, 0x03, 0xf3, 0xe9, 0xbf, 0x15, 0x7d, 0x21, 0xda, 0xa9, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_620 = { .name = "ecdsa_brainpoolp256r1_sha256_620", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_620_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_620_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_620_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 196 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 621 for ECDSA, tcId is 197 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_621_pubkey[] = { 0x68, 0x0b, 0xec, 0xab, 0xe7, 0xd7, 0xdf, 0x4f, 0xad, 0xfe, 0x5a, 0xe0, 0x1f, 0xba, 0x5e, 0xa5, 0x1b, 0x76, 0x75, 0x96, 0x06, 0xa2, 0xe3, 0x06, 0x12, 0xe6, 0x67, 0x41, 0x9b, 0x88, 0x5d, 0x05, 0x08, 0x54, 0x1d, 0xcb, 0x07, 0x23, 0x78, 0x5c, 0x3c, 0x76, 0x65, 0x81, 0xa7, 0x51, 0x4a, 0x1f, 0xf4, 0x2e, 0x44, 0x37, 0xd6, 0x3f, 0x87, 0x82, 0x71, 0xcb, 0x86, 0x0f, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_621_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_621_sig[] = { 0x32, 0x10, 0x09, 0xa0, 0x6c, 0x75, 0x9c, 0x54, 0xcd, 0x66, 0xba, 0xaf, 0xa0, 0xcb, 0xfd, 0x07, 0xee, 0xdb, 0x19, 0xf1, 0x2a, 0x1e, 0xd6, 0x54, 0xdd, 0x52, 0xb5, 0x6f, 0x9c, 0x4f, 0xac, 0x7c, 0x19, 0x56, 0x31, 0x0a, 0x7e, 0x47, 0x57, 0xec, 0x83, 0xdd, 0xb9, 0x2d, 0x27, 0x63, 0x60, 0x73, 0x54, 0x67, 0x81, 0x49, 0xf1, 0xad, 0x92, 0x38, 0x79, 0x28, 0xcf, 0x88, 0x7b, 0x4b, 0xed, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_621 = { .name = "ecdsa_brainpoolp256r1_sha256_621", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_621_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_621_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_621_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 197 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 622 for ECDSA, tcId is 198 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_622_pubkey[] = { 0x68, 0x0b, 0xec, 0xab, 0xe7, 0xd7, 0xdf, 0x4f, 0xad, 0xfe, 0x5a, 0xe0, 0x1f, 0xba, 0x5e, 0xa5, 0x1b, 0x76, 0x75, 0x96, 0x06, 0xa2, 0xe3, 0x06, 0x12, 0xe6, 0x67, 0x41, 0x9b, 0x88, 0x5d, 0x05, 0x08, 0x54, 0x1d, 0xcb, 0x07, 0x23, 0x78, 0x5c, 0x3c, 0x76, 0x65, 0x81, 0xa7, 0x51, 0x4a, 0x1f, 0xf4, 0x2e, 0x44, 0x37, 0xd6, 0x3f, 0x87, 0x82, 0x71, 0xcb, 0x86, 0x0f, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_622_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_622_sig[] = { 0x9b, 0xdd, 0x35, 0x98, 0x81, 0xc2, 0x39, 0xe2, 0x41, 0x5c, 0xa2, 0xaf, 0x3d, 0x18, 0x46, 0x3b, 0xb2, 0x4b, 0xe5, 0x3f, 0x6f, 0x63, 0x6c, 0xbd, 0x20, 0x36, 0x0b, 0x6b, 0x33, 0x3b, 0xc3, 0x45, 0x0f, 0xf0, 0x3b, 0xc3, 0x6c, 0xc1, 0x97, 0x5b, 0xdc, 0x86, 0x80, 0xc4, 0x4f, 0xbf, 0x2a, 0xef, 0xdd, 0xf6, 0x7c, 0x11, 0x8c, 0x30, 0x4b, 0x8b, 0x3d, 0x36, 0x0e, 0xb1, 0x02, 0x03, 0xc3, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_622 = { .name = "ecdsa_brainpoolp256r1_sha256_622", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_622_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_622_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_622_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 198 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 623 for ECDSA, tcId is 199 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_623_pubkey[] = { 0x68, 0x0b, 0xec, 0xab, 0xe7, 0xd7, 0xdf, 0x4f, 0xad, 0xfe, 0x5a, 0xe0, 0x1f, 0xba, 0x5e, 0xa5, 0x1b, 0x76, 0x75, 0x96, 0x06, 0xa2, 0xe3, 0x06, 0x12, 0xe6, 0x67, 0x41, 0x9b, 0x88, 0x5d, 0x05, 0x08, 0x54, 0x1d, 0xcb, 0x07, 0x23, 0x78, 0x5c, 0x3c, 0x76, 0x65, 0x81, 0xa7, 0x51, 0x4a, 0x1f, 0xf4, 0x2e, 0x44, 0x37, 0xd6, 0x3f, 0x87, 0x82, 0x71, 0xcb, 0x86, 0x0f, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_623_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_623_sig[] = { 0x48, 0x56, 0x5e, 0xb7, 0xe7, 0x82, 0x0d, 0x40, 0x75, 0x4b, 0x5f, 0x26, 0x4a, 0x4c, 0xea, 0xfa, 0x62, 0xbf, 0x75, 0x08, 0x42, 0x41, 0x51, 0x4b, 0x49, 0x19, 0x95, 0xe7, 0x97, 0x1e, 0x69, 0x95, 0x3d, 0xa6, 0xdf, 0x3d, 0x35, 0x4f, 0x48, 0xda, 0xef, 0x6d, 0x07, 0x8c, 0xf1, 0x12, 0x42, 0x95, 0xfc, 0x8c, 0x32, 0x11, 0xf2, 0x75, 0x79, 0x67, 0xc7, 0x81, 0xdc, 0x2e, 0x9c, 0x62, 0xed, 0x1a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_623 = { .name = "ecdsa_brainpoolp256r1_sha256_623", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_623_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_623_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_623_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 199 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 624 for ECDSA, tcId is 200 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_624_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0x00, 0x00, 0x00, 0x01, 0x46, 0x9f, 0xb4, 0x56, 0xca, 0x6a, 0x17, 0x20, 0xca, 0x8d, 0xb2, 0x5d, 0x56, 0x7e, 0x12, 0x1c, 0xf9, 0x21, 0xce, 0x13, 0xe3, 0x40, 0x00, 0xf8, 0xc1, 0x2f, 0x52, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_624_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_624_sig[] = { 0x51, 0x8e, 0x88, 0x5d, 0xef, 0x02, 0x2e, 0xb5, 0x02, 0x0f, 0xc9, 0x0f, 0x40, 0x24, 0xd8, 0x71, 0x22, 0xdc, 0x0f, 0x3e, 0xd7, 0xf8, 0x69, 0xed, 0x77, 0x20, 0xff, 0x74, 0xa0, 0x09, 0xfb, 0x7b, 0x8a, 0x3e, 0x26, 0xa8, 0xcd, 0x42, 0x6d, 0x21, 0xeb, 0xa5, 0xcd, 0x7a, 0x56, 0x14, 0xf3, 0x64, 0x43, 0x95, 0xcf, 0xce, 0xcb, 0x24, 0xfe, 0x76, 0x0a, 0x68, 0xa7, 0xa9, 0xe8, 0xf0, 0x9c, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_624 = { .name = "ecdsa_brainpoolp256r1_sha256_624", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_624_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_624_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_624_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 200 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 625 for ECDSA, tcId is 201 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_625_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0x00, 0x00, 0x00, 0x01, 0x46, 0x9f, 0xb4, 0x56, 0xca, 0x6a, 0x17, 0x20, 0xca, 0x8d, 0xb2, 0x5d, 0x56, 0x7e, 0x12, 0x1c, 0xf9, 0x21, 0xce, 0x13, 0xe3, 0x40, 0x00, 0xf8, 0xc1, 0x2f, 0x52, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_625_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_625_sig[] = { 0x04, 0xb0, 0x1e, 0x5c, 0xc3, 0xce, 0x9b, 0xf1, 0x08, 0x44, 0xbc, 0x1c, 0xb2, 0x1d, 0xee, 0xff, 0x6e, 0xbc, 0x9e, 0x2a, 0x70, 0x10, 0xcf, 0xbb, 0x3a, 0xf0, 0x81, 0x13, 0x54, 0x59, 0x9c, 0x81, 0x2e, 0x65, 0xfb, 0x8d, 0xb6, 0x2f, 0x25, 0x59, 0x10, 0xea, 0x4d, 0x52, 0x35, 0xbb, 0x21, 0xaa, 0x67, 0xaa, 0x59, 0xff, 0xd5, 0x19, 0x91, 0x1e, 0xcd, 0x98, 0x93, 0x00, 0x0a, 0xb6, 0x7b, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_625 = { .name = "ecdsa_brainpoolp256r1_sha256_625", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_625_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_625_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_625_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 201 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 626 for ECDSA, tcId is 202 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_626_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0x00, 0x00, 0x00, 0x01, 0x46, 0x9f, 0xb4, 0x56, 0xca, 0x6a, 0x17, 0x20, 0xca, 0x8d, 0xb2, 0x5d, 0x56, 0x7e, 0x12, 0x1c, 0xf9, 0x21, 0xce, 0x13, 0xe3, 0x40, 0x00, 0xf8, 0xc1, 0x2f, 0x52, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_626_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_626_sig[] = { 0x94, 0xbb, 0x06, 0x01, 0x19, 0x8c, 0x4c, 0xe2, 0x66, 0xb0, 0x93, 0x24, 0x26, 0xff, 0xd0, 0x01, 0x32, 0xd7, 0xd4, 0xe2, 0xde, 0x65, 0xef, 0x47, 0xf5, 0x63, 0x60, 0x82, 0x5f, 0x26, 0x24, 0x38, 0x27, 0x34, 0x32, 0x7d, 0x19, 0x89, 0xc9, 0x58, 0x0f, 0x54, 0x58, 0xf0, 0x4a, 0xac, 0x6f, 0xd5, 0x75, 0x2a, 0x1e, 0xe5, 0xe2, 0x36, 0xe9, 0xed, 0x1a, 0x7c, 0x0b, 0x2d, 0x9b, 0x36, 0xdb, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_626 = { .name = "ecdsa_brainpoolp256r1_sha256_626", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_626_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_626_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_626_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 202 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 627 for ECDSA, tcId is 203 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_627_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0xa9, 0xfb, 0x57, 0xda, 0x5b, 0x4e, 0xf5, 0x65, 0x73, 0xfb, 0xf3, 0x6f, 0xd2, 0xf5, 0xdb, 0x15, 0x17, 0xbd, 0xe4, 0x06, 0xdc, 0x04, 0x52, 0x14, 0x3c, 0xd3, 0x47, 0x24, 0x5e, 0x3f, 0x01, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_627_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_627_sig[] = { 0x4d, 0xde, 0x19, 0x7f, 0x96, 0x2c, 0x63, 0xa7, 0x79, 0x9c, 0x86, 0x2e, 0x89, 0x7b, 0x3b, 0xb1, 0xe7, 0xa7, 0xdd, 0xfb, 0x9a, 0xb7, 0x7c, 0x2a, 0x17, 0xa5, 0x41, 0x51, 0xce, 0x60, 0x4a, 0xd6, 0x01, 0x7e, 0x7a, 0xef, 0x86, 0xe5, 0x33, 0x08, 0x64, 0x25, 0xa2, 0xc4, 0xb3, 0x20, 0x82, 0xf1, 0x18, 0x91, 0x3e, 0xf3, 0x66, 0x7c, 0x84, 0x37, 0x67, 0x2e, 0x0b, 0xbc, 0x7c, 0x2b, 0x8d, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_627 = { .name = "ecdsa_brainpoolp256r1_sha256_627", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_627_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_627_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_627_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 203 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 628 for ECDSA, tcId is 204 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_628_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0xa9, 0xfb, 0x57, 0xda, 0x5b, 0x4e, 0xf5, 0x65, 0x73, 0xfb, 0xf3, 0x6f, 0xd2, 0xf5, 0xdb, 0x15, 0x17, 0xbd, 0xe4, 0x06, 0xdc, 0x04, 0x52, 0x14, 0x3c, 0xd3, 0x47, 0x24, 0x5e, 0x3f, 0x01, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_628_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_628_sig[] = { 0x7c, 0x53, 0xed, 0x1d, 0x50, 0x4a, 0xd4, 0xba, 0x53, 0xd3, 0x97, 0x92, 0x01, 0x2a, 0x34, 0xd0, 0x07, 0x25, 0x0a, 0x2b, 0x8d, 0x1c, 0xa1, 0x89, 0xc0, 0xd9, 0xf7, 0x5c, 0xcc, 0x9a, 0x99, 0x57, 0x09, 0xb9, 0x7d, 0xcc, 0x5c, 0x67, 0x48, 0x71, 0x14, 0x23, 0x1d, 0x60, 0x13, 0x74, 0xa8, 0x36, 0x4c, 0xaf, 0xa3, 0x95, 0x81, 0x29, 0x17, 0x62, 0x20, 0x2b, 0x92, 0x15, 0xd5, 0x11, 0x35, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_628 = { .name = "ecdsa_brainpoolp256r1_sha256_628", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_628_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_628_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_628_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 204 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 629 for ECDSA, tcId is 205 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_629_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0xa9, 0xfb, 0x57, 0xda, 0x5b, 0x4e, 0xf5, 0x65, 0x73, 0xfb, 0xf3, 0x6f, 0xd2, 0xf5, 0xdb, 0x15, 0x17, 0xbd, 0xe4, 0x06, 0xdc, 0x04, 0x52, 0x14, 0x3c, 0xd3, 0x47, 0x24, 0x5e, 0x3f, 0x01, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_629_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_629_sig[] = { 0x51, 0x32, 0x45, 0xab, 0x2b, 0x6a, 0x42, 0x06, 0xbb, 0x0f, 0x69, 0x70, 0xc8, 0xad, 0x04, 0x0a, 0x94, 0x72, 0x5d, 0xdc, 0x9a, 0x08, 0xdb, 0x0f, 0xd9, 0xde, 0xf9, 0x38, 0x66, 0xff, 0xbb, 0xa1, 0xa5, 0x3a, 0x7a, 0xb3, 0x7d, 0xec, 0xed, 0xae, 0x18, 0xdd, 0x5b, 0x5c, 0x48, 0xeb, 0x64, 0x2b, 0x7a, 0x9c, 0x92, 0x7e, 0x6b, 0xcf, 0x6b, 0xda, 0xc3, 0xa7, 0x57, 0xe6, 0xd2, 0xc1, 0x69, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_629 = { .name = "ecdsa_brainpoolp256r1_sha256_629", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_629_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_629_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_629_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 205 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 630 for ECDSA, tcId is 206 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_630_pubkey[] = { 0x81, 0x52, 0x8b, 0x7a, 0xdb, 0xbe, 0xbf, 0x1b, 0x6b, 0x3c, 0x7f, 0xa1, 0xd6, 0x12, 0x84, 0xb0, 0x77, 0x59, 0xb9, 0xa9, 0x8d, 0x31, 0xa5, 0x70, 0x27, 0x07, 0xb0, 0x18, 0xfd, 0xec, 0xff, 0x11, 0x75, 0xbb, 0xfc, 0xcb, 0x54, 0x53, 0x81, 0xbf, 0x86, 0x01, 0x03, 0x17, 0x31, 0x84, 0x18, 0x29, 0x40, 0x1b, 0x08, 0xdc, 0xdc, 0x68, 0xcc, 0x34, 0xe0, 0x6a, 0x64, 0xe4, 0x12, 0x03, 0x85, 0x12, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_630_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_630_sig[] = { 0xa5, 0x03, 0x18, 0xc3, 0x06, 0x6a, 0x49, 0x66, 0xad, 0x18, 0xae, 0x8f, 0x85, 0x25, 0x3f, 0xbb, 0x58, 0x35, 0xa3, 0x4b, 0x2f, 0x91, 0x87, 0xda, 0xac, 0x71, 0xee, 0x28, 0xd3, 0xd5, 0xd0, 0xeb, 0x08, 0x90, 0xef, 0x0f, 0xc9, 0x3d, 0xf2, 0x22, 0xd1, 0x11, 0x97, 0xcb, 0x22, 0x14, 0x83, 0xce, 0x89, 0x7b, 0x0c, 0xf1, 0xac, 0xf4, 0xa9, 0x09, 0xc3, 0x06, 0xc5, 0xa4, 0x85, 0x77, 0x6a, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_630 = { .name = "ecdsa_brainpoolp256r1_sha256_630", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_630_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_630_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_630_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 206 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 631 for ECDSA, tcId is 207 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_631_pubkey[] = { 0x81, 0x52, 0x8b, 0x7a, 0xdb, 0xbe, 0xbf, 0x1b, 0x6b, 0x3c, 0x7f, 0xa1, 0xd6, 0x12, 0x84, 0xb0, 0x77, 0x59, 0xb9, 0xa9, 0x8d, 0x31, 0xa5, 0x70, 0x27, 0x07, 0xb0, 0x18, 0xfd, 0xec, 0xff, 0x11, 0x75, 0xbb, 0xfc, 0xcb, 0x54, 0x53, 0x81, 0xbf, 0x86, 0x01, 0x03, 0x17, 0x31, 0x84, 0x18, 0x29, 0x40, 0x1b, 0x08, 0xdc, 0xdc, 0x68, 0xcc, 0x34, 0xe0, 0x6a, 0x64, 0xe4, 0x12, 0x03, 0x85, 0x12, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_631_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_631_sig[] = { 0x04, 0x1e, 0x03, 0x89, 0xdd, 0xa2, 0xcf, 0x2a, 0xe3, 0xa9, 0x56, 0x2a, 0x0f, 0xb5, 0xd4, 0x1c, 0x1f, 0x75, 0x33, 0xe6, 0xcc, 0x84, 0xa8, 0x96, 0xe9, 0x9a, 0xf7, 0x81, 0xe2, 0x10, 0x97, 0x70, 0x36, 0x6b, 0x5d, 0x88, 0xc3, 0x6f, 0x12, 0x27, 0xdf, 0x52, 0x2f, 0xda, 0xb6, 0x5e, 0x12, 0x34, 0x7d, 0x68, 0xeb, 0x64, 0xf2, 0xde, 0x82, 0xc6, 0x48, 0x11, 0x5f, 0xd5, 0x65, 0xbd, 0x37, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_631 = { .name = "ecdsa_brainpoolp256r1_sha256_631", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_631_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_631_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_631_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 207 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 632 for ECDSA, tcId is 208 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_632_pubkey[] = { 0x81, 0x52, 0x8b, 0x7a, 0xdb, 0xbe, 0xbf, 0x1b, 0x6b, 0x3c, 0x7f, 0xa1, 0xd6, 0x12, 0x84, 0xb0, 0x77, 0x59, 0xb9, 0xa9, 0x8d, 0x31, 0xa5, 0x70, 0x27, 0x07, 0xb0, 0x18, 0xfd, 0xec, 0xff, 0x11, 0x75, 0xbb, 0xfc, 0xcb, 0x54, 0x53, 0x81, 0xbf, 0x86, 0x01, 0x03, 0x17, 0x31, 0x84, 0x18, 0x29, 0x40, 0x1b, 0x08, 0xdc, 0xdc, 0x68, 0xcc, 0x34, 0xe0, 0x6a, 0x64, 0xe4, 0x12, 0x03, 0x85, 0x12, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_632_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_632_sig[] = { 0x2a, 0x76, 0x39, 0x4a, 0x04, 0xae, 0x19, 0xb2, 0x5c, 0x54, 0x29, 0x1e, 0x28, 0xbc, 0xd4, 0x2a, 0x7e, 0xde, 0xb2, 0x09, 0x81, 0xb8, 0xa3, 0xb8, 0x38, 0xf9, 0xdd, 0x0e, 0x29, 0xb5, 0x74, 0xc1, 0x9c, 0xe8, 0x99, 0x80, 0xae, 0x43, 0x2c, 0x4f, 0xa6, 0xa6, 0x80, 0x25, 0xda, 0x55, 0x4b, 0xf9, 0x00, 0xcc, 0x2e, 0xb0, 0xc6, 0x69, 0x06, 0x42, 0x0d, 0x32, 0x2c, 0x14, 0xb4, 0x53, 0x04, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_632 = { .name = "ecdsa_brainpoolp256r1_sha256_632", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_632_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_632_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_632_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 208 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 633 for ECDSA, tcId is 209 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_633_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x16, 0xea, 0x8e, 0x03, 0xc2, 0x09, 0x77, 0xf2, 0x0a, 0xed, 0x58, 0x10, 0x6b, 0x6d, 0x9d, 0x10, 0x85, 0xb4, 0x47, 0x5f, 0x75, 0xb5, 0x46, 0x9c, 0x5f, 0x42, 0x6c, 0xb2, 0x7e, 0xc6, 0xd8, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_633_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_633_sig[] = { 0x66, 0x95, 0x8b, 0xe3, 0x37, 0x94, 0x05, 0x82, 0x6a, 0x00, 0xda, 0xf5, 0x49, 0x5b, 0x16, 0x57, 0x69, 0x81, 0x26, 0xa5, 0xff, 0x44, 0x9f, 0x96, 0x49, 0xaf, 0x26, 0xca, 0x96, 0xdf, 0x96, 0x67, 0x9b, 0x41, 0x00, 0x81, 0x6e, 0x27, 0x41, 0xf8, 0x6c, 0x5c, 0x0b, 0x0d, 0xcf, 0x82, 0xe5, 0x79, 0xf4, 0x28, 0x1d, 0x2b, 0x8e, 0x70, 0xc2, 0x34, 0x80, 0x8d, 0x84, 0xc1, 0xa4, 0x95, 0x07, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_633 = { .name = "ecdsa_brainpoolp256r1_sha256_633", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_633_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_633_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_633_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP256t1, tcId is 209 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 634 for ECDSA, tcId is 210 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_634_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x16, 0xea, 0x8e, 0x03, 0xc2, 0x09, 0x77, 0xf2, 0x0a, 0xed, 0x58, 0x10, 0x6b, 0x6d, 0x9d, 0x10, 0x85, 0xb4, 0x47, 0x5f, 0x75, 0xb5, 0x46, 0x9c, 0x5f, 0x42, 0x6c, 0xb2, 0x7e, 0xc6, 0xd8, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_634_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_634_sig[] = { 0x53, 0xed, 0x0f, 0x4b, 0x8f, 0xb3, 0x3e, 0xf2, 0x77, 0xcd, 0xd1, 0x06, 0x04, 0x35, 0xed, 0x3d, 0xec, 0x51, 0x8a, 0x22, 0x56, 0x59, 0xf7, 0x1f, 0x67, 0xf9, 0xa1, 0xf0, 0x7f, 0x85, 0xc1, 0xca, 0x12, 0x4d, 0x5f, 0x94, 0xdd, 0xf1, 0x2b, 0xb4, 0xcb, 0xe3, 0xc5, 0xce, 0xa6, 0xd2, 0x68, 0x6d, 0x44, 0x80, 0xda, 0xbb, 0x8f, 0xfb, 0xb0, 0x5e, 0x52, 0x38, 0xc8, 0x77, 0xfe, 0x20, 0x38, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_634 = { .name = "ecdsa_brainpoolp256r1_sha256_634", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_634_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_634_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_634_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP256t1, tcId is 210 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 635 for ECDSA, tcId is 211 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_635_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x16, 0xea, 0x8e, 0x03, 0xc2, 0x09, 0x77, 0xf2, 0x0a, 0xed, 0x58, 0x10, 0x6b, 0x6d, 0x9d, 0x10, 0x85, 0xb4, 0x47, 0x5f, 0x75, 0xb5, 0x46, 0x9c, 0x5f, 0x42, 0x6c, 0xb2, 0x7e, 0xc6, 0xd8, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_635_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_635_sig[] = { 0x46, 0x64, 0x3c, 0x7f, 0xe0, 0xf3, 0x08, 0xb8, 0xaf, 0x4c, 0xe2, 0x97, 0x8d, 0x79, 0x7e, 0x8c, 0x46, 0xa7, 0xe1, 0xf8, 0xbf, 0xee, 0x0b, 0x5c, 0xdb, 0xae, 0xcd, 0xe1, 0xf5, 0x9b, 0xe4, 0x1d, 0x1b, 0xd1, 0x1a, 0x81, 0x4d, 0x1f, 0xbd, 0x9a, 0xe9, 0x7a, 0x49, 0xdf, 0x99, 0xbe, 0xca, 0x7f, 0xec, 0x25, 0x12, 0x56, 0x3c, 0x00, 0x31, 0xc5, 0xaa, 0xd5, 0xb9, 0xfc, 0x2f, 0xb0, 0xa5, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_635 = { .name = "ecdsa_brainpoolp256r1_sha256_635", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_635_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_635_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_635_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP256t1, tcId is 211 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 636 for ECDSA, tcId is 212 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_636_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x93, 0x10, 0xc9, 0xd7, 0xdf, 0xe5, 0x31, 0xca, 0x33, 0x78, 0xb2, 0x80, 0x32, 0x15, 0xf0, 0x61, 0xe8, 0x87, 0xae, 0xc4, 0x5f, 0x70, 0xd9, 0x8b, 0xc0, 0xd0, 0xdb, 0x6a, 0xa0, 0xa7, 0x7b, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_636_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_636_sig[] = { 0x4f, 0x83, 0x3b, 0xec, 0x9c, 0x80, 0x18, 0x5b, 0xea, 0xcb, 0xb7, 0x3b, 0x5f, 0x98, 0x4e, 0x2c, 0x03, 0xd9, 0x22, 0x35, 0x9b, 0xe7, 0x46, 0x8c, 0xe3, 0x75, 0x84, 0xf5, 0x3d, 0x1a, 0xea, 0x4a, 0x66, 0x36, 0x74, 0x4a, 0xb7, 0xfe, 0xca, 0xa5, 0x35, 0x41, 0xbc, 0xf5, 0xf3, 0x7c, 0x6c, 0xbe, 0x82, 0x8a, 0x8e, 0xfb, 0xc4, 0xd0, 0x0f, 0x64, 0x69, 0xba, 0x39, 0x0a, 0x86, 0x70, 0x8a, 0x26, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_636 = { .name = "ecdsa_brainpoolp256r1_sha256_636", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_636_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_636_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_636_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP256t1, tcId is 212 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 637 for ECDSA, tcId is 213 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_637_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x93, 0x10, 0xc9, 0xd7, 0xdf, 0xe5, 0x31, 0xca, 0x33, 0x78, 0xb2, 0x80, 0x32, 0x15, 0xf0, 0x61, 0xe8, 0x87, 0xae, 0xc4, 0x5f, 0x70, 0xd9, 0x8b, 0xc0, 0xd0, 0xdb, 0x6a, 0xa0, 0xa7, 0x7b, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_637_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_637_sig[] = { 0xa2, 0x86, 0x9d, 0xa4, 0x16, 0x52, 0x3a, 0xad, 0x2b, 0x8f, 0xa8, 0xaa, 0xd5, 0xc3, 0xb3, 0x1c, 0x5a, 0x53, 0x5f, 0xdd, 0x41, 0x3b, 0x71, 0xaf, 0x4d, 0xff, 0xb9, 0x0c, 0x6f, 0x96, 0xa6, 0x69, 0x29, 0xff, 0x3e, 0x8d, 0x49, 0x9c, 0xab, 0xc3, 0xcc, 0x4c, 0xcc, 0xd0, 0xfa, 0x81, 0x1c, 0xc3, 0xb0, 0x47, 0x70, 0xaa, 0x71, 0xf0, 0xd0, 0x52, 0x18, 0x52, 0x10, 0xb1, 0x4d, 0x31, 0x99, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_637 = { .name = "ecdsa_brainpoolp256r1_sha256_637", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_637_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_637_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_637_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP256t1, tcId is 213 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 638 for ECDSA, tcId is 214 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_638_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x93, 0x10, 0xc9, 0xd7, 0xdf, 0xe5, 0x31, 0xca, 0x33, 0x78, 0xb2, 0x80, 0x32, 0x15, 0xf0, 0x61, 0xe8, 0x87, 0xae, 0xc4, 0x5f, 0x70, 0xd9, 0x8b, 0xc0, 0xd0, 0xdb, 0x6a, 0xa0, 0xa7, 0x7b, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_638_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_638_sig[] = { 0x63, 0xdb, 0xfe, 0x29, 0x24, 0x9a, 0x50, 0x6b, 0x89, 0xfb, 0xd2, 0xcb, 0x1f, 0xaf, 0xc2, 0x54, 0xa9, 0x58, 0x2d, 0xfc, 0x4b, 0x08, 0xd1, 0x43, 0xb6, 0xd2, 0x5b, 0xf2, 0xab, 0x49, 0xd5, 0x5e, 0x44, 0xca, 0xd8, 0x0c, 0x00, 0x46, 0x09, 0x05, 0xe1, 0x03, 0xf2, 0x6d, 0xa8, 0x4c, 0xef, 0xd7, 0x1a, 0xf4, 0xbc, 0x7a, 0x71, 0x96, 0x2a, 0x3b, 0xce, 0x32, 0x1b, 0xc3, 0xb5, 0x84, 0x27, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_638 = { .name = "ecdsa_brainpoolp256r1_sha256_638", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_638_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_638_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_638_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP256t1, tcId is 214 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 639 for ECDSA, tcId is 215 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_639_pubkey[] = { 0x6d, 0x49, 0x9b, 0x07, 0x7a, 0xb6, 0xd7, 0x7b, 0x24, 0x43, 0x20, 0xa2, 0xca, 0xca, 0xb9, 0x1a, 0x76, 0x45, 0x95, 0xdd, 0x67, 0xa7, 0xa8, 0xdf, 0xcf, 0x84, 0xda, 0x7d, 0x38, 0xb2, 0xd8, 0xf4, 0x59, 0x94, 0xc0, 0x7b, 0x83, 0x3f, 0xf4, 0x90, 0x9c, 0x1a, 0x92, 0xcc, 0x9f, 0x24, 0xde, 0xa8, 0x8b, 0xe8, 0x60, 0x3b, 0x40, 0x7b, 0x00, 0xd2, 0x28, 0xfa, 0xf2, 0x15, 0x8d, 0xb2, 0x35, 0x4f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_639_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_639_sig[] = { 0x9d, 0x90, 0x7c, 0xf8, 0x8e, 0x10, 0xd6, 0x0c, 0x3f, 0x23, 0x89, 0x24, 0x98, 0xfe, 0x43, 0xdd, 0xb0, 0x2f, 0x82, 0x4f, 0xb1, 0x8e, 0x6b, 0xe3, 0x13, 0xe0, 0x2d, 0x94, 0xf2, 0xc8, 0xe0, 0x90, 0x0c, 0x16, 0xb9, 0xe0, 0xdb, 0x4d, 0xc8, 0x60, 0x6c, 0x02, 0x3b, 0x00, 0x1f, 0x69, 0xb3, 0xc8, 0x86, 0x08, 0x07, 0x94, 0xfc, 0x9d, 0x7f, 0xe3, 0x1b, 0x00, 0xc1, 0xcf, 0x09, 0x35, 0xe4, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_639 = { .name = "ecdsa_brainpoolp256r1_sha256_639", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_639_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_639_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_639_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 215 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 640 for ECDSA, tcId is 216 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_640_pubkey[] = { 0x6d, 0x49, 0x9b, 0x07, 0x7a, 0xb6, 0xd7, 0x7b, 0x24, 0x43, 0x20, 0xa2, 0xca, 0xca, 0xb9, 0x1a, 0x76, 0x45, 0x95, 0xdd, 0x67, 0xa7, 0xa8, 0xdf, 0xcf, 0x84, 0xda, 0x7d, 0x38, 0xb2, 0xd8, 0xf4, 0x59, 0x94, 0xc0, 0x7b, 0x83, 0x3f, 0xf4, 0x90, 0x9c, 0x1a, 0x92, 0xcc, 0x9f, 0x24, 0xde, 0xa8, 0x8b, 0xe8, 0x60, 0x3b, 0x40, 0x7b, 0x00, 0xd2, 0x28, 0xfa, 0xf2, 0x15, 0x8d, 0xb2, 0x35, 0x4f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_640_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_640_sig[] = { 0x73, 0x95, 0xce, 0x0e, 0xf6, 0x52, 0x84, 0x8a, 0x86, 0xb6, 0x10, 0x97, 0xcc, 0x95, 0x43, 0x99, 0x8d, 0x39, 0xda, 0xe8, 0x8a, 0x1f, 0xc9, 0xe4, 0xdf, 0xdd, 0x69, 0x64, 0x29, 0x49, 0x54, 0x89, 0x7d, 0xe2, 0x9e, 0x25, 0x6e, 0x82, 0x02, 0x38, 0x2f, 0x91, 0xc1, 0x16, 0xa6, 0x67, 0xa8, 0xb9, 0x46, 0xf2, 0x10, 0x44, 0x7a, 0x57, 0x36, 0x9b, 0xa6, 0x1a, 0xe4, 0xfa, 0xe7, 0x3d, 0xd1, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_640 = { .name = "ecdsa_brainpoolp256r1_sha256_640", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_640_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_640_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_640_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 216 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 641 for ECDSA, tcId is 217 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_641_pubkey[] = { 0x6d, 0x49, 0x9b, 0x07, 0x7a, 0xb6, 0xd7, 0x7b, 0x24, 0x43, 0x20, 0xa2, 0xca, 0xca, 0xb9, 0x1a, 0x76, 0x45, 0x95, 0xdd, 0x67, 0xa7, 0xa8, 0xdf, 0xcf, 0x84, 0xda, 0x7d, 0x38, 0xb2, 0xd8, 0xf4, 0x59, 0x94, 0xc0, 0x7b, 0x83, 0x3f, 0xf4, 0x90, 0x9c, 0x1a, 0x92, 0xcc, 0x9f, 0x24, 0xde, 0xa8, 0x8b, 0xe8, 0x60, 0x3b, 0x40, 0x7b, 0x00, 0xd2, 0x28, 0xfa, 0xf2, 0x15, 0x8d, 0xb2, 0x35, 0x4f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_641_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_641_sig[] = { 0x7b, 0xaf, 0x1f, 0xde, 0x87, 0xcc, 0xb1, 0xbe, 0xa0, 0xf8, 0x93, 0xb3, 0xbf, 0xb2, 0x54, 0x9c, 0x04, 0xbc, 0xa1, 0x88, 0x35, 0xd8, 0xeb, 0x5a, 0x31, 0xb8, 0xd2, 0x05, 0x06, 0xff, 0x88, 0xc3, 0x28, 0x9e, 0xbe, 0x82, 0x9f, 0xef, 0xb9, 0xad, 0x00, 0x9d, 0x7c, 0xdd, 0x62, 0x28, 0x74, 0xae, 0xf5, 0xfa, 0x08, 0x8f, 0x05, 0x08, 0xa4, 0xb4, 0x3d, 0x58, 0x95, 0xd6, 0x16, 0x45, 0xce, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_641 = { .name = "ecdsa_brainpoolp256r1_sha256_641", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_641_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_641_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_641_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 217 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 642 for ECDSA, tcId is 218 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_642_pubkey[] = { 0x08, 0xc2, 0xf9, 0x5f, 0xfe, 0xdd, 0xe1, 0xd5, 0x5e, 0x3f, 0x2c, 0x9d, 0xcf, 0x58, 0x84, 0x34, 0x7f, 0x69, 0x04, 0xc6, 0x49, 0x22, 0x73, 0xad, 0x76, 0x0e, 0xb7, 0xb9, 0xb3, 0x5f, 0x03, 0x6b, 0x2b, 0xcf, 0x7a, 0x04, 0x8c, 0xaa, 0x2c, 0x72, 0x6a, 0xe8, 0x80, 0x8d, 0xc9, 0x53, 0x12, 0xeb, 0x23, 0x50, 0x27, 0x5a, 0x8f, 0x4f, 0xbe, 0xea, 0x7c, 0x0f, 0x32, 0xf3, 0x83, 0x9c, 0x7b, 0x93, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_642_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_642_sig[] = { 0x33, 0xe3, 0x7c, 0x3b, 0x66, 0xac, 0xab, 0xee, 0x3d, 0x68, 0xcb, 0xbb, 0x9c, 0x55, 0xcd, 0x52, 0xb5, 0x86, 0xde, 0x51, 0x64, 0x77, 0x23, 0xfa, 0x84, 0xe5, 0x32, 0xa3, 0xec, 0x59, 0x53, 0xef, 0x3b, 0x8a, 0x9e, 0xe7, 0x07, 0xd1, 0xbc, 0x5f, 0x83, 0xe1, 0x7e, 0xa0, 0x72, 0xad, 0xc2, 0xec, 0xda, 0x92, 0xe6, 0x37, 0xd7, 0xc0, 0x60, 0x60, 0xf1, 0xaf, 0x79, 0xb9, 0x29, 0xa8, 0x50, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_642 = { .name = "ecdsa_brainpoolp256r1_sha256_642", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_642_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_642_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_642_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP256t1, tcId is 218 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 643 for ECDSA, tcId is 219 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_643_pubkey[] = { 0x08, 0xc2, 0xf9, 0x5f, 0xfe, 0xdd, 0xe1, 0xd5, 0x5e, 0x3f, 0x2c, 0x9d, 0xcf, 0x58, 0x84, 0x34, 0x7f, 0x69, 0x04, 0xc6, 0x49, 0x22, 0x73, 0xad, 0x76, 0x0e, 0xb7, 0xb9, 0xb3, 0x5f, 0x03, 0x6b, 0x2b, 0xcf, 0x7a, 0x04, 0x8c, 0xaa, 0x2c, 0x72, 0x6a, 0xe8, 0x80, 0x8d, 0xc9, 0x53, 0x12, 0xeb, 0x23, 0x50, 0x27, 0x5a, 0x8f, 0x4f, 0xbe, 0xea, 0x7c, 0x0f, 0x32, 0xf3, 0x83, 0x9c, 0x7b, 0x93, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_643_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_643_sig[] = { 0x1f, 0x8e, 0xbd, 0xc9, 0x4e, 0xcd, 0xdd, 0x84, 0xf9, 0x09, 0x60, 0xcc, 0x55, 0xd0, 0xca, 0x02, 0xe3, 0x3d, 0x70, 0x53, 0x5f, 0xc1, 0xc7, 0x32, 0x2b, 0x3c, 0x27, 0x83, 0xb9, 0xdc, 0x92, 0x38, 0x20, 0x5a, 0xa8, 0x62, 0x6c, 0x3a, 0x5d, 0xa2, 0x14, 0xe5, 0x48, 0x5b, 0x11, 0x15, 0x4a, 0x37, 0x8d, 0x70, 0xb0, 0xd3, 0x32, 0x3a, 0xb8, 0x68, 0x52, 0x8a, 0xe8, 0x04, 0x8d, 0x17, 0xb6, 0x96, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_643 = { .name = "ecdsa_brainpoolp256r1_sha256_643", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_643_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_643_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_643_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP256t1, tcId is 219 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 644 for ECDSA, tcId is 220 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_644_pubkey[] = { 0x08, 0xc2, 0xf9, 0x5f, 0xfe, 0xdd, 0xe1, 0xd5, 0x5e, 0x3f, 0x2c, 0x9d, 0xcf, 0x58, 0x84, 0x34, 0x7f, 0x69, 0x04, 0xc6, 0x49, 0x22, 0x73, 0xad, 0x76, 0x0e, 0xb7, 0xb9, 0xb3, 0x5f, 0x03, 0x6b, 0x2b, 0xcf, 0x7a, 0x04, 0x8c, 0xaa, 0x2c, 0x72, 0x6a, 0xe8, 0x80, 0x8d, 0xc9, 0x53, 0x12, 0xeb, 0x23, 0x50, 0x27, 0x5a, 0x8f, 0x4f, 0xbe, 0xea, 0x7c, 0x0f, 0x32, 0xf3, 0x83, 0x9c, 0x7b, 0x93, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_644_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_644_sig[] = { 0x6b, 0x0d, 0x70, 0xe0, 0x9b, 0xa1, 0x64, 0x2a, 0xda, 0xc0, 0x6d, 0xff, 0x9b, 0x52, 0xe2, 0x2a, 0x3e, 0x4a, 0xab, 0x41, 0x80, 0xe3, 0x72, 0x66, 0x56, 0x91, 0x41, 0x22, 0x41, 0xe7, 0x43, 0xa0, 0x4d, 0x7d, 0x30, 0xff, 0x8a, 0x21, 0x0d, 0xe6, 0x9e, 0x3e, 0x6d, 0x1e, 0xcf, 0x71, 0x75, 0xf8, 0x9f, 0x48, 0x1a, 0x4d, 0x9e, 0xd0, 0x6b, 0xea, 0xf7, 0x14, 0x8d, 0xa4, 0x7f, 0x4a, 0xf9, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_644 = { .name = "ecdsa_brainpoolp256r1_sha256_644", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_644_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_644_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_644_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP256t1, tcId is 220 in file ecdsa_brainpoolP256r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 645 for ECDSA, tcId is 1 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_645_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_645_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_645_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x42, 0x6e, 0x85, 0x7a, 0xad, 0x3f, 0xf7, 0xaa, 0x96, 0xe4, 0xd2, 0x00, 0xc0, 0x3b, 0x45, 0xf1, 0x84, 0x6a, 0x36, 0xd0, 0x89, 0xee, 0x39, 0x17, 0x76, 0x8c, 0xa1, 0xa0, 0xd6, 0xd4, 0xda, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_645 = { .name = "ecdsa_brainpoolp256r1_sha256_645", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_645_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_645_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_645_sig, .siglen = 64, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 646 for ECDSA, tcId is 2 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_646_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_646_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_646_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_646 = { .name = "ecdsa_brainpoolp256r1_sha256_646", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_646_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_646_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_646_sig, .siglen = 64, .result = 1, .comment = "valid, tcId is 2 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 647 for ECDSA, tcId is 3 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_647_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_647_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_647_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_647 = { .name = "ecdsa_brainpoolp256r1_sha256_647", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_647_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_647_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_647_sig, .siglen = 64, .result = 0, .comment = "long form encoding of length of sequence, tcId is 3 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 648 for ECDSA, tcId is 4 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_648_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_648_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_648_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_648 = { .name = "ecdsa_brainpoolp256r1_sha256_648", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_648_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_648_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_648_sig, .siglen = 64, .result = 0, .comment = "length of sequence contains leading 0, tcId is 4 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 649 for ECDSA, tcId is 67 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_649_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_649_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_649_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_649 = { .name = "ecdsa_brainpoolp256r1_sha256_649", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_649_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_649_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_649_sig, .siglen = 64, .result = 0, .comment = "long form encoding of length of integer, tcId is 67 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 650 for ECDSA, tcId is 68 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_650_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_650_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_650_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_650 = { .name = "ecdsa_brainpoolp256r1_sha256_650", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_650_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_650_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_650_sig, .siglen = 64, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 651 for ECDSA, tcId is 69 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_651_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_651_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_651_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_651 = { .name = "ecdsa_brainpoolp256r1_sha256_651", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_651_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_651_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_651_sig, .siglen = 64, .result = 0, .comment = "length of integer contains leading 0, tcId is 69 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 652 for ECDSA, tcId is 70 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_652_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_652_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_652_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_652 = { .name = "ecdsa_brainpoolp256r1_sha256_652", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_652_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_652_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_652_sig, .siglen = 64, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 653 for ECDSA, tcId is 72 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_653_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_653_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_653_sig[] = { 0x00, 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_653 = { .name = "ecdsa_brainpoolp256r1_sha256_653", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_653_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_653_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_653_sig, .siglen = 64, .result = -1, .comment = "wrong length of integer, tcId is 72 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 654 for ECDSA, tcId is 92 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_654_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_654_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_654_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x00, 0x00, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_654 = { .name = "ecdsa_brainpoolp256r1_sha256_654", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_654_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_654_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_654_sig, .siglen = 66, .result = -1, .comment = "appending 0's to integer, tcId is 92 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 655 for ECDSA, tcId is 93 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_655_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_655_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_655_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_655 = { .name = "ecdsa_brainpoolp256r1_sha256_655", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_655_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_655_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_655_sig, .siglen = 66, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 656 for ECDSA, tcId is 94 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_656_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_656_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_656_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_656 = { .name = "ecdsa_brainpoolp256r1_sha256_656", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_656_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_656_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_656_sig, .siglen = 64, .result = 0, .comment = "prepending 0's to integer, tcId is 94 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 657 for ECDSA, tcId is 95 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_657_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_657_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_657_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_657 = { .name = "ecdsa_brainpoolp256r1_sha256_657", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_657_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_657_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_657_sig, .siglen = 64, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 658 for ECDSA, tcId is 97 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_658_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_658_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_658_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x05, 0x00, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_658 = { .name = "ecdsa_brainpoolp256r1_sha256_658", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_658_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_658_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_658_sig, .siglen = 66, .result = -1, .comment = "appending null value to integer, tcId is 97 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 659 for ECDSA, tcId is 98 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_659_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_659_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_659_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_659 = { .name = "ecdsa_brainpoolp256r1_sha256_659", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_659_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_659_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_659_sig, .siglen = 66, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 660 for ECDSA, tcId is 113 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_660_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_660_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_660_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_660 = { .name = "ecdsa_brainpoolp256r1_sha256_660", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_660_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_660_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_660_sig, .siglen = 64, .result = -1, .comment = "dropping value of integer, tcId is 113 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 661 for ECDSA, tcId is 114 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_661_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_661_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_661_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_661 = { .name = "ecdsa_brainpoolp256r1_sha256_661", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_661_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_661_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_661_sig, .siglen = 64, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 662 for ECDSA, tcId is 117 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_662_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_662_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_662_sig[] = { 0x08, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_662 = { .name = "ecdsa_brainpoolp256r1_sha256_662", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_662_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_662_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_662_sig, .siglen = 64, .result = -1, .comment = "modify first byte of integer, tcId is 117 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 663 for ECDSA, tcId is 118 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_663_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_663_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_663_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x65, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_663 = { .name = "ecdsa_brainpoolp256r1_sha256_663", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_663_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_663_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_663_sig, .siglen = 64, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 664 for ECDSA, tcId is 119 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_664_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_664_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_664_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x9f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_664 = { .name = "ecdsa_brainpoolp256r1_sha256_664", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_664_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_664_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_664_sig, .siglen = 64, .result = -1, .comment = "modify last byte of integer, tcId is 119 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 665 for ECDSA, tcId is 120 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_665_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_665_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_665_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_665 = { .name = "ecdsa_brainpoolp256r1_sha256_665", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_665_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_665_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_665_sig, .siglen = 64, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 666 for ECDSA, tcId is 121 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_666_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_666_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_666_sig[] = { 0x00, 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_666 = { .name = "ecdsa_brainpoolp256r1_sha256_666", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_666_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_666_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_666_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 121 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 667 for ECDSA, tcId is 122 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_667_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_667_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_667_sig[] = { 0x00, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_667 = { .name = "ecdsa_brainpoolp256r1_sha256_667", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_667_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_667_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_667_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 668 for ECDSA, tcId is 123 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_668_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_668_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_668_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x00, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_668 = { .name = "ecdsa_brainpoolp256r1_sha256_668", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_668_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_668_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_668_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 669 for ECDSA, tcId is 124 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_669_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_669_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_669_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x00, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_669 = { .name = "ecdsa_brainpoolp256r1_sha256_669", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_669_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_669_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_669_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 670 for ECDSA, tcId is 125 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_670_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_670_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_670_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_670 = { .name = "ecdsa_brainpoolp256r1_sha256_670", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_670_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_670_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_670_sig, .siglen = 64, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 671 for ECDSA, tcId is 126 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_671_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_671_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_671_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_671 = { .name = "ecdsa_brainpoolp256r1_sha256_671", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_671_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_671_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_671_sig, .siglen = 64, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_brainpoolP256r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 672 for ECDSA, tcId is 129 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_672_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_672_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_672_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_672 = { .name = "ecdsa_brainpoolp256r1_sha256_672", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_672_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_672_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_672_sig, .siglen = 64, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 673 for ECDSA, tcId is 130 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_673_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_673_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_673_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_673 = { .name = "ecdsa_brainpoolp256r1_sha256_673", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_673_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_673_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_673_sig, .siglen = 64, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 674 for ECDSA, tcId is 131 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_674_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_674_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_674_sig[] = { 0xb4, 0x5a, 0xe4, 0x4c, 0x5c, 0x1b, 0xb1, 0xff, 0x14, 0x37, 0x02, 0xd2, 0x8e, 0xe4, 0x3a, 0x86, 0xa5, 0x90, 0xe4, 0x4b, 0xca, 0xfd, 0xa5, 0x60, 0xb6, 0x52, 0xe5, 0xbf, 0xdd, 0xe5, 0x67, 0xc6, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_674 = { .name = "ecdsa_brainpoolp256r1_sha256_674", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_674_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_674_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_674_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 675 for ECDSA, tcId is 132 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_675_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_675_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_675_sig[] = { 0x60, 0x64, 0x34, 0x95, 0x18, 0x3e, 0x5e, 0x86, 0x97, 0x6a, 0xed, 0xb1, 0x53, 0xdd, 0x1f, 0xa3, 0x8d, 0x1d, 0xef, 0x04, 0x60, 0x3a, 0x57, 0x71, 0x96, 0x16, 0xc8, 0xba, 0xaf, 0x54, 0xba, 0x78, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_675 = { .name = "ecdsa_brainpoolp256r1_sha256_675", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_675_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_675_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_675_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 676 for ECDSA, tcId is 133 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_676_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_676_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_676_sig[] = { 0xf5, 0xa0, 0x73, 0x8f, 0x45, 0xd2, 0xf7, 0xbd, 0x2a, 0x2f, 0x07, 0xbe, 0x0e, 0x9f, 0x52, 0xea, 0xe6, 0xa8, 0x96, 0x57, 0xea, 0x64, 0x01, 0x96, 0xd9, 0xcb, 0x28, 0xc2, 0xb9, 0x62, 0xee, 0xe1, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_676 = { .name = "ecdsa_brainpoolp256r1_sha256_676", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_676_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_676_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_676_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 677 for ECDSA, tcId is 134 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_677_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_677_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_677_sig[] = { 0x9f, 0x9b, 0xcb, 0x6a, 0xe7, 0xc1, 0xa1, 0x79, 0x68, 0x95, 0x12, 0x4e, 0xac, 0x22, 0xe0, 0x5c, 0x72, 0xe2, 0x10, 0xfb, 0x9f, 0xc5, 0xa8, 0x8e, 0x69, 0xe9, 0x37, 0x45, 0x50, 0xab, 0x45, 0x88, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_677 = { .name = "ecdsa_brainpoolp256r1_sha256_677", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_677_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_677_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_677_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 678 for ECDSA, tcId is 135 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_678_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_678_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_678_sig[] = { 0x4b, 0xa5, 0x1b, 0xb3, 0xa3, 0xe4, 0x4e, 0x00, 0xeb, 0xc8, 0xfd, 0x2d, 0x71, 0x1b, 0xc5, 0x79, 0x5a, 0x6f, 0x1b, 0xb4, 0x35, 0x02, 0x5a, 0x9f, 0x49, 0xad, 0x1a, 0x40, 0x22, 0x1a, 0x98, 0x3a, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_678 = { .name = "ecdsa_brainpoolp256r1_sha256_678", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_678_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_678_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_678_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 679 for ECDSA, tcId is 136 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_679_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_679_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_679_sig[] = { 0x01, 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_679 = { .name = "ecdsa_brainpoolp256r1_sha256_679", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_679_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_679_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_679_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 680 for ECDSA, tcId is 137 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_680_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_680_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_680_sig[] = { 0xf5, 0xa0, 0x73, 0x8f, 0x45, 0xd2, 0xf7, 0xbd, 0x2a, 0x2f, 0x07, 0xbe, 0x0e, 0x9f, 0x52, 0xea, 0xe6, 0xa8, 0x96, 0x57, 0xea, 0x64, 0x01, 0x96, 0xd9, 0xcb, 0x28, 0xc2, 0xb9, 0x62, 0xee, 0xe1, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_680 = { .name = "ecdsa_brainpoolp256r1_sha256_680", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_680_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_680_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_680_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 681 for ECDSA, tcId is 138 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_681_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_681_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_681_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x01, 0x11, 0x88, 0x2a, 0x3c, 0x96, 0x9d, 0x5b, 0xcd, 0xe5, 0xe7, 0x43, 0x20, 0x7a, 0xcb, 0xd4, 0xf1, 0x94, 0x08, 0xbe, 0x76, 0xe0, 0xd5, 0x14, 0xd7, 0xa9, 0xaf, 0x7b, 0x64, 0x57, 0xbb, 0xd2, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_681 = { .name = "ecdsa_brainpoolp256r1_sha256_681", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_681_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_681_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_681_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 682 for ECDSA, tcId is 139 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_682_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_682_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_682_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0xbd, 0x91, 0x7a, 0x85, 0x52, 0xc0, 0x08, 0x55, 0x69, 0x1b, 0x2d, 0xff, 0x3f, 0xc4, 0xba, 0x0e, 0x7b, 0x95, 0xc9, 0x2f, 0x76, 0x11, 0xc6, 0xe8, 0x89, 0x73, 0x5e, 0x5f, 0x29, 0x2b, 0x25, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_682 = { .name = "ecdsa_brainpoolp256r1_sha256_682", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_682_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_682_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_682_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 683 for ECDSA, tcId is 140 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_683_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_683_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_683_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x98, 0x73, 0x2d, 0x9f, 0x0b, 0x51, 0x4d, 0xee, 0x58, 0x7e, 0xc7, 0x70, 0x22, 0xb7, 0xb8, 0x7f, 0xf8, 0x30, 0xbc, 0x2c, 0xd4, 0x8c, 0x92, 0x1f, 0xe6, 0x6e, 0x93, 0x1e, 0x3f, 0x8c, 0x83, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_683 = { .name = "ecdsa_brainpoolp256r1_sha256_683", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_683_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_683_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_683_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 684 for ECDSA, tcId is 141 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_684_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_684_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_684_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0xfe, 0xee, 0x77, 0xd5, 0xc3, 0x69, 0x62, 0xa4, 0x32, 0x1a, 0x18, 0xbc, 0xdf, 0x85, 0x34, 0x2b, 0x0e, 0x6b, 0xf7, 0x41, 0x89, 0x1f, 0x2a, 0xeb, 0x28, 0x56, 0x50, 0x84, 0x9b, 0xa8, 0x44, 0x2d, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_684 = { .name = "ecdsa_brainpoolp256r1_sha256_684", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_684_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_684_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_684_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 685 for ECDSA, tcId is 142 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_685_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_685_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_685_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x01, 0x67, 0x8c, 0xd2, 0x60, 0xf4, 0xae, 0xb2, 0x11, 0xa7, 0x81, 0x38, 0x8f, 0xdd, 0x48, 0x47, 0x80, 0x07, 0xcf, 0x43, 0xd3, 0x2b, 0x73, 0x6d, 0xe0, 0x19, 0x91, 0x6c, 0xe1, 0xc0, 0x73, 0x7c, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_685 = { .name = "ecdsa_brainpoolp256r1_sha256_685", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_685_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_685_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_685_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 686 for ECDSA, tcId is 143 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_686_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_686_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_686_sig[] = { 0x0a, 0x5f, 0x8c, 0x70, 0xba, 0x2d, 0x08, 0x42, 0xd5, 0xd0, 0xf8, 0x41, 0xf1, 0x60, 0xad, 0x15, 0x19, 0x57, 0x69, 0xa8, 0x15, 0x9b, 0xfe, 0x69, 0x26, 0x34, 0xd7, 0x3d, 0x46, 0x9d, 0x11, 0x1f, 0x98, 0x73, 0x2d, 0x9f, 0x0b, 0x51, 0x4d, 0xee, 0x58, 0x7e, 0xc7, 0x70, 0x22, 0xb7, 0xb8, 0x7f, 0xf8, 0x30, 0xbc, 0x2c, 0xd4, 0x8c, 0x92, 0x1f, 0xe6, 0x6e, 0x93, 0x1e, 0x3f, 0x8c, 0x83, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_686 = { .name = "ecdsa_brainpoolp256r1_sha256_686", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_686_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_686_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_686_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 687 for ECDSA, tcId is 144 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_687_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_687_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_687_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_687 = { .name = "ecdsa_brainpoolp256r1_sha256_687", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_687_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_687_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_687_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 688 for ECDSA, tcId is 145 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_688_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_688_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_688_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_688 = { .name = "ecdsa_brainpoolp256r1_sha256_688", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_688_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_688_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_688_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 689 for ECDSA, tcId is 146 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_689_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_689_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_689_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_689 = { .name = "ecdsa_brainpoolp256r1_sha256_689", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_689_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_689_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_689_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 690 for ECDSA, tcId is 147 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_690_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_690_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_690_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_690 = { .name = "ecdsa_brainpoolp256r1_sha256_690", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_690_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_690_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_690_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 691 for ECDSA, tcId is 148 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_691_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_691_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_691_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_691 = { .name = "ecdsa_brainpoolp256r1_sha256_691", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_691_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_691_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_691_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 692 for ECDSA, tcId is 149 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_692_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_692_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_692_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_692 = { .name = "ecdsa_brainpoolp256r1_sha256_692", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_692_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_692_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_692_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 693 for ECDSA, tcId is 150 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_693_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_693_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_693_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_693 = { .name = "ecdsa_brainpoolp256r1_sha256_693", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_693_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_693_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_693_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 694 for ECDSA, tcId is 151 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_694_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_694_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_694_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_694 = { .name = "ecdsa_brainpoolp256r1_sha256_694", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_694_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_694_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_694_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 695 for ECDSA, tcId is 154 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_695_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_695_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_695_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_695 = { .name = "ecdsa_brainpoolp256r1_sha256_695", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_695_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_695_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_695_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 696 for ECDSA, tcId is 155 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_696_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_696_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_696_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_696 = { .name = "ecdsa_brainpoolp256r1_sha256_696", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_696_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_696_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_696_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 697 for ECDSA, tcId is 156 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_697_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_697_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_697_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_697 = { .name = "ecdsa_brainpoolp256r1_sha256_697", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_697_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_697_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_697_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 698 for ECDSA, tcId is 157 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_698_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_698_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_698_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_698 = { .name = "ecdsa_brainpoolp256r1_sha256_698", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_698_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_698_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_698_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 699 for ECDSA, tcId is 158 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_699_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_699_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_699_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_699 = { .name = "ecdsa_brainpoolp256r1_sha256_699", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_699_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_699_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_699_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 700 for ECDSA, tcId is 159 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_700_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_700_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_700_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_700 = { .name = "ecdsa_brainpoolp256r1_sha256_700", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_700_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_700_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_700_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 701 for ECDSA, tcId is 160 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_701_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_701_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_701_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_701 = { .name = "ecdsa_brainpoolp256r1_sha256_701", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_701_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_701_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_701_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 702 for ECDSA, tcId is 161 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_702_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_702_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_702_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_702 = { .name = "ecdsa_brainpoolp256r1_sha256_702", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_702_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_702_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_702_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 703 for ECDSA, tcId is 164 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_703_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_703_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_703_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_703 = { .name = "ecdsa_brainpoolp256r1_sha256_703", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_703_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_703_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_703_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 704 for ECDSA, tcId is 165 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_704_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_704_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_704_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_704 = { .name = "ecdsa_brainpoolp256r1_sha256_704", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_704_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_704_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_704_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 705 for ECDSA, tcId is 166 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_705_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_705_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_705_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_705 = { .name = "ecdsa_brainpoolp256r1_sha256_705", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_705_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_705_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_705_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 706 for ECDSA, tcId is 167 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_706_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_706_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_706_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_706 = { .name = "ecdsa_brainpoolp256r1_sha256_706", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_706_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_706_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_706_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 707 for ECDSA, tcId is 168 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_707_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_707_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_707_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_707 = { .name = "ecdsa_brainpoolp256r1_sha256_707", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_707_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_707_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_707_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 708 for ECDSA, tcId is 169 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_708_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_708_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_708_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_708 = { .name = "ecdsa_brainpoolp256r1_sha256_708", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_708_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_708_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_708_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 709 for ECDSA, tcId is 170 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_709_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_709_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_709_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_709 = { .name = "ecdsa_brainpoolp256r1_sha256_709", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_709_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_709_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_709_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 710 for ECDSA, tcId is 171 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_710_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_710_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_710_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_710 = { .name = "ecdsa_brainpoolp256r1_sha256_710", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_710_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_710_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_710_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 711 for ECDSA, tcId is 174 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_711_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_711_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_711_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_711 = { .name = "ecdsa_brainpoolp256r1_sha256_711", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_711_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_711_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_711_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 712 for ECDSA, tcId is 175 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_712_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_712_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_712_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_712 = { .name = "ecdsa_brainpoolp256r1_sha256_712", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_712_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_712_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_712_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 713 for ECDSA, tcId is 176 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_713_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_713_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_713_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_713 = { .name = "ecdsa_brainpoolp256r1_sha256_713", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_713_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_713_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_713_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 714 for ECDSA, tcId is 177 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_714_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_714_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_714_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_714 = { .name = "ecdsa_brainpoolp256r1_sha256_714", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_714_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_714_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_714_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 715 for ECDSA, tcId is 178 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_715_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_715_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_715_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_715 = { .name = "ecdsa_brainpoolp256r1_sha256_715", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_715_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_715_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_715_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 716 for ECDSA, tcId is 179 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_716_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_716_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_716_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_716 = { .name = "ecdsa_brainpoolp256r1_sha256_716", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_716_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_716_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_716_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 717 for ECDSA, tcId is 180 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_717_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_717_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_717_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_717 = { .name = "ecdsa_brainpoolp256r1_sha256_717", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_717_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_717_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_717_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 718 for ECDSA, tcId is 181 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_718_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_718_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_718_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_718 = { .name = "ecdsa_brainpoolp256r1_sha256_718", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_718_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_718_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_718_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 719 for ECDSA, tcId is 184 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_719_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_719_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_719_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_719 = { .name = "ecdsa_brainpoolp256r1_sha256_719", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_719_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_719_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_719_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 720 for ECDSA, tcId is 185 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_720_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_720_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_720_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_720 = { .name = "ecdsa_brainpoolp256r1_sha256_720", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_720_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_720_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_720_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 721 for ECDSA, tcId is 186 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_721_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_721_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_721_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_721 = { .name = "ecdsa_brainpoolp256r1_sha256_721", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_721_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_721_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_721_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 722 for ECDSA, tcId is 187 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_722_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_722_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_722_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_722 = { .name = "ecdsa_brainpoolp256r1_sha256_722", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_722_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_722_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_722_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 723 for ECDSA, tcId is 188 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_723_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_723_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_723_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_723 = { .name = "ecdsa_brainpoolp256r1_sha256_723", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_723_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_723_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_723_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 724 for ECDSA, tcId is 189 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_724_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_724_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_724_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_724 = { .name = "ecdsa_brainpoolp256r1_sha256_724", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_724_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_724_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_724_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 725 for ECDSA, tcId is 190 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_725_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_725_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_725_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_725 = { .name = "ecdsa_brainpoolp256r1_sha256_725", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_725_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_725_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_725_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 726 for ECDSA, tcId is 191 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_726_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_726_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_726_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_726 = { .name = "ecdsa_brainpoolp256r1_sha256_726", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_726_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_726_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_726_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 727 for ECDSA, tcId is 194 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_727_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_727_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_727_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_727 = { .name = "ecdsa_brainpoolp256r1_sha256_727", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_727_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_727_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_727_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 728 for ECDSA, tcId is 195 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_728_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_728_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_728_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_728 = { .name = "ecdsa_brainpoolp256r1_sha256_728", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_728_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_728_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_728_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 729 for ECDSA, tcId is 196 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_729_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_729_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_729_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_729 = { .name = "ecdsa_brainpoolp256r1_sha256_729", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_729_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_729_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_729_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 730 for ECDSA, tcId is 197 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_730_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_730_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_730_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_730 = { .name = "ecdsa_brainpoolp256r1_sha256_730", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_730_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_730_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_730_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 731 for ECDSA, tcId is 198 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_731_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_731_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_731_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_731 = { .name = "ecdsa_brainpoolp256r1_sha256_731", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_731_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_731_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_731_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 732 for ECDSA, tcId is 199 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_732_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_732_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_732_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_732 = { .name = "ecdsa_brainpoolp256r1_sha256_732", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_732_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_732_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_732_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 733 for ECDSA, tcId is 200 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_733_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_733_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_733_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_733 = { .name = "ecdsa_brainpoolp256r1_sha256_733", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_733_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_733_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_733_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 734 for ECDSA, tcId is 201 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_734_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_734_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_734_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_734 = { .name = "ecdsa_brainpoolp256r1_sha256_734", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_734_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_734_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_734_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 735 for ECDSA, tcId is 204 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_735_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_735_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_735_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_735 = { .name = "ecdsa_brainpoolp256r1_sha256_735", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_735_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_735_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_735_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 736 for ECDSA, tcId is 205 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_736_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_736_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_736_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_736 = { .name = "ecdsa_brainpoolp256r1_sha256_736", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_736_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_736_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_736_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 737 for ECDSA, tcId is 206 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_737_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_737_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_737_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_737 = { .name = "ecdsa_brainpoolp256r1_sha256_737", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_737_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_737_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_737_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 738 for ECDSA, tcId is 207 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_738_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_738_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_738_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_738 = { .name = "ecdsa_brainpoolp256r1_sha256_738", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_738_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_738_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_738_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 739 for ECDSA, tcId is 208 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_739_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_739_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_739_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_739 = { .name = "ecdsa_brainpoolp256r1_sha256_739", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_739_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_739_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_739_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 740 for ECDSA, tcId is 209 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_740_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_740_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_740_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_740 = { .name = "ecdsa_brainpoolp256r1_sha256_740", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_740_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_740_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_740_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 741 for ECDSA, tcId is 210 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_741_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_741_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_741_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_741 = { .name = "ecdsa_brainpoolp256r1_sha256_741", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_741_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_741_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_741_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 742 for ECDSA, tcId is 211 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_742_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_742_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_742_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_742 = { .name = "ecdsa_brainpoolp256r1_sha256_742", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_742_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_742_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_742_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 743 for ECDSA, tcId is 214 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_743_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_743_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_743_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_743 = { .name = "ecdsa_brainpoolp256r1_sha256_743", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_743_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_743_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_743_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 744 for ECDSA, tcId is 215 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_744_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_744_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_744_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_744 = { .name = "ecdsa_brainpoolp256r1_sha256_744", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_744_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_744_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_744_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 745 for ECDSA, tcId is 216 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_745_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_745_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_745_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_745 = { .name = "ecdsa_brainpoolp256r1_sha256_745", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_745_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_745_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_745_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 746 for ECDSA, tcId is 217 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_746_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_746_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_746_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_746 = { .name = "ecdsa_brainpoolp256r1_sha256_746", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_746_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_746_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_746_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 747 for ECDSA, tcId is 218 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_747_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_747_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_747_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_747 = { .name = "ecdsa_brainpoolp256r1_sha256_747", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_747_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_747_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_747_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 748 for ECDSA, tcId is 219 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_748_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_748_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_748_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_748 = { .name = "ecdsa_brainpoolp256r1_sha256_748", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_748_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_748_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_748_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 749 for ECDSA, tcId is 220 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_749_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_749_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_749_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_749 = { .name = "ecdsa_brainpoolp256r1_sha256_749", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_749_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_749_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_749_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 750 for ECDSA, tcId is 221 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_750_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_750_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_750_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_750 = { .name = "ecdsa_brainpoolp256r1_sha256_750", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_750_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_750_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_750_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 751 for ECDSA, tcId is 230 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_751_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_751_msg[] = { 0x36, 0x38, 0x39, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_751_sig[] = { 0x0c, 0x93, 0x9a, 0x92, 0x48, 0x6c, 0x6d, 0x0d, 0x61, 0x95, 0x10, 0xb4, 0xa9, 0x41, 0x62, 0xb9, 0x22, 0x1b, 0xe2, 0xeb, 0x15, 0xfa, 0xf8, 0x78, 0xbf, 0xf7, 0x5e, 0x6c, 0xdf, 0x4e, 0x37, 0x07, 0x39, 0x77, 0x61, 0x9b, 0x43, 0xe6, 0xb4, 0xea, 0x18, 0x70, 0xd8, 0x61, 0x20, 0x64, 0x83, 0xb3, 0x06, 0x56, 0x0e, 0x3c, 0x4a, 0x3e, 0xf8, 0x2b, 0x11, 0xa8, 0x02, 0xff, 0x88, 0x92, 0xdc, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_751 = { .name = "ecdsa_brainpoolp256r1_sha256_751", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_751_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_751_msg, .msglen = 5, .sig = ecdsa_brainpoolp256r1_sha256_751_sig, .siglen = 64, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 752 for ECDSA, tcId is 231 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_752_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_752_msg[] = { 0x34, 0x32, 0x36, 0x34, 0x37, 0x39, 0x37, 0x32, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_752_sig[] = { 0x55, 0x83, 0xdd, 0x48, 0x09, 0x64, 0xbd, 0x23, 0x32, 0x88, 0x5f, 0xbb, 0x50, 0xb7, 0x47, 0x5e, 0xbd, 0x42, 0x83, 0x99, 0xe7, 0x16, 0x6f, 0xd9, 0xbd, 0x52, 0x96, 0x11, 0x53, 0x4b, 0x9f, 0x34, 0x0e, 0xd0, 0x35, 0xa0, 0x2c, 0x4b, 0x66, 0x5c, 0xac, 0xb7, 0x0d, 0xe8, 0xe8, 0x22, 0xfa, 0xcd, 0x71, 0x64, 0x5a, 0x15, 0xf9, 0x3f, 0xee, 0x66, 0x13, 0x24, 0xf8, 0x50, 0xb8, 0x47, 0xb5, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_752 = { .name = "ecdsa_brainpoolp256r1_sha256_752", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_752_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_752_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_752_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 753 for ECDSA, tcId is 232 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_753_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_753_msg[] = { 0x37, 0x31, 0x33, 0x38, 0x36, 0x38, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_753_sig[] = { 0x30, 0x0e, 0x26, 0x02, 0x7c, 0xe7, 0xd3, 0xf2, 0x1c, 0x85, 0x71, 0xdc, 0x69, 0x0b, 0x1b, 0xb9, 0x90, 0xe8, 0xfc, 0x49, 0xad, 0x3e, 0x95, 0x37, 0x4b, 0xd5, 0x43, 0xb2, 0xe2, 0x2b, 0xad, 0xc6, 0x22, 0xbc, 0x8f, 0x24, 0x45, 0xcd, 0x49, 0x56, 0xbc, 0x0d, 0xb5, 0x53, 0x96, 0x6a, 0x07, 0x18, 0xae, 0xb5, 0xea, 0xd6, 0x5b, 0xc6, 0x6d, 0xdb, 0x21, 0xfe, 0xa0, 0xe5, 0x71, 0xa8, 0x7e, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_753 = { .name = "ecdsa_brainpoolp256r1_sha256_753", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_753_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_753_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_753_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 754 for ECDSA, tcId is 233 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_754_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_754_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x33, 0x33, 0x31, 0x36, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_754_sig[] = { 0x29, 0x07, 0xcb, 0x01, 0xa8, 0x2a, 0x88, 0x04, 0x66, 0x40, 0xa5, 0x23, 0xf9, 0xb9, 0x85, 0x4d, 0x95, 0xb7, 0xec, 0x2d, 0xdd, 0x67, 0xc2, 0x07, 0x23, 0xd0, 0x58, 0x29, 0xe8, 0x43, 0x8a, 0x77, 0x38, 0xca, 0x08, 0xe5, 0x86, 0x23, 0x56, 0x0f, 0x72, 0x4a, 0x3e, 0x3f, 0x9b, 0xa0, 0xe9, 0xec, 0x79, 0x74, 0x97, 0x6d, 0xd3, 0x4e, 0x69, 0x40, 0xc0, 0xfe, 0x61, 0x68, 0xd5, 0x40, 0xe3, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_754 = { .name = "ecdsa_brainpoolp256r1_sha256_754", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_754_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_754_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_754_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 755 for ECDSA, tcId is 234 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_755_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_755_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x34, 0x30, 0x31, 0x32, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_755_sig[] = { 0x0c, 0x35, 0x84, 0x0f, 0x7b, 0x73, 0x19, 0xf1, 0x9f, 0xd7, 0x2f, 0x29, 0xfe, 0xa4, 0xcf, 0x93, 0x7a, 0xba, 0x2c, 0x3f, 0xe1, 0xdc, 0x01, 0xae, 0xc6, 0x3c, 0x21, 0x09, 0x4c, 0x5d, 0x35, 0x48, 0x7b, 0xf6, 0x99, 0x86, 0x8c, 0x2b, 0x69, 0x45, 0x47, 0xae, 0xbe, 0x9b, 0x98, 0xc0, 0x1c, 0x5e, 0xfb, 0xe9, 0x82, 0xa8, 0x41, 0x50, 0x39, 0x08, 0x94, 0x56, 0x3d, 0x4e, 0x2c, 0xb2, 0x40, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_755 = { .name = "ecdsa_brainpoolp256r1_sha256_755", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_755_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_755_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_755_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 756 for ECDSA, tcId is 235 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_756_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_756_msg[] = { 0x31, 0x33, 0x34, 0x34, 0x32, 0x39, 0x33, 0x30, 0x37, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_756_sig[] = { 0x42, 0x72, 0xff, 0x20, 0xb8, 0xc3, 0xd1, 0x9e, 0x8c, 0x84, 0x14, 0x1f, 0xbe, 0x4d, 0x16, 0x81, 0xfa, 0x71, 0xb5, 0x1f, 0x6c, 0x10, 0x36, 0x0d, 0xb7, 0xaf, 0xfa, 0xc9, 0x89, 0x27, 0x4d, 0x23, 0x67, 0x72, 0xff, 0x76, 0x8e, 0xe6, 0xa3, 0xed, 0xaf, 0x0d, 0xbd, 0xd7, 0xb5, 0xc6, 0x96, 0x2c, 0x2a, 0xcc, 0x8c, 0xb1, 0x4e, 0x63, 0x47, 0x63, 0x1e, 0x25, 0x94, 0x01, 0x89, 0x72, 0x94, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_756 = { .name = "ecdsa_brainpoolp256r1_sha256_756", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_756_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_756_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_756_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 757 for ECDSA, tcId is 236 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_757_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_757_msg[] = { 0x33, 0x37, 0x30, 0x36, 0x32, 0x31, 0x31, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_757_sig[] = { 0x0a, 0x1e, 0x07, 0x2c, 0x48, 0xa6, 0x2a, 0x58, 0x3b, 0xf9, 0x4f, 0xe6, 0x38, 0x09, 0xe9, 0x5f, 0x32, 0x02, 0x17, 0x6b, 0xfa, 0x6d, 0x28, 0xde, 0x8f, 0x75, 0xa4, 0xa3, 0x25, 0x6c, 0xa2, 0x1f, 0x95, 0x14, 0xa6, 0xe5, 0xb2, 0x35, 0xc2, 0x91, 0x52, 0x56, 0x1c, 0xc9, 0x49, 0x2c, 0xf4, 0x74, 0x77, 0xa0, 0xfe, 0x23, 0xf5, 0x60, 0x40, 0xd7, 0x20, 0x6b, 0xfb, 0x4e, 0xb3, 0xe1, 0x87, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_757 = { .name = "ecdsa_brainpoolp256r1_sha256_757", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_757_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_757_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_757_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 758 for ECDSA, tcId is 237 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_758_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_758_msg[] = { 0x33, 0x34, 0x33, 0x36, 0x38, 0x38, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_758_sig[] = { 0x02, 0xbc, 0xbd, 0x38, 0xa3, 0xe3, 0x11, 0x34, 0x45, 0xad, 0x2e, 0xe4, 0x2f, 0xae, 0xae, 0xe9, 0xfe, 0xd0, 0x02, 0x77, 0xe0, 0xb1, 0x55, 0x21, 0x32, 0x9f, 0x4c, 0x27, 0xc9, 0x63, 0xaf, 0x01, 0x06, 0xcf, 0x39, 0x9d, 0xeb, 0x1f, 0x6f, 0xd6, 0x92, 0x07, 0x5d, 0x23, 0x62, 0x72, 0xb9, 0x9c, 0x33, 0x36, 0xae, 0xa2, 0xcf, 0xac, 0x34, 0xd9, 0x04, 0x64, 0x6c, 0xc1, 0xda, 0xf5, 0x4d, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_758 = { .name = "ecdsa_brainpoolp256r1_sha256_758", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_758_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_758_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_758_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 759 for ECDSA, tcId is 238 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_759_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_759_msg[] = { 0x31, 0x33, 0x35, 0x31, 0x35, 0x33, 0x30, 0x33, 0x37, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_759_sig[] = { 0x62, 0xf3, 0xa6, 0xa9, 0xc9, 0xf4, 0x57, 0x21, 0x1b, 0x46, 0xb1, 0xca, 0x3a, 0x78, 0x2f, 0x11, 0xf4, 0x4c, 0xb9, 0x36, 0x0b, 0xb3, 0x07, 0x02, 0xe6, 0x71, 0x36, 0x03, 0x6c, 0xcb, 0xa3, 0x9e, 0x22, 0xf0, 0x2e, 0x5f, 0x64, 0x7c, 0xeb, 0x3d, 0x0c, 0x49, 0xf2, 0xe7, 0xac, 0x9b, 0xbb, 0x31, 0xb7, 0xe3, 0xae, 0x29, 0xa5, 0xed, 0x67, 0x0c, 0x96, 0xca, 0xd6, 0xd0, 0xf4, 0x5d, 0xf3, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_759 = { .name = "ecdsa_brainpoolp256r1_sha256_759", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_759_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_759_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_759_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 760 for ECDSA, tcId is 239 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_760_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_760_msg[] = { 0x36, 0x35, 0x35, 0x33, 0x32, 0x30, 0x33, 0x31, 0x32, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_760_sig[] = { 0x23, 0xd6, 0x79, 0xae, 0xd9, 0x06, 0x6b, 0x61, 0x18, 0x20, 0xa8, 0xe0, 0x2b, 0x3d, 0xaa, 0x92, 0x2b, 0x10, 0xd5, 0x59, 0x6c, 0x8c, 0xeb, 0x7b, 0xd4, 0xe4, 0xfc, 0xd6, 0xe5, 0xe1, 0xdc, 0xa7, 0x96, 0x26, 0xe1, 0xd2, 0x20, 0x5d, 0x60, 0xe3, 0x9b, 0x63, 0x38, 0x52, 0xf6, 0x23, 0xf0, 0xf8, 0xb3, 0x5e, 0x44, 0x79, 0x7e, 0x08, 0xc6, 0xfa, 0xd1, 0x96, 0xc3, 0x3b, 0xe6, 0x9b, 0x5a, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_760 = { .name = "ecdsa_brainpoolp256r1_sha256_760", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_760_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_760_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_760_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 761 for ECDSA, tcId is 240 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_761_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_761_msg[] = { 0x31, 0x35, 0x36, 0x34, 0x33, 0x34, 0x36, 0x36, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_761_sig[] = { 0x0e, 0x4c, 0x5c, 0x07, 0x7f, 0x14, 0xa4, 0xdb, 0x19, 0x76, 0x54, 0xf8, 0x08, 0x1f, 0x10, 0xac, 0x22, 0x29, 0xe6, 0xf2, 0x08, 0x44, 0x05, 0xae, 0xa5, 0x25, 0x67, 0x9e, 0x59, 0x25, 0x39, 0xa9, 0x13, 0x55, 0xd4, 0x36, 0x67, 0x40, 0x2b, 0x9f, 0x01, 0x95, 0x91, 0x40, 0xc4, 0x14, 0xf1, 0x8d, 0x90, 0x8e, 0x25, 0x59, 0xe5, 0x7a, 0xdf, 0x35, 0xce, 0x79, 0x4d, 0xbc, 0x8e, 0x22, 0x20, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_761 = { .name = "ecdsa_brainpoolp256r1_sha256_761", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_761_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_761_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_761_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 762 for ECDSA, tcId is 241 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_762_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_762_msg[] = { 0x34, 0x34, 0x32, 0x39, 0x35, 0x33, 0x39, 0x31, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_762_sig[] = { 0x32, 0x46, 0xb3, 0x39, 0x54, 0xcf, 0x1d, 0xd4, 0xa2, 0x16, 0x21, 0x8d, 0x49, 0xb1, 0x4e, 0x39, 0xdb, 0x82, 0x00, 0x4b, 0xa0, 0x55, 0x6f, 0xb5, 0x91, 0x35, 0x7a, 0xff, 0x76, 0xa1, 0xea, 0x63, 0x5b, 0x5f, 0xcb, 0x72, 0x6e, 0xbf, 0x18, 0xc9, 0x15, 0x1a, 0x26, 0xa5, 0xb0, 0x80, 0x0c, 0xbf, 0x95, 0xb5, 0xed, 0xc0, 0x84, 0xb4, 0x2d, 0xc6, 0xdc, 0x7f, 0xbb, 0x9a, 0x0a, 0xed, 0x84, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_762 = { .name = "ecdsa_brainpoolp256r1_sha256_762", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_762_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_762_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_762_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 763 for ECDSA, tcId is 242 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_763_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_763_msg[] = { 0x31, 0x30, 0x39, 0x35, 0x33, 0x32, 0x36, 0x31, 0x33, 0x35, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_763_sig[] = { 0x36, 0x1a, 0x8d, 0xef, 0x87, 0x40, 0x57, 0xc7, 0x15, 0x42, 0x38, 0x43, 0xbd, 0x7b, 0xf0, 0x77, 0x5b, 0xa6, 0x36, 0x6f, 0xa4, 0x8c, 0xa8, 0x3e, 0x1c, 0xdc, 0xe2, 0x06, 0xbf, 0x94, 0xc2, 0xbf, 0x36, 0x5e, 0x97, 0x49, 0x3d, 0x33, 0x82, 0x68, 0x1f, 0x1d, 0x94, 0x65, 0x7e, 0x98, 0x88, 0x24, 0x5c, 0x9b, 0x07, 0x62, 0xee, 0x7f, 0x4c, 0xa0, 0x2e, 0x73, 0x8a, 0xfd, 0xbb, 0xa2, 0x74, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_763 = { .name = "ecdsa_brainpoolp256r1_sha256_763", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_763_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_763_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_763_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 764 for ECDSA, tcId is 243 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_764_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_764_msg[] = { 0x35, 0x39, 0x38, 0x37, 0x33, 0x35, 0x30, 0x30, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_764_sig[] = { 0x2c, 0x5f, 0x51, 0xbc, 0x91, 0x96, 0x9f, 0xd5, 0xb8, 0x04, 0xe7, 0x51, 0x32, 0x3f, 0xc8, 0x02, 0x94, 0xb0, 0xb5, 0xb1, 0xe2, 0x0e, 0x19, 0x5e, 0xc9, 0xbd, 0xc6, 0xa7, 0x80, 0x6d, 0xa1, 0x3f, 0x4c, 0x24, 0x6c, 0x94, 0x9b, 0xce, 0x43, 0xd3, 0x03, 0x20, 0x1f, 0xa0, 0xd9, 0x89, 0xe7, 0x06, 0x74, 0x76, 0x65, 0x55, 0xe8, 0xd3, 0xa9, 0x9c, 0x26, 0xba, 0xbb, 0x65, 0x8d, 0x1f, 0x7d, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_764 = { .name = "ecdsa_brainpoolp256r1_sha256_764", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_764_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_764_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_764_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 765 for ECDSA, tcId is 244 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_765_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_765_msg[] = { 0x33, 0x34, 0x36, 0x33, 0x30, 0x30, 0x36, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_765_sig[] = { 0xa9, 0xe3, 0xf1, 0xe8, 0x31, 0x08, 0xbe, 0x78, 0x66, 0x8d, 0x4b, 0xac, 0x7f, 0xfb, 0x29, 0x18, 0xd3, 0x81, 0x00, 0xba, 0x01, 0xf3, 0x7d, 0xe5, 0xb9, 0x23, 0xee, 0xca, 0x07, 0xcc, 0x05, 0xe3, 0x3f, 0x0d, 0x81, 0xbc, 0xc0, 0x88, 0x02, 0xa4, 0x35, 0x59, 0x97, 0x59, 0xf5, 0x1c, 0x89, 0xf8, 0x16, 0x74, 0x27, 0x10, 0x88, 0x5b, 0x41, 0x37, 0x75, 0x81, 0x30, 0xe8, 0xac, 0xf7, 0x07, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_765 = { .name = "ecdsa_brainpoolp256r1_sha256_765", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_765_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_765_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_765_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 766 for ECDSA, tcId is 245 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_766_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_766_msg[] = { 0x39, 0x38, 0x31, 0x37, 0x33, 0x32, 0x30, 0x32, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_766_sig[] = { 0x95, 0x9e, 0x98, 0x11, 0xbb, 0x18, 0xb4, 0x86, 0x5f, 0xde, 0x6d, 0x5f, 0x9c, 0x24, 0x6d, 0x67, 0xe4, 0x8d, 0x7a, 0x5c, 0x7c, 0xe4, 0x6d, 0x7a, 0xfb, 0x6f, 0x5e, 0xc0, 0xb2, 0x6d, 0x50, 0x60, 0x00, 0x91, 0xa0, 0x97, 0x61, 0x8f, 0x25, 0x17, 0xad, 0x6d, 0xcf, 0x49, 0xbc, 0xc2, 0x08, 0xe9, 0x4c, 0xb8, 0x1a, 0xf8, 0x7f, 0x65, 0xb7, 0x88, 0x05, 0x80, 0xf9, 0x98, 0x58, 0xa9, 0xa9, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_766 = { .name = "ecdsa_brainpoolp256r1_sha256_766", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_766_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_766_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_766_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 767 for ECDSA, tcId is 246 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_767_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_767_msg[] = { 0x33, 0x32, 0x32, 0x32, 0x30, 0x34, 0x31, 0x30, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_767_sig[] = { 0x4f, 0x92, 0x31, 0xb1, 0xcb, 0xae, 0xa1, 0x83, 0xed, 0x9d, 0x85, 0x91, 0xae, 0x3e, 0x9f, 0x04, 0x39, 0x20, 0x1e, 0x10, 0x67, 0xff, 0x00, 0x53, 0x5a, 0x41, 0x53, 0x96, 0xb7, 0x78, 0x11, 0xd6, 0x98, 0x51, 0xc7, 0x99, 0xa3, 0x11, 0xab, 0xae, 0xfa, 0x08, 0xc4, 0x12, 0xf6, 0xf6, 0x79, 0xa0, 0x00, 0xa6, 0xed, 0xaa, 0x00, 0x5d, 0x05, 0xf5, 0x50, 0xa6, 0x2f, 0xf9, 0xa6, 0xa1, 0xa5, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_767 = { .name = "ecdsa_brainpoolp256r1_sha256_767", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_767_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_767_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_767_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 768 for ECDSA, tcId is 247 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_768_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_768_msg[] = { 0x36, 0x36, 0x36, 0x36, 0x33, 0x30, 0x37, 0x31, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_768_sig[] = { 0x54, 0x79, 0xac, 0xb7, 0x6c, 0x38, 0xd4, 0x7f, 0x21, 0x94, 0x08, 0x55, 0xf1, 0x80, 0x09, 0x78, 0xa5, 0x2f, 0xb1, 0x0b, 0x7c, 0xc9, 0xb0, 0x7c, 0xaf, 0x88, 0xaf, 0x67, 0xf2, 0x69, 0x71, 0x43, 0x24, 0x4f, 0x3c, 0xdd, 0x68, 0x35, 0x55, 0xb8, 0x8a, 0x45, 0xe9, 0x75, 0x07, 0x37, 0x35, 0xd3, 0x87, 0x13, 0xda, 0x4b, 0xde, 0xa3, 0x40, 0xb5, 0xfb, 0x87, 0xd3, 0xc4, 0x43, 0xad, 0xb0, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_768 = { .name = "ecdsa_brainpoolp256r1_sha256_768", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_768_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_768_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_768_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 769 for ECDSA, tcId is 248 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_769_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_769_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x35, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_769_sig[] = { 0x14, 0x99, 0x01, 0x49, 0xd3, 0xa8, 0xf3, 0xc9, 0x6e, 0x9c, 0x62, 0x95, 0x2f, 0x90, 0xef, 0x21, 0xcb, 0xcc, 0x0d, 0x03, 0xda, 0x80, 0x2f, 0x72, 0x43, 0x2a, 0x04, 0x1d, 0xa5, 0x4d, 0xb5, 0xbe, 0x87, 0x42, 0x7b, 0x96, 0xd2, 0x84, 0x99, 0x70, 0x7a, 0x67, 0x88, 0x70, 0x5c, 0xd8, 0xa5, 0xee, 0x9f, 0xd4, 0x2e, 0x2d, 0x1f, 0x12, 0x73, 0x75, 0x23, 0x37, 0xef, 0xcd, 0x06, 0xaa, 0x88, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_769 = { .name = "ecdsa_brainpoolp256r1_sha256_769", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_769_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_769_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_769_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 770 for ECDSA, tcId is 249 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_770_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_770_msg[] = { 0x31, 0x38, 0x34, 0x36, 0x35, 0x39, 0x37, 0x31, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_770_sig[] = { 0x5b, 0xb2, 0x44, 0xb5, 0x11, 0xa9, 0x82, 0x8f, 0xbe, 0x7a, 0x04, 0x1a, 0xf3, 0x41, 0xa9, 0x3b, 0x24, 0x2b, 0x51, 0x33, 0x10, 0xde, 0x9f, 0x4b, 0xc3, 0x66, 0xe1, 0x8b, 0x93, 0xa3, 0xce, 0x34, 0x97, 0x8b, 0xe5, 0xd5, 0x8c, 0xe7, 0x0c, 0x92, 0xde, 0xa7, 0x5c, 0xe2, 0xf8, 0xe8, 0x8f, 0x09, 0x3f, 0x5e, 0x46, 0x75, 0xe7, 0x50, 0xfd, 0x08, 0x87, 0x77, 0xa7, 0x41, 0x15, 0x26, 0xc1, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_770 = { .name = "ecdsa_brainpoolp256r1_sha256_770", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_770_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_770_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_770_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 771 for ECDSA, tcId is 250 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_771_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_771_msg[] = { 0x33, 0x31, 0x33, 0x36, 0x30, 0x34, 0x36, 0x31, 0x38, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_771_sig[] = { 0x07, 0x0e, 0x64, 0xf4, 0xd1, 0x9f, 0x9f, 0xd9, 0xa8, 0xd3, 0xf0, 0xa6, 0x4f, 0x95, 0x1c, 0x41, 0xdb, 0x2f, 0x0e, 0x13, 0x49, 0x0e, 0x7a, 0xc0, 0xb3, 0xf6, 0x06, 0x6b, 0xc1, 0xe5, 0x40, 0xa7, 0x83, 0x5b, 0x25, 0x02, 0x9a, 0x2c, 0xed, 0x8d, 0xf5, 0x7b, 0x03, 0x43, 0xa2, 0xc7, 0x18, 0xdb, 0x72, 0xc2, 0xd3, 0x1f, 0x7e, 0xf6, 0x6b, 0x23, 0x0c, 0x97, 0xd2, 0x02, 0x81, 0xd4, 0x9a, 0x33, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_771 = { .name = "ecdsa_brainpoolp256r1_sha256_771", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_771_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_771_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_771_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 772 for ECDSA, tcId is 251 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_772_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_772_msg[] = { 0x32, 0x36, 0x36, 0x33, 0x37, 0x38, 0x34, 0x32, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_772_sig[] = { 0x2b, 0x5a, 0x6d, 0xc1, 0x4e, 0x98, 0xd2, 0xe6, 0xc0, 0xb6, 0x27, 0x56, 0x8a, 0x74, 0x8b, 0xda, 0x04, 0xc0, 0x95, 0x00, 0xbc, 0x63, 0xbd, 0x74, 0x4f, 0x5d, 0xee, 0x96, 0x7d, 0xb0, 0xf0, 0xb1, 0x34, 0x52, 0xb1, 0x3e, 0xf8, 0xdc, 0x01, 0xa0, 0xb7, 0x85, 0xfb, 0xb4, 0xfc, 0xd0, 0x57, 0xa5, 0x88, 0x0c, 0x41, 0x84, 0x27, 0x28, 0x3a, 0xbc, 0x7a, 0xa7, 0xfa, 0x07, 0xd5, 0x07, 0xee, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_772 = { .name = "ecdsa_brainpoolp256r1_sha256_772", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_772_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_772_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_772_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 773 for ECDSA, tcId is 252 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_773_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_773_msg[] = { 0x31, 0x36, 0x35, 0x32, 0x31, 0x30, 0x30, 0x35, 0x32, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_773_sig[] = { 0x1d, 0x91, 0xbd, 0xa9, 0x0d, 0x08, 0x31, 0xbe, 0x05, 0x8f, 0x61, 0x0f, 0xe3, 0xe6, 0x45, 0x17, 0x91, 0xe0, 0x96, 0x89, 0xc5, 0x2b, 0xd4, 0x66, 0xef, 0x74, 0xdd, 0x85, 0xb3, 0xcb, 0xd1, 0x21, 0x4b, 0xa3, 0x7a, 0x93, 0x41, 0xe5, 0x92, 0x3e, 0xa9, 0x3e, 0x35, 0x73, 0x44, 0xfe, 0x7b, 0x73, 0x44, 0x6e, 0x20, 0x7a, 0x7e, 0x44, 0x96, 0x07, 0xb1, 0x48, 0x2c, 0x51, 0x0e, 0x93, 0xb6, 0x30, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_773 = { .name = "ecdsa_brainpoolp256r1_sha256_773", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_773_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_773_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_773_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 774 for ECDSA, tcId is 253 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_774_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_774_msg[] = { 0x35, 0x37, 0x34, 0x38, 0x30, 0x38, 0x31, 0x36, 0x39, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_774_sig[] = { 0x6a, 0x32, 0xe1, 0x62, 0x5c, 0x1e, 0xb7, 0xd4, 0x0b, 0x31, 0x45, 0xf8, 0x94, 0xc7, 0x13, 0x8d, 0x62, 0x32, 0xa6, 0x11, 0x6d, 0x50, 0xf1, 0x27, 0x0a, 0x0e, 0x97, 0x1e, 0x2b, 0x7a, 0x8e, 0x75, 0x61, 0xb6, 0xaa, 0xe5, 0x68, 0x19, 0x27, 0x28, 0x13, 0x31, 0x9f, 0x7c, 0x21, 0x4f, 0x83, 0xce, 0x5f, 0xcc, 0xdb, 0x58, 0x87, 0x8d, 0x59, 0x2a, 0xb0, 0xf4, 0x47, 0x9a, 0x52, 0xd9, 0x70, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_774 = { .name = "ecdsa_brainpoolp256r1_sha256_774", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_774_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_774_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_774_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 775 for ECDSA, tcId is 254 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_775_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_775_msg[] = { 0x36, 0x33, 0x34, 0x33, 0x39, 0x31, 0x33, 0x34, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_775_sig[] = { 0x5b, 0x75, 0x26, 0xf0, 0x9d, 0xab, 0x24, 0x85, 0x51, 0xed, 0x8b, 0x12, 0x29, 0xc2, 0x44, 0x7a, 0x45, 0x21, 0xd2, 0xd6, 0xe2, 0x29, 0x02, 0xac, 0xbc, 0x17, 0x6c, 0x50, 0x1f, 0x5f, 0x5f, 0x7e, 0x31, 0x86, 0x55, 0x2f, 0x70, 0x0d, 0x9e, 0x6b, 0x55, 0x1c, 0x89, 0x3e, 0xd2, 0xae, 0xd9, 0x55, 0x6b, 0x3f, 0x0a, 0xc2, 0xa5, 0xe2, 0x77, 0x2f, 0x8f, 0xb1, 0xa1, 0x84, 0x94, 0x92, 0x62, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_775 = { .name = "ecdsa_brainpoolp256r1_sha256_775", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_775_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_775_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_775_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 776 for ECDSA, tcId is 255 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_776_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_776_msg[] = { 0x31, 0x35, 0x34, 0x31, 0x31, 0x30, 0x33, 0x35, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_776_sig[] = { 0x30, 0xd0, 0xff, 0xa9, 0xc2, 0xbe, 0x04, 0x2c, 0xcd, 0x2c, 0x9a, 0xdb, 0xcb, 0xbb, 0xa2, 0x2c, 0xc0, 0x44, 0xd6, 0x9a, 0xbf, 0x37, 0xef, 0xf2, 0xbc, 0xab, 0x91, 0xd4, 0x5b, 0xe9, 0xb0, 0xbd, 0x48, 0x2d, 0xd7, 0x2a, 0xa3, 0xb3, 0xf3, 0xf2, 0xe6, 0xdd, 0x4a, 0x07, 0x5f, 0xa9, 0x62, 0xb8, 0xf6, 0xfc, 0x25, 0xe9, 0xd3, 0x2d, 0x0d, 0xcc, 0xbd, 0x80, 0x83, 0x1a, 0xcf, 0x75, 0x95, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_776 = { .name = "ecdsa_brainpoolp256r1_sha256_776", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_776_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_776_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_776_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 777 for ECDSA, tcId is 256 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_777_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_777_msg[] = { 0x31, 0x30, 0x34, 0x37, 0x38, 0x35, 0x38, 0x30, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_777_sig[] = { 0x20, 0x0d, 0x3b, 0x5f, 0x91, 0x58, 0x63, 0xad, 0xa8, 0xc8, 0x4e, 0xf5, 0xeb, 0x50, 0xec, 0xf0, 0xab, 0x43, 0xe2, 0xba, 0xc1, 0x0a, 0x4c, 0x42, 0xcf, 0x37, 0x19, 0x12, 0x1a, 0x8d, 0x37, 0xcd, 0x9d, 0x13, 0x7e, 0x11, 0xa0, 0x50, 0xbf, 0xbb, 0xa7, 0x46, 0xc1, 0x9a, 0xd5, 0xf7, 0x19, 0x5c, 0x86, 0xf2, 0x41, 0x15, 0xd1, 0xfa, 0xdf, 0xb1, 0x9a, 0xd2, 0xcb, 0x56, 0x24, 0x12, 0x6c, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_777 = { .name = "ecdsa_brainpoolp256r1_sha256_777", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_777_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_777_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_777_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 778 for ECDSA, tcId is 257 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_778_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_778_msg[] = { 0x31, 0x30, 0x35, 0x33, 0x36, 0x32, 0x38, 0x35, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_778_sig[] = { 0x4a, 0xc5, 0x54, 0x70, 0x78, 0x90, 0x95, 0xe9, 0xe2, 0x50, 0x33, 0x2f, 0x37, 0x90, 0xf8, 0x65, 0xfb, 0xcc, 0x58, 0x93, 0x45, 0x88, 0xc7, 0x74, 0xba, 0xbf, 0x22, 0xde, 0x6a, 0x8a, 0x69, 0x58, 0x2c, 0xfe, 0xfb, 0x0e, 0x2b, 0xe0, 0x54, 0x2c, 0x97, 0xeb, 0x61, 0x91, 0x4f, 0x23, 0xfb, 0x37, 0xb5, 0x8f, 0xb1, 0x7d, 0x0d, 0x6b, 0x76, 0x6a, 0x8f, 0x63, 0xc8, 0xd0, 0xdc, 0x79, 0xe5, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_778 = { .name = "ecdsa_brainpoolp256r1_sha256_778", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_778_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_778_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_778_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 779 for ECDSA, tcId is 258 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_779_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_779_msg[] = { 0x39, 0x35, 0x33, 0x39, 0x30, 0x34, 0x31, 0x30, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_779_sig[] = { 0x90, 0x8c, 0x1e, 0x6d, 0xa6, 0x25, 0x87, 0x9f, 0xc1, 0x16, 0xdd, 0xb6, 0x51, 0x73, 0xb9, 0x35, 0x5f, 0xa8, 0xeb, 0x03, 0x80, 0x63, 0xde, 0x2c, 0xec, 0x19, 0x34, 0xe8, 0xfb, 0x2b, 0xfc, 0x27, 0x6e, 0x08, 0x4f, 0xf7, 0xc0, 0x43, 0xed, 0xfb, 0x16, 0x1a, 0xea, 0x26, 0x05, 0xa1, 0x11, 0xcf, 0x43, 0xd5, 0x83, 0x88, 0xe0, 0x61, 0xe8, 0x01, 0x9e, 0x99, 0x52, 0x63, 0x76, 0xe4, 0xc7, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_779 = { .name = "ecdsa_brainpoolp256r1_sha256_779", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_779_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_779_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_779_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 780 for ECDSA, tcId is 259 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_780_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_780_msg[] = { 0x39, 0x37, 0x38, 0x38, 0x34, 0x38, 0x30, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_780_sig[] = { 0x97, 0x32, 0x8e, 0x10, 0x50, 0xfc, 0x2d, 0x44, 0xec, 0x89, 0x83, 0x6a, 0x7e, 0xaa, 0xe3, 0x60, 0xd6, 0xf9, 0xd9, 0x96, 0x85, 0x5e, 0x8b, 0x14, 0x4d, 0x0c, 0x27, 0x3c, 0x48, 0x66, 0xd7, 0xfe, 0x39, 0x19, 0xd7, 0xce, 0xd9, 0xf3, 0xe3, 0x28, 0x49, 0x78, 0x54, 0x63, 0x94, 0xfb, 0xb2, 0x77, 0xf8, 0x4d, 0x26, 0x59, 0x8d, 0xbe, 0x83, 0xda, 0x4b, 0xa7, 0xc1, 0xde, 0x37, 0x2b, 0x33, 0x40, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_780 = { .name = "ecdsa_brainpoolp256r1_sha256_780", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_780_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_780_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_780_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 781 for ECDSA, tcId is 260 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_781_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_781_msg[] = { 0x33, 0x36, 0x31, 0x30, 0x36, 0x37, 0x32, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_781_sig[] = { 0x98, 0x81, 0xe8, 0xf7, 0x5d, 0xb8, 0x16, 0x3d, 0x2b, 0xe1, 0xfc, 0x11, 0x49, 0x19, 0x26, 0xc4, 0x12, 0x53, 0x74, 0x44, 0x0d, 0xa9, 0x47, 0x50, 0xa1, 0x9e, 0xca, 0xf8, 0xa8, 0x3b, 0x71, 0xfc, 0x4a, 0x9a, 0x19, 0x1a, 0x9d, 0xa8, 0xfa, 0x3d, 0x56, 0x41, 0xcb, 0xb5, 0xa8, 0x8c, 0xac, 0x5b, 0x37, 0x80, 0xfb, 0xbe, 0xf8, 0xef, 0x1a, 0x44, 0x57, 0x82, 0x39, 0x49, 0x25, 0xef, 0xc5, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_781 = { .name = "ecdsa_brainpoolp256r1_sha256_781", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_781_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_781_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_781_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 782 for ECDSA, tcId is 261 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_782_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_782_msg[] = { 0x31, 0x30, 0x35, 0x34, 0x32, 0x34, 0x30, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_782_sig[] = { 0x70, 0xcb, 0x8b, 0xc7, 0xd5, 0xc3, 0x72, 0xc7, 0x3c, 0xf3, 0x6f, 0xe6, 0x9a, 0xa1, 0xa5, 0x09, 0xfe, 0x0c, 0xf2, 0xbe, 0x64, 0x2e, 0x08, 0x5a, 0xc9, 0x79, 0xd6, 0xee, 0xfd, 0xda, 0xa9, 0xe1, 0x50, 0x04, 0x02, 0xf4, 0x96, 0xdc, 0x8d, 0x90, 0x4c, 0x70, 0x96, 0x95, 0xff, 0x02, 0x71, 0x4e, 0x60, 0x7c, 0x4b, 0xee, 0x9d, 0x06, 0x4c, 0xd4, 0x65, 0x4b, 0x6c, 0x46, 0x6f, 0x40, 0x10, 0xe8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_782 = { .name = "ecdsa_brainpoolp256r1_sha256_782", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_782_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_782_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_782_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 783 for ECDSA, tcId is 262 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_783_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_783_msg[] = { 0x35, 0x31, 0x37, 0x34, 0x34, 0x34, 0x38, 0x31, 0x39, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_783_sig[] = { 0x39, 0xc8, 0xf8, 0x70, 0x18, 0x5f, 0x87, 0x95, 0x7e, 0x00, 0x9d, 0x01, 0xe5, 0x2f, 0xbf, 0x6c, 0x7a, 0xe5, 0x0d, 0x73, 0x4d, 0x39, 0xec, 0x41, 0x13, 0xb3, 0x7b, 0x7b, 0xd1, 0xb6, 0x80, 0x66, 0x73, 0xd6, 0xda, 0x2b, 0x77, 0x7c, 0xe0, 0xc4, 0x3d, 0x49, 0x08, 0x08, 0x57, 0xc6, 0xec, 0x58, 0x54, 0x6f, 0xdd, 0xf1, 0x7d, 0x26, 0x76, 0xf1, 0x0f, 0x88, 0xdd, 0xc9, 0x00, 0xca, 0x18, 0x91, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_783 = { .name = "ecdsa_brainpoolp256r1_sha256_783", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_783_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_783_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_783_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 784 for ECDSA, tcId is 263 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_784_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_784_msg[] = { 0x31, 0x39, 0x36, 0x37, 0x35, 0x36, 0x31, 0x32, 0x35, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_784_sig[] = { 0x2e, 0x95, 0xb7, 0x02, 0xed, 0x13, 0x8f, 0x42, 0x61, 0x4f, 0x07, 0xa1, 0xb2, 0x15, 0x48, 0xea, 0x1d, 0x24, 0x7a, 0x4a, 0x7f, 0xd7, 0x65, 0x62, 0x8b, 0xab, 0x68, 0x55, 0x11, 0x29, 0xad, 0x38, 0x2e, 0x9a, 0x6a, 0xf0, 0x78, 0xb5, 0x18, 0x12, 0xed, 0x71, 0xb0, 0xea, 0xb6, 0x53, 0x50, 0xcd, 0x08, 0x1f, 0x79, 0x99, 0xa2, 0x4a, 0x56, 0xe9, 0x6a, 0xf9, 0xd5, 0xc5, 0xf6, 0xbd, 0xaf, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_784 = { .name = "ecdsa_brainpoolp256r1_sha256_784", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_784_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_784_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_784_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 785 for ECDSA, tcId is 264 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_785_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_785_msg[] = { 0x33, 0x34, 0x34, 0x37, 0x32, 0x35, 0x33, 0x33, 0x34, 0x33, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_785_sig[] = { 0x58, 0x37, 0xb6, 0x87, 0xf2, 0x12, 0x80, 0x63, 0xdc, 0x67, 0xf5, 0x12, 0xcb, 0x66, 0x70, 0xf1, 0x22, 0xb6, 0x11, 0x25, 0x7f, 0x53, 0x6d, 0x45, 0xe3, 0x98, 0x4f, 0x5e, 0xbb, 0xc3, 0xcd, 0x4d, 0x6a, 0x6c, 0x0c, 0x41, 0xb9, 0xcc, 0x37, 0xae, 0x02, 0xc2, 0x21, 0x8d, 0x3b, 0x8c, 0xd8, 0x0c, 0xd3, 0xc4, 0xfc, 0x25, 0x77, 0x1c, 0x0c, 0xaa, 0xb3, 0xb8, 0xed, 0x2c, 0x61, 0x1c, 0xf7, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_785 = { .name = "ecdsa_brainpoolp256r1_sha256_785", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_785_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_785_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_785_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 786 for ECDSA, tcId is 265 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_786_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_786_msg[] = { 0x33, 0x36, 0x38, 0x32, 0x36, 0x34, 0x33, 0x31, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_786_sig[] = { 0x5a, 0x73, 0xc7, 0x5d, 0x2b, 0x5c, 0x48, 0xaf, 0x17, 0xb7, 0x84, 0x72, 0x44, 0x26, 0x2b, 0xb9, 0xb2, 0xc3, 0xf2, 0x69, 0x7a, 0x9d, 0x8c, 0x60, 0x57, 0x58, 0xa2, 0xd3, 0x3c, 0xcc, 0xd1, 0x8f, 0x97, 0xf1, 0x2a, 0xa0, 0x4b, 0x25, 0x82, 0x37, 0x3f, 0x9b, 0xea, 0x64, 0x6b, 0xce, 0x1b, 0x12, 0x90, 0x30, 0xea, 0x5f, 0x35, 0xc9, 0xdc, 0x2a, 0x14, 0x9e, 0x90, 0xaa, 0x3b, 0x56, 0x34, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_786 = { .name = "ecdsa_brainpoolp256r1_sha256_786", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_786_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_786_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_786_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 787 for ECDSA, tcId is 266 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_787_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_787_msg[] = { 0x33, 0x32, 0x36, 0x31, 0x31, 0x39, 0x38, 0x36, 0x30, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_787_sig[] = { 0x32, 0xb6, 0x03, 0x13, 0x2a, 0x96, 0xc5, 0xb9, 0x57, 0xb0, 0x8c, 0x88, 0x53, 0x2e, 0x49, 0xfc, 0xb7, 0x3c, 0xd7, 0xc5, 0xf7, 0x1a, 0x1e, 0x6e, 0xd1, 0x4a, 0x5c, 0xc1, 0x77, 0x6d, 0x2d, 0xa7, 0x93, 0xbe, 0x0e, 0x4c, 0x98, 0x44, 0xbe, 0xc9, 0xd2, 0xb6, 0x2b, 0x42, 0x4e, 0x61, 0x8a, 0x84, 0x5a, 0x98, 0x53, 0x7b, 0x23, 0x56, 0xc1, 0xf4, 0x73, 0xbb, 0xa1, 0x3b, 0x08, 0x45, 0x8e, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_787 = { .name = "ecdsa_brainpoolp256r1_sha256_787", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_787_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_787_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_787_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 788 for ECDSA, tcId is 267 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_788_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_788_msg[] = { 0x39, 0x36, 0x37, 0x38, 0x37, 0x38, 0x31, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_788_sig[] = { 0x9b, 0x76, 0xb7, 0xaa, 0xc0, 0xa1, 0x3b, 0xf2, 0x17, 0xf2, 0x4d, 0x33, 0x5b, 0xc0, 0x46, 0x94, 0xec, 0xdb, 0xd5, 0xac, 0xfe, 0x4e, 0xc2, 0x3c, 0x06, 0x5e, 0xfe, 0xb7, 0x93, 0x6a, 0x1c, 0x62, 0x43, 0x2c, 0xde, 0x74, 0xfd, 0xbb, 0x4f, 0x54, 0x37, 0xcd, 0xec, 0xa5, 0x3c, 0xb7, 0xab, 0x79, 0xf6, 0x92, 0x69, 0x4f, 0x91, 0xed, 0x37, 0x35, 0xfb, 0xc4, 0xe0, 0x8a, 0x3f, 0x52, 0x78, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_788 = { .name = "ecdsa_brainpoolp256r1_sha256_788", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_788_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_788_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_788_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 789 for ECDSA, tcId is 268 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_789_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_789_msg[] = { 0x34, 0x39, 0x35, 0x38, 0x38, 0x32, 0x33, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_789_sig[] = { 0x8f, 0x25, 0x65, 0xb5, 0x17, 0xf6, 0x2a, 0x3b, 0x1e, 0x19, 0xb0, 0x91, 0x7a, 0xb2, 0xb2, 0x23, 0xfc, 0x81, 0x93, 0xcc, 0x0f, 0xdf, 0x3a, 0xb9, 0x69, 0x2b, 0xc4, 0x2c, 0xf4, 0x09, 0x10, 0xe8, 0x1d, 0xcc, 0xfb, 0xed, 0x8b, 0x90, 0xee, 0x53, 0x91, 0xea, 0x74, 0x3e, 0x35, 0xb6, 0x0e, 0xd3, 0x1d, 0x19, 0xed, 0xfb, 0xd9, 0x45, 0x04, 0xba, 0xdc, 0xa4, 0xaa, 0x4c, 0xf2, 0xa7, 0xbb, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_789 = { .name = "ecdsa_brainpoolp256r1_sha256_789", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_789_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_789_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_789_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 790 for ECDSA, tcId is 269 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_790_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_790_msg[] = { 0x38, 0x32, 0x34, 0x36, 0x33, 0x37, 0x38, 0x33, 0x37, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_790_sig[] = { 0x31, 0xc6, 0x27, 0xfd, 0x79, 0x1f, 0x73, 0x44, 0x21, 0xe5, 0x50, 0x26, 0x18, 0xae, 0xc4, 0x47, 0xc6, 0x70, 0x29, 0xb2, 0x79, 0x4e, 0xe1, 0x2b, 0x08, 0xee, 0xb6, 0xc5, 0x9a, 0xed, 0xb3, 0xee, 0x08, 0xf9, 0x1f, 0x37, 0x89, 0xbd, 0x01, 0xe5, 0xb9, 0xd9, 0x39, 0x41, 0xcf, 0x46, 0x69, 0x8d, 0x5e, 0x1a, 0x27, 0x08, 0xe7, 0x0e, 0xe9, 0xa2, 0x26, 0xe8, 0x1e, 0x7f, 0x4a, 0x41, 0x4e, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_790 = { .name = "ecdsa_brainpoolp256r1_sha256_790", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_790_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_790_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_790_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 791 for ECDSA, tcId is 270 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_791_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_791_msg[] = { 0x31, 0x31, 0x30, 0x32, 0x30, 0x38, 0x33, 0x33, 0x37, 0x37, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_791_sig[] = { 0x60, 0x05, 0x29, 0x31, 0x32, 0xd7, 0xea, 0xc0, 0xe7, 0x2b, 0x9b, 0x21, 0x8d, 0x03, 0x21, 0x26, 0x75, 0xd5, 0xaa, 0xe0, 0xda, 0x97, 0xbc, 0xcd, 0xf1, 0xa5, 0xff, 0x78, 0x4d, 0xe5, 0xcd, 0xe6, 0x13, 0xa1, 0x55, 0xc7, 0x4a, 0x9a, 0xb2, 0x7c, 0xbd, 0xf6, 0xca, 0xe1, 0x8d, 0x4d, 0x1f, 0x18, 0xb8, 0x21, 0x2d, 0x80, 0x18, 0x55, 0x1e, 0x2b, 0xae, 0xc9, 0x19, 0x79, 0xea, 0x5b, 0x4c, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_791 = { .name = "ecdsa_brainpoolp256r1_sha256_791", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_791_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_791_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_791_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 792 for ECDSA, tcId is 271 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_792_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_792_msg[] = { 0x31, 0x33, 0x33, 0x38, 0x37, 0x31, 0x36, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_792_sig[] = { 0x3a, 0x6d, 0xab, 0x51, 0xed, 0x90, 0x27, 0xf5, 0xca, 0xe1, 0x92, 0xe0, 0x58, 0x6a, 0x32, 0xc8, 0xef, 0x22, 0x76, 0xce, 0xba, 0x3b, 0x79, 0x60, 0x59, 0xdc, 0xa1, 0x35, 0xe3, 0x61, 0x79, 0x5d, 0x4b, 0xf1, 0x6b, 0x0e, 0x62, 0xe3, 0x2a, 0x94, 0x50, 0x88, 0xf5, 0x5f, 0xb4, 0x28, 0x15, 0x9a, 0xf7, 0x82, 0x96, 0xdd, 0x4f, 0x8d, 0xfd, 0x97, 0x13, 0xbd, 0xb2, 0xf6, 0x77, 0xcb, 0xcd, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_792 = { .name = "ecdsa_brainpoolp256r1_sha256_792", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_792_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_792_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_792_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 793 for ECDSA, tcId is 272 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_793_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_793_msg[] = { 0x33, 0x32, 0x32, 0x31, 0x34, 0x34, 0x31, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_793_sig[] = { 0x96, 0x1d, 0xe7, 0x7e, 0xd9, 0xcf, 0x61, 0x70, 0xd9, 0x25, 0xc2, 0x33, 0xbd, 0x3e, 0x20, 0xee, 0xf9, 0xbb, 0xe6, 0xd6, 0xc8, 0xda, 0xc2, 0x8a, 0xcd, 0xe4, 0x60, 0x11, 0xf9, 0x9f, 0x8b, 0xff, 0x97, 0x7d, 0xe0, 0x47, 0x79, 0xff, 0xe3, 0xaf, 0xe7, 0x08, 0xd8, 0x1c, 0xe8, 0xa1, 0xed, 0x6c, 0x7d, 0x2a, 0x9a, 0x25, 0xef, 0x99, 0x59, 0xc7, 0xa9, 0x51, 0xa0, 0x55, 0x5a, 0x6d, 0x37, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_793 = { .name = "ecdsa_brainpoolp256r1_sha256_793", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_793_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_793_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_793_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 794 for ECDSA, tcId is 273 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_794_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_794_msg[] = { 0x31, 0x30, 0x36, 0x38, 0x36, 0x36, 0x35, 0x35, 0x35, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_794_sig[] = { 0x77, 0x85, 0x81, 0xb3, 0xd4, 0x03, 0x00, 0x31, 0x14, 0x1e, 0x55, 0x5f, 0xa1, 0xdb, 0xeb, 0xae, 0xf0, 0xee, 0xd0, 0x19, 0xe0, 0xb8, 0x97, 0xb5, 0x07, 0x65, 0x44, 0xab, 0x80, 0x49, 0x8b, 0x9c, 0x71, 0x32, 0xc8, 0xd1, 0x09, 0xc1, 0xf1, 0xa6, 0xc1, 0x0f, 0x81, 0xe9, 0xfc, 0x11, 0xad, 0xea, 0x4b, 0x9c, 0xff, 0x59, 0x92, 0x08, 0xb6, 0xd9, 0xcb, 0x4e, 0x4b, 0x27, 0xf1, 0x97, 0x28, 0x46, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_794 = { .name = "ecdsa_brainpoolp256r1_sha256_794", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_794_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_794_msg, .msglen = 11, .sig = ecdsa_brainpoolp256r1_sha256_794_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 795 for ECDSA, tcId is 274 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_795_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_795_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x35, 0x32, 0x34, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_795_sig[] = { 0x9e, 0xea, 0xc8, 0xf0, 0x7c, 0x40, 0xcc, 0x8e, 0xe3, 0xcb, 0xa1, 0x07, 0xaf, 0x49, 0xd5, 0x26, 0x73, 0x1d, 0x8b, 0x7c, 0x70, 0x13, 0x0c, 0xbb, 0x6e, 0xfa, 0x3c, 0x61, 0x50, 0x5d, 0x63, 0x37, 0x62, 0xdb, 0x38, 0x22, 0x6b, 0x71, 0xf6, 0x4a, 0x5b, 0x59, 0x8a, 0xb7, 0xc4, 0xe3, 0xf8, 0x98, 0x80, 0xfe, 0x0d, 0x07, 0x49, 0xdf, 0xd5, 0xc7, 0xa3, 0x8a, 0x3e, 0xec, 0x3c, 0x79, 0x38, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_795 = { .name = "ecdsa_brainpoolp256r1_sha256_795", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_795_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_795_msg, .msglen = 8, .sig = ecdsa_brainpoolp256r1_sha256_795_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 796 for ECDSA, tcId is 275 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_796_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_796_msg[] = { 0x37, 0x30, 0x33, 0x30, 0x38, 0x31, 0x38, 0x37, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_796_sig[] = { 0x67, 0x3d, 0x41, 0xc1, 0x7e, 0x72, 0x7f, 0x01, 0x25, 0x17, 0x5b, 0x2a, 0x9f, 0x05, 0x61, 0xec, 0xc5, 0xcf, 0x9c, 0xd4, 0x90, 0x35, 0x82, 0x8b, 0xa7, 0xc4, 0x75, 0x45, 0xa0, 0xb3, 0x38, 0xf4, 0x00, 0x45, 0x9e, 0xf9, 0x78, 0xe7, 0xb0, 0x34, 0x68, 0xc8, 0x0f, 0xd4, 0x53, 0x3a, 0x33, 0x47, 0x55, 0xa0, 0x82, 0x6b, 0xf5, 0xa3, 0x0d, 0xf9, 0x19, 0x12, 0x9e, 0x35, 0x2d, 0x34, 0x75, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_796 = { .name = "ecdsa_brainpoolp256r1_sha256_796", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_796_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_796_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_796_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 797 for ECDSA, tcId is 276 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_797_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_797_msg[] = { 0x35, 0x39, 0x32, 0x34, 0x35, 0x32, 0x33, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_797_sig[] = { 0x8a, 0x97, 0xf1, 0x9b, 0x08, 0x09, 0x04, 0x2c, 0xda, 0xfe, 0x9c, 0x32, 0xbc, 0x0b, 0x0b, 0x01, 0x21, 0x8a, 0x49, 0x86, 0x7a, 0x68, 0x82, 0xd6, 0x4d, 0x5b, 0x7b, 0xc2, 0x55, 0xeb, 0x77, 0x3d, 0x90, 0x46, 0x62, 0xb5, 0xdf, 0xd8, 0xcd, 0x94, 0xea, 0xef, 0xd5, 0x7e, 0x5d, 0x4f, 0x2d, 0x14, 0x26, 0x8e, 0x1b, 0x8c, 0x4f, 0xbd, 0x4a, 0xc4, 0xe5, 0x08, 0x0f, 0x79, 0xd5, 0x3f, 0xd2, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_797 = { .name = "ecdsa_brainpoolp256r1_sha256_797", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_797_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_797_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_797_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 798 for ECDSA, tcId is 277 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_798_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_798_msg[] = { 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, 0x36, 0x36, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_798_sig[] = { 0x28, 0x7a, 0x88, 0xbd, 0xb5, 0x61, 0xfa, 0x27, 0x85, 0xca, 0x25, 0x86, 0x63, 0xf8, 0x6d, 0x3b, 0x07, 0xaa, 0xc9, 0x49, 0xf6, 0x47, 0xee, 0x57, 0x26, 0x21, 0xb0, 0xb7, 0x0e, 0xb3, 0xe9, 0xca, 0x4a, 0x6d, 0x79, 0x16, 0x41, 0x84, 0x43, 0xde, 0xb4, 0xc4, 0x3f, 0x5c, 0x69, 0xf6, 0x49, 0x09, 0x52, 0xcf, 0x53, 0xee, 0x69, 0xee, 0xc1, 0xac, 0x69, 0xe1, 0x44, 0xb8, 0xf9, 0xe2, 0x63, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_798 = { .name = "ecdsa_brainpoolp256r1_sha256_798", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_798_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_798_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_798_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 799 for ECDSA, tcId is 278 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_799_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_799_msg[] = { 0x34, 0x30, 0x30, 0x35, 0x33, 0x31, 0x34, 0x34, 0x30, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_799_sig[] = { 0x25, 0x0d, 0xb6, 0xa8, 0xb3, 0x81, 0x3b, 0x13, 0xb6, 0xfb, 0x7b, 0xf1, 0x98, 0x96, 0xf1, 0x3a, 0x50, 0x2b, 0xe4, 0x53, 0xc2, 0x04, 0xe6, 0xa8, 0x13, 0xa1, 0x64, 0xdb, 0xdd, 0x9c, 0x66, 0xca, 0x1d, 0x96, 0x68, 0x3a, 0xc9, 0x7f, 0x58, 0x74, 0xac, 0x95, 0x38, 0xb5, 0x7b, 0xf1, 0xea, 0xa5, 0x0a, 0x11, 0xa3, 0x3e, 0x9a, 0xbb, 0x82, 0x5d, 0x6b, 0x7a, 0x75, 0x46, 0xa6, 0x98, 0x60, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_799 = { .name = "ecdsa_brainpoolp256r1_sha256_799", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_799_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_799_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_799_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 800 for ECDSA, tcId is 279 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_800_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_800_msg[] = { 0x33, 0x30, 0x39, 0x36, 0x34, 0x35, 0x37, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_800_sig[] = { 0xa2, 0x9b, 0x2c, 0x4b, 0xe5, 0x0f, 0x17, 0x24, 0xa1, 0xce, 0x9a, 0xcd, 0x4c, 0x51, 0x29, 0xb3, 0x91, 0xb4, 0xb9, 0x00, 0x9a, 0xbb, 0x58, 0x23, 0x97, 0xa5, 0x22, 0xc7, 0x71, 0xd5, 0x4a, 0xbd, 0x0e, 0xc1, 0xd7, 0xae, 0xdb, 0xfe, 0x4e, 0x74, 0x3d, 0x76, 0x27, 0xea, 0x8d, 0x20, 0x7c, 0x24, 0x60, 0xae, 0x4c, 0x9f, 0x21, 0x34, 0xb0, 0xf8, 0x4a, 0x02, 0x55, 0x20, 0x5a, 0xc2, 0x34, 0x82, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_800 = { .name = "ecdsa_brainpoolp256r1_sha256_800", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_800_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_800_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_800_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 801 for ECDSA, tcId is 280 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_801_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_801_msg[] = { 0x32, 0x37, 0x38, 0x34, 0x30, 0x32, 0x35, 0x36, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_801_sig[] = { 0x14, 0x9f, 0x05, 0x08, 0xae, 0xf9, 0xfb, 0xcc, 0xf3, 0x2e, 0x1b, 0xd3, 0x19, 0x9d, 0x63, 0x02, 0x40, 0xbb, 0x65, 0x77, 0x59, 0x3e, 0x87, 0x56, 0x6b, 0x0a, 0x14, 0xa5, 0xb6, 0xf2, 0x09, 0x99, 0x5d, 0x37, 0xb4, 0x09, 0xc0, 0x1f, 0xb9, 0xb6, 0xcf, 0x4e, 0xa1, 0x44, 0x32, 0xc3, 0x56, 0x31, 0x69, 0x44, 0x02, 0xd2, 0x87, 0x5a, 0x30, 0x1d, 0x76, 0x1d, 0x81, 0x81, 0x14, 0x69, 0x62, 0x8d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_801 = { .name = "ecdsa_brainpoolp256r1_sha256_801", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_801_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_801_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_801_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 802 for ECDSA, tcId is 281 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_802_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_802_msg[] = { 0x32, 0x36, 0x31, 0x38, 0x37, 0x38, 0x37, 0x34, 0x31, 0x38, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_802_sig[] = { 0x6c, 0x9b, 0x11, 0x0d, 0x8e, 0x44, 0x53, 0xd8, 0x2e, 0xc5, 0x1a, 0x5a, 0x69, 0x1b, 0x15, 0x2e, 0xdf, 0x9f, 0xb1, 0xa9, 0x94, 0x7b, 0xd0, 0x01, 0xbe, 0xb2, 0x4d, 0x56, 0xf3, 0xbf, 0x27, 0xaf, 0x2a, 0x80, 0xbb, 0xd2, 0xf8, 0x27, 0xcc, 0x23, 0x15, 0x75, 0x26, 0xdf, 0x6e, 0xa4, 0xe0, 0xe3, 0x24, 0xb7, 0x65, 0xa5, 0x0b, 0xe7, 0x7f, 0x7e, 0x96, 0x67, 0x55, 0x8a, 0x16, 0x5e, 0xb6, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_802 = { .name = "ecdsa_brainpoolp256r1_sha256_802", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_802_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_802_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_802_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 803 for ECDSA, tcId is 282 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_803_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_803_msg[] = { 0x31, 0x36, 0x34, 0x32, 0x36, 0x32, 0x35, 0x32, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_803_sig[] = { 0x90, 0x86, 0xa5, 0xc9, 0x38, 0x23, 0xb1, 0xdf, 0x21, 0xf6, 0x39, 0x51, 0xed, 0x6e, 0x70, 0x7f, 0xba, 0x0d, 0x89, 0x9e, 0xef, 0x71, 0x11, 0x00, 0xe3, 0x2f, 0x2d, 0x60, 0x17, 0xda, 0x65, 0x90, 0x1f, 0x83, 0x1e, 0xd3, 0x0c, 0x12, 0x9d, 0xab, 0x42, 0x66, 0x27, 0x2e, 0x01, 0x28, 0x32, 0x10, 0xed, 0x82, 0x3c, 0x55, 0x90, 0x7a, 0xc5, 0xec, 0xda, 0x85, 0xd7, 0x0b, 0xd8, 0x02, 0x79, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_803 = { .name = "ecdsa_brainpoolp256r1_sha256_803", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_803_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_803_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_803_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 804 for ECDSA, tcId is 283 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_804_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_804_msg[] = { 0x36, 0x38, 0x32, 0x34, 0x31, 0x38, 0x39, 0x34, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_804_sig[] = { 0x2a, 0xf6, 0x35, 0x47, 0xdc, 0x5f, 0xfc, 0x8b, 0xa4, 0xd1, 0x68, 0xd3, 0x68, 0xd9, 0x22, 0x81, 0x32, 0xa0, 0xef, 0xa2, 0x0e, 0x32, 0x55, 0xc3, 0x32, 0x21, 0x9f, 0xec, 0xed, 0x80, 0x03, 0x95, 0x36, 0x42, 0xf5, 0x3c, 0xe9, 0x52, 0x1f, 0xab, 0x75, 0x4b, 0xe7, 0x71, 0x1f, 0x00, 0xaf, 0x78, 0x88, 0x22, 0x2b, 0xf2, 0xbb, 0xf1, 0xed, 0x89, 0x95, 0xe0, 0x3b, 0x55, 0xc9, 0x8a, 0x60, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_804 = { .name = "ecdsa_brainpoolp256r1_sha256_804", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_804_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_804_msg, .msglen = 10, .sig = ecdsa_brainpoolp256r1_sha256_804_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 805 for ECDSA, tcId is 284 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_805_pubkey[] = { 0x01, 0x9a, 0x2d, 0x96, 0x37, 0x74, 0x3a, 0x63, 0xdd, 0xae, 0xfd, 0xbc, 0xa0, 0xee, 0x22, 0x9a, 0x16, 0x3b, 0x80, 0x9b, 0x9b, 0x14, 0x5e, 0x53, 0x13, 0xbb, 0xeb, 0x8d, 0xef, 0xea, 0xb9, 0xd6, 0x54, 0x8c, 0xaf, 0x89, 0xbf, 0x5b, 0xa4, 0x94, 0x99, 0x40, 0x41, 0x45, 0x65, 0x12, 0x34, 0x33, 0x64, 0x01, 0xb9, 0xb2, 0x84, 0x3a, 0x57, 0x9e, 0xd1, 0x52, 0xe0, 0x90, 0xf1, 0x1b, 0x9e, 0x59, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_805_msg[] = { 0x34, 0x38, 0x34, 0x32, 0x34, 0x35, 0x34, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_805_sig[] = { 0x91, 0xe9, 0xac, 0xef, 0x9b, 0xc2, 0x8c, 0x91, 0x08, 0x91, 0xb8, 0x03, 0x20, 0xaf, 0x36, 0x03, 0xc4, 0x30, 0x61, 0x74, 0xf1, 0x7e, 0x97, 0x05, 0x92, 0x67, 0xfc, 0x81, 0x78, 0x14, 0xff, 0x1f, 0x7a, 0x9c, 0x83, 0x3b, 0xeb, 0x73, 0xbd, 0xd6, 0x2d, 0xf6, 0x49, 0x52, 0xb4, 0xc8, 0x48, 0xd2, 0x18, 0x0f, 0xae, 0x38, 0x5f, 0x80, 0x84, 0xf1, 0xfc, 0x5b, 0x1b, 0x1c, 0x64, 0x57, 0x50, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_805 = { .name = "ecdsa_brainpoolp256r1_sha256_805", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_805_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_805_msg, .msglen = 9, .sig = ecdsa_brainpoolp256r1_sha256_805_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 806 for ECDSA, tcId is 285 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_806_pubkey[] = { 0x4b, 0x40, 0x2a, 0x9a, 0xe1, 0x8f, 0xc1, 0xa8, 0x7c, 0xda, 0x33, 0x74, 0x83, 0x90, 0x04, 0x99, 0xfe, 0x72, 0x9e, 0x47, 0x16, 0x07, 0x67, 0x16, 0x51, 0xa2, 0x63, 0xfb, 0xf0, 0xd9, 0x3f, 0x78, 0x1e, 0xf9, 0xb0, 0xf9, 0x8f, 0xb7, 0x3b, 0xcb, 0x60, 0x5a, 0x78, 0x23, 0xa4, 0x27, 0xea, 0x5f, 0x0d, 0x98, 0x78, 0x8c, 0x7d, 0xae, 0x42, 0xa0, 0x45, 0x36, 0x20, 0x20, 0x22, 0xc0, 0x21, 0xcd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_806_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_806_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe2, 0x02, 0x7b, 0x80, 0x1f, 0xc4, 0x79, 0x30, 0x8f, 0xf5, 0x39, 0x9a, 0x88, 0x25, 0xfc, 0xcf, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_806 = { .name = "ecdsa_brainpoolp256r1_sha256_806", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_806_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_806_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_806_sig, .siglen = 64, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 285 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 807 for ECDSA, tcId is 286 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_807_pubkey[] = { 0x4b, 0x40, 0x2a, 0x9a, 0xe1, 0x8f, 0xc1, 0xa8, 0x7c, 0xda, 0x33, 0x74, 0x83, 0x90, 0x04, 0x99, 0xfe, 0x72, 0x9e, 0x47, 0x16, 0x07, 0x67, 0x16, 0x51, 0xa2, 0x63, 0xfb, 0xf0, 0xd9, 0x3f, 0x78, 0x1e, 0xf9, 0xb0, 0xf9, 0x8f, 0xb7, 0x3b, 0xcb, 0x60, 0x5a, 0x78, 0x23, 0xa4, 0x27, 0xea, 0x5f, 0x0d, 0x98, 0x78, 0x8c, 0x7d, 0xae, 0x42, 0xa0, 0x45, 0x36, 0x20, 0x20, 0x22, 0xc0, 0x21, 0xcd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_807_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_807_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x76, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_807 = { .name = "ecdsa_brainpoolp256r1_sha256_807", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_807_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_807_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_807_sig, .siglen = 64, .result = -1, .comment = "r too large, tcId is 286 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 808 for ECDSA, tcId is 287 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_808_pubkey[] = { 0x40, 0xa2, 0xdf, 0x0f, 0x17, 0xc7, 0x87, 0x34, 0x59, 0xd5, 0xe9, 0xac, 0x11, 0xff, 0xf8, 0x4d, 0xeb, 0x5f, 0x40, 0xff, 0x9a, 0x52, 0xdf, 0x87, 0x45, 0xbb, 0x47, 0x70, 0xf6, 0xdb, 0xf5, 0x81, 0x99, 0xc2, 0xbf, 0x49, 0x20, 0xe9, 0xc8, 0xf7, 0x58, 0xc2, 0xde, 0x69, 0xe4, 0x2c, 0x1c, 0xb7, 0x7c, 0x58, 0x42, 0x5a, 0x9d, 0xaf, 0xa4, 0x1d, 0x7b, 0x08, 0x73, 0xef, 0xa8, 0x94, 0xce, 0xdc, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_808_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_808_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa3, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_808 = { .name = "ecdsa_brainpoolp256r1_sha256_808", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_808_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_808_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_808_sig, .siglen = 64, .result = 1, .comment = "r,s are large, tcId is 287 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 809 for ECDSA, tcId is 288 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_809_pubkey[] = { 0x9d, 0xe6, 0x69, 0xf9, 0x44, 0x4d, 0xa8, 0x2e, 0x42, 0x9f, 0x84, 0x2f, 0x31, 0xc6, 0x44, 0x18, 0xd4, 0xd7, 0xb0, 0x5e, 0x93, 0xf4, 0x1d, 0xad, 0xdd, 0x09, 0xfc, 0x18, 0x1a, 0xc2, 0x27, 0xc6, 0x1c, 0x86, 0x21, 0x0e, 0x82, 0x91, 0xfc, 0x5a, 0xe3, 0x0c, 0x72, 0xe2, 0x01, 0x3e, 0xc2, 0x2b, 0xb9, 0x7d, 0x88, 0xbf, 0x37, 0x6d, 0x4a, 0x85, 0xdd, 0x1b, 0xb7, 0x1b, 0x22, 0x52, 0x6d, 0x1f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_809_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_809_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x4a, 0xb8, 0xde, 0x0a, 0x51, 0x48, 0x1b, 0xc4, 0x57, 0x94, 0xb9, 0x24, 0x51, 0x8f, 0x2d, 0xd6, 0xac, 0x5c, 0xce, 0x31, 0xf3, 0x22, 0x8d, 0x62, 0x4c, 0x5a, 0x89, 0x6f, 0x79, 0xa2, 0xd6, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_809 = { .name = "ecdsa_brainpoolp256r1_sha256_809", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_809_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_809_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_809_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 288 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 810 for ECDSA, tcId is 289 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_810_pubkey[] = { 0x30, 0x34, 0x5b, 0x64, 0x51, 0x37, 0x7b, 0x78, 0xa5, 0x4a, 0xc6, 0xe1, 0x10, 0xf5, 0x0c, 0x7d, 0xe7, 0x1c, 0x2c, 0x76, 0x02, 0x78, 0x37, 0x36, 0x07, 0x72, 0x2c, 0x53, 0xf5, 0x86, 0x79, 0x07, 0x59, 0xac, 0xc4, 0x00, 0x14, 0xc9, 0x3d, 0x4a, 0xd4, 0x47, 0x78, 0xbc, 0x1a, 0x44, 0xeb, 0xae, 0xbe, 0x1a, 0x97, 0xc8, 0x8a, 0xd1, 0x1c, 0x10, 0x25, 0x05, 0x7b, 0x6b, 0xc4, 0x37, 0x7f, 0x2d, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_810_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_810_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x1b, 0x5f, 0x89, 0xf5, 0xbb, 0x74, 0xca, 0xa4, 0x2d, 0x36, 0xe6, 0x01, 0xa9, 0xf3, 0xc2, 0x0b, 0x4e, 0x6c, 0x91, 0xce, 0xb9, 0x8a, 0x52, 0xfb, 0xfa, 0x9f, 0x81, 0x78, 0x1b, 0x8a, 0x17, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_810 = { .name = "ecdsa_brainpoolp256r1_sha256_810", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_810_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_810_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_810_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 289 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 811 for ECDSA, tcId is 290 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_811_pubkey[] = { 0x14, 0x9d, 0x89, 0x3f, 0x13, 0x06, 0xfb, 0x25, 0x3b, 0xbf, 0x3a, 0x86, 0x91, 0xab, 0xa8, 0xa5, 0x00, 0x02, 0xb0, 0xa2, 0x76, 0x93, 0xaa, 0x97, 0x43, 0x5a, 0x7b, 0x5c, 0xb3, 0x3a, 0x55, 0xee, 0x24, 0xb0, 0x75, 0xfc, 0xdb, 0xc1, 0xa7, 0x39, 0xf2, 0xf4, 0x92, 0xdb, 0xe4, 0x79, 0x94, 0x74, 0xee, 0x3a, 0xd3, 0x80, 0x44, 0x47, 0xe7, 0xd5, 0x84, 0xe3, 0x43, 0x0c, 0xe1, 0x5a, 0x96, 0x8a, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_811_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_811_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_811 = { .name = "ecdsa_brainpoolp256r1_sha256_811", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_811_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_811_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_811_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 290 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 812 for ECDSA, tcId is 291 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_812_pubkey[] = { 0x15, 0x6e, 0x62, 0x66, 0x49, 0xce, 0x82, 0x36, 0x98, 0x22, 0x01, 0xa2, 0x49, 0x35, 0xfb, 0x3d, 0x36, 0xb0, 0xd7, 0x30, 0x41, 0xb6, 0xfd, 0xca, 0x97, 0x99, 0x0a, 0x8d, 0x15, 0x2e, 0xfb, 0x8b, 0x32, 0x6f, 0x4b, 0x20, 0xa0, 0xcc, 0x46, 0x23, 0xb0, 0x2a, 0x6b, 0xb1, 0x71, 0x14, 0x90, 0x1a, 0x01, 0xde, 0x0d, 0xf1, 0x71, 0x6d, 0x66, 0x9d, 0x25, 0x3d, 0xe4, 0x40, 0xcc, 0x8f, 0x9c, 0xdd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_812_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_812_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_812 = { .name = "ecdsa_brainpoolp256r1_sha256_812", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_812_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_812_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_812_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 291 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 813 for ECDSA, tcId is 292 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_813_pubkey[] = { 0x10, 0xcc, 0x79, 0x92, 0xed, 0xe2, 0x8c, 0x7b, 0x4d, 0xda, 0x5c, 0x35, 0xcb, 0xd7, 0x11, 0x74, 0x91, 0x8e, 0x83, 0xad, 0xab, 0x03, 0x42, 0xcc, 0x3d, 0x55, 0x6a, 0x41, 0x3b, 0x4c, 0xe9, 0x3b, 0x3f, 0x9c, 0x3b, 0x38, 0xae, 0xf0, 0xa0, 0xe6, 0x87, 0xd7, 0xee, 0x6a, 0xfd, 0xe7, 0x0d, 0x47, 0xd6, 0x90, 0x0f, 0xf0, 0xce, 0x62, 0x15, 0x6e, 0x86, 0x45, 0xb8, 0x10, 0x3f, 0xc6, 0x6c, 0xad, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_813_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_813_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_813 = { .name = "ecdsa_brainpoolp256r1_sha256_813", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_813_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_813_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_813_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 292 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 814 for ECDSA, tcId is 293 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_814_pubkey[] = { 0x10, 0xcc, 0x79, 0x92, 0xed, 0xe2, 0x8c, 0x7b, 0x4d, 0xda, 0x5c, 0x35, 0xcb, 0xd7, 0x11, 0x74, 0x91, 0x8e, 0x83, 0xad, 0xab, 0x03, 0x42, 0xcc, 0x3d, 0x55, 0x6a, 0x41, 0x3b, 0x4c, 0xe9, 0x3b, 0x3f, 0x9c, 0x3b, 0x38, 0xae, 0xf0, 0xa0, 0xe6, 0x87, 0xd7, 0xee, 0x6a, 0xfd, 0xe7, 0x0d, 0x47, 0xd6, 0x90, 0x0f, 0xf0, 0xce, 0x62, 0x15, 0x6e, 0x86, 0x45, 0xb8, 0x10, 0x3f, 0xc6, 0x6c, 0xad, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_814_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_814_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_814 = { .name = "ecdsa_brainpoolp256r1_sha256_814", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_814_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_814_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_814_sig, .siglen = 64, .result = -1, .comment = "r is larger than n, tcId is 293 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 815 for ECDSA, tcId is 294 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_815_pubkey[] = { 0x2b, 0xa2, 0x8f, 0x62, 0x36, 0xc5, 0xa7, 0x74, 0xcd, 0x10, 0x4b, 0x03, 0x6d, 0x2e, 0x01, 0x67, 0x11, 0xcb, 0x4a, 0x83, 0xfa, 0x07, 0x8b, 0x51, 0x50, 0xf6, 0x9e, 0x50, 0x98, 0xde, 0x7b, 0x4c, 0xa7, 0xc1, 0x3e, 0xf8, 0xc5, 0x7f, 0xcb, 0xe6, 0x84, 0xce, 0xff, 0x31, 0x2e, 0xf5, 0x3a, 0xf1, 0xb1, 0x43, 0x97, 0xd4, 0x15, 0x4b, 0xa6, 0x10, 0x6a, 0x33, 0x83, 0xaa, 0xed, 0x16, 0xec, 0xb1, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_815_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_815_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x5b, 0x2d, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_815 = { .name = "ecdsa_brainpoolp256r1_sha256_815", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_815_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_815_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_815_sig, .siglen = 64, .result = -1, .comment = "s is larger than n, tcId is 294 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 816 for ECDSA, tcId is 295 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_816_pubkey[] = { 0x11, 0x34, 0x89, 0x55, 0x5b, 0xdc, 0x11, 0x23, 0x52, 0xb0, 0x8b, 0x7f, 0xfe, 0xbc, 0xf0, 0x50, 0x90, 0xf9, 0x4d, 0xa6, 0x23, 0x67, 0x64, 0x6b, 0x2e, 0x03, 0xa3, 0x47, 0x88, 0x63, 0x91, 0x4b, 0x4b, 0x4a, 0x0a, 0x43, 0x54, 0x62, 0xa1, 0x22, 0xf6, 0xd9, 0xac, 0x80, 0x13, 0x19, 0xbb, 0xc6, 0xd2, 0xc5, 0x92, 0x28, 0x86, 0x1a, 0x34, 0x14, 0xb5, 0x00, 0xe5, 0xcf, 0x59, 0x43, 0xc9, 0x64, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_816_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_816_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x28, 0x27, 0x37, 0x05, 0x84, 0xfd, 0xeb, 0x9f, 0x5d, 0x5a, 0x9f, 0xb9, 0x57, 0x9a, 0x09, 0x39, 0x0e, 0xfb, 0x6f, 0x9d, 0x99, 0xb6, 0x4f, 0xc1, 0x88, 0xd8, 0xbc, 0xe0, 0x5c, 0x2d, 0x4e, 0xed, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_816 = { .name = "ecdsa_brainpoolp256r1_sha256_816", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_816_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_816_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_816_sig, .siglen = 64, .result = 1, .comment = "small r and s^-1, tcId is 295 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 817 for ECDSA, tcId is 296 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_817_pubkey[] = { 0x34, 0x22, 0x47, 0x46, 0xef, 0xa8, 0xc5, 0xd4, 0xf4, 0xc6, 0xb8, 0x2d, 0xe4, 0xd7, 0x6d, 0x3e, 0x71, 0x50, 0xc1, 0xb6, 0x9e, 0x23, 0x33, 0x9f, 0x09, 0x8f, 0xf7, 0x69, 0xbc, 0xac, 0x94, 0xbf, 0x94, 0x61, 0x8e, 0x36, 0x24, 0xa5, 0x7d, 0x48, 0xd1, 0x9e, 0x72, 0x86, 0x7d, 0xbc, 0x19, 0x1a, 0x0f, 0xd0, 0x5c, 0xf6, 0xf4, 0xb5, 0xec, 0x49, 0x7b, 0x79, 0x76, 0x26, 0xa5, 0x7b, 0xaa, 0x22, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_817_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_817_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xce, 0x49, 0x37, 0xa0, 0x87, 0x73, 0x1d, 0xf4, 0xfe, 0xbc, 0x2c, 0x3a, 0x81, 0xdd, 0xfb, 0xab, 0x5d, 0xc3, 0xaf, 0x95, 0x08, 0x17, 0xf4, 0x1b, 0x59, 0x0d, 0x15, 0x6e, 0xd4, 0x09, 0xad, 0x28, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_817 = { .name = "ecdsa_brainpoolp256r1_sha256_817", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_817_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_817_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_817_sig, .siglen = 64, .result = 1, .comment = "smallish r and s^-1, tcId is 296 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 818 for ECDSA, tcId is 297 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_818_pubkey[] = { 0x6f, 0xb0, 0xcd, 0xf3, 0xb0, 0x8d, 0xc5, 0xd8, 0xb7, 0xe5, 0x25, 0x9c, 0x7d, 0x1b, 0xbd, 0x31, 0xa2, 0x23, 0x53, 0x45, 0xb7, 0xb4, 0x45, 0x63, 0x1e, 0x89, 0x4b, 0x56, 0x7d, 0x23, 0xc0, 0x79, 0x53, 0x24, 0x32, 0x07, 0xdf, 0x5c, 0x44, 0x60, 0x11, 0xc1, 0xcf, 0xed, 0xde, 0x6e, 0x53, 0x51, 0x95, 0x8a, 0xff, 0xa8, 0xf2, 0x74, 0xfe, 0x5a, 0xf4, 0x35, 0x75, 0x9d, 0xe8, 0x7d, 0xb3, 0x43, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_818_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_818_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x91, 0x82, 0x7d, 0x03, 0xbb, 0x6d, 0xac, 0x31, 0x94, 0x0b, 0xa5, 0x6e, 0xd8, 0x84, 0x89, 0x04, 0x8f, 0xf1, 0x73, 0xf0, 0xbf, 0x20, 0xca, 0xb2, 0x0d, 0xcc, 0x08, 0x6f, 0xca, 0x37, 0xf2, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_818 = { .name = "ecdsa_brainpoolp256r1_sha256_818", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_818_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_818_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_818_sig, .siglen = 64, .result = 1, .comment = "100-bit r and small s^-1, tcId is 297 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 819 for ECDSA, tcId is 298 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_819_pubkey[] = { 0x0b, 0x8d, 0x3b, 0xef, 0x12, 0xeb, 0xab, 0x43, 0xf2, 0xf6, 0xf6, 0x61, 0x8f, 0x08, 0x43, 0xd5, 0xf4, 0x5d, 0x97, 0x87, 0x4f, 0x26, 0xf9, 0xa3, 0x6b, 0x78, 0x8c, 0xb7, 0xa6, 0x9e, 0xcf, 0x5f, 0x85, 0x55, 0x88, 0xc9, 0x9b, 0x38, 0x39, 0xca, 0x93, 0x61, 0xdd, 0xc7, 0x76, 0x45, 0xf7, 0x59, 0x2a, 0xd3, 0x71, 0x43, 0x8e, 0xe3, 0xe1, 0x86, 0xc7, 0x40, 0x81, 0xc4, 0x81, 0xdd, 0x52, 0x95, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_819_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_819_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x3e, 0xb3, 0x5f, 0xe7, 0xe8, 0x33, 0x1f, 0x71, 0xe4, 0xc6, 0x3b, 0x45, 0xf3, 0x49, 0xa9, 0x9d, 0x47, 0xa5, 0xe7, 0x81, 0x79, 0x8e, 0x57, 0x9f, 0x23, 0x86, 0x19, 0x5d, 0x38, 0x27, 0xbb, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_819 = { .name = "ecdsa_brainpoolp256r1_sha256_819", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_819_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_819_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_819_sig, .siglen = 64, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 298 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 820 for ECDSA, tcId is 299 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_820_pubkey[] = { 0x6d, 0x24, 0x98, 0x53, 0x42, 0xa4, 0x5a, 0x55, 0xfd, 0x99, 0xe4, 0x75, 0x21, 0xfe, 0x3e, 0x99, 0x1b, 0x8a, 0x1d, 0x37, 0x6f, 0xa7, 0x38, 0x99, 0xd3, 0xba, 0xcc, 0x06, 0x7c, 0x12, 0xee, 0x0d, 0x65, 0x42, 0xf1, 0x48, 0x59, 0x9f, 0xcc, 0xb9, 0x9b, 0x1b, 0xa2, 0x8d, 0x38, 0x05, 0x81, 0x42, 0x92, 0xa9, 0x9b, 0xff, 0xe3, 0x71, 0xdf, 0x27, 0x7b, 0x09, 0xe8, 0xad, 0xa1, 0x25, 0x3d, 0xcd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_820_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_820_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x25, 0x3e, 0xb3, 0x5f, 0xe7, 0xe8, 0x33, 0x1f, 0x71, 0xe4, 0xc6, 0x3b, 0x45, 0xf3, 0x49, 0xa9, 0x9d, 0x47, 0xa5, 0xe7, 0x81, 0x79, 0x8e, 0x57, 0x9f, 0x23, 0x86, 0x19, 0x5d, 0x38, 0x27, 0xbb, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_820 = { .name = "ecdsa_brainpoolp256r1_sha256_820", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_820_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_820_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_820_sig, .siglen = 64, .result = 1, .comment = "100-bit r and s^-1, tcId is 299 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 821 for ECDSA, tcId is 300 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_821_pubkey[] = { 0x41, 0x25, 0xe4, 0x68, 0x20, 0xf4, 0x12, 0x06, 0xb6, 0x70, 0x88, 0x2a, 0x9d, 0x8d, 0x51, 0xb6, 0xba, 0xc3, 0x90, 0x91, 0x15, 0x0c, 0x9c, 0xb3, 0x3b, 0x6d, 0x00, 0x9e, 0x0c, 0xff, 0x52, 0x23, 0x65, 0x74, 0x92, 0x40, 0x62, 0x2b, 0x40, 0xd7, 0x0a, 0x63, 0x40, 0x79, 0x52, 0xc1, 0xb8, 0x76, 0x1c, 0x9f, 0x8e, 0x85, 0xab, 0xa6, 0xf0, 0x3b, 0xbc, 0x72, 0x19, 0xe2, 0x4e, 0x6f, 0xb2, 0x76, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_821_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_821_sig[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0x28, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_821 = { .name = "ecdsa_brainpoolp256r1_sha256_821", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_821_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_821_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_821_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 are close to n, tcId is 300 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 822 for ECDSA, tcId is 301 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_822_pubkey[] = { 0x91, 0xba, 0x17, 0x06, 0xa1, 0x9c, 0xe5, 0x8f, 0xac, 0xa2, 0x63, 0x66, 0xdc, 0xed, 0x29, 0x33, 0x99, 0x45, 0x0e, 0xfa, 0x48, 0x8f, 0x2c, 0x4b, 0xaa, 0x95, 0x69, 0x3b, 0x97, 0x4d, 0x07, 0x5d, 0x5e, 0x84, 0x01, 0x56, 0x5a, 0x37, 0xb0, 0x5b, 0x93, 0x51, 0xe4, 0x08, 0xaf, 0x54, 0x2b, 0xf0, 0xf7, 0x95, 0x7e, 0x5e, 0xed, 0x18, 0x2a, 0xfe, 0xab, 0xea, 0xfa, 0x2b, 0xf7, 0xbb, 0xbb, 0x47, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_822_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_822_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_822 = { .name = "ecdsa_brainpoolp256r1_sha256_822", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_822_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_822_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_822_sig, .siglen = 64, .result = 1, .comment = "s == 1, tcId is 301 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 823 for ECDSA, tcId is 302 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_823_pubkey[] = { 0x91, 0xba, 0x17, 0x06, 0xa1, 0x9c, 0xe5, 0x8f, 0xac, 0xa2, 0x63, 0x66, 0xdc, 0xed, 0x29, 0x33, 0x99, 0x45, 0x0e, 0xfa, 0x48, 0x8f, 0x2c, 0x4b, 0xaa, 0x95, 0x69, 0x3b, 0x97, 0x4d, 0x07, 0x5d, 0x5e, 0x84, 0x01, 0x56, 0x5a, 0x37, 0xb0, 0x5b, 0x93, 0x51, 0xe4, 0x08, 0xaf, 0x54, 0x2b, 0xf0, 0xf7, 0x95, 0x7e, 0x5e, 0xed, 0x18, 0x2a, 0xfe, 0xab, 0xea, 0xfa, 0x2b, 0xf7, 0xbb, 0xbb, 0x47, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_823_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_823_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_823 = { .name = "ecdsa_brainpoolp256r1_sha256_823", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_823_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_823_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_823_sig, .siglen = 64, .result = -1, .comment = "s == 0, tcId is 302 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 824 for ECDSA, tcId is 303 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_824_pubkey[] = { 0x25, 0xd1, 0x75, 0x70, 0xe4, 0xba, 0xe1, 0xe4, 0x68, 0xe6, 0xdd, 0x09, 0x75, 0xb3, 0x82, 0x36, 0x80, 0x61, 0xe0, 0xc7, 0x04, 0x24, 0x1c, 0x1d, 0x18, 0xfd, 0x5b, 0xaa, 0x8c, 0xa8, 0xdc, 0x13, 0x5a, 0xca, 0xdc, 0xd1, 0x39, 0x92, 0xf6, 0x66, 0x5b, 0x46, 0x9c, 0x9f, 0x9a, 0xb7, 0x79, 0x7e, 0x3c, 0x4b, 0x88, 0x1c, 0x6d, 0x7f, 0x4d, 0x26, 0x01, 0xc9, 0x6a, 0x15, 0x36, 0xf7, 0x6d, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_824_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_824_sig[] = { 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_824 = { .name = "ecdsa_brainpoolp256r1_sha256_824", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_824_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_824_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_824_sig, .siglen = 64, .result = -1, .comment = "point at infinity during verify, tcId is 303 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 825 for ECDSA, tcId is 304 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_825_pubkey[] = { 0x1d, 0xc3, 0x32, 0x5f, 0xfa, 0x55, 0xe1, 0x79, 0xe2, 0x17, 0x1a, 0x66, 0xb2, 0xe7, 0x53, 0x4a, 0xe1, 0x2c, 0xfc, 0x29, 0x2a, 0xf2, 0xe0, 0xfb, 0xf1, 0xc3, 0xfc, 0xce, 0x55, 0x58, 0xfc, 0x6a, 0x24, 0x20, 0xab, 0xcd, 0xb7, 0xdf, 0x8c, 0xf3, 0x86, 0x34, 0x64, 0x82, 0x64, 0xa6, 0x81, 0xd5, 0xed, 0x19, 0x5b, 0xf1, 0x6a, 0x97, 0x0f, 0xfa, 0x68, 0xab, 0x25, 0x0b, 0x34, 0xa9, 0x35, 0x14, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_825_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_825_sig[] = { 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_825 = { .name = "ecdsa_brainpoolp256r1_sha256_825", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_825_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_825_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_825_sig, .siglen = 64, .result = 1, .comment = "edge case for signature malleability, tcId is 304 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 826 for ECDSA, tcId is 305 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_826_pubkey[] = { 0x3f, 0xff, 0xa6, 0xdb, 0xaf, 0x66, 0x7b, 0x0a, 0x94, 0xe5, 0xf8, 0x6b, 0x37, 0x74, 0xb9, 0x75, 0x97, 0x1a, 0x4d, 0x24, 0x39, 0x60, 0x7d, 0xef, 0x4e, 0x5d, 0xe1, 0xd1, 0x78, 0x20, 0xa3, 0xb2, 0x1b, 0xf3, 0x66, 0x13, 0xb5, 0x0b, 0x92, 0x52, 0x64, 0x55, 0x18, 0x15, 0xc5, 0xda, 0x78, 0x3b, 0xd1, 0x58, 0xaa, 0xa1, 0xc6, 0x24, 0x4b, 0x40, 0xa9, 0xfa, 0x31, 0xa2, 0xa4, 0x33, 0xf8, 0xe8, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_826_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_826_sig[] = { 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x53, 0x54, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_826 = { .name = "ecdsa_brainpoolp256r1_sha256_826", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_826_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_826_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_826_sig, .siglen = 64, .result = 1, .comment = "edge case for signature malleability, tcId is 305 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 827 for ECDSA, tcId is 306 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_827_pubkey[] = { 0x8a, 0xfd, 0x47, 0xeb, 0x06, 0x67, 0x86, 0x0b, 0xec, 0x98, 0xd5, 0xdc, 0xd2, 0xf6, 0x0d, 0xa9, 0xea, 0xc1, 0xae, 0x99, 0x62, 0x05, 0x69, 0x89, 0x2f, 0x14, 0xe0, 0x94, 0xd6, 0x35, 0x87, 0x2a, 0x5e, 0x8f, 0x0b, 0xc6, 0x7b, 0x98, 0xa2, 0x33, 0xad, 0xe7, 0x15, 0xc0, 0x4d, 0x9d, 0xaa, 0xb1, 0x1a, 0x27, 0x51, 0x7a, 0x92, 0xcf, 0x26, 0x51, 0xc9, 0xe5, 0xf2, 0xfd, 0xe4, 0xe2, 0xdb, 0x98, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_827_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_827_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_827 = { .name = "ecdsa_brainpoolp256r1_sha256_827", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_827_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_827_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_827_sig, .siglen = 64, .result = -1, .comment = "u1 == 1, tcId is 306 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 828 for ECDSA, tcId is 307 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_828_pubkey[] = { 0x08, 0x76, 0x61, 0x66, 0x36, 0xa8, 0xdb, 0xc8, 0x21, 0x60, 0xac, 0x01, 0xaf, 0x29, 0x41, 0x35, 0x3b, 0xa0, 0xee, 0xa4, 0xa3, 0xb8, 0xfe, 0x31, 0x69, 0x6b, 0x47, 0x31, 0x7d, 0x49, 0x72, 0xc9, 0x23, 0x18, 0x00, 0x73, 0x06, 0x1d, 0x27, 0x98, 0x4e, 0xcf, 0x49, 0x1f, 0x39, 0x40, 0x04, 0xc3, 0xa4, 0x84, 0x6d, 0x77, 0x3f, 0x58, 0xdc, 0x2a, 0xb5, 0xe4, 0x3d, 0xcb, 0xf9, 0x68, 0xd0, 0x27, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_828_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_828_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x98, 0x9c, 0x5c, 0xc3, 0x14, 0x40, 0xc1, 0x16, 0x8f, 0x88, 0xb3, 0x2b, 0xa6, 0xe4, 0x79, 0x00, 0x18, 0x3c, 0x0d, 0x84, 0x3f, 0x9c, 0x41, 0x67, 0x18, 0x98, 0x03, 0x06, 0x64, 0x30, 0x5d, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_828 = { .name = "ecdsa_brainpoolp256r1_sha256_828", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_828_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_828_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_828_sig, .siglen = 64, .result = 1, .comment = "u1 == n - 1, tcId is 307 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 829 for ECDSA, tcId is 308 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_829_pubkey[] = { 0x0f, 0xab, 0xb0, 0x52, 0x21, 0x7e, 0xae, 0x8e, 0x63, 0xfe, 0xa4, 0xee, 0xa0, 0x99, 0x53, 0xd5, 0x18, 0x62, 0x42, 0x7f, 0x34, 0x13, 0x07, 0xd8, 0x19, 0xff, 0x6e, 0x93, 0x3b, 0xf7, 0x2b, 0xa9, 0x4b, 0x89, 0x7f, 0x2c, 0x4a, 0x4c, 0xf5, 0x70, 0x54, 0xc3, 0x63, 0xc7, 0x20, 0xda, 0x3d, 0x24, 0x24, 0x71, 0xcc, 0x8e, 0x49, 0x3b, 0xec, 0xb0, 0xde, 0x02, 0x22, 0x51, 0xd2, 0xee, 0x4c, 0x8c, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_829_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_829_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_829 = { .name = "ecdsa_brainpoolp256r1_sha256_829", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_829_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_829_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_829_sig, .siglen = 64, .result = 1, .comment = "u2 == 1, tcId is 308 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 830 for ECDSA, tcId is 309 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_830_pubkey[] = { 0x72, 0xeb, 0xad, 0x74, 0x9b, 0x50, 0x4c, 0x87, 0x4d, 0x21, 0xbc, 0x5e, 0x4b, 0xba, 0x54, 0x5d, 0xd4, 0x2e, 0xb5, 0xfb, 0xf7, 0x8a, 0xf4, 0x20, 0x43, 0xf5, 0xce, 0xf1, 0x0a, 0xeb, 0x3a, 0xd7, 0x45, 0x22, 0x74, 0x64, 0xe1, 0xe9, 0xce, 0xf6, 0x62, 0xf4, 0x3f, 0xc8, 0x0d, 0x4c, 0xe7, 0xeb, 0x7e, 0xb6, 0x15, 0xa2, 0x36, 0x99, 0xd4, 0x8e, 0x89, 0xb2, 0x78, 0xab, 0xd4, 0x6c, 0xcc, 0x46, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_830_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_830_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x71, 0x52, 0x3a, 0x92, 0x6b, 0xf4, 0x71, 0x28, 0x29, 0x99, 0x5c, 0x60, 0x69, 0x02, 0x5e, 0x4b, 0xb2, 0xd0, 0xfc, 0x6d, 0x23, 0x96, 0x6f, 0x4f, 0xb5, 0x69, 0x5f, 0x01, 0xba, 0x30, 0x39, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_830 = { .name = "ecdsa_brainpoolp256r1_sha256_830", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_830_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_830_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_830_sig, .siglen = 64, .result = 1, .comment = "u2 == n - 1, tcId is 309 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 831 for ECDSA, tcId is 310 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_831_pubkey[] = { 0x74, 0x4e, 0x21, 0x8a, 0x04, 0xb3, 0x14, 0x71, 0xb0, 0x5e, 0x67, 0x9c, 0x94, 0x81, 0x44, 0x6b, 0xcd, 0x72, 0xa4, 0xd0, 0xfc, 0xa7, 0xa7, 0xaf, 0x1a, 0x1f, 0xe2, 0xf5, 0x74, 0xd9, 0x36, 0x2f, 0x60, 0xc0, 0xc5, 0x28, 0x43, 0xd8, 0xd7, 0x2c, 0xd6, 0x36, 0x15, 0x3f, 0x0f, 0x51, 0x0a, 0x09, 0x08, 0x9f, 0xc4, 0x47, 0x83, 0x72, 0xdf, 0xc5, 0x0e, 0x5b, 0x91, 0xd5, 0x30, 0x1b, 0xa7, 0x5e, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_831_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_831_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x05, 0xca, 0x53, 0xb2, 0xd9, 0xe4, 0xa2, 0xe1, 0xe4, 0xf4, 0x72, 0x76, 0xfc, 0xdf, 0xb1, 0x7b, 0x26, 0xa9, 0xcf, 0x0a, 0x7c, 0x97, 0x21, 0xda, 0xd2, 0x82, 0x03, 0xd4, 0x11, 0x07, 0xfd, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_831 = { .name = "ecdsa_brainpoolp256r1_sha256_831", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_831_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_831_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_831_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 310 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 832 for ECDSA, tcId is 311 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_832_pubkey[] = { 0x7e, 0xa5, 0x3d, 0x3c, 0x46, 0x35, 0xa4, 0xd5, 0xb6, 0x0d, 0x79, 0xaa, 0xc7, 0x9d, 0x97, 0x4c, 0x75, 0x92, 0x63, 0x36, 0x34, 0x72, 0x14, 0x6a, 0x46, 0x05, 0x28, 0x0d, 0x93, 0x5f, 0xfc, 0x75, 0x59, 0x79, 0x04, 0x03, 0xc9, 0x64, 0x59, 0xb2, 0x04, 0x77, 0xea, 0xa4, 0x37, 0xb3, 0xc7, 0xde, 0xcd, 0x5e, 0x69, 0x0f, 0xaa, 0x94, 0x0c, 0x08, 0x91, 0xde, 0x0c, 0xd0, 0x7d, 0x41, 0x81, 0x3c, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_832_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_832_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x54, 0x48, 0xaa, 0x82, 0xfc, 0x57, 0x74, 0x0b, 0x2e, 0x1e, 0xbd, 0xf9, 0x89, 0xba, 0xa1, 0x45, 0xb0, 0x18, 0xb4, 0x23, 0xb3, 0x76, 0x1f, 0xeb, 0x05, 0x59, 0x59, 0xeb, 0x6a, 0x01, 0xf1, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_832 = { .name = "ecdsa_brainpoolp256r1_sha256_832", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_832_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_832_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_832_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 311 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 833 for ECDSA, tcId is 312 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_833_pubkey[] = { 0x75, 0x04, 0x62, 0xa1, 0x63, 0x65, 0x57, 0x46, 0xaf, 0x66, 0xba, 0x3e, 0xb4, 0x80, 0x09, 0xa4, 0x90, 0xd9, 0x70, 0x79, 0x92, 0x80, 0x58, 0x6c, 0xfe, 0x59, 0x31, 0x63, 0x65, 0xdc, 0x4e, 0xf0, 0xa2, 0xf1, 0x56, 0x72, 0x57, 0xbd, 0x9a, 0xa1, 0xdc, 0xca, 0x3c, 0xd2, 0x76, 0xff, 0xae, 0xb1, 0xdd, 0x85, 0xce, 0xa2, 0x8d, 0x88, 0x8a, 0x98, 0x64, 0x2b, 0xf0, 0x9a, 0x98, 0xf6, 0x9f, 0x11, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_833_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_833_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x65, 0xbf, 0xcc, 0xe6, 0x9b, 0x89, 0xef, 0xf5, 0x45, 0xfb, 0x0a, 0x67, 0xd2, 0x58, 0x1a, 0x5f, 0x25, 0x34, 0x84, 0xef, 0x53, 0x8b, 0x9b, 0x55, 0xfa, 0x86, 0x2d, 0xfd, 0x2d, 0x48, 0x8d, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_833 = { .name = "ecdsa_brainpoolp256r1_sha256_833", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_833_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_833_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_833_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 312 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 834 for ECDSA, tcId is 313 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_834_pubkey[] = { 0x32, 0x3a, 0xe5, 0x75, 0x4b, 0x41, 0x75, 0x52, 0xcf, 0x96, 0x8f, 0x5f, 0x3e, 0xea, 0x71, 0x87, 0xf7, 0xb1, 0x72, 0x6e, 0x8c, 0x2e, 0x51, 0x0f, 0x98, 0xd2, 0x64, 0x30, 0xac, 0x58, 0x49, 0xbc, 0x32, 0x71, 0x01, 0xd8, 0x2a, 0xdf, 0x87, 0xc9, 0x32, 0xe8, 0xea, 0xa6, 0xa5, 0x7e, 0x1d, 0x11, 0xbd, 0x65, 0xdc, 0x8f, 0x40, 0x4c, 0x11, 0x3f, 0x65, 0xab, 0xaa, 0x6e, 0xea, 0xf5, 0xc7, 0xc4, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_834_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_834_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7a, 0x45, 0x9e, 0x04, 0x73, 0x95, 0xd8, 0x1d, 0x3b, 0x00, 0xf4, 0xb8, 0xd5, 0xad, 0x34, 0x44, 0x2b, 0x35, 0xde, 0xc5, 0xe6, 0xc1, 0xb4, 0x5a, 0x06, 0x78, 0xe6, 0x5a, 0x1f, 0xe9, 0xe9, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_834 = { .name = "ecdsa_brainpoolp256r1_sha256_834", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_834_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_834_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_834_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 313 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 835 for ECDSA, tcId is 314 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_835_pubkey[] = { 0x37, 0xa1, 0x05, 0xe3, 0xce, 0x3f, 0xb6, 0x36, 0x73, 0x30, 0x32, 0xd1, 0xca, 0x56, 0xb4, 0xc6, 0x59, 0xb4, 0x51, 0xf6, 0x4f, 0x4b, 0xa7, 0x37, 0x8b, 0x08, 0x79, 0x87, 0xe7, 0xa5, 0x44, 0xd2, 0x78, 0x2b, 0xad, 0x9b, 0x16, 0x54, 0xf2, 0x77, 0x0d, 0x7a, 0x3e, 0xe3, 0x5b, 0x67, 0x2a, 0x36, 0x6f, 0x68, 0x5b, 0xc7, 0x19, 0x18, 0x89, 0xff, 0x2f, 0xa5, 0xc6, 0xb9, 0x4e, 0xbe, 0x7a, 0xb8, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_835_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_835_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3b, 0x77, 0x39, 0xbb, 0xe1, 0x04, 0x8b, 0x69, 0xfd, 0x05, 0xf9, 0x26, 0x2f, 0x62, 0x8e, 0x03, 0xb0, 0x77, 0x0e, 0x7e, 0xcd, 0x82, 0x33, 0x7f, 0x14, 0x82, 0xa7, 0x2d, 0xb0, 0x29, 0x32, 0x32, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_835 = { .name = "ecdsa_brainpoolp256r1_sha256_835", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_835_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_835_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_835_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 314 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 836 for ECDSA, tcId is 315 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_836_pubkey[] = { 0x13, 0xdd, 0x59, 0x45, 0x4f, 0x6a, 0xf3, 0xe9, 0xdb, 0x11, 0x5b, 0x7e, 0xc8, 0xc3, 0xa1, 0xc8, 0xd3, 0x08, 0xfd, 0xcb, 0x49, 0x63, 0xc3, 0xb8, 0xea, 0x12, 0x64, 0xe4, 0xaf, 0xda, 0x65, 0x2c, 0x5d, 0x26, 0x0b, 0x7f, 0xc9, 0xbf, 0xd2, 0x00, 0x89, 0x6d, 0x22, 0x9f, 0x3c, 0x8d, 0xaa, 0xb9, 0xdf, 0x2f, 0x55, 0xaa, 0x9a, 0xd9, 0x5d, 0x4e, 0xa7, 0x6a, 0xed, 0x8d, 0x74, 0xc5, 0x49, 0x4d, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_836_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_836_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x76, 0xee, 0x73, 0x77, 0xc2, 0x09, 0x16, 0xd3, 0xfa, 0x0b, 0xf2, 0x4c, 0x5e, 0xc5, 0x1c, 0x07, 0x60, 0xee, 0x1c, 0xfd, 0x9b, 0x04, 0x66, 0xfe, 0x29, 0x05, 0x4e, 0x5b, 0x60, 0x52, 0x64, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_836 = { .name = "ecdsa_brainpoolp256r1_sha256_836", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_836_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_836_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_836_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 315 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 837 for ECDSA, tcId is 316 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_837_pubkey[] = { 0x2c, 0x1d, 0xc5, 0x64, 0x59, 0xbf, 0x09, 0xdf, 0x50, 0xfb, 0x2d, 0x96, 0x2f, 0x59, 0x89, 0xf3, 0x64, 0x30, 0x21, 0xc5, 0xc3, 0x60, 0x36, 0x3e, 0x10, 0xe6, 0x95, 0xa7, 0x0b, 0x59, 0x42, 0xe8, 0x62, 0x16, 0xd3, 0xca, 0x0c, 0xca, 0x31, 0xdb, 0xd9, 0x2a, 0x4d, 0x28, 0xbf, 0x95, 0x14, 0x37, 0xf6, 0xf4, 0x5d, 0xb4, 0x1e, 0x8e, 0x41, 0xfd, 0xf7, 0x24, 0x14, 0xa2, 0x93, 0xf5, 0x30, 0x87, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_837_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_837_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4a, 0x99, 0x28, 0x24, 0xc7, 0x37, 0xb0, 0x0f, 0x02, 0xd2, 0x3d, 0x2f, 0x2e, 0x3d, 0xec, 0xf0, 0x90, 0xb2, 0x8f, 0xfa, 0x0e, 0x90, 0xe6, 0xd1, 0xe5, 0xdd, 0x15, 0x70, 0x70, 0x71, 0x9f, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_837 = { .name = "ecdsa_brainpoolp256r1_sha256_837", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_837_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_837_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_837_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 316 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 838 for ECDSA, tcId is 317 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_838_pubkey[] = { 0x13, 0x7d, 0x6f, 0xdf, 0x83, 0x6b, 0x18, 0x24, 0x37, 0x8c, 0x08, 0xb3, 0x5f, 0xa7, 0xeb, 0xe4, 0xe8, 0x07, 0xd8, 0xa2, 0x01, 0x05, 0xce, 0x9c, 0xb3, 0xcd, 0x28, 0x1f, 0x0a, 0x47, 0xc9, 0xc3, 0x07, 0xd6, 0x47, 0x5d, 0x49, 0x58, 0xc1, 0x6d, 0x95, 0x0f, 0x04, 0x39, 0xd3, 0xdb, 0xf8, 0x6c, 0x2d, 0x7e, 0x2b, 0x12, 0xe8, 0xb1, 0x37, 0xef, 0xc6, 0x2d, 0xd1, 0xc7, 0x23, 0xb8, 0x3a, 0x62, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_838_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_838_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x9c, 0x09, 0x2d, 0x16, 0x5e, 0xf1, 0xb1, 0x1a, 0x82, 0xb5, 0x9c, 0x73, 0xaa, 0xb3, 0x49, 0x66, 0x31, 0xe3, 0x03, 0x20, 0x38, 0xfe, 0xda, 0x23, 0x6d, 0xb7, 0xb0, 0xf5, 0xa8, 0xe0, 0xca, 0xbb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_838 = { .name = "ecdsa_brainpoolp256r1_sha256_838", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_838_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_838_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_838_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 317 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 839 for ECDSA, tcId is 318 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_839_pubkey[] = { 0x64, 0x02, 0x13, 0xbe, 0x16, 0x98, 0xb1, 0x66, 0xf0, 0xc5, 0x4e, 0x58, 0x8e, 0x1b, 0x57, 0xa6, 0x48, 0x26, 0xbf, 0x84, 0x8a, 0xda, 0xbf, 0xef, 0x60, 0x68, 0x1d, 0x77, 0x74, 0x7d, 0x2c, 0xa8, 0x64, 0x6e, 0x45, 0xd9, 0x61, 0x41, 0x9d, 0x4a, 0xd1, 0x33, 0x8c, 0x36, 0x12, 0x28, 0xe1, 0xc6, 0xb6, 0x61, 0x53, 0x98, 0x58, 0x2c, 0x0e, 0x3e, 0x97, 0xf7, 0xeb, 0xc8, 0x5a, 0x50, 0x44, 0x23, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_839_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_839_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa9, 0x04, 0x49, 0xe8, 0x7d, 0x9d, 0xe3, 0xeb, 0xed, 0x92, 0xa2, 0x27, 0x73, 0x5e, 0x45, 0x32, 0x5b, 0x1d, 0x2d, 0x77, 0x4b, 0x48, 0x76, 0xa8, 0x6d, 0x08, 0x63, 0x34, 0x94, 0x71, 0xac, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_839 = { .name = "ecdsa_brainpoolp256r1_sha256_839", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_839_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_839_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_839_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 318 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 840 for ECDSA, tcId is 319 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_840_pubkey[] = { 0x26, 0x91, 0x54, 0xca, 0x58, 0x31, 0x75, 0x52, 0xc6, 0x55, 0xd2, 0xa9, 0xb3, 0x80, 0x4d, 0xd9, 0x4c, 0x27, 0x11, 0x14, 0x5b, 0x9c, 0xd9, 0x3c, 0x36, 0x0f, 0x2d, 0xfe, 0x34, 0xcc, 0x19, 0x71, 0x98, 0x04, 0x6c, 0xc9, 0x0c, 0xc6, 0xa8, 0xac, 0x48, 0xef, 0x7b, 0xac, 0xc5, 0xcb, 0x7e, 0x57, 0x33, 0x4f, 0xa9, 0x1f, 0xac, 0xba, 0xdb, 0x48, 0x95, 0x2c, 0x9f, 0xee, 0x54, 0x3d, 0x1b, 0xb5, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_840_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_840_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa4, 0x31, 0x04, 0x28, 0xc8, 0x0a, 0x06, 0xda, 0x59, 0x71, 0x98, 0x19, 0xa0, 0xa3, 0xdb, 0xf6, 0x65, 0x8f, 0xab, 0x99, 0x38, 0xca, 0x85, 0x1c, 0xbd, 0x9c, 0x0a, 0xae, 0x86, 0x40, 0x58, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_840 = { .name = "ecdsa_brainpoolp256r1_sha256_840", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_840_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_840_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_840_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 319 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 841 for ECDSA, tcId is 320 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_841_pubkey[] = { 0x24, 0x0e, 0x0b, 0x64, 0xce, 0xe2, 0xe0, 0xb8, 0x89, 0x0c, 0x2f, 0xa8, 0x2d, 0xe5, 0x84, 0x8a, 0x56, 0x42, 0xef, 0x0f, 0x7b, 0x24, 0x14, 0xf8, 0x8f, 0x58, 0x52, 0x81, 0xdf, 0x7a, 0x1f, 0xf5, 0x3a, 0x59, 0x90, 0xf8, 0x60, 0xda, 0x30, 0x53, 0xf8, 0x21, 0xbe, 0xa9, 0x14, 0x05, 0x9c, 0xed, 0x85, 0xc9, 0xc2, 0x39, 0x0b, 0x0d, 0x86, 0x05, 0x32, 0xdb, 0xcc, 0xca, 0x7f, 0xf6, 0x66, 0x92, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_841_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_841_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa1, 0x4b, 0xda, 0x4f, 0x5b, 0x17, 0xb5, 0x69, 0x66, 0xf7, 0x5e, 0xde, 0x22, 0x34, 0x03, 0x38, 0xd2, 0x3a, 0xc4, 0x13, 0xfa, 0x7e, 0xf4, 0x2f, 0x54, 0x5b, 0x08, 0xc4, 0x7d, 0xbc, 0x59, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_841 = { .name = "ecdsa_brainpoolp256r1_sha256_841", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_841_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_841_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_841_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 320 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 842 for ECDSA, tcId is 321 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_842_pubkey[] = { 0x96, 0xf3, 0xcb, 0x5e, 0xb0, 0xc3, 0x3b, 0xe2, 0x05, 0xec, 0x05, 0x8a, 0x22, 0x09, 0x3d, 0x73, 0x9f, 0xe8, 0x0a, 0x7e, 0xcc, 0x87, 0x43, 0x99, 0xc1, 0x4f, 0x7f, 0x6c, 0x38, 0xcf, 0xcc, 0x51, 0x47, 0xb3, 0xec, 0xca, 0xec, 0xc9, 0xad, 0xd2, 0xb1, 0xdf, 0xfc, 0x98, 0x8f, 0x13, 0xdc, 0xab, 0x15, 0xb7, 0xe9, 0x10, 0xd0, 0x25, 0x0e, 0x70, 0xa1, 0xd7, 0x9b, 0x3b, 0x93, 0x1c, 0x32, 0xed, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_842_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_842_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x32, 0xdf, 0xe6, 0x73, 0x4d, 0xc4, 0xf7, 0xfa, 0xa2, 0xfd, 0x85, 0x33, 0xe9, 0x2c, 0x0d, 0x2f, 0x92, 0x9a, 0x42, 0x77, 0xa9, 0xc5, 0xcd, 0xaa, 0xfd, 0x43, 0x16, 0xfe, 0x96, 0xa4, 0x46, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_842 = { .name = "ecdsa_brainpoolp256r1_sha256_842", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_842_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_842_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_842_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 321 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 843 for ECDSA, tcId is 322 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_843_pubkey[] = { 0x10, 0x3b, 0x1b, 0xf6, 0x34, 0x3d, 0x57, 0x26, 0x0f, 0x65, 0x2d, 0x27, 0x2a, 0xae, 0xff, 0x6c, 0xfa, 0x43, 0x9f, 0x15, 0x83, 0x33, 0x5e, 0xba, 0x66, 0xfa, 0x72, 0xd0, 0x0e, 0xff, 0x7f, 0x85, 0x20, 0xf2, 0xbb, 0x03, 0x5b, 0xd0, 0x56, 0xc6, 0x7c, 0xa2, 0x2c, 0xa9, 0x52, 0xab, 0xb5, 0xe1, 0xbc, 0xb6, 0x8d, 0x67, 0xca, 0x81, 0x79, 0x0d, 0x24, 0x09, 0x7f, 0x13, 0xd4, 0x52, 0x09, 0xa1, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_843_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_843_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x63, 0x53, 0xc7, 0xf3, 0xe0, 0xa4, 0xe3, 0x3e, 0xbf, 0x77, 0x58, 0xda, 0xdf, 0x2b, 0xd9, 0xd0, 0x84, 0x13, 0x28, 0xe1, 0x3c, 0x75, 0xe2, 0x52, 0x85, 0x5f, 0x5a, 0x2b, 0x87, 0xc2, 0xc7, 0x8c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_843 = { .name = "ecdsa_brainpoolp256r1_sha256_843", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_843_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_843_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_843_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 322 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 844 for ECDSA, tcId is 323 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_844_pubkey[] = { 0x95, 0x9b, 0x3b, 0xf3, 0x72, 0x30, 0x19, 0x93, 0xb3, 0x7e, 0x20, 0xb4, 0x34, 0x4f, 0x13, 0xc0, 0x6d, 0x5c, 0x1c, 0x53, 0xc7, 0x73, 0x7f, 0x16, 0x6e, 0xfb, 0x94, 0x83, 0x2c, 0x3b, 0x9b, 0xbb, 0x40, 0xd3, 0x5e, 0xf4, 0x6e, 0x4c, 0xfa, 0xd4, 0x75, 0xdd, 0xd1, 0xa1, 0xd9, 0x60, 0x9f, 0xec, 0xa7, 0x06, 0x97, 0x12, 0xd3, 0x0b, 0xdf, 0x46, 0x38, 0xd4, 0xc8, 0x8b, 0xc9, 0xa1, 0x21, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_844_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_844_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x14, 0x89, 0x9b, 0xc6, 0xff, 0x5e, 0x72, 0x33, 0x8f, 0x3c, 0x98, 0x47, 0xfa, 0x65, 0x31, 0xc4, 0x33, 0x7f, 0xde, 0x3f, 0xcf, 0x1c, 0x8c, 0x32, 0xf7, 0x68, 0xfb, 0xa3, 0xa4, 0x02, 0xa9, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_844 = { .name = "ecdsa_brainpoolp256r1_sha256_844", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_844_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_844_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_844_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 323 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 845 for ECDSA, tcId is 324 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_845_pubkey[] = { 0x6e, 0x69, 0xb1, 0x7d, 0x83, 0x89, 0x4e, 0x2e, 0x71, 0xff, 0xce, 0x35, 0x1b, 0x53, 0x45, 0x9c, 0x0b, 0xb2, 0x9b, 0xec, 0x37, 0x9f, 0xf4, 0x35, 0xf2, 0x3c, 0x01, 0xa9, 0xb3, 0x7d, 0xf4, 0x9e, 0x3b, 0xa1, 0x05, 0x3a, 0xd8, 0x42, 0x36, 0xd8, 0x2c, 0xf7, 0xc7, 0x62, 0x36, 0x2b, 0x37, 0xb2, 0x4e, 0x3b, 0x0e, 0xe1, 0xf8, 0xea, 0x6c, 0x54, 0x3a, 0x25, 0x91, 0xdc, 0xb6, 0x68, 0x1a, 0x8f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_845_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_845_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x72, 0x65, 0x5c, 0x5e, 0x4f, 0x1c, 0xef, 0xca, 0x22, 0xf4, 0x13, 0xa6, 0x12, 0xe5, 0xbf, 0xdd, 0x7b, 0xa9, 0xae, 0x71, 0x05, 0x3f, 0x68, 0xb0, 0xc7, 0x4d, 0x9a, 0x73, 0x59, 0x00, 0x13, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_845 = { .name = "ecdsa_brainpoolp256r1_sha256_845", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_845_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_845_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_845_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 324 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 846 for ECDSA, tcId is 325 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_846_pubkey[] = { 0x33, 0x6f, 0xc2, 0x8e, 0x1f, 0x25, 0x04, 0x85, 0x27, 0x67, 0x47, 0xdf, 0xc3, 0x48, 0x59, 0xb4, 0x74, 0x16, 0x67, 0xb3, 0xac, 0x46, 0xa0, 0xf6, 0x38, 0x4d, 0xec, 0xc1, 0xac, 0x79, 0x03, 0x04, 0x40, 0x12, 0x06, 0xb5, 0x50, 0x8a, 0xa0, 0x66, 0x01, 0xa2, 0x24, 0x6e, 0x73, 0x81, 0xdf, 0xec, 0xca, 0x6a, 0xdb, 0x2b, 0x19, 0x7a, 0xe1, 0x45, 0x49, 0xa2, 0x4c, 0x35, 0x5c, 0xd5, 0x3b, 0xe1, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_846_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_846_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa2, 0x03, 0x0d, 0xbf, 0x01, 0xd8, 0xc9, 0xde, 0x29, 0x00, 0xdc, 0x38, 0x45, 0xfd, 0xa4, 0xe4, 0xc6, 0xbc, 0x04, 0x9c, 0x4c, 0xd5, 0x71, 0x7a, 0x9c, 0x62, 0x9b, 0x9e, 0xd2, 0x9d, 0x18, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_846 = { .name = "ecdsa_brainpoolp256r1_sha256_846", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_846_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_846_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_846_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 325 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 847 for ECDSA, tcId is 326 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_847_pubkey[] = { 0x91, 0x3d, 0x9c, 0xe3, 0x5b, 0x9c, 0x73, 0x20, 0x35, 0x78, 0xe2, 0x55, 0xd4, 0xdd, 0x35, 0xff, 0x20, 0x21, 0x2d, 0x35, 0x72, 0x27, 0xd2, 0x6b, 0x8a, 0x95, 0x91, 0x80, 0x66, 0x5b, 0x54, 0x2b, 0xa5, 0x03, 0xd9, 0x22, 0xd3, 0xfd, 0x65, 0xa0, 0x7e, 0xca, 0x18, 0xc0, 0xa4, 0xe2, 0xd3, 0xf2, 0xcf, 0x7c, 0x05, 0x92, 0x8b, 0x40, 0x64, 0x58, 0xcb, 0x28, 0x6e, 0x11, 0xdc, 0x62, 0xdc, 0xb6, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_847_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_847_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa1, 0xdb, 0x72, 0x93, 0xb6, 0xf0, 0x15, 0x94, 0xb8, 0x08, 0x71, 0x8e, 0x61, 0xa4, 0xd6, 0x42, 0xdf, 0xf4, 0xfe, 0xe2, 0xfb, 0x47, 0x11, 0x67, 0xef, 0x7a, 0xb4, 0x29, 0x59, 0xa4, 0x73, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_847 = { .name = "ecdsa_brainpoolp256r1_sha256_847", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_847_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_847_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_847_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 326 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 848 for ECDSA, tcId is 327 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_848_pubkey[] = { 0x6b, 0x76, 0x91, 0x5c, 0xc1, 0xc8, 0x54, 0x74, 0x4a, 0x78, 0xda, 0xc9, 0xba, 0xec, 0xd5, 0x98, 0x45, 0xb9, 0x0a, 0xd9, 0xcd, 0x30, 0x8f, 0x5a, 0x88, 0x7d, 0xcc, 0xc9, 0x09, 0xda, 0xcd, 0x4a, 0x72, 0x60, 0x45, 0x6f, 0x8f, 0x8d, 0x31, 0x76, 0x0d, 0x81, 0xbf, 0x85, 0x34, 0x8d, 0x9f, 0x50, 0xc9, 0x9d, 0x99, 0x18, 0xb4, 0x80, 0xb1, 0xec, 0x25, 0xf4, 0xe2, 0xe3, 0x4d, 0xe0, 0x37, 0x69, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_848_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_848_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x99, 0xbb, 0x8d, 0x4b, 0xcb, 0xf1, 0x81, 0x6d, 0x31, 0xaa, 0xd8, 0x8c, 0x25, 0xc6, 0x1f, 0x14, 0x33, 0xb0, 0x83, 0x22, 0x41, 0x2c, 0x7b, 0xd8, 0x4e, 0xd7, 0x59, 0xd0, 0x1c, 0x00, 0x91, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_848 = { .name = "ecdsa_brainpoolp256r1_sha256_848", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_848_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_848_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_848_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 327 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 849 for ECDSA, tcId is 328 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_849_pubkey[] = { 0x64, 0x7b, 0x37, 0xb7, 0x31, 0xd3, 0xea, 0xd7, 0x59, 0x76, 0x27, 0x51, 0x99, 0x54, 0x83, 0x46, 0x90, 0x31, 0x08, 0x4c, 0xd7, 0x09, 0x88, 0x7c, 0x9b, 0x6b, 0xaf, 0xba, 0x46, 0x2c, 0xbf, 0x84, 0x88, 0x8c, 0x5b, 0x17, 0x1f, 0x2b, 0x2f, 0xb7, 0xbb, 0x2b, 0x9d, 0x88, 0x20, 0x0d, 0x79, 0xac, 0x94, 0xd7, 0xd4, 0x02, 0x5f, 0x79, 0x34, 0x8e, 0x22, 0x83, 0x51, 0x1c, 0x04, 0x78, 0x91, 0xbf, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_849_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_849_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x41, 0xce, 0xe8, 0x2a, 0x69, 0x57, 0xef, 0x02, 0xab, 0x3a, 0xa0, 0x7a, 0x33, 0x15, 0xac, 0xcc, 0x0d, 0x0d, 0x66, 0xc2, 0x08, 0x1d, 0x53, 0x02, 0x46, 0xd6, 0xe6, 0x81, 0x87, 0x3c, 0x90, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_849 = { .name = "ecdsa_brainpoolp256r1_sha256_849", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_849_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_849_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_849_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 328 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 850 for ECDSA, tcId is 329 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_850_pubkey[] = { 0x1f, 0x76, 0x1a, 0x1a, 0xe1, 0xe8, 0x2e, 0x4a, 0xf2, 0x77, 0xb3, 0x99, 0xda, 0x0a, 0x52, 0x3e, 0x85, 0x64, 0x4c, 0xe9, 0x71, 0xc7, 0xb9, 0x02, 0x36, 0xd0, 0x31, 0x15, 0xae, 0xd9, 0x85, 0x5b, 0x55, 0xcd, 0xb3, 0xe1, 0x04, 0x36, 0x1f, 0xd2, 0xe0, 0x97, 0x98, 0x63, 0xf2, 0x9a, 0x3b, 0x0b, 0xf5, 0x54, 0x2c, 0x51, 0x05, 0xc9, 0x1d, 0xfc, 0x7c, 0x94, 0x64, 0x3b, 0x78, 0xa2, 0xb7, 0xf2, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_850_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_850_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x74, 0x6d, 0x61, 0x57, 0x2e, 0xca, 0xe7, 0x74, 0x69, 0x1e, 0x78, 0x09, 0x12, 0x19, 0x86, 0xd9, 0xb9, 0x32, 0x79, 0xb0, 0x09, 0x34, 0xff, 0x1d, 0xef, 0x1f, 0x47, 0x98, 0xda, 0x89, 0xad, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_850 = { .name = "ecdsa_brainpoolp256r1_sha256_850", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_850_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_850_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_850_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 329 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 851 for ECDSA, tcId is 330 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_851_pubkey[] = { 0x63, 0xd3, 0x03, 0x16, 0x25, 0x74, 0x96, 0x28, 0x99, 0xfd, 0x9a, 0x32, 0x3c, 0x5f, 0xe2, 0x4a, 0x09, 0x18, 0x8f, 0xa2, 0x0d, 0x47, 0xa8, 0xd9, 0x2b, 0xa5, 0x02, 0xd4, 0xf8, 0x86, 0xf5, 0xb3, 0x72, 0xcd, 0x0d, 0x82, 0xb3, 0xfd, 0x4f, 0x54, 0xfe, 0xdc, 0x5d, 0x86, 0x18, 0xb1, 0x42, 0xf6, 0x35, 0x53, 0xe4, 0x38, 0xcc, 0x12, 0x69, 0x71, 0x9d, 0xee, 0x3a, 0xbd, 0x33, 0x16, 0xfa, 0x21, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_851_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_851_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x28, 0x1b, 0x26, 0xa0, 0x90, 0x89, 0x68, 0x09, 0x9f, 0x8e, 0x1f, 0x61, 0x0f, 0x4f, 0x35, 0x83, 0x18, 0xba, 0xa2, 0x11, 0x07, 0xb7, 0x91, 0xef, 0x6f, 0x24, 0xcb, 0x24, 0x46, 0x77, 0xa6, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_851 = { .name = "ecdsa_brainpoolp256r1_sha256_851", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_851_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_851_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_851_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 330 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 852 for ECDSA, tcId is 331 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_852_pubkey[] = { 0x3e, 0x1d, 0x96, 0x6e, 0x05, 0xf0, 0x4c, 0x44, 0xe1, 0x62, 0x13, 0x3d, 0x97, 0x73, 0x0f, 0x64, 0x08, 0xa8, 0x8a, 0xd9, 0x90, 0xa2, 0xc6, 0xef, 0xb7, 0xe3, 0xe7, 0x3a, 0x88, 0x6f, 0x7e, 0xd4, 0xa4, 0x0e, 0x3b, 0x3f, 0xd8, 0xb0, 0x05, 0xfc, 0x41, 0x74, 0x37, 0xf2, 0x10, 0x11, 0xd9, 0xfb, 0xe3, 0x8b, 0x32, 0x9a, 0x2e, 0x79, 0x59, 0xed, 0x9b, 0x04, 0x0c, 0x8e, 0x1e, 0xb6, 0x77, 0xfd, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_852_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_852_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x46, 0xa7, 0x8f, 0xe7, 0xc1, 0x49, 0xc6, 0x7d, 0x7e, 0xee, 0xb1, 0xb5, 0xbe, 0x57, 0xb3, 0xa1, 0x08, 0x26, 0x51, 0xc2, 0x78, 0xeb, 0xc4, 0xa5, 0x0a, 0xbe, 0xb4, 0x57, 0x0f, 0x85, 0x8f, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_852 = { .name = "ecdsa_brainpoolp256r1_sha256_852", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_852_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_852_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_852_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 331 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 853 for ECDSA, tcId is 332 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_853_pubkey[] = { 0x56, 0xac, 0x8e, 0x49, 0xb3, 0x19, 0xd5, 0xd0, 0x41, 0xae, 0x3d, 0x3f, 0x91, 0xde, 0x22, 0x9c, 0x0a, 0x82, 0x0d, 0x7f, 0xfd, 0x97, 0xea, 0x06, 0x19, 0x6e, 0xee, 0x75, 0x07, 0x36, 0x3f, 0x42, 0x78, 0x7f, 0xc0, 0x5e, 0xba, 0x60, 0x6f, 0x77, 0xb9, 0x84, 0xe5, 0x7c, 0xab, 0xf9, 0x11, 0x20, 0x97, 0x00, 0xb5, 0xd3, 0x91, 0x47, 0xa1, 0x4c, 0x5d, 0x1a, 0x95, 0xf5, 0x6c, 0xd5, 0xfe, 0xb4, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_853_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_853_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x14, 0xfd, 0xab, 0xed, 0xd0, 0xf7, 0x54, 0xde, 0x1f, 0x33, 0x05, 0x48, 0x4e, 0xc1, 0xc6, 0xb8, 0xc6, 0x1c, 0xbd, 0x51, 0xda, 0xb0, 0xd3, 0x7b, 0xc8, 0x0f, 0x07, 0x41, 0x4b, 0xa4, 0x2b, 0x55, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_853 = { .name = "ecdsa_brainpoolp256r1_sha256_853", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_853_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_853_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_853_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 332 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 854 for ECDSA, tcId is 333 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_854_pubkey[] = { 0x5e, 0x2f, 0x22, 0x86, 0x31, 0xee, 0x7f, 0x00, 0xce, 0xaf, 0x93, 0x62, 0x78, 0xf2, 0xe2, 0x68, 0x1b, 0x42, 0x9f, 0xcf, 0xb8, 0xcb, 0x2c, 0x01, 0x9b, 0x31, 0xf1, 0x88, 0x83, 0x98, 0x84, 0xf5, 0x30, 0xe1, 0x07, 0x9a, 0x6b, 0x88, 0x93, 0x93, 0xcc, 0x83, 0xfa, 0xbb, 0xd5, 0x24, 0xf2, 0x1b, 0xb4, 0x86, 0xc6, 0x5b, 0x83, 0xab, 0x0a, 0xfa, 0xfb, 0x17, 0x26, 0x5d, 0x97, 0x1b, 0xae, 0x91, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_854_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_854_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x8e, 0x30, 0x5a, 0x1c, 0xf8, 0x85, 0xcc, 0xc3, 0x30, 0xad, 0x0f, 0x1b, 0x58, 0x34, 0xa6, 0xa7, 0x83, 0xf1, 0x94, 0x8a, 0x5d, 0x50, 0x87, 0xd4, 0x2b, 0xb5, 0xd4, 0x7a, 0xf8, 0x24, 0x35, 0x35, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_854 = { .name = "ecdsa_brainpoolp256r1_sha256_854", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_854_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_854_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_854_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 333 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 855 for ECDSA, tcId is 334 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_855_pubkey[] = { 0x6d, 0xbc, 0x56, 0x05, 0xb4, 0xe1, 0x13, 0x93, 0x2f, 0xed, 0xe7, 0xb4, 0x74, 0x3f, 0x4d, 0xfc, 0x62, 0xfd, 0xec, 0xae, 0x16, 0x73, 0x5b, 0x51, 0x65, 0x3d, 0x79, 0xee, 0x00, 0x8f, 0x2f, 0xc5, 0x12, 0x88, 0xfb, 0x2c, 0xa0, 0x9e, 0xe3, 0x36, 0xef, 0x31, 0x6b, 0x73, 0x91, 0x9a, 0x7f, 0x3b, 0x32, 0x9f, 0xca, 0x2f, 0x5c, 0x36, 0x5c, 0xc4, 0x27, 0x42, 0x5f, 0xec, 0xf6, 0x4f, 0x7b, 0xf3, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_855_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_855_sig[] = { 0x07, 0x4c, 0x03, 0x56, 0x03, 0xe1, 0xeb, 0x49, 0xab, 0x53, 0x82, 0x81, 0x9b, 0xf8, 0x2a, 0xf8, 0x29, 0x29, 0xb5, 0x00, 0xc6, 0xe7, 0x88, 0x41, 0xc1, 0xb2, 0xc3, 0xff, 0x54, 0xa6, 0x15, 0xdd, 0x20, 0x35, 0xac, 0x9e, 0xa7, 0x11, 0x9e, 0x30, 0xe5, 0x4f, 0x36, 0x9c, 0xd2, 0x2a, 0xa2, 0x7a, 0xf3, 0x8b, 0x56, 0x6a, 0xe6, 0x09, 0x3f, 0x1d, 0xf3, 0x5b, 0x61, 0x2d, 0xe6, 0xf0, 0x75, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_855 = { .name = "ecdsa_brainpoolp256r1_sha256_855", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_855_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_855_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_855_sig, .siglen = 64, .result = 1, .comment = "point duplication during verification, tcId is 334 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 856 for ECDSA, tcId is 335 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_856_pubkey[] = { 0x6d, 0xbc, 0x56, 0x05, 0xb4, 0xe1, 0x13, 0x93, 0x2f, 0xed, 0xe7, 0xb4, 0x74, 0x3f, 0x4d, 0xfc, 0x62, 0xfd, 0xec, 0xae, 0x16, 0x73, 0x5b, 0x51, 0x65, 0x3d, 0x79, 0xee, 0x00, 0x8f, 0x2f, 0xc5, 0x97, 0x72, 0x5c, 0xaf, 0x01, 0x4f, 0xc6, 0x85, 0x4f, 0x34, 0x9f, 0x1d, 0x0b, 0xe9, 0x0e, 0x37, 0x3b, 0x9c, 0x2b, 0xf4, 0x78, 0xef, 0xc3, 0x63, 0xf8, 0xd0, 0xe8, 0x30, 0x29, 0x1e, 0xd7, 0x84, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_856_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_856_sig[] = { 0x07, 0x4c, 0x03, 0x56, 0x03, 0xe1, 0xeb, 0x49, 0xab, 0x53, 0x82, 0x81, 0x9b, 0xf8, 0x2a, 0xf8, 0x29, 0x29, 0xb5, 0x00, 0xc6, 0xe7, 0x88, 0x41, 0xc1, 0xb2, 0xc3, 0xff, 0x54, 0xa6, 0x15, 0xdd, 0x20, 0x35, 0xac, 0x9e, 0xa7, 0x11, 0x9e, 0x30, 0xe5, 0x4f, 0x36, 0x9c, 0xd2, 0x2a, 0xa2, 0x7a, 0xf3, 0x8b, 0x56, 0x6a, 0xe6, 0x09, 0x3f, 0x1d, 0xf3, 0x5b, 0x61, 0x2d, 0xe6, 0xf0, 0x75, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_856 = { .name = "ecdsa_brainpoolp256r1_sha256_856", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_856_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_856_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_856_sig, .siglen = 64, .result = -1, .comment = "duplication bug, tcId is 335 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 857 for ECDSA, tcId is 336 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_857_pubkey[] = { 0x8c, 0x56, 0x35, 0xee, 0xaf, 0x7e, 0x99, 0x4f, 0xf1, 0x63, 0xeb, 0xdc, 0x9a, 0xac, 0xfd, 0xad, 0x1d, 0x50, 0xf9, 0x92, 0x9a, 0x80, 0x35, 0xc3, 0x6c, 0xf1, 0xc1, 0xe1, 0x6d, 0x5b, 0x28, 0xf1, 0x3d, 0xe4, 0x84, 0x31, 0xf3, 0xeb, 0x82, 0x3a, 0x38, 0x4c, 0x94, 0x0b, 0x2b, 0x0a, 0x01, 0x51, 0x2d, 0xa9, 0x8b, 0x8f, 0x72, 0xbd, 0x95, 0x45, 0xd1, 0x79, 0xd6, 0xf1, 0xcd, 0x5a, 0x2a, 0x63, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_857_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_857_sig[] = { 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, 0x21, 0xff, 0x11, 0x92, 0x53, 0x96, 0x21, 0xf2, 0x72, 0xe1, 0x35, 0x50, 0x1f, 0x80, 0xb5, 0xe3, 0x82, 0x71, 0xe5, 0x53, 0xf1, 0x13, 0x87, 0xcb, 0x1c, 0xd2, 0xcf, 0xb3, 0xb7, 0xdb, 0x44, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_857 = { .name = "ecdsa_brainpoolp256r1_sha256_857", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_857_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_857_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_857_sig, .siglen = 64, .result = -1, .comment = "comparison with point at infinity , tcId is 336 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 858 for ECDSA, tcId is 337 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_858_pubkey[] = { 0x2b, 0x99, 0x99, 0xcf, 0x86, 0xf1, 0x5a, 0x74, 0x71, 0xff, 0x8d, 0x21, 0x2c, 0xa3, 0xf9, 0xa9, 0x92, 0x25, 0x85, 0x1b, 0x6d, 0x96, 0x08, 0x03, 0x4c, 0xe0, 0xaf, 0x55, 0xfd, 0x53, 0x9b, 0x5a, 0x25, 0xd1, 0xd0, 0x64, 0x49, 0xa6, 0xa9, 0xf4, 0xdb, 0x83, 0x3a, 0xb6, 0x9d, 0x11, 0x70, 0xb4, 0xf0, 0xf0, 0x7d, 0x2e, 0x5f, 0x74, 0xa9, 0xb5, 0x62, 0x12, 0x56, 0x3a, 0x03, 0x56, 0xe0, 0xb6, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_858_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_858_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_858 = { .name = "ecdsa_brainpoolp256r1_sha256_858", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_858_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_858_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_858_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 337 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 859 for ECDSA, tcId is 338 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_859_pubkey[] = { 0x8d, 0x40, 0xdb, 0xb2, 0x64, 0x92, 0x3c, 0x02, 0xa4, 0x84, 0xfd, 0xc7, 0xf0, 0x61, 0x08, 0xc7, 0x27, 0xe5, 0xd1, 0x81, 0x72, 0xc9, 0x09, 0xf7, 0x9a, 0x38, 0x45, 0x48, 0x5c, 0x93, 0x9f, 0x45, 0x94, 0xdd, 0x7b, 0x7c, 0x67, 0x65, 0x3a, 0x71, 0x20, 0x74, 0xd9, 0x48, 0x90, 0xa8, 0xeb, 0x56, 0xa7, 0xd4, 0xb9, 0x75, 0x02, 0x4d, 0x3c, 0x82, 0xa1, 0x15, 0x16, 0x69, 0xa6, 0xb8, 0x38, 0x21, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_859_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_859_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x79, 0x6a, 0x63, 0x53, 0xbc, 0xcf, 0x0b, 0x86, 0x75, 0xb6, 0x99, 0xd5, 0x02, 0xcb, 0xae, 0x2c, 0x88, 0xbb, 0x57, 0x99, 0x81, 0x8e, 0xe4, 0xf9, 0xf9, 0x3a, 0x0a, 0x5d, 0x47, 0x7c, 0xd0, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_859 = { .name = "ecdsa_brainpoolp256r1_sha256_859", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_859_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_859_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_859_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 338 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 860 for ECDSA, tcId is 339 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_860_pubkey[] = { 0x1f, 0xb4, 0x4c, 0x46, 0xfc, 0xdc, 0xfe, 0x8e, 0x37, 0xf0, 0x47, 0xbc, 0xcf, 0x57, 0xba, 0x18, 0x90, 0x64, 0x3f, 0x00, 0x33, 0xd4, 0x92, 0xc4, 0xb1, 0x97, 0xca, 0x70, 0x57, 0xc8, 0x60, 0x67, 0x76, 0x3f, 0x10, 0x41, 0xf8, 0xc3, 0x8b, 0xe3, 0xad, 0x20, 0x94, 0x5a, 0x6f, 0x0f, 0xad, 0x6f, 0x53, 0x0a, 0xf9, 0x6f, 0xed, 0x28, 0x9b, 0x4e, 0x8f, 0x02, 0xab, 0xd8, 0x0b, 0x2f, 0x2d, 0x83, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_860_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_860_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x87, 0xfc, 0x46, 0x49, 0x4e, 0x58, 0x87, 0xc9, 0xcb, 0x84, 0xd5, 0x40, 0x7e, 0x02, 0xd7, 0x8e, 0x09, 0xc7, 0x95, 0x4f, 0xc4, 0x4e, 0x1f, 0x2c, 0x73, 0x4b, 0x3e, 0xce, 0xdf, 0x6d, 0x12, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_860 = { .name = "ecdsa_brainpoolp256r1_sha256_860", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_860_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_860_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_860_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 339 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 861 for ECDSA, tcId is 340 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_861_pubkey[] = { 0x8a, 0x42, 0xae, 0xf3, 0x25, 0x68, 0xd8, 0x45, 0x1e, 0x18, 0x7a, 0x94, 0x41, 0xa6, 0xe8, 0x86, 0x34, 0x2d, 0x00, 0x33, 0xb0, 0x4a, 0xaa, 0x4d, 0xdb, 0xd4, 0xd6, 0x00, 0xc6, 0xa5, 0xc8, 0x6a, 0x85, 0x5f, 0xbb, 0x08, 0x61, 0xc7, 0xa6, 0x42, 0x33, 0x3f, 0x37, 0x23, 0xc6, 0xc3, 0xdd, 0x96, 0x1f, 0x27, 0x9d, 0x99, 0x43, 0x77, 0x9d, 0x4c, 0x23, 0x7d, 0xee, 0xc9, 0x4b, 0xff, 0x84, 0x6e, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_861_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_861_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x21, 0xff, 0x11, 0x92, 0x53, 0x96, 0x21, 0xf2, 0x72, 0xe1, 0x35, 0x50, 0x1f, 0x80, 0xb5, 0xe3, 0x82, 0x71, 0xe5, 0x53, 0xf1, 0x13, 0x87, 0xcb, 0x1c, 0xd2, 0xcf, 0xb3, 0xb7, 0xdb, 0x44, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_861 = { .name = "ecdsa_brainpoolp256r1_sha256_861", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_861_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_861_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_861_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 340 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 862 for ECDSA, tcId is 341 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_862_pubkey[] = { 0x67, 0xf9, 0x99, 0xeb, 0x1a, 0x40, 0xfd, 0xda, 0x28, 0x04, 0x4d, 0x2a, 0xf2, 0x33, 0x57, 0xaa, 0xc0, 0x45, 0x17, 0x2e, 0xf1, 0xe8, 0x9c, 0x64, 0x30, 0xa6, 0x8d, 0xeb, 0x0a, 0x5e, 0x2c, 0x21, 0x55, 0x0d, 0x93, 0x56, 0x5d, 0xfc, 0x6a, 0x0c, 0x5b, 0x5c, 0xf4, 0xe7, 0xd9, 0x11, 0x1b, 0xf4, 0xe3, 0x1a, 0x0d, 0x0f, 0x94, 0xb8, 0xad, 0xfd, 0x9b, 0x80, 0x0c, 0x5b, 0x38, 0xcc, 0x22, 0xb0, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_862_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_862_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x30, 0x90, 0xf4, 0x87, 0xe5, 0x1f, 0x9e, 0x35, 0xc8, 0xaf, 0x70, 0xbb, 0x9a, 0xb7, 0xdf, 0x45, 0x03, 0x7e, 0x23, 0x0a, 0x33, 0xd2, 0xc1, 0xfd, 0x96, 0xe4, 0x04, 0x25, 0x4f, 0xcb, 0x86, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_862 = { .name = "ecdsa_brainpoolp256r1_sha256_862", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_862_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_862_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_862_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 341 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 863 for ECDSA, tcId is 342 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_863_pubkey[] = { 0x7c, 0xbf, 0x2b, 0xd2, 0xc8, 0x90, 0x69, 0xd2, 0x3e, 0xf7, 0x41, 0x7c, 0xb7, 0x83, 0xde, 0xc5, 0x00, 0x89, 0xb3, 0xc4, 0x55, 0x73, 0xad, 0x00, 0xe1, 0x21, 0x4b, 0x0c, 0x6f, 0x51, 0xce, 0xd5, 0x6e, 0xf5, 0xcb, 0xc5, 0x78, 0xda, 0x2f, 0x35, 0xcd, 0x8a, 0x43, 0xcf, 0x01, 0xa7, 0x07, 0x88, 0x41, 0xff, 0xfe, 0xf2, 0xbf, 0xaa, 0x4b, 0x93, 0x19, 0x20, 0xad, 0xa7, 0x92, 0x01, 0x9b, 0x29, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_863_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_863_sig[] = { 0x74, 0x3c, 0xf1, 0xb8, 0xb5, 0xcd, 0x4f, 0x2e, 0xb5, 0x5f, 0x8a, 0xa3, 0x69, 0x59, 0x3a, 0xc4, 0x36, 0xef, 0x04, 0x41, 0x66, 0x69, 0x9e, 0x37, 0xd5, 0x1a, 0x14, 0xc2, 0xce, 0x13, 0xea, 0x0e, 0x77, 0x47, 0x2d, 0x9a, 0x28, 0xb4, 0xec, 0xe7, 0x1c, 0xf4, 0x13, 0xa6, 0x8e, 0xac, 0x0e, 0xb4, 0x23, 0xa1, 0x6f, 0xb4, 0x62, 0xb1, 0xf4, 0x87, 0x06, 0xfe, 0xd4, 0x8c, 0xa4, 0x37, 0xbd, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_863 = { .name = "ecdsa_brainpoolp256r1_sha256_863", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_863_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_863_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_863_sig, .siglen = 64, .result = 1, .comment = "extreme value for k, tcId is 342 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 864 for ECDSA, tcId is 343 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_864_pubkey[] = { 0x33, 0xd4, 0x25, 0x9f, 0x3a, 0xc0, 0xce, 0x8a, 0x53, 0x4e, 0x76, 0x55, 0xf2, 0x06, 0x8f, 0x80, 0xf4, 0x01, 0xc7, 0x42, 0xec, 0x04, 0x08, 0x47, 0x84, 0xd2, 0x69, 0xc4, 0x9e, 0xf0, 0x70, 0x1f, 0x3e, 0x1d, 0xd6, 0xfc, 0x7c, 0x20, 0x6d, 0x4d, 0x75, 0x9c, 0x80, 0xe3, 0x61, 0x2d, 0xa4, 0xd0, 0xfc, 0xd4, 0x20, 0x0a, 0xfe, 0x7a, 0x68, 0x30, 0x0e, 0x9c, 0x13, 0xf4, 0xef, 0x23, 0xf8, 0x80, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_864_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_864_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x38, 0xa9, 0x1d, 0x49, 0x35, 0xfa, 0x38, 0x94, 0x14, 0xcc, 0xae, 0x30, 0x34, 0x81, 0x2f, 0x25, 0xd9, 0x68, 0x7e, 0x36, 0x91, 0xcb, 0x37, 0xa7, 0xda, 0xb4, 0xaf, 0x80, 0xdd, 0x18, 0x1c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_864 = { .name = "ecdsa_brainpoolp256r1_sha256_864", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_864_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_864_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_864_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 343 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 865 for ECDSA, tcId is 344 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_865_pubkey[] = { 0x6e, 0xac, 0xd3, 0xac, 0x7f, 0x7b, 0xe6, 0x39, 0x42, 0xb8, 0x97, 0xb7, 0x5d, 0x28, 0x26, 0x21, 0x05, 0x53, 0xe1, 0x97, 0x3a, 0x5b, 0x38, 0x48, 0x75, 0x31, 0xe0, 0xdb, 0x4a, 0x84, 0x18, 0xcc, 0x6b, 0x78, 0x1f, 0x1e, 0xc2, 0x30, 0x2b, 0xf2, 0x7f, 0x8c, 0x4a, 0x46, 0xc9, 0x17, 0x91, 0x85, 0xb9, 0x2a, 0x53, 0xa2, 0x8b, 0x85, 0xb3, 0xc6, 0x41, 0x71, 0x13, 0x9d, 0xed, 0xe3, 0x5a, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_865_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_865_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x79, 0x6a, 0x63, 0x53, 0xbc, 0xcf, 0x0b, 0x86, 0x75, 0xb6, 0x99, 0xd5, 0x02, 0xcb, 0xae, 0x2c, 0x88, 0xbb, 0x57, 0x99, 0x81, 0x8e, 0xe4, 0xf9, 0xf9, 0x3a, 0x0a, 0x5d, 0x47, 0x7c, 0xd0, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_865 = { .name = "ecdsa_brainpoolp256r1_sha256_865", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_865_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_865_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_865_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 344 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 866 for ECDSA, tcId is 345 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_866_pubkey[] = { 0x49, 0x68, 0x0c, 0x57, 0xa9, 0x64, 0x4a, 0xf8, 0xa3, 0xcb, 0x5d, 0x60, 0xf3, 0x3b, 0xbe, 0xb5, 0x4c, 0x91, 0x0b, 0xd4, 0x0d, 0xab, 0x3f, 0xdb, 0x8d, 0xaa, 0x09, 0x18, 0x2e, 0x4d, 0x79, 0x18, 0x80, 0xfc, 0xa5, 0xd9, 0x24, 0x09, 0x2c, 0x31, 0x6a, 0xe8, 0x26, 0x6b, 0x2a, 0x32, 0xb7, 0x4f, 0x18, 0x6f, 0x6c, 0xf2, 0x2c, 0x29, 0x52, 0x08, 0x71, 0xfb, 0x2a, 0xd2, 0xc4, 0x4e, 0xe7, 0x1a, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_866_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_866_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x87, 0xfc, 0x46, 0x49, 0x4e, 0x58, 0x87, 0xc9, 0xcb, 0x84, 0xd5, 0x40, 0x7e, 0x02, 0xd7, 0x8e, 0x09, 0xc7, 0x95, 0x4f, 0xc4, 0x4e, 0x1f, 0x2c, 0x73, 0x4b, 0x3e, 0xce, 0xdf, 0x6d, 0x12, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_866 = { .name = "ecdsa_brainpoolp256r1_sha256_866", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_866_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_866_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_866_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 345 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 867 for ECDSA, tcId is 346 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_867_pubkey[] = { 0x69, 0x56, 0x6f, 0x1e, 0x46, 0x19, 0x34, 0x6b, 0xf8, 0x1d, 0x4b, 0x7e, 0x76, 0x70, 0x57, 0x81, 0xae, 0x6a, 0x3e, 0x84, 0x70, 0x80, 0x6a, 0xe4, 0xf7, 0x3d, 0x53, 0xbb, 0x03, 0xc2, 0x07, 0xa1, 0x39, 0x6a, 0x54, 0xd5, 0x7b, 0x45, 0x95, 0x1e, 0xbc, 0xe9, 0x98, 0x7f, 0x6a, 0xdb, 0x45, 0x7d, 0x7c, 0xe7, 0x7c, 0x6c, 0x38, 0x20, 0xd6, 0x57, 0xf9, 0xa8, 0x88, 0x2c, 0xdf, 0xad, 0x66, 0xcf, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_867_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_867_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x21, 0xff, 0x11, 0x92, 0x53, 0x96, 0x21, 0xf2, 0x72, 0xe1, 0x35, 0x50, 0x1f, 0x80, 0xb5, 0xe3, 0x82, 0x71, 0xe5, 0x53, 0xf1, 0x13, 0x87, 0xcb, 0x1c, 0xd2, 0xcf, 0xb3, 0xb7, 0xdb, 0x44, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_867 = { .name = "ecdsa_brainpoolp256r1_sha256_867", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_867_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_867_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_867_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 346 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 868 for ECDSA, tcId is 347 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_868_pubkey[] = { 0x46, 0x86, 0x8f, 0xbf, 0xc7, 0x15, 0x0d, 0x0b, 0xdb, 0x1c, 0x8e, 0x99, 0x76, 0xd8, 0x45, 0xdc, 0x4b, 0x88, 0x40, 0xf4, 0xd9, 0x21, 0x29, 0x9b, 0x6d, 0x8f, 0x98, 0x9d, 0x4d, 0xce, 0x86, 0x57, 0x83, 0x92, 0x1b, 0x9a, 0x72, 0x9e, 0x51, 0xd2, 0xde, 0xb5, 0x95, 0x5f, 0x4d, 0x87, 0xcc, 0x2b, 0x29, 0x9c, 0x7f, 0x01, 0x37, 0x2a, 0xe8, 0x2c, 0xd6, 0x3f, 0x52, 0x9a, 0x26, 0x6d, 0x4b, 0x52, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_868_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_868_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x30, 0x90, 0xf4, 0x87, 0xe5, 0x1f, 0x9e, 0x35, 0xc8, 0xaf, 0x70, 0xbb, 0x9a, 0xb7, 0xdf, 0x45, 0x03, 0x7e, 0x23, 0x0a, 0x33, 0xd2, 0xc1, 0xfd, 0x96, 0xe4, 0x04, 0x25, 0x4f, 0xcb, 0x86, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_868 = { .name = "ecdsa_brainpoolp256r1_sha256_868", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_868_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_868_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_868_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 347 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 869 for ECDSA, tcId is 348 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_869_pubkey[] = { 0x4b, 0xa9, 0xff, 0xba, 0xd2, 0x6f, 0x90, 0x9e, 0x59, 0xff, 0x58, 0x11, 0x8f, 0xb2, 0x5d, 0x05, 0xe1, 0xfd, 0x27, 0x22, 0xcf, 0x1b, 0x9d, 0x88, 0xab, 0xfe, 0xb7, 0x16, 0xc9, 0xf5, 0x46, 0x1f, 0x76, 0xb2, 0xf3, 0x95, 0xfd, 0xac, 0xb8, 0x9f, 0x3b, 0x85, 0xfd, 0xf4, 0xcd, 0x73, 0x36, 0x30, 0x40, 0x30, 0x68, 0x55, 0x9b, 0xa1, 0x2c, 0x0f, 0x43, 0x8f, 0x85, 0x62, 0x86, 0x77, 0x3f, 0x9b, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_869_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_869_sig[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x77, 0x47, 0x2d, 0x9a, 0x28, 0xb4, 0xec, 0xe7, 0x1c, 0xf4, 0x13, 0xa6, 0x8e, 0xac, 0x0e, 0xb4, 0x23, 0xa1, 0x6f, 0xb4, 0x62, 0xb1, 0xf4, 0x87, 0x06, 0xfe, 0xd4, 0x8c, 0xa4, 0x37, 0xbd, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_869 = { .name = "ecdsa_brainpoolp256r1_sha256_869", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_869_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_869_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_869_sig, .siglen = 64, .result = 1, .comment = "extreme value for k, tcId is 348 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 870 for ECDSA, tcId is 349 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_870_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9, 0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_870_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_870_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_870 = { .name = "ecdsa_brainpoolp256r1_sha256_870", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_870_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_870_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_870_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 349 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 871 for ECDSA, tcId is 350 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_871_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9, 0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_871_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_871_sig[] = { 0x98, 0x9c, 0x5c, 0xc3, 0x14, 0x40, 0xc1, 0x16, 0x8f, 0x88, 0xb3, 0x2b, 0xa6, 0xe4, 0x79, 0x00, 0x18, 0x3c, 0x0d, 0x84, 0x3f, 0x9c, 0x41, 0x67, 0x18, 0x98, 0x03, 0x06, 0x64, 0x30, 0x5d, 0x2b, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_871 = { .name = "ecdsa_brainpoolp256r1_sha256_871", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_871_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_871_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_871_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 350 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 872 for ECDSA, tcId is 351 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_872_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x55, 0x7c, 0x5f, 0xa5, 0xde, 0x13, 0xe4, 0xbe, 0xa6, 0x6d, 0xc4, 0x76, 0x89, 0x22, 0x6f, 0xa8, 0xab, 0xc4, 0xb1, 0x10, 0xa7, 0x38, 0x91, 0xd3, 0xc3, 0xf5, 0xf3, 0x55, 0xf0, 0x69, 0xe9, 0xe0, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_872_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_872_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_872 = { .name = "ecdsa_brainpoolp256r1_sha256_872", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_872_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_872_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_872_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 351 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 873 for ECDSA, tcId is 352 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_873_pubkey[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62, 0x55, 0x7c, 0x5f, 0xa5, 0xde, 0x13, 0xe4, 0xbe, 0xa6, 0x6d, 0xc4, 0x76, 0x89, 0x22, 0x6f, 0xa8, 0xab, 0xc4, 0xb1, 0x10, 0xa7, 0x38, 0x91, 0xd3, 0xc3, 0xf5, 0xf3, 0x55, 0xf0, 0x69, 0xe9, 0xe0, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_873_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_873_sig[] = { 0x98, 0x9c, 0x5c, 0xc3, 0x14, 0x40, 0xc1, 0x16, 0x8f, 0x88, 0xb3, 0x2b, 0xa6, 0xe4, 0x79, 0x00, 0x18, 0x3c, 0x0d, 0x84, 0x3f, 0x9c, 0x41, 0x67, 0x18, 0x98, 0x03, 0x06, 0x64, 0x30, 0x5d, 0x2b, 0x18, 0x48, 0x7a, 0x43, 0xf2, 0x8f, 0xcf, 0x1a, 0xe4, 0x57, 0xb8, 0x5d, 0xcd, 0x5b, 0xef, 0xa2, 0x81, 0xbf, 0x11, 0x85, 0x19, 0xe9, 0x60, 0xfe, 0xcb, 0x72, 0x02, 0x12, 0xa7, 0xe5, 0xc3, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_873 = { .name = "ecdsa_brainpoolp256r1_sha256_873", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_873_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_873_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_873_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 352 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 874 for ECDSA, tcId is 353 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_874_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_874_sig[] = { 0x74, 0x5b, 0xe1, 0xda, 0x90, 0x2d, 0x19, 0xc7, 0x6c, 0x8f, 0x57, 0xd4, 0xa1, 0xf3, 0x36, 0x2b, 0x4b, 0x20, 0xed, 0x7c, 0x8d, 0xe8, 0xfc, 0x04, 0x63, 0xd5, 0x66, 0x79, 0x5f, 0x97, 0x9c, 0xea, 0x59, 0x16, 0xc3, 0x17, 0xa1, 0xe3, 0x25, 0xb5, 0x37, 0x35, 0x21, 0x6a, 0x0f, 0xa3, 0x77, 0x37, 0xf0, 0x8b, 0x32, 0x24, 0x5c, 0x88, 0x08, 0x48, 0x17, 0xb4, 0x68, 0xa4, 0x1f, 0x5a, 0xfe, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_874 = { .name = "ecdsa_brainpoolp256r1_sha256_874", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_874_pubkey, .pubkeylen = 64, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp256r1_sha256_874_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 353 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 875 for ECDSA, tcId is 354 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_875_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_875_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_875_sig[] = { 0x0f, 0xf9, 0x27, 0x9a, 0x07, 0x75, 0x74, 0x0b, 0x7d, 0xb8, 0xbe, 0xc0, 0x7f, 0x9a, 0x04, 0x01, 0xb7, 0x90, 0x38, 0x86, 0xcb, 0x19, 0x8c, 0x1b, 0x18, 0xc4, 0x6d, 0xe0, 0x67, 0x3b, 0x31, 0xc3, 0x8b, 0x3c, 0x86, 0x86, 0xbd, 0x1a, 0x15, 0x08, 0xb5, 0xb7, 0x85, 0xe7, 0x62, 0xfe, 0xce, 0x8c, 0x6c, 0xf1, 0x9b, 0x61, 0x56, 0x98, 0x3e, 0x5c, 0x36, 0xb2, 0xbb, 0xe7, 0x24, 0xd6, 0xc2, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_875 = { .name = "ecdsa_brainpoolp256r1_sha256_875", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_875_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_875_msg, .msglen = 3, .sig = ecdsa_brainpoolp256r1_sha256_875_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 354 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 876 for ECDSA, tcId is 355 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_876_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_876_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_876_sig[] = { 0x35, 0x1e, 0x72, 0x70, 0x03, 0x89, 0x6e, 0xc0, 0x29, 0x49, 0xa3, 0xcf, 0x75, 0x22, 0x23, 0xbc, 0xc6, 0xc2, 0xb6, 0x11, 0xb3, 0x03, 0x91, 0xed, 0xd6, 0x0d, 0xc0, 0xc8, 0x3d, 0xc9, 0xc9, 0x8f, 0x92, 0x4a, 0xd9, 0xdc, 0x00, 0x36, 0x4d, 0x4a, 0xa2, 0x09, 0x14, 0x16, 0xd1, 0x73, 0x86, 0x2f, 0x9b, 0x02, 0x96, 0x5f, 0xf1, 0x76, 0xe8, 0x80, 0xea, 0x62, 0xa6, 0x73, 0xe1, 0x6d, 0xb9, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_876 = { .name = "ecdsa_brainpoolp256r1_sha256_876", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_876_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_876_msg, .msglen = 6, .sig = ecdsa_brainpoolp256r1_sha256_876_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 355 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 877 for ECDSA, tcId is 356 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_877_pubkey[] = { 0x26, 0x76, 0xbd, 0x1e, 0x3f, 0xd8, 0x3f, 0x33, 0x28, 0xd1, 0xaf, 0x94, 0x14, 0x42, 0xc0, 0x36, 0x76, 0x0f, 0x09, 0x58, 0x77, 0x29, 0x41, 0x90, 0x53, 0x08, 0x3e, 0xb6, 0x1d, 0x1e, 0xd2, 0x2c, 0x2c, 0xf7, 0x69, 0x68, 0x8a, 0x5f, 0xfd, 0x67, 0xda, 0x18, 0x99, 0xd2, 0x43, 0xe6, 0x6b, 0xca, 0xbe, 0x21, 0xf9, 0xe7, 0x83, 0x35, 0x26, 0x3b, 0xf5, 0x30, 0x8b, 0x8e, 0x41, 0xa7, 0x1b, 0x39, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_877_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_877_sig[] = { 0x44, 0xa8, 0x11, 0xb2, 0x32, 0x1a, 0xcb, 0xc6, 0x5c, 0xac, 0xf8, 0x0d, 0x2d, 0xbe, 0x84, 0x89, 0x46, 0xf1, 0xda, 0xc5, 0x28, 0xf3, 0xe1, 0xae, 0x38, 0xb0, 0xe5, 0x4d, 0x08, 0x3c, 0x25, 0x8f, 0x55, 0xd7, 0xed, 0xfa, 0xec, 0xdd, 0xa3, 0xbb, 0xc0, 0x62, 0xd5, 0x07, 0x4e, 0x3c, 0x37, 0x19, 0xd3, 0x27, 0x61, 0x15, 0x9d, 0x02, 0x7c, 0xa2, 0x7c, 0x17, 0x25, 0xdd, 0xbd, 0x62, 0xf6, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_877 = { .name = "ecdsa_brainpoolp256r1_sha256_877", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_877_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_877_msg, .msglen = 20, .sig = ecdsa_brainpoolp256r1_sha256_877_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 356 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 878 for ECDSA, tcId is 357 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_878_pubkey[] = { 0xa9, 0xfb, 0x57, 0xdb, 0x62, 0x50, 0x13, 0x89, 0x59, 0x4f, 0x0e, 0xe9, 0xfc, 0x16, 0x52, 0xfa, 0x83, 0x37, 0x7f, 0xa3, 0x02, 0xe1, 0x9c, 0xef, 0x64, 0x25, 0x2f, 0xc0, 0xb1, 0x47, 0xf7, 0x74, 0x95, 0x07, 0xac, 0xf5, 0xb0, 0x43, 0x39, 0xed, 0x10, 0x2b, 0x9c, 0xa6, 0x0d, 0xb9, 0x8c, 0x16, 0x5b, 0x94, 0xeb, 0xe8, 0x55, 0xd2, 0x20, 0x2e, 0x46, 0xdc, 0xe1, 0x5b, 0xa1, 0xe0, 0x28, 0xbe, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_878_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_878_sig[] = { 0x62, 0xaa, 0xb4, 0x0a, 0x36, 0xd6, 0xa0, 0xd2, 0x56, 0x44, 0x71, 0x9c, 0xe3, 0x1d, 0xc6, 0x29, 0xec, 0x68, 0x4f, 0x6f, 0x0d, 0xa3, 0x2f, 0x9d, 0xd0, 0x34, 0xcc, 0xc4, 0x21, 0xdb, 0xd0, 0xed, 0xa1, 0xfa, 0x6b, 0x0d, 0xfd, 0x95, 0x58, 0xda, 0x29, 0x37, 0x4f, 0xb7, 0x75, 0x05, 0xee, 0x8a, 0xb3, 0x57, 0x21, 0x61, 0x71, 0x1f, 0x82, 0x1d, 0x11, 0x80, 0x7c, 0x7f, 0xff, 0x91, 0x0c, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_878 = { .name = "ecdsa_brainpoolp256r1_sha256_878", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_878_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_878_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_878_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 357 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 879 for ECDSA, tcId is 358 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_879_pubkey[] = { 0xa9, 0xfb, 0x57, 0xdb, 0x62, 0x50, 0x13, 0x89, 0x59, 0x4f, 0x0e, 0xe9, 0xfc, 0x16, 0x52, 0xfa, 0x83, 0x37, 0x7f, 0xa3, 0x02, 0xe1, 0x9c, 0xef, 0x64, 0x25, 0x2f, 0xc0, 0xb1, 0x47, 0xf7, 0x74, 0x95, 0x07, 0xac, 0xf5, 0xb0, 0x43, 0x39, 0xed, 0x10, 0x2b, 0x9c, 0xa6, 0x0d, 0xb9, 0x8c, 0x16, 0x5b, 0x94, 0xeb, 0xe8, 0x55, 0xd2, 0x20, 0x2e, 0x46, 0xdc, 0xe1, 0x5b, 0xa1, 0xe0, 0x28, 0xbe, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_879_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_879_sig[] = { 0x74, 0x0c, 0xd3, 0xd3, 0xa9, 0xcd, 0x9d, 0xbe, 0x05, 0xea, 0xd4, 0xe3, 0x9e, 0x54, 0xdb, 0x27, 0xc0, 0xf1, 0x57, 0x9d, 0xa6, 0x8e, 0x3a, 0xa5, 0xc9, 0x24, 0x5b, 0x04, 0x7a, 0xeb, 0xc3, 0xb8, 0x8a, 0xe7, 0x8c, 0x12, 0x23, 0x3d, 0x37, 0x8f, 0xe2, 0xce, 0x3c, 0x0f, 0xb2, 0xb7, 0x69, 0xf8, 0x46, 0x38, 0x30, 0xa7, 0x1a, 0x5e, 0x51, 0x87, 0xc1, 0x1b, 0x20, 0xfd, 0xd7, 0xe5, 0x04, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_879 = { .name = "ecdsa_brainpoolp256r1_sha256_879", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_879_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_879_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_879_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 358 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 880 for ECDSA, tcId is 359 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_880_pubkey[] = { 0xa9, 0xfb, 0x57, 0xdb, 0x62, 0x50, 0x13, 0x89, 0x59, 0x4f, 0x0e, 0xe9, 0xfc, 0x16, 0x52, 0xfa, 0x83, 0x37, 0x7f, 0xa3, 0x02, 0xe1, 0x9c, 0xef, 0x64, 0x25, 0x2f, 0xc0, 0xb1, 0x47, 0xf7, 0x74, 0x95, 0x07, 0xac, 0xf5, 0xb0, 0x43, 0x39, 0xed, 0x10, 0x2b, 0x9c, 0xa6, 0x0d, 0xb9, 0x8c, 0x16, 0x5b, 0x94, 0xeb, 0xe8, 0x55, 0xd2, 0x20, 0x2e, 0x46, 0xdc, 0xe1, 0x5b, 0xa1, 0xe0, 0x28, 0xbe, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_880_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_880_sig[] = { 0xa2, 0x8f, 0x30, 0x24, 0x5c, 0x5f, 0xb0, 0xc2, 0x25, 0xfd, 0xec, 0x23, 0x92, 0x4d, 0xc2, 0xcd, 0x4c, 0x2d, 0xa8, 0x88, 0xd1, 0xee, 0x1b, 0xc5, 0x44, 0x58, 0x58, 0xc6, 0x46, 0x01, 0x5c, 0xa8, 0x0e, 0xe3, 0x64, 0xc1, 0x49, 0x1c, 0x45, 0x51, 0xef, 0x35, 0x09, 0xbe, 0x8f, 0x88, 0xdb, 0x0e, 0x04, 0xd0, 0xaf, 0xb3, 0x65, 0x28, 0xae, 0xda, 0x13, 0x01, 0xb1, 0x49, 0x48, 0xcc, 0x9c, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_880 = { .name = "ecdsa_brainpoolp256r1_sha256_880", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_880_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_880_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_880_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 359 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 881 for ECDSA, tcId is 360 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_881_pubkey[] = { 0x35, 0x1a, 0x45, 0xfb, 0x92, 0x0f, 0x2c, 0x9f, 0x1b, 0x17, 0x84, 0x38, 0xfa, 0x3b, 0xf2, 0x72, 0xff, 0x93, 0x28, 0xb8, 0x81, 0xc4, 0x77, 0xa1, 0xf5, 0x6a, 0x8c, 0x0e, 0x88, 0x46, 0x52, 0x76, 0x12, 0x70, 0xf8, 0x06, 0xfe, 0x40, 0xad, 0x97, 0xeb, 0xf7, 0x6c, 0x68, 0x25, 0x38, 0x4b, 0x78, 0x0a, 0xe6, 0xaf, 0xcc, 0xc7, 0x92, 0xb0, 0x5f, 0x2f, 0xb3, 0xeb, 0x7b, 0x7f, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_881_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_881_sig[] = { 0x7f, 0x20, 0x2f, 0x54, 0xf5, 0x91, 0xb5, 0x11, 0x05, 0xb2, 0x27, 0xee, 0x6d, 0x6d, 0xa3, 0xad, 0xdd, 0xfc, 0x4b, 0x5e, 0x81, 0x9e, 0xfc, 0x04, 0xbe, 0xfc, 0xdc, 0xbf, 0x74, 0x84, 0xf7, 0x83, 0x43, 0x60, 0xea, 0x04, 0x50, 0x39, 0x55, 0xfc, 0x3f, 0x02, 0x59, 0x28, 0xb2, 0xdc, 0xe5, 0x0f, 0xf2, 0xd5, 0x8b, 0x90, 0x60, 0xb3, 0x4b, 0xbe, 0xdf, 0xc3, 0xc2, 0x19, 0xb3, 0xb4, 0x35, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_881 = { .name = "ecdsa_brainpoolp256r1_sha256_881", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_881_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_881_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_881_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 360 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 882 for ECDSA, tcId is 361 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_882_pubkey[] = { 0x35, 0x1a, 0x45, 0xfb, 0x92, 0x0f, 0x2c, 0x9f, 0x1b, 0x17, 0x84, 0x38, 0xfa, 0x3b, 0xf2, 0x72, 0xff, 0x93, 0x28, 0xb8, 0x81, 0xc4, 0x77, 0xa1, 0xf5, 0x6a, 0x8c, 0x0e, 0x88, 0x46, 0x52, 0x76, 0x12, 0x70, 0xf8, 0x06, 0xfe, 0x40, 0xad, 0x97, 0xeb, 0xf7, 0x6c, 0x68, 0x25, 0x38, 0x4b, 0x78, 0x0a, 0xe6, 0xaf, 0xcc, 0xc7, 0x92, 0xb0, 0x5f, 0x2f, 0xb3, 0xeb, 0x7b, 0x7f, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_882_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_882_sig[] = { 0x62, 0xe2, 0x18, 0xdc, 0xa3, 0x2e, 0x4e, 0xf3, 0x56, 0x92, 0xe9, 0x31, 0x5e, 0x1e, 0x03, 0x6b, 0xef, 0x17, 0x66, 0x07, 0x3b, 0x84, 0x6e, 0x38, 0xde, 0x20, 0xd2, 0xd2, 0x93, 0x49, 0xf9, 0xfe, 0x51, 0x9d, 0x4d, 0x4c, 0x61, 0x58, 0xd9, 0x54, 0x74, 0xd7, 0x93, 0xa0, 0xee, 0x9c, 0x26, 0x0a, 0x0c, 0x54, 0x69, 0xc5, 0xaa, 0xb7, 0x95, 0x10, 0x97, 0x1b, 0x41, 0xfb, 0x4f, 0xae, 0x4b, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_882 = { .name = "ecdsa_brainpoolp256r1_sha256_882", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_882_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_882_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_882_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 361 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 883 for ECDSA, tcId is 362 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_883_pubkey[] = { 0x35, 0x1a, 0x45, 0xfb, 0x92, 0x0f, 0x2c, 0x9f, 0x1b, 0x17, 0x84, 0x38, 0xfa, 0x3b, 0xf2, 0x72, 0xff, 0x93, 0x28, 0xb8, 0x81, 0xc4, 0x77, 0xa1, 0xf5, 0x6a, 0x8c, 0x0e, 0x88, 0x46, 0x52, 0x76, 0x12, 0x70, 0xf8, 0x06, 0xfe, 0x40, 0xad, 0x97, 0xeb, 0xf7, 0x6c, 0x68, 0x25, 0x38, 0x4b, 0x78, 0x0a, 0xe6, 0xaf, 0xcc, 0xc7, 0x92, 0xb0, 0x5f, 0x2f, 0xb3, 0xeb, 0x7b, 0x7f, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_883_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_883_sig[] = { 0xa3, 0x90, 0x22, 0x95, 0xf6, 0xf7, 0x43, 0xac, 0x75, 0x4d, 0xb7, 0xb3, 0xfc, 0xd8, 0x23, 0xbe, 0x91, 0x7b, 0x11, 0x91, 0xa5, 0x70, 0x57, 0x28, 0xf5, 0x68, 0x24, 0x92, 0x78, 0x4d, 0xa7, 0xf1, 0x43, 0xde, 0xf6, 0x36, 0x66, 0x0e, 0xff, 0x72, 0xe6, 0x43, 0x5e, 0xdb, 0x85, 0x0c, 0x91, 0x26, 0xc7, 0x06, 0x79, 0x38, 0x66, 0x8f, 0x24, 0x99, 0x98, 0xa0, 0xe4, 0x00, 0x6b, 0x8e, 0xe7, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_883 = { .name = "ecdsa_brainpoolp256r1_sha256_883", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_883_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_883_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_883_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 362 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 884 for ECDSA, tcId is 363 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_884_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x29, 0xb2, 0x14, 0x6e, 0x36, 0xfc, 0x05, 0x55, 0x45, 0xbf, 0x8f, 0x2c, 0xc7, 0x0f, 0x8e, 0x73, 0xe8, 0xb2, 0x5e, 0x53, 0x93, 0x65, 0xad, 0x75, 0x77, 0xcc, 0x35, 0x35, 0x4a, 0x2b, 0x8c, 0x03, 0x19, 0xbc, 0x4c, 0xcd, 0x3e, 0x60, 0xda, 0x11, 0x94, 0x77, 0xc2, 0x3f, 0xaf, 0x8f, 0xc2, 0xdc, 0xef, 0xc4, 0x2d, 0x3a, 0xf7, 0x58, 0x27, 0xae, 0xb4, 0x2f, 0x6f, 0x0f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_884_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_884_sig[] = { 0x86, 0xd0, 0x5b, 0x26, 0xa9, 0xca, 0x7e, 0x10, 0xae, 0x06, 0x81, 0xbb, 0x4c, 0x35, 0xa0, 0x6d, 0x7a, 0x4e, 0x91, 0x8f, 0x86, 0x25, 0xe3, 0xdf, 0xa7, 0xac, 0x2d, 0x5a, 0xed, 0xa9, 0x1c, 0x05, 0x08, 0xc5, 0xf4, 0x75, 0xa9, 0x58, 0x88, 0x76, 0x9d, 0xa4, 0xa0, 0xe1, 0xb6, 0x35, 0xc2, 0x29, 0x2f, 0x65, 0x4f, 0x93, 0x4a, 0x5c, 0x50, 0x10, 0xfe, 0x0c, 0x72, 0x9f, 0x3d, 0x11, 0xe1, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_884 = { .name = "ecdsa_brainpoolp256r1_sha256_884", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_884_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_884_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_884_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 363 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 885 for ECDSA, tcId is 364 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_885_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x29, 0xb2, 0x14, 0x6e, 0x36, 0xfc, 0x05, 0x55, 0x45, 0xbf, 0x8f, 0x2c, 0xc7, 0x0f, 0x8e, 0x73, 0xe8, 0xb2, 0x5e, 0x53, 0x93, 0x65, 0xad, 0x75, 0x77, 0xcc, 0x35, 0x35, 0x4a, 0x2b, 0x8c, 0x03, 0x19, 0xbc, 0x4c, 0xcd, 0x3e, 0x60, 0xda, 0x11, 0x94, 0x77, 0xc2, 0x3f, 0xaf, 0x8f, 0xc2, 0xdc, 0xef, 0xc4, 0x2d, 0x3a, 0xf7, 0x58, 0x27, 0xae, 0xb4, 0x2f, 0x6f, 0x0f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_885_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_885_sig[] = { 0x43, 0xc4, 0x47, 0x47, 0x10, 0xd2, 0x50, 0x94, 0xa2, 0xe2, 0x1a, 0x9c, 0xc0, 0x85, 0x85, 0xc2, 0x60, 0x15, 0xf9, 0xf9, 0x40, 0x12, 0xb1, 0x00, 0xe7, 0x2c, 0x07, 0x63, 0xaa, 0x9e, 0x0c, 0xff, 0x83, 0x45, 0xc4, 0x6f, 0xd5, 0x59, 0x2c, 0xef, 0xbd, 0x5e, 0xbb, 0x25, 0x89, 0x65, 0xc0, 0x5d, 0x96, 0x4e, 0x6e, 0x6a, 0x27, 0x81, 0x98, 0xdd, 0xc1, 0xe3, 0x88, 0xcf, 0x1e, 0x75, 0x86, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_885 = { .name = "ecdsa_brainpoolp256r1_sha256_885", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_885_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_885_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_885_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 364 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 886 for ECDSA, tcId is 365 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_886_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x29, 0xb2, 0x14, 0x6e, 0x36, 0xfc, 0x05, 0x55, 0x45, 0xbf, 0x8f, 0x2c, 0xc7, 0x0f, 0x8e, 0x73, 0xe8, 0xb2, 0x5e, 0x53, 0x93, 0x65, 0xad, 0x75, 0x77, 0xcc, 0x35, 0x35, 0x4a, 0x2b, 0x8c, 0x03, 0x19, 0xbc, 0x4c, 0xcd, 0x3e, 0x60, 0xda, 0x11, 0x94, 0x77, 0xc2, 0x3f, 0xaf, 0x8f, 0xc2, 0xdc, 0xef, 0xc4, 0x2d, 0x3a, 0xf7, 0x58, 0x27, 0xae, 0xb4, 0x2f, 0x6f, 0x0f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_886_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_886_sig[] = { 0x6d, 0x27, 0x24, 0x16, 0x7e, 0x81, 0x65, 0x28, 0x49, 0x1c, 0xce, 0x57, 0x4f, 0x05, 0x26, 0x20, 0x9d, 0xe5, 0x2c, 0xd0, 0xf2, 0xaf, 0x00, 0x85, 0x28, 0x4f, 0xd0, 0x50, 0x16, 0x3d, 0x37, 0xc5, 0x76, 0xdd, 0x1d, 0xd5, 0x0f, 0xf9, 0xb5, 0x53, 0xb0, 0xe1, 0x42, 0xb7, 0xe6, 0xc6, 0xbe, 0x8e, 0xdf, 0x37, 0x08, 0xdd, 0x29, 0x2f, 0x03, 0xf3, 0xe9, 0xbf, 0x15, 0x7d, 0x21, 0xda, 0xa9, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_886 = { .name = "ecdsa_brainpoolp256r1_sha256_886", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_886_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_886_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_886_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 365 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 887 for ECDSA, tcId is 366 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_887_pubkey[] = { 0x68, 0x0b, 0xec, 0xab, 0xe7, 0xd7, 0xdf, 0x4f, 0xad, 0xfe, 0x5a, 0xe0, 0x1f, 0xba, 0x5e, 0xa5, 0x1b, 0x76, 0x75, 0x96, 0x06, 0xa2, 0xe3, 0x06, 0x12, 0xe6, 0x67, 0x41, 0x9b, 0x88, 0x5d, 0x05, 0x08, 0x54, 0x1d, 0xcb, 0x07, 0x23, 0x78, 0x5c, 0x3c, 0x76, 0x65, 0x81, 0xa7, 0x51, 0x4a, 0x1f, 0xf4, 0x2e, 0x44, 0x37, 0xd6, 0x3f, 0x87, 0x82, 0x71, 0xcb, 0x86, 0x0f, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_887_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_887_sig[] = { 0x32, 0x10, 0x09, 0xa0, 0x6c, 0x75, 0x9c, 0x54, 0xcd, 0x66, 0xba, 0xaf, 0xa0, 0xcb, 0xfd, 0x07, 0xee, 0xdb, 0x19, 0xf1, 0x2a, 0x1e, 0xd6, 0x54, 0xdd, 0x52, 0xb5, 0x6f, 0x9c, 0x4f, 0xac, 0x7c, 0x19, 0x56, 0x31, 0x0a, 0x7e, 0x47, 0x57, 0xec, 0x83, 0xdd, 0xb9, 0x2d, 0x27, 0x63, 0x60, 0x73, 0x54, 0x67, 0x81, 0x49, 0xf1, 0xad, 0x92, 0x38, 0x79, 0x28, 0xcf, 0x88, 0x7b, 0x4b, 0xed, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_887 = { .name = "ecdsa_brainpoolp256r1_sha256_887", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_887_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_887_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_887_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 366 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 888 for ECDSA, tcId is 367 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_888_pubkey[] = { 0x68, 0x0b, 0xec, 0xab, 0xe7, 0xd7, 0xdf, 0x4f, 0xad, 0xfe, 0x5a, 0xe0, 0x1f, 0xba, 0x5e, 0xa5, 0x1b, 0x76, 0x75, 0x96, 0x06, 0xa2, 0xe3, 0x06, 0x12, 0xe6, 0x67, 0x41, 0x9b, 0x88, 0x5d, 0x05, 0x08, 0x54, 0x1d, 0xcb, 0x07, 0x23, 0x78, 0x5c, 0x3c, 0x76, 0x65, 0x81, 0xa7, 0x51, 0x4a, 0x1f, 0xf4, 0x2e, 0x44, 0x37, 0xd6, 0x3f, 0x87, 0x82, 0x71, 0xcb, 0x86, 0x0f, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_888_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_888_sig[] = { 0x9b, 0xdd, 0x35, 0x98, 0x81, 0xc2, 0x39, 0xe2, 0x41, 0x5c, 0xa2, 0xaf, 0x3d, 0x18, 0x46, 0x3b, 0xb2, 0x4b, 0xe5, 0x3f, 0x6f, 0x63, 0x6c, 0xbd, 0x20, 0x36, 0x0b, 0x6b, 0x33, 0x3b, 0xc3, 0x45, 0x0f, 0xf0, 0x3b, 0xc3, 0x6c, 0xc1, 0x97, 0x5b, 0xdc, 0x86, 0x80, 0xc4, 0x4f, 0xbf, 0x2a, 0xef, 0xdd, 0xf6, 0x7c, 0x11, 0x8c, 0x30, 0x4b, 0x8b, 0x3d, 0x36, 0x0e, 0xb1, 0x02, 0x03, 0xc3, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_888 = { .name = "ecdsa_brainpoolp256r1_sha256_888", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_888_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_888_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_888_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 367 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 889 for ECDSA, tcId is 368 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_889_pubkey[] = { 0x68, 0x0b, 0xec, 0xab, 0xe7, 0xd7, 0xdf, 0x4f, 0xad, 0xfe, 0x5a, 0xe0, 0x1f, 0xba, 0x5e, 0xa5, 0x1b, 0x76, 0x75, 0x96, 0x06, 0xa2, 0xe3, 0x06, 0x12, 0xe6, 0x67, 0x41, 0x9b, 0x88, 0x5d, 0x05, 0x08, 0x54, 0x1d, 0xcb, 0x07, 0x23, 0x78, 0x5c, 0x3c, 0x76, 0x65, 0x81, 0xa7, 0x51, 0x4a, 0x1f, 0xf4, 0x2e, 0x44, 0x37, 0xd6, 0x3f, 0x87, 0x82, 0x71, 0xcb, 0x86, 0x0f, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_889_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_889_sig[] = { 0x48, 0x56, 0x5e, 0xb7, 0xe7, 0x82, 0x0d, 0x40, 0x75, 0x4b, 0x5f, 0x26, 0x4a, 0x4c, 0xea, 0xfa, 0x62, 0xbf, 0x75, 0x08, 0x42, 0x41, 0x51, 0x4b, 0x49, 0x19, 0x95, 0xe7, 0x97, 0x1e, 0x69, 0x95, 0x3d, 0xa6, 0xdf, 0x3d, 0x35, 0x4f, 0x48, 0xda, 0xef, 0x6d, 0x07, 0x8c, 0xf1, 0x12, 0x42, 0x95, 0xfc, 0x8c, 0x32, 0x11, 0xf2, 0x75, 0x79, 0x67, 0xc7, 0x81, 0xdc, 0x2e, 0x9c, 0x62, 0xed, 0x1a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_889 = { .name = "ecdsa_brainpoolp256r1_sha256_889", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_889_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_889_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_889_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 368 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 890 for ECDSA, tcId is 369 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_890_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0x00, 0x00, 0x00, 0x01, 0x46, 0x9f, 0xb4, 0x56, 0xca, 0x6a, 0x17, 0x20, 0xca, 0x8d, 0xb2, 0x5d, 0x56, 0x7e, 0x12, 0x1c, 0xf9, 0x21, 0xce, 0x13, 0xe3, 0x40, 0x00, 0xf8, 0xc1, 0x2f, 0x52, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_890_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_890_sig[] = { 0x51, 0x8e, 0x88, 0x5d, 0xef, 0x02, 0x2e, 0xb5, 0x02, 0x0f, 0xc9, 0x0f, 0x40, 0x24, 0xd8, 0x71, 0x22, 0xdc, 0x0f, 0x3e, 0xd7, 0xf8, 0x69, 0xed, 0x77, 0x20, 0xff, 0x74, 0xa0, 0x09, 0xfb, 0x7b, 0x8a, 0x3e, 0x26, 0xa8, 0xcd, 0x42, 0x6d, 0x21, 0xeb, 0xa5, 0xcd, 0x7a, 0x56, 0x14, 0xf3, 0x64, 0x43, 0x95, 0xcf, 0xce, 0xcb, 0x24, 0xfe, 0x76, 0x0a, 0x68, 0xa7, 0xa9, 0xe8, 0xf0, 0x9c, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_890 = { .name = "ecdsa_brainpoolp256r1_sha256_890", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_890_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_890_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_890_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 369 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 891 for ECDSA, tcId is 370 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_891_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0x00, 0x00, 0x00, 0x01, 0x46, 0x9f, 0xb4, 0x56, 0xca, 0x6a, 0x17, 0x20, 0xca, 0x8d, 0xb2, 0x5d, 0x56, 0x7e, 0x12, 0x1c, 0xf9, 0x21, 0xce, 0x13, 0xe3, 0x40, 0x00, 0xf8, 0xc1, 0x2f, 0x52, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_891_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_891_sig[] = { 0x04, 0xb0, 0x1e, 0x5c, 0xc3, 0xce, 0x9b, 0xf1, 0x08, 0x44, 0xbc, 0x1c, 0xb2, 0x1d, 0xee, 0xff, 0x6e, 0xbc, 0x9e, 0x2a, 0x70, 0x10, 0xcf, 0xbb, 0x3a, 0xf0, 0x81, 0x13, 0x54, 0x59, 0x9c, 0x81, 0x2e, 0x65, 0xfb, 0x8d, 0xb6, 0x2f, 0x25, 0x59, 0x10, 0xea, 0x4d, 0x52, 0x35, 0xbb, 0x21, 0xaa, 0x67, 0xaa, 0x59, 0xff, 0xd5, 0x19, 0x91, 0x1e, 0xcd, 0x98, 0x93, 0x00, 0x0a, 0xb6, 0x7b, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_891 = { .name = "ecdsa_brainpoolp256r1_sha256_891", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_891_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_891_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_891_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 370 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 892 for ECDSA, tcId is 371 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_892_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0x00, 0x00, 0x00, 0x01, 0x46, 0x9f, 0xb4, 0x56, 0xca, 0x6a, 0x17, 0x20, 0xca, 0x8d, 0xb2, 0x5d, 0x56, 0x7e, 0x12, 0x1c, 0xf9, 0x21, 0xce, 0x13, 0xe3, 0x40, 0x00, 0xf8, 0xc1, 0x2f, 0x52, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_892_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_892_sig[] = { 0x94, 0xbb, 0x06, 0x01, 0x19, 0x8c, 0x4c, 0xe2, 0x66, 0xb0, 0x93, 0x24, 0x26, 0xff, 0xd0, 0x01, 0x32, 0xd7, 0xd4, 0xe2, 0xde, 0x65, 0xef, 0x47, 0xf5, 0x63, 0x60, 0x82, 0x5f, 0x26, 0x24, 0x38, 0x27, 0x34, 0x32, 0x7d, 0x19, 0x89, 0xc9, 0x58, 0x0f, 0x54, 0x58, 0xf0, 0x4a, 0xac, 0x6f, 0xd5, 0x75, 0x2a, 0x1e, 0xe5, 0xe2, 0x36, 0xe9, 0xed, 0x1a, 0x7c, 0x0b, 0x2d, 0x9b, 0x36, 0xdb, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_892 = { .name = "ecdsa_brainpoolp256r1_sha256_892", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_892_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_892_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_892_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 371 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 893 for ECDSA, tcId is 372 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_893_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0xa9, 0xfb, 0x57, 0xda, 0x5b, 0x4e, 0xf5, 0x65, 0x73, 0xfb, 0xf3, 0x6f, 0xd2, 0xf5, 0xdb, 0x15, 0x17, 0xbd, 0xe4, 0x06, 0xdc, 0x04, 0x52, 0x14, 0x3c, 0xd3, 0x47, 0x24, 0x5e, 0x3f, 0x01, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_893_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_893_sig[] = { 0x4d, 0xde, 0x19, 0x7f, 0x96, 0x2c, 0x63, 0xa7, 0x79, 0x9c, 0x86, 0x2e, 0x89, 0x7b, 0x3b, 0xb1, 0xe7, 0xa7, 0xdd, 0xfb, 0x9a, 0xb7, 0x7c, 0x2a, 0x17, 0xa5, 0x41, 0x51, 0xce, 0x60, 0x4a, 0xd6, 0x01, 0x7e, 0x7a, 0xef, 0x86, 0xe5, 0x33, 0x08, 0x64, 0x25, 0xa2, 0xc4, 0xb3, 0x20, 0x82, 0xf1, 0x18, 0x91, 0x3e, 0xf3, 0x66, 0x7c, 0x84, 0x37, 0x67, 0x2e, 0x0b, 0xbc, 0x7c, 0x2b, 0x8d, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_893 = { .name = "ecdsa_brainpoolp256r1_sha256_893", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_893_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_893_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_893_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 372 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 894 for ECDSA, tcId is 373 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_894_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0xa9, 0xfb, 0x57, 0xda, 0x5b, 0x4e, 0xf5, 0x65, 0x73, 0xfb, 0xf3, 0x6f, 0xd2, 0xf5, 0xdb, 0x15, 0x17, 0xbd, 0xe4, 0x06, 0xdc, 0x04, 0x52, 0x14, 0x3c, 0xd3, 0x47, 0x24, 0x5e, 0x3f, 0x01, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_894_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_894_sig[] = { 0x7c, 0x53, 0xed, 0x1d, 0x50, 0x4a, 0xd4, 0xba, 0x53, 0xd3, 0x97, 0x92, 0x01, 0x2a, 0x34, 0xd0, 0x07, 0x25, 0x0a, 0x2b, 0x8d, 0x1c, 0xa1, 0x89, 0xc0, 0xd9, 0xf7, 0x5c, 0xcc, 0x9a, 0x99, 0x57, 0x09, 0xb9, 0x7d, 0xcc, 0x5c, 0x67, 0x48, 0x71, 0x14, 0x23, 0x1d, 0x60, 0x13, 0x74, 0xa8, 0x36, 0x4c, 0xaf, 0xa3, 0x95, 0x81, 0x29, 0x17, 0x62, 0x20, 0x2b, 0x92, 0x15, 0xd5, 0x11, 0x35, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_894 = { .name = "ecdsa_brainpoolp256r1_sha256_894", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_894_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_894_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_894_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 373 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 895 for ECDSA, tcId is 374 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_895_pubkey[] = { 0x7d, 0x16, 0xfd, 0x65, 0x6a, 0x9e, 0x6b, 0x34, 0xe4, 0x5d, 0x8c, 0x8c, 0x3b, 0x45, 0x8e, 0xae, 0x7b, 0xbc, 0x28, 0x79, 0xf8, 0xb4, 0xf6, 0x11, 0x71, 0xa9, 0x6f, 0x66, 0x4e, 0xee, 0x90, 0x61, 0xa9, 0xfb, 0x57, 0xda, 0x5b, 0x4e, 0xf5, 0x65, 0x73, 0xfb, 0xf3, 0x6f, 0xd2, 0xf5, 0xdb, 0x15, 0x17, 0xbd, 0xe4, 0x06, 0xdc, 0x04, 0x52, 0x14, 0x3c, 0xd3, 0x47, 0x24, 0x5e, 0x3f, 0x01, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_895_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_895_sig[] = { 0x51, 0x32, 0x45, 0xab, 0x2b, 0x6a, 0x42, 0x06, 0xbb, 0x0f, 0x69, 0x70, 0xc8, 0xad, 0x04, 0x0a, 0x94, 0x72, 0x5d, 0xdc, 0x9a, 0x08, 0xdb, 0x0f, 0xd9, 0xde, 0xf9, 0x38, 0x66, 0xff, 0xbb, 0xa1, 0xa5, 0x3a, 0x7a, 0xb3, 0x7d, 0xec, 0xed, 0xae, 0x18, 0xdd, 0x5b, 0x5c, 0x48, 0xeb, 0x64, 0x2b, 0x7a, 0x9c, 0x92, 0x7e, 0x6b, 0xcf, 0x6b, 0xda, 0xc3, 0xa7, 0x57, 0xe6, 0xd2, 0xc1, 0x69, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_895 = { .name = "ecdsa_brainpoolp256r1_sha256_895", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_895_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_895_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_895_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 374 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 896 for ECDSA, tcId is 375 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_896_pubkey[] = { 0x81, 0x52, 0x8b, 0x7a, 0xdb, 0xbe, 0xbf, 0x1b, 0x6b, 0x3c, 0x7f, 0xa1, 0xd6, 0x12, 0x84, 0xb0, 0x77, 0x59, 0xb9, 0xa9, 0x8d, 0x31, 0xa5, 0x70, 0x27, 0x07, 0xb0, 0x18, 0xfd, 0xec, 0xff, 0x11, 0x75, 0xbb, 0xfc, 0xcb, 0x54, 0x53, 0x81, 0xbf, 0x86, 0x01, 0x03, 0x17, 0x31, 0x84, 0x18, 0x29, 0x40, 0x1b, 0x08, 0xdc, 0xdc, 0x68, 0xcc, 0x34, 0xe0, 0x6a, 0x64, 0xe4, 0x12, 0x03, 0x85, 0x12, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_896_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_896_sig[] = { 0xa5, 0x03, 0x18, 0xc3, 0x06, 0x6a, 0x49, 0x66, 0xad, 0x18, 0xae, 0x8f, 0x85, 0x25, 0x3f, 0xbb, 0x58, 0x35, 0xa3, 0x4b, 0x2f, 0x91, 0x87, 0xda, 0xac, 0x71, 0xee, 0x28, 0xd3, 0xd5, 0xd0, 0xeb, 0x08, 0x90, 0xef, 0x0f, 0xc9, 0x3d, 0xf2, 0x22, 0xd1, 0x11, 0x97, 0xcb, 0x22, 0x14, 0x83, 0xce, 0x89, 0x7b, 0x0c, 0xf1, 0xac, 0xf4, 0xa9, 0x09, 0xc3, 0x06, 0xc5, 0xa4, 0x85, 0x77, 0x6a, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_896 = { .name = "ecdsa_brainpoolp256r1_sha256_896", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_896_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_896_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_896_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 375 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 897 for ECDSA, tcId is 376 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_897_pubkey[] = { 0x81, 0x52, 0x8b, 0x7a, 0xdb, 0xbe, 0xbf, 0x1b, 0x6b, 0x3c, 0x7f, 0xa1, 0xd6, 0x12, 0x84, 0xb0, 0x77, 0x59, 0xb9, 0xa9, 0x8d, 0x31, 0xa5, 0x70, 0x27, 0x07, 0xb0, 0x18, 0xfd, 0xec, 0xff, 0x11, 0x75, 0xbb, 0xfc, 0xcb, 0x54, 0x53, 0x81, 0xbf, 0x86, 0x01, 0x03, 0x17, 0x31, 0x84, 0x18, 0x29, 0x40, 0x1b, 0x08, 0xdc, 0xdc, 0x68, 0xcc, 0x34, 0xe0, 0x6a, 0x64, 0xe4, 0x12, 0x03, 0x85, 0x12, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_897_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_897_sig[] = { 0x04, 0x1e, 0x03, 0x89, 0xdd, 0xa2, 0xcf, 0x2a, 0xe3, 0xa9, 0x56, 0x2a, 0x0f, 0xb5, 0xd4, 0x1c, 0x1f, 0x75, 0x33, 0xe6, 0xcc, 0x84, 0xa8, 0x96, 0xe9, 0x9a, 0xf7, 0x81, 0xe2, 0x10, 0x97, 0x70, 0x36, 0x6b, 0x5d, 0x88, 0xc3, 0x6f, 0x12, 0x27, 0xdf, 0x52, 0x2f, 0xda, 0xb6, 0x5e, 0x12, 0x34, 0x7d, 0x68, 0xeb, 0x64, 0xf2, 0xde, 0x82, 0xc6, 0x48, 0x11, 0x5f, 0xd5, 0x65, 0xbd, 0x37, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_897 = { .name = "ecdsa_brainpoolp256r1_sha256_897", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_897_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_897_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_897_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 376 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 898 for ECDSA, tcId is 377 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_898_pubkey[] = { 0x81, 0x52, 0x8b, 0x7a, 0xdb, 0xbe, 0xbf, 0x1b, 0x6b, 0x3c, 0x7f, 0xa1, 0xd6, 0x12, 0x84, 0xb0, 0x77, 0x59, 0xb9, 0xa9, 0x8d, 0x31, 0xa5, 0x70, 0x27, 0x07, 0xb0, 0x18, 0xfd, 0xec, 0xff, 0x11, 0x75, 0xbb, 0xfc, 0xcb, 0x54, 0x53, 0x81, 0xbf, 0x86, 0x01, 0x03, 0x17, 0x31, 0x84, 0x18, 0x29, 0x40, 0x1b, 0x08, 0xdc, 0xdc, 0x68, 0xcc, 0x34, 0xe0, 0x6a, 0x64, 0xe4, 0x12, 0x03, 0x85, 0x12, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_898_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_898_sig[] = { 0x2a, 0x76, 0x39, 0x4a, 0x04, 0xae, 0x19, 0xb2, 0x5c, 0x54, 0x29, 0x1e, 0x28, 0xbc, 0xd4, 0x2a, 0x7e, 0xde, 0xb2, 0x09, 0x81, 0xb8, 0xa3, 0xb8, 0x38, 0xf9, 0xdd, 0x0e, 0x29, 0xb5, 0x74, 0xc1, 0x9c, 0xe8, 0x99, 0x80, 0xae, 0x43, 0x2c, 0x4f, 0xa6, 0xa6, 0x80, 0x25, 0xda, 0x55, 0x4b, 0xf9, 0x00, 0xcc, 0x2e, 0xb0, 0xc6, 0x69, 0x06, 0x42, 0x0d, 0x32, 0x2c, 0x14, 0xb4, 0x53, 0x04, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_898 = { .name = "ecdsa_brainpoolp256r1_sha256_898", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_898_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_898_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_898_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 377 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 899 for ECDSA, tcId is 378 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_899_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x16, 0xea, 0x8e, 0x03, 0xc2, 0x09, 0x77, 0xf2, 0x0a, 0xed, 0x58, 0x10, 0x6b, 0x6d, 0x9d, 0x10, 0x85, 0xb4, 0x47, 0x5f, 0x75, 0xb5, 0x46, 0x9c, 0x5f, 0x42, 0x6c, 0xb2, 0x7e, 0xc6, 0xd8, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_899_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_899_sig[] = { 0x66, 0x95, 0x8b, 0xe3, 0x37, 0x94, 0x05, 0x82, 0x6a, 0x00, 0xda, 0xf5, 0x49, 0x5b, 0x16, 0x57, 0x69, 0x81, 0x26, 0xa5, 0xff, 0x44, 0x9f, 0x96, 0x49, 0xaf, 0x26, 0xca, 0x96, 0xdf, 0x96, 0x67, 0x9b, 0x41, 0x00, 0x81, 0x6e, 0x27, 0x41, 0xf8, 0x6c, 0x5c, 0x0b, 0x0d, 0xcf, 0x82, 0xe5, 0x79, 0xf4, 0x28, 0x1d, 0x2b, 0x8e, 0x70, 0xc2, 0x34, 0x80, 0x8d, 0x84, 0xc1, 0xa4, 0x95, 0x07, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_899 = { .name = "ecdsa_brainpoolp256r1_sha256_899", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_899_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_899_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_899_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP256t1, tcId is 378 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 900 for ECDSA, tcId is 379 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_900_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x16, 0xea, 0x8e, 0x03, 0xc2, 0x09, 0x77, 0xf2, 0x0a, 0xed, 0x58, 0x10, 0x6b, 0x6d, 0x9d, 0x10, 0x85, 0xb4, 0x47, 0x5f, 0x75, 0xb5, 0x46, 0x9c, 0x5f, 0x42, 0x6c, 0xb2, 0x7e, 0xc6, 0xd8, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_900_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_900_sig[] = { 0x53, 0xed, 0x0f, 0x4b, 0x8f, 0xb3, 0x3e, 0xf2, 0x77, 0xcd, 0xd1, 0x06, 0x04, 0x35, 0xed, 0x3d, 0xec, 0x51, 0x8a, 0x22, 0x56, 0x59, 0xf7, 0x1f, 0x67, 0xf9, 0xa1, 0xf0, 0x7f, 0x85, 0xc1, 0xca, 0x12, 0x4d, 0x5f, 0x94, 0xdd, 0xf1, 0x2b, 0xb4, 0xcb, 0xe3, 0xc5, 0xce, 0xa6, 0xd2, 0x68, 0x6d, 0x44, 0x80, 0xda, 0xbb, 0x8f, 0xfb, 0xb0, 0x5e, 0x52, 0x38, 0xc8, 0x77, 0xfe, 0x20, 0x38, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_900 = { .name = "ecdsa_brainpoolp256r1_sha256_900", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_900_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_900_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_900_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP256t1, tcId is 379 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 901 for ECDSA, tcId is 380 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_901_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x16, 0xea, 0x8e, 0x03, 0xc2, 0x09, 0x77, 0xf2, 0x0a, 0xed, 0x58, 0x10, 0x6b, 0x6d, 0x9d, 0x10, 0x85, 0xb4, 0x47, 0x5f, 0x75, 0xb5, 0x46, 0x9c, 0x5f, 0x42, 0x6c, 0xb2, 0x7e, 0xc6, 0xd8, 0x72, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_901_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_901_sig[] = { 0x46, 0x64, 0x3c, 0x7f, 0xe0, 0xf3, 0x08, 0xb8, 0xaf, 0x4c, 0xe2, 0x97, 0x8d, 0x79, 0x7e, 0x8c, 0x46, 0xa7, 0xe1, 0xf8, 0xbf, 0xee, 0x0b, 0x5c, 0xdb, 0xae, 0xcd, 0xe1, 0xf5, 0x9b, 0xe4, 0x1d, 0x1b, 0xd1, 0x1a, 0x81, 0x4d, 0x1f, 0xbd, 0x9a, 0xe9, 0x7a, 0x49, 0xdf, 0x99, 0xbe, 0xca, 0x7f, 0xec, 0x25, 0x12, 0x56, 0x3c, 0x00, 0x31, 0xc5, 0xaa, 0xd5, 0xb9, 0xfc, 0x2f, 0xb0, 0xa5, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_901 = { .name = "ecdsa_brainpoolp256r1_sha256_901", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_901_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_901_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_901_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP256t1, tcId is 380 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 902 for ECDSA, tcId is 381 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_902_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x93, 0x10, 0xc9, 0xd7, 0xdf, 0xe5, 0x31, 0xca, 0x33, 0x78, 0xb2, 0x80, 0x32, 0x15, 0xf0, 0x61, 0xe8, 0x87, 0xae, 0xc4, 0x5f, 0x70, 0xd9, 0x8b, 0xc0, 0xd0, 0xdb, 0x6a, 0xa0, 0xa7, 0x7b, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_902_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_902_sig[] = { 0x4f, 0x83, 0x3b, 0xec, 0x9c, 0x80, 0x18, 0x5b, 0xea, 0xcb, 0xb7, 0x3b, 0x5f, 0x98, 0x4e, 0x2c, 0x03, 0xd9, 0x22, 0x35, 0x9b, 0xe7, 0x46, 0x8c, 0xe3, 0x75, 0x84, 0xf5, 0x3d, 0x1a, 0xea, 0x4a, 0x66, 0x36, 0x74, 0x4a, 0xb7, 0xfe, 0xca, 0xa5, 0x35, 0x41, 0xbc, 0xf5, 0xf3, 0x7c, 0x6c, 0xbe, 0x82, 0x8a, 0x8e, 0xfb, 0xc4, 0xd0, 0x0f, 0x64, 0x69, 0xba, 0x39, 0x0a, 0x86, 0x70, 0x8a, 0x26, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_902 = { .name = "ecdsa_brainpoolp256r1_sha256_902", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_902_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_902_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_902_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP256t1, tcId is 381 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 903 for ECDSA, tcId is 382 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_903_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x93, 0x10, 0xc9, 0xd7, 0xdf, 0xe5, 0x31, 0xca, 0x33, 0x78, 0xb2, 0x80, 0x32, 0x15, 0xf0, 0x61, 0xe8, 0x87, 0xae, 0xc4, 0x5f, 0x70, 0xd9, 0x8b, 0xc0, 0xd0, 0xdb, 0x6a, 0xa0, 0xa7, 0x7b, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_903_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_903_sig[] = { 0xa2, 0x86, 0x9d, 0xa4, 0x16, 0x52, 0x3a, 0xad, 0x2b, 0x8f, 0xa8, 0xaa, 0xd5, 0xc3, 0xb3, 0x1c, 0x5a, 0x53, 0x5f, 0xdd, 0x41, 0x3b, 0x71, 0xaf, 0x4d, 0xff, 0xb9, 0x0c, 0x6f, 0x96, 0xa6, 0x69, 0x29, 0xff, 0x3e, 0x8d, 0x49, 0x9c, 0xab, 0xc3, 0xcc, 0x4c, 0xcc, 0xd0, 0xfa, 0x81, 0x1c, 0xc3, 0xb0, 0x47, 0x70, 0xaa, 0x71, 0xf0, 0xd0, 0x52, 0x18, 0x52, 0x10, 0xb1, 0x4d, 0x31, 0x99, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_903 = { .name = "ecdsa_brainpoolp256r1_sha256_903", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_903_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_903_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_903_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP256t1, tcId is 382 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 904 for ECDSA, tcId is 383 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_904_pubkey[] = { 0xa3, 0xa2, 0x5a, 0x35, 0x3c, 0xaa, 0x94, 0xac, 0x4e, 0xed, 0x37, 0x00, 0xf7, 0xd5, 0x6b, 0x45, 0x6a, 0x0f, 0xc6, 0x70, 0xd5, 0x6a, 0x16, 0x6d, 0x52, 0x19, 0xb7, 0xc9, 0x7f, 0x30, 0xef, 0x3e, 0x93, 0x10, 0xc9, 0xd7, 0xdf, 0xe5, 0x31, 0xca, 0x33, 0x78, 0xb2, 0x80, 0x32, 0x15, 0xf0, 0x61, 0xe8, 0x87, 0xae, 0xc4, 0x5f, 0x70, 0xd9, 0x8b, 0xc0, 0xd0, 0xdb, 0x6a, 0xa0, 0xa7, 0x7b, 0x05, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_904_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_904_sig[] = { 0x63, 0xdb, 0xfe, 0x29, 0x24, 0x9a, 0x50, 0x6b, 0x89, 0xfb, 0xd2, 0xcb, 0x1f, 0xaf, 0xc2, 0x54, 0xa9, 0x58, 0x2d, 0xfc, 0x4b, 0x08, 0xd1, 0x43, 0xb6, 0xd2, 0x5b, 0xf2, 0xab, 0x49, 0xd5, 0x5e, 0x44, 0xca, 0xd8, 0x0c, 0x00, 0x46, 0x09, 0x05, 0xe1, 0x03, 0xf2, 0x6d, 0xa8, 0x4c, 0xef, 0xd7, 0x1a, 0xf4, 0xbc, 0x7a, 0x71, 0x96, 0x2a, 0x3b, 0xce, 0x32, 0x1b, 0xc3, 0xb5, 0x84, 0x27, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_904 = { .name = "ecdsa_brainpoolp256r1_sha256_904", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_904_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_904_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_904_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP256t1, tcId is 383 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 905 for ECDSA, tcId is 384 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_905_pubkey[] = { 0x6d, 0x49, 0x9b, 0x07, 0x7a, 0xb6, 0xd7, 0x7b, 0x24, 0x43, 0x20, 0xa2, 0xca, 0xca, 0xb9, 0x1a, 0x76, 0x45, 0x95, 0xdd, 0x67, 0xa7, 0xa8, 0xdf, 0xcf, 0x84, 0xda, 0x7d, 0x38, 0xb2, 0xd8, 0xf4, 0x59, 0x94, 0xc0, 0x7b, 0x83, 0x3f, 0xf4, 0x90, 0x9c, 0x1a, 0x92, 0xcc, 0x9f, 0x24, 0xde, 0xa8, 0x8b, 0xe8, 0x60, 0x3b, 0x40, 0x7b, 0x00, 0xd2, 0x28, 0xfa, 0xf2, 0x15, 0x8d, 0xb2, 0x35, 0x4f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_905_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_905_sig[] = { 0x9d, 0x90, 0x7c, 0xf8, 0x8e, 0x10, 0xd6, 0x0c, 0x3f, 0x23, 0x89, 0x24, 0x98, 0xfe, 0x43, 0xdd, 0xb0, 0x2f, 0x82, 0x4f, 0xb1, 0x8e, 0x6b, 0xe3, 0x13, 0xe0, 0x2d, 0x94, 0xf2, 0xc8, 0xe0, 0x90, 0x0c, 0x16, 0xb9, 0xe0, 0xdb, 0x4d, 0xc8, 0x60, 0x6c, 0x02, 0x3b, 0x00, 0x1f, 0x69, 0xb3, 0xc8, 0x86, 0x08, 0x07, 0x94, 0xfc, 0x9d, 0x7f, 0xe3, 0x1b, 0x00, 0xc1, 0xcf, 0x09, 0x35, 0xe4, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_905 = { .name = "ecdsa_brainpoolp256r1_sha256_905", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_905_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_905_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_905_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 384 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 906 for ECDSA, tcId is 385 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_906_pubkey[] = { 0x6d, 0x49, 0x9b, 0x07, 0x7a, 0xb6, 0xd7, 0x7b, 0x24, 0x43, 0x20, 0xa2, 0xca, 0xca, 0xb9, 0x1a, 0x76, 0x45, 0x95, 0xdd, 0x67, 0xa7, 0xa8, 0xdf, 0xcf, 0x84, 0xda, 0x7d, 0x38, 0xb2, 0xd8, 0xf4, 0x59, 0x94, 0xc0, 0x7b, 0x83, 0x3f, 0xf4, 0x90, 0x9c, 0x1a, 0x92, 0xcc, 0x9f, 0x24, 0xde, 0xa8, 0x8b, 0xe8, 0x60, 0x3b, 0x40, 0x7b, 0x00, 0xd2, 0x28, 0xfa, 0xf2, 0x15, 0x8d, 0xb2, 0x35, 0x4f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_906_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_906_sig[] = { 0x73, 0x95, 0xce, 0x0e, 0xf6, 0x52, 0x84, 0x8a, 0x86, 0xb6, 0x10, 0x97, 0xcc, 0x95, 0x43, 0x99, 0x8d, 0x39, 0xda, 0xe8, 0x8a, 0x1f, 0xc9, 0xe4, 0xdf, 0xdd, 0x69, 0x64, 0x29, 0x49, 0x54, 0x89, 0x7d, 0xe2, 0x9e, 0x25, 0x6e, 0x82, 0x02, 0x38, 0x2f, 0x91, 0xc1, 0x16, 0xa6, 0x67, 0xa8, 0xb9, 0x46, 0xf2, 0x10, 0x44, 0x7a, 0x57, 0x36, 0x9b, 0xa6, 0x1a, 0xe4, 0xfa, 0xe7, 0x3d, 0xd1, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_906 = { .name = "ecdsa_brainpoolp256r1_sha256_906", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_906_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_906_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_906_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 385 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 907 for ECDSA, tcId is 386 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_907_pubkey[] = { 0x6d, 0x49, 0x9b, 0x07, 0x7a, 0xb6, 0xd7, 0x7b, 0x24, 0x43, 0x20, 0xa2, 0xca, 0xca, 0xb9, 0x1a, 0x76, 0x45, 0x95, 0xdd, 0x67, 0xa7, 0xa8, 0xdf, 0xcf, 0x84, 0xda, 0x7d, 0x38, 0xb2, 0xd8, 0xf4, 0x59, 0x94, 0xc0, 0x7b, 0x83, 0x3f, 0xf4, 0x90, 0x9c, 0x1a, 0x92, 0xcc, 0x9f, 0x24, 0xde, 0xa8, 0x8b, 0xe8, 0x60, 0x3b, 0x40, 0x7b, 0x00, 0xd2, 0x28, 0xfa, 0xf2, 0x15, 0x8d, 0xb2, 0x35, 0x4f, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_907_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_907_sig[] = { 0x7b, 0xaf, 0x1f, 0xde, 0x87, 0xcc, 0xb1, 0xbe, 0xa0, 0xf8, 0x93, 0xb3, 0xbf, 0xb2, 0x54, 0x9c, 0x04, 0xbc, 0xa1, 0x88, 0x35, 0xd8, 0xeb, 0x5a, 0x31, 0xb8, 0xd2, 0x05, 0x06, 0xff, 0x88, 0xc3, 0x28, 0x9e, 0xbe, 0x82, 0x9f, 0xef, 0xb9, 0xad, 0x00, 0x9d, 0x7c, 0xdd, 0x62, 0x28, 0x74, 0xae, 0xf5, 0xfa, 0x08, 0x8f, 0x05, 0x08, 0xa4, 0xb4, 0x3d, 0x58, 0x95, 0xd6, 0x16, 0x45, 0xce, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_907 = { .name = "ecdsa_brainpoolp256r1_sha256_907", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_907_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_907_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_907_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP256t1, tcId is 386 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 908 for ECDSA, tcId is 387 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_908_pubkey[] = { 0x08, 0xc2, 0xf9, 0x5f, 0xfe, 0xdd, 0xe1, 0xd5, 0x5e, 0x3f, 0x2c, 0x9d, 0xcf, 0x58, 0x84, 0x34, 0x7f, 0x69, 0x04, 0xc6, 0x49, 0x22, 0x73, 0xad, 0x76, 0x0e, 0xb7, 0xb9, 0xb3, 0x5f, 0x03, 0x6b, 0x2b, 0xcf, 0x7a, 0x04, 0x8c, 0xaa, 0x2c, 0x72, 0x6a, 0xe8, 0x80, 0x8d, 0xc9, 0x53, 0x12, 0xeb, 0x23, 0x50, 0x27, 0x5a, 0x8f, 0x4f, 0xbe, 0xea, 0x7c, 0x0f, 0x32, 0xf3, 0x83, 0x9c, 0x7b, 0x93, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_908_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_908_sig[] = { 0x33, 0xe3, 0x7c, 0x3b, 0x66, 0xac, 0xab, 0xee, 0x3d, 0x68, 0xcb, 0xbb, 0x9c, 0x55, 0xcd, 0x52, 0xb5, 0x86, 0xde, 0x51, 0x64, 0x77, 0x23, 0xfa, 0x84, 0xe5, 0x32, 0xa3, 0xec, 0x59, 0x53, 0xef, 0x3b, 0x8a, 0x9e, 0xe7, 0x07, 0xd1, 0xbc, 0x5f, 0x83, 0xe1, 0x7e, 0xa0, 0x72, 0xad, 0xc2, 0xec, 0xda, 0x92, 0xe6, 0x37, 0xd7, 0xc0, 0x60, 0x60, 0xf1, 0xaf, 0x79, 0xb9, 0x29, 0xa8, 0x50, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_908 = { .name = "ecdsa_brainpoolp256r1_sha256_908", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_908_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_908_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_908_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP256t1, tcId is 387 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 909 for ECDSA, tcId is 388 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_909_pubkey[] = { 0x08, 0xc2, 0xf9, 0x5f, 0xfe, 0xdd, 0xe1, 0xd5, 0x5e, 0x3f, 0x2c, 0x9d, 0xcf, 0x58, 0x84, 0x34, 0x7f, 0x69, 0x04, 0xc6, 0x49, 0x22, 0x73, 0xad, 0x76, 0x0e, 0xb7, 0xb9, 0xb3, 0x5f, 0x03, 0x6b, 0x2b, 0xcf, 0x7a, 0x04, 0x8c, 0xaa, 0x2c, 0x72, 0x6a, 0xe8, 0x80, 0x8d, 0xc9, 0x53, 0x12, 0xeb, 0x23, 0x50, 0x27, 0x5a, 0x8f, 0x4f, 0xbe, 0xea, 0x7c, 0x0f, 0x32, 0xf3, 0x83, 0x9c, 0x7b, 0x93, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_909_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_909_sig[] = { 0x1f, 0x8e, 0xbd, 0xc9, 0x4e, 0xcd, 0xdd, 0x84, 0xf9, 0x09, 0x60, 0xcc, 0x55, 0xd0, 0xca, 0x02, 0xe3, 0x3d, 0x70, 0x53, 0x5f, 0xc1, 0xc7, 0x32, 0x2b, 0x3c, 0x27, 0x83, 0xb9, 0xdc, 0x92, 0x38, 0x20, 0x5a, 0xa8, 0x62, 0x6c, 0x3a, 0x5d, 0xa2, 0x14, 0xe5, 0x48, 0x5b, 0x11, 0x15, 0x4a, 0x37, 0x8d, 0x70, 0xb0, 0xd3, 0x32, 0x3a, 0xb8, 0x68, 0x52, 0x8a, 0xe8, 0x04, 0x8d, 0x17, 0xb6, 0x96, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_909 = { .name = "ecdsa_brainpoolp256r1_sha256_909", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_909_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_909_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_909_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP256t1, tcId is 388 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 910 for ECDSA, tcId is 389 in file ecdsa_brainpoolP256r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_brainpoolp256r1_sha256_910_pubkey[] = { 0x08, 0xc2, 0xf9, 0x5f, 0xfe, 0xdd, 0xe1, 0xd5, 0x5e, 0x3f, 0x2c, 0x9d, 0xcf, 0x58, 0x84, 0x34, 0x7f, 0x69, 0x04, 0xc6, 0x49, 0x22, 0x73, 0xad, 0x76, 0x0e, 0xb7, 0xb9, 0xb3, 0x5f, 0x03, 0x6b, 0x2b, 0xcf, 0x7a, 0x04, 0x8c, 0xaa, 0x2c, 0x72, 0x6a, 0xe8, 0x80, 0x8d, 0xc9, 0x53, 0x12, 0xeb, 0x23, 0x50, 0x27, 0x5a, 0x8f, 0x4f, 0xbe, 0xea, 0x7c, 0x0f, 0x32, 0xf3, 0x83, 0x9c, 0x7b, 0x93, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_910_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp256r1_sha256_910_sig[] = { 0x6b, 0x0d, 0x70, 0xe0, 0x9b, 0xa1, 0x64, 0x2a, 0xda, 0xc0, 0x6d, 0xff, 0x9b, 0x52, 0xe2, 0x2a, 0x3e, 0x4a, 0xab, 0x41, 0x80, 0xe3, 0x72, 0x66, 0x56, 0x91, 0x41, 0x22, 0x41, 0xe7, 0x43, 0xa0, 0x4d, 0x7d, 0x30, 0xff, 0x8a, 0x21, 0x0d, 0xe6, 0x9e, 0x3e, 0x6d, 0x1e, 0xcf, 0x71, 0x75, 0xf8, 0x9f, 0x48, 0x1a, 0x4d, 0x9e, 0xd0, 0x6b, 0xea, 0xf7, 0x14, 0x8d, 0xa4, 0x7f, 0x4a, 0xf9, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp256r1_sha256_910 = { .name = "ecdsa_brainpoolp256r1_sha256_910", .sig_alg = ECDSA, .hash = SHA256, .curve = &brainpoolp256r1_str_params, .pubkey = ecdsa_brainpoolp256r1_sha256_910_pubkey, .pubkeylen = 64, .msg = ecdsa_brainpoolp256r1_sha256_910_msg, .msglen = 7, .sig = ecdsa_brainpoolp256r1_sha256_910_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP256t1, tcId is 389 in file ecdsa_brainpoolP256r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP256R1) && defined(WITH_HASH_SHA256) */ /* Test 911 for ECDSA, tcId is 1 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_911_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_911_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_911_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x83, 0x3d, 0x66, 0x61, 0xb0, 0x57, 0x6d, 0x61, 0xa8, 0x0f, 0xfe, 0x4d, 0x32, 0x71, 0xc4, 0x3b, 0x2a, 0x56, 0xc1, 0x4b, 0x3b, 0xd9, 0x03, 0x05, 0x92, 0x3c, 0xcd, 0xcf, 0x7b, 0x3d, 0x98, 0x8c, 0x07, 0xeb, 0xb1, 0xc4, 0xcc, 0x67, 0x38, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_911 = { .name = "ecdsa_brainpoolp320r1_sha384_911", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_911_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_911_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_911_sig, .siglen = 80, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 912 for ECDSA, tcId is 2 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_912_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_912_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_912_sig[] = { 0x01, 0x59, 0x10, 0x03, 0x78, 0xa2, 0xb1, 0x90, 0x37, 0x7d, 0xcb, 0x3b, 0xd5, 0x31, 0xe2, 0x0c, 0x37, 0x8d, 0x10, 0x69, 0x31, 0xfc, 0x18, 0x3f, 0x70, 0x7d, 0xc9, 0xd0, 0x85, 0x76, 0xf8, 0xfb, 0x56, 0x61, 0x85, 0x59, 0x42, 0x20, 0xb8, 0xdd, 0x7f, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_912 = { .name = "ecdsa_brainpoolp320r1_sha384_912", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_912_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_912_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_912_sig, .siglen = 82, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 913 for ECDSA, tcId is 3 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_913_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_913_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_913_sig[] = { 0x4d, 0xac, 0x8a, 0xc7, 0xca, 0xc7, 0x0f, 0x38, 0x44, 0xad, 0xb4, 0xe8, 0x72, 0x21, 0xb4, 0x94, 0x66, 0x0f, 0x36, 0x19, 0x71, 0x05, 0xe5, 0xd5, 0xdc, 0xc6, 0x8d, 0x0a, 0x66, 0x13, 0xb6, 0x7c, 0xab, 0x9d, 0x51, 0x74, 0x68, 0xd2, 0x48, 0xa3, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_913 = { .name = "ecdsa_brainpoolp320r1_sha384_913", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_913_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_913_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_913_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 914 for ECDSA, tcId is 4 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_914_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_914_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_914_sig[] = { 0x01, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_914 = { .name = "ecdsa_brainpoolp320r1_sha384_914", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_914_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_914_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_914_sig, .siglen = 82, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 915 for ECDSA, tcId is 5 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_915_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_915_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_915_sig[] = { 0x7a, 0x4e, 0x43, 0xa7, 0x94, 0x0a, 0xbf, 0x80, 0x63, 0x71, 0x3c, 0x89, 0xa0, 0x1f, 0xd4, 0x2e, 0x6c, 0x7f, 0x66, 0x73, 0xba, 0x76, 0xd3, 0x32, 0xaf, 0x7e, 0x5e, 0x42, 0x77, 0x8d, 0x5d, 0x93, 0x25, 0x0b, 0xfc, 0x19, 0x24, 0x0c, 0xb5, 0x92, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_915 = { .name = "ecdsa_brainpoolp320r1_sha384_915", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_915_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_915_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_915_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 916 for ECDSA, tcId is 6 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_916_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_916_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_916_sig[] = { 0x00, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x01, 0x23, 0x7f, 0x27, 0xde, 0xbd, 0x21, 0x32, 0x0e, 0x1a, 0x68, 0xf2, 0x70, 0x71, 0x91, 0xfc, 0x90, 0xc8, 0xc8, 0xde, 0x00, 0x31, 0x45, 0x22, 0x40, 0xc8, 0x53, 0x8f, 0xc0, 0x61, 0xcf, 0x19, 0x47, 0x05, 0x36, 0xf8, 0xf1, 0xbd, 0x23, 0xee, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_916 = { .name = "ecdsa_brainpoolp320r1_sha384_916", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_916_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_916_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_916_sig, .siglen = 82, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 917 for ECDSA, tcId is 7 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_917_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_917_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_917_sig[] = { 0x00, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x01, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_917 = { .name = "ecdsa_brainpoolp320r1_sha384_917", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_917_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_917_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_917_sig, .siglen = 82, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 918 for ECDSA, tcId is 8 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_918_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_918_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_918_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0xaf, 0xdf, 0x1f, 0x41, 0x79, 0x9b, 0x1d, 0xa9, 0xc6, 0xd3, 0x85, 0xee, 0x60, 0x6f, 0xe3, 0xd5, 0x30, 0xc6, 0xf1, 0xa5, 0x85, 0x49, 0xf0, 0x62, 0x64, 0xf4, 0x9f, 0x07, 0x8c, 0xb7, 0x3f, 0xa2, 0x81, 0x5a, 0x5c, 0x69, 0x87, 0xa1, 0xa5, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_918 = { .name = "ecdsa_brainpoolp320r1_sha384_918", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_918_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_918_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_918_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 919 for ECDSA, tcId is 9 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_919_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_919_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_919_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_919 = { .name = "ecdsa_brainpoolp320r1_sha384_919", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_919_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_919_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_919_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 920 for ECDSA, tcId is 10 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_920_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_920_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_920_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_920 = { .name = "ecdsa_brainpoolp320r1_sha384_920", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_920_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_920_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_920_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 921 for ECDSA, tcId is 11 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_921_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_921_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_921_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_921 = { .name = "ecdsa_brainpoolp320r1_sha384_921", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_921_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_921_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_921_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 922 for ECDSA, tcId is 12 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_922_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_922_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_922_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_922 = { .name = "ecdsa_brainpoolp320r1_sha384_922", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_922_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_922_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_922_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 923 for ECDSA, tcId is 13 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_923_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_923_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_923_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_923 = { .name = "ecdsa_brainpoolp320r1_sha384_923", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_923_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_923_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_923_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 924 for ECDSA, tcId is 14 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_924_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_924_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_924_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_924 = { .name = "ecdsa_brainpoolp320r1_sha384_924", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_924_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_924_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_924_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 925 for ECDSA, tcId is 15 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_925_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_925_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_925_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_925 = { .name = "ecdsa_brainpoolp320r1_sha384_925", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_925_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_925_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_925_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 926 for ECDSA, tcId is 16 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_926_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_926_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_926_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_926 = { .name = "ecdsa_brainpoolp320r1_sha384_926", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_926_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_926_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_926_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 927 for ECDSA, tcId is 17 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_927_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_927_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_927_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_927 = { .name = "ecdsa_brainpoolp320r1_sha384_927", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_927_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_927_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_927_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 928 for ECDSA, tcId is 18 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_928_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_928_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_928_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_928 = { .name = "ecdsa_brainpoolp320r1_sha384_928", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_928_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_928_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_928_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 929 for ECDSA, tcId is 19 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_929_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_929_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_929_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_929 = { .name = "ecdsa_brainpoolp320r1_sha384_929", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_929_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_929_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_929_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 930 for ECDSA, tcId is 20 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_930_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_930_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_930_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_930 = { .name = "ecdsa_brainpoolp320r1_sha384_930", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_930_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_930_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_930_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 931 for ECDSA, tcId is 21 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_931_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_931_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_931_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_931 = { .name = "ecdsa_brainpoolp320r1_sha384_931", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_931_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_931_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_931_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 932 for ECDSA, tcId is 22 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_932_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_932_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_932_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_932 = { .name = "ecdsa_brainpoolp320r1_sha384_932", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_932_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_932_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_932_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 933 for ECDSA, tcId is 23 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_933_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_933_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_933_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_933 = { .name = "ecdsa_brainpoolp320r1_sha384_933", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_933_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_933_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_933_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 934 for ECDSA, tcId is 24 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_934_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_934_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_934_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_934 = { .name = "ecdsa_brainpoolp320r1_sha384_934", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_934_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_934_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_934_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 935 for ECDSA, tcId is 25 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_935_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_935_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_935_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_935 = { .name = "ecdsa_brainpoolp320r1_sha384_935", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_935_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_935_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_935_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 936 for ECDSA, tcId is 26 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_936_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_936_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_936_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_936 = { .name = "ecdsa_brainpoolp320r1_sha384_936", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_936_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_936_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_936_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 937 for ECDSA, tcId is 27 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_937_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_937_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_937_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_937 = { .name = "ecdsa_brainpoolp320r1_sha384_937", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_937_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_937_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_937_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 938 for ECDSA, tcId is 28 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_938_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_938_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_938_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_938 = { .name = "ecdsa_brainpoolp320r1_sha384_938", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_938_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_938_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_938_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 939 for ECDSA, tcId is 29 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_939_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_939_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_939_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_939 = { .name = "ecdsa_brainpoolp320r1_sha384_939", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_939_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_939_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_939_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 940 for ECDSA, tcId is 30 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_940_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_940_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_940_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_940 = { .name = "ecdsa_brainpoolp320r1_sha384_940", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_940_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_940_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_940_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 941 for ECDSA, tcId is 31 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_941_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_941_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_941_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_941 = { .name = "ecdsa_brainpoolp320r1_sha384_941", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_941_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_941_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_941_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 942 for ECDSA, tcId is 32 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_942_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_942_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_942_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_942 = { .name = "ecdsa_brainpoolp320r1_sha384_942", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_942_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_942_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_942_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 943 for ECDSA, tcId is 33 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_943_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_943_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_943_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_943 = { .name = "ecdsa_brainpoolp320r1_sha384_943", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_943_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_943_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_943_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 944 for ECDSA, tcId is 34 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_944_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_944_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_944_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_944 = { .name = "ecdsa_brainpoolp320r1_sha384_944", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_944_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_944_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_944_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 945 for ECDSA, tcId is 35 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_945_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_945_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_945_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_945 = { .name = "ecdsa_brainpoolp320r1_sha384_945", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_945_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_945_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_945_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 946 for ECDSA, tcId is 36 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_946_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_946_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_946_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_946 = { .name = "ecdsa_brainpoolp320r1_sha384_946", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_946_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_946_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_946_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 947 for ECDSA, tcId is 37 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_947_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_947_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_947_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_947 = { .name = "ecdsa_brainpoolp320r1_sha384_947", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_947_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_947_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_947_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 948 for ECDSA, tcId is 38 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_948_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_948_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_948_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_948 = { .name = "ecdsa_brainpoolp320r1_sha384_948", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_948_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_948_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_948_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 949 for ECDSA, tcId is 39 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_949_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_949_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_949_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_949 = { .name = "ecdsa_brainpoolp320r1_sha384_949", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_949_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_949_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_949_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 950 for ECDSA, tcId is 40 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_950_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_950_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_950_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_950 = { .name = "ecdsa_brainpoolp320r1_sha384_950", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_950_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_950_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_950_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 951 for ECDSA, tcId is 41 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_951_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_951_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_951_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_951 = { .name = "ecdsa_brainpoolp320r1_sha384_951", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_951_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_951_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_951_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 952 for ECDSA, tcId is 42 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_952_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_952_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_952_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_952 = { .name = "ecdsa_brainpoolp320r1_sha384_952", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_952_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_952_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_952_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 953 for ECDSA, tcId is 43 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_953_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_953_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_953_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_953 = { .name = "ecdsa_brainpoolp320r1_sha384_953", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_953_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_953_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_953_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 954 for ECDSA, tcId is 44 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_954_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_954_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_954_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_954 = { .name = "ecdsa_brainpoolp320r1_sha384_954", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_954_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_954_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_954_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 955 for ECDSA, tcId is 45 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_955_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_955_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_955_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_955 = { .name = "ecdsa_brainpoolp320r1_sha384_955", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_955_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_955_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_955_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 956 for ECDSA, tcId is 46 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_956_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_956_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_956_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_956 = { .name = "ecdsa_brainpoolp320r1_sha384_956", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_956_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_956_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_956_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 957 for ECDSA, tcId is 47 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_957_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_957_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_957_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_957 = { .name = "ecdsa_brainpoolp320r1_sha384_957", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_957_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_957_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_957_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 958 for ECDSA, tcId is 48 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_958_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_958_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_958_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_958 = { .name = "ecdsa_brainpoolp320r1_sha384_958", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_958_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_958_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_958_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 959 for ECDSA, tcId is 49 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_959_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_959_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_959_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_959 = { .name = "ecdsa_brainpoolp320r1_sha384_959", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_959_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_959_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_959_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 960 for ECDSA, tcId is 50 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_960_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_960_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_960_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_960 = { .name = "ecdsa_brainpoolp320r1_sha384_960", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_960_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_960_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_960_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 961 for ECDSA, tcId is 51 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_961_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_961_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_961_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_961 = { .name = "ecdsa_brainpoolp320r1_sha384_961", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_961_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_961_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_961_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 962 for ECDSA, tcId is 52 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_962_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_962_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_962_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_962 = { .name = "ecdsa_brainpoolp320r1_sha384_962", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_962_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_962_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_962_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 963 for ECDSA, tcId is 53 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_963_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_963_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_963_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_963 = { .name = "ecdsa_brainpoolp320r1_sha384_963", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_963_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_963_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_963_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 964 for ECDSA, tcId is 54 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_964_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_964_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_964_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_964 = { .name = "ecdsa_brainpoolp320r1_sha384_964", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_964_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_964_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_964_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 965 for ECDSA, tcId is 55 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_965_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_965_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_965_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_965 = { .name = "ecdsa_brainpoolp320r1_sha384_965", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_965_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_965_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_965_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 966 for ECDSA, tcId is 56 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_966_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_966_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_966_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_966 = { .name = "ecdsa_brainpoolp320r1_sha384_966", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_966_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_966_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_966_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 967 for ECDSA, tcId is 57 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_967_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_967_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_967_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_967 = { .name = "ecdsa_brainpoolp320r1_sha384_967", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_967_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_967_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_967_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 968 for ECDSA, tcId is 58 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_968_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_968_msg[] = { 0x37, 0x30, 0x37, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_968_sig[] = { 0x25, 0x16, 0x6f, 0x47, 0xac, 0x99, 0xc6, 0xbe, 0xc3, 0xb0, 0x38, 0x84, 0x9a, 0xb4, 0xea, 0xd3, 0xb2, 0x51, 0xf1, 0x8a, 0xfb, 0x0d, 0xa1, 0xda, 0x5c, 0xaa, 0x60, 0x4a, 0x92, 0xa9, 0x09, 0xc8, 0x56, 0x18, 0x17, 0x68, 0x4a, 0xbf, 0xfb, 0x92, 0x31, 0x07, 0xff, 0xd1, 0xaa, 0xdc, 0xe5, 0xb5, 0x8a, 0x2a, 0x1b, 0x95, 0x17, 0xcc, 0xed, 0xda, 0x09, 0x04, 0x33, 0xac, 0x63, 0x44, 0xb0, 0x27, 0xf3, 0x6f, 0xc6, 0xb3, 0x58, 0xef, 0x4a, 0x8e, 0x43, 0x6d, 0xf3, 0xfd, 0x05, 0x52, 0x16, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_968 = { .name = "ecdsa_brainpoolp320r1_sha384_968", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_968_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_968_msg, .msglen = 5, .sig = ecdsa_brainpoolp320r1_sha384_968_sig, .siglen = 80, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 969 for ECDSA, tcId is 59 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_969_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_969_msg[] = { 0x31, 0x37, 0x35, 0x30, 0x35, 0x35, 0x31, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_969_sig[] = { 0x10, 0x3c, 0x3e, 0xf2, 0xb4, 0x3a, 0x8f, 0x57, 0xd0, 0x1e, 0x2d, 0xa6, 0x7e, 0xdf, 0xa0, 0x03, 0xa0, 0xd3, 0x42, 0xd7, 0xfb, 0xde, 0x05, 0x41, 0x33, 0x2b, 0x0b, 0x24, 0xde, 0xea, 0x76, 0xaf, 0xff, 0x4e, 0x2c, 0xd0, 0x57, 0x2d, 0x73, 0xbb, 0x0a, 0x0a, 0x68, 0x0e, 0xbe, 0x36, 0x44, 0xc4, 0x6b, 0x58, 0xd6, 0x7e, 0xd8, 0xee, 0x94, 0xf3, 0xaa, 0xee, 0x28, 0x39, 0xbc, 0x27, 0x0d, 0x6b, 0x93, 0x9b, 0xcb, 0x76, 0x57, 0xee, 0xeb, 0xbb, 0x6c, 0xcc, 0xf2, 0xbc, 0x54, 0xaf, 0x97, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_969 = { .name = "ecdsa_brainpoolp320r1_sha384_969", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_969_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_969_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_969_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 970 for ECDSA, tcId is 60 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_970_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_970_msg[] = { 0x31, 0x30, 0x33, 0x36, 0x33, 0x30, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_970_sig[] = { 0x8c, 0x70, 0x21, 0x60, 0x94, 0xfe, 0xda, 0x4e, 0x72, 0x1a, 0x72, 0xd8, 0xa9, 0x1c, 0x51, 0xdd, 0x17, 0x39, 0x2c, 0xf4, 0xc4, 0x48, 0x1d, 0x7c, 0xd9, 0x4b, 0xe5, 0x6d, 0xa9, 0x94, 0xe5, 0xba, 0xaa, 0x56, 0x10, 0x85, 0xce, 0xcf, 0xe8, 0x0d, 0x1b, 0x19, 0xf7, 0xe8, 0x95, 0x25, 0x60, 0x18, 0x20, 0xbc, 0x17, 0xbd, 0x59, 0x5a, 0x7d, 0xbd, 0xef, 0x76, 0xe5, 0xb3, 0x52, 0xfc, 0xb1, 0x6c, 0x3a, 0x8a, 0x1c, 0x33, 0x2f, 0xf6, 0xa5, 0x30, 0x8f, 0xf4, 0x7a, 0x7e, 0x54, 0xe0, 0xb1, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_970 = { .name = "ecdsa_brainpoolp320r1_sha384_970", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_970_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_970_msg, .msglen = 8, .sig = ecdsa_brainpoolp320r1_sha384_970_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 971 for ECDSA, tcId is 61 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_971_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_971_msg[] = { 0x32, 0x33, 0x36, 0x32, 0x34, 0x32, 0x31, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_971_sig[] = { 0xb4, 0xa4, 0xa0, 0x35, 0xdb, 0xea, 0xee, 0x12, 0x6d, 0x09, 0xc7, 0xb1, 0x58, 0x16, 0xb0, 0x4b, 0xc7, 0x17, 0xcb, 0x71, 0xbb, 0x5f, 0xe7, 0x64, 0x9a, 0xc0, 0x26, 0x26, 0x9b, 0x7f, 0xe6, 0xd5, 0x93, 0xfe, 0x1f, 0xf8, 0xfc, 0x52, 0x78, 0xa1, 0x63, 0x55, 0x16, 0xde, 0x53, 0x11, 0x04, 0xe7, 0x21, 0x76, 0xe8, 0x9a, 0x84, 0x50, 0x32, 0xb3, 0x09, 0x6e, 0x32, 0x69, 0xe4, 0x14, 0x31, 0xc1, 0x85, 0x4f, 0xbc, 0x43, 0x37, 0xba, 0x6f, 0xb5, 0xea, 0x91, 0xde, 0xfd, 0x33, 0x72, 0x9d, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_971 = { .name = "ecdsa_brainpoolp320r1_sha384_971", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_971_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_971_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_971_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 972 for ECDSA, tcId is 62 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_972_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_972_msg[] = { 0x34, 0x35, 0x38, 0x38, 0x30, 0x31, 0x34, 0x36, 0x35, 0x36, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_972_sig[] = { 0x2a, 0x31, 0x03, 0xcd, 0xaa, 0xd1, 0xdd, 0x28, 0xec, 0xf8, 0x97, 0x49, 0x10, 0x51, 0xdd, 0x0a, 0x9c, 0x9d, 0xa9, 0x48, 0x37, 0x53, 0xc9, 0x34, 0x90, 0xb4, 0xa0, 0x5f, 0x1c, 0x42, 0xe1, 0x64, 0x29, 0x25, 0xa3, 0xa0, 0x15, 0x4d, 0x40, 0x62, 0x67, 0x29, 0x03, 0x24, 0x3b, 0x68, 0x58, 0xa5, 0xe0, 0x91, 0x48, 0xe4, 0x03, 0x46, 0x1f, 0x31, 0xc1, 0xff, 0x0e, 0x12, 0x6c, 0x36, 0x59, 0x42, 0xe0, 0x68, 0x0d, 0x31, 0x4c, 0x1a, 0x7a, 0x7c, 0x57, 0xe2, 0xf0, 0x52, 0x8c, 0x8c, 0xab, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_972 = { .name = "ecdsa_brainpoolp320r1_sha384_972", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_972_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_972_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_972_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 973 for ECDSA, tcId is 63 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_973_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_973_msg[] = { 0x32, 0x31, 0x34, 0x36, 0x36, 0x30, 0x35, 0x36, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_973_sig[] = { 0xb8, 0x80, 0xb6, 0xbe, 0x2a, 0x12, 0x95, 0xaf, 0x38, 0x40, 0xa5, 0xf3, 0x74, 0xfe, 0x77, 0xcd, 0xe1, 0xff, 0xdd, 0x6d, 0xf3, 0xbb, 0x86, 0x09, 0x7d, 0x5c, 0xe1, 0x48, 0x52, 0xf7, 0x3a, 0x19, 0x25, 0xfa, 0x6d, 0x19, 0x2a, 0x27, 0xb7, 0x4c, 0xc2, 0xcb, 0x21, 0x13, 0x03, 0xae, 0xa0, 0x30, 0xa5, 0xb9, 0x2b, 0xe9, 0x8f, 0xc3, 0x67, 0x70, 0x82, 0x2f, 0x81, 0x95, 0xad, 0x73, 0xee, 0xe5, 0xa9, 0xbb, 0x87, 0xc5, 0x71, 0x7b, 0xa4, 0x34, 0x5c, 0xb6, 0x0b, 0x09, 0x9e, 0x4d, 0x4d, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_973 = { .name = "ecdsa_brainpoolp320r1_sha384_973", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_973_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_973_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_973_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 974 for ECDSA, tcId is 64 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_974_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_974_msg[] = { 0x33, 0x33, 0x35, 0x33, 0x30, 0x30, 0x38, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_974_sig[] = { 0x67, 0x7f, 0x84, 0xa0, 0x65, 0x37, 0x25, 0xb9, 0x4e, 0x4e, 0xed, 0xdb, 0xe0, 0xb7, 0x0a, 0xef, 0xdf, 0x59, 0x4f, 0x5e, 0xf9, 0xe4, 0x84, 0xb4, 0x06, 0x05, 0x67, 0xa8, 0x36, 0x5c, 0x43, 0xa7, 0x83, 0xd8, 0x15, 0x48, 0xd1, 0xf2, 0x74, 0x08, 0x4c, 0xb2, 0x4e, 0x15, 0x37, 0x5b, 0xda, 0xe0, 0xb4, 0x4b, 0x33, 0x6f, 0xc7, 0xe6, 0xc1, 0x18, 0x56, 0xd4, 0xc6, 0xf9, 0xdd, 0x7e, 0x83, 0x14, 0x8d, 0xc3, 0x87, 0xc4, 0xa8, 0x86, 0x9b, 0x11, 0x53, 0x8b, 0x7e, 0xe9, 0x4f, 0x05, 0x3f, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_974 = { .name = "ecdsa_brainpoolp320r1_sha384_974", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_974_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_974_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_974_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 975 for ECDSA, tcId is 65 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_975_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_975_msg[] = { 0x36, 0x33, 0x39, 0x36, 0x36, 0x30, 0x33, 0x36, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_975_sig[] = { 0x9d, 0x5d, 0x98, 0x4c, 0x75, 0x44, 0xef, 0x73, 0x7a, 0x10, 0x01, 0xd6, 0x7f, 0x9d, 0xbb, 0xed, 0x52, 0x1b, 0x46, 0xf7, 0x4b, 0xc4, 0x68, 0xc0, 0x38, 0x81, 0xc2, 0xab, 0x59, 0x44, 0x63, 0x5a, 0xf5, 0x46, 0x5c, 0x3f, 0xa0, 0x1c, 0xf5, 0x1e, 0x0c, 0x70, 0x6d, 0xcf, 0xe1, 0x1a, 0x4e, 0x30, 0xd6, 0x23, 0x87, 0x0f, 0xb0, 0xf2, 0xb9, 0x79, 0xd0, 0xfd, 0x9d, 0xaa, 0x97, 0x0d, 0x86, 0xf6, 0x4b, 0xb4, 0x8f, 0x49, 0xaa, 0x48, 0x4d, 0x92, 0x4e, 0x9b, 0x93, 0xbc, 0xaf, 0x40, 0x69, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_975 = { .name = "ecdsa_brainpoolp320r1_sha384_975", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_975_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_975_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_975_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 976 for ECDSA, tcId is 66 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_976_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_976_msg[] = { 0x33, 0x33, 0x39, 0x31, 0x36, 0x36, 0x30, 0x37, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_976_sig[] = { 0x44, 0x84, 0x64, 0xbe, 0xcc, 0x13, 0x52, 0x2c, 0x90, 0x70, 0x8a, 0xa5, 0x20, 0x49, 0x30, 0xe6, 0x76, 0xfe, 0xdf, 0xba, 0xef, 0xe8, 0xfe, 0x02, 0x50, 0x9a, 0x4f, 0xe8, 0x22, 0xcc, 0x88, 0xfd, 0x6d, 0x92, 0xa9, 0x58, 0x43, 0x8d, 0xed, 0x7c, 0x5d, 0xe6, 0x59, 0xe0, 0x80, 0xa6, 0x1c, 0x50, 0xb5, 0xb7, 0x48, 0x9f, 0x46, 0x77, 0xec, 0x4c, 0x69, 0x31, 0xfa, 0xaf, 0x17, 0x1f, 0x2a, 0x69, 0x75, 0x6e, 0x2f, 0x2d, 0x12, 0x14, 0x23, 0x5b, 0xdb, 0x1e, 0xa3, 0xd2, 0xa4, 0xa7, 0x53, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_976 = { .name = "ecdsa_brainpoolp320r1_sha384_976", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_976_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_976_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_976_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 977 for ECDSA, tcId is 67 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_977_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_977_msg[] = { 0x31, 0x34, 0x34, 0x36, 0x39, 0x37, 0x35, 0x39, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_977_sig[] = { 0x59, 0xc0, 0xc9, 0x59, 0x41, 0xe1, 0xa5, 0x23, 0x90, 0xe0, 0x0c, 0x2d, 0x77, 0x96, 0xc6, 0x85, 0xdc, 0xc4, 0xd7, 0x3d, 0x6d, 0x69, 0x67, 0x59, 0x0a, 0xa1, 0x76, 0x7c, 0x97, 0x2e, 0x19, 0x9d, 0xe3, 0xc6, 0xdb, 0xfc, 0xa7, 0x7d, 0xca, 0xc8, 0x50, 0x7f, 0x27, 0xab, 0x5a, 0xc0, 0x5a, 0xd2, 0x3c, 0xb2, 0x5f, 0xc4, 0x8f, 0xfc, 0x76, 0x6d, 0xcb, 0x6d, 0xc0, 0xcd, 0x25, 0x60, 0x65, 0x05, 0xa2, 0xd2, 0x70, 0x06, 0x6c, 0x3a, 0x74, 0x84, 0x27, 0x68, 0xb5, 0x4a, 0xf2, 0xc8, 0x47, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_977 = { .name = "ecdsa_brainpoolp320r1_sha384_977", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_977_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_977_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_977_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 978 for ECDSA, tcId is 68 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_978_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_978_msg[] = { 0x35, 0x31, 0x35, 0x39, 0x34, 0x37, 0x38, 0x36, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_978_sig[] = { 0x59, 0x90, 0x2d, 0x77, 0x63, 0xe7, 0xf1, 0x87, 0x5a, 0x42, 0x52, 0xd1, 0x33, 0xeb, 0x61, 0x14, 0xcf, 0xc1, 0x97, 0x2b, 0x68, 0x3a, 0xdf, 0xd7, 0x67, 0xa7, 0x1c, 0xa8, 0x0c, 0x3f, 0x78, 0x05, 0x7c, 0xea, 0x75, 0x9e, 0xa1, 0x95, 0xd3, 0x1e, 0x39, 0x7d, 0xea, 0xf9, 0x6e, 0x29, 0x03, 0xa2, 0x07, 0xf6, 0x8e, 0x53, 0x30, 0xc9, 0xf2, 0xc6, 0x27, 0x6a, 0x45, 0xd0, 0xfd, 0xba, 0x96, 0x1a, 0x04, 0xc2, 0x75, 0xfa, 0x20, 0x36, 0x78, 0x17, 0x62, 0x01, 0xed, 0x37, 0x09, 0x99, 0xa3, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_978 = { .name = "ecdsa_brainpoolp320r1_sha384_978", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_978_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_978_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_978_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 979 for ECDSA, tcId is 69 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_979_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_979_msg[] = { 0x35, 0x32, 0x34, 0x31, 0x37, 0x39, 0x32, 0x33, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_979_sig[] = { 0xd1, 0x42, 0x21, 0x75, 0x84, 0xe8, 0x52, 0xa4, 0x99, 0xef, 0xa7, 0x34, 0xa1, 0x0a, 0x43, 0x6a, 0x39, 0x7b, 0xa7, 0xe0, 0x68, 0xad, 0x70, 0xf3, 0xee, 0xfc, 0x4d, 0x67, 0x31, 0xe7, 0x6a, 0x48, 0x1b, 0x26, 0x0e, 0xac, 0x1d, 0x21, 0x47, 0xf0, 0x17, 0xc8, 0x48, 0x26, 0x39, 0xdf, 0x8d, 0x20, 0xfc, 0xb8, 0x35, 0xbf, 0xe0, 0xf3, 0xec, 0xd2, 0x73, 0x17, 0xeb, 0x83, 0x15, 0xc6, 0x9b, 0x65, 0x6e, 0xbf, 0x13, 0x7d, 0xde, 0x65, 0x82, 0xf3, 0x40, 0x9d, 0x7c, 0x44, 0xa8, 0xb6, 0xe0, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_979 = { .name = "ecdsa_brainpoolp320r1_sha384_979", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_979_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_979_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_979_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 980 for ECDSA, tcId is 70 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_980_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_980_msg[] = { 0x31, 0x31, 0x34, 0x37, 0x32, 0x39, 0x30, 0x32, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_980_sig[] = { 0x8a, 0x55, 0xfa, 0x49, 0x22, 0x45, 0x92, 0xf7, 0xe4, 0x03, 0xa4, 0xb3, 0xe6, 0x47, 0xbf, 0x38, 0x2a, 0x26, 0x49, 0x9b, 0x37, 0xec, 0x2c, 0xff, 0x51, 0xa2, 0xbe, 0x2a, 0x13, 0x57, 0x80, 0x7f, 0xe8, 0x75, 0x35, 0x9e, 0xc8, 0x65, 0x4f, 0x87, 0xb9, 0x50, 0x6e, 0x74, 0xaf, 0x8f, 0x55, 0x2d, 0x4a, 0xbb, 0x2c, 0x47, 0x2b, 0x85, 0x08, 0xce, 0x24, 0x81, 0x4e, 0x20, 0xb2, 0x7d, 0x19, 0x2e, 0x24, 0xd3, 0x6d, 0x5a, 0xc7, 0x51, 0x92, 0x2b, 0x0c, 0x80, 0x7b, 0xf9, 0x7a, 0x7b, 0x1a, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_980 = { .name = "ecdsa_brainpoolp320r1_sha384_980", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_980_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_980_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_980_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 981 for ECDSA, tcId is 71 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_981_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_981_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x32, 0x35, 0x36, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_981_sig[] = { 0x68, 0xad, 0x2d, 0xa6, 0x43, 0xd6, 0x6f, 0xc5, 0xd2, 0x7b, 0x63, 0xd7, 0x22, 0x2f, 0x83, 0x5d, 0x09, 0xfe, 0x0b, 0x32, 0x8f, 0xc4, 0xda, 0x46, 0x84, 0xb8, 0x6d, 0x9c, 0x12, 0xb3, 0x99, 0x26, 0x26, 0xf6, 0x10, 0xe3, 0x39, 0x5e, 0x4e, 0xd0, 0x96, 0x62, 0xf7, 0x4d, 0x52, 0x71, 0x2a, 0x2a, 0xf5, 0x4f, 0x60, 0x1c, 0x44, 0x88, 0x93, 0x4f, 0xe2, 0x82, 0x6d, 0x50, 0xe1, 0xee, 0x86, 0x80, 0x22, 0x43, 0x7c, 0x9b, 0x62, 0x0c, 0x93, 0xd4, 0x3f, 0xc7, 0x50, 0xf0, 0x33, 0x12, 0x89, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_981 = { .name = "ecdsa_brainpoolp320r1_sha384_981", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_981_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_981_msg, .msglen = 11, .sig = ecdsa_brainpoolp320r1_sha384_981_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 982 for ECDSA, tcId is 72 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_982_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_982_msg[] = { 0x37, 0x33, 0x34, 0x33, 0x33, 0x30, 0x36, 0x35, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_982_sig[] = { 0x57, 0x8b, 0xdd, 0x50, 0xde, 0x99, 0x86, 0xfa, 0xd3, 0x41, 0xa9, 0x54, 0xe5, 0x11, 0x26, 0xff, 0x0c, 0xb5, 0x40, 0x02, 0x6a, 0xbb, 0x3d, 0x42, 0xb3, 0xc2, 0x08, 0xe4, 0xad, 0x18, 0x7f, 0x7b, 0xa2, 0xd9, 0x9b, 0x3e, 0xfe, 0x49, 0x5c, 0x92, 0xb9, 0x5a, 0xfd, 0x2d, 0x12, 0xcd, 0xee, 0x68, 0xc3, 0x57, 0x2a, 0x5f, 0xe1, 0x26, 0x33, 0x4e, 0xd0, 0xed, 0x7b, 0xa8, 0x2d, 0x30, 0x97, 0xea, 0xa6, 0xd9, 0xd7, 0x37, 0xc0, 0x9b, 0x83, 0x0b, 0x6c, 0xd3, 0xe8, 0x78, 0xf4, 0x70, 0xe7, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_982 = { .name = "ecdsa_brainpoolp320r1_sha384_982", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_982_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_982_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_982_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 983 for ECDSA, tcId is 73 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_983_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_983_msg[] = { 0x39, 0x37, 0x34, 0x34, 0x36, 0x30, 0x39, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_983_sig[] = { 0x9d, 0x61, 0x26, 0x63, 0x49, 0x7c, 0x48, 0x40, 0x84, 0xd3, 0xd1, 0x5d, 0x8e, 0x79, 0x9e, 0x1f, 0xe3, 0x8b, 0x7b, 0x59, 0x22, 0x95, 0x5f, 0xc5, 0xa7, 0xfe, 0xa4, 0xec, 0xfc, 0x41, 0x95, 0x4c, 0xa7, 0x07, 0x52, 0x5c, 0x1e, 0x0d, 0xc0, 0x10, 0x59, 0xe8, 0x0c, 0xf6, 0x9b, 0xe6, 0x87, 0x6b, 0x95, 0x35, 0x7d, 0xed, 0x13, 0xca, 0x61, 0xa4, 0x94, 0xfa, 0xc7, 0x35, 0x5a, 0xc2, 0xe8, 0x0a, 0x89, 0xbe, 0x02, 0x19, 0x55, 0x2d, 0x91, 0x68, 0x52, 0x63, 0x26, 0x17, 0xc0, 0x94, 0x6b, 0xc2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_983 = { .name = "ecdsa_brainpoolp320r1_sha384_983", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_983_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_983_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_983_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 984 for ECDSA, tcId is 74 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_984_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_984_msg[] = { 0x33, 0x32, 0x32, 0x37, 0x30, 0x38, 0x36, 0x38, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_984_sig[] = { 0xb4, 0xc0, 0x0f, 0x58, 0x9d, 0xbb, 0x51, 0xea, 0x68, 0x27, 0x0f, 0x4b, 0x02, 0xef, 0xf4, 0x8a, 0x4b, 0x12, 0x3c, 0x01, 0x67, 0xbb, 0xd2, 0x4d, 0xaf, 0x2a, 0x83, 0x79, 0x03, 0xe7, 0x34, 0x33, 0x9b, 0x8a, 0x25, 0x42, 0x04, 0x1f, 0x87, 0xaa, 0x94, 0xc3, 0x26, 0x34, 0xba, 0xea, 0x44, 0x52, 0xc0, 0x54, 0x29, 0x5d, 0x7a, 0xeb, 0xe2, 0x3b, 0xe7, 0xe8, 0x0a, 0xbb, 0xf5, 0x37, 0x89, 0x65, 0x16, 0x74, 0x18, 0x22, 0x63, 0xee, 0x5c, 0x29, 0x02, 0xfb, 0xfb, 0x3d, 0xf7, 0xda, 0x74, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_984 = { .name = "ecdsa_brainpoolp320r1_sha384_984", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_984_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_984_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_984_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 985 for ECDSA, tcId is 75 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_985_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_985_msg[] = { 0x32, 0x33, 0x32, 0x39, 0x37, 0x36, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_985_sig[] = { 0xb9, 0x20, 0x1e, 0x49, 0x95, 0x0c, 0xe0, 0xd1, 0xdf, 0x64, 0x43, 0x56, 0x40, 0x5f, 0x0a, 0x78, 0x5a, 0x8b, 0x84, 0x70, 0xf8, 0x3e, 0x78, 0xa6, 0xf3, 0x5e, 0x62, 0x34, 0xda, 0xa9, 0x2a, 0x76, 0x85, 0x87, 0x7a, 0x59, 0xd8, 0xc9, 0x1a, 0x97, 0x8b, 0xee, 0x90, 0x77, 0x44, 0x3e, 0xed, 0xde, 0x34, 0xa2, 0xfc, 0x2c, 0x26, 0x6f, 0x18, 0x8e, 0x84, 0x4e, 0xab, 0x29, 0x04, 0xc8, 0x42, 0x04, 0xc8, 0x16, 0xba, 0x3c, 0xb1, 0xc4, 0xb9, 0xb2, 0x53, 0xd4, 0xa7, 0x8c, 0xe4, 0xe8, 0x11, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_985 = { .name = "ecdsa_brainpoolp320r1_sha384_985", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_985_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_985_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_985_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 986 for ECDSA, tcId is 76 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_986_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_986_msg[] = { 0x39, 0x34, 0x30, 0x34, 0x37, 0x33, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_986_sig[] = { 0x0d, 0x42, 0xa1, 0x89, 0x9f, 0x73, 0xac, 0x70, 0xc9, 0x19, 0x25, 0x58, 0xb4, 0x78, 0xdb, 0x88, 0x03, 0xc6, 0x83, 0x37, 0xd4, 0x15, 0xfa, 0xeb, 0xab, 0x76, 0x85, 0x8c, 0x32, 0xa3, 0x7e, 0x39, 0x9f, 0x17, 0x27, 0xfd, 0x59, 0x9a, 0x18, 0x17, 0x36, 0x3f, 0x13, 0x46, 0xc0, 0x22, 0x7e, 0xc5, 0x4d, 0xa1, 0x65, 0x91, 0x65, 0xee, 0x7b, 0x07, 0xe0, 0x66, 0x10, 0xd3, 0x6b, 0x1c, 0xe6, 0x22, 0x6f, 0x60, 0x8b, 0xf6, 0xce, 0xf2, 0x14, 0x42, 0x48, 0xde, 0x37, 0x56, 0x2b, 0xe8, 0x53, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_986 = { .name = "ecdsa_brainpoolp320r1_sha384_986", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_986_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_986_msg, .msglen = 8, .sig = ecdsa_brainpoolp320r1_sha384_986_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 987 for ECDSA, tcId is 77 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_987_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_987_msg[] = { 0x33, 0x32, 0x32, 0x30, 0x35, 0x36, 0x39, 0x31, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_987_sig[] = { 0xc5, 0xd6, 0x5e, 0xff, 0xab, 0x2e, 0xc3, 0xe4, 0x43, 0x5c, 0x25, 0x81, 0x21, 0xc4, 0x93, 0xe2, 0x4a, 0xe9, 0x20, 0x05, 0xac, 0x80, 0x13, 0x6f, 0x21, 0xf2, 0xf4, 0x29, 0x46, 0xfc, 0x37, 0x45, 0x84, 0x1d, 0xbc, 0x2a, 0x3e, 0xb9, 0x96, 0x95, 0x85, 0xfe, 0xc2, 0xa9, 0x08, 0x0a, 0x1e, 0xce, 0x18, 0x89, 0x69, 0x70, 0xc9, 0xa2, 0xe1, 0xb3, 0x22, 0x40, 0xea, 0xf1, 0x87, 0xd6, 0x5f, 0x6f, 0x9e, 0x91, 0xd2, 0x71, 0x11, 0xc4, 0x03, 0x3d, 0x47, 0x1e, 0xda, 0x67, 0xeb, 0x89, 0x86, 0xed, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_987 = { .name = "ecdsa_brainpoolp320r1_sha384_987", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_987_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_987_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_987_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 988 for ECDSA, tcId is 78 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_988_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_988_msg[] = { 0x34, 0x31, 0x34, 0x30, 0x35, 0x33, 0x39, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_988_sig[] = { 0xa2, 0x40, 0xad, 0xea, 0x61, 0xf7, 0x48, 0x99, 0x8d, 0xf2, 0xcd, 0xe9, 0x5b, 0xe9, 0xd7, 0xdf, 0x30, 0xf4, 0x54, 0xbd, 0xe5, 0xb9, 0x07, 0xec, 0x7d, 0xe6, 0xdc, 0xdb, 0x12, 0x1b, 0xea, 0x41, 0xbd, 0x42, 0xc4, 0x39, 0x24, 0x76, 0xc4, 0xf9, 0x3e, 0xf9, 0x91, 0xd6, 0x42, 0xbd, 0x02, 0x65, 0xb4, 0xa7, 0xb5, 0x21, 0xb2, 0x0a, 0x42, 0xfb, 0x2c, 0x68, 0x7c, 0xa2, 0xf0, 0x69, 0x4b, 0x23, 0x9a, 0x11, 0x3a, 0x83, 0x57, 0x5b, 0x57, 0x27, 0xdc, 0xb6, 0x32, 0x48, 0x2a, 0x57, 0x26, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_988 = { .name = "ecdsa_brainpoolp320r1_sha384_988", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_988_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_988_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_988_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 989 for ECDSA, tcId is 79 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_989_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_989_msg[] = { 0x31, 0x39, 0x35, 0x31, 0x35, 0x36, 0x38, 0x36, 0x34, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_989_sig[] = { 0xca, 0xd5, 0x2b, 0xdb, 0x35, 0xaf, 0x7e, 0xe0, 0xe8, 0xf6, 0x87, 0xc8, 0x1f, 0x2e, 0xdd, 0x8e, 0xfc, 0x2d, 0x6e, 0xe3, 0x17, 0xf3, 0xc6, 0xa8, 0x21, 0x21, 0x04, 0x8e, 0xf7, 0xa3, 0xff, 0x3b, 0x69, 0x18, 0x7a, 0xae, 0xa5, 0x3f, 0x49, 0x26, 0x58, 0xf8, 0x4e, 0x18, 0x66, 0x16, 0x54, 0x4a, 0xf4, 0x94, 0x90, 0x02, 0x41, 0xd2, 0xb8, 0x02, 0xdf, 0x2e, 0xae, 0x3e, 0x3f, 0x14, 0x10, 0x86, 0x5e, 0x4c, 0xd1, 0x6e, 0x22, 0x1f, 0x27, 0x7e, 0x7b, 0x50, 0x93, 0xff, 0x18, 0x6e, 0x4d, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_989 = { .name = "ecdsa_brainpoolp320r1_sha384_989", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_989_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_989_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_989_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 990 for ECDSA, tcId is 80 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_990_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_990_msg[] = { 0x35, 0x39, 0x35, 0x39, 0x30, 0x37, 0x31, 0x36, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_990_sig[] = { 0x93, 0x01, 0x3f, 0xf8, 0x41, 0x51, 0xa0, 0x4e, 0xa1, 0x46, 0xa3, 0x6d, 0x2a, 0x3b, 0x9f, 0x49, 0x7b, 0xa5, 0xd9, 0x32, 0x30, 0x19, 0xb7, 0x30, 0xbe, 0x32, 0x2b, 0xc5, 0x19, 0xe2, 0x70, 0x1e, 0x3f, 0x0e, 0xc1, 0xb6, 0xc8, 0x01, 0x5e, 0x8f, 0x87, 0x26, 0x69, 0xf3, 0x3b, 0x9b, 0x4b, 0x93, 0x38, 0x4d, 0x9a, 0xc3, 0xf7, 0xc3, 0x09, 0x25, 0x60, 0xb9, 0xaf, 0x7e, 0x67, 0x38, 0x22, 0x1e, 0x3b, 0x28, 0x94, 0x21, 0x81, 0x36, 0x01, 0xfe, 0x56, 0x9b, 0x2c, 0x49, 0xaf, 0xec, 0x8b, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_990 = { .name = "ecdsa_brainpoolp320r1_sha384_990", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_990_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_990_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_990_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 991 for ECDSA, tcId is 81 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_991_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_991_msg[] = { 0x32, 0x31, 0x35, 0x33, 0x34, 0x36, 0x39, 0x35, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_991_sig[] = { 0x26, 0x22, 0x8c, 0xdd, 0x2c, 0x08, 0xfb, 0xf8, 0xdd, 0x4a, 0xd5, 0xd2, 0xf8, 0x0e, 0xd1, 0x51, 0x29, 0x86, 0x8e, 0x89, 0x2d, 0x33, 0xcd, 0x89, 0x25, 0x03, 0x20, 0x7e, 0x91, 0x11, 0x4c, 0x86, 0x8d, 0x00, 0x64, 0xc6, 0x0f, 0x1b, 0xb6, 0x12, 0xaf, 0xde, 0xdc, 0x05, 0xf0, 0xb2, 0x7e, 0x93, 0x63, 0xc3, 0x4d, 0x9b, 0xd1, 0xbc, 0x64, 0xec, 0x01, 0x42, 0xfc, 0xd9, 0xf4, 0x0f, 0x35, 0x84, 0x60, 0x5b, 0xbc, 0xcf, 0x12, 0xb0, 0xe2, 0x79, 0xe4, 0xb3, 0xe3, 0xd0, 0x92, 0x7a, 0x48, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_991 = { .name = "ecdsa_brainpoolp320r1_sha384_991", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_991_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_991_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_991_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 992 for ECDSA, tcId is 82 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_992_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_992_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x31, 0x30, 0x39, 0x38, 0x33, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_992_sig[] = { 0x73, 0x1d, 0x59, 0x7c, 0x36, 0x94, 0xa4, 0x93, 0x2f, 0x0f, 0x14, 0xfc, 0x31, 0x32, 0xd2, 0xba, 0x9f, 0x5b, 0x7d, 0x83, 0x3a, 0xe9, 0x1c, 0xbe, 0x9a, 0x45, 0x03, 0x52, 0xf4, 0x24, 0x0d, 0x5b, 0xb7, 0x12, 0xf6, 0x5b, 0x0e, 0xea, 0x04, 0x12, 0x1b, 0x8a, 0x6f, 0xc9, 0xbc, 0x1e, 0xcf, 0x8c, 0x09, 0xb1, 0xba, 0x27, 0xc4, 0xc8, 0xdc, 0xeb, 0xaf, 0x1e, 0x66, 0x9a, 0x89, 0x03, 0x6b, 0x34, 0xfa, 0x8f, 0xf5, 0x72, 0x80, 0xe5, 0x74, 0x19, 0x59, 0xe6, 0xc0, 0x5e, 0x05, 0x88, 0x0a, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_992 = { .name = "ecdsa_brainpoolp320r1_sha384_992", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_992_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_992_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_992_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 993 for ECDSA, tcId is 83 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_993_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_993_msg[] = { 0x34, 0x39, 0x32, 0x39, 0x33, 0x39, 0x36, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_993_sig[] = { 0xd2, 0xab, 0x69, 0xae, 0x61, 0x10, 0xbb, 0x67, 0xed, 0x99, 0xff, 0xbd, 0xad, 0x80, 0x36, 0xdf, 0xab, 0xc4, 0x6d, 0xe8, 0xae, 0x1f, 0xc7, 0xe7, 0x99, 0x98, 0x6b, 0x91, 0xba, 0x7d, 0x45, 0x46, 0x72, 0xeb, 0xe4, 0x89, 0x6c, 0xf7, 0x20, 0x11, 0xd2, 0x9d, 0x67, 0xbf, 0x2b, 0x88, 0x27, 0x70, 0xd4, 0x6d, 0xbd, 0x06, 0xa6, 0xfb, 0xaa, 0xd5, 0x83, 0xc2, 0xce, 0xed, 0xcb, 0xd7, 0x72, 0x20, 0x0b, 0x75, 0x32, 0xe3, 0x54, 0xf8, 0x6e, 0xaf, 0x9a, 0x94, 0x18, 0x19, 0x1e, 0xaf, 0xc5, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_993 = { .name = "ecdsa_brainpoolp320r1_sha384_993", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_993_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_993_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_993_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 994 for ECDSA, tcId is 84 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_994_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_994_msg[] = { 0x32, 0x31, 0x31, 0x32, 0x33, 0x35, 0x35, 0x39, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_994_sig[] = { 0x81, 0xda, 0x10, 0xc5, 0xfe, 0xf4, 0xbf, 0xb5, 0x8b, 0x4a, 0x73, 0xb4, 0xcf, 0x3f, 0xd4, 0xf0, 0xf0, 0x28, 0xb4, 0x48, 0xb3, 0x46, 0x3d, 0xab, 0xe0, 0xd6, 0xf1, 0xe1, 0x01, 0xaf, 0x57, 0x0f, 0xa6, 0x41, 0x16, 0x73, 0x1e, 0xa5, 0xb9, 0xc2, 0xce, 0xac, 0x01, 0xeb, 0xad, 0x70, 0x6e, 0xf4, 0x3c, 0x80, 0xca, 0xa1, 0xd8, 0x96, 0x2c, 0x65, 0x5b, 0xfd, 0x81, 0x03, 0x96, 0xb9, 0x4d, 0x2b, 0xbe, 0xa2, 0x99, 0xbd, 0x5c, 0xbc, 0xce, 0xd7, 0x55, 0x62, 0xb0, 0xfa, 0xb4, 0x46, 0xff, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_994 = { .name = "ecdsa_brainpoolp320r1_sha384_994", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_994_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_994_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_994_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 995 for ECDSA, tcId is 85 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_995_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_995_msg[] = { 0x31, 0x32, 0x33, 0x39, 0x32, 0x37, 0x35, 0x37, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_995_sig[] = { 0x38, 0x35, 0x8b, 0xa2, 0xc4, 0x6f, 0x61, 0xf3, 0x9b, 0xef, 0x22, 0x87, 0x3a, 0x5b, 0xf2, 0x64, 0x64, 0xf2, 0xb0, 0x5e, 0x48, 0x74, 0xbb, 0xb6, 0x2a, 0x23, 0x23, 0x38, 0x5f, 0x8e, 0x87, 0xa5, 0xb1, 0x18, 0xa0, 0x07, 0x90, 0x78, 0xb4, 0x4d, 0x93, 0xf8, 0x4f, 0x06, 0x29, 0x0f, 0x48, 0x16, 0x19, 0x22, 0x55, 0x25, 0x77, 0x48, 0x2a, 0x97, 0x34, 0x04, 0xf4, 0x7c, 0x84, 0xc6, 0xe1, 0xa9, 0x46, 0x43, 0xc3, 0x83, 0x2f, 0xb2, 0x91, 0x2f, 0xc4, 0xb3, 0x85, 0x29, 0xe2, 0xf1, 0x3e, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_995 = { .name = "ecdsa_brainpoolp320r1_sha384_995", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_995_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_995_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_995_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 996 for ECDSA, tcId is 86 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_996_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_996_msg[] = { 0x32, 0x30, 0x38, 0x31, 0x31, 0x38, 0x38, 0x37, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_996_sig[] = { 0xaf, 0xd1, 0xfb, 0xa7, 0x00, 0xfc, 0x70, 0x3f, 0xb7, 0x72, 0xf7, 0x01, 0x59, 0x7a, 0xdd, 0xdc, 0xce, 0x4f, 0xf9, 0xf5, 0x30, 0xc8, 0x30, 0xdc, 0x8c, 0x8c, 0xbd, 0x4b, 0x30, 0x70, 0xf4, 0xa2, 0x2b, 0x80, 0x51, 0x6b, 0x0b, 0x82, 0x09, 0x70, 0x76, 0xc2, 0xe8, 0x90, 0x86, 0x0c, 0x36, 0xbb, 0xb5, 0xf6, 0xa1, 0x05, 0x34, 0x01, 0xf1, 0xb5, 0x1a, 0xa8, 0x3c, 0xdf, 0xd9, 0x6a, 0x3c, 0x15, 0xe1, 0xa1, 0x83, 0xfd, 0xf8, 0x35, 0x7e, 0x49, 0xd2, 0x98, 0x4e, 0x4f, 0xcf, 0x19, 0xc2, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_996 = { .name = "ecdsa_brainpoolp320r1_sha384_996", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_996_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_996_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_996_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 997 for ECDSA, tcId is 87 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_997_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_997_msg[] = { 0x34, 0x35, 0x34, 0x36, 0x30, 0x38, 0x39, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_997_sig[] = { 0x8c, 0x90, 0xd4, 0xc8, 0xbf, 0x02, 0x19, 0x06, 0xd3, 0xd5, 0x77, 0xbd, 0x16, 0xb3, 0xe1, 0x39, 0xbb, 0xc3, 0x5d, 0x76, 0x92, 0xa8, 0x28, 0xf0, 0xef, 0x5c, 0xdf, 0x9d, 0x51, 0xa8, 0x44, 0x22, 0x65, 0xf8, 0x15, 0x84, 0x9f, 0xe7, 0x93, 0xb8, 0x0b, 0xfe, 0x16, 0x49, 0x2a, 0xbb, 0x58, 0xa1, 0xd8, 0x06, 0x47, 0x67, 0x54, 0x6d, 0x29, 0xaa, 0xf6, 0x13, 0x8c, 0x58, 0x42, 0xc7, 0xf7, 0x00, 0x2f, 0xba, 0xc3, 0x4b, 0x78, 0xb3, 0x24, 0xb8, 0x44, 0x26, 0x51, 0x0c, 0x1b, 0x7b, 0x0d, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_997 = { .name = "ecdsa_brainpoolp320r1_sha384_997", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_997_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_997_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_997_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 998 for ECDSA, tcId is 88 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_998_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_998_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x36, 0x38, 0x37, 0x31, 0x31, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_998_sig[] = { 0x6d, 0x07, 0xda, 0x92, 0xbd, 0x40, 0x59, 0x12, 0xb2, 0x2a, 0x99, 0x3e, 0xd3, 0x0e, 0x06, 0x14, 0x9c, 0x78, 0x74, 0x3f, 0xa1, 0x95, 0xfc, 0xd3, 0xba, 0xf0, 0x58, 0x03, 0xfd, 0xdd, 0x5a, 0x64, 0x08, 0x20, 0x1e, 0x68, 0xfa, 0xee, 0x62, 0x2a, 0x5a, 0xd3, 0xc8, 0xb4, 0xc1, 0xc6, 0x80, 0x80, 0x27, 0x9f, 0x20, 0xba, 0x15, 0x54, 0x83, 0x43, 0xfc, 0xa9, 0xec, 0x52, 0xfe, 0x23, 0xbd, 0xf5, 0x96, 0x19, 0x73, 0x8d, 0xd1, 0xbd, 0x41, 0x84, 0x14, 0xac, 0x53, 0xad, 0x7c, 0xe1, 0x6c, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_998 = { .name = "ecdsa_brainpoolp320r1_sha384_998", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_998_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_998_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_998_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 999 for ECDSA, tcId is 89 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_999_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_999_msg[] = { 0x32, 0x30, 0x33, 0x31, 0x33, 0x38, 0x31, 0x38, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_999_sig[] = { 0xbe, 0x43, 0xdf, 0x61, 0x7f, 0x79, 0xef, 0x83, 0x40, 0x4e, 0x7c, 0x73, 0x93, 0xed, 0x3c, 0x38, 0xc8, 0x15, 0xd0, 0x6e, 0x3c, 0x0d, 0xeb, 0xf9, 0xba, 0x37, 0xf3, 0x6c, 0x41, 0x9a, 0x6c, 0x3e, 0xa6, 0x90, 0x82, 0x2f, 0x88, 0x01, 0x1f, 0xf1, 0x2f, 0x0a, 0xd4, 0xee, 0x5f, 0xe7, 0xad, 0x12, 0x8f, 0x58, 0xa5, 0x20, 0xa4, 0xfb, 0xad, 0x3f, 0x0a, 0x50, 0x2a, 0x4a, 0x44, 0x12, 0x63, 0x9b, 0x3d, 0xbc, 0x20, 0x6e, 0xdf, 0xb2, 0xa0, 0x3d, 0x56, 0x40, 0x10, 0xd7, 0x8d, 0x22, 0x28, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_999 = { .name = "ecdsa_brainpoolp320r1_sha384_999", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_999_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_999_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_999_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1000 for ECDSA, tcId is 90 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1000_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1000_msg[] = { 0x32, 0x35, 0x35, 0x33, 0x35, 0x38, 0x33, 0x33, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1000_sig[] = { 0x84, 0x4c, 0xa2, 0x93, 0x40, 0x11, 0x2d, 0x0e, 0xb9, 0xdd, 0x15, 0xf6, 0x26, 0x55, 0xa0, 0xcf, 0xa9, 0x93, 0x41, 0x5e, 0x57, 0x05, 0x11, 0xa3, 0xf7, 0x27, 0x36, 0x23, 0xb8, 0x2d, 0x89, 0x2d, 0x13, 0x6c, 0x6e, 0x8b, 0xc5, 0x7d, 0xb8, 0x4e, 0x71, 0x11, 0x4a, 0xe5, 0x79, 0xd0, 0x53, 0xb5, 0xcb, 0x3d, 0x77, 0xd2, 0xe9, 0xfa, 0xf1, 0xc0, 0x6c, 0xc2, 0x63, 0xab, 0x8f, 0xd8, 0x45, 0xa0, 0x37, 0x8f, 0x4a, 0x75, 0xda, 0x86, 0xdd, 0xc2, 0x3a, 0xb4, 0xd0, 0x79, 0x46, 0x83, 0x2a, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1000 = { .name = "ecdsa_brainpoolp320r1_sha384_1000", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1000_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1000_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1000_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1001 for ECDSA, tcId is 91 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1001_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1001_msg[] = { 0x34, 0x36, 0x31, 0x38, 0x38, 0x34, 0x31, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1001_sig[] = { 0xcd, 0xa8, 0x53, 0x12, 0x22, 0x50, 0x2a, 0x62, 0x36, 0x8f, 0xdd, 0xc7, 0x24, 0x79, 0x88, 0x70, 0x03, 0x83, 0x33, 0xb9, 0xfa, 0x77, 0x14, 0x1d, 0x4b, 0xc5, 0xef, 0x75, 0x8f, 0x7e, 0x97, 0x3e, 0x5a, 0xb8, 0xb4, 0xcf, 0xae, 0x90, 0xea, 0xa1, 0x9e, 0xad, 0x50, 0xa2, 0x53, 0x32, 0x87, 0xab, 0xe5, 0x50, 0x4e, 0xfd, 0x8d, 0xb5, 0x7f, 0x8b, 0x96, 0xa7, 0xfe, 0x03, 0x9c, 0xc9, 0x5d, 0x16, 0x90, 0xea, 0x0c, 0x1e, 0x2c, 0x9d, 0xf5, 0xfc, 0x29, 0xcd, 0xdd, 0x7b, 0x01, 0xed, 0xb9, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1001 = { .name = "ecdsa_brainpoolp320r1_sha384_1001", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1001_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1001_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1001_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1002 for ECDSA, tcId is 92 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1002_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1002_msg[] = { 0x31, 0x30, 0x30, 0x39, 0x32, 0x34, 0x35, 0x38, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1002_sig[] = { 0x5c, 0x2c, 0x6a, 0x66, 0x13, 0x38, 0xdf, 0x36, 0x5a, 0xf8, 0xba, 0x10, 0x80, 0xb9, 0x94, 0xe5, 0x99, 0x89, 0xf0, 0x02, 0xfa, 0x4f, 0xff, 0x42, 0xfc, 0x89, 0x94, 0xca, 0x63, 0x95, 0x62, 0x01, 0x52, 0xf3, 0x97, 0x13, 0x00, 0xaf, 0xf6, 0xf9, 0x86, 0x81, 0xea, 0x17, 0x93, 0xbd, 0x3e, 0x06, 0x94, 0x26, 0x12, 0x7a, 0x6b, 0x66, 0x57, 0x25, 0xdd, 0xba, 0x4a, 0x8f, 0x19, 0x45, 0x85, 0x17, 0x43, 0x47, 0x7a, 0x1c, 0xbd, 0xc7, 0x35, 0x67, 0x13, 0xae, 0x70, 0xfc, 0x13, 0x85, 0x31, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1002 = { .name = "ecdsa_brainpoolp320r1_sha384_1002", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1002_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1002_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1002_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1003 for ECDSA, tcId is 93 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1003_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1003_msg[] = { 0x32, 0x37, 0x35, 0x36, 0x34, 0x36, 0x36, 0x35, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1003_sig[] = { 0x0e, 0x06, 0x1b, 0x48, 0xb5, 0xf7, 0x83, 0x6e, 0x0c, 0xaf, 0x73, 0xc9, 0x77, 0x0c, 0x3f, 0xee, 0x1f, 0x67, 0xec, 0x18, 0xde, 0xd9, 0xe1, 0xd3, 0x39, 0xab, 0x56, 0xd0, 0x5b, 0x9a, 0xdd, 0xe3, 0x69, 0x50, 0x4f, 0xed, 0xff, 0x1d, 0x66, 0x81, 0x00, 0x9d, 0xbc, 0x4a, 0xd8, 0xed, 0xc1, 0x89, 0x6f, 0xa0, 0x41, 0xca, 0x60, 0xac, 0x64, 0xb7, 0xfa, 0x14, 0x8e, 0x3f, 0x02, 0xb0, 0xf6, 0x97, 0xae, 0x22, 0xd9, 0x23, 0xf5, 0x26, 0xfd, 0x49, 0x36, 0xe5, 0xf5, 0x84, 0xb2, 0x3d, 0xdb, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1003 = { .name = "ecdsa_brainpoolp320r1_sha384_1003", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1003_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1003_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1003_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1004 for ECDSA, tcId is 94 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1004_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1004_msg[] = { 0x31, 0x31, 0x39, 0x36, 0x39, 0x37, 0x31, 0x30, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1004_sig[] = { 0xa8, 0x46, 0x26, 0x05, 0xc7, 0x94, 0x37, 0xc0, 0x68, 0x52, 0x3d, 0x93, 0xd2, 0xe1, 0x52, 0x9c, 0xca, 0xe1, 0xb5, 0x24, 0x8e, 0x8f, 0x9a, 0x90, 0xf2, 0xef, 0x08, 0xd9, 0xd5, 0xe5, 0x02, 0x5b, 0x36, 0x39, 0xf8, 0x2b, 0x70, 0xf1, 0xe7, 0xed, 0x67, 0xaa, 0x5f, 0xe4, 0xe7, 0x9e, 0x7c, 0x54, 0xa8, 0xce, 0x38, 0x9b, 0x90, 0xe1, 0xce, 0x15, 0x56, 0xaa, 0x68, 0x9b, 0x44, 0x81, 0x4a, 0x6c, 0xb5, 0xc2, 0xf0, 0xfe, 0x45, 0x69, 0xc5, 0xcf, 0xce, 0xe3, 0x4c, 0xbb, 0x4a, 0x08, 0x62, 0x19, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1004 = { .name = "ecdsa_brainpoolp320r1_sha384_1004", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1004_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1004_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1004_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1005 for ECDSA, tcId is 95 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1005_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1005_msg[] = { 0x32, 0x33, 0x33, 0x31, 0x34, 0x32, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1005_sig[] = { 0x93, 0xb0, 0x10, 0x29, 0x42, 0x1c, 0xa3, 0x0d, 0x8a, 0xbb, 0xd0, 0x6f, 0x13, 0x4e, 0xe9, 0xdc, 0xbe, 0x81, 0x79, 0x0d, 0x01, 0x27, 0x22, 0xae, 0x65, 0x21, 0x4f, 0x0a, 0xaa, 0x34, 0xbb, 0xa6, 0x42, 0xf4, 0x39, 0x49, 0xd5, 0xec, 0x51, 0xa5, 0x11, 0x0e, 0x4f, 0xce, 0x36, 0xe0, 0xc2, 0xac, 0xd8, 0x98, 0x12, 0x2f, 0xba, 0x75, 0x6e, 0x71, 0x1a, 0xd0, 0x82, 0x08, 0x7c, 0x36, 0xb1, 0x25, 0x08, 0x4f, 0x67, 0xb2, 0x2e, 0x37, 0xa0, 0x2b, 0xd6, 0x86, 0x28, 0xcd, 0xb1, 0x64, 0xec, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1005 = { .name = "ecdsa_brainpoolp320r1_sha384_1005", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1005_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1005_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1005_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1006 for ECDSA, tcId is 96 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1006_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1006_msg[] = { 0x31, 0x36, 0x37, 0x33, 0x34, 0x38, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1006_sig[] = { 0x6b, 0x6d, 0x89, 0x3c, 0x30, 0x55, 0xda, 0x5d, 0x5a, 0x2f, 0xf6, 0xce, 0x03, 0x8a, 0x1b, 0xec, 0x59, 0xb0, 0x49, 0x50, 0xbf, 0xd8, 0x01, 0x26, 0x48, 0xd6, 0x06, 0x31, 0x86, 0xff, 0x86, 0x1d, 0x7a, 0xa9, 0x1a, 0x51, 0x85, 0xaa, 0x3c, 0x0c, 0xa6, 0x02, 0xed, 0x34, 0xee, 0x41, 0xe4, 0x81, 0x12, 0x51, 0xa5, 0x1b, 0xd6, 0x70, 0x10, 0xf8, 0xeb, 0x33, 0x55, 0xb8, 0x69, 0x1d, 0xad, 0x66, 0x03, 0x5e, 0x72, 0x3d, 0x97, 0x13, 0x46, 0xf5, 0x7c, 0x8a, 0x0f, 0x47, 0x9f, 0xef, 0x66, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1006 = { .name = "ecdsa_brainpoolp320r1_sha384_1006", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1006_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1006_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1006_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1007 for ECDSA, tcId is 97 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1007_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1007_msg[] = { 0x31, 0x34, 0x36, 0x30, 0x31, 0x35, 0x39, 0x38, 0x32, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1007_sig[] = { 0x6f, 0xc4, 0x2c, 0xf2, 0x3a, 0xa4, 0x2c, 0x36, 0x67, 0x5f, 0xf1, 0x26, 0x41, 0x2c, 0x75, 0x7d, 0xde, 0x74, 0xef, 0x73, 0xca, 0xdb, 0x04, 0x25, 0xe2, 0x3c, 0xb7, 0x62, 0x30, 0xa5, 0x8b, 0x3d, 0x00, 0x23, 0x70, 0xb4, 0x16, 0x6b, 0xfd, 0x29, 0x4e, 0x61, 0xb9, 0xb1, 0x0a, 0x13, 0xfe, 0x0d, 0xd2, 0x75, 0x87, 0x33, 0xf6, 0xb1, 0x78, 0xaf, 0x98, 0xe0, 0x07, 0x98, 0x67, 0x83, 0x7d, 0x55, 0xf8, 0xe5, 0xe9, 0x0b, 0x57, 0x7d, 0xe9, 0x0c, 0xe0, 0xd8, 0xdc, 0x34, 0x5e, 0xd1, 0x6b, 0x38, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1007 = { .name = "ecdsa_brainpoolp320r1_sha384_1007", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1007_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1007_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1007_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1008 for ECDSA, tcId is 98 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1008_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1008_msg[] = { 0x38, 0x39, 0x39, 0x30, 0x38, 0x35, 0x39, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1008_sig[] = { 0xb5, 0x29, 0xa5, 0x63, 0xa2, 0xf4, 0x06, 0x5d, 0x33, 0x3c, 0x81, 0x2b, 0x0b, 0x61, 0x34, 0xde, 0x97, 0x35, 0xbb, 0x26, 0x9f, 0xea, 0x76, 0x3f, 0x01, 0xcf, 0x7d, 0x1c, 0x6a, 0x0e, 0xc7, 0x0d, 0x72, 0x23, 0xc7, 0xe6, 0xc1, 0xb0, 0x40, 0xe8, 0x34, 0x7f, 0xcb, 0x8f, 0x39, 0x71, 0xb3, 0xd9, 0x68, 0xba, 0x70, 0x9b, 0x1b, 0xd4, 0xd3, 0x1b, 0x55, 0x0c, 0xce, 0xed, 0x23, 0x22, 0x68, 0xca, 0x0d, 0xf1, 0xe0, 0x05, 0x02, 0xa5, 0x6a, 0xa4, 0x2d, 0xde, 0x73, 0x30, 0xbd, 0x91, 0x9d, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1008 = { .name = "ecdsa_brainpoolp320r1_sha384_1008", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1008_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1008_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1008_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1009 for ECDSA, tcId is 99 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1009_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1009_msg[] = { 0x34, 0x33, 0x32, 0x36, 0x34, 0x34, 0x30, 0x39, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1009_sig[] = { 0xb9, 0x1b, 0x2a, 0x73, 0x44, 0x95, 0x60, 0x52, 0x21, 0x12, 0xfa, 0x4f, 0xd1, 0xb5, 0x7b, 0x8c, 0x24, 0x75, 0x47, 0x91, 0xaf, 0x24, 0x7a, 0x8c, 0x9d, 0xe4, 0x23, 0xe0, 0xbd, 0x53, 0x62, 0x89, 0xa4, 0xfe, 0x85, 0x0f, 0x7e, 0x3c, 0x43, 0xae, 0x2e, 0xb3, 0xf8, 0x74, 0xf2, 0xe5, 0xec, 0x56, 0x35, 0x6b, 0xf6, 0xba, 0xf1, 0x0b, 0x64, 0xb7, 0xc5, 0x4b, 0x13, 0x44, 0x7c, 0xcc, 0xa1, 0xff, 0xc6, 0x6a, 0x1f, 0xc8, 0x9d, 0xc8, 0xe9, 0x77, 0x80, 0x17, 0x48, 0xf8, 0xf0, 0xce, 0x5a, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1009 = { .name = "ecdsa_brainpoolp320r1_sha384_1009", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1009_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1009_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1009_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1010 for ECDSA, tcId is 100 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1010_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1010_msg[] = { 0x32, 0x33, 0x37, 0x36, 0x34, 0x33, 0x37, 0x35, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1010_sig[] = { 0x31, 0x43, 0x38, 0x68, 0x3f, 0x23, 0xb1, 0x11, 0x0d, 0x18, 0x40, 0x73, 0x2f, 0x67, 0x22, 0x54, 0xf3, 0x80, 0x79, 0xbf, 0x11, 0xee, 0xaf, 0xff, 0x1e, 0xc2, 0xe5, 0x3a, 0x53, 0x73, 0xf7, 0x4c, 0x98, 0x88, 0x7b, 0x11, 0xeb, 0xb7, 0x8c, 0x86, 0xb7, 0xe3, 0xa6, 0xb4, 0x59, 0xdd, 0x10, 0xcf, 0xb5, 0xdf, 0x6d, 0x2e, 0xa7, 0xaf, 0xb1, 0x5e, 0xfe, 0xb1, 0xe5, 0xe9, 0x17, 0xe5, 0xaa, 0x44, 0xfa, 0x54, 0x74, 0x36, 0x89, 0xd7, 0xda, 0xf1, 0x63, 0xf9, 0x98, 0xe0, 0x57, 0x19, 0x12, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1010 = { .name = "ecdsa_brainpoolp320r1_sha384_1010", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1010_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1010_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1010_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1011 for ECDSA, tcId is 101 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1011_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1011_msg[] = { 0x38, 0x36, 0x30, 0x33, 0x39, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1011_sig[] = { 0x22, 0xd1, 0x88, 0x1a, 0x94, 0xe1, 0xe1, 0x1c, 0xf1, 0x06, 0x20, 0xf3, 0x7d, 0x70, 0x8e, 0xbe, 0xd8, 0x47, 0xf1, 0x45, 0x91, 0x29, 0xa0, 0xd4, 0x2c, 0xb4, 0x57, 0xda, 0x80, 0x51, 0xf8, 0x1a, 0x0f, 0x9d, 0xa8, 0x46, 0x28, 0x1a, 0x68, 0xf7, 0x40, 0x46, 0x52, 0xeb, 0xd2, 0x61, 0xf5, 0xf6, 0xb1, 0x85, 0xde, 0x4a, 0x16, 0x98, 0x0d, 0xc3, 0x66, 0x2f, 0xc4, 0x57, 0x3e, 0x24, 0x55, 0x77, 0xe7, 0xef, 0x6e, 0x3c, 0xbf, 0xdd, 0x47, 0xbc, 0x1e, 0x48, 0x7b, 0xa2, 0x06, 0xcc, 0xf7, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1011 = { .name = "ecdsa_brainpoolp320r1_sha384_1011", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1011_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1011_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1011_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1012 for ECDSA, tcId is 102 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1012_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1012_msg[] = { 0x35, 0x38, 0x30, 0x37, 0x37, 0x37, 0x33, 0x39, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1012_sig[] = { 0x86, 0x39, 0x70, 0xca, 0xec, 0x6c, 0x6f, 0xf0, 0xa1, 0xc7, 0x0f, 0x60, 0x85, 0x95, 0x76, 0xe3, 0x58, 0x3e, 0x6b, 0x52, 0x9d, 0xe3, 0xf9, 0x28, 0x13, 0x6e, 0x84, 0x8c, 0x56, 0xb6, 0xc6, 0x71, 0x50, 0x45, 0xfd, 0xfe, 0x52, 0x63, 0x77, 0x47, 0x66, 0x7f, 0x52, 0x5a, 0x88, 0xbe, 0x89, 0x1e, 0xc6, 0xb9, 0xf9, 0x6d, 0x1a, 0x68, 0xc4, 0xf0, 0x6b, 0x3b, 0x3d, 0x2a, 0xd1, 0xc1, 0x5f, 0x06, 0x3d, 0x11, 0x0e, 0xc9, 0xfb, 0x60, 0xae, 0x74, 0x63, 0xdd, 0x56, 0x8a, 0x69, 0xce, 0x45, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1012 = { .name = "ecdsa_brainpoolp320r1_sha384_1012", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1012_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1012_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1012_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1013 for ECDSA, tcId is 103 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1013_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1013_msg[] = { 0x35, 0x37, 0x31, 0x38, 0x36, 0x36, 0x38, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1013_sig[] = { 0x69, 0xcf, 0x06, 0x00, 0x38, 0x4c, 0xeb, 0x83, 0x2e, 0x23, 0x7b, 0x6b, 0x45, 0x3d, 0xea, 0x81, 0xa3, 0xc1, 0x9c, 0xb8, 0xfa, 0xe4, 0x8b, 0xa1, 0x86, 0xd2, 0x8e, 0x3b, 0x11, 0x84, 0x64, 0xb2, 0x7a, 0xf9, 0x10, 0x0f, 0x18, 0x1b, 0x73, 0x8a, 0x27, 0x80, 0x26, 0x9a, 0x8f, 0xa4, 0x07, 0x90, 0xed, 0x72, 0x63, 0x72, 0xee, 0x09, 0x56, 0x26, 0x5e, 0x72, 0x89, 0x6d, 0x9e, 0x84, 0xf7, 0x13, 0xf8, 0x83, 0xa3, 0xbc, 0x05, 0x48, 0xe8, 0xd3, 0xa2, 0xb3, 0x57, 0x33, 0x3d, 0xda, 0x4c, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1013 = { .name = "ecdsa_brainpoolp320r1_sha384_1013", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1013_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1013_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1013_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1014 for ECDSA, tcId is 104 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1014_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1014_msg[] = { 0x38, 0x36, 0x37, 0x37, 0x33, 0x30, 0x39, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1014_sig[] = { 0x30, 0xf3, 0x81, 0x39, 0x88, 0x3f, 0x71, 0xc0, 0xc6, 0x4d, 0x63, 0xad, 0xcb, 0x73, 0x1f, 0x1c, 0x38, 0x5d, 0xf8, 0x7d, 0xb7, 0xce, 0x73, 0x26, 0xbf, 0x50, 0x41, 0x0a, 0xcc, 0x50, 0xf0, 0xba, 0xbf, 0x50, 0x17, 0xf9, 0x2a, 0x1e, 0x1a, 0x6e, 0x59, 0x77, 0x34, 0x22, 0x24, 0x82, 0x72, 0x46, 0x43, 0xf6, 0x0e, 0x48, 0xb3, 0xb5, 0x89, 0xde, 0xaa, 0x37, 0xb8, 0x6e, 0x1d, 0xe1, 0xcf, 0x0b, 0x12, 0x9b, 0x28, 0x6e, 0xc6, 0x76, 0x86, 0x57, 0x4f, 0x16, 0xcf, 0xb5, 0xf2, 0xcc, 0x6f, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1014 = { .name = "ecdsa_brainpoolp320r1_sha384_1014", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1014_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1014_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1014_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1015 for ECDSA, tcId is 105 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1015_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1015_msg[] = { 0x32, 0x34, 0x37, 0x35, 0x35, 0x31, 0x35, 0x30, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1015_sig[] = { 0x17, 0x4a, 0xe9, 0x8c, 0xc2, 0x5d, 0xbe, 0xd7, 0x47, 0xce, 0xdf, 0x86, 0x97, 0x26, 0x6d, 0x16, 0xe9, 0x6b, 0xb4, 0xf8, 0x07, 0x1c, 0x90, 0x59, 0x90, 0xf4, 0xe7, 0x2c, 0x72, 0x8c, 0x94, 0xaa, 0xa3, 0x2d, 0xce, 0x24, 0xa5, 0x21, 0x66, 0xfb, 0x57, 0x80, 0x99, 0x83, 0x5a, 0x3d, 0xcb, 0x3d, 0xa2, 0xfd, 0x42, 0x75, 0x01, 0x80, 0x07, 0x9d, 0xa4, 0x07, 0xc7, 0xa1, 0x42, 0xcb, 0xcc, 0xb6, 0x99, 0xfe, 0xd7, 0xaf, 0x89, 0xdd, 0x70, 0x3b, 0xa0, 0xca, 0xd9, 0x4c, 0xdf, 0x2c, 0x05, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1015 = { .name = "ecdsa_brainpoolp320r1_sha384_1015", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1015_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1015_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1015_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1016 for ECDSA, tcId is 106 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1016_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1016_msg[] = { 0x39, 0x37, 0x33, 0x31, 0x37, 0x36, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1016_sig[] = { 0x58, 0xcf, 0xb1, 0x51, 0x1a, 0x22, 0x3c, 0x06, 0xb3, 0xe9, 0x74, 0xb6, 0x60, 0xbe, 0xd8, 0x27, 0xbe, 0xe3, 0x8c, 0x59, 0xc4, 0x52, 0x30, 0x68, 0xe9, 0xc9, 0xfa, 0xa3, 0x30, 0xc9, 0x70, 0xe6, 0x27, 0x1e, 0xa3, 0x87, 0xdb, 0x6b, 0x40, 0xb0, 0x76, 0x35, 0x94, 0xce, 0xd6, 0xe8, 0x41, 0x3b, 0xfd, 0x90, 0xd5, 0xce, 0xca, 0x18, 0xd6, 0x77, 0x4a, 0x3d, 0xa8, 0x74, 0x73, 0xcc, 0x4d, 0xee, 0x72, 0x6b, 0x03, 0x25, 0xe2, 0xdf, 0x8b, 0x25, 0x7d, 0x9e, 0x01, 0x31, 0x8a, 0xe7, 0xe0, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1016 = { .name = "ecdsa_brainpoolp320r1_sha384_1016", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1016_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1016_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1016_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1017 for ECDSA, tcId is 107 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1017_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1017_msg[] = { 0x33, 0x36, 0x39, 0x38, 0x30, 0x39, 0x35, 0x31, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1017_sig[] = { 0x8d, 0xdb, 0xa4, 0xf7, 0xaa, 0x8c, 0xc5, 0xe0, 0x0a, 0x3f, 0xfd, 0x2a, 0x08, 0x27, 0x10, 0xd4, 0x2d, 0x3a, 0x88, 0xf9, 0xf9, 0x47, 0xba, 0x51, 0xf0, 0x94, 0x66, 0xc2, 0xa9, 0x29, 0x5c, 0xaa, 0x13, 0x1b, 0x8a, 0xe9, 0xef, 0x51, 0xb3, 0x5c, 0xbc, 0x34, 0x10, 0x03, 0x3a, 0x57, 0x98, 0xd9, 0xe4, 0xc6, 0xa8, 0x17, 0xda, 0x17, 0x59, 0xc0, 0x0c, 0x0d, 0x38, 0xe3, 0xc1, 0xff, 0x22, 0xf0, 0xa4, 0x1e, 0x5a, 0xd0, 0xd1, 0xe9, 0x14, 0xe7, 0x1c, 0x90, 0x7d, 0xa8, 0xc2, 0x45, 0xca, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1017 = { .name = "ecdsa_brainpoolp320r1_sha384_1017", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1017_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1017_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1017_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1018 for ECDSA, tcId is 108 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1018_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1018_msg[] = { 0x31, 0x30, 0x37, 0x35, 0x30, 0x32, 0x36, 0x38, 0x35, 0x37, 0x36, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1018_sig[] = { 0x2f, 0x7e, 0x50, 0xee, 0x96, 0x70, 0x6d, 0x59, 0x7d, 0x8b, 0xf0, 0x10, 0x3f, 0xa4, 0x67, 0x86, 0x74, 0x6a, 0x2c, 0x65, 0xc0, 0x21, 0xfa, 0xc7, 0xfa, 0x37, 0x8d, 0x24, 0x4c, 0x41, 0x8a, 0x42, 0xb7, 0x90, 0x8f, 0x0f, 0xab, 0x2d, 0xff, 0xca, 0xb7, 0xb9, 0x4f, 0x2a, 0x88, 0x3b, 0xa1, 0xb4, 0x98, 0x58, 0x32, 0x9c, 0xc7, 0x8f, 0xc2, 0xa9, 0x92, 0x10, 0x98, 0x09, 0xb4, 0x70, 0xb8, 0x78, 0xcc, 0x38, 0xe1, 0xbd, 0xd4, 0xdf, 0x3e, 0xe0, 0x0a, 0x0a, 0xe7, 0xe2, 0x28, 0xe4, 0x66, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1018 = { .name = "ecdsa_brainpoolp320r1_sha384_1018", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1018_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1018_msg, .msglen = 11, .sig = ecdsa_brainpoolp320r1_sha384_1018_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1019 for ECDSA, tcId is 109 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1019_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1019_msg[] = { 0x38, 0x36, 0x39, 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1019_sig[] = { 0x45, 0x91, 0x49, 0x1e, 0xee, 0x04, 0xe1, 0x0a, 0x40, 0xa1, 0xe8, 0xeb, 0x82, 0x14, 0x81, 0x95, 0x12, 0x33, 0x48, 0xec, 0x1a, 0x7c, 0xba, 0x06, 0x04, 0x4e, 0x8f, 0x22, 0x6e, 0xd3, 0x09, 0x10, 0xb6, 0x93, 0xeb, 0xbb, 0xae, 0xe0, 0x68, 0x5f, 0x1b, 0x8b, 0x37, 0x33, 0xcc, 0x5c, 0xa1, 0x5d, 0xad, 0x84, 0x80, 0x9d, 0xf8, 0x49, 0x97, 0x88, 0xb4, 0x89, 0x9c, 0xba, 0x30, 0x7f, 0x93, 0xb4, 0x9e, 0xa6, 0xa6, 0x3b, 0x9e, 0x77, 0x48, 0x7c, 0x3c, 0x98, 0xb8, 0x03, 0xfc, 0xe6, 0x9c, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1019 = { .name = "ecdsa_brainpoolp320r1_sha384_1019", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1019_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1019_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1019_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1020 for ECDSA, tcId is 110 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1020_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1020_msg[] = { 0x32, 0x31, 0x37, 0x34, 0x36, 0x35, 0x35, 0x34, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1020_sig[] = { 0x9d, 0x22, 0xb8, 0x64, 0xe2, 0x70, 0x6f, 0xa4, 0x3a, 0x67, 0xea, 0x62, 0xf3, 0x9e, 0x4d, 0x3f, 0x40, 0x27, 0x67, 0xd9, 0xd0, 0x38, 0xc7, 0x8e, 0x28, 0x44, 0xd6, 0x99, 0xf4, 0x1e, 0xaf, 0x1a, 0x64, 0x1c, 0xfd, 0xd9, 0xd6, 0xa6, 0x3f, 0xb5, 0x1e, 0xaa, 0xcd, 0xad, 0x82, 0x94, 0xec, 0xc2, 0xca, 0x0c, 0x55, 0xe6, 0xe7, 0x3d, 0xf0, 0x3d, 0x83, 0x2b, 0xea, 0xfe, 0x04, 0x8f, 0xc6, 0x90, 0x89, 0x5b, 0xec, 0xa5, 0xce, 0xad, 0x9d, 0x01, 0xd3, 0x7b, 0x3f, 0xed, 0x57, 0x41, 0xcb, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1020 = { .name = "ecdsa_brainpoolp320r1_sha384_1020", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1020_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1020_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1020_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1021 for ECDSA, tcId is 111 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1021_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1021_msg[] = { 0x36, 0x34, 0x34, 0x35, 0x35, 0x30, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1021_sig[] = { 0x8f, 0x15, 0x02, 0x14, 0x3e, 0xff, 0x37, 0x2f, 0xb9, 0xbd, 0xd9, 0x56, 0xec, 0xe3, 0x5d, 0x23, 0x24, 0x03, 0xfe, 0xd7, 0xf7, 0x7e, 0xb4, 0xf4, 0x55, 0x2d, 0x4f, 0xc8, 0x4e, 0x4a, 0x2e, 0x5d, 0x6c, 0x8c, 0xcf, 0x06, 0xf5, 0xa6, 0xad, 0x61, 0x46, 0x21, 0xc9, 0xfb, 0xc3, 0x74, 0x66, 0xf7, 0xc7, 0x57, 0xf6, 0x6d, 0x17, 0x1d, 0xa8, 0xee, 0x0a, 0x0d, 0xd5, 0xf2, 0x41, 0x13, 0xe2, 0xf5, 0x17, 0xa0, 0x82, 0xb7, 0xab, 0x5d, 0x41, 0x23, 0xc3, 0xee, 0xc9, 0xee, 0xad, 0xf6, 0x99, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1021 = { .name = "ecdsa_brainpoolp320r1_sha384_1021", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1021_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1021_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1021_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1022 for ECDSA, tcId is 112 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1022_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1022_msg[] = { 0x35, 0x33, 0x32, 0x38, 0x31, 0x38, 0x33, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1022_sig[] = { 0x8d, 0xcd, 0xcc, 0x74, 0xa2, 0x5f, 0xcd, 0x92, 0xe4, 0x37, 0x2e, 0x11, 0x36, 0x4a, 0x36, 0x1c, 0x7a, 0x2d, 0x7f, 0x3d, 0xd7, 0x4c, 0x5d, 0x6b, 0xc3, 0x76, 0x1c, 0x07, 0xfe, 0x78, 0xf0, 0x84, 0x76, 0x5d, 0xe8, 0xce, 0x70, 0xe4, 0x48, 0xfa, 0xb3, 0xcf, 0xdb, 0x35, 0xc2, 0x0b, 0x1e, 0x30, 0xd3, 0xc2, 0x16, 0xdc, 0xef, 0x3c, 0x73, 0xcd, 0x44, 0xef, 0x19, 0x73, 0xc8, 0x69, 0x5c, 0x8a, 0xb4, 0x39, 0xf7, 0xe2, 0x66, 0x28, 0x57, 0x4e, 0x0f, 0x34, 0x9d, 0x81, 0xc5, 0x98, 0xd1, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1022 = { .name = "ecdsa_brainpoolp320r1_sha384_1022", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1022_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1022_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1022_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1023 for ECDSA, tcId is 113 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1023_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1023_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x30, 0x37, 0x36, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1023_sig[] = { 0xbc, 0x2a, 0x5b, 0x09, 0x8f, 0x72, 0x48, 0x30, 0xa1, 0x90, 0x48, 0x0f, 0xff, 0x5f, 0xaf, 0xa0, 0xf2, 0xfe, 0x85, 0xbf, 0x17, 0x17, 0x6a, 0xf8, 0xd4, 0xeb, 0x67, 0x0e, 0x1d, 0x55, 0x53, 0x3f, 0x82, 0x0d, 0x69, 0x0e, 0x76, 0xb3, 0xbc, 0xcd, 0x51, 0x6c, 0x57, 0x64, 0x44, 0xbe, 0x02, 0x50, 0xe3, 0x38, 0x23, 0x30, 0x2a, 0xdb, 0x70, 0x8b, 0x66, 0x22, 0xf1, 0x7e, 0x24, 0x38, 0xf0, 0x18, 0x00, 0xc5, 0x8e, 0xdc, 0xf9, 0x07, 0xe5, 0x05, 0xb4, 0x19, 0xf6, 0xc0, 0xdf, 0xf1, 0x1a, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1023 = { .name = "ecdsa_brainpoolp320r1_sha384_1023", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1023_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1023_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1023_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 113 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1024 for ECDSA, tcId is 114 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1024_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1024_msg[] = { 0x31, 0x35, 0x33, 0x32, 0x38, 0x34, 0x32, 0x32, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1024_sig[] = { 0xb3, 0x20, 0x8e, 0x3c, 0x49, 0xa8, 0xce, 0x5f, 0xb8, 0x9e, 0xff, 0xb2, 0x48, 0x0e, 0x8c, 0xa6, 0xb9, 0xe1, 0x1b, 0x16, 0xa0, 0x49, 0xae, 0xcf, 0x0c, 0xe3, 0x54, 0x50, 0xe1, 0xe5, 0x35, 0x09, 0x90, 0x9b, 0x02, 0xab, 0x33, 0xe6, 0x63, 0xe2, 0x36, 0x2a, 0xff, 0xc0, 0x91, 0xfa, 0x46, 0xd7, 0x1a, 0xe8, 0x4e, 0x27, 0x97, 0x9a, 0xb5, 0x75, 0xc6, 0x0f, 0x11, 0x58, 0x45, 0xfc, 0x52, 0x1e, 0x0a, 0x81, 0x59, 0x1a, 0xb2, 0x33, 0xbd, 0x32, 0xe6, 0xab, 0x0e, 0x8b, 0x08, 0x80, 0x98, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1024 = { .name = "ecdsa_brainpoolp320r1_sha384_1024", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1024_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1024_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1024_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 114 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1025 for ECDSA, tcId is 115 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1025_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1025_msg[] = { 0x31, 0x35, 0x36, 0x37, 0x31, 0x37, 0x37, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1025_sig[] = { 0x91, 0xcd, 0x13, 0x3d, 0x74, 0xc7, 0x01, 0xc9, 0x36, 0x75, 0x80, 0x54, 0x75, 0x35, 0x91, 0xd3, 0x1f, 0x1d, 0x85, 0x42, 0x13, 0xb4, 0x06, 0x7e, 0x03, 0x38, 0x80, 0x11, 0x6d, 0x46, 0x53, 0xcf, 0x25, 0x70, 0x15, 0x44, 0x5c, 0x55, 0x63, 0xea, 0x43, 0x18, 0x5b, 0x31, 0xdb, 0xee, 0x46, 0xdb, 0xb6, 0x2d, 0x1c, 0xda, 0xad, 0xf4, 0x79, 0xaa, 0x4f, 0x4b, 0x0b, 0x32, 0xdb, 0xc4, 0x9e, 0xf5, 0xcc, 0xad, 0x43, 0xc9, 0xf0, 0xfc, 0xd9, 0x4f, 0x06, 0xbd, 0xf6, 0x31, 0x5e, 0x67, 0xc7, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1025 = { .name = "ecdsa_brainpoolp320r1_sha384_1025", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1025_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1025_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1025_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 115 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1026 for ECDSA, tcId is 116 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1026_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1026_msg[] = { 0x34, 0x33, 0x30, 0x33, 0x30, 0x39, 0x31, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1026_sig[] = { 0xc6, 0x3a, 0xc9, 0xad, 0xa6, 0xe0, 0xa0, 0x0d, 0xbd, 0xc1, 0x71, 0xf4, 0xce, 0xd1, 0xc1, 0x62, 0x94, 0x88, 0x1c, 0xd7, 0xb8, 0xcc, 0x91, 0xe6, 0x7d, 0x0f, 0x97, 0xf5, 0xa6, 0x19, 0x09, 0xac, 0x6a, 0x69, 0x4a, 0xb0, 0xb0, 0xd3, 0x7a, 0x6c, 0xb3, 0x3d, 0x68, 0x76, 0xf4, 0x46, 0x4e, 0x7a, 0xd8, 0xe2, 0x7a, 0x19, 0x5f, 0x63, 0xb4, 0x9f, 0xad, 0x3b, 0xe8, 0xf4, 0x68, 0x4f, 0x4c, 0x3d, 0x42, 0xf5, 0x89, 0x13, 0x94, 0x4a, 0xbc, 0x60, 0x17, 0x3e, 0x51, 0x13, 0x58, 0x1d, 0x94, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1026 = { .name = "ecdsa_brainpoolp320r1_sha384_1026", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1026_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1026_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1026_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 116 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1027 for ECDSA, tcId is 117 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1027_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1027_msg[] = { 0x37, 0x37, 0x33, 0x35, 0x39, 0x31, 0x35, 0x35, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1027_sig[] = { 0x48, 0x9d, 0xb4, 0x6f, 0x6a, 0xb8, 0x76, 0x24, 0xa3, 0x32, 0x37, 0x67, 0x35, 0xaa, 0xf8, 0xe6, 0xc4, 0xc4, 0x3a, 0xff, 0xdb, 0x9b, 0x93, 0xc7, 0x86, 0x82, 0xd3, 0xf9, 0x0c, 0x1e, 0x01, 0xca, 0xad, 0xbc, 0xac, 0x4c, 0x97, 0x5a, 0x22, 0x13, 0x8e, 0x10, 0xc6, 0x41, 0x16, 0xc4, 0x04, 0x2b, 0x71, 0xbd, 0x98, 0x72, 0xc0, 0x50, 0x6a, 0x7b, 0x34, 0xb6, 0xff, 0xfa, 0x9c, 0x3e, 0x24, 0xf8, 0x43, 0xce, 0x18, 0x27, 0x0e, 0x3f, 0x16, 0x36, 0x59, 0xdd, 0xc4, 0xa2, 0x46, 0x0a, 0x43, 0x82, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1027 = { .name = "ecdsa_brainpoolp320r1_sha384_1027", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1027_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1027_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1027_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 117 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1028 for ECDSA, tcId is 118 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1028_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1028_msg[] = { 0x32, 0x34, 0x33, 0x39, 0x36, 0x36, 0x37, 0x34, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1028_sig[] = { 0x09, 0xf7, 0xe1, 0x03, 0x55, 0x03, 0x37, 0xe3, 0x6e, 0xa0, 0x9f, 0x9a, 0xb3, 0xb8, 0x35, 0x80, 0xdd, 0xc6, 0x25, 0x9f, 0xb9, 0xda, 0xf3, 0x8b, 0x42, 0x41, 0x75, 0xd6, 0x41, 0x34, 0xd1, 0x4c, 0xae, 0x31, 0x12, 0xbd, 0xdd, 0x7b, 0x21, 0xaf, 0x25, 0x37, 0x19, 0xf8, 0xce, 0x11, 0x61, 0x95, 0x98, 0x41, 0xb0, 0x6a, 0xe3, 0x1d, 0xc9, 0xd8, 0x4c, 0xf0, 0xdf, 0x90, 0xdf, 0xfc, 0x10, 0x1f, 0x04, 0x42, 0xc8, 0xe9, 0x8c, 0x04, 0x0e, 0x4d, 0x53, 0xf8, 0xec, 0xd7, 0x09, 0xb6, 0x20, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1028 = { .name = "ecdsa_brainpoolp320r1_sha384_1028", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1028_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1028_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1028_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 118 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1029 for ECDSA, tcId is 119 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1029_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1029_msg[] = { 0x34, 0x33, 0x32, 0x37, 0x36, 0x30, 0x32, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1029_sig[] = { 0x41, 0x31, 0x07, 0x39, 0xde, 0x7f, 0x1e, 0x06, 0x16, 0x9f, 0x37, 0x5d, 0x73, 0xe0, 0x65, 0x50, 0xa5, 0x08, 0x50, 0xbe, 0x6a, 0xef, 0x43, 0x2e, 0xf2, 0x14, 0x3d, 0x7a, 0xdd, 0xfa, 0xf2, 0x18, 0xf6, 0x88, 0x36, 0x37, 0x59, 0x21, 0x00, 0x6e, 0x43, 0xc4, 0x59, 0x4e, 0x62, 0x5f, 0x7a, 0xaa, 0x75, 0x7e, 0xea, 0x84, 0x74, 0x51, 0xd0, 0x15, 0x5b, 0xd6, 0xb8, 0x20, 0x88, 0x33, 0x06, 0xb9, 0x21, 0x18, 0x4e, 0xc8, 0x14, 0x1c, 0xa2, 0xb8, 0xc2, 0x3b, 0x1d, 0xd6, 0x4b, 0x98, 0x0f, 0x97, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1029 = { .name = "ecdsa_brainpoolp320r1_sha384_1029", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1029_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1029_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1029_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 119 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1030 for ECDSA, tcId is 120 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1030_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1030_msg[] = { 0x32, 0x39, 0x33, 0x32, 0x30, 0x30, 0x32, 0x35, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1030_sig[] = { 0xcf, 0x06, 0x72, 0xd1, 0x8f, 0x93, 0xbd, 0x9c, 0x8c, 0x1c, 0x5e, 0x17, 0xd9, 0x0a, 0x91, 0x8c, 0x5c, 0xc8, 0xfd, 0xb9, 0x67, 0xf9, 0xd2, 0xad, 0x72, 0x7d, 0xd7, 0x2e, 0xc9, 0x92, 0x11, 0x67, 0x41, 0xb1, 0x75, 0xd3, 0x53, 0x93, 0x88, 0x5d, 0x02, 0x9e, 0x74, 0x7e, 0xa2, 0xc1, 0xd6, 0x6f, 0x1b, 0x4c, 0x5b, 0xe4, 0x92, 0xbd, 0x3b, 0x0c, 0xe0, 0x1e, 0x84, 0x20, 0xa6, 0x26, 0xa8, 0xa8, 0xe1, 0x25, 0xc3, 0xb5, 0x8c, 0x61, 0x4c, 0xab, 0x12, 0xe6, 0xed, 0xbf, 0xc1, 0x3f, 0x8a, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1030 = { .name = "ecdsa_brainpoolp320r1_sha384_1030", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1030_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1030_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1030_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 120 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1031 for ECDSA, tcId is 121 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1031_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1031_msg[] = { 0x36, 0x34, 0x30, 0x39, 0x38, 0x37, 0x37, 0x32, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1031_sig[] = { 0x2a, 0x24, 0x7a, 0x37, 0xc4, 0x89, 0x97, 0x4e, 0xd8, 0x94, 0x6e, 0x5e, 0x8b, 0xd5, 0xa9, 0xd2, 0x98, 0xd7, 0xaf, 0xcc, 0x41, 0x6b, 0x5e, 0xfc, 0x3a, 0x9c, 0x69, 0xba, 0x61, 0xd6, 0x53, 0x8a, 0xd5, 0x29, 0x47, 0x75, 0xd1, 0xc2, 0xa4, 0x79, 0x48, 0xf5, 0x71, 0x6a, 0xb8, 0xb4, 0x09, 0xf2, 0x84, 0x35, 0x10, 0x51, 0xdc, 0xd2, 0x22, 0xcc, 0x5e, 0xc4, 0xf1, 0xb8, 0xc7, 0x17, 0x08, 0xb1, 0xe8, 0x5e, 0xd4, 0xdb, 0x1e, 0xce, 0xc7, 0x38, 0x88, 0xbd, 0x8f, 0x78, 0xc1, 0xe7, 0x4d, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1031 = { .name = "ecdsa_brainpoolp320r1_sha384_1031", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1031_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1031_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1031_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 121 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1032 for ECDSA, tcId is 122 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1032_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1032_msg[] = { 0x36, 0x30, 0x37, 0x35, 0x36, 0x39, 0x30, 0x34, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1032_sig[] = { 0x7a, 0x2d, 0x71, 0xce, 0x07, 0x4e, 0xaa, 0xa4, 0xdf, 0xf6, 0xd1, 0x04, 0xfb, 0x6e, 0x7b, 0x07, 0x0c, 0xb0, 0x9c, 0x23, 0x5d, 0xeb, 0x69, 0x7f, 0x53, 0x34, 0x91, 0x8e, 0x18, 0x1c, 0xe9, 0xbb, 0xe5, 0x47, 0xb7, 0x9a, 0xb3, 0x79, 0x69, 0xf1, 0x6d, 0xc1, 0x4d, 0x2b, 0xfa, 0x01, 0xe0, 0xcb, 0x36, 0x87, 0x8d, 0x1a, 0xef, 0x21, 0x6d, 0xf9, 0x92, 0xb5, 0xc3, 0xf0, 0x58, 0xfa, 0xb8, 0xce, 0x92, 0x22, 0x49, 0xb5, 0x9c, 0xb7, 0x25, 0x56, 0x36, 0x41, 0x38, 0x38, 0x95, 0x61, 0xaf, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1032 = { .name = "ecdsa_brainpoolp320r1_sha384_1032", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1032_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1032_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1032_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 122 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1033 for ECDSA, tcId is 123 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1033_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1033_msg[] = { 0x32, 0x33, 0x32, 0x31, 0x36, 0x32, 0x33, 0x31, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1033_sig[] = { 0x85, 0x1f, 0x1d, 0x14, 0x83, 0x71, 0x9c, 0xd1, 0x83, 0x94, 0x0c, 0xf4, 0xe9, 0xeb, 0x30, 0xea, 0xdd, 0xe6, 0x99, 0xd8, 0xba, 0x80, 0x90, 0xe2, 0x16, 0x12, 0x3f, 0xf6, 0x1e, 0x41, 0xd1, 0x66, 0x50, 0x5a, 0x59, 0x1a, 0x75, 0xda, 0xc6, 0xce, 0x29, 0x2a, 0x45, 0xf3, 0x1e, 0xf3, 0x4b, 0xf3, 0x4c, 0x3c, 0xcf, 0xd4, 0xa2, 0x2a, 0xdc, 0x4c, 0xc1, 0x9c, 0x41, 0x61, 0x51, 0xf7, 0x0e, 0x95, 0xad, 0x19, 0x99, 0x9f, 0x9c, 0x59, 0x68, 0x5e, 0x5f, 0xd9, 0x07, 0x9a, 0x27, 0xb8, 0x6f, 0xce, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1033 = { .name = "ecdsa_brainpoolp320r1_sha384_1033", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1033_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1033_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1033_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 123 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1034 for ECDSA, tcId is 124 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1034_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1034_msg[] = { 0x36, 0x34, 0x31, 0x30, 0x31, 0x35, 0x32, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1034_sig[] = { 0x06, 0x1d, 0xf3, 0x26, 0xb4, 0x3a, 0xd7, 0xaa, 0x7b, 0xc4, 0xaf, 0x8f, 0x3a, 0x58, 0x30, 0xbb, 0x0e, 0x63, 0x29, 0x7c, 0xf6, 0x90, 0xec, 0x60, 0xa7, 0x25, 0x9a, 0x94, 0x2d, 0xce, 0x63, 0x1e, 0x66, 0x76, 0x74, 0x2a, 0xd1, 0x28, 0x30, 0xcf, 0x0e, 0x88, 0x67, 0x52, 0x28, 0xb7, 0xfa, 0x47, 0x43, 0xab, 0x53, 0xd2, 0x48, 0x65, 0x19, 0x37, 0x42, 0xcd, 0x6c, 0x5d, 0xb2, 0x18, 0xdd, 0xe0, 0x04, 0x4b, 0x30, 0x16, 0x54, 0xbb, 0xab, 0x63, 0x9a, 0xbc, 0x77, 0x5a, 0xae, 0x69, 0x06, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1034 = { .name = "ecdsa_brainpoolp320r1_sha384_1034", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1034_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1034_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1034_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 124 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1035 for ECDSA, tcId is 125 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1035_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1035_msg[] = { 0x38, 0x33, 0x37, 0x32, 0x38, 0x35, 0x37, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1035_sig[] = { 0x56, 0x0e, 0x6e, 0x54, 0x14, 0x41, 0x4d, 0xbb, 0xd6, 0xe9, 0xd4, 0x05, 0x22, 0xc9, 0xf3, 0xfc, 0xe6, 0x65, 0xc4, 0x45, 0x5e, 0xae, 0x07, 0xea, 0xfa, 0x37, 0x24, 0xd7, 0x08, 0x68, 0x93, 0x15, 0xf6, 0xc7, 0x51, 0x5c, 0xfe, 0x1a, 0xed, 0xbf, 0xa3, 0xe6, 0x19, 0xbf, 0x5f, 0x9d, 0x77, 0x6a, 0x59, 0x1f, 0xf7, 0x4a, 0x92, 0x52, 0xe4, 0x3b, 0xd0, 0x4a, 0xe1, 0xf1, 0xc3, 0x4f, 0xe5, 0xb8, 0x4f, 0x04, 0xc3, 0xd9, 0xc9, 0x72, 0xa8, 0x0e, 0x18, 0x78, 0x88, 0xba, 0xde, 0x5a, 0xa9, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1035 = { .name = "ecdsa_brainpoolp320r1_sha384_1035", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1035_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1035_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1035_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 125 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1036 for ECDSA, tcId is 126 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1036_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1036_msg[] = { 0x33, 0x33, 0x32, 0x34, 0x37, 0x30, 0x34, 0x35, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1036_sig[] = { 0x34, 0xf9, 0xde, 0xf6, 0xf2, 0x1f, 0x53, 0x28, 0xd1, 0xc5, 0xe3, 0x49, 0x85, 0x7f, 0x3a, 0x70, 0x08, 0xf0, 0xaf, 0xa5, 0xbb, 0xcb, 0x89, 0x6f, 0xf6, 0x24, 0x7b, 0x21, 0xa4, 0xab, 0xac, 0x7a, 0xed, 0xad, 0xa6, 0x4f, 0xa2, 0x3f, 0x95, 0x6e, 0xcb, 0x44, 0xdb, 0xc5, 0x3b, 0x0b, 0x0b, 0x43, 0xd6, 0xb1, 0x58, 0xd9, 0x02, 0x47, 0x20, 0x9c, 0x2c, 0x74, 0x15, 0x2c, 0x4e, 0x19, 0xa1, 0xc7, 0x03, 0x57, 0x7c, 0xf4, 0x07, 0xad, 0xa1, 0x4b, 0x19, 0x8b, 0xde, 0x1b, 0xa7, 0x9a, 0x34, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1036 = { .name = "ecdsa_brainpoolp320r1_sha384_1036", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1036_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1036_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1036_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 126 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1037 for ECDSA, tcId is 127 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1037_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1037_msg[] = { 0x31, 0x34, 0x30, 0x33, 0x39, 0x36, 0x36, 0x38, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1037_sig[] = { 0x97, 0x21, 0xd7, 0x99, 0x1f, 0x29, 0x68, 0xc2, 0x38, 0x56, 0xa0, 0x75, 0xe8, 0x6b, 0x70, 0xa3, 0x9f, 0x4a, 0xa3, 0x0f, 0xd6, 0x87, 0x77, 0xdb, 0xbf, 0x46, 0xc1, 0xd3, 0x7c, 0xc3, 0xbe, 0x44, 0x97, 0xcb, 0x47, 0x14, 0xb2, 0xf1, 0x65, 0x6a, 0x0a, 0xa3, 0x4e, 0x85, 0x81, 0x75, 0xfe, 0xf3, 0xc0, 0x73, 0x4c, 0x5c, 0x7c, 0x4c, 0xcd, 0x04, 0x59, 0x92, 0x7b, 0x0f, 0x72, 0x2e, 0x86, 0xaf, 0x6c, 0x40, 0x45, 0x75, 0x2b, 0x4b, 0xa1, 0x54, 0xe7, 0x25, 0x94, 0x63, 0x19, 0xdc, 0x42, 0x74, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1037 = { .name = "ecdsa_brainpoolp320r1_sha384_1037", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1037_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1037_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1037_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 127 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1038 for ECDSA, tcId is 128 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1038_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1038_msg[] = { 0x31, 0x32, 0x32, 0x37, 0x36, 0x30, 0x35, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1038_sig[] = { 0xae, 0xc9, 0x21, 0x08, 0x75, 0x1a, 0xfc, 0x4a, 0x0c, 0x62, 0xa9, 0xda, 0x21, 0x63, 0xbb, 0x52, 0xbd, 0xab, 0xb9, 0xe7, 0xa8, 0xb5, 0x66, 0xca, 0x8d, 0x30, 0xfa, 0xc3, 0x89, 0xc6, 0x8a, 0x38, 0x17, 0xd2, 0x1a, 0x33, 0xdf, 0x2f, 0x68, 0xda, 0xbe, 0xfb, 0xac, 0xfb, 0x03, 0x95, 0x7c, 0x93, 0x78, 0x90, 0x3c, 0xf9, 0xb4, 0x32, 0x09, 0x3f, 0x78, 0x95, 0x4e, 0x52, 0x24, 0x30, 0x36, 0x11, 0xe9, 0xe9, 0x6c, 0x92, 0xa7, 0x67, 0x04, 0xe3, 0xa6, 0x43, 0x2a, 0x24, 0x41, 0x3b, 0xd2, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1038 = { .name = "ecdsa_brainpoolp320r1_sha384_1038", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1038_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1038_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1038_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 128 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1039 for ECDSA, tcId is 129 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1039_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1039_msg[] = { 0x34, 0x39, 0x35, 0x31, 0x34, 0x38, 0x38, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1039_sig[] = { 0x6e, 0x85, 0x26, 0x89, 0xb9, 0x04, 0x51, 0xa1, 0x59, 0x2f, 0xad, 0x58, 0x5e, 0xa5, 0x7c, 0x71, 0xeb, 0x5b, 0x44, 0x61, 0x96, 0xc0, 0x7d, 0xcf, 0x45, 0x09, 0x72, 0xad, 0x13, 0xfd, 0xcd, 0x81, 0x17, 0x31, 0x9e, 0xec, 0x75, 0xd0, 0x78, 0x1f, 0x36, 0x08, 0xd1, 0x1f, 0x0b, 0x8e, 0xb7, 0x73, 0xb3, 0x58, 0x78, 0xcc, 0x43, 0xea, 0x95, 0xfb, 0x4d, 0x35, 0x4a, 0xb0, 0xff, 0xec, 0x9f, 0x78, 0x5a, 0x41, 0xa1, 0x7e, 0xbc, 0xf8, 0xf7, 0xd9, 0x57, 0xf7, 0x93, 0x47, 0x9a, 0xe8, 0x99, 0x99, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1039 = { .name = "ecdsa_brainpoolp320r1_sha384_1039", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1039_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1039_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1039_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 129 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1040 for ECDSA, tcId is 130 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1040_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1040_msg[] = { 0x32, 0x34, 0x35, 0x32, 0x31, 0x32, 0x37, 0x30, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1040_sig[] = { 0xa3, 0x4e, 0xbb, 0x41, 0x33, 0x6c, 0x25, 0x2a, 0x05, 0x60, 0x97, 0x98, 0x3d, 0x56, 0xde, 0xdd, 0x1e, 0xda, 0x04, 0x2c, 0x73, 0x78, 0xb8, 0xb5, 0x6d, 0x90, 0x5a, 0xa9, 0xbe, 0x1d, 0x7f, 0x6a, 0xfb, 0x60, 0x54, 0x66, 0xc0, 0x02, 0x6c, 0x44, 0x41, 0x4c, 0x12, 0xe2, 0xa9, 0x7f, 0x8e, 0x42, 0x7e, 0xe9, 0xbd, 0x95, 0xe1, 0x5b, 0xd5, 0xc1, 0x0c, 0x16, 0xc1, 0xee, 0xa6, 0x01, 0x1f, 0x01, 0xf2, 0x71, 0xfe, 0x75, 0x86, 0x9a, 0x60, 0x00, 0xfb, 0xfb, 0xc2, 0x5a, 0x6d, 0x1f, 0x85, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1040 = { .name = "ecdsa_brainpoolp320r1_sha384_1040", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1040_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1040_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1040_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 130 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1041 for ECDSA, tcId is 131 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1041_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1041_msg[] = { 0x31, 0x37, 0x33, 0x31, 0x35, 0x35, 0x30, 0x37, 0x30, 0x36, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1041_sig[] = { 0x1c, 0xf2, 0x7f, 0xa9, 0x6f, 0x13, 0x7e, 0x0f, 0xbc, 0xe4, 0xda, 0x47, 0x6b, 0xdb, 0x5c, 0x3b, 0x87, 0x5b, 0x7f, 0xb4, 0x55, 0xfc, 0xfe, 0x7e, 0xfd, 0x86, 0x3c, 0xb8, 0xed, 0x61, 0x09, 0x0f, 0x6c, 0xf6, 0xa2, 0xb9, 0x27, 0xfa, 0xbb, 0xdb, 0x94, 0x5b, 0xc7, 0xe4, 0xf3, 0x19, 0x00, 0x4b, 0x2e, 0xf4, 0xce, 0x2f, 0xa2, 0xef, 0x27, 0x0c, 0x4a, 0xbc, 0x36, 0x0e, 0x21, 0xd8, 0xf8, 0xb2, 0x10, 0x74, 0x08, 0x0e, 0xe8, 0xa3, 0x42, 0x21, 0x37, 0xc9, 0x6f, 0x82, 0xe2, 0x6c, 0xfa, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1041 = { .name = "ecdsa_brainpoolp320r1_sha384_1041", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1041_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1041_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1041_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 131 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1042 for ECDSA, tcId is 132 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1042_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1042_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x30, 0x36, 0x39, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1042_sig[] = { 0xcd, 0xb4, 0xf0, 0xb7, 0xf7, 0xde, 0x92, 0xec, 0x59, 0xa2, 0xe0, 0xa1, 0x90, 0x03, 0x18, 0xbd, 0xd6, 0x49, 0x15, 0x5b, 0xcd, 0x3e, 0x09, 0x14, 0x13, 0x6a, 0x7c, 0x46, 0xc5, 0xe4, 0xbf, 0xd8, 0x42, 0x31, 0xc0, 0x4d, 0x64, 0xcc, 0x5c, 0x53, 0x7b, 0x0e, 0xe0, 0xd7, 0xb7, 0x77, 0x3c, 0x3b, 0xcd, 0x59, 0x21, 0x23, 0x9f, 0x36, 0xb0, 0x93, 0xbd, 0x23, 0x28, 0x59, 0xd6, 0x85, 0x92, 0x0e, 0xaf, 0xf5, 0x3a, 0x91, 0xff, 0x71, 0x88, 0x34, 0x4a, 0x30, 0x75, 0xfe, 0x7f, 0x34, 0x2c, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1042 = { .name = "ecdsa_brainpoolp320r1_sha384_1042", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1042_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1042_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1042_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 132 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1043 for ECDSA, tcId is 133 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1043_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1043_msg[] = { 0x34, 0x34, 0x31, 0x35, 0x34, 0x37, 0x36, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1043_sig[] = { 0xaa, 0x8e, 0xf3, 0x3f, 0x59, 0x50, 0x8e, 0xa9, 0x61, 0x7a, 0x41, 0x08, 0x4a, 0x35, 0x32, 0xe1, 0x17, 0x9d, 0x0f, 0x57, 0x55, 0xe0, 0x82, 0x77, 0xa5, 0x68, 0x19, 0x22, 0x72, 0xce, 0xc6, 0x3f, 0x91, 0x03, 0x77, 0xa8, 0x71, 0x02, 0x1c, 0x7e, 0x70, 0x87, 0x51, 0xc6, 0x28, 0x4f, 0x7c, 0x3c, 0xfc, 0x57, 0xa5, 0x98, 0xc1, 0x19, 0x9c, 0x1c, 0xfc, 0xb3, 0xd2, 0x6e, 0x45, 0x46, 0x48, 0x4d, 0xe5, 0x52, 0x28, 0xc2, 0x92, 0xbc, 0xa9, 0x78, 0xea, 0x76, 0x98, 0xd3, 0xf7, 0xd8, 0x06, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1043 = { .name = "ecdsa_brainpoolp320r1_sha384_1043", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1043_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1043_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1043_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 133 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1044 for ECDSA, tcId is 134 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1044_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1044_msg[] = { 0x34, 0x32, 0x33, 0x39, 0x34, 0x34, 0x39, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1044_sig[] = { 0x7d, 0x57, 0xfe, 0x00, 0x6a, 0x05, 0x63, 0xd5, 0x57, 0x0a, 0xcb, 0xca, 0xbd, 0xf9, 0x4e, 0xd5, 0x15, 0x02, 0x9f, 0x52, 0xe0, 0x22, 0x98, 0xc7, 0x9c, 0x98, 0x91, 0x18, 0x1b, 0xd8, 0xb4, 0x97, 0x4d, 0xde, 0x57, 0x65, 0x43, 0x3d, 0x89, 0xcb, 0x3b, 0xe8, 0x3d, 0x7d, 0xc7, 0xa5, 0xdc, 0x1a, 0x15, 0x1f, 0x2b, 0x09, 0x57, 0xf6, 0x78, 0xb9, 0xef, 0xca, 0x3d, 0x08, 0x18, 0xec, 0x35, 0x92, 0x02, 0xd9, 0xa4, 0xcf, 0xe7, 0x92, 0xe9, 0x59, 0x24, 0xbe, 0x9e, 0x36, 0xe2, 0x0e, 0xf9, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1044 = { .name = "ecdsa_brainpoolp320r1_sha384_1044", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1044_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1044_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1044_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 134 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1045 for ECDSA, tcId is 135 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1045_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1045_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x36, 0x32, 0x30, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1045_sig[] = { 0x99, 0x8c, 0x25, 0x1f, 0x0c, 0x1f, 0x96, 0x23, 0x98, 0x0c, 0x1c, 0xff, 0x0e, 0x36, 0x9c, 0x7b, 0x0a, 0x38, 0x3f, 0xc7, 0x40, 0x79, 0x11, 0x31, 0x21, 0xf9, 0x82, 0xbf, 0xe7, 0xb8, 0x7f, 0x17, 0xb4, 0x8e, 0x5c, 0xdd, 0x29, 0xb0, 0xe1, 0xc0, 0xd0, 0xd3, 0x3d, 0x8b, 0xe8, 0xc3, 0x7f, 0xb4, 0x9c, 0x4f, 0x49, 0xce, 0xee, 0x32, 0x11, 0x86, 0xff, 0x30, 0xb9, 0x95, 0x0a, 0x70, 0x6c, 0x6f, 0xdd, 0xd1, 0x05, 0x47, 0x72, 0xaf, 0x3c, 0x32, 0x66, 0xfb, 0x28, 0x66, 0x77, 0x59, 0x2d, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1045 = { .name = "ecdsa_brainpoolp320r1_sha384_1045", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1045_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1045_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1045_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 135 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1046 for ECDSA, tcId is 136 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1046_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1046_msg[] = { 0x32, 0x31, 0x36, 0x34, 0x36, 0x36, 0x36, 0x32, 0x38, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1046_sig[] = { 0x2e, 0x23, 0x84, 0xe2, 0x62, 0x1b, 0x0f, 0x24, 0x8a, 0xd3, 0x49, 0x22, 0xf7, 0x21, 0xf4, 0x34, 0x52, 0x7d, 0x35, 0x4a, 0x7e, 0xf8, 0x76, 0xde, 0xfb, 0x8e, 0x80, 0xf6, 0x86, 0x48, 0x67, 0xae, 0x60, 0xc7, 0x6c, 0xe2, 0x48, 0x96, 0xa4, 0x0f, 0x08, 0xec, 0xea, 0x05, 0x48, 0x00, 0xec, 0x20, 0x1f, 0x0d, 0x1a, 0xc8, 0x93, 0xf3, 0xbd, 0x79, 0xae, 0x48, 0x53, 0x35, 0x29, 0x34, 0x5e, 0x1d, 0x33, 0x10, 0xfd, 0xc7, 0x47, 0xd7, 0x65, 0x97, 0x0f, 0xa5, 0x5e, 0xe0, 0xa4, 0x7b, 0xdc, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1046 = { .name = "ecdsa_brainpoolp320r1_sha384_1046", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1046_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1046_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1046_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 136 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1047 for ECDSA, tcId is 137 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1047_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1047_msg[] = { 0x31, 0x39, 0x34, 0x32, 0x38, 0x35, 0x33, 0x38, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1047_sig[] = { 0xd2, 0x90, 0xcf, 0x0f, 0x9f, 0xbd, 0x69, 0x17, 0x43, 0xb9, 0xdc, 0xdc, 0x00, 0xc0, 0x81, 0x6f, 0xb9, 0x9b, 0x5a, 0xd3, 0xb8, 0x9a, 0x23, 0xf1, 0x31, 0x3e, 0x0b, 0xf0, 0x0c, 0xb3, 0xe1, 0x2c, 0x95, 0x64, 0x8d, 0xce, 0x17, 0x5e, 0x34, 0x47, 0x58, 0x77, 0x07, 0xdb, 0x7e, 0x9d, 0xdf, 0x61, 0x3f, 0xf7, 0xd9, 0x79, 0xba, 0x9c, 0xa4, 0x11, 0xb4, 0xbb, 0x78, 0x26, 0x86, 0x2a, 0x38, 0x0c, 0xe7, 0xce, 0xbe, 0xcd, 0x52, 0xf5, 0x2f, 0xf8, 0x85, 0xf8, 0xad, 0x53, 0x6f, 0xbf, 0x11, 0x23, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1047 = { .name = "ecdsa_brainpoolp320r1_sha384_1047", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1047_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1047_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1047_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 137 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1048 for ECDSA, tcId is 138 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1048_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1048_msg[] = { 0x32, 0x32, 0x31, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1048_sig[] = { 0x34, 0xb2, 0x52, 0x60, 0x4e, 0xbd, 0x86, 0x75, 0x10, 0x42, 0x66, 0xbe, 0x4d, 0xf8, 0x4b, 0x51, 0x94, 0x26, 0x87, 0xa2, 0x12, 0x95, 0x7d, 0xed, 0xd4, 0xab, 0x6d, 0xff, 0x43, 0x55, 0xa0, 0x02, 0x7b, 0x71, 0x22, 0xae, 0xb1, 0xe9, 0xf4, 0x49, 0x15, 0x08, 0x2c, 0x57, 0x64, 0xdf, 0x74, 0x2c, 0x40, 0x19, 0x3a, 0x8b, 0xf1, 0xe3, 0x8d, 0x43, 0xa5, 0xfa, 0x4c, 0x77, 0x41, 0x6c, 0xd8, 0x75, 0x30, 0x57, 0x52, 0x1c, 0x76, 0x50, 0x62, 0xc6, 0x76, 0xf9, 0x9b, 0xe6, 0x59, 0xfc, 0xd0, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1048 = { .name = "ecdsa_brainpoolp320r1_sha384_1048", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1048_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1048_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1048_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 138 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1049 for ECDSA, tcId is 139 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1049_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1049_msg[] = { 0x39, 0x32, 0x36, 0x39, 0x33, 0x33, 0x34, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1049_sig[] = { 0xb4, 0x5b, 0xaf, 0x5e, 0xe1, 0x88, 0xce, 0xf5, 0x41, 0x3e, 0xf3, 0xe6, 0xf0, 0xd9, 0x17, 0xa9, 0x0c, 0xf2, 0x63, 0xd2, 0xbe, 0x0a, 0x70, 0x39, 0xa6, 0x06, 0x4e, 0x6e, 0x40, 0x53, 0xb6, 0xc9, 0x60, 0xf4, 0x4d, 0xe1, 0x59, 0x32, 0x85, 0x5a, 0x47, 0x60, 0x2d, 0xef, 0xee, 0x00, 0xb2, 0xfd, 0xea, 0x09, 0x53, 0x46, 0xde, 0xae, 0x00, 0xb4, 0x60, 0x69, 0xc9, 0x5c, 0x09, 0xe4, 0x35, 0x94, 0x88, 0x9b, 0x8d, 0x3a, 0xa3, 0xd7, 0x53, 0x50, 0x37, 0x7a, 0xa3, 0x43, 0x1e, 0xf6, 0x3c, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1049 = { .name = "ecdsa_brainpoolp320r1_sha384_1049", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1049_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1049_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1049_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 139 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1050 for ECDSA, tcId is 140 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1050_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1050_msg[] = { 0x37, 0x36, 0x39, 0x33, 0x38, 0x36, 0x33, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1050_sig[] = { 0x6d, 0x82, 0x67, 0x06, 0x5d, 0x60, 0xdc, 0xd3, 0x75, 0xce, 0x04, 0x18, 0x13, 0xd6, 0x08, 0x5f, 0xa9, 0x02, 0x46, 0xcd, 0xdb, 0xba, 0xba, 0x12, 0x64, 0x3c, 0x73, 0x6c, 0xc9, 0xb7, 0xe6, 0xd6, 0x19, 0x17, 0x8f, 0x12, 0xc6, 0xfd, 0x2d, 0x3a, 0x9b, 0x72, 0x61, 0x1a, 0x5b, 0x4f, 0x87, 0x63, 0xe3, 0x0c, 0x11, 0xaa, 0x79, 0x1e, 0xff, 0x6b, 0x74, 0xc3, 0x4d, 0x05, 0xe6, 0x54, 0x51, 0x73, 0x6e, 0x2a, 0x2b, 0x72, 0x8f, 0x2e, 0x5e, 0xf4, 0x85, 0xdc, 0x4e, 0x2e, 0x5c, 0x3d, 0xaa, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1050 = { .name = "ecdsa_brainpoolp320r1_sha384_1050", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1050_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1050_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1050_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 140 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1051 for ECDSA, tcId is 141 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1051_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1051_msg[] = { 0x32, 0x37, 0x33, 0x35, 0x39, 0x33, 0x30, 0x35, 0x37, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1051_sig[] = { 0xa1, 0xa3, 0x02, 0xaa, 0x27, 0xa3, 0x2c, 0xd2, 0x5c, 0x33, 0x6c, 0x9e, 0xd7, 0xad, 0xaf, 0x5c, 0xaf, 0x33, 0xdc, 0x34, 0x85, 0xa8, 0x13, 0x71, 0x8f, 0xce, 0x39, 0x5e, 0xc0, 0xc9, 0x3e, 0xef, 0x4c, 0xb3, 0x4a, 0x65, 0x18, 0xa6, 0x1c, 0xc8, 0x25, 0x8a, 0xcd, 0x1b, 0x45, 0x00, 0x82, 0xfd, 0xdc, 0x05, 0x43, 0x3e, 0x2d, 0xd6, 0x6b, 0x03, 0x21, 0x11, 0x43, 0x95, 0xa3, 0x3b, 0xd9, 0x82, 0x7d, 0x4c, 0x44, 0xd4, 0x86, 0xc8, 0x2c, 0x2d, 0x22, 0x98, 0x69, 0xf3, 0x76, 0x20, 0x12, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1051 = { .name = "ecdsa_brainpoolp320r1_sha384_1051", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1051_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1051_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1051_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 141 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1052 for ECDSA, tcId is 142 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1052_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1052_msg[] = { 0x38, 0x33, 0x30, 0x30, 0x35, 0x36, 0x34, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1052_sig[] = { 0x63, 0xfa, 0xd2, 0x85, 0x70, 0xb4, 0x20, 0x35, 0x02, 0xa1, 0xd1, 0x05, 0x90, 0x32, 0x44, 0xdf, 0xe2, 0xb0, 0x95, 0x30, 0xa9, 0x3d, 0x8e, 0xa4, 0x29, 0xa1, 0x97, 0xc7, 0x12, 0x13, 0x37, 0xa9, 0x9d, 0x4c, 0x73, 0x51, 0x6e, 0xc6, 0x61, 0x35, 0x7b, 0x4a, 0x08, 0xb7, 0xcd, 0xea, 0xf6, 0xee, 0xde, 0xec, 0x63, 0x06, 0xa0, 0xc4, 0x10, 0xb0, 0x92, 0x71, 0x8c, 0x25, 0x59, 0x01, 0x90, 0x03, 0x0c, 0x52, 0x55, 0xbf, 0x83, 0x73, 0x93, 0xd8, 0x29, 0x38, 0x90, 0xc8, 0x49, 0x09, 0xf4, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1052 = { .name = "ecdsa_brainpoolp320r1_sha384_1052", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1052_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1052_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1052_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 142 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1053 for ECDSA, tcId is 143 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1053_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1053_msg[] = { 0x34, 0x33, 0x30, 0x37, 0x36, 0x35, 0x35, 0x37, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1053_sig[] = { 0xc1, 0xe6, 0x23, 0x2f, 0x06, 0xa4, 0x4d, 0xe1, 0xd7, 0x21, 0x3b, 0x20, 0xea, 0xa1, 0xb8, 0x9c, 0x31, 0xdd, 0x2f, 0x5b, 0xb0, 0x33, 0x24, 0x5e, 0x81, 0x71, 0x52, 0x4c, 0xc9, 0x11, 0x08, 0x76, 0xd7, 0x78, 0xa0, 0x48, 0x34, 0xac, 0x88, 0xee, 0xcb, 0x4a, 0xa2, 0x0d, 0x15, 0x8c, 0x3b, 0x8d, 0x11, 0x5e, 0xc6, 0x2b, 0xb5, 0x15, 0x45, 0xbd, 0x58, 0xb6, 0x3f, 0x1f, 0x01, 0x76, 0xad, 0xa0, 0x48, 0x69, 0xdf, 0xee, 0x84, 0x01, 0x97, 0x37, 0xcb, 0x80, 0x72, 0xf7, 0xa8, 0xb9, 0x40, 0xf6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1053 = { .name = "ecdsa_brainpoolp320r1_sha384_1053", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1053_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1053_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1053_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 143 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1054 for ECDSA, tcId is 144 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1054_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1054_msg[] = { 0x39, 0x36, 0x35, 0x37, 0x30, 0x31, 0x38, 0x31, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1054_sig[] = { 0x47, 0xb6, 0xba, 0xa1, 0xa0, 0x53, 0xea, 0xb8, 0xb3, 0x8e, 0xd6, 0xc9, 0x86, 0x2f, 0x2f, 0xfe, 0xd3, 0x81, 0x14, 0x49, 0xe4, 0x9f, 0xf2, 0xe1, 0x8a, 0x58, 0x85, 0x12, 0x12, 0x9d, 0x1d, 0xea, 0x0a, 0x6c, 0x4f, 0xb8, 0x11, 0xdc, 0x5e, 0xb0, 0xa6, 0xcc, 0xee, 0xf5, 0xa1, 0xe1, 0x2f, 0x9b, 0x04, 0x9f, 0x72, 0xf5, 0x37, 0x32, 0xd4, 0x29, 0x03, 0xa7, 0x33, 0xca, 0x6f, 0x3f, 0xae, 0x95, 0x96, 0xe1, 0x7d, 0x9c, 0x75, 0x7e, 0xd4, 0xef, 0x04, 0xfc, 0xc3, 0x73, 0x02, 0xad, 0x1f, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1054 = { .name = "ecdsa_brainpoolp320r1_sha384_1054", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1054_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1054_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1054_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 144 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1055 for ECDSA, tcId is 145 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1055_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1055_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1055_sig[] = { 0x67, 0xbe, 0xa5, 0x34, 0x78, 0x36, 0x4a, 0xd2, 0xcc, 0x40, 0xea, 0xb4, 0x25, 0x35, 0xa4, 0xbf, 0x8e, 0x41, 0x58, 0x3c, 0x94, 0x1c, 0xb0, 0x4e, 0xf3, 0x7f, 0x11, 0xf0, 0x35, 0x65, 0x4c, 0x33, 0x1d, 0x3b, 0xb0, 0xdd, 0xfd, 0x74, 0x03, 0x1d, 0x76, 0xa9, 0xeb, 0xa4, 0x37, 0x13, 0xed, 0x88, 0x92, 0xa6, 0x27, 0xed, 0x3b, 0xcb, 0xf7, 0xd8, 0x7f, 0x79, 0x91, 0xd1, 0x28, 0x58, 0x0a, 0x05, 0x7c, 0x1b, 0x63, 0x88, 0xb6, 0x04, 0x95, 0x4d, 0x34, 0x0e, 0x92, 0xf4, 0x18, 0x27, 0x67, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1055 = { .name = "ecdsa_brainpoolp320r1_sha384_1055", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1055_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1055_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1055_sig, .siglen = 80, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 145 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1056 for ECDSA, tcId is 146 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1056_pubkey[] = { 0xb2, 0x1e, 0xcd, 0x48, 0xcc, 0x46, 0xfb, 0x30, 0x6e, 0xd5, 0x4e, 0x88, 0xad, 0xb6, 0x15, 0x20, 0x84, 0x57, 0xbd, 0x25, 0x7e, 0x7e, 0x9d, 0x81, 0xdb, 0x5b, 0xd1, 0xf5, 0x61, 0x00, 0xa7, 0xae, 0xbb, 0x13, 0x86, 0x46, 0x55, 0x07, 0xbb, 0xf3, 0x86, 0x22, 0x4c, 0xb3, 0x83, 0x81, 0x5e, 0x1b, 0xab, 0xe5, 0x61, 0xdc, 0xb6, 0xf4, 0x9a, 0xf0, 0x07, 0x3e, 0x1b, 0xfd, 0xa3, 0x66, 0x06, 0x6e, 0xf6, 0x24, 0x40, 0xfc, 0x81, 0xde, 0xc7, 0xec, 0xa0, 0x21, 0xcb, 0x0c, 0x05, 0x09, 0x1d, 0xfb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1056_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1056_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x40, 0x64, 0xfb, 0x4c, 0x22, 0x4a, 0x8b, 0x24, 0x8a, 0x0d, 0x93, 0x3f, 0x76, 0x42, 0xbd, 0x56, 0xac, 0xed, 0x9b, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1056 = { .name = "ecdsa_brainpoolp320r1_sha384_1056", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1056_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1056_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1056_sig, .siglen = 80, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 146 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1057 for ECDSA, tcId is 147 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1057_pubkey[] = { 0xb2, 0x1e, 0xcd, 0x48, 0xcc, 0x46, 0xfb, 0x30, 0x6e, 0xd5, 0x4e, 0x88, 0xad, 0xb6, 0x15, 0x20, 0x84, 0x57, 0xbd, 0x25, 0x7e, 0x7e, 0x9d, 0x81, 0xdb, 0x5b, 0xd1, 0xf5, 0x61, 0x00, 0xa7, 0xae, 0xbb, 0x13, 0x86, 0x46, 0x55, 0x07, 0xbb, 0xf3, 0x86, 0x22, 0x4c, 0xb3, 0x83, 0x81, 0x5e, 0x1b, 0xab, 0xe5, 0x61, 0xdc, 0xb6, 0xf4, 0x9a, 0xf0, 0x07, 0x3e, 0x1b, 0xfd, 0xa3, 0x66, 0x06, 0x6e, 0xf6, 0x24, 0x40, 0xfc, 0x81, 0xde, 0xc7, 0xec, 0xa0, 0x21, 0xcb, 0x0c, 0x05, 0x09, 0x1d, 0xfb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1057_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1057_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x23, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1057 = { .name = "ecdsa_brainpoolp320r1_sha384_1057", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1057_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1057_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1057_sig, .siglen = 80, .result = -1, .comment = "r too large, tcId is 147 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1058 for ECDSA, tcId is 148 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1058_pubkey[] = { 0x9c, 0x97, 0x01, 0xde, 0x2f, 0xfd, 0xb2, 0x96, 0xe6, 0xd5, 0x6a, 0x5f, 0x3c, 0x18, 0x9e, 0xcb, 0xb0, 0xe4, 0x44, 0x8e, 0x38, 0xed, 0x65, 0xda, 0x46, 0xee, 0xaa, 0x51, 0xa7, 0xb3, 0x4e, 0x65, 0x0a, 0x91, 0xda, 0x95, 0xfa, 0xf1, 0x79, 0x00, 0x1e, 0x0a, 0x98, 0xa5, 0x98, 0x52, 0x3a, 0x34, 0xc4, 0x91, 0x8d, 0x41, 0x80, 0xf8, 0x7d, 0x64, 0x1e, 0x46, 0x26, 0xce, 0x11, 0xfa, 0x3a, 0x24, 0x4a, 0xbf, 0xb2, 0x45, 0x07, 0x36, 0x69, 0x3d, 0x38, 0x65, 0x23, 0x09, 0x24, 0x0e, 0xbd, 0xa9, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1058_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1058_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0f, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1058 = { .name = "ecdsa_brainpoolp320r1_sha384_1058", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1058_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1058_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1058_sig, .siglen = 80, .result = 1, .comment = "r,s are large, tcId is 148 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1059 for ECDSA, tcId is 149 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1059_pubkey[] = { 0xb6, 0xf0, 0xdd, 0xc8, 0x34, 0xef, 0x8a, 0x67, 0x90, 0x36, 0x81, 0xea, 0x02, 0xb7, 0x88, 0xfc, 0xff, 0x82, 0xd1, 0x23, 0x07, 0xc8, 0xc3, 0xf4, 0xa4, 0x4b, 0x30, 0xd7, 0xc5, 0xf6, 0x14, 0xda, 0xfc, 0xc9, 0xa8, 0x39, 0x99, 0x1f, 0x8e, 0xe4, 0x27, 0x53, 0x8e, 0x30, 0xae, 0x51, 0x02, 0xb2, 0x04, 0x39, 0x57, 0xdd, 0x61, 0x24, 0xfb, 0xa3, 0xa1, 0xb6, 0x01, 0xc0, 0x4b, 0xdd, 0xaf, 0x6c, 0x92, 0x9f, 0xfd, 0xf2, 0xf7, 0x79, 0x6f, 0xd7, 0x09, 0x8c, 0x38, 0x7d, 0xbc, 0x0b, 0x26, 0xfb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1059_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1059_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8c, 0x07, 0x36, 0x55, 0x4d, 0xbc, 0x44, 0x60, 0x63, 0xe8, 0xe1, 0x5f, 0x29, 0x7f, 0xd4, 0xb6, 0x6f, 0xa8, 0x87, 0x99, 0x45, 0xbb, 0xb5, 0xc2, 0x27, 0x14, 0xa9, 0x64, 0x5f, 0x4f, 0xa4, 0xef, 0x9d, 0x71, 0x0e, 0xaf, 0xa6, 0xb2, 0x26, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1059 = { .name = "ecdsa_brainpoolp320r1_sha384_1059", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1059_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1059_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1059_sig, .siglen = 80, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 149 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1060 for ECDSA, tcId is 150 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1060_pubkey[] = { 0x6d, 0xf4, 0x43, 0x21, 0xd4, 0xa5, 0xf6, 0xaf, 0x63, 0xe0, 0x1b, 0x79, 0xbb, 0x60, 0x8e, 0xa0, 0x4a, 0xc6, 0xf3, 0x5f, 0x79, 0x50, 0x44, 0xa0, 0x4f, 0xf4, 0x00, 0xf5, 0x47, 0xfd, 0x34, 0xd9, 0xb7, 0x8c, 0x12, 0xc4, 0x59, 0x78, 0xf9, 0x6f, 0xb5, 0x29, 0x01, 0xce, 0xce, 0x48, 0xaa, 0xb4, 0x32, 0xc3, 0xdb, 0xdc, 0xbc, 0x0e, 0x27, 0x0b, 0x2c, 0xc9, 0xb9, 0x91, 0x5c, 0xc1, 0xff, 0xb6, 0x9a, 0x36, 0x5d, 0x84, 0xc3, 0x91, 0x86, 0xc4, 0x81, 0x77, 0x38, 0x7a, 0xa9, 0xee, 0x0a, 0x48, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1060_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1060_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x54, 0x07, 0xcd, 0xd5, 0x93, 0xac, 0xb5, 0x01, 0xfc, 0x28, 0x48, 0x35, 0x1f, 0x9d, 0x2e, 0x6b, 0x54, 0x57, 0xd3, 0xde, 0x43, 0xc3, 0x13, 0x0e, 0x3b, 0x74, 0xe6, 0xa9, 0x24, 0x2b, 0x3c, 0xce, 0x1c, 0x24, 0xf0, 0x94, 0xf1, 0x18, 0xbc, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1060 = { .name = "ecdsa_brainpoolp320r1_sha384_1060", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1060_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1060_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1060_sig, .siglen = 80, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 150 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1061 for ECDSA, tcId is 151 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1061_pubkey[] = { 0x4e, 0x49, 0x6f, 0x05, 0x6a, 0xb5, 0xd0, 0x7f, 0x96, 0x56, 0x2c, 0x68, 0x36, 0x43, 0x44, 0x0e, 0x31, 0xfe, 0xa2, 0x6d, 0x35, 0xe6, 0xc5, 0xb6, 0x9e, 0xef, 0xaa, 0x41, 0x07, 0xd3, 0x45, 0xc8, 0x07, 0xbf, 0x27, 0x9f, 0x2e, 0xa2, 0x6b, 0x60, 0x28, 0x85, 0x39, 0x76, 0x6f, 0xc7, 0x26, 0xcb, 0x9e, 0x84, 0x1d, 0xb5, 0xdc, 0xfb, 0xbb, 0x79, 0x2c, 0xad, 0xe3, 0xc1, 0xef, 0x64, 0xb6, 0x9d, 0xcb, 0xda, 0x7f, 0x5e, 0x49, 0x7b, 0x45, 0x5a, 0x91, 0x1c, 0xe2, 0xf0, 0xeb, 0xca, 0xca, 0xad, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1061_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1061_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1061 = { .name = "ecdsa_brainpoolp320r1_sha384_1061", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1061_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1061_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1061_sig, .siglen = 80, .result = 1, .comment = "small r and s, tcId is 151 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1062 for ECDSA, tcId is 152 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1062_pubkey[] = { 0x4e, 0x49, 0x6f, 0x05, 0x6a, 0xb5, 0xd0, 0x7f, 0x96, 0x56, 0x2c, 0x68, 0x36, 0x43, 0x44, 0x0e, 0x31, 0xfe, 0xa2, 0x6d, 0x35, 0xe6, 0xc5, 0xb6, 0x9e, 0xef, 0xaa, 0x41, 0x07, 0xd3, 0x45, 0xc8, 0x07, 0xbf, 0x27, 0x9f, 0x2e, 0xa2, 0x6b, 0x60, 0x28, 0x85, 0x39, 0x76, 0x6f, 0xc7, 0x26, 0xcb, 0x9e, 0x84, 0x1d, 0xb5, 0xdc, 0xfb, 0xbb, 0x79, 0x2c, 0xad, 0xe3, 0xc1, 0xef, 0x64, 0xb6, 0x9d, 0xcb, 0xda, 0x7f, 0x5e, 0x49, 0x7b, 0x45, 0x5a, 0x91, 0x1c, 0xe2, 0xf0, 0xeb, 0xca, 0xca, 0xad, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1062_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1062_sig[] = { 0x01, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1062 = { .name = "ecdsa_brainpoolp320r1_sha384_1062", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1062_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1062_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1062_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 152 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1063 for ECDSA, tcId is 153 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1063_pubkey[] = { 0x11, 0xe0, 0x94, 0xf4, 0x70, 0x94, 0x8e, 0x4e, 0xaa, 0x6a, 0xa1, 0x3f, 0xab, 0x4e, 0x06, 0x33, 0x86, 0xe9, 0x1a, 0x63, 0x8f, 0xa2, 0x26, 0xd9, 0x88, 0xd0, 0x69, 0x3d, 0xea, 0x71, 0x9c, 0xa9, 0x5f, 0x61, 0xe4, 0x93, 0xe9, 0x83, 0x5a, 0xf4, 0x3f, 0x53, 0x3e, 0x89, 0xaa, 0x20, 0x85, 0xa9, 0xf8, 0x12, 0x10, 0x86, 0xa2, 0x59, 0x7f, 0x10, 0x60, 0xf7, 0x3c, 0x8d, 0x75, 0xd6, 0x69, 0x40, 0xe5, 0x0e, 0xea, 0xd7, 0x3d, 0xfd, 0x03, 0xc4, 0x76, 0xea, 0x19, 0x47, 0xcd, 0xd4, 0xdd, 0x3f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1063_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1063_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1063 = { .name = "ecdsa_brainpoolp320r1_sha384_1063", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1063_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1063_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1063_sig, .siglen = 80, .result = 1, .comment = "small r and s, tcId is 153 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1064 for ECDSA, tcId is 154 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1064_pubkey[] = { 0x11, 0xe0, 0x94, 0xf4, 0x70, 0x94, 0x8e, 0x4e, 0xaa, 0x6a, 0xa1, 0x3f, 0xab, 0x4e, 0x06, 0x33, 0x86, 0xe9, 0x1a, 0x63, 0x8f, 0xa2, 0x26, 0xd9, 0x88, 0xd0, 0x69, 0x3d, 0xea, 0x71, 0x9c, 0xa9, 0x5f, 0x61, 0xe4, 0x93, 0xe9, 0x83, 0x5a, 0xf4, 0x3f, 0x53, 0x3e, 0x89, 0xaa, 0x20, 0x85, 0xa9, 0xf8, 0x12, 0x10, 0x86, 0xa2, 0x59, 0x7f, 0x10, 0x60, 0xf7, 0x3c, 0x8d, 0x75, 0xd6, 0x69, 0x40, 0xe5, 0x0e, 0xea, 0xd7, 0x3d, 0xfd, 0x03, 0xc4, 0x76, 0xea, 0x19, 0x47, 0xcd, 0xd4, 0xdd, 0x3f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1064_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1064_sig[] = { 0x01, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1064 = { .name = "ecdsa_brainpoolp320r1_sha384_1064", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1064_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1064_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1064_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 154 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1065 for ECDSA, tcId is 155 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1065_pubkey[] = { 0x16, 0x51, 0x7a, 0x7d, 0x7b, 0xea, 0xb6, 0x47, 0x2e, 0xa8, 0xf6, 0xbc, 0x20, 0x41, 0x2a, 0x3c, 0xd9, 0x6d, 0x24, 0x2c, 0x24, 0x6c, 0xe9, 0xf9, 0x83, 0xb2, 0xef, 0x08, 0xb2, 0x84, 0xcf, 0xad, 0x1a, 0xc2, 0x85, 0x63, 0xb5, 0x6e, 0xda, 0xfb, 0x9f, 0x56, 0xfe, 0x2d, 0xf7, 0x8c, 0x23, 0x9a, 0xa1, 0x6c, 0x3c, 0x31, 0x8b, 0xc9, 0x19, 0x1a, 0x16, 0xec, 0x40, 0x7a, 0x70, 0x03, 0x54, 0x17, 0x3f, 0x8b, 0x86, 0x2d, 0x9a, 0x0a, 0xa1, 0x0d, 0x67, 0x39, 0x7f, 0x26, 0xe7, 0xc9, 0xc0, 0xbe, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1065_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1065_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1065 = { .name = "ecdsa_brainpoolp320r1_sha384_1065", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1065_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1065_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1065_sig, .siglen = 80, .result = 1, .comment = "small r and s, tcId is 155 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1066 for ECDSA, tcId is 156 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1066_pubkey[] = { 0x16, 0x51, 0x7a, 0x7d, 0x7b, 0xea, 0xb6, 0x47, 0x2e, 0xa8, 0xf6, 0xbc, 0x20, 0x41, 0x2a, 0x3c, 0xd9, 0x6d, 0x24, 0x2c, 0x24, 0x6c, 0xe9, 0xf9, 0x83, 0xb2, 0xef, 0x08, 0xb2, 0x84, 0xcf, 0xad, 0x1a, 0xc2, 0x85, 0x63, 0xb5, 0x6e, 0xda, 0xfb, 0x9f, 0x56, 0xfe, 0x2d, 0xf7, 0x8c, 0x23, 0x9a, 0xa1, 0x6c, 0x3c, 0x31, 0x8b, 0xc9, 0x19, 0x1a, 0x16, 0xec, 0x40, 0x7a, 0x70, 0x03, 0x54, 0x17, 0x3f, 0x8b, 0x86, 0x2d, 0x9a, 0x0a, 0xa1, 0x0d, 0x67, 0x39, 0x7f, 0x26, 0xe7, 0xc9, 0xc0, 0xbe, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1066_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1066_sig[] = { 0x01, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1066 = { .name = "ecdsa_brainpoolp320r1_sha384_1066", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1066_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1066_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1066_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 156 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1067 for ECDSA, tcId is 157 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1067_pubkey[] = { 0x16, 0x51, 0x7a, 0x7d, 0x7b, 0xea, 0xb6, 0x47, 0x2e, 0xa8, 0xf6, 0xbc, 0x20, 0x41, 0x2a, 0x3c, 0xd9, 0x6d, 0x24, 0x2c, 0x24, 0x6c, 0xe9, 0xf9, 0x83, 0xb2, 0xef, 0x08, 0xb2, 0x84, 0xcf, 0xad, 0x1a, 0xc2, 0x85, 0x63, 0xb5, 0x6e, 0xda, 0xfb, 0x9f, 0x56, 0xfe, 0x2d, 0xf7, 0x8c, 0x23, 0x9a, 0xa1, 0x6c, 0x3c, 0x31, 0x8b, 0xc9, 0x19, 0x1a, 0x16, 0xec, 0x40, 0x7a, 0x70, 0x03, 0x54, 0x17, 0x3f, 0x8b, 0x86, 0x2d, 0x9a, 0x0a, 0xa1, 0x0d, 0x67, 0x39, 0x7f, 0x26, 0xe7, 0xc9, 0xc0, 0xbe, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1067_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1067_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1067 = { .name = "ecdsa_brainpoolp320r1_sha384_1067", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1067_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1067_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1067_sig, .siglen = 80, .result = -1, .comment = "r is larger than n, tcId is 157 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1068 for ECDSA, tcId is 158 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1068_pubkey[] = { 0x3a, 0x26, 0x68, 0xbc, 0x09, 0x61, 0x4d, 0x26, 0x38, 0xed, 0x58, 0xf1, 0xc4, 0x21, 0xbb, 0x61, 0xf2, 0xd4, 0x99, 0xa8, 0x6f, 0xe7, 0xd5, 0x73, 0xbd, 0x13, 0x92, 0xac, 0xef, 0x9e, 0x29, 0x6b, 0x1e, 0xf2, 0xb1, 0x0d, 0x7f, 0x4e, 0xc5, 0x24, 0xd1, 0xb7, 0x8e, 0xb2, 0x71, 0x6c, 0xe6, 0x68, 0x05, 0x4d, 0x29, 0x67, 0x7c, 0x6f, 0x4d, 0x32, 0x35, 0xf2, 0x7d, 0x3a, 0x92, 0x95, 0xec, 0xef, 0x9d, 0xdf, 0xd2, 0xf6, 0x58, 0xba, 0x00, 0x20, 0x52, 0xd0, 0xe1, 0xe6, 0x71, 0x72, 0x1e, 0x2e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1068_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1068_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xd8, 0x69, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1068 = { .name = "ecdsa_brainpoolp320r1_sha384_1068", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1068_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1068_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1068_sig, .siglen = 80, .result = -1, .comment = "s is larger than n, tcId is 158 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1069 for ECDSA, tcId is 159 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1069_pubkey[] = { 0xcd, 0x16, 0x97, 0xc6, 0xe1, 0x07, 0xf3, 0xd9, 0x0b, 0x8d, 0xf4, 0x62, 0xeb, 0x36, 0x8b, 0x75, 0xeb, 0xa5, 0x85, 0x63, 0x59, 0x50, 0x17, 0x7e, 0x0a, 0x64, 0xb1, 0xad, 0x4b, 0xe5, 0x27, 0xc9, 0x09, 0x57, 0xfb, 0xdf, 0x20, 0x3d, 0x67, 0xc8, 0x4b, 0x00, 0x3f, 0x20, 0xe8, 0x16, 0x59, 0x09, 0x9b, 0x7e, 0x46, 0x66, 0x18, 0xf2, 0x61, 0x0c, 0x6f, 0x1d, 0xf3, 0x15, 0xb2, 0x01, 0x1d, 0xb0, 0x7b, 0x90, 0xf3, 0x66, 0x2b, 0x51, 0x56, 0x1f, 0xff, 0xdf, 0x3e, 0xbb, 0x5d, 0x44, 0x34, 0x40, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1069_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1069_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x21, 0x49, 0x4d, 0xb8, 0x79, 0x80, 0x6d, 0x4f, 0x59, 0xe5, 0x3d, 0x49, 0x63, 0x97, 0x7a, 0x03, 0xf6, 0xec, 0x51, 0x14, 0x0c, 0x9f, 0x9a, 0x1d, 0xba, 0x88, 0x57, 0xff, 0x3b, 0xbc, 0x76, 0xd2, 0x21, 0x49, 0x47, 0xe6, 0x0e, 0xdc, 0x98, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1069 = { .name = "ecdsa_brainpoolp320r1_sha384_1069", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1069_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1069_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1069_sig, .siglen = 80, .result = 1, .comment = "small r and s^-1, tcId is 159 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1070 for ECDSA, tcId is 160 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1070_pubkey[] = { 0xb1, 0xe3, 0x61, 0x9d, 0x9e, 0x35, 0x87, 0x3e, 0x95, 0x9b, 0xb7, 0xde, 0x77, 0x40, 0xe9, 0x27, 0xe3, 0xcb, 0x7f, 0xcf, 0x44, 0x13, 0xbf, 0xdb, 0xbe, 0xd7, 0x2e, 0xcc, 0x9a, 0x86, 0xa5, 0x0d, 0x70, 0x29, 0xca, 0xe0, 0x8e, 0xc2, 0x85, 0xab, 0x48, 0x6b, 0x5d, 0x2f, 0x7c, 0x9b, 0x93, 0x14, 0x42, 0x0b, 0xc8, 0x64, 0xcf, 0xe2, 0x9b, 0x40, 0x64, 0xbf, 0x7b, 0x92, 0x2b, 0xbb, 0x5b, 0xbc, 0xd1, 0x6f, 0x3a, 0x81, 0xea, 0x7d, 0x0a, 0x61, 0xb0, 0xa0, 0x9a, 0x62, 0x95, 0x9b, 0x76, 0x90, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1070_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1070_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x43, 0xbe, 0xcc, 0x87, 0x6a, 0x63, 0x56, 0x4b, 0x45, 0x82, 0x80, 0x19, 0x9e, 0x38, 0x2c, 0xba, 0xd8, 0xef, 0x68, 0xd4, 0x06, 0x66, 0x5b, 0xbf, 0x30, 0x7f, 0xfe, 0xa4, 0x58, 0x45, 0xa9, 0xac, 0x69, 0x34, 0x5a, 0x84, 0xa5, 0xa7, 0x2b, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1070 = { .name = "ecdsa_brainpoolp320r1_sha384_1070", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1070_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1070_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1070_sig, .siglen = 80, .result = 1, .comment = "smallish r and s^-1, tcId is 160 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1071 for ECDSA, tcId is 161 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1071_pubkey[] = { 0x97, 0xcf, 0xeb, 0xab, 0x58, 0x8a, 0x54, 0x24, 0x2a, 0x4d, 0x96, 0x2e, 0xf8, 0x03, 0x37, 0x6c, 0x3f, 0x43, 0x07, 0x9a, 0xa5, 0x0a, 0x88, 0x71, 0xd6, 0xe7, 0x76, 0xf7, 0xa0, 0xb3, 0x3a, 0xea, 0x46, 0xab, 0x9a, 0x2d, 0xa6, 0x3a, 0x33, 0xd8, 0xc8, 0x1a, 0xf3, 0x4a, 0xf2, 0xe9, 0xa0, 0xc5, 0x71, 0xef, 0xfb, 0x50, 0x1c, 0x4a, 0x27, 0xfd, 0x2a, 0xed, 0xc1, 0x36, 0x23, 0x44, 0x7a, 0xf2, 0xbc, 0x8b, 0x6d, 0x5e, 0x72, 0x08, 0xc2, 0x3e, 0x87, 0xe2, 0xd7, 0x97, 0xcc, 0x3c, 0xf5, 0x7e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1071_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1071_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfc, 0x39, 0x92, 0x35, 0x3d, 0x91, 0x66, 0x17, 0xb4, 0x93, 0x03, 0x85, 0x64, 0x88, 0xe3, 0x9f, 0xbc, 0x26, 0x17, 0x3b, 0x8b, 0xc4, 0x26, 0xf8, 0x20, 0x7d, 0xe3, 0xd8, 0xf1, 0xb9, 0x7f, 0x3d, 0x12, 0xc8, 0x03, 0xb9, 0x9d, 0x57, 0x76, 0x8f, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1071 = { .name = "ecdsa_brainpoolp320r1_sha384_1071", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1071_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1071_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1071_sig, .siglen = 80, .result = 1, .comment = "100-bit r and small s^-1, tcId is 161 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1072 for ECDSA, tcId is 162 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1072_pubkey[] = { 0x29, 0x6e, 0x00, 0x67, 0x94, 0x7e, 0xfc, 0x07, 0xa0, 0x6a, 0xe2, 0x18, 0xfb, 0x00, 0x16, 0x4d, 0x1e, 0xbe, 0xbc, 0xd3, 0x78, 0x7f, 0x79, 0x34, 0x81, 0x40, 0x7e, 0x27, 0x96, 0x24, 0x8e, 0x8b, 0x65, 0xea, 0xc5, 0x7d, 0xb0, 0xc1, 0x46, 0x06, 0x72, 0x9e, 0x80, 0x94, 0xb9, 0xa5, 0x4e, 0xea, 0xc2, 0x3d, 0x98, 0xd5, 0x1d, 0x66, 0x2e, 0xff, 0x2d, 0xf3, 0x3a, 0x86, 0x93, 0x00, 0x8f, 0xd0, 0x2a, 0x04, 0x29, 0xef, 0x68, 0x51, 0xec, 0xbd, 0xcd, 0x93, 0xaa, 0xc6, 0x7c, 0x2f, 0xbd, 0xb6, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1072_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1072_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x84, 0x38, 0x08, 0x81, 0xb2, 0x43, 0x23, 0x69, 0x67, 0x22, 0x71, 0x91, 0x39, 0x8a, 0x3a, 0x49, 0x09, 0x00, 0x04, 0x25, 0x57, 0x6c, 0x79, 0x46, 0x5b, 0xda, 0xaa, 0x0a, 0x03, 0x26, 0x7b, 0x9e, 0x48, 0xf6, 0x8f, 0xa0, 0xa6, 0x8b, 0x29, 0xe3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1072 = { .name = "ecdsa_brainpoolp320r1_sha384_1072", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1072_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1072_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1072_sig, .siglen = 80, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 162 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1073 for ECDSA, tcId is 163 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1073_pubkey[] = { 0xa3, 0x78, 0x3b, 0x01, 0x45, 0x5d, 0x92, 0x08, 0x0f, 0x52, 0x0d, 0x17, 0x1f, 0x92, 0xab, 0xea, 0xf4, 0x8c, 0x72, 0x38, 0xe1, 0x68, 0xb2, 0x93, 0x1f, 0x2b, 0x32, 0x2f, 0x9c, 0x0f, 0xaa, 0x69, 0xa2, 0x40, 0x97, 0x83, 0x6c, 0xb0, 0xa6, 0x85, 0x1c, 0xbf, 0x1a, 0x22, 0xba, 0xc2, 0x43, 0x75, 0x51, 0x24, 0x46, 0x05, 0x68, 0x2d, 0xab, 0xcd, 0xd4, 0xcf, 0x39, 0xff, 0x9d, 0x08, 0x44, 0x39, 0x21, 0xc9, 0x94, 0x48, 0xcb, 0xce, 0xa5, 0xde, 0xb8, 0x5a, 0xd9, 0x52, 0xdb, 0xb2, 0xb9, 0x67, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1073_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1073_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0x84, 0x38, 0x08, 0x81, 0xb2, 0x43, 0x23, 0x69, 0x67, 0x22, 0x71, 0x91, 0x39, 0x8a, 0x3a, 0x49, 0x09, 0x00, 0x04, 0x25, 0x57, 0x6c, 0x79, 0x46, 0x5b, 0xda, 0xaa, 0x0a, 0x03, 0x26, 0x7b, 0x9e, 0x48, 0xf6, 0x8f, 0xa0, 0xa6, 0x8b, 0x29, 0xe3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1073 = { .name = "ecdsa_brainpoolp320r1_sha384_1073", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1073_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1073_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1073_sig, .siglen = 80, .result = 1, .comment = "100-bit r and s^-1, tcId is 163 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1074 for ECDSA, tcId is 164 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1074_pubkey[] = { 0x70, 0xd5, 0xfd, 0x41, 0xc4, 0x16, 0xd5, 0xb7, 0xcd, 0xbc, 0xb9, 0x44, 0x20, 0x5b, 0xd6, 0x9f, 0xf0, 0x0e, 0xd6, 0x35, 0x4a, 0xa5, 0x02, 0x75, 0x7e, 0x08, 0x9c, 0xb1, 0x9a, 0xf6, 0xf7, 0x77, 0xbe, 0xb0, 0xf6, 0x92, 0x1c, 0x0f, 0xaf, 0xac, 0x22, 0xae, 0x7c, 0xc6, 0x5e, 0x0e, 0x7b, 0x61, 0x74, 0x23, 0x75, 0x0b, 0x84, 0x93, 0xa5, 0x85, 0x12, 0xe3, 0x79, 0xc0, 0x0d, 0xe6, 0x26, 0xc1, 0x7f, 0x7c, 0x82, 0xbf, 0xc9, 0x07, 0xf2, 0x66, 0x10, 0xa3, 0xf1, 0xe4, 0xd1, 0x32, 0xc5, 0x75, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1074_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1074_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x92, 0x94, 0x8c, 0xe9, 0x84, 0xc0, 0x24, 0x7d, 0x8a, 0x7a, 0x96, 0x28, 0x50, 0x3f, 0x36, 0xab, 0xea, 0xee, 0xa6, 0x5f, 0xdf, 0xc3, 0xcf, 0x0a, 0x0c, 0x6c, 0xc8, 0xda, 0xc9, 0xda, 0x9f, 0x04, 0x3b, 0x46, 0x59, 0xb6, 0x38, 0xe7, 0x83, 0x2e, 0x62, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1074 = { .name = "ecdsa_brainpoolp320r1_sha384_1074", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1074_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1074_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1074_sig, .siglen = 80, .result = 1, .comment = "r and s^-1 are close to n, tcId is 164 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1075 for ECDSA, tcId is 165 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1075_pubkey[] = { 0x06, 0x82, 0x8c, 0xe6, 0x3f, 0x3b, 0x0d, 0x69, 0x4c, 0xe2, 0x99, 0x9d, 0x06, 0x94, 0x7f, 0xa9, 0xe2, 0xd1, 0xc1, 0x8a, 0xb8, 0x03, 0x26, 0x52, 0xfa, 0x7a, 0x98, 0xc6, 0x78, 0xcf, 0x6b, 0xb2, 0xc5, 0x2e, 0x73, 0x69, 0x08, 0x5e, 0x4e, 0xf7, 0xc5, 0x6d, 0xf6, 0x91, 0x28, 0x96, 0x2f, 0xbe, 0xfc, 0x2a, 0xef, 0x1b, 0x3f, 0x6c, 0x46, 0x7b, 0x72, 0xfc, 0x30, 0x5a, 0xcf, 0x51, 0xb3, 0x39, 0x64, 0x3c, 0xa2, 0xed, 0x6b, 0xde, 0x56, 0x31, 0x7c, 0x4c, 0xf5, 0x98, 0x95, 0x92, 0x3d, 0xed, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1075_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1075_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1075 = { .name = "ecdsa_brainpoolp320r1_sha384_1075", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1075_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1075_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1075_sig, .siglen = 80, .result = 1, .comment = "s == 1, tcId is 165 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1076 for ECDSA, tcId is 166 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1076_pubkey[] = { 0x06, 0x82, 0x8c, 0xe6, 0x3f, 0x3b, 0x0d, 0x69, 0x4c, 0xe2, 0x99, 0x9d, 0x06, 0x94, 0x7f, 0xa9, 0xe2, 0xd1, 0xc1, 0x8a, 0xb8, 0x03, 0x26, 0x52, 0xfa, 0x7a, 0x98, 0xc6, 0x78, 0xcf, 0x6b, 0xb2, 0xc5, 0x2e, 0x73, 0x69, 0x08, 0x5e, 0x4e, 0xf7, 0xc5, 0x6d, 0xf6, 0x91, 0x28, 0x96, 0x2f, 0xbe, 0xfc, 0x2a, 0xef, 0x1b, 0x3f, 0x6c, 0x46, 0x7b, 0x72, 0xfc, 0x30, 0x5a, 0xcf, 0x51, 0xb3, 0x39, 0x64, 0x3c, 0xa2, 0xed, 0x6b, 0xde, 0x56, 0x31, 0x7c, 0x4c, 0xf5, 0x98, 0x95, 0x92, 0x3d, 0xed, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1076_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1076_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1076 = { .name = "ecdsa_brainpoolp320r1_sha384_1076", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1076_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1076_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1076_sig, .siglen = 80, .result = -1, .comment = "s == 0, tcId is 166 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1077 for ECDSA, tcId is 167 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1077_pubkey[] = { 0x20, 0x25, 0x16, 0xad, 0x66, 0x37, 0x75, 0xf1, 0x21, 0x55, 0x52, 0x10, 0x79, 0x03, 0x7f, 0x3f, 0xca, 0x50, 0xc6, 0x4f, 0xaa, 0x4a, 0xfd, 0x88, 0x6a, 0xdd, 0x4d, 0xaa, 0xb9, 0x27, 0xf3, 0xf6, 0x2a, 0xa2, 0xda, 0xe6, 0x84, 0xa6, 0x35, 0xd6, 0x63, 0x2a, 0xed, 0xd5, 0x30, 0xe6, 0x1d, 0xab, 0x35, 0x91, 0x69, 0x62, 0xee, 0x8f, 0x23, 0xed, 0x68, 0x81, 0x98, 0xaf, 0xd5, 0xad, 0x6b, 0x07, 0x05, 0xe2, 0xef, 0x9d, 0x0b, 0xa3, 0xc5, 0x33, 0x3b, 0x15, 0xbd, 0xab, 0x43, 0x2e, 0xe3, 0x42, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1077_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1077_sig[] = { 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1077 = { .name = "ecdsa_brainpoolp320r1_sha384_1077", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1077_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1077_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1077_sig, .siglen = 80, .result = -1, .comment = "point at infinity during verify, tcId is 167 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1078 for ECDSA, tcId is 168 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1078_pubkey[] = { 0x82, 0x3a, 0x83, 0x0c, 0x58, 0xd9, 0xdd, 0x37, 0x0f, 0x68, 0x7f, 0xf8, 0x19, 0x14, 0x2b, 0x64, 0x4a, 0xc9, 0xdc, 0x18, 0xa9, 0x46, 0x81, 0xe2, 0x24, 0x5e, 0xb2, 0x2f, 0x27, 0xe3, 0x33, 0xe6, 0x2f, 0xec, 0xe3, 0x97, 0x23, 0x17, 0x69, 0xda, 0x36, 0xa7, 0xe2, 0x37, 0xea, 0x2f, 0x3e, 0x24, 0x72, 0xde, 0x14, 0x7e, 0x16, 0x6c, 0xe4, 0xbd, 0x82, 0x48, 0x20, 0x8d, 0xf5, 0x38, 0xac, 0x00, 0xf5, 0xb2, 0x29, 0x9e, 0x2d, 0x72, 0x9b, 0x0d, 0xd8, 0x0e, 0x3e, 0x10, 0x6c, 0x06, 0x08, 0x44, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1078_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1078_sig[] = { 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1078 = { .name = "ecdsa_brainpoolp320r1_sha384_1078", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1078_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1078_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1078_sig, .siglen = 80, .result = 1, .comment = "edge case for signature malleability, tcId is 168 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1079 for ECDSA, tcId is 169 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1079_pubkey[] = { 0x38, 0x7a, 0x75, 0x92, 0x84, 0xf6, 0x5d, 0x2d, 0x93, 0xf5, 0x41, 0xf2, 0x76, 0x6f, 0x84, 0x6a, 0xbd, 0xec, 0x23, 0x91, 0x90, 0xe8, 0xcd, 0xdb, 0xa9, 0xb7, 0x56, 0x4a, 0x83, 0xd5, 0x81, 0x62, 0xa4, 0x89, 0xf2, 0x5f, 0x0d, 0x43, 0xb4, 0xf8, 0x42, 0x46, 0x25, 0xa6, 0xc1, 0xe1, 0x58, 0x94, 0x74, 0xc3, 0x0e, 0x63, 0x83, 0xc9, 0x25, 0xb3, 0x63, 0x23, 0x9d, 0x1a, 0x87, 0xb9, 0x63, 0x4f, 0xd8, 0xaa, 0xc2, 0xeb, 0x0c, 0xe3, 0x9e, 0x37, 0x63, 0x87, 0x3d, 0xe7, 0x73, 0x58, 0xbd, 0x4b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1079_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1079_sig[] = { 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1079 = { .name = "ecdsa_brainpoolp320r1_sha384_1079", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1079_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1079_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1079_sig, .siglen = 80, .result = 1, .comment = "edge case for signature malleability, tcId is 169 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1080 for ECDSA, tcId is 170 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1080_pubkey[] = { 0x6b, 0x43, 0x27, 0x11, 0x7e, 0x9c, 0x04, 0xd7, 0xa5, 0x82, 0x59, 0xc5, 0x20, 0x7a, 0x36, 0xe8, 0xd2, 0x78, 0xe8, 0x73, 0xb9, 0x2b, 0x5b, 0x3a, 0x70, 0xa3, 0xc4, 0x74, 0x2c, 0xc5, 0x83, 0xb4, 0x14, 0x08, 0xaa, 0xab, 0x23, 0xa1, 0x2a, 0x9c, 0x9b, 0x0b, 0x26, 0x16, 0x0c, 0x54, 0x8a, 0xba, 0xcd, 0x7f, 0x0e, 0x37, 0x27, 0x6f, 0x91, 0x7c, 0x09, 0x72, 0x1b, 0x38, 0x44, 0xd0, 0xb2, 0x6e, 0x9e, 0xd5, 0xc7, 0x6c, 0x99, 0x78, 0x79, 0x92, 0x25, 0x9b, 0xf0, 0xf7, 0xb0, 0x24, 0x45, 0xd3, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1080_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1080_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1080 = { .name = "ecdsa_brainpoolp320r1_sha384_1080", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1080_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1080_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1080_sig, .siglen = 80, .result = -1, .comment = "u1 == 1, tcId is 170 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1081 for ECDSA, tcId is 171 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1081_pubkey[] = { 0x27, 0x7f, 0x48, 0x7f, 0xaf, 0x77, 0xa6, 0x5d, 0xbb, 0x79, 0x15, 0x36, 0xe8, 0x63, 0xb8, 0xc7, 0x0f, 0x90, 0x4f, 0xcd, 0xca, 0xf5, 0x27, 0x40, 0xd4, 0xbd, 0x5c, 0x46, 0x97, 0x31, 0xe5, 0x8e, 0xa6, 0xbd, 0x53, 0xe8, 0xd7, 0x72, 0x02, 0x28, 0x2d, 0x34, 0x6f, 0x2b, 0x4c, 0xa7, 0xba, 0xcb, 0x88, 0x2f, 0xef, 0x74, 0x9c, 0x27, 0x13, 0xf1, 0xa7, 0x5f, 0x00, 0x82, 0x7e, 0x8b, 0x9b, 0x9f, 0x74, 0x4a, 0x0e, 0x1e, 0x34, 0xbc, 0xf8, 0x07, 0x99, 0xa1, 0x20, 0x95, 0x0d, 0xe9, 0x5d, 0x99, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1081_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1081_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0xad, 0x0b, 0x66, 0x4f, 0x95, 0x59, 0xe2, 0x9e, 0x46, 0xfd, 0x4f, 0xd3, 0x90, 0xe7, 0x5a, 0xbe, 0xbf, 0x14, 0x99, 0x7d, 0x17, 0xa1, 0xa3, 0x30, 0x4c, 0x80, 0xe4, 0x51, 0xfc, 0x8f, 0x79, 0xbb, 0x7c, 0xff, 0x16, 0x8e, 0x17, 0xde, 0x6f, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1081 = { .name = "ecdsa_brainpoolp320r1_sha384_1081", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1081_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1081_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1081_sig, .siglen = 80, .result = 1, .comment = "u1 == n - 1, tcId is 171 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1082 for ECDSA, tcId is 172 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1082_pubkey[] = { 0x73, 0xbd, 0x62, 0xf3, 0xbb, 0x32, 0x9d, 0x65, 0x09, 0x2b, 0x5d, 0x13, 0xc5, 0x74, 0x6d, 0x46, 0x24, 0x01, 0xd2, 0x60, 0x09, 0x94, 0xd8, 0xfe, 0x2e, 0xc5, 0xef, 0x5b, 0x9f, 0x33, 0x99, 0x08, 0x4b, 0x1d, 0xdc, 0x64, 0xcb, 0x33, 0x4b, 0xae, 0xc1, 0xd1, 0xac, 0x4f, 0x9a, 0x0c, 0x2a, 0x79, 0xef, 0x7c, 0xcc, 0x4a, 0xe9, 0x16, 0x5d, 0xdf, 0xa7, 0x61, 0x38, 0x23, 0x57, 0x18, 0xcf, 0x24, 0x03, 0x2c, 0x33, 0xf9, 0xdb, 0x4a, 0x26, 0xb2, 0xb0, 0x36, 0x92, 0xa5, 0x6f, 0x52, 0x02, 0xeb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1082_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1082_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1082 = { .name = "ecdsa_brainpoolp320r1_sha384_1082", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1082_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1082_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1082_sig, .siglen = 80, .result = 1, .comment = "u2 == 1, tcId is 172 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1083 for ECDSA, tcId is 173 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1083_pubkey[] = { 0x20, 0xa7, 0x55, 0x51, 0x03, 0x5d, 0xb9, 0x5d, 0x7a, 0x1a, 0x67, 0x3d, 0x46, 0x4d, 0x27, 0x6d, 0xa0, 0x86, 0x10, 0x08, 0xe4, 0x64, 0x4c, 0x58, 0x2b, 0xc1, 0x0a, 0x1b, 0xee, 0xae, 0xb0, 0x70, 0x82, 0x3f, 0xd0, 0x64, 0xa2, 0x62, 0x5e, 0xbb, 0x5d, 0x47, 0xf0, 0xc7, 0x7f, 0xc5, 0x7e, 0x3b, 0xb0, 0xe1, 0x53, 0xbb, 0xc7, 0xe9, 0xbb, 0xde, 0x8d, 0xb9, 0x8b, 0x0c, 0x46, 0xc5, 0x81, 0x54, 0xaf, 0x5b, 0x97, 0x86, 0xb1, 0x0b, 0xa1, 0x2a, 0xb3, 0xba, 0x85, 0x33, 0xa3, 0x99, 0x28, 0x83, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1083_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1083_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x8c, 0xe9, 0x84, 0xc0, 0x24, 0x7d, 0x8a, 0x7a, 0x96, 0x28, 0x50, 0x3f, 0x36, 0xab, 0xea, 0xee, 0xa6, 0x5f, 0xdf, 0xc3, 0xcf, 0x0a, 0x0c, 0x6c, 0xc8, 0xda, 0xc9, 0xda, 0x9f, 0x04, 0x3b, 0x46, 0x59, 0xb6, 0x38, 0xe7, 0x83, 0x2e, 0x62, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1083 = { .name = "ecdsa_brainpoolp320r1_sha384_1083", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1083_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1083_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1083_sig, .siglen = 80, .result = 1, .comment = "u2 == n - 1, tcId is 173 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1084 for ECDSA, tcId is 174 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1084_pubkey[] = { 0x3f, 0x43, 0x6d, 0x07, 0xcb, 0x02, 0x64, 0xb1, 0x3f, 0x92, 0xfd, 0x69, 0x63, 0x34, 0xa4, 0xe5, 0x1b, 0x7d, 0x66, 0x19, 0xe2, 0xd0, 0x43, 0xb2, 0xd0, 0xd2, 0x78, 0x96, 0x3f, 0x25, 0x16, 0x20, 0x0e, 0xf9, 0x05, 0xeb, 0xf6, 0x71, 0x66, 0x63, 0x40, 0xe6, 0x42, 0xb6, 0xc9, 0x66, 0x07, 0x2b, 0x79, 0x27, 0x80, 0x03, 0x65, 0x11, 0x28, 0x87, 0x9f, 0x19, 0xde, 0xe0, 0x12, 0x73, 0xb6, 0x6b, 0xea, 0xd8, 0x04, 0x51, 0x94, 0x27, 0x7c, 0x92, 0x84, 0x09, 0x33, 0x48, 0xd9, 0x05, 0x69, 0xb1, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1084_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1084_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0c, 0xc6, 0x4a, 0xf0, 0x35, 0xcb, 0x79, 0xb3, 0x33, 0x6a, 0x62, 0xd9, 0x15, 0xb3, 0x81, 0xe2, 0x68, 0xd3, 0xbc, 0xb8, 0x34, 0xf9, 0xcf, 0xd0, 0xf5, 0x97, 0xc3, 0x7c, 0xa5, 0xfc, 0xf5, 0x0f, 0x58, 0x86, 0x14, 0xef, 0x0e, 0xf7, 0xb6, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1084 = { .name = "ecdsa_brainpoolp320r1_sha384_1084", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1084_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1084_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1084_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 174 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1085 for ECDSA, tcId is 175 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1085_pubkey[] = { 0xc1, 0x6f, 0xbe, 0x6d, 0x0d, 0x77, 0x32, 0x7c, 0xf9, 0xa6, 0x5f, 0x98, 0x7c, 0x2f, 0xe7, 0xee, 0x18, 0x07, 0x85, 0x1c, 0x0e, 0x1c, 0x8b, 0xc4, 0xf0, 0x62, 0x28, 0x07, 0xdc, 0xd4, 0xa8, 0x8b, 0x3b, 0x91, 0x2e, 0xb0, 0x47, 0x54, 0x71, 0xe5, 0x75, 0x42, 0x1c, 0x40, 0x54, 0x00, 0x50, 0x50, 0x7a, 0x16, 0x3f, 0x23, 0xcc, 0x7c, 0xb9, 0x0a, 0xcc, 0x52, 0x82, 0x2d, 0x01, 0xd2, 0x45, 0xab, 0x70, 0xdc, 0xaa, 0xc0, 0x6e, 0x2e, 0xa6, 0x44, 0x32, 0x7a, 0x85, 0xf5, 0x95, 0xd0, 0x26, 0xef, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1085_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1085_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x8e, 0x76, 0x5d, 0x0d, 0x1c, 0xf9, 0x53, 0x9f, 0x68, 0x2a, 0x41, 0x55, 0xb6, 0xd6, 0x0e, 0xb6, 0xaa, 0x68, 0x62, 0xb2, 0xaf, 0x9e, 0x9d, 0x3f, 0x94, 0xc9, 0xad, 0x46, 0xd3, 0x32, 0xf0, 0xe0, 0x29, 0x77, 0x55, 0x22, 0x81, 0x5c, 0x0e, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1085 = { .name = "ecdsa_brainpoolp320r1_sha384_1085", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1085_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1085_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1085_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 175 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1086 for ECDSA, tcId is 176 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1086_pubkey[] = { 0xbe, 0x92, 0x40, 0x07, 0xd6, 0xe2, 0x2b, 0x94, 0x4a, 0xc7, 0x6d, 0xa7, 0xfc, 0x26, 0x60, 0xd1, 0xae, 0xfa, 0xb6, 0x94, 0x71, 0xbd, 0x83, 0x5b, 0xd7, 0x8e, 0xdd, 0x2c, 0x10, 0x62, 0x1e, 0x76, 0xf7, 0x18, 0xbf, 0xd0, 0xa5, 0xe2, 0x30, 0x7e, 0xc6, 0x25, 0x83, 0xd5, 0xba, 0x5c, 0xc1, 0xc5, 0x47, 0x63, 0x04, 0x76, 0xb3, 0x99, 0x86, 0x6e, 0x7e, 0xd9, 0x53, 0xb5, 0x38, 0xf7, 0x6c, 0x86, 0xaf, 0xe9, 0xcf, 0xd0, 0x85, 0x4b, 0x57, 0xe3, 0x36, 0x91, 0xc7, 0x7e, 0x44, 0x4c, 0xca, 0xb8, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1086_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1086_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x72, 0x25, 0xa9, 0x60, 0xd9, 0x67, 0xcf, 0xe5, 0x2a, 0xc1, 0x26, 0xa5, 0x0f, 0xd7, 0x9f, 0xa8, 0x5a, 0x58, 0x63, 0x97, 0xc0, 0xb2, 0x98, 0xc8, 0xad, 0xfa, 0xf1, 0x38, 0x31, 0x7b, 0x0f, 0x79, 0x4b, 0x24, 0xf5, 0x3b, 0xd9, 0x20, 0xc1, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1086 = { .name = "ecdsa_brainpoolp320r1_sha384_1086", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1086_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1086_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1086_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 176 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1087 for ECDSA, tcId is 177 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1087_pubkey[] = { 0xac, 0xf2, 0x40, 0x13, 0x0d, 0x47, 0xd4, 0xa5, 0x7d, 0x60, 0x65, 0x95, 0xf9, 0x89, 0x12, 0x9f, 0xea, 0x7e, 0x97, 0x44, 0xb1, 0xe5, 0x3f, 0x5c, 0xe6, 0x79, 0xc2, 0x44, 0xc8, 0x5a, 0xf3, 0x5c, 0x61, 0x86, 0x07, 0xe2, 0xec, 0xce, 0x1a, 0x43, 0x1b, 0x69, 0x6a, 0x79, 0x59, 0xfe, 0x30, 0xd0, 0x49, 0x10, 0x0d, 0xd5, 0x42, 0x58, 0x18, 0x1b, 0x08, 0xa2, 0xfe, 0x44, 0x2e, 0x41, 0xff, 0x29, 0x52, 0x3c, 0x11, 0xa3, 0xe0, 0x10, 0x28, 0xeb, 0x64, 0xb3, 0x21, 0xc2, 0xb7, 0x02, 0x57, 0x9c, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1087_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1087_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x87, 0x4f, 0x31, 0x1b, 0x6b, 0x9a, 0xc7, 0x4f, 0xc3, 0x4c, 0x60, 0xc0, 0x94, 0x18, 0x73, 0x65, 0x1b, 0x3c, 0x0e, 0xc1, 0xd0, 0x97, 0xa7, 0x86, 0x1e, 0x0c, 0x7f, 0xbe, 0xc3, 0x22, 0x6f, 0x23, 0xa5, 0xe2, 0xc9, 0x29, 0xd8, 0x56, 0xec, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1087 = { .name = "ecdsa_brainpoolp320r1_sha384_1087", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1087_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1087_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1087_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 177 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1088 for ECDSA, tcId is 178 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1088_pubkey[] = { 0x46, 0x24, 0x3b, 0x39, 0xe7, 0x76, 0x39, 0xac, 0x19, 0xe9, 0xbe, 0x53, 0x66, 0x93, 0x17, 0xd9, 0x59, 0x8e, 0x03, 0xec, 0x30, 0xa0, 0xcf, 0x69, 0x30, 0xf8, 0x00, 0x00, 0x98, 0x33, 0x82, 0x6a, 0x59, 0xad, 0xe5, 0x32, 0x19, 0x33, 0xff, 0x2f, 0x69, 0xd7, 0x70, 0xb9, 0x78, 0xcc, 0xc3, 0x6c, 0x90, 0xb7, 0x48, 0xe5, 0x01, 0x06, 0x36, 0xe7, 0x00, 0x4d, 0xdc, 0x19, 0x88, 0x5d, 0xa7, 0xbb, 0x90, 0xdb, 0xfa, 0xd4, 0x79, 0xfc, 0x52, 0xdc, 0xe4, 0xb9, 0x28, 0x14, 0x05, 0xf1, 0xc6, 0xbd, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1088_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1088_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x13, 0x75, 0x3a, 0xc9, 0x0f, 0xbc, 0x7e, 0xdf, 0xdc, 0xb3, 0x2e, 0x16, 0x97, 0xfd, 0xfd, 0x41, 0xb1, 0xfb, 0x59, 0xc5, 0xad, 0x17, 0x7e, 0x96, 0xfe, 0xac, 0xc8, 0x75, 0x22, 0xef, 0x92, 0x8d, 0xe8, 0x0a, 0x60, 0xbb, 0x0f, 0x32, 0xe7, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1088 = { .name = "ecdsa_brainpoolp320r1_sha384_1088", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1088_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1088_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1088_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 178 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1089 for ECDSA, tcId is 179 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1089_pubkey[] = { 0xb4, 0xb9, 0xb6, 0xba, 0x3c, 0x0e, 0x75, 0x09, 0xc2, 0x75, 0x89, 0x4e, 0x84, 0xe8, 0x18, 0xd7, 0x1d, 0xe1, 0x45, 0x77, 0xbd, 0xb4, 0xbf, 0x0b, 0x8e, 0x5e, 0x13, 0x32, 0xd1, 0x08, 0x7f, 0x3c, 0x33, 0x3b, 0x73, 0xe8, 0xab, 0x75, 0xf2, 0xc9, 0x4f, 0x33, 0xd0, 0xe2, 0xab, 0x34, 0x2d, 0x2e, 0x19, 0x68, 0xce, 0x3e, 0x1c, 0x47, 0xbe, 0x87, 0xe3, 0x9e, 0xe8, 0x82, 0x73, 0xae, 0x4c, 0xf7, 0x77, 0x86, 0x9d, 0x3a, 0x17, 0x03, 0xb6, 0x3a, 0x98, 0x3d, 0x2d, 0x43, 0xc5, 0x93, 0x03, 0xe5, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1089_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1089_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x26, 0xea, 0x75, 0x92, 0x1f, 0x78, 0xfd, 0xbf, 0xb9, 0x66, 0x5c, 0x2d, 0x2f, 0xfb, 0xfa, 0x83, 0x63, 0xf6, 0xb3, 0x8b, 0x5a, 0x2e, 0xfd, 0x2d, 0xfd, 0x59, 0x90, 0xea, 0x45, 0xdf, 0x25, 0x1b, 0xd0, 0x14, 0xc1, 0x76, 0x1e, 0x65, 0xcf, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1089 = { .name = "ecdsa_brainpoolp320r1_sha384_1089", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1089_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1089_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1089_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 179 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1090 for ECDSA, tcId is 180 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1090_pubkey[] = { 0x03, 0x01, 0x5b, 0x3c, 0xa6, 0x76, 0x83, 0x46, 0x7c, 0x79, 0x44, 0x6d, 0x4b, 0x93, 0xd1, 0x09, 0x78, 0x33, 0x08, 0x56, 0xee, 0xe4, 0x0d, 0x6d, 0x58, 0x68, 0x3a, 0xc7, 0x35, 0x00, 0xae, 0x31, 0x5c, 0x5b, 0x58, 0x23, 0x51, 0xc4, 0x22, 0x6b, 0x18, 0xd8, 0x95, 0x61, 0xd3, 0xff, 0xa0, 0xf9, 0x31, 0x1a, 0xa6, 0x16, 0x54, 0x7f, 0x7e, 0xb1, 0xd3, 0x6e, 0x73, 0xa6, 0xcc, 0x4b, 0xd2, 0x30, 0xdf, 0x34, 0xa1, 0xf3, 0x19, 0xbe, 0x66, 0xbc, 0xb2, 0xfb, 0x0e, 0x1f, 0x68, 0xcc, 0x19, 0x2e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1090_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1090_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x9f, 0xee, 0x19, 0x29, 0x30, 0xd3, 0x05, 0x02, 0xc0, 0x5e, 0x56, 0xad, 0xf0, 0x86, 0xec, 0xd1, 0x3a, 0x92, 0xcd, 0x43, 0xce, 0x0c, 0x72, 0xea, 0x65, 0xea, 0xd4, 0x36, 0x67, 0x89, 0x0a, 0xe1, 0x9b, 0xe8, 0x35, 0x33, 0x3c, 0x32, 0xc5, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1090 = { .name = "ecdsa_brainpoolp320r1_sha384_1090", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1090_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1090_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1090_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 180 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1091 for ECDSA, tcId is 181 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1091_pubkey[] = { 0x18, 0x7d, 0x93, 0xf8, 0x4a, 0x0e, 0x60, 0x43, 0xf0, 0x97, 0xd0, 0xa8, 0x7f, 0x8d, 0xca, 0x07, 0x73, 0x9c, 0xf4, 0x45, 0x48, 0xa7, 0xd3, 0x40, 0x3e, 0x03, 0x9e, 0x49, 0xc4, 0xc5, 0x12, 0x85, 0x48, 0x29, 0x75, 0xaf, 0x54, 0xec, 0x05, 0x6c, 0x06, 0x23, 0xc5, 0x75, 0x38, 0xfe, 0xfb, 0x72, 0x31, 0xd6, 0x19, 0xbb, 0xef, 0xd4, 0xca, 0xb3, 0x73, 0xa5, 0x4b, 0x36, 0x13, 0x54, 0xe5, 0x86, 0xb1, 0xd9, 0x98, 0x1a, 0x88, 0x35, 0xe9, 0xc6, 0xbe, 0xab, 0x08, 0x2c, 0xb9, 0x3e, 0x13, 0xb6, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1091_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1091_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x96, 0x3f, 0x97, 0xcb, 0x35, 0xa3, 0x21, 0xdf, 0x62, 0xfc, 0x21, 0x9e, 0xb2, 0xf3, 0x70, 0x39, 0x49, 0xc4, 0x83, 0x16, 0x5d, 0x06, 0xdb, 0x13, 0xc4, 0x03, 0x08, 0x0a, 0x86, 0xc1, 0xe5, 0xd9, 0xb4, 0x3d, 0x2e, 0x8d, 0xd9, 0x64, 0x3c, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1091 = { .name = "ecdsa_brainpoolp320r1_sha384_1091", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1091_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1091_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1091_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 181 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1092 for ECDSA, tcId is 182 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1092_pubkey[] = { 0x08, 0x55, 0xcc, 0x20, 0x35, 0x11, 0x26, 0xb3, 0x8f, 0x93, 0x4f, 0xbb, 0x56, 0xc3, 0x02, 0xf6, 0x2a, 0x36, 0x0e, 0x62, 0x49, 0x3c, 0x2d, 0x52, 0x9f, 0xb8, 0x7c, 0xae, 0xa0, 0xd7, 0x1b, 0xfd, 0xaf, 0x5f, 0xcc, 0x33, 0x68, 0xd4, 0x95, 0xfd, 0x1c, 0xe7, 0x57, 0x86, 0x10, 0xcb, 0xec, 0x46, 0x53, 0x98, 0xb2, 0xc1, 0x23, 0x8b, 0x3e, 0x23, 0xb9, 0xe2, 0x9b, 0x47, 0x61, 0x96, 0x10, 0x64, 0x30, 0xd7, 0x63, 0x16, 0xaa, 0xf2, 0x99, 0x37, 0xac, 0xe6, 0x58, 0xb6, 0x9c, 0x8b, 0xfb, 0x99, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1092_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1092_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x13, 0xdb, 0xff, 0x9e, 0x66, 0x7e, 0x7b, 0xcd, 0x44, 0x95, 0x02, 0x26, 0xf9, 0x3b, 0x09, 0x73, 0x8e, 0x79, 0x35, 0x17, 0xc0, 0x28, 0x86, 0xae, 0x9f, 0x2b, 0x3d, 0xed, 0xed, 0xa7, 0x56, 0xc9, 0x04, 0x9a, 0xb9, 0xa4, 0x6b, 0xc7, 0xc9, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1092 = { .name = "ecdsa_brainpoolp320r1_sha384_1092", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1092_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1092_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1092_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 182 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1093 for ECDSA, tcId is 183 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1093_pubkey[] = { 0x94, 0xc5, 0x49, 0x19, 0x00, 0x40, 0x79, 0xbe, 0x0d, 0xb4, 0xc9, 0x2d, 0xc1, 0xfc, 0x94, 0x7d, 0x79, 0xeb, 0x0f, 0x8e, 0x86, 0x9d, 0x94, 0x81, 0x38, 0x86, 0xad, 0xa4, 0x25, 0x4f, 0x1d, 0xad, 0xb4, 0xd8, 0x7a, 0x61, 0x12, 0xa5, 0x83, 0x36, 0x86, 0xd8, 0xb5, 0xbe, 0xac, 0x00, 0xfa, 0xfd, 0x64, 0x7e, 0xf8, 0xb6, 0x31, 0xe8, 0x99, 0xa6, 0xa8, 0xb7, 0x2a, 0x51, 0x1d, 0x4f, 0x50, 0xce, 0x15, 0x66, 0x48, 0xad, 0x9c, 0xb7, 0x08, 0xfb, 0x2f, 0xb2, 0xc6, 0x38, 0xfd, 0xb9, 0xf3, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1093_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1093_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x85, 0x24, 0x66, 0xce, 0xf3, 0x16, 0x99, 0x2b, 0x3c, 0xa2, 0x5c, 0xc5, 0x4b, 0x7f, 0x4f, 0xda, 0x2e, 0x8a, 0x81, 0x9e, 0x7c, 0x4b, 0x04, 0x05, 0x43, 0xe9, 0x4f, 0x9c, 0xac, 0xa0, 0x29, 0x37, 0x68, 0x1c, 0x20, 0x19, 0xbb, 0x49, 0xee, 0x43, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1093 = { .name = "ecdsa_brainpoolp320r1_sha384_1093", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1093_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1093_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1093_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 183 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1094 for ECDSA, tcId is 184 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1094_pubkey[] = { 0x2b, 0xca, 0x76, 0x04, 0x37, 0x28, 0xb5, 0xee, 0xef, 0xde, 0x89, 0xd2, 0x5a, 0xcd, 0xf2, 0xe0, 0xb1, 0x60, 0xc5, 0xae, 0x0c, 0xcd, 0xab, 0x6b, 0xd3, 0xba, 0xa4, 0x79, 0xf1, 0x77, 0x53, 0xc3, 0xc0, 0x00, 0xcc, 0xf8, 0xba, 0x86, 0x23, 0xde, 0x92, 0xf0, 0xc2, 0xd6, 0x8a, 0x1b, 0xd4, 0x05, 0xe4, 0x49, 0x82, 0x3f, 0xe6, 0x3b, 0x21, 0x40, 0x2a, 0xef, 0x3e, 0x9a, 0x01, 0x7d, 0xcb, 0xc3, 0x0a, 0xf1, 0x8b, 0xcc, 0x79, 0xa8, 0x52, 0x64, 0x83, 0x43, 0x98, 0xc7, 0x2f, 0xa2, 0xbb, 0x16, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1094_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1094_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x63, 0x4b, 0xfe, 0x18, 0x00, 0x78, 0x6b, 0x02, 0x56, 0xe9, 0x0a, 0xc2, 0xde, 0x27, 0x2f, 0x41, 0xc8, 0x5e, 0x09, 0x76, 0xc0, 0xca, 0xa1, 0x69, 0x1b, 0xd8, 0x35, 0xa5, 0xa4, 0x44, 0xb1, 0xed, 0x17, 0x05, 0xa0, 0x36, 0x1a, 0xe6, 0xee, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1094 = { .name = "ecdsa_brainpoolp320r1_sha384_1094", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1094_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1094_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1094_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 184 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1095 for ECDSA, tcId is 185 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1095_pubkey[] = { 0x1c, 0x01, 0x3b, 0x3a, 0x32, 0x60, 0xcc, 0xfb, 0x53, 0xe3, 0xf6, 0xce, 0x93, 0xe6, 0x98, 0x48, 0x65, 0xdc, 0x8e, 0x12, 0x93, 0xe9, 0x23, 0x01, 0xf4, 0xcb, 0x3a, 0x55, 0x4b, 0xd5, 0xda, 0x8a, 0x53, 0xee, 0x10, 0x1b, 0x3e, 0x1a, 0x30, 0x09, 0x97, 0xd2, 0x90, 0x1e, 0x26, 0x72, 0x93, 0x03, 0xe1, 0xcb, 0x93, 0xa8, 0xb7, 0x2d, 0xc2, 0xaf, 0xc9, 0x0f, 0xf5, 0xb4, 0x4f, 0xd5, 0xb6, 0x62, 0x44, 0x55, 0x48, 0x79, 0x74, 0xed, 0x71, 0xc7, 0x83, 0x3e, 0xff, 0x03, 0xcc, 0x12, 0x8d, 0x0c, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1095_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1095_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xc6, 0x97, 0xfc, 0x30, 0x00, 0xf0, 0xd6, 0x04, 0xad, 0xd2, 0x15, 0x85, 0xbc, 0x4e, 0x5e, 0x83, 0x90, 0xbc, 0x12, 0xed, 0x81, 0x95, 0x42, 0xd2, 0x37, 0xb0, 0x6b, 0x4b, 0x48, 0x89, 0x63, 0xda, 0x2e, 0x0b, 0x40, 0x6c, 0x35, 0xcd, 0xdc, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1095 = { .name = "ecdsa_brainpoolp320r1_sha384_1095", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1095_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1095_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1095_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 185 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1096 for ECDSA, tcId is 186 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1096_pubkey[] = { 0x62, 0x4b, 0xec, 0x45, 0x20, 0xe6, 0x04, 0x4a, 0xbe, 0xd1, 0xee, 0xe4, 0x96, 0x46, 0x68, 0x77, 0x51, 0x81, 0x46, 0x4c, 0x5d, 0x6b, 0xf5, 0xa8, 0xb5, 0x39, 0xf1, 0x15, 0x6f, 0x32, 0x48, 0xc0, 0x22, 0x71, 0xbf, 0x94, 0x25, 0xb9, 0x66, 0xb5, 0x47, 0xf4, 0x06, 0xbc, 0xc1, 0x43, 0x22, 0x6d, 0x81, 0x4c, 0xdb, 0x98, 0x8d, 0x76, 0x41, 0x2a, 0xd1, 0x86, 0xbd, 0xee, 0xb8, 0x69, 0xad, 0x78, 0xa3, 0x2f, 0xe8, 0x7c, 0x76, 0xf2, 0x54, 0x54, 0x47, 0xdd, 0xf8, 0xfb, 0xd0, 0x43, 0x08, 0x11, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1096_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1096_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x56, 0x85, 0xb3, 0x27, 0xca, 0xac, 0xf1, 0x4f, 0x23, 0x7e, 0xa7, 0xe9, 0xc8, 0x73, 0xad, 0x5f, 0x5f, 0x8a, 0x4c, 0xbe, 0x8b, 0xd0, 0xd1, 0x98, 0x26, 0x40, 0x72, 0x28, 0xfe, 0x47, 0xbc, 0xdd, 0xbe, 0x7f, 0x8b, 0x47, 0x0b, 0xef, 0x37, 0x91, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1096 = { .name = "ecdsa_brainpoolp320r1_sha384_1096", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1096_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1096_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1096_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 186 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1097 for ECDSA, tcId is 187 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1097_pubkey[] = { 0x1b, 0x2b, 0x27, 0x38, 0xe3, 0x05, 0x5d, 0x15, 0x96, 0xf6, 0x41, 0x76, 0xcf, 0x0a, 0xc3, 0x81, 0xb3, 0xa8, 0x17, 0x8a, 0x2f, 0x02, 0x14, 0x03, 0x35, 0x02, 0x18, 0xfa, 0x18, 0xf9, 0xf8, 0x60, 0xc1, 0xbb, 0xa3, 0x9f, 0xc5, 0x24, 0xbc, 0x82, 0x09, 0xfb, 0xaf, 0xca, 0x1a, 0xfc, 0x5a, 0xf7, 0x59, 0x8b, 0x87, 0x8d, 0x69, 0xcb, 0x87, 0x5b, 0xe0, 0xd3, 0x9f, 0x41, 0xff, 0x01, 0xb0, 0x93, 0x88, 0x69, 0x3e, 0xb3, 0x10, 0xad, 0xc9, 0xd4, 0x83, 0x6e, 0x22, 0x6c, 0x23, 0x67, 0x7e, 0x51, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1097_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1097_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xa2, 0xc1, 0xf8, 0x40, 0x88, 0x12, 0x0f, 0xce, 0x85, 0xfe, 0xcf, 0x81, 0xf0, 0xec, 0xc0, 0x07, 0x29, 0xf4, 0x19, 0x9e, 0xbb, 0xa0, 0xd5, 0xb5, 0xed, 0xa1, 0x90, 0x00, 0x10, 0x00, 0xb4, 0x31, 0x68, 0xdb, 0x25, 0x4b, 0x8e, 0xf3, 0x2a, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1097 = { .name = "ecdsa_brainpoolp320r1_sha384_1097", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1097_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1097_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1097_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 187 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1098 for ECDSA, tcId is 188 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1098_pubkey[] = { 0x40, 0x90, 0x2b, 0xf6, 0xb2, 0x39, 0xd2, 0xf3, 0x58, 0x82, 0x60, 0xe9, 0xd7, 0xf5, 0x12, 0x25, 0x3f, 0xa4, 0x4f, 0x30, 0x8a, 0x0a, 0xb8, 0x1d, 0xff, 0x05, 0xb8, 0xfa, 0x2e, 0x25, 0x81, 0x4d, 0x65, 0xc2, 0x01, 0x8d, 0x49, 0x39, 0x0a, 0xae, 0x01, 0x6f, 0x8a, 0xe5, 0x69, 0x19, 0x38, 0x40, 0x2a, 0xdc, 0x0f, 0xfa, 0x29, 0xbb, 0x87, 0xef, 0x0a, 0xf0, 0xec, 0xf3, 0xcd, 0x44, 0x6d, 0x97, 0xc3, 0xe8, 0xd1, 0x2b, 0x3b, 0x09, 0xeb, 0x78, 0x90, 0x9c, 0x1b, 0x91, 0xb1, 0xb8, 0x78, 0x5f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1098_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1098_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x71, 0x1f, 0x6d, 0x0a, 0xbc, 0xe9, 0x6f, 0xe7, 0xf5, 0xbe, 0xd2, 0xca, 0x46, 0x00, 0xa0, 0x21, 0xfd, 0xda, 0x9a, 0x8c, 0x92, 0x2f, 0xb0, 0xe1, 0x0f, 0x18, 0x0f, 0x97, 0xfa, 0x2c, 0xc8, 0x4d, 0xd7, 0x85, 0xc7, 0x1e, 0x6c, 0x41, 0xdb, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1098 = { .name = "ecdsa_brainpoolp320r1_sha384_1098", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1098_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1098_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1098_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 188 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1099 for ECDSA, tcId is 189 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1099_pubkey[] = { 0x72, 0x65, 0x33, 0xe2, 0x67, 0x73, 0xac, 0x72, 0x0a, 0x11, 0x5b, 0x02, 0xde, 0x89, 0xac, 0x15, 0x96, 0x66, 0x77, 0xe2, 0x39, 0xb7, 0xc5, 0x77, 0xa1, 0xc1, 0x5b, 0x81, 0x02, 0x7b, 0x1f, 0xeb, 0x73, 0xe6, 0x73, 0x60, 0x1e, 0x21, 0x1a, 0xa9, 0x2a, 0xcc, 0xb5, 0x85, 0xbc, 0x06, 0xcc, 0x27, 0x4b, 0x61, 0xc9, 0xe6, 0x14, 0x74, 0x6e, 0xdd, 0x24, 0x8d, 0x1c, 0xcc, 0xf8, 0xd8, 0xb1, 0xab, 0x4b, 0xc1, 0x5c, 0xc5, 0x8c, 0xdf, 0x11, 0x60, 0x65, 0xce, 0x97, 0x67, 0xf2, 0xa3, 0x22, 0x3d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1099_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1099_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x02, 0xa6, 0xeb, 0x40, 0x84, 0x43, 0xd2, 0x4e, 0x96, 0xbe, 0x4c, 0xa0, 0x27, 0x84, 0x42, 0xa8, 0xa4, 0x26, 0x08, 0x7f, 0x9b, 0xeb, 0x03, 0xff, 0xe5, 0x52, 0x61, 0x62, 0xbf, 0x1d, 0xc3, 0x04, 0x34, 0xcf, 0x7e, 0xa7, 0x95, 0x74, 0xb1, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1099 = { .name = "ecdsa_brainpoolp320r1_sha384_1099", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1099_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1099_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1099_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 189 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1100 for ECDSA, tcId is 190 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1100_pubkey[] = { 0x53, 0xc3, 0xda, 0x4d, 0xe1, 0x4f, 0x7d, 0x35, 0x77, 0x5f, 0x9b, 0xec, 0xa6, 0xd5, 0x3e, 0xe7, 0x8d, 0xac, 0x73, 0xcd, 0x3f, 0x18, 0xc6, 0xfb, 0xf7, 0x09, 0xb4, 0xff, 0xa7, 0xdd, 0x3e, 0x70, 0xb4, 0x36, 0x40, 0x9b, 0x9b, 0x28, 0x5d, 0x1c, 0x2a, 0x5b, 0x60, 0xe4, 0x57, 0xe5, 0x84, 0x22, 0xc9, 0x59, 0x14, 0x2b, 0x5e, 0xcf, 0xf2, 0x36, 0xdf, 0xd7, 0x6c, 0x99, 0xc3, 0x01, 0x8c, 0xea, 0x90, 0x40, 0x58, 0x09, 0x9a, 0x13, 0x64, 0x7d, 0xb0, 0x88, 0x98, 0xcf, 0xd0, 0x50, 0x9e, 0x84, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1100_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1100_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xb6, 0xba, 0x1a, 0xec, 0xd2, 0x40, 0xde, 0xbe, 0x77, 0x21, 0x3a, 0x42, 0x28, 0xb1, 0x25, 0x60, 0x36, 0x71, 0xc9, 0xd5, 0x14, 0x7b, 0x6c, 0x0b, 0x36, 0xdd, 0x23, 0xe4, 0x2b, 0x7c, 0xb5, 0x07, 0x8a, 0x1b, 0x8f, 0xdf, 0x1b, 0x98, 0xb9, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1100 = { .name = "ecdsa_brainpoolp320r1_sha384_1100", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1100_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1100_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1100_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 190 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1101 for ECDSA, tcId is 191 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1101_pubkey[] = { 0xcd, 0x24, 0xae, 0x7f, 0x75, 0x23, 0xad, 0xf8, 0x59, 0xdb, 0x92, 0xe5, 0x1d, 0x48, 0x74, 0x6b, 0x8b, 0x2f, 0x86, 0x86, 0x20, 0x89, 0x8a, 0x9c, 0x42, 0xf8, 0xba, 0xe8, 0x17, 0x3e, 0x36, 0x46, 0xf5, 0x86, 0xfd, 0x81, 0x87, 0x12, 0x43, 0x0e, 0x55, 0xb1, 0x2d, 0x59, 0xf7, 0x34, 0x41, 0x68, 0xf7, 0x96, 0xfe, 0x59, 0xc0, 0x26, 0xea, 0xaa, 0x13, 0x97, 0x45, 0xa8, 0xac, 0xe9, 0x7d, 0xf1, 0xd5, 0xc6, 0xbc, 0xc2, 0x1f, 0x0c, 0xfa, 0x68, 0x60, 0xf9, 0xc8, 0xc7, 0x5f, 0x39, 0x16, 0x29, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1101_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1101_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x95, 0x7b, 0x38, 0x3b, 0xa1, 0xce, 0xbf, 0x5c, 0xa5, 0x79, 0xef, 0x6e, 0xd1, 0x00, 0x27, 0x98, 0x8f, 0x84, 0x24, 0xf4, 0x2f, 0xfb, 0xea, 0x2e, 0x51, 0xb3, 0x34, 0x0d, 0xf9, 0xf8, 0xc3, 0xc6, 0x0b, 0x55, 0x8d, 0x6d, 0xc2, 0xdf, 0x10, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1101 = { .name = "ecdsa_brainpoolp320r1_sha384_1101", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1101_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1101_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1101_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 191 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1102 for ECDSA, tcId is 192 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1102_pubkey[] = { 0x4d, 0xb4, 0x60, 0x20, 0x99, 0x72, 0xc8, 0xe9, 0xc3, 0x65, 0x11, 0x95, 0x46, 0xac, 0x45, 0x7a, 0xdd, 0x15, 0x7f, 0x0c, 0x4d, 0x2b, 0x3c, 0xd6, 0x5c, 0x63, 0x5d, 0xca, 0xec, 0xa6, 0x17, 0x02, 0x9c, 0xab, 0xf7, 0x5c, 0x06, 0x10, 0x1b, 0xb6, 0x9e, 0xf8, 0xb7, 0x62, 0x6e, 0x6b, 0x2f, 0x98, 0x45, 0xb0, 0x08, 0x6d, 0x2a, 0x96, 0x40, 0x18, 0xb9, 0xb2, 0x5e, 0xb8, 0xdb, 0x42, 0x6b, 0xc9, 0x06, 0x94, 0xcc, 0x61, 0x4b, 0x76, 0x02, 0xb1, 0xfd, 0x60, 0x87, 0xa9, 0xa7, 0x1c, 0xbf, 0x1f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1102_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1102_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x98, 0xff, 0x1d, 0xb1, 0xb9, 0xaf, 0xfa, 0x33, 0xa2, 0xe5, 0x3c, 0x68, 0x4d, 0x3f, 0x07, 0x61, 0x17, 0x72, 0x40, 0x5e, 0x8c, 0x20, 0x0f, 0x2a, 0xf2, 0xaf, 0xa9, 0xe5, 0x3c, 0x6e, 0x8e, 0xf3, 0x0c, 0xc1, 0x43, 0xb3, 0xf5, 0xff, 0x7f, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1102 = { .name = "ecdsa_brainpoolp320r1_sha384_1102", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1102_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1102_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1102_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 192 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1103 for ECDSA, tcId is 193 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1103_pubkey[] = { 0x3e, 0x7a, 0xb8, 0x50, 0x84, 0x0d, 0x75, 0x98, 0x7d, 0x33, 0x83, 0x7e, 0xad, 0x46, 0x49, 0x9c, 0xe4, 0x33, 0xf3, 0xfc, 0xe6, 0x73, 0x83, 0xb2, 0xe3, 0x25, 0xdd, 0x2f, 0xc7, 0xe0, 0xf5, 0x00, 0x76, 0x9c, 0xbb, 0x67, 0xb4, 0x55, 0x0a, 0x28, 0xc3, 0x03, 0x14, 0x48, 0x7a, 0x87, 0x09, 0x47, 0x50, 0x33, 0x44, 0x99, 0xdb, 0xfb, 0xeb, 0x2d, 0x5c, 0xb9, 0x76, 0xee, 0x2d, 0x47, 0x99, 0x73, 0x21, 0x59, 0x7a, 0x41, 0x12, 0x4a, 0x03, 0x8f, 0xe8, 0x67, 0xbe, 0x0e, 0xf6, 0x68, 0xc4, 0xce, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1103_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1103_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5e, 0x9f, 0xf4, 0x43, 0x3c, 0xa3, 0xa4, 0xaf, 0x64, 0x8e, 0x00, 0x71, 0xc8, 0x7c, 0x2e, 0x5c, 0x35, 0x54, 0xb1, 0x17, 0x61, 0xb1, 0x0b, 0xb2, 0xb8, 0x17, 0x25, 0x02, 0x8a, 0x56, 0xc4, 0xfc, 0x92, 0xf1, 0x32, 0x0c, 0xa7, 0x39, 0x6c, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1103 = { .name = "ecdsa_brainpoolp320r1_sha384_1103", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1103_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1103_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1103_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 193 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1104 for ECDSA, tcId is 194 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1104_pubkey[] = { 0x7a, 0xcc, 0x91, 0x99, 0x34, 0xb0, 0xfd, 0x90, 0x01, 0x1c, 0xd9, 0x6f, 0x59, 0xdd, 0xba, 0x52, 0xe1, 0x20, 0x94, 0xda, 0xc1, 0x8a, 0x2c, 0xad, 0xcb, 0x03, 0xa0, 0xf3, 0x1a, 0xc7, 0x2d, 0x3f, 0xd5, 0x98, 0x4a, 0x11, 0xe9, 0x22, 0x0f, 0x8c, 0x06, 0x29, 0xbc, 0x5f, 0x3f, 0x0d, 0xab, 0xbd, 0x3f, 0xdd, 0x30, 0xf4, 0x7a, 0x0a, 0x5b, 0xea, 0x30, 0x52, 0x89, 0x2f, 0x8e, 0x50, 0xa4, 0x03, 0x3b, 0xe4, 0x79, 0x5b, 0x32, 0xc6, 0x67, 0x1d, 0x14, 0x1b, 0x47, 0x30, 0x80, 0xe5, 0x79, 0x11, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1104_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1104_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xc7, 0x6c, 0xe5, 0x35, 0x60, 0x16, 0x3f, 0x15, 0x7b, 0x11, 0xe4, 0xd0, 0x5c, 0x61, 0x54, 0x0a, 0x5d, 0xf6, 0xb8, 0x24, 0x1c, 0xbd, 0x3b, 0xa7, 0xd9, 0x11, 0xa7, 0x54, 0x1e, 0xec, 0x55, 0xe9, 0x86, 0xeb, 0xf8, 0x11, 0xae, 0x50, 0xa8, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1104 = { .name = "ecdsa_brainpoolp320r1_sha384_1104", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1104_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1104_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1104_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 194 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1105 for ECDSA, tcId is 195 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1105_pubkey[] = { 0x12, 0xc1, 0x63, 0xfe, 0x25, 0xcb, 0x79, 0xad, 0x59, 0xc7, 0x6b, 0x52, 0x80, 0xdc, 0x67, 0x06, 0xa4, 0x2c, 0x58, 0x59, 0x62, 0x30, 0xbf, 0x7b, 0xa7, 0x20, 0x6e, 0x6c, 0xe2, 0xb4, 0x67, 0xe1, 0xb7, 0xa7, 0x06, 0x3e, 0x59, 0xb0, 0xbe, 0xd6, 0xcc, 0xbe, 0xaf, 0x22, 0xac, 0xcb, 0x1a, 0xc4, 0x1e, 0xd4, 0x3a, 0xc7, 0x75, 0xb9, 0x7a, 0xea, 0x3a, 0x68, 0x8e, 0x2f, 0x09, 0x6c, 0x3a, 0x5e, 0x59, 0xf8, 0x68, 0xbc, 0x91, 0x9d, 0xa5, 0xce, 0x25, 0x2c, 0xf5, 0xd7, 0x12, 0xe7, 0xde, 0x40, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1105_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1105_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x42, 0x18, 0xa4, 0x51, 0x16, 0xea, 0x65, 0xb2, 0x83, 0xcc, 0x7d, 0x90, 0xa5, 0x10, 0xf0, 0x77, 0xb1, 0xb0, 0x9e, 0xdd, 0xbc, 0xfc, 0xa3, 0xe7, 0xd2, 0x89, 0x6b, 0x86, 0x9d, 0xd3, 0xba, 0x55, 0x6c, 0x4f, 0x10, 0x59, 0x0b, 0x0e, 0x08, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1105 = { .name = "ecdsa_brainpoolp320r1_sha384_1105", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1105_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1105_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1105_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 195 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1106 for ECDSA, tcId is 196 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1106_pubkey[] = { 0x69, 0x60, 0xbf, 0xcd, 0xdd, 0x00, 0x21, 0xfc, 0xb8, 0xa3, 0xd7, 0xaa, 0x85, 0xf9, 0x6c, 0xf3, 0x60, 0xa7, 0x11, 0x3e, 0x38, 0x24, 0x50, 0x85, 0x25, 0x02, 0x1f, 0x83, 0xe3, 0x08, 0x59, 0x89, 0xc3, 0x5e, 0x0c, 0x57, 0x72, 0x65, 0x03, 0x30, 0x5c, 0x12, 0x75, 0xb9, 0xd8, 0xb5, 0x19, 0x9d, 0x46, 0x1f, 0xcb, 0x9d, 0x34, 0xf8, 0x85, 0x7b, 0x65, 0xa1, 0x40, 0x46, 0x2f, 0xd5, 0xcd, 0xc7, 0xa3, 0x3e, 0x5c, 0xf7, 0xf4, 0xe2, 0xd0, 0x8a, 0x5a, 0x34, 0xd9, 0xae, 0x00, 0xb2, 0x93, 0x9a, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1106_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1106_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5e, 0x5f, 0x32, 0x42, 0x3b, 0xad, 0x36, 0x44, 0xbe, 0x71, 0x8d, 0x81, 0x95, 0x34, 0x13, 0x62, 0xc9, 0xcb, 0xa5, 0x2b, 0x33, 0x0f, 0x91, 0x3b, 0x15, 0x21, 0xaf, 0x6e, 0x5e, 0x3e, 0xb2, 0x06, 0x94, 0x21, 0xb0, 0x5d, 0xca, 0xc2, 0x99, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1106 = { .name = "ecdsa_brainpoolp320r1_sha384_1106", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1106_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1106_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1106_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 196 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1107 for ECDSA, tcId is 197 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1107_pubkey[] = { 0x66, 0xad, 0x2c, 0x26, 0x01, 0x23, 0x88, 0xc8, 0xb9, 0x04, 0x6a, 0x46, 0x6b, 0x87, 0xbd, 0x71, 0xb6, 0x4a, 0xb8, 0x1b, 0x54, 0xcf, 0xfc, 0x5a, 0x61, 0x1f, 0x4b, 0x75, 0x81, 0xad, 0x83, 0x65, 0xed, 0xd0, 0x8e, 0x6a, 0xfd, 0x4a, 0x52, 0xf6, 0x1a, 0x30, 0x66, 0xc0, 0xb3, 0xb7, 0x03, 0xdd, 0xce, 0x74, 0x62, 0x39, 0xa4, 0xd3, 0xdb, 0xf1, 0x93, 0x89, 0x45, 0xf1, 0x5e, 0xa9, 0x49, 0x7b, 0xbf, 0xc4, 0x5b, 0x38, 0x9e, 0x13, 0x03, 0x50, 0xb9, 0x94, 0x59, 0x22, 0xb8, 0x7c, 0xe3, 0x74, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1107_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1107_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xac, 0x07, 0xaa, 0xad, 0xe5, 0xc5, 0xfb, 0x2f, 0xe5, 0xa1, 0x8b, 0xbe, 0xfd, 0x26, 0x2e, 0x0e, 0x43, 0x9f, 0xd6, 0x8e, 0x0a, 0x31, 0x7d, 0xb0, 0x6f, 0xf4, 0xba, 0x62, 0x3a, 0x2a, 0x03, 0x11, 0x4e, 0xc5, 0xb6, 0xe0, 0x84, 0x17, 0x10, 0x58, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1107 = { .name = "ecdsa_brainpoolp320r1_sha384_1107", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1107_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1107_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1107_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 197 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1108 for ECDSA, tcId is 198 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1108_pubkey[] = { 0x0c, 0xfa, 0x6e, 0x38, 0x38, 0xd8, 0x11, 0x3a, 0x24, 0xd8, 0x7d, 0xb9, 0x74, 0x17, 0xd6, 0x8f, 0x00, 0xc4, 0x26, 0xe9, 0xb8, 0x55, 0x0d, 0x8a, 0x95, 0x1f, 0xed, 0x53, 0x15, 0x72, 0xe7, 0xcc, 0xa6, 0x6f, 0xfe, 0x0a, 0xe1, 0x76, 0xff, 0x0e, 0x31, 0x2f, 0xa0, 0x2e, 0x5c, 0xc7, 0x7c, 0x21, 0xf4, 0xa6, 0x63, 0x0e, 0x25, 0xbc, 0xb9, 0x87, 0xdc, 0x1e, 0xef, 0x14, 0xae, 0xc8, 0x0c, 0x15, 0xb9, 0xb2, 0x92, 0xe3, 0xac, 0xfb, 0x30, 0xbc, 0x2c, 0x04, 0x38, 0xf0, 0xa9, 0x83, 0x1c, 0x07, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1108_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1108_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x31, 0x1f, 0x6d, 0x0a, 0xbc, 0xe9, 0x6f, 0xe7, 0xf5, 0xbe, 0xd2, 0xca, 0x46, 0x00, 0xa0, 0x21, 0xfd, 0xda, 0x9a, 0x8c, 0x92, 0x2f, 0xb0, 0xe1, 0x0f, 0x18, 0x0f, 0x97, 0xfa, 0x2c, 0xc8, 0x4d, 0xd7, 0x85, 0xc7, 0x1e, 0x6c, 0x41, 0xdb, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1108 = { .name = "ecdsa_brainpoolp320r1_sha384_1108", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1108_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1108_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1108_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 198 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1109 for ECDSA, tcId is 199 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1109_pubkey[] = { 0x3d, 0xab, 0xbc, 0x36, 0xa4, 0x55, 0xba, 0x07, 0x43, 0x2d, 0xa1, 0xaa, 0x72, 0x39, 0xae, 0xfd, 0xef, 0xb7, 0x2a, 0xc0, 0x93, 0x13, 0xc3, 0xa7, 0xf3, 0x43, 0x98, 0x50, 0xf6, 0x02, 0x54, 0x3e, 0xb4, 0xaf, 0xfc, 0x5d, 0x82, 0x25, 0xb5, 0xee, 0xce, 0x48, 0xe2, 0xf6, 0x7e, 0x82, 0xd4, 0x48, 0xb3, 0xd8, 0xb9, 0xb0, 0xfc, 0x20, 0x08, 0x32, 0xa3, 0xd1, 0xac, 0x88, 0x05, 0x88, 0x72, 0x76, 0x2f, 0xcb, 0xf0, 0x27, 0xe9, 0xf5, 0x70, 0x5d, 0x8f, 0x58, 0x12, 0xe5, 0x07, 0xda, 0xe1, 0x25, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1109_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1109_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x62, 0x3e, 0xda, 0x15, 0x79, 0xd2, 0xdf, 0xcf, 0xeb, 0x7d, 0xa5, 0x94, 0x8c, 0x01, 0x40, 0x43, 0xfb, 0xb5, 0x35, 0x19, 0x24, 0x5f, 0x61, 0xc2, 0x1e, 0x30, 0x1f, 0x2f, 0xf4, 0x59, 0x90, 0x9b, 0xaf, 0x0b, 0x8e, 0x3c, 0xd8, 0x83, 0xb7, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1109 = { .name = "ecdsa_brainpoolp320r1_sha384_1109", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1109_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1109_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1109_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 199 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1110 for ECDSA, tcId is 200 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1110_pubkey[] = { 0x8a, 0x96, 0x58, 0xdc, 0x5f, 0x91, 0xaa, 0x57, 0x77, 0x06, 0xf1, 0xd9, 0x1d, 0x22, 0x52, 0xcb, 0x0d, 0x09, 0xf2, 0x05, 0x3e, 0x56, 0x11, 0x29, 0x10, 0x5c, 0x7f, 0x37, 0xdd, 0xb2, 0xf9, 0x72, 0xb3, 0x22, 0x4f, 0x12, 0xcf, 0x9e, 0x43, 0xfe, 0x08, 0x78, 0x2e, 0xc6, 0x10, 0x5f, 0x4c, 0x06, 0x58, 0x7e, 0xb1, 0xec, 0xec, 0xb2, 0xf4, 0xf4, 0xa0, 0x4e, 0x23, 0x63, 0x04, 0xdc, 0x75, 0xeb, 0x2e, 0xff, 0xf0, 0xbe, 0x66, 0xb9, 0x77, 0xfa, 0x80, 0x4a, 0xf7, 0x3b, 0xfc, 0xba, 0xc7, 0x8e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1110_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1110_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x93, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x13, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1110 = { .name = "ecdsa_brainpoolp320r1_sha384_1110", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1110_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1110_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1110_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 200 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1111 for ECDSA, tcId is 201 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1111_pubkey[] = { 0x06, 0xb4, 0x3b, 0xb9, 0x58, 0x7e, 0xe1, 0x58, 0xad, 0x57, 0x52, 0xd1, 0xad, 0x11, 0xf6, 0xf0, 0xf5, 0xe3, 0x16, 0xad, 0x21, 0x93, 0x7c, 0xdd, 0x92, 0x53, 0xf3, 0x84, 0x48, 0x57, 0xf0, 0xa2, 0x5e, 0x7b, 0x67, 0x7b, 0xbf, 0x99, 0x94, 0x44, 0x97, 0x05, 0x36, 0x23, 0x34, 0xbd, 0xce, 0xb6, 0x8a, 0xe6, 0xa5, 0x84, 0x64, 0x0c, 0x95, 0xcb, 0x10, 0x78, 0x9b, 0x19, 0x95, 0x3f, 0x5e, 0x11, 0x99, 0x73, 0xee, 0xd7, 0x35, 0x17, 0x7a, 0xab, 0xfc, 0xb2, 0x63, 0xfc, 0x8e, 0xf5, 0xef, 0x97, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1111_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1111_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5b, 0x5d, 0x0d, 0x76, 0x69, 0x20, 0x6f, 0x5f, 0x3b, 0x90, 0x9d, 0x21, 0x14, 0x58, 0x92, 0xb0, 0x1b, 0x38, 0xe4, 0xea, 0x8a, 0x3d, 0xb6, 0x05, 0x9b, 0x6e, 0x91, 0xf2, 0x15, 0xbe, 0x5a, 0x83, 0xc5, 0x0d, 0xc7, 0xef, 0x8d, 0xcc, 0x5c, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1111 = { .name = "ecdsa_brainpoolp320r1_sha384_1111", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1111_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1111_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1111_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 201 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1112 for ECDSA, tcId is 202 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1112_pubkey[] = { 0x56, 0x88, 0x03, 0xda, 0x07, 0x1e, 0x6b, 0x9f, 0x43, 0x80, 0xe3, 0x99, 0x54, 0xf2, 0xb0, 0xfc, 0x0f, 0x5b, 0xb5, 0x8a, 0x0f, 0x68, 0xb5, 0xd1, 0xa4, 0x2c, 0x7e, 0x90, 0x52, 0xec, 0xe2, 0xa0, 0xfc, 0x7a, 0xca, 0xdc, 0x0f, 0x42, 0x39, 0x99, 0xc0, 0x83, 0x67, 0x94, 0x54, 0x95, 0xd9, 0x33, 0xf2, 0x06, 0x92, 0x7a, 0x2b, 0x7f, 0x5b, 0x74, 0xb2, 0x2f, 0x97, 0x3a, 0x89, 0x83, 0x55, 0xaa, 0x2f, 0x7e, 0x29, 0x5e, 0x06, 0xef, 0x3a, 0x4f, 0x56, 0x15, 0x46, 0xdb, 0x97, 0xf7, 0x9a, 0xfa, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1112_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1112_sig[] = { 0x95, 0x63, 0xbd, 0x68, 0x54, 0x5c, 0xcd, 0x18, 0x5a, 0xe7, 0x24, 0xd8, 0xef, 0xcd, 0x4c, 0xc2, 0x32, 0x34, 0x93, 0x4e, 0xef, 0x10, 0xf2, 0x80, 0x79, 0x2b, 0x2f, 0x93, 0x0c, 0x97, 0xa6, 0xc1, 0xe0, 0x08, 0x29, 0xa8, 0xb9, 0x75, 0xb9, 0xee, 0xc5, 0xe7, 0x9c, 0x49, 0xab, 0xb1, 0x35, 0x12, 0x9f, 0x06, 0x36, 0xe1, 0x8e, 0x2e, 0x73, 0xbc, 0xed, 0x30, 0x85, 0x5d, 0xee, 0xba, 0x14, 0x77, 0xd9, 0x52, 0x1b, 0x33, 0xa3, 0x28, 0x65, 0x15, 0x51, 0x77, 0xd9, 0x46, 0xe1, 0xba, 0xbc, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1112 = { .name = "ecdsa_brainpoolp320r1_sha384_1112", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1112_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1112_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1112_sig, .siglen = 80, .result = 1, .comment = "point duplication during verification, tcId is 202 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1113 for ECDSA, tcId is 203 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1113_pubkey[] = { 0x56, 0x88, 0x03, 0xda, 0x07, 0x1e, 0x6b, 0x9f, 0x43, 0x80, 0xe3, 0x99, 0x54, 0xf2, 0xb0, 0xfc, 0x0f, 0x5b, 0xb5, 0x8a, 0x0f, 0x68, 0xb5, 0xd1, 0xa4, 0x2c, 0x7e, 0x90, 0x52, 0xec, 0xe2, 0xa0, 0xfc, 0x7a, 0xca, 0xdc, 0x0f, 0x42, 0x39, 0x99, 0x12, 0xda, 0xdf, 0x8b, 0xe2, 0x26, 0x76, 0x83, 0xef, 0x35, 0xe5, 0xe4, 0xa6, 0x82, 0x84, 0xf1, 0x47, 0x60, 0x38, 0x6c, 0x6d, 0x70, 0xb8, 0x45, 0x20, 0x14, 0x90, 0x8e, 0x71, 0xa4, 0xb1, 0xd9, 0xa6, 0xbe, 0xcb, 0xd6, 0x59, 0xbb, 0x93, 0x2d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1113_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1113_sig[] = { 0x95, 0x63, 0xbd, 0x68, 0x54, 0x5c, 0xcd, 0x18, 0x5a, 0xe7, 0x24, 0xd8, 0xef, 0xcd, 0x4c, 0xc2, 0x32, 0x34, 0x93, 0x4e, 0xef, 0x10, 0xf2, 0x80, 0x79, 0x2b, 0x2f, 0x93, 0x0c, 0x97, 0xa6, 0xc1, 0xe0, 0x08, 0x29, 0xa8, 0xb9, 0x75, 0xb9, 0xee, 0xc5, 0xe7, 0x9c, 0x49, 0xab, 0xb1, 0x35, 0x12, 0x9f, 0x06, 0x36, 0xe1, 0x8e, 0x2e, 0x73, 0xbc, 0xed, 0x30, 0x85, 0x5d, 0xee, 0xba, 0x14, 0x77, 0xd9, 0x52, 0x1b, 0x33, 0xa3, 0x28, 0x65, 0x15, 0x51, 0x77, 0xd9, 0x46, 0xe1, 0xba, 0xbc, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1113 = { .name = "ecdsa_brainpoolp320r1_sha384_1113", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1113_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1113_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1113_sig, .siglen = 80, .result = -1, .comment = "duplication bug, tcId is 203 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1114 for ECDSA, tcId is 204 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1114_pubkey[] = { 0x5d, 0x1a, 0x10, 0x01, 0x18, 0xbd, 0x36, 0x10, 0xf1, 0x0e, 0x13, 0xb5, 0xad, 0xcc, 0x7a, 0x90, 0xa3, 0x7f, 0x4f, 0x98, 0x8c, 0xfa, 0x4e, 0x22, 0xcc, 0xa7, 0x7e, 0x88, 0x44, 0x4b, 0x00, 0x21, 0x6d, 0xcf, 0xe5, 0xf6, 0x84, 0x18, 0xd3, 0x42, 0x5d, 0x5b, 0x88, 0xc9, 0xb8, 0xc9, 0x2b, 0x3d, 0xec, 0x7f, 0x7b, 0xcc, 0x68, 0x8a, 0x6d, 0x18, 0xe6, 0xcd, 0xeb, 0x91, 0x76, 0x15, 0x0d, 0x4b, 0x10, 0x62, 0xa8, 0x32, 0xc8, 0xa3, 0xbc, 0x37, 0x7f, 0x8d, 0x7e, 0x98, 0xb1, 0xdb, 0x0b, 0x9d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1114_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1114_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x2a, 0x46, 0x0e, 0x39, 0xa4, 0x8c, 0x0f, 0xf1, 0x93, 0x72, 0x7e, 0x79, 0x5d, 0x33, 0x93, 0x47, 0x98, 0x4f, 0xf6, 0x54, 0x57, 0xb6, 0x36, 0xed, 0x6f, 0x74, 0xd6, 0x27, 0xfc, 0x81, 0x44, 0xfb, 0x81, 0x50, 0x44, 0x45, 0x74, 0x27, 0x83, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1114 = { .name = "ecdsa_brainpoolp320r1_sha384_1114", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1114_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1114_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1114_sig, .siglen = 80, .result = -1, .comment = "comparison with point at infinity , tcId is 204 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1115 for ECDSA, tcId is 205 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1115_pubkey[] = { 0xcc, 0xa9, 0xac, 0x38, 0xde, 0x5b, 0x36, 0xcf, 0x79, 0xd8, 0xe4, 0x15, 0xcb, 0x72, 0x9e, 0x68, 0x5e, 0x0b, 0xbd, 0xaf, 0xe1, 0x61, 0xc5, 0xe7, 0xec, 0xfa, 0x41, 0x77, 0xe8, 0x26, 0xe8, 0x15, 0xd6, 0x65, 0x26, 0xaa, 0x5d, 0xaf, 0x32, 0x27, 0x9b, 0x77, 0x99, 0xbc, 0xef, 0xc6, 0xb5, 0xd8, 0xd0, 0x9f, 0xf1, 0xa0, 0x73, 0x9f, 0xd4, 0x23, 0x18, 0x81, 0x26, 0xf8, 0x0a, 0xf7, 0x03, 0x31, 0x4d, 0xa0, 0xd2, 0x6b, 0xa6, 0x71, 0x4a, 0xa1, 0x97, 0xa6, 0x58, 0x2c, 0x36, 0xb0, 0xf0, 0x5d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1115_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1115_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1115 = { .name = "ecdsa_brainpoolp320r1_sha384_1115", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1115_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1115_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1115_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 205 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1116 for ECDSA, tcId is 206 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1116_pubkey[] = { 0xcc, 0xea, 0xa1, 0x20, 0x3b, 0xdc, 0xbe, 0x15, 0xe2, 0x04, 0x34, 0xd6, 0x24, 0xf0, 0xed, 0x9a, 0xca, 0x81, 0xd4, 0xc8, 0x2f, 0x84, 0x0b, 0xba, 0x3a, 0x86, 0xc6, 0x75, 0x62, 0x62, 0xaa, 0x37, 0xef, 0xed, 0x62, 0xf5, 0xf1, 0xd0, 0x97, 0xf7, 0x45, 0x70, 0x57, 0xb9, 0x8d, 0x2b, 0x9e, 0xa6, 0xbd, 0x28, 0x58, 0x1d, 0x40, 0xac, 0x20, 0xfc, 0xc9, 0xd5, 0x36, 0xa1, 0x17, 0x76, 0x92, 0x03, 0x44, 0x7b, 0xf4, 0x1e, 0x10, 0xce, 0x4d, 0xa1, 0xad, 0x79, 0x4c, 0xa2, 0x0f, 0x8e, 0xe1, 0x46, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1116_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1116_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1116 = { .name = "ecdsa_brainpoolp320r1_sha384_1116", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1116_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1116_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1116_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 206 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1117 for ECDSA, tcId is 207 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1117_pubkey[] = { 0xcc, 0x9e, 0xd2, 0x5f, 0x13, 0xe9, 0x4a, 0x6e, 0xbd, 0x53, 0x1f, 0x3b, 0x14, 0x2f, 0xab, 0xc4, 0xed, 0x52, 0x2d, 0xc6, 0x12, 0x78, 0x61, 0x52, 0x88, 0x30, 0xc6, 0x78, 0x7d, 0x6e, 0xcf, 0xd4, 0xb7, 0x04, 0xe1, 0x77, 0x4e, 0x91, 0x18, 0xed, 0x68, 0xe4, 0xe1, 0x72, 0xf9, 0x3f, 0x1d, 0x5b, 0x8d, 0x78, 0x60, 0xfa, 0xe2, 0xc1, 0x15, 0xf4, 0xaa, 0x0d, 0xaa, 0xf6, 0xdf, 0x5c, 0xa3, 0x80, 0x9d, 0x79, 0xac, 0xfd, 0xb9, 0xed, 0x2b, 0xe1, 0x99, 0x95, 0x65, 0x8d, 0x2f, 0x44, 0xd2, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1117_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1117_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x2a, 0x46, 0x0e, 0x39, 0xa4, 0x8c, 0x0f, 0xf1, 0x93, 0x72, 0x7e, 0x79, 0x5d, 0x33, 0x93, 0x47, 0x98, 0x4f, 0xf6, 0x54, 0x57, 0xb6, 0x36, 0xed, 0x6f, 0x74, 0xd6, 0x27, 0xfc, 0x81, 0x44, 0xfb, 0x81, 0x50, 0x44, 0x45, 0x74, 0x27, 0x83, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1117 = { .name = "ecdsa_brainpoolp320r1_sha384_1117", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1117_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1117_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1117_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 207 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1118 for ECDSA, tcId is 208 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1118_pubkey[] = { 0x6a, 0x3c, 0xae, 0x0e, 0xdc, 0x84, 0x55, 0xae, 0x16, 0xb5, 0xee, 0xb6, 0x56, 0x96, 0x03, 0xbd, 0xae, 0xb5, 0x79, 0x36, 0x99, 0xe8, 0x5d, 0x37, 0x28, 0x57, 0xf1, 0x31, 0x9c, 0x70, 0xdd, 0x52, 0x5b, 0x1e, 0xa3, 0x0a, 0x0f, 0x5c, 0x7b, 0x44, 0x07, 0x55, 0x37, 0xcd, 0x82, 0x2d, 0x9e, 0xe2, 0xd0, 0xe7, 0xa4, 0x9c, 0x4c, 0x31, 0x41, 0x44, 0x5d, 0x01, 0xb7, 0x89, 0xbb, 0xca, 0xd0, 0x2e, 0xc4, 0x24, 0x9c, 0x2e, 0x23, 0x55, 0xd6, 0x1d, 0xb5, 0x58, 0x1d, 0xbd, 0xb3, 0x42, 0xc9, 0x93, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1118_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1118_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0xa9, 0x18, 0x38, 0xe6, 0x92, 0x30, 0x3f, 0xc6, 0x4d, 0xc9, 0xf9, 0xe5, 0x74, 0xce, 0x4d, 0x1e, 0x61, 0x3f, 0xd9, 0x51, 0x5e, 0xd8, 0xdb, 0xb5, 0xbd, 0xd3, 0x58, 0x9f, 0xf2, 0x05, 0x13, 0xee, 0x05, 0x41, 0x11, 0x15, 0xd0, 0x9e, 0x0f, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1118 = { .name = "ecdsa_brainpoolp320r1_sha384_1118", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1118_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1118_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1118_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 208 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1119 for ECDSA, tcId is 209 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1119_pubkey[] = { 0x4e, 0xfb, 0x51, 0x61, 0xca, 0x1a, 0x1e, 0xeb, 0x59, 0xa5, 0xfc, 0x39, 0xcd, 0x52, 0x1d, 0x40, 0xbd, 0x3e, 0x03, 0x45, 0x12, 0xfa, 0x2a, 0x1e, 0xaf, 0x3b, 0x7e, 0x92, 0xbb, 0x9e, 0x95, 0xc0, 0x6a, 0x4c, 0x72, 0x6c, 0xec, 0xcd, 0xf9, 0xbc, 0x6b, 0xfa, 0x80, 0x1b, 0x06, 0x71, 0x37, 0xf1, 0xb6, 0xb4, 0x50, 0x60, 0x41, 0x13, 0x0b, 0x4d, 0x40, 0x2d, 0x90, 0x08, 0x7a, 0xd0, 0x05, 0xe3, 0xf6, 0x52, 0xe1, 0xd9, 0x1c, 0x9d, 0x34, 0x4c, 0xd1, 0xee, 0xff, 0xff, 0x61, 0xd3, 0xa3, 0x06, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1119_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1119_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0xb5, 0x2c, 0x3c, 0xf7, 0x0a, 0x58, 0x44, 0x54, 0x77, 0xea, 0xb0, 0x51, 0x46, 0x4a, 0xc0, 0x57, 0x68, 0x32, 0x1f, 0xb2, 0x9c, 0x7a, 0xa2, 0x42, 0xb9, 0x19, 0x4c, 0xab, 0x5e, 0xbc, 0x4c, 0x35, 0xe1, 0x0e, 0xdb, 0x72, 0xcd, 0x3b, 0xa2, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1119 = { .name = "ecdsa_brainpoolp320r1_sha384_1119", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1119_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1119_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1119_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 209 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1120 for ECDSA, tcId is 210 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1120_pubkey[] = { 0x5f, 0x65, 0x86, 0x87, 0xe6, 0xa5, 0x42, 0xa9, 0x1d, 0x89, 0x3b, 0x48, 0x77, 0x6a, 0x86, 0xd5, 0x28, 0xfd, 0x39, 0x97, 0x81, 0xbb, 0xb9, 0x30, 0x5b, 0xe0, 0x79, 0x7e, 0x3a, 0x6f, 0x36, 0x11, 0x8a, 0xe1, 0x9e, 0x68, 0xdc, 0x16, 0x73, 0xf6, 0x67, 0x6e, 0x53, 0x6c, 0x78, 0x97, 0xa0, 0x00, 0x2f, 0x96, 0x64, 0x92, 0x96, 0x31, 0xf4, 0x18, 0xc4, 0x53, 0x7d, 0x23, 0x74, 0x92, 0x20, 0xc5, 0x0a, 0x32, 0x12, 0x1c, 0x43, 0x4d, 0xca, 0xd2, 0xa6, 0xcd, 0xc2, 0x03, 0xcd, 0x03, 0x5a, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1120_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1120_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x53, 0xbf, 0x06, 0xe4, 0x3f, 0xcc, 0x42, 0x36, 0xb2, 0xec, 0x0d, 0x88, 0x47, 0x13, 0x79, 0x05, 0x3f, 0x1f, 0x34, 0x37, 0x20, 0x7c, 0x5a, 0x75, 0xb0, 0x90, 0x36, 0xb1, 0xc4, 0x0f, 0xa8, 0xf3, 0x12, 0x82, 0x77, 0x89, 0x4a, 0x4c, 0x96, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1120 = { .name = "ecdsa_brainpoolp320r1_sha384_1120", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1120_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1120_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1120_sig, .siglen = 80, .result = 1, .comment = "extreme value for k, tcId is 210 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1121 for ECDSA, tcId is 211 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1121_pubkey[] = { 0x90, 0x53, 0x7a, 0x68, 0x27, 0xa2, 0x50, 0x60, 0x27, 0x3d, 0x44, 0xd4, 0x84, 0x6a, 0xea, 0x59, 0x66, 0x82, 0xdf, 0x0a, 0x59, 0xd0, 0xff, 0xe7, 0x9b, 0xe2, 0xa1, 0xeb, 0xe9, 0x18, 0x70, 0x3c, 0xab, 0xfa, 0xc6, 0x4d, 0xa5, 0xe5, 0x91, 0x00, 0x33, 0x09, 0x18, 0x0d, 0x9d, 0xa5, 0xe7, 0x82, 0x37, 0xb9, 0x54, 0x03, 0xc5, 0x2f, 0x3c, 0xee, 0xe5, 0x03, 0x06, 0x7b, 0x67, 0x27, 0x15, 0xe9, 0x7d, 0x8b, 0x63, 0x69, 0x34, 0x26, 0x84, 0xa7, 0x2f, 0x46, 0x76, 0x98, 0x74, 0x1b, 0x1a, 0x1f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1121_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1121_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1121 = { .name = "ecdsa_brainpoolp320r1_sha384_1121", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1121_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1121_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1121_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 211 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1122 for ECDSA, tcId is 212 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1122_pubkey[] = { 0xa8, 0x1c, 0xcb, 0xf4, 0xfc, 0x44, 0x57, 0x03, 0x3b, 0xd4, 0x9c, 0xea, 0xc8, 0xfa, 0x52, 0xe4, 0x59, 0x40, 0x07, 0x30, 0xb8, 0x77, 0x30, 0x5b, 0xe0, 0x41, 0x81, 0x53, 0xd2, 0x78, 0xd3, 0x0b, 0x59, 0x73, 0x77, 0x7a, 0x7d, 0xd1, 0xc2, 0xc1, 0x75, 0x44, 0xff, 0x1b, 0x76, 0x20, 0x8e, 0x84, 0x10, 0x53, 0xec, 0xae, 0xf7, 0xa5, 0x86, 0x9e, 0x92, 0xda, 0x08, 0xc5, 0xc4, 0xc3, 0xd0, 0xa1, 0x67, 0xd5, 0x68, 0x5e, 0xb7, 0x21, 0xd6, 0x20, 0x33, 0x9c, 0xc9, 0xb0, 0x01, 0x49, 0x83, 0x8e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1122_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1122_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1122 = { .name = "ecdsa_brainpoolp320r1_sha384_1122", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1122_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1122_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1122_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 212 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1123 for ECDSA, tcId is 213 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1123_pubkey[] = { 0xba, 0x16, 0x00, 0x89, 0x32, 0x7c, 0xf8, 0xba, 0x16, 0x3e, 0xef, 0xa4, 0x76, 0xa4, 0xea, 0xfd, 0x0f, 0x6c, 0xe9, 0xd5, 0x52, 0x92, 0xf6, 0x72, 0x4d, 0x02, 0x0f, 0x0e, 0xfa, 0xc5, 0x4b, 0xf6, 0x84, 0xf9, 0xd5, 0xf5, 0x69, 0x5f, 0x89, 0xc2, 0xb4, 0xde, 0x70, 0xdc, 0x4a, 0xb2, 0x65, 0x76, 0x18, 0x27, 0x32, 0x3d, 0xa3, 0xb2, 0xb0, 0x55, 0xac, 0x11, 0x87, 0xfc, 0x53, 0x41, 0xe4, 0x55, 0x5e, 0xbc, 0x6f, 0x69, 0x93, 0xb4, 0xc3, 0xfd, 0xd8, 0x98, 0x63, 0xfc, 0x55, 0xea, 0x38, 0xb4, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1123_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1123_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x2a, 0x46, 0x0e, 0x39, 0xa4, 0x8c, 0x0f, 0xf1, 0x93, 0x72, 0x7e, 0x79, 0x5d, 0x33, 0x93, 0x47, 0x98, 0x4f, 0xf6, 0x54, 0x57, 0xb6, 0x36, 0xed, 0x6f, 0x74, 0xd6, 0x27, 0xfc, 0x81, 0x44, 0xfb, 0x81, 0x50, 0x44, 0x45, 0x74, 0x27, 0x83, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1123 = { .name = "ecdsa_brainpoolp320r1_sha384_1123", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1123_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1123_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1123_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 213 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1124 for ECDSA, tcId is 214 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1124_pubkey[] = { 0x4a, 0x5c, 0xf4, 0x47, 0x55, 0x0f, 0x0f, 0xf2, 0xef, 0xa1, 0x93, 0xc3, 0xe1, 0x85, 0xdb, 0x60, 0x4f, 0xcf, 0xd7, 0xde, 0x5c, 0x47, 0xa5, 0x9a, 0x39, 0x2d, 0xa0, 0xc7, 0x57, 0x2f, 0x06, 0x10, 0x38, 0xc6, 0xaf, 0x5a, 0xfc, 0xfa, 0x9b, 0xd5, 0x30, 0xb7, 0x68, 0x2b, 0x82, 0x01, 0x0c, 0x39, 0x33, 0x4b, 0xa2, 0xed, 0xec, 0xf0, 0xa2, 0x3b, 0xca, 0x09, 0xe8, 0x10, 0xd7, 0x45, 0xbd, 0xf7, 0x3e, 0x44, 0x5e, 0x80, 0xac, 0xe0, 0xe5, 0x39, 0x9f, 0xa2, 0x61, 0x02, 0xcb, 0x3f, 0xae, 0xe6, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1124_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1124_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xa9, 0x18, 0x38, 0xe6, 0x92, 0x30, 0x3f, 0xc6, 0x4d, 0xc9, 0xf9, 0xe5, 0x74, 0xce, 0x4d, 0x1e, 0x61, 0x3f, 0xd9, 0x51, 0x5e, 0xd8, 0xdb, 0xb5, 0xbd, 0xd3, 0x58, 0x9f, 0xf2, 0x05, 0x13, 0xee, 0x05, 0x41, 0x11, 0x15, 0xd0, 0x9e, 0x0f, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1124 = { .name = "ecdsa_brainpoolp320r1_sha384_1124", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1124_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1124_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1124_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 214 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1125 for ECDSA, tcId is 215 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1125_pubkey[] = { 0x5d, 0x3f, 0xef, 0x1b, 0x96, 0xdb, 0xc8, 0xca, 0x93, 0x30, 0x50, 0x8a, 0xd4, 0xce, 0xd4, 0x91, 0xe6, 0x27, 0xeb, 0x67, 0xcb, 0xa8, 0xc6, 0xb1, 0x53, 0x79, 0x37, 0x49, 0x8e, 0xe3, 0x02, 0x1b, 0x45, 0xca, 0x67, 0x59, 0x11, 0x7d, 0x89, 0xc4, 0xad, 0x2b, 0x69, 0x9e, 0x3e, 0xf9, 0x51, 0x6f, 0xff, 0x2e, 0xd2, 0xe1, 0x34, 0x93, 0x1c, 0x96, 0xd2, 0x8d, 0x3e, 0x14, 0xdd, 0x51, 0xc5, 0xb8, 0x75, 0x89, 0xa8, 0xfa, 0x88, 0xaf, 0x25, 0x29, 0xb8, 0xca, 0xa0, 0xf7, 0x85, 0xce, 0x20, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1125_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1125_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xb5, 0x2c, 0x3c, 0xf7, 0x0a, 0x58, 0x44, 0x54, 0x77, 0xea, 0xb0, 0x51, 0x46, 0x4a, 0xc0, 0x57, 0x68, 0x32, 0x1f, 0xb2, 0x9c, 0x7a, 0xa2, 0x42, 0xb9, 0x19, 0x4c, 0xab, 0x5e, 0xbc, 0x4c, 0x35, 0xe1, 0x0e, 0xdb, 0x72, 0xcd, 0x3b, 0xa2, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1125 = { .name = "ecdsa_brainpoolp320r1_sha384_1125", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1125_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1125_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1125_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 215 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1126 for ECDSA, tcId is 216 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1126_pubkey[] = { 0xa8, 0x33, 0x67, 0x02, 0xc1, 0x58, 0xdc, 0xae, 0x49, 0x5f, 0x1c, 0x9c, 0xd7, 0x20, 0xc3, 0x9f, 0x15, 0xc1, 0x23, 0xa6, 0x77, 0x50, 0xdc, 0xd7, 0x45, 0x20, 0xc3, 0x4c, 0xf6, 0x79, 0x07, 0xe4, 0x92, 0x20, 0xbc, 0xd0, 0x20, 0xcc, 0x3a, 0x60, 0x15, 0x1a, 0x43, 0x2e, 0xe3, 0xe2, 0x3a, 0x74, 0xc8, 0xb8, 0xa9, 0x8d, 0x8e, 0x7c, 0x67, 0x22, 0x16, 0xdf, 0x48, 0xd8, 0xa6, 0x0d, 0x3f, 0x59, 0x2f, 0x66, 0x73, 0x83, 0x0a, 0xc9, 0xec, 0xfb, 0xcd, 0x00, 0x55, 0x0d, 0xb7, 0xad, 0x5c, 0x62, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1126_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1126_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x53, 0xbf, 0x06, 0xe4, 0x3f, 0xcc, 0x42, 0x36, 0xb2, 0xec, 0x0d, 0x88, 0x47, 0x13, 0x79, 0x05, 0x3f, 0x1f, 0x34, 0x37, 0x20, 0x7c, 0x5a, 0x75, 0xb0, 0x90, 0x36, 0xb1, 0xc4, 0x0f, 0xa8, 0xf3, 0x12, 0x82, 0x77, 0x89, 0x4a, 0x4c, 0x96, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1126 = { .name = "ecdsa_brainpoolp320r1_sha384_1126", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1126_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1126_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1126_sig, .siglen = 80, .result = 1, .comment = "extreme value for k, tcId is 216 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1127 for ECDSA, tcId is 217 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1127_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x14, 0xfd, 0xd0, 0x55, 0x45, 0xec, 0x1c, 0xc8, 0xab, 0x40, 0x93, 0x24, 0x7f, 0x77, 0x27, 0x5e, 0x07, 0x43, 0xff, 0xed, 0x11, 0x71, 0x82, 0xea, 0xa9, 0xc7, 0x78, 0x77, 0xaa, 0xac, 0x6a, 0xc7, 0xd3, 0x52, 0x45, 0xd1, 0x69, 0x2e, 0x8e, 0xe1, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1127_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1127_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1127 = { .name = "ecdsa_brainpoolp320r1_sha384_1127", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1127_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1127_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1127_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 217 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1128 for ECDSA, tcId is 218 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1128_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x14, 0xfd, 0xd0, 0x55, 0x45, 0xec, 0x1c, 0xc8, 0xab, 0x40, 0x93, 0x24, 0x7f, 0x77, 0x27, 0x5e, 0x07, 0x43, 0xff, 0xed, 0x11, 0x71, 0x82, 0xea, 0xa9, 0xc7, 0x78, 0x77, 0xaa, 0xac, 0x6a, 0xc7, 0xd3, 0x52, 0x45, 0xd1, 0x69, 0x2e, 0x8e, 0xe1, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1128_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1128_sig[] = { 0xad, 0x0b, 0x66, 0x4f, 0x95, 0x59, 0xe2, 0x9e, 0x46, 0xfd, 0x4f, 0xd3, 0x90, 0xe7, 0x5a, 0xbe, 0xbf, 0x14, 0x99, 0x7d, 0x17, 0xa1, 0xa3, 0x30, 0x4c, 0x80, 0xe4, 0x51, 0xfc, 0x8f, 0x79, 0xbb, 0x7c, 0xff, 0x16, 0x8e, 0x17, 0xde, 0x6f, 0x22, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1128 = { .name = "ecdsa_brainpoolp320r1_sha384_1128", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1128_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1128_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1128_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 218 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1129 for ECDSA, tcId is 219 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1129_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xbe, 0x60, 0x76, 0xca, 0xf0, 0xd0, 0x32, 0xef, 0x35, 0xfb, 0xe5, 0x3a, 0x52, 0x8a, 0xb9, 0x07, 0xf2, 0x4b, 0xcf, 0xb9, 0xe5, 0x82, 0x8b, 0x04, 0xa5, 0xcb, 0x41, 0x74, 0xcd, 0xe7, 0x81, 0x61, 0x29, 0x81, 0xcc, 0xe0, 0x88, 0x84, 0x9f, 0x46, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1129_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1129_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1129 = { .name = "ecdsa_brainpoolp320r1_sha384_1129", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1129_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1129_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1129_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 219 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1130 for ECDSA, tcId is 220 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1130_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xbe, 0x60, 0x76, 0xca, 0xf0, 0xd0, 0x32, 0xef, 0x35, 0xfb, 0xe5, 0x3a, 0x52, 0x8a, 0xb9, 0x07, 0xf2, 0x4b, 0xcf, 0xb9, 0xe5, 0x82, 0x8b, 0x04, 0xa5, 0xcb, 0x41, 0x74, 0xcd, 0xe7, 0x81, 0x61, 0x29, 0x81, 0xcc, 0xe0, 0x88, 0x84, 0x9f, 0x46, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1130_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1130_sig[] = { 0xad, 0x0b, 0x66, 0x4f, 0x95, 0x59, 0xe2, 0x9e, 0x46, 0xfd, 0x4f, 0xd3, 0x90, 0xe7, 0x5a, 0xbe, 0xbf, 0x14, 0x99, 0x7d, 0x17, 0xa1, 0xa3, 0x30, 0x4c, 0x80, 0xe4, 0x51, 0xfc, 0x8f, 0x79, 0xbb, 0x7c, 0xff, 0x16, 0x8e, 0x17, 0xde, 0x6f, 0x22, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1130 = { .name = "ecdsa_brainpoolp320r1_sha384_1130", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1130_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1130_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1130_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 220 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1131 for ECDSA, tcId is 221 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1131_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1131_sig[] = { 0x9c, 0xf7, 0xf0, 0xd6, 0x0c, 0xc1, 0xfb, 0x2d, 0x4b, 0x3e, 0x78, 0xd5, 0xf8, 0x3b, 0x37, 0x4e, 0x17, 0xa4, 0xae, 0xbc, 0xcc, 0x6e, 0x72, 0x3f, 0x1a, 0xd3, 0x5b, 0xab, 0xb2, 0xac, 0xfb, 0x2b, 0x75, 0x53, 0x03, 0x89, 0x18, 0x93, 0x95, 0xf8, 0x00, 0x11, 0x10, 0xc5, 0xb8, 0xb8, 0xe5, 0xfa, 0x8d, 0xc7, 0x95, 0x2a, 0x7b, 0xf6, 0x20, 0x0b, 0xdd, 0xae, 0x6c, 0x1d, 0x66, 0x63, 0x9a, 0x07, 0xa4, 0xb6, 0x04, 0x6e, 0x00, 0xbf, 0xa7, 0xa2, 0xbd, 0x9d, 0x57, 0x77, 0xb8, 0x0c, 0x3a, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1131 = { .name = "ecdsa_brainpoolp320r1_sha384_1131", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1131_pubkey, .pubkeylen = 80, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp320r1_sha384_1131_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 221 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1132 for ECDSA, tcId is 222 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1132_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1132_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1132_sig[] = { 0x26, 0xfd, 0x69, 0x5e, 0xe1, 0xcc, 0x50, 0xc2, 0x66, 0x1c, 0x24, 0x34, 0xf8, 0x69, 0x95, 0x77, 0xaf, 0x18, 0x13, 0x04, 0xbc, 0xeb, 0x76, 0x90, 0xc5, 0x38, 0xb0, 0x34, 0x63, 0xdf, 0x24, 0x33, 0x43, 0x95, 0xe7, 0x91, 0xf6, 0x75, 0x0f, 0xf6, 0xb3, 0x22, 0x61, 0x8c, 0xd5, 0x0c, 0x6a, 0x7c, 0xff, 0xcb, 0x41, 0x9e, 0xc0, 0x5b, 0x67, 0xec, 0x6a, 0x11, 0x70, 0x88, 0xc7, 0x8d, 0x57, 0xce, 0xcd, 0xd2, 0x24, 0x90, 0x2d, 0x39, 0x18, 0x92, 0xca, 0x03, 0xe4, 0xbc, 0x1b, 0xd0, 0x46, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1132 = { .name = "ecdsa_brainpoolp320r1_sha384_1132", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1132_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1132_msg, .msglen = 3, .sig = ecdsa_brainpoolp320r1_sha384_1132_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 222 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1133 for ECDSA, tcId is 223 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1133_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1133_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1133_sig[] = { 0x7a, 0x31, 0xb7, 0x37, 0x5f, 0x92, 0x43, 0x69, 0xec, 0x12, 0xbc, 0x33, 0xb8, 0x34, 0x72, 0x6c, 0x95, 0x44, 0x4a, 0x4c, 0x26, 0x35, 0x57, 0x34, 0x4a, 0xfa, 0x73, 0x2c, 0xf4, 0x8a, 0x15, 0x5e, 0x71, 0xa6, 0xee, 0x7d, 0xe4, 0x2e, 0x91, 0xce, 0x24, 0xd3, 0xd7, 0x28, 0x61, 0xf4, 0xd2, 0xb5, 0x51, 0xc1, 0x0f, 0x02, 0x94, 0xd1, 0x6a, 0x3b, 0xf1, 0xd4, 0xee, 0x3e, 0x48, 0x44, 0x39, 0xb8, 0x04, 0xd0, 0x97, 0xde, 0xa2, 0xd7, 0xca, 0xce, 0x76, 0xad, 0xe1, 0x4a, 0xf1, 0x66, 0x33, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1133 = { .name = "ecdsa_brainpoolp320r1_sha384_1133", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1133_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1133_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1133_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 223 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1134 for ECDSA, tcId is 224 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1134_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1134_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1134_sig[] = { 0x24, 0x17, 0xeb, 0x10, 0xa5, 0x38, 0x92, 0x16, 0x21, 0x06, 0x66, 0x08, 0x24, 0x3f, 0xd6, 0x57, 0x4d, 0xe8, 0x4e, 0xf1, 0x28, 0x15, 0x20, 0xf0, 0x1e, 0xbe, 0x04, 0x44, 0xb4, 0x6a, 0x60, 0x7a, 0xb9, 0xed, 0xa8, 0xf3, 0x72, 0x17, 0x79, 0xa6, 0x8f, 0x1e, 0x2e, 0xa2, 0x94, 0x02, 0x8b, 0xae, 0xb7, 0x38, 0x18, 0x1e, 0x12, 0x8c, 0x86, 0xad, 0x55, 0xcb, 0x19, 0x45, 0x43, 0x6c, 0xf6, 0x9e, 0x09, 0x0c, 0x2f, 0x61, 0x59, 0xf6, 0xf2, 0x20, 0x11, 0xd7, 0x31, 0x73, 0x3b, 0x44, 0x33, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1134 = { .name = "ecdsa_brainpoolp320r1_sha384_1134", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1134_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1134_msg, .msglen = 20, .sig = ecdsa_brainpoolp320r1_sha384_1134_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 224 in file ecdsa_brainpoolP320r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1135 for ECDSA, tcId is 1 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1135_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1135_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1135_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x83, 0x3d, 0x66, 0x61, 0xb0, 0x57, 0x6d, 0x61, 0xa8, 0x0f, 0xfe, 0x4d, 0x32, 0x71, 0xc4, 0x3b, 0x2a, 0x56, 0xc1, 0x4b, 0x3b, 0xd9, 0x03, 0x05, 0x92, 0x3c, 0xcd, 0xcf, 0x7b, 0x3d, 0x98, 0x8c, 0x07, 0xeb, 0xb1, 0xc4, 0xcc, 0x67, 0x38, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1135 = { .name = "ecdsa_brainpoolp320r1_sha384_1135", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1135_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1135_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1135_sig, .siglen = 80, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1136 for ECDSA, tcId is 2 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1136_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1136_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1136_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1136 = { .name = "ecdsa_brainpoolp320r1_sha384_1136", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1136_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1136_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1136_sig, .siglen = 80, .result = 0, .comment = "Legacy:ASN encoding of r misses leading 0, tcId is 2 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1137 for ECDSA, tcId is 3 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1137_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1137_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1137_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1137 = { .name = "ecdsa_brainpoolp320r1_sha384_1137", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1137_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1137_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1137_sig, .siglen = 80, .result = 1, .comment = "valid, tcId is 3 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1138 for ECDSA, tcId is 4 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1138_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1138_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1138_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1138 = { .name = "ecdsa_brainpoolp320r1_sha384_1138", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1138_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1138_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1138_sig, .siglen = 80, .result = 0, .comment = "long form encoding of length of sequence, tcId is 4 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1139 for ECDSA, tcId is 5 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1139_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1139_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1139_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1139 = { .name = "ecdsa_brainpoolp320r1_sha384_1139", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1139_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1139_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1139_sig, .siglen = 80, .result = 0, .comment = "length of sequence contains leading 0, tcId is 5 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1140 for ECDSA, tcId is 68 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1140_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1140_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1140_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1140 = { .name = "ecdsa_brainpoolp320r1_sha384_1140", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1140_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1140_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1140_sig, .siglen = 80, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1141 for ECDSA, tcId is 69 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1141_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1141_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1141_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1141 = { .name = "ecdsa_brainpoolp320r1_sha384_1141", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1141_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1141_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1141_sig, .siglen = 80, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1142 for ECDSA, tcId is 70 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1142_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1142_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1142_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1142 = { .name = "ecdsa_brainpoolp320r1_sha384_1142", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1142_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1142_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1142_sig, .siglen = 80, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1143 for ECDSA, tcId is 71 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1143_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1143_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1143_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1143 = { .name = "ecdsa_brainpoolp320r1_sha384_1143", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1143_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1143_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1143_sig, .siglen = 80, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1144 for ECDSA, tcId is 93 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1144_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1144_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1144_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x00, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1144 = { .name = "ecdsa_brainpoolp320r1_sha384_1144", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1144_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1144_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1144_sig, .siglen = 82, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1145 for ECDSA, tcId is 94 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1145_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1145_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1145_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1145 = { .name = "ecdsa_brainpoolp320r1_sha384_1145", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1145_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1145_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1145_sig, .siglen = 82, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1146 for ECDSA, tcId is 95 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1146_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1146_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1146_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1146 = { .name = "ecdsa_brainpoolp320r1_sha384_1146", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1146_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1146_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1146_sig, .siglen = 80, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1147 for ECDSA, tcId is 96 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1147_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1147_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1147_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1147 = { .name = "ecdsa_brainpoolp320r1_sha384_1147", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1147_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1147_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1147_sig, .siglen = 80, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1148 for ECDSA, tcId is 98 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1148_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1148_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1148_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x05, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1148 = { .name = "ecdsa_brainpoolp320r1_sha384_1148", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1148_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1148_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1148_sig, .siglen = 82, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1149 for ECDSA, tcId is 99 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1149_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1149_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1149_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1149 = { .name = "ecdsa_brainpoolp320r1_sha384_1149", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1149_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1149_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1149_sig, .siglen = 82, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1150 for ECDSA, tcId is 114 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1150_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1150_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1150_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1150 = { .name = "ecdsa_brainpoolp320r1_sha384_1150", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1150_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1150_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1150_sig, .siglen = 80, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1151 for ECDSA, tcId is 115 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1151_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1151_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1151_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1151 = { .name = "ecdsa_brainpoolp320r1_sha384_1151", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1151_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1151_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1151_sig, .siglen = 80, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1152 for ECDSA, tcId is 118 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1152_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1152_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1152_sig[] = { 0x02, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1152 = { .name = "ecdsa_brainpoolp320r1_sha384_1152", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1152_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1152_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1152_sig, .siglen = 81, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1153 for ECDSA, tcId is 119 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1153_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1153_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1153_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x52, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1153 = { .name = "ecdsa_brainpoolp320r1_sha384_1153", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1153_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1153_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1153_sig, .siglen = 80, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1154 for ECDSA, tcId is 120 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1154_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1154_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1154_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0xee, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1154 = { .name = "ecdsa_brainpoolp320r1_sha384_1154", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1154_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1154_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1154_sig, .siglen = 80, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1155 for ECDSA, tcId is 121 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1155_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1155_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1155_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1155 = { .name = "ecdsa_brainpoolp320r1_sha384_1155", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1155_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1155_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1155_sig, .siglen = 80, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1156 for ECDSA, tcId is 122 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1156_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1156_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1156_sig[] = { 0x00, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1156 = { .name = "ecdsa_brainpoolp320r1_sha384_1156", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1156_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1156_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1156_sig, .siglen = 80, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1157 for ECDSA, tcId is 123 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1157_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1157_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1157_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1157 = { .name = "ecdsa_brainpoolp320r1_sha384_1157", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1157_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1157_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1157_sig, .siglen = 80, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1158 for ECDSA, tcId is 124 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1158_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1158_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1158_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x00, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1158 = { .name = "ecdsa_brainpoolp320r1_sha384_1158", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1158_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1158_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1158_sig, .siglen = 80, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1159 for ECDSA, tcId is 125 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1159_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1159_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1159_sig[] = { 0x00, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1159 = { .name = "ecdsa_brainpoolp320r1_sha384_1159", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1159_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1159_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1159_sig, .siglen = 81, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1160 for ECDSA, tcId is 126 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1160_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1160_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1160_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1160 = { .name = "ecdsa_brainpoolp320r1_sha384_1160", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1160_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1160_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1160_sig, .siglen = 80, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_brainpoolP320r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1161 for ECDSA, tcId is 129 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1161_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1161_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1161_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1161 = { .name = "ecdsa_brainpoolp320r1_sha384_1161", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1161_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1161_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1161_sig, .siglen = 80, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1162 for ECDSA, tcId is 130 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1162_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1162_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1162_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1162 = { .name = "ecdsa_brainpoolp320r1_sha384_1162", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1162_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1162_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1162_sig, .siglen = 80, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1163 for ECDSA, tcId is 131 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1163_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1163_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1163_sig[] = { 0x01, 0x59, 0x10, 0x03, 0x78, 0xa2, 0xb1, 0x90, 0x37, 0x7d, 0xcb, 0x3b, 0xd5, 0x31, 0xe2, 0x0c, 0x37, 0x8d, 0x10, 0x69, 0x31, 0xfc, 0x18, 0x3f, 0x70, 0x7d, 0xc9, 0xd0, 0x85, 0x76, 0xf8, 0xfb, 0x56, 0x61, 0x85, 0x59, 0x42, 0x20, 0xb8, 0xdd, 0x7f, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1163 = { .name = "ecdsa_brainpoolp320r1_sha384_1163", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1163_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1163_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1163_sig, .siglen = 81, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1164 for ECDSA, tcId is 132 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1164_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1164_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1164_sig[] = { 0xb2, 0x53, 0x75, 0x38, 0x35, 0x38, 0xf0, 0xc7, 0xbb, 0x52, 0x4b, 0x17, 0x8d, 0xde, 0x4b, 0x6b, 0x99, 0xf0, 0xc9, 0xe6, 0x8e, 0xfa, 0x1a, 0x2a, 0x23, 0x39, 0x72, 0xf5, 0x99, 0xec, 0x49, 0x83, 0x54, 0x62, 0xae, 0x8b, 0x97, 0x2d, 0xb7, 0x5d, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1164 = { .name = "ecdsa_brainpoolp320r1_sha384_1164", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1164_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1164_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1164_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1165 for ECDSA, tcId is 133 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1165_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1165_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1165_sig[] = { 0x7a, 0x4e, 0x43, 0xa7, 0x94, 0x0a, 0xbf, 0x80, 0x63, 0x71, 0x3c, 0x89, 0xa0, 0x1f, 0xd4, 0x2e, 0x6c, 0x7f, 0x66, 0x73, 0xba, 0x76, 0xd3, 0x32, 0xaf, 0x7e, 0x5e, 0x42, 0x77, 0x8d, 0x5d, 0x93, 0x25, 0x0b, 0xfc, 0x19, 0x24, 0x0c, 0xb5, 0x92, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1165 = { .name = "ecdsa_brainpoolp320r1_sha384_1165", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1165_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1165_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1165_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1166 for ECDSA, tcId is 134 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1166_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1166_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1166_sig[] = { 0x4d, 0xac, 0x8a, 0xc7, 0xca, 0xc7, 0x0f, 0x38, 0x44, 0xad, 0xb4, 0xe8, 0x72, 0x21, 0xb4, 0x94, 0x66, 0x0f, 0x36, 0x19, 0x71, 0x05, 0xe5, 0xd5, 0xdc, 0xc6, 0x8d, 0x0a, 0x66, 0x13, 0xb6, 0x7c, 0xab, 0x9d, 0x51, 0x74, 0x68, 0xd2, 0x48, 0xa3, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1166 = { .name = "ecdsa_brainpoolp320r1_sha384_1166", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1166_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1166_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1166_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1167 for ECDSA, tcId is 135 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1167_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1167_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1167_sig[] = { 0xfe, 0xa6, 0xef, 0xfc, 0x87, 0x5d, 0x4e, 0x6f, 0xc8, 0x82, 0x34, 0xc4, 0x2a, 0xce, 0x1d, 0xf3, 0xc8, 0x72, 0xef, 0x96, 0xce, 0x03, 0xe7, 0xc0, 0x8f, 0x82, 0x36, 0x2f, 0x7a, 0x89, 0x07, 0x04, 0xa9, 0x9e, 0x7a, 0xa6, 0xbd, 0xdf, 0x47, 0x22, 0x81, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1167 = { .name = "ecdsa_brainpoolp320r1_sha384_1167", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1167_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1167_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1167_sig, .siglen = 81, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1168 for ECDSA, tcId is 136 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1168_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1168_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1168_sig[] = { 0x01, 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1168 = { .name = "ecdsa_brainpoolp320r1_sha384_1168", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1168_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1168_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1168_sig, .siglen = 81, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1169 for ECDSA, tcId is 137 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1169_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1169_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1169_sig[] = { 0x7a, 0x4e, 0x43, 0xa7, 0x94, 0x0a, 0xbf, 0x80, 0x63, 0x71, 0x3c, 0x89, 0xa0, 0x1f, 0xd4, 0x2e, 0x6c, 0x7f, 0x66, 0x73, 0xba, 0x76, 0xd3, 0x32, 0xaf, 0x7e, 0x5e, 0x42, 0x77, 0x8d, 0x5d, 0x93, 0x25, 0x0b, 0xfc, 0x19, 0x24, 0x0c, 0xb5, 0x92, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1169 = { .name = "ecdsa_brainpoolp320r1_sha384_1169", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1169_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1169_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1169_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1170 for ECDSA, tcId is 138 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1170_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1170_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1170_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x01, 0x23, 0x7f, 0x27, 0xde, 0xbd, 0x21, 0x32, 0x0e, 0x1a, 0x68, 0xf2, 0x70, 0x71, 0x91, 0xfc, 0x90, 0xc8, 0xc8, 0xde, 0x00, 0x31, 0x45, 0x22, 0x40, 0xc8, 0x53, 0x8f, 0xc0, 0x61, 0xcf, 0x19, 0x47, 0x05, 0x36, 0xf8, 0xf1, 0xbd, 0x23, 0xee, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1170 = { .name = "ecdsa_brainpoolp320r1_sha384_1170", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1170_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1170_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1170_sig, .siglen = 81, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1171 for ECDSA, tcId is 139 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1171_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1171_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1171_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x7c, 0xc2, 0x99, 0x9e, 0x4f, 0xa8, 0x92, 0x9e, 0x57, 0xf0, 0x01, 0xb2, 0xcd, 0x8e, 0x3b, 0xc4, 0xd5, 0xa9, 0x3e, 0xb4, 0xc4, 0x26, 0xfc, 0xfa, 0x6d, 0xc3, 0x32, 0x30, 0x84, 0xc2, 0x67, 0x73, 0xf8, 0x14, 0x4e, 0x3b, 0x33, 0x98, 0xc7, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1171 = { .name = "ecdsa_brainpoolp320r1_sha384_1171", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1171_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1171_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1171_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1172 for ECDSA, tcId is 140 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1172_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1172_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1172_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0xaf, 0xdf, 0x1f, 0x41, 0x79, 0x9b, 0x1d, 0xa9, 0xc6, 0xd3, 0x85, 0xee, 0x60, 0x6f, 0xe3, 0xd5, 0x30, 0xc6, 0xf1, 0xa5, 0x85, 0x49, 0xf0, 0x62, 0x64, 0xf4, 0x9f, 0x07, 0x8c, 0xb7, 0x3f, 0xa2, 0x81, 0x5a, 0x5c, 0x69, 0x87, 0xa1, 0xa5, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1172 = { .name = "ecdsa_brainpoolp320r1_sha384_1172", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1172_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1172_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1172_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1173 for ECDSA, tcId is 141 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1173_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1173_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1173_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0xfe, 0xdc, 0x80, 0xd8, 0x21, 0x42, 0xde, 0xcd, 0xf1, 0xe5, 0x97, 0x0d, 0x8f, 0x8e, 0x6e, 0x03, 0x6f, 0x37, 0x37, 0x21, 0xff, 0xce, 0xba, 0xdd, 0xbf, 0x37, 0xac, 0x70, 0x3f, 0x9e, 0x30, 0xe6, 0xb8, 0xfa, 0xc9, 0x07, 0x0e, 0x42, 0xdc, 0x11, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1173 = { .name = "ecdsa_brainpoolp320r1_sha384_1173", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1173_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1173_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1173_sig, .siglen = 81, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1174 for ECDSA, tcId is 142 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1174_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1174_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1174_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0x01, 0x50, 0x20, 0xe0, 0xbe, 0x86, 0x64, 0xe2, 0x56, 0x39, 0x2c, 0x7a, 0x11, 0x9f, 0x90, 0x1c, 0x2a, 0xcf, 0x39, 0x0e, 0x5a, 0x7a, 0xb6, 0x0f, 0x9d, 0x9b, 0x0b, 0x60, 0xf8, 0x73, 0x48, 0xc0, 0x5d, 0x7e, 0xa5, 0xa3, 0x96, 0x78, 0x5e, 0x5a, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1174 = { .name = "ecdsa_brainpoolp320r1_sha384_1174", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1174_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1174_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1174_sig, .siglen = 81, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1175 for ECDSA, tcId is 143 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1175_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1175_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1175_sig[] = { 0x85, 0xb1, 0xbc, 0x58, 0x6b, 0xf5, 0x40, 0x7f, 0x9c, 0x8e, 0xc3, 0x76, 0x5f, 0xe0, 0x2b, 0xd1, 0x93, 0x80, 0x99, 0x8c, 0x45, 0x89, 0x2c, 0xcd, 0x50, 0x81, 0xa1, 0xbd, 0x88, 0x72, 0xa2, 0x6c, 0xda, 0xf4, 0x03, 0xe6, 0xdb, 0xf3, 0x4a, 0x6e, 0xaf, 0xdf, 0x1f, 0x41, 0x79, 0x9b, 0x1d, 0xa9, 0xc6, 0xd3, 0x85, 0xee, 0x60, 0x6f, 0xe3, 0xd5, 0x30, 0xc6, 0xf1, 0xa5, 0x85, 0x49, 0xf0, 0x62, 0x64, 0xf4, 0x9f, 0x07, 0x8c, 0xb7, 0x3f, 0xa2, 0x81, 0x5a, 0x5c, 0x69, 0x87, 0xa1, 0xa5, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1175 = { .name = "ecdsa_brainpoolp320r1_sha384_1175", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1175_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1175_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1175_sig, .siglen = 80, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1176 for ECDSA, tcId is 144 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1176_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1176_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1176_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1176 = { .name = "ecdsa_brainpoolp320r1_sha384_1176", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1176_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1176_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1176_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1177 for ECDSA, tcId is 145 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1177_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1177_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1177_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1177 = { .name = "ecdsa_brainpoolp320r1_sha384_1177", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1177_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1177_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1177_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1178 for ECDSA, tcId is 146 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1178_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1178_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1178_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1178 = { .name = "ecdsa_brainpoolp320r1_sha384_1178", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1178_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1178_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1178_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1179 for ECDSA, tcId is 147 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1179_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1179_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1179_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1179 = { .name = "ecdsa_brainpoolp320r1_sha384_1179", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1179_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1179_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1179_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1180 for ECDSA, tcId is 148 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1180_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1180_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1180_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1180 = { .name = "ecdsa_brainpoolp320r1_sha384_1180", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1180_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1180_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1180_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1181 for ECDSA, tcId is 149 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1181_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1181_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1181_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1181 = { .name = "ecdsa_brainpoolp320r1_sha384_1181", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1181_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1181_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1181_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1182 for ECDSA, tcId is 150 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1182_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1182_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1182_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1182 = { .name = "ecdsa_brainpoolp320r1_sha384_1182", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1182_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1182_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1182_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1183 for ECDSA, tcId is 151 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1183_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1183_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1183_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1183 = { .name = "ecdsa_brainpoolp320r1_sha384_1183", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1183_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1183_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1183_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1184 for ECDSA, tcId is 154 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1184_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1184_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1184_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1184 = { .name = "ecdsa_brainpoolp320r1_sha384_1184", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1184_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1184_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1184_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1185 for ECDSA, tcId is 155 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1185_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1185_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1185_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1185 = { .name = "ecdsa_brainpoolp320r1_sha384_1185", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1185_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1185_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1185_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1186 for ECDSA, tcId is 156 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1186_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1186_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1186_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1186 = { .name = "ecdsa_brainpoolp320r1_sha384_1186", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1186_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1186_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1186_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1187 for ECDSA, tcId is 157 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1187_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1187_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1187_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1187 = { .name = "ecdsa_brainpoolp320r1_sha384_1187", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1187_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1187_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1187_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1188 for ECDSA, tcId is 158 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1188_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1188_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1188_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1188 = { .name = "ecdsa_brainpoolp320r1_sha384_1188", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1188_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1188_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1188_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1189 for ECDSA, tcId is 159 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1189_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1189_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1189_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1189 = { .name = "ecdsa_brainpoolp320r1_sha384_1189", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1189_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1189_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1189_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1190 for ECDSA, tcId is 160 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1190_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1190_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1190_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1190 = { .name = "ecdsa_brainpoolp320r1_sha384_1190", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1190_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1190_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1190_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1191 for ECDSA, tcId is 161 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1191_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1191_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1191_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1191 = { .name = "ecdsa_brainpoolp320r1_sha384_1191", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1191_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1191_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1191_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1192 for ECDSA, tcId is 164 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1192_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1192_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1192_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1192 = { .name = "ecdsa_brainpoolp320r1_sha384_1192", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1192_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1192_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1192_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1193 for ECDSA, tcId is 165 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1193_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1193_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1193_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1193 = { .name = "ecdsa_brainpoolp320r1_sha384_1193", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1193_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1193_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1193_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1194 for ECDSA, tcId is 166 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1194_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1194_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1194_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1194 = { .name = "ecdsa_brainpoolp320r1_sha384_1194", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1194_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1194_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1194_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1195 for ECDSA, tcId is 167 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1195_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1195_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1195_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1195 = { .name = "ecdsa_brainpoolp320r1_sha384_1195", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1195_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1195_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1195_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1196 for ECDSA, tcId is 168 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1196_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1196_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1196_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1196 = { .name = "ecdsa_brainpoolp320r1_sha384_1196", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1196_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1196_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1196_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1197 for ECDSA, tcId is 169 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1197_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1197_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1197_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1197 = { .name = "ecdsa_brainpoolp320r1_sha384_1197", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1197_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1197_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1197_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1198 for ECDSA, tcId is 170 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1198_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1198_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1198_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1198 = { .name = "ecdsa_brainpoolp320r1_sha384_1198", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1198_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1198_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1198_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1199 for ECDSA, tcId is 171 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1199_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1199_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1199_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1199 = { .name = "ecdsa_brainpoolp320r1_sha384_1199", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1199_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1199_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1199_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1200 for ECDSA, tcId is 174 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1200_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1200_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1200_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1200 = { .name = "ecdsa_brainpoolp320r1_sha384_1200", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1200_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1200_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1200_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1201 for ECDSA, tcId is 175 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1201_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1201_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1201_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1201 = { .name = "ecdsa_brainpoolp320r1_sha384_1201", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1201_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1201_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1201_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1202 for ECDSA, tcId is 176 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1202_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1202_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1202_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1202 = { .name = "ecdsa_brainpoolp320r1_sha384_1202", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1202_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1202_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1202_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1203 for ECDSA, tcId is 177 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1203_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1203_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1203_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1203 = { .name = "ecdsa_brainpoolp320r1_sha384_1203", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1203_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1203_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1203_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1204 for ECDSA, tcId is 178 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1204_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1204_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1204_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1204 = { .name = "ecdsa_brainpoolp320r1_sha384_1204", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1204_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1204_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1204_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1205 for ECDSA, tcId is 179 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1205_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1205_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1205_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1205 = { .name = "ecdsa_brainpoolp320r1_sha384_1205", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1205_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1205_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1205_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1206 for ECDSA, tcId is 180 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1206_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1206_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1206_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1206 = { .name = "ecdsa_brainpoolp320r1_sha384_1206", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1206_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1206_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1206_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1207 for ECDSA, tcId is 181 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1207_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1207_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1207_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1207 = { .name = "ecdsa_brainpoolp320r1_sha384_1207", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1207_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1207_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1207_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1208 for ECDSA, tcId is 184 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1208_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1208_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1208_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1208 = { .name = "ecdsa_brainpoolp320r1_sha384_1208", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1208_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1208_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1208_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1209 for ECDSA, tcId is 185 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1209_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1209_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1209_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1209 = { .name = "ecdsa_brainpoolp320r1_sha384_1209", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1209_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1209_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1209_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1210 for ECDSA, tcId is 186 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1210_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1210_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1210_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1210 = { .name = "ecdsa_brainpoolp320r1_sha384_1210", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1210_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1210_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1210_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1211 for ECDSA, tcId is 187 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1211_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1211_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1211_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1211 = { .name = "ecdsa_brainpoolp320r1_sha384_1211", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1211_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1211_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1211_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1212 for ECDSA, tcId is 188 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1212_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1212_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1212_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1212 = { .name = "ecdsa_brainpoolp320r1_sha384_1212", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1212_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1212_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1212_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1213 for ECDSA, tcId is 189 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1213_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1213_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1213_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1213 = { .name = "ecdsa_brainpoolp320r1_sha384_1213", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1213_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1213_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1213_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1214 for ECDSA, tcId is 190 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1214_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1214_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1214_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1214 = { .name = "ecdsa_brainpoolp320r1_sha384_1214", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1214_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1214_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1214_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1215 for ECDSA, tcId is 191 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1215_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1215_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1215_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1215 = { .name = "ecdsa_brainpoolp320r1_sha384_1215", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1215_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1215_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1215_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1216 for ECDSA, tcId is 194 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1216_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1216_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1216_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1216 = { .name = "ecdsa_brainpoolp320r1_sha384_1216", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1216_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1216_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1216_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1217 for ECDSA, tcId is 195 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1217_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1217_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1217_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1217 = { .name = "ecdsa_brainpoolp320r1_sha384_1217", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1217_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1217_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1217_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1218 for ECDSA, tcId is 196 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1218_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1218_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1218_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1218 = { .name = "ecdsa_brainpoolp320r1_sha384_1218", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1218_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1218_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1218_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1219 for ECDSA, tcId is 197 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1219_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1219_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1219_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1219 = { .name = "ecdsa_brainpoolp320r1_sha384_1219", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1219_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1219_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1219_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1220 for ECDSA, tcId is 198 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1220_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1220_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1220_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1220 = { .name = "ecdsa_brainpoolp320r1_sha384_1220", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1220_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1220_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1220_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1221 for ECDSA, tcId is 199 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1221_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1221_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1221_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1221 = { .name = "ecdsa_brainpoolp320r1_sha384_1221", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1221_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1221_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1221_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1222 for ECDSA, tcId is 200 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1222_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1222_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1222_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1222 = { .name = "ecdsa_brainpoolp320r1_sha384_1222", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1222_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1222_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1222_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1223 for ECDSA, tcId is 201 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1223_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1223_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1223_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1223 = { .name = "ecdsa_brainpoolp320r1_sha384_1223", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1223_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1223_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1223_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1224 for ECDSA, tcId is 204 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1224_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1224_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1224_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1224 = { .name = "ecdsa_brainpoolp320r1_sha384_1224", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1224_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1224_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1224_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1225 for ECDSA, tcId is 205 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1225_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1225_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1225_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1225 = { .name = "ecdsa_brainpoolp320r1_sha384_1225", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1225_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1225_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1225_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1226 for ECDSA, tcId is 206 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1226_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1226_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1226_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1226 = { .name = "ecdsa_brainpoolp320r1_sha384_1226", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1226_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1226_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1226_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1227 for ECDSA, tcId is 207 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1227_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1227_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1227_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1227 = { .name = "ecdsa_brainpoolp320r1_sha384_1227", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1227_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1227_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1227_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1228 for ECDSA, tcId is 208 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1228_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1228_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1228_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1228 = { .name = "ecdsa_brainpoolp320r1_sha384_1228", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1228_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1228_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1228_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1229 for ECDSA, tcId is 209 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1229_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1229_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1229_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1229 = { .name = "ecdsa_brainpoolp320r1_sha384_1229", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1229_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1229_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1229_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1230 for ECDSA, tcId is 210 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1230_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1230_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1230_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1230 = { .name = "ecdsa_brainpoolp320r1_sha384_1230", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1230_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1230_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1230_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1231 for ECDSA, tcId is 211 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1231_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1231_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1231_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1231 = { .name = "ecdsa_brainpoolp320r1_sha384_1231", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1231_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1231_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1231_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1232 for ECDSA, tcId is 214 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1232_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1232_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1232_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1232 = { .name = "ecdsa_brainpoolp320r1_sha384_1232", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1232_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1232_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1232_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1233 for ECDSA, tcId is 215 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1233_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1233_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1233_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1233 = { .name = "ecdsa_brainpoolp320r1_sha384_1233", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1233_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1233_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1233_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1234 for ECDSA, tcId is 216 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1234_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1234_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1234_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1234 = { .name = "ecdsa_brainpoolp320r1_sha384_1234", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1234_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1234_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1234_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1235 for ECDSA, tcId is 217 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1235_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1235_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1235_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1235 = { .name = "ecdsa_brainpoolp320r1_sha384_1235", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1235_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1235_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1235_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1236 for ECDSA, tcId is 218 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1236_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1236_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1236_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1236 = { .name = "ecdsa_brainpoolp320r1_sha384_1236", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1236_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1236_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1236_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1237 for ECDSA, tcId is 219 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1237_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1237_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1237_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1237 = { .name = "ecdsa_brainpoolp320r1_sha384_1237", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1237_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1237_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1237_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1238 for ECDSA, tcId is 220 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1238_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1238_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1238_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x27, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1238 = { .name = "ecdsa_brainpoolp320r1_sha384_1238", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1238_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1238_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1238_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1239 for ECDSA, tcId is 221 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1239_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1239_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1239_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1239 = { .name = "ecdsa_brainpoolp320r1_sha384_1239", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1239_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1239_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1239_sig, .siglen = 80, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1240 for ECDSA, tcId is 230 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1240_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1240_msg[] = { 0x37, 0x30, 0x37, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1240_sig[] = { 0x25, 0x16, 0x6f, 0x47, 0xac, 0x99, 0xc6, 0xbe, 0xc3, 0xb0, 0x38, 0x84, 0x9a, 0xb4, 0xea, 0xd3, 0xb2, 0x51, 0xf1, 0x8a, 0xfb, 0x0d, 0xa1, 0xda, 0x5c, 0xaa, 0x60, 0x4a, 0x92, 0xa9, 0x09, 0xc8, 0x56, 0x18, 0x17, 0x68, 0x4a, 0xbf, 0xfb, 0x92, 0x31, 0x07, 0xff, 0xd1, 0xaa, 0xdc, 0xe5, 0xb5, 0x8a, 0x2a, 0x1b, 0x95, 0x17, 0xcc, 0xed, 0xda, 0x09, 0x04, 0x33, 0xac, 0x63, 0x44, 0xb0, 0x27, 0xf3, 0x6f, 0xc6, 0xb3, 0x58, 0xef, 0x4a, 0x8e, 0x43, 0x6d, 0xf3, 0xfd, 0x05, 0x52, 0x16, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1240 = { .name = "ecdsa_brainpoolp320r1_sha384_1240", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1240_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1240_msg, .msglen = 5, .sig = ecdsa_brainpoolp320r1_sha384_1240_sig, .siglen = 80, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1241 for ECDSA, tcId is 231 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1241_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1241_msg[] = { 0x31, 0x37, 0x35, 0x30, 0x35, 0x35, 0x31, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1241_sig[] = { 0x10, 0x3c, 0x3e, 0xf2, 0xb4, 0x3a, 0x8f, 0x57, 0xd0, 0x1e, 0x2d, 0xa6, 0x7e, 0xdf, 0xa0, 0x03, 0xa0, 0xd3, 0x42, 0xd7, 0xfb, 0xde, 0x05, 0x41, 0x33, 0x2b, 0x0b, 0x24, 0xde, 0xea, 0x76, 0xaf, 0xff, 0x4e, 0x2c, 0xd0, 0x57, 0x2d, 0x73, 0xbb, 0x0a, 0x0a, 0x68, 0x0e, 0xbe, 0x36, 0x44, 0xc4, 0x6b, 0x58, 0xd6, 0x7e, 0xd8, 0xee, 0x94, 0xf3, 0xaa, 0xee, 0x28, 0x39, 0xbc, 0x27, 0x0d, 0x6b, 0x93, 0x9b, 0xcb, 0x76, 0x57, 0xee, 0xeb, 0xbb, 0x6c, 0xcc, 0xf2, 0xbc, 0x54, 0xaf, 0x97, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1241 = { .name = "ecdsa_brainpoolp320r1_sha384_1241", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1241_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1241_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1241_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1242 for ECDSA, tcId is 232 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1242_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1242_msg[] = { 0x31, 0x30, 0x33, 0x36, 0x33, 0x30, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1242_sig[] = { 0x8c, 0x70, 0x21, 0x60, 0x94, 0xfe, 0xda, 0x4e, 0x72, 0x1a, 0x72, 0xd8, 0xa9, 0x1c, 0x51, 0xdd, 0x17, 0x39, 0x2c, 0xf4, 0xc4, 0x48, 0x1d, 0x7c, 0xd9, 0x4b, 0xe5, 0x6d, 0xa9, 0x94, 0xe5, 0xba, 0xaa, 0x56, 0x10, 0x85, 0xce, 0xcf, 0xe8, 0x0d, 0x1b, 0x19, 0xf7, 0xe8, 0x95, 0x25, 0x60, 0x18, 0x20, 0xbc, 0x17, 0xbd, 0x59, 0x5a, 0x7d, 0xbd, 0xef, 0x76, 0xe5, 0xb3, 0x52, 0xfc, 0xb1, 0x6c, 0x3a, 0x8a, 0x1c, 0x33, 0x2f, 0xf6, 0xa5, 0x30, 0x8f, 0xf4, 0x7a, 0x7e, 0x54, 0xe0, 0xb1, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1242 = { .name = "ecdsa_brainpoolp320r1_sha384_1242", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1242_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1242_msg, .msglen = 8, .sig = ecdsa_brainpoolp320r1_sha384_1242_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1243 for ECDSA, tcId is 233 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1243_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1243_msg[] = { 0x32, 0x33, 0x36, 0x32, 0x34, 0x32, 0x31, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1243_sig[] = { 0xb4, 0xa4, 0xa0, 0x35, 0xdb, 0xea, 0xee, 0x12, 0x6d, 0x09, 0xc7, 0xb1, 0x58, 0x16, 0xb0, 0x4b, 0xc7, 0x17, 0xcb, 0x71, 0xbb, 0x5f, 0xe7, 0x64, 0x9a, 0xc0, 0x26, 0x26, 0x9b, 0x7f, 0xe6, 0xd5, 0x93, 0xfe, 0x1f, 0xf8, 0xfc, 0x52, 0x78, 0xa1, 0x63, 0x55, 0x16, 0xde, 0x53, 0x11, 0x04, 0xe7, 0x21, 0x76, 0xe8, 0x9a, 0x84, 0x50, 0x32, 0xb3, 0x09, 0x6e, 0x32, 0x69, 0xe4, 0x14, 0x31, 0xc1, 0x85, 0x4f, 0xbc, 0x43, 0x37, 0xba, 0x6f, 0xb5, 0xea, 0x91, 0xde, 0xfd, 0x33, 0x72, 0x9d, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1243 = { .name = "ecdsa_brainpoolp320r1_sha384_1243", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1243_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1243_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1243_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1244 for ECDSA, tcId is 234 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1244_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1244_msg[] = { 0x34, 0x35, 0x38, 0x38, 0x30, 0x31, 0x34, 0x36, 0x35, 0x36, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1244_sig[] = { 0x2a, 0x31, 0x03, 0xcd, 0xaa, 0xd1, 0xdd, 0x28, 0xec, 0xf8, 0x97, 0x49, 0x10, 0x51, 0xdd, 0x0a, 0x9c, 0x9d, 0xa9, 0x48, 0x37, 0x53, 0xc9, 0x34, 0x90, 0xb4, 0xa0, 0x5f, 0x1c, 0x42, 0xe1, 0x64, 0x29, 0x25, 0xa3, 0xa0, 0x15, 0x4d, 0x40, 0x62, 0x67, 0x29, 0x03, 0x24, 0x3b, 0x68, 0x58, 0xa5, 0xe0, 0x91, 0x48, 0xe4, 0x03, 0x46, 0x1f, 0x31, 0xc1, 0xff, 0x0e, 0x12, 0x6c, 0x36, 0x59, 0x42, 0xe0, 0x68, 0x0d, 0x31, 0x4c, 0x1a, 0x7a, 0x7c, 0x57, 0xe2, 0xf0, 0x52, 0x8c, 0x8c, 0xab, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1244 = { .name = "ecdsa_brainpoolp320r1_sha384_1244", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1244_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1244_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1244_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1245 for ECDSA, tcId is 235 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1245_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1245_msg[] = { 0x32, 0x31, 0x34, 0x36, 0x36, 0x30, 0x35, 0x36, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1245_sig[] = { 0xb8, 0x80, 0xb6, 0xbe, 0x2a, 0x12, 0x95, 0xaf, 0x38, 0x40, 0xa5, 0xf3, 0x74, 0xfe, 0x77, 0xcd, 0xe1, 0xff, 0xdd, 0x6d, 0xf3, 0xbb, 0x86, 0x09, 0x7d, 0x5c, 0xe1, 0x48, 0x52, 0xf7, 0x3a, 0x19, 0x25, 0xfa, 0x6d, 0x19, 0x2a, 0x27, 0xb7, 0x4c, 0xc2, 0xcb, 0x21, 0x13, 0x03, 0xae, 0xa0, 0x30, 0xa5, 0xb9, 0x2b, 0xe9, 0x8f, 0xc3, 0x67, 0x70, 0x82, 0x2f, 0x81, 0x95, 0xad, 0x73, 0xee, 0xe5, 0xa9, 0xbb, 0x87, 0xc5, 0x71, 0x7b, 0xa4, 0x34, 0x5c, 0xb6, 0x0b, 0x09, 0x9e, 0x4d, 0x4d, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1245 = { .name = "ecdsa_brainpoolp320r1_sha384_1245", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1245_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1245_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1245_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1246 for ECDSA, tcId is 236 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1246_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1246_msg[] = { 0x33, 0x33, 0x35, 0x33, 0x30, 0x30, 0x38, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1246_sig[] = { 0x67, 0x7f, 0x84, 0xa0, 0x65, 0x37, 0x25, 0xb9, 0x4e, 0x4e, 0xed, 0xdb, 0xe0, 0xb7, 0x0a, 0xef, 0xdf, 0x59, 0x4f, 0x5e, 0xf9, 0xe4, 0x84, 0xb4, 0x06, 0x05, 0x67, 0xa8, 0x36, 0x5c, 0x43, 0xa7, 0x83, 0xd8, 0x15, 0x48, 0xd1, 0xf2, 0x74, 0x08, 0x4c, 0xb2, 0x4e, 0x15, 0x37, 0x5b, 0xda, 0xe0, 0xb4, 0x4b, 0x33, 0x6f, 0xc7, 0xe6, 0xc1, 0x18, 0x56, 0xd4, 0xc6, 0xf9, 0xdd, 0x7e, 0x83, 0x14, 0x8d, 0xc3, 0x87, 0xc4, 0xa8, 0x86, 0x9b, 0x11, 0x53, 0x8b, 0x7e, 0xe9, 0x4f, 0x05, 0x3f, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1246 = { .name = "ecdsa_brainpoolp320r1_sha384_1246", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1246_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1246_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1246_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1247 for ECDSA, tcId is 237 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1247_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1247_msg[] = { 0x36, 0x33, 0x39, 0x36, 0x36, 0x30, 0x33, 0x36, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1247_sig[] = { 0x9d, 0x5d, 0x98, 0x4c, 0x75, 0x44, 0xef, 0x73, 0x7a, 0x10, 0x01, 0xd6, 0x7f, 0x9d, 0xbb, 0xed, 0x52, 0x1b, 0x46, 0xf7, 0x4b, 0xc4, 0x68, 0xc0, 0x38, 0x81, 0xc2, 0xab, 0x59, 0x44, 0x63, 0x5a, 0xf5, 0x46, 0x5c, 0x3f, 0xa0, 0x1c, 0xf5, 0x1e, 0x0c, 0x70, 0x6d, 0xcf, 0xe1, 0x1a, 0x4e, 0x30, 0xd6, 0x23, 0x87, 0x0f, 0xb0, 0xf2, 0xb9, 0x79, 0xd0, 0xfd, 0x9d, 0xaa, 0x97, 0x0d, 0x86, 0xf6, 0x4b, 0xb4, 0x8f, 0x49, 0xaa, 0x48, 0x4d, 0x92, 0x4e, 0x9b, 0x93, 0xbc, 0xaf, 0x40, 0x69, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1247 = { .name = "ecdsa_brainpoolp320r1_sha384_1247", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1247_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1247_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1247_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1248 for ECDSA, tcId is 238 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1248_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1248_msg[] = { 0x33, 0x33, 0x39, 0x31, 0x36, 0x36, 0x30, 0x37, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1248_sig[] = { 0x44, 0x84, 0x64, 0xbe, 0xcc, 0x13, 0x52, 0x2c, 0x90, 0x70, 0x8a, 0xa5, 0x20, 0x49, 0x30, 0xe6, 0x76, 0xfe, 0xdf, 0xba, 0xef, 0xe8, 0xfe, 0x02, 0x50, 0x9a, 0x4f, 0xe8, 0x22, 0xcc, 0x88, 0xfd, 0x6d, 0x92, 0xa9, 0x58, 0x43, 0x8d, 0xed, 0x7c, 0x5d, 0xe6, 0x59, 0xe0, 0x80, 0xa6, 0x1c, 0x50, 0xb5, 0xb7, 0x48, 0x9f, 0x46, 0x77, 0xec, 0x4c, 0x69, 0x31, 0xfa, 0xaf, 0x17, 0x1f, 0x2a, 0x69, 0x75, 0x6e, 0x2f, 0x2d, 0x12, 0x14, 0x23, 0x5b, 0xdb, 0x1e, 0xa3, 0xd2, 0xa4, 0xa7, 0x53, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1248 = { .name = "ecdsa_brainpoolp320r1_sha384_1248", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1248_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1248_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1248_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1249 for ECDSA, tcId is 239 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1249_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1249_msg[] = { 0x31, 0x34, 0x34, 0x36, 0x39, 0x37, 0x35, 0x39, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1249_sig[] = { 0x59, 0xc0, 0xc9, 0x59, 0x41, 0xe1, 0xa5, 0x23, 0x90, 0xe0, 0x0c, 0x2d, 0x77, 0x96, 0xc6, 0x85, 0xdc, 0xc4, 0xd7, 0x3d, 0x6d, 0x69, 0x67, 0x59, 0x0a, 0xa1, 0x76, 0x7c, 0x97, 0x2e, 0x19, 0x9d, 0xe3, 0xc6, 0xdb, 0xfc, 0xa7, 0x7d, 0xca, 0xc8, 0x50, 0x7f, 0x27, 0xab, 0x5a, 0xc0, 0x5a, 0xd2, 0x3c, 0xb2, 0x5f, 0xc4, 0x8f, 0xfc, 0x76, 0x6d, 0xcb, 0x6d, 0xc0, 0xcd, 0x25, 0x60, 0x65, 0x05, 0xa2, 0xd2, 0x70, 0x06, 0x6c, 0x3a, 0x74, 0x84, 0x27, 0x68, 0xb5, 0x4a, 0xf2, 0xc8, 0x47, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1249 = { .name = "ecdsa_brainpoolp320r1_sha384_1249", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1249_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1249_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1249_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1250 for ECDSA, tcId is 240 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1250_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1250_msg[] = { 0x35, 0x31, 0x35, 0x39, 0x34, 0x37, 0x38, 0x36, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1250_sig[] = { 0x59, 0x90, 0x2d, 0x77, 0x63, 0xe7, 0xf1, 0x87, 0x5a, 0x42, 0x52, 0xd1, 0x33, 0xeb, 0x61, 0x14, 0xcf, 0xc1, 0x97, 0x2b, 0x68, 0x3a, 0xdf, 0xd7, 0x67, 0xa7, 0x1c, 0xa8, 0x0c, 0x3f, 0x78, 0x05, 0x7c, 0xea, 0x75, 0x9e, 0xa1, 0x95, 0xd3, 0x1e, 0x39, 0x7d, 0xea, 0xf9, 0x6e, 0x29, 0x03, 0xa2, 0x07, 0xf6, 0x8e, 0x53, 0x30, 0xc9, 0xf2, 0xc6, 0x27, 0x6a, 0x45, 0xd0, 0xfd, 0xba, 0x96, 0x1a, 0x04, 0xc2, 0x75, 0xfa, 0x20, 0x36, 0x78, 0x17, 0x62, 0x01, 0xed, 0x37, 0x09, 0x99, 0xa3, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1250 = { .name = "ecdsa_brainpoolp320r1_sha384_1250", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1250_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1250_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1250_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1251 for ECDSA, tcId is 241 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1251_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1251_msg[] = { 0x35, 0x32, 0x34, 0x31, 0x37, 0x39, 0x32, 0x33, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1251_sig[] = { 0xd1, 0x42, 0x21, 0x75, 0x84, 0xe8, 0x52, 0xa4, 0x99, 0xef, 0xa7, 0x34, 0xa1, 0x0a, 0x43, 0x6a, 0x39, 0x7b, 0xa7, 0xe0, 0x68, 0xad, 0x70, 0xf3, 0xee, 0xfc, 0x4d, 0x67, 0x31, 0xe7, 0x6a, 0x48, 0x1b, 0x26, 0x0e, 0xac, 0x1d, 0x21, 0x47, 0xf0, 0x17, 0xc8, 0x48, 0x26, 0x39, 0xdf, 0x8d, 0x20, 0xfc, 0xb8, 0x35, 0xbf, 0xe0, 0xf3, 0xec, 0xd2, 0x73, 0x17, 0xeb, 0x83, 0x15, 0xc6, 0x9b, 0x65, 0x6e, 0xbf, 0x13, 0x7d, 0xde, 0x65, 0x82, 0xf3, 0x40, 0x9d, 0x7c, 0x44, 0xa8, 0xb6, 0xe0, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1251 = { .name = "ecdsa_brainpoolp320r1_sha384_1251", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1251_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1251_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1251_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1252 for ECDSA, tcId is 242 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1252_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1252_msg[] = { 0x31, 0x31, 0x34, 0x37, 0x32, 0x39, 0x30, 0x32, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1252_sig[] = { 0x8a, 0x55, 0xfa, 0x49, 0x22, 0x45, 0x92, 0xf7, 0xe4, 0x03, 0xa4, 0xb3, 0xe6, 0x47, 0xbf, 0x38, 0x2a, 0x26, 0x49, 0x9b, 0x37, 0xec, 0x2c, 0xff, 0x51, 0xa2, 0xbe, 0x2a, 0x13, 0x57, 0x80, 0x7f, 0xe8, 0x75, 0x35, 0x9e, 0xc8, 0x65, 0x4f, 0x87, 0xb9, 0x50, 0x6e, 0x74, 0xaf, 0x8f, 0x55, 0x2d, 0x4a, 0xbb, 0x2c, 0x47, 0x2b, 0x85, 0x08, 0xce, 0x24, 0x81, 0x4e, 0x20, 0xb2, 0x7d, 0x19, 0x2e, 0x24, 0xd3, 0x6d, 0x5a, 0xc7, 0x51, 0x92, 0x2b, 0x0c, 0x80, 0x7b, 0xf9, 0x7a, 0x7b, 0x1a, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1252 = { .name = "ecdsa_brainpoolp320r1_sha384_1252", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1252_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1252_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1252_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1253 for ECDSA, tcId is 243 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1253_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1253_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x32, 0x35, 0x36, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1253_sig[] = { 0x68, 0xad, 0x2d, 0xa6, 0x43, 0xd6, 0x6f, 0xc5, 0xd2, 0x7b, 0x63, 0xd7, 0x22, 0x2f, 0x83, 0x5d, 0x09, 0xfe, 0x0b, 0x32, 0x8f, 0xc4, 0xda, 0x46, 0x84, 0xb8, 0x6d, 0x9c, 0x12, 0xb3, 0x99, 0x26, 0x26, 0xf6, 0x10, 0xe3, 0x39, 0x5e, 0x4e, 0xd0, 0x96, 0x62, 0xf7, 0x4d, 0x52, 0x71, 0x2a, 0x2a, 0xf5, 0x4f, 0x60, 0x1c, 0x44, 0x88, 0x93, 0x4f, 0xe2, 0x82, 0x6d, 0x50, 0xe1, 0xee, 0x86, 0x80, 0x22, 0x43, 0x7c, 0x9b, 0x62, 0x0c, 0x93, 0xd4, 0x3f, 0xc7, 0x50, 0xf0, 0x33, 0x12, 0x89, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1253 = { .name = "ecdsa_brainpoolp320r1_sha384_1253", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1253_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1253_msg, .msglen = 11, .sig = ecdsa_brainpoolp320r1_sha384_1253_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1254 for ECDSA, tcId is 244 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1254_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1254_msg[] = { 0x37, 0x33, 0x34, 0x33, 0x33, 0x30, 0x36, 0x35, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1254_sig[] = { 0x57, 0x8b, 0xdd, 0x50, 0xde, 0x99, 0x86, 0xfa, 0xd3, 0x41, 0xa9, 0x54, 0xe5, 0x11, 0x26, 0xff, 0x0c, 0xb5, 0x40, 0x02, 0x6a, 0xbb, 0x3d, 0x42, 0xb3, 0xc2, 0x08, 0xe4, 0xad, 0x18, 0x7f, 0x7b, 0xa2, 0xd9, 0x9b, 0x3e, 0xfe, 0x49, 0x5c, 0x92, 0xb9, 0x5a, 0xfd, 0x2d, 0x12, 0xcd, 0xee, 0x68, 0xc3, 0x57, 0x2a, 0x5f, 0xe1, 0x26, 0x33, 0x4e, 0xd0, 0xed, 0x7b, 0xa8, 0x2d, 0x30, 0x97, 0xea, 0xa6, 0xd9, 0xd7, 0x37, 0xc0, 0x9b, 0x83, 0x0b, 0x6c, 0xd3, 0xe8, 0x78, 0xf4, 0x70, 0xe7, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1254 = { .name = "ecdsa_brainpoolp320r1_sha384_1254", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1254_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1254_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1254_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1255 for ECDSA, tcId is 245 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1255_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1255_msg[] = { 0x39, 0x37, 0x34, 0x34, 0x36, 0x30, 0x39, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1255_sig[] = { 0x9d, 0x61, 0x26, 0x63, 0x49, 0x7c, 0x48, 0x40, 0x84, 0xd3, 0xd1, 0x5d, 0x8e, 0x79, 0x9e, 0x1f, 0xe3, 0x8b, 0x7b, 0x59, 0x22, 0x95, 0x5f, 0xc5, 0xa7, 0xfe, 0xa4, 0xec, 0xfc, 0x41, 0x95, 0x4c, 0xa7, 0x07, 0x52, 0x5c, 0x1e, 0x0d, 0xc0, 0x10, 0x59, 0xe8, 0x0c, 0xf6, 0x9b, 0xe6, 0x87, 0x6b, 0x95, 0x35, 0x7d, 0xed, 0x13, 0xca, 0x61, 0xa4, 0x94, 0xfa, 0xc7, 0x35, 0x5a, 0xc2, 0xe8, 0x0a, 0x89, 0xbe, 0x02, 0x19, 0x55, 0x2d, 0x91, 0x68, 0x52, 0x63, 0x26, 0x17, 0xc0, 0x94, 0x6b, 0xc2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1255 = { .name = "ecdsa_brainpoolp320r1_sha384_1255", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1255_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1255_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1255_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1256 for ECDSA, tcId is 246 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1256_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1256_msg[] = { 0x33, 0x32, 0x32, 0x37, 0x30, 0x38, 0x36, 0x38, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1256_sig[] = { 0xb4, 0xc0, 0x0f, 0x58, 0x9d, 0xbb, 0x51, 0xea, 0x68, 0x27, 0x0f, 0x4b, 0x02, 0xef, 0xf4, 0x8a, 0x4b, 0x12, 0x3c, 0x01, 0x67, 0xbb, 0xd2, 0x4d, 0xaf, 0x2a, 0x83, 0x79, 0x03, 0xe7, 0x34, 0x33, 0x9b, 0x8a, 0x25, 0x42, 0x04, 0x1f, 0x87, 0xaa, 0x94, 0xc3, 0x26, 0x34, 0xba, 0xea, 0x44, 0x52, 0xc0, 0x54, 0x29, 0x5d, 0x7a, 0xeb, 0xe2, 0x3b, 0xe7, 0xe8, 0x0a, 0xbb, 0xf5, 0x37, 0x89, 0x65, 0x16, 0x74, 0x18, 0x22, 0x63, 0xee, 0x5c, 0x29, 0x02, 0xfb, 0xfb, 0x3d, 0xf7, 0xda, 0x74, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1256 = { .name = "ecdsa_brainpoolp320r1_sha384_1256", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1256_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1256_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1256_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1257 for ECDSA, tcId is 247 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1257_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1257_msg[] = { 0x32, 0x33, 0x32, 0x39, 0x37, 0x36, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1257_sig[] = { 0xb9, 0x20, 0x1e, 0x49, 0x95, 0x0c, 0xe0, 0xd1, 0xdf, 0x64, 0x43, 0x56, 0x40, 0x5f, 0x0a, 0x78, 0x5a, 0x8b, 0x84, 0x70, 0xf8, 0x3e, 0x78, 0xa6, 0xf3, 0x5e, 0x62, 0x34, 0xda, 0xa9, 0x2a, 0x76, 0x85, 0x87, 0x7a, 0x59, 0xd8, 0xc9, 0x1a, 0x97, 0x8b, 0xee, 0x90, 0x77, 0x44, 0x3e, 0xed, 0xde, 0x34, 0xa2, 0xfc, 0x2c, 0x26, 0x6f, 0x18, 0x8e, 0x84, 0x4e, 0xab, 0x29, 0x04, 0xc8, 0x42, 0x04, 0xc8, 0x16, 0xba, 0x3c, 0xb1, 0xc4, 0xb9, 0xb2, 0x53, 0xd4, 0xa7, 0x8c, 0xe4, 0xe8, 0x11, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1257 = { .name = "ecdsa_brainpoolp320r1_sha384_1257", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1257_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1257_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1257_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1258 for ECDSA, tcId is 248 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1258_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1258_msg[] = { 0x39, 0x34, 0x30, 0x34, 0x37, 0x33, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1258_sig[] = { 0x0d, 0x42, 0xa1, 0x89, 0x9f, 0x73, 0xac, 0x70, 0xc9, 0x19, 0x25, 0x58, 0xb4, 0x78, 0xdb, 0x88, 0x03, 0xc6, 0x83, 0x37, 0xd4, 0x15, 0xfa, 0xeb, 0xab, 0x76, 0x85, 0x8c, 0x32, 0xa3, 0x7e, 0x39, 0x9f, 0x17, 0x27, 0xfd, 0x59, 0x9a, 0x18, 0x17, 0x36, 0x3f, 0x13, 0x46, 0xc0, 0x22, 0x7e, 0xc5, 0x4d, 0xa1, 0x65, 0x91, 0x65, 0xee, 0x7b, 0x07, 0xe0, 0x66, 0x10, 0xd3, 0x6b, 0x1c, 0xe6, 0x22, 0x6f, 0x60, 0x8b, 0xf6, 0xce, 0xf2, 0x14, 0x42, 0x48, 0xde, 0x37, 0x56, 0x2b, 0xe8, 0x53, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1258 = { .name = "ecdsa_brainpoolp320r1_sha384_1258", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1258_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1258_msg, .msglen = 8, .sig = ecdsa_brainpoolp320r1_sha384_1258_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1259 for ECDSA, tcId is 249 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1259_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1259_msg[] = { 0x33, 0x32, 0x32, 0x30, 0x35, 0x36, 0x39, 0x31, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1259_sig[] = { 0xc5, 0xd6, 0x5e, 0xff, 0xab, 0x2e, 0xc3, 0xe4, 0x43, 0x5c, 0x25, 0x81, 0x21, 0xc4, 0x93, 0xe2, 0x4a, 0xe9, 0x20, 0x05, 0xac, 0x80, 0x13, 0x6f, 0x21, 0xf2, 0xf4, 0x29, 0x46, 0xfc, 0x37, 0x45, 0x84, 0x1d, 0xbc, 0x2a, 0x3e, 0xb9, 0x96, 0x95, 0x85, 0xfe, 0xc2, 0xa9, 0x08, 0x0a, 0x1e, 0xce, 0x18, 0x89, 0x69, 0x70, 0xc9, 0xa2, 0xe1, 0xb3, 0x22, 0x40, 0xea, 0xf1, 0x87, 0xd6, 0x5f, 0x6f, 0x9e, 0x91, 0xd2, 0x71, 0x11, 0xc4, 0x03, 0x3d, 0x47, 0x1e, 0xda, 0x67, 0xeb, 0x89, 0x86, 0xed, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1259 = { .name = "ecdsa_brainpoolp320r1_sha384_1259", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1259_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1259_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1259_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1260 for ECDSA, tcId is 250 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1260_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1260_msg[] = { 0x34, 0x31, 0x34, 0x30, 0x35, 0x33, 0x39, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1260_sig[] = { 0xa2, 0x40, 0xad, 0xea, 0x61, 0xf7, 0x48, 0x99, 0x8d, 0xf2, 0xcd, 0xe9, 0x5b, 0xe9, 0xd7, 0xdf, 0x30, 0xf4, 0x54, 0xbd, 0xe5, 0xb9, 0x07, 0xec, 0x7d, 0xe6, 0xdc, 0xdb, 0x12, 0x1b, 0xea, 0x41, 0xbd, 0x42, 0xc4, 0x39, 0x24, 0x76, 0xc4, 0xf9, 0x3e, 0xf9, 0x91, 0xd6, 0x42, 0xbd, 0x02, 0x65, 0xb4, 0xa7, 0xb5, 0x21, 0xb2, 0x0a, 0x42, 0xfb, 0x2c, 0x68, 0x7c, 0xa2, 0xf0, 0x69, 0x4b, 0x23, 0x9a, 0x11, 0x3a, 0x83, 0x57, 0x5b, 0x57, 0x27, 0xdc, 0xb6, 0x32, 0x48, 0x2a, 0x57, 0x26, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1260 = { .name = "ecdsa_brainpoolp320r1_sha384_1260", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1260_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1260_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1260_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1261 for ECDSA, tcId is 251 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1261_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1261_msg[] = { 0x31, 0x39, 0x35, 0x31, 0x35, 0x36, 0x38, 0x36, 0x34, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1261_sig[] = { 0xca, 0xd5, 0x2b, 0xdb, 0x35, 0xaf, 0x7e, 0xe0, 0xe8, 0xf6, 0x87, 0xc8, 0x1f, 0x2e, 0xdd, 0x8e, 0xfc, 0x2d, 0x6e, 0xe3, 0x17, 0xf3, 0xc6, 0xa8, 0x21, 0x21, 0x04, 0x8e, 0xf7, 0xa3, 0xff, 0x3b, 0x69, 0x18, 0x7a, 0xae, 0xa5, 0x3f, 0x49, 0x26, 0x58, 0xf8, 0x4e, 0x18, 0x66, 0x16, 0x54, 0x4a, 0xf4, 0x94, 0x90, 0x02, 0x41, 0xd2, 0xb8, 0x02, 0xdf, 0x2e, 0xae, 0x3e, 0x3f, 0x14, 0x10, 0x86, 0x5e, 0x4c, 0xd1, 0x6e, 0x22, 0x1f, 0x27, 0x7e, 0x7b, 0x50, 0x93, 0xff, 0x18, 0x6e, 0x4d, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1261 = { .name = "ecdsa_brainpoolp320r1_sha384_1261", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1261_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1261_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1261_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1262 for ECDSA, tcId is 252 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1262_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1262_msg[] = { 0x35, 0x39, 0x35, 0x39, 0x30, 0x37, 0x31, 0x36, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1262_sig[] = { 0x93, 0x01, 0x3f, 0xf8, 0x41, 0x51, 0xa0, 0x4e, 0xa1, 0x46, 0xa3, 0x6d, 0x2a, 0x3b, 0x9f, 0x49, 0x7b, 0xa5, 0xd9, 0x32, 0x30, 0x19, 0xb7, 0x30, 0xbe, 0x32, 0x2b, 0xc5, 0x19, 0xe2, 0x70, 0x1e, 0x3f, 0x0e, 0xc1, 0xb6, 0xc8, 0x01, 0x5e, 0x8f, 0x87, 0x26, 0x69, 0xf3, 0x3b, 0x9b, 0x4b, 0x93, 0x38, 0x4d, 0x9a, 0xc3, 0xf7, 0xc3, 0x09, 0x25, 0x60, 0xb9, 0xaf, 0x7e, 0x67, 0x38, 0x22, 0x1e, 0x3b, 0x28, 0x94, 0x21, 0x81, 0x36, 0x01, 0xfe, 0x56, 0x9b, 0x2c, 0x49, 0xaf, 0xec, 0x8b, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1262 = { .name = "ecdsa_brainpoolp320r1_sha384_1262", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1262_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1262_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1262_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1263 for ECDSA, tcId is 253 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1263_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1263_msg[] = { 0x32, 0x31, 0x35, 0x33, 0x34, 0x36, 0x39, 0x35, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1263_sig[] = { 0x26, 0x22, 0x8c, 0xdd, 0x2c, 0x08, 0xfb, 0xf8, 0xdd, 0x4a, 0xd5, 0xd2, 0xf8, 0x0e, 0xd1, 0x51, 0x29, 0x86, 0x8e, 0x89, 0x2d, 0x33, 0xcd, 0x89, 0x25, 0x03, 0x20, 0x7e, 0x91, 0x11, 0x4c, 0x86, 0x8d, 0x00, 0x64, 0xc6, 0x0f, 0x1b, 0xb6, 0x12, 0xaf, 0xde, 0xdc, 0x05, 0xf0, 0xb2, 0x7e, 0x93, 0x63, 0xc3, 0x4d, 0x9b, 0xd1, 0xbc, 0x64, 0xec, 0x01, 0x42, 0xfc, 0xd9, 0xf4, 0x0f, 0x35, 0x84, 0x60, 0x5b, 0xbc, 0xcf, 0x12, 0xb0, 0xe2, 0x79, 0xe4, 0xb3, 0xe3, 0xd0, 0x92, 0x7a, 0x48, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1263 = { .name = "ecdsa_brainpoolp320r1_sha384_1263", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1263_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1263_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1263_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1264 for ECDSA, tcId is 254 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1264_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1264_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x31, 0x30, 0x39, 0x38, 0x33, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1264_sig[] = { 0x73, 0x1d, 0x59, 0x7c, 0x36, 0x94, 0xa4, 0x93, 0x2f, 0x0f, 0x14, 0xfc, 0x31, 0x32, 0xd2, 0xba, 0x9f, 0x5b, 0x7d, 0x83, 0x3a, 0xe9, 0x1c, 0xbe, 0x9a, 0x45, 0x03, 0x52, 0xf4, 0x24, 0x0d, 0x5b, 0xb7, 0x12, 0xf6, 0x5b, 0x0e, 0xea, 0x04, 0x12, 0x1b, 0x8a, 0x6f, 0xc9, 0xbc, 0x1e, 0xcf, 0x8c, 0x09, 0xb1, 0xba, 0x27, 0xc4, 0xc8, 0xdc, 0xeb, 0xaf, 0x1e, 0x66, 0x9a, 0x89, 0x03, 0x6b, 0x34, 0xfa, 0x8f, 0xf5, 0x72, 0x80, 0xe5, 0x74, 0x19, 0x59, 0xe6, 0xc0, 0x5e, 0x05, 0x88, 0x0a, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1264 = { .name = "ecdsa_brainpoolp320r1_sha384_1264", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1264_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1264_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1264_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1265 for ECDSA, tcId is 255 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1265_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1265_msg[] = { 0x34, 0x39, 0x32, 0x39, 0x33, 0x39, 0x36, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1265_sig[] = { 0xd2, 0xab, 0x69, 0xae, 0x61, 0x10, 0xbb, 0x67, 0xed, 0x99, 0xff, 0xbd, 0xad, 0x80, 0x36, 0xdf, 0xab, 0xc4, 0x6d, 0xe8, 0xae, 0x1f, 0xc7, 0xe7, 0x99, 0x98, 0x6b, 0x91, 0xba, 0x7d, 0x45, 0x46, 0x72, 0xeb, 0xe4, 0x89, 0x6c, 0xf7, 0x20, 0x11, 0xd2, 0x9d, 0x67, 0xbf, 0x2b, 0x88, 0x27, 0x70, 0xd4, 0x6d, 0xbd, 0x06, 0xa6, 0xfb, 0xaa, 0xd5, 0x83, 0xc2, 0xce, 0xed, 0xcb, 0xd7, 0x72, 0x20, 0x0b, 0x75, 0x32, 0xe3, 0x54, 0xf8, 0x6e, 0xaf, 0x9a, 0x94, 0x18, 0x19, 0x1e, 0xaf, 0xc5, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1265 = { .name = "ecdsa_brainpoolp320r1_sha384_1265", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1265_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1265_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1265_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1266 for ECDSA, tcId is 256 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1266_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1266_msg[] = { 0x32, 0x31, 0x31, 0x32, 0x33, 0x35, 0x35, 0x39, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1266_sig[] = { 0x81, 0xda, 0x10, 0xc5, 0xfe, 0xf4, 0xbf, 0xb5, 0x8b, 0x4a, 0x73, 0xb4, 0xcf, 0x3f, 0xd4, 0xf0, 0xf0, 0x28, 0xb4, 0x48, 0xb3, 0x46, 0x3d, 0xab, 0xe0, 0xd6, 0xf1, 0xe1, 0x01, 0xaf, 0x57, 0x0f, 0xa6, 0x41, 0x16, 0x73, 0x1e, 0xa5, 0xb9, 0xc2, 0xce, 0xac, 0x01, 0xeb, 0xad, 0x70, 0x6e, 0xf4, 0x3c, 0x80, 0xca, 0xa1, 0xd8, 0x96, 0x2c, 0x65, 0x5b, 0xfd, 0x81, 0x03, 0x96, 0xb9, 0x4d, 0x2b, 0xbe, 0xa2, 0x99, 0xbd, 0x5c, 0xbc, 0xce, 0xd7, 0x55, 0x62, 0xb0, 0xfa, 0xb4, 0x46, 0xff, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1266 = { .name = "ecdsa_brainpoolp320r1_sha384_1266", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1266_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1266_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1266_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1267 for ECDSA, tcId is 257 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1267_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1267_msg[] = { 0x31, 0x32, 0x33, 0x39, 0x32, 0x37, 0x35, 0x37, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1267_sig[] = { 0x38, 0x35, 0x8b, 0xa2, 0xc4, 0x6f, 0x61, 0xf3, 0x9b, 0xef, 0x22, 0x87, 0x3a, 0x5b, 0xf2, 0x64, 0x64, 0xf2, 0xb0, 0x5e, 0x48, 0x74, 0xbb, 0xb6, 0x2a, 0x23, 0x23, 0x38, 0x5f, 0x8e, 0x87, 0xa5, 0xb1, 0x18, 0xa0, 0x07, 0x90, 0x78, 0xb4, 0x4d, 0x93, 0xf8, 0x4f, 0x06, 0x29, 0x0f, 0x48, 0x16, 0x19, 0x22, 0x55, 0x25, 0x77, 0x48, 0x2a, 0x97, 0x34, 0x04, 0xf4, 0x7c, 0x84, 0xc6, 0xe1, 0xa9, 0x46, 0x43, 0xc3, 0x83, 0x2f, 0xb2, 0x91, 0x2f, 0xc4, 0xb3, 0x85, 0x29, 0xe2, 0xf1, 0x3e, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1267 = { .name = "ecdsa_brainpoolp320r1_sha384_1267", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1267_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1267_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1267_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1268 for ECDSA, tcId is 258 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1268_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1268_msg[] = { 0x32, 0x30, 0x38, 0x31, 0x31, 0x38, 0x38, 0x37, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1268_sig[] = { 0xaf, 0xd1, 0xfb, 0xa7, 0x00, 0xfc, 0x70, 0x3f, 0xb7, 0x72, 0xf7, 0x01, 0x59, 0x7a, 0xdd, 0xdc, 0xce, 0x4f, 0xf9, 0xf5, 0x30, 0xc8, 0x30, 0xdc, 0x8c, 0x8c, 0xbd, 0x4b, 0x30, 0x70, 0xf4, 0xa2, 0x2b, 0x80, 0x51, 0x6b, 0x0b, 0x82, 0x09, 0x70, 0x76, 0xc2, 0xe8, 0x90, 0x86, 0x0c, 0x36, 0xbb, 0xb5, 0xf6, 0xa1, 0x05, 0x34, 0x01, 0xf1, 0xb5, 0x1a, 0xa8, 0x3c, 0xdf, 0xd9, 0x6a, 0x3c, 0x15, 0xe1, 0xa1, 0x83, 0xfd, 0xf8, 0x35, 0x7e, 0x49, 0xd2, 0x98, 0x4e, 0x4f, 0xcf, 0x19, 0xc2, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1268 = { .name = "ecdsa_brainpoolp320r1_sha384_1268", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1268_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1268_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1268_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1269 for ECDSA, tcId is 259 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1269_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1269_msg[] = { 0x34, 0x35, 0x34, 0x36, 0x30, 0x38, 0x39, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1269_sig[] = { 0x8c, 0x90, 0xd4, 0xc8, 0xbf, 0x02, 0x19, 0x06, 0xd3, 0xd5, 0x77, 0xbd, 0x16, 0xb3, 0xe1, 0x39, 0xbb, 0xc3, 0x5d, 0x76, 0x92, 0xa8, 0x28, 0xf0, 0xef, 0x5c, 0xdf, 0x9d, 0x51, 0xa8, 0x44, 0x22, 0x65, 0xf8, 0x15, 0x84, 0x9f, 0xe7, 0x93, 0xb8, 0x0b, 0xfe, 0x16, 0x49, 0x2a, 0xbb, 0x58, 0xa1, 0xd8, 0x06, 0x47, 0x67, 0x54, 0x6d, 0x29, 0xaa, 0xf6, 0x13, 0x8c, 0x58, 0x42, 0xc7, 0xf7, 0x00, 0x2f, 0xba, 0xc3, 0x4b, 0x78, 0xb3, 0x24, 0xb8, 0x44, 0x26, 0x51, 0x0c, 0x1b, 0x7b, 0x0d, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1269 = { .name = "ecdsa_brainpoolp320r1_sha384_1269", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1269_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1269_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1269_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1270 for ECDSA, tcId is 260 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1270_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1270_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x36, 0x38, 0x37, 0x31, 0x31, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1270_sig[] = { 0x6d, 0x07, 0xda, 0x92, 0xbd, 0x40, 0x59, 0x12, 0xb2, 0x2a, 0x99, 0x3e, 0xd3, 0x0e, 0x06, 0x14, 0x9c, 0x78, 0x74, 0x3f, 0xa1, 0x95, 0xfc, 0xd3, 0xba, 0xf0, 0x58, 0x03, 0xfd, 0xdd, 0x5a, 0x64, 0x08, 0x20, 0x1e, 0x68, 0xfa, 0xee, 0x62, 0x2a, 0x5a, 0xd3, 0xc8, 0xb4, 0xc1, 0xc6, 0x80, 0x80, 0x27, 0x9f, 0x20, 0xba, 0x15, 0x54, 0x83, 0x43, 0xfc, 0xa9, 0xec, 0x52, 0xfe, 0x23, 0xbd, 0xf5, 0x96, 0x19, 0x73, 0x8d, 0xd1, 0xbd, 0x41, 0x84, 0x14, 0xac, 0x53, 0xad, 0x7c, 0xe1, 0x6c, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1270 = { .name = "ecdsa_brainpoolp320r1_sha384_1270", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1270_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1270_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1270_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1271 for ECDSA, tcId is 261 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1271_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1271_msg[] = { 0x32, 0x30, 0x33, 0x31, 0x33, 0x38, 0x31, 0x38, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1271_sig[] = { 0xbe, 0x43, 0xdf, 0x61, 0x7f, 0x79, 0xef, 0x83, 0x40, 0x4e, 0x7c, 0x73, 0x93, 0xed, 0x3c, 0x38, 0xc8, 0x15, 0xd0, 0x6e, 0x3c, 0x0d, 0xeb, 0xf9, 0xba, 0x37, 0xf3, 0x6c, 0x41, 0x9a, 0x6c, 0x3e, 0xa6, 0x90, 0x82, 0x2f, 0x88, 0x01, 0x1f, 0xf1, 0x2f, 0x0a, 0xd4, 0xee, 0x5f, 0xe7, 0xad, 0x12, 0x8f, 0x58, 0xa5, 0x20, 0xa4, 0xfb, 0xad, 0x3f, 0x0a, 0x50, 0x2a, 0x4a, 0x44, 0x12, 0x63, 0x9b, 0x3d, 0xbc, 0x20, 0x6e, 0xdf, 0xb2, 0xa0, 0x3d, 0x56, 0x40, 0x10, 0xd7, 0x8d, 0x22, 0x28, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1271 = { .name = "ecdsa_brainpoolp320r1_sha384_1271", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1271_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1271_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1271_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1272 for ECDSA, tcId is 262 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1272_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1272_msg[] = { 0x32, 0x35, 0x35, 0x33, 0x35, 0x38, 0x33, 0x33, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1272_sig[] = { 0x84, 0x4c, 0xa2, 0x93, 0x40, 0x11, 0x2d, 0x0e, 0xb9, 0xdd, 0x15, 0xf6, 0x26, 0x55, 0xa0, 0xcf, 0xa9, 0x93, 0x41, 0x5e, 0x57, 0x05, 0x11, 0xa3, 0xf7, 0x27, 0x36, 0x23, 0xb8, 0x2d, 0x89, 0x2d, 0x13, 0x6c, 0x6e, 0x8b, 0xc5, 0x7d, 0xb8, 0x4e, 0x71, 0x11, 0x4a, 0xe5, 0x79, 0xd0, 0x53, 0xb5, 0xcb, 0x3d, 0x77, 0xd2, 0xe9, 0xfa, 0xf1, 0xc0, 0x6c, 0xc2, 0x63, 0xab, 0x8f, 0xd8, 0x45, 0xa0, 0x37, 0x8f, 0x4a, 0x75, 0xda, 0x86, 0xdd, 0xc2, 0x3a, 0xb4, 0xd0, 0x79, 0x46, 0x83, 0x2a, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1272 = { .name = "ecdsa_brainpoolp320r1_sha384_1272", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1272_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1272_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1272_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1273 for ECDSA, tcId is 263 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1273_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1273_msg[] = { 0x34, 0x36, 0x31, 0x38, 0x38, 0x34, 0x31, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1273_sig[] = { 0xcd, 0xa8, 0x53, 0x12, 0x22, 0x50, 0x2a, 0x62, 0x36, 0x8f, 0xdd, 0xc7, 0x24, 0x79, 0x88, 0x70, 0x03, 0x83, 0x33, 0xb9, 0xfa, 0x77, 0x14, 0x1d, 0x4b, 0xc5, 0xef, 0x75, 0x8f, 0x7e, 0x97, 0x3e, 0x5a, 0xb8, 0xb4, 0xcf, 0xae, 0x90, 0xea, 0xa1, 0x9e, 0xad, 0x50, 0xa2, 0x53, 0x32, 0x87, 0xab, 0xe5, 0x50, 0x4e, 0xfd, 0x8d, 0xb5, 0x7f, 0x8b, 0x96, 0xa7, 0xfe, 0x03, 0x9c, 0xc9, 0x5d, 0x16, 0x90, 0xea, 0x0c, 0x1e, 0x2c, 0x9d, 0xf5, 0xfc, 0x29, 0xcd, 0xdd, 0x7b, 0x01, 0xed, 0xb9, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1273 = { .name = "ecdsa_brainpoolp320r1_sha384_1273", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1273_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1273_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1273_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1274 for ECDSA, tcId is 264 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1274_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1274_msg[] = { 0x31, 0x30, 0x30, 0x39, 0x32, 0x34, 0x35, 0x38, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1274_sig[] = { 0x5c, 0x2c, 0x6a, 0x66, 0x13, 0x38, 0xdf, 0x36, 0x5a, 0xf8, 0xba, 0x10, 0x80, 0xb9, 0x94, 0xe5, 0x99, 0x89, 0xf0, 0x02, 0xfa, 0x4f, 0xff, 0x42, 0xfc, 0x89, 0x94, 0xca, 0x63, 0x95, 0x62, 0x01, 0x52, 0xf3, 0x97, 0x13, 0x00, 0xaf, 0xf6, 0xf9, 0x86, 0x81, 0xea, 0x17, 0x93, 0xbd, 0x3e, 0x06, 0x94, 0x26, 0x12, 0x7a, 0x6b, 0x66, 0x57, 0x25, 0xdd, 0xba, 0x4a, 0x8f, 0x19, 0x45, 0x85, 0x17, 0x43, 0x47, 0x7a, 0x1c, 0xbd, 0xc7, 0x35, 0x67, 0x13, 0xae, 0x70, 0xfc, 0x13, 0x85, 0x31, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1274 = { .name = "ecdsa_brainpoolp320r1_sha384_1274", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1274_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1274_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1274_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1275 for ECDSA, tcId is 265 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1275_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1275_msg[] = { 0x32, 0x37, 0x35, 0x36, 0x34, 0x36, 0x36, 0x35, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1275_sig[] = { 0x0e, 0x06, 0x1b, 0x48, 0xb5, 0xf7, 0x83, 0x6e, 0x0c, 0xaf, 0x73, 0xc9, 0x77, 0x0c, 0x3f, 0xee, 0x1f, 0x67, 0xec, 0x18, 0xde, 0xd9, 0xe1, 0xd3, 0x39, 0xab, 0x56, 0xd0, 0x5b, 0x9a, 0xdd, 0xe3, 0x69, 0x50, 0x4f, 0xed, 0xff, 0x1d, 0x66, 0x81, 0x00, 0x9d, 0xbc, 0x4a, 0xd8, 0xed, 0xc1, 0x89, 0x6f, 0xa0, 0x41, 0xca, 0x60, 0xac, 0x64, 0xb7, 0xfa, 0x14, 0x8e, 0x3f, 0x02, 0xb0, 0xf6, 0x97, 0xae, 0x22, 0xd9, 0x23, 0xf5, 0x26, 0xfd, 0x49, 0x36, 0xe5, 0xf5, 0x84, 0xb2, 0x3d, 0xdb, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1275 = { .name = "ecdsa_brainpoolp320r1_sha384_1275", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1275_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1275_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1275_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1276 for ECDSA, tcId is 266 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1276_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1276_msg[] = { 0x31, 0x31, 0x39, 0x36, 0x39, 0x37, 0x31, 0x30, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1276_sig[] = { 0xa8, 0x46, 0x26, 0x05, 0xc7, 0x94, 0x37, 0xc0, 0x68, 0x52, 0x3d, 0x93, 0xd2, 0xe1, 0x52, 0x9c, 0xca, 0xe1, 0xb5, 0x24, 0x8e, 0x8f, 0x9a, 0x90, 0xf2, 0xef, 0x08, 0xd9, 0xd5, 0xe5, 0x02, 0x5b, 0x36, 0x39, 0xf8, 0x2b, 0x70, 0xf1, 0xe7, 0xed, 0x67, 0xaa, 0x5f, 0xe4, 0xe7, 0x9e, 0x7c, 0x54, 0xa8, 0xce, 0x38, 0x9b, 0x90, 0xe1, 0xce, 0x15, 0x56, 0xaa, 0x68, 0x9b, 0x44, 0x81, 0x4a, 0x6c, 0xb5, 0xc2, 0xf0, 0xfe, 0x45, 0x69, 0xc5, 0xcf, 0xce, 0xe3, 0x4c, 0xbb, 0x4a, 0x08, 0x62, 0x19, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1276 = { .name = "ecdsa_brainpoolp320r1_sha384_1276", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1276_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1276_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1276_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1277 for ECDSA, tcId is 267 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1277_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1277_msg[] = { 0x32, 0x33, 0x33, 0x31, 0x34, 0x32, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1277_sig[] = { 0x93, 0xb0, 0x10, 0x29, 0x42, 0x1c, 0xa3, 0x0d, 0x8a, 0xbb, 0xd0, 0x6f, 0x13, 0x4e, 0xe9, 0xdc, 0xbe, 0x81, 0x79, 0x0d, 0x01, 0x27, 0x22, 0xae, 0x65, 0x21, 0x4f, 0x0a, 0xaa, 0x34, 0xbb, 0xa6, 0x42, 0xf4, 0x39, 0x49, 0xd5, 0xec, 0x51, 0xa5, 0x11, 0x0e, 0x4f, 0xce, 0x36, 0xe0, 0xc2, 0xac, 0xd8, 0x98, 0x12, 0x2f, 0xba, 0x75, 0x6e, 0x71, 0x1a, 0xd0, 0x82, 0x08, 0x7c, 0x36, 0xb1, 0x25, 0x08, 0x4f, 0x67, 0xb2, 0x2e, 0x37, 0xa0, 0x2b, 0xd6, 0x86, 0x28, 0xcd, 0xb1, 0x64, 0xec, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1277 = { .name = "ecdsa_brainpoolp320r1_sha384_1277", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1277_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1277_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1277_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1278 for ECDSA, tcId is 268 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1278_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1278_msg[] = { 0x31, 0x36, 0x37, 0x33, 0x34, 0x38, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1278_sig[] = { 0x6b, 0x6d, 0x89, 0x3c, 0x30, 0x55, 0xda, 0x5d, 0x5a, 0x2f, 0xf6, 0xce, 0x03, 0x8a, 0x1b, 0xec, 0x59, 0xb0, 0x49, 0x50, 0xbf, 0xd8, 0x01, 0x26, 0x48, 0xd6, 0x06, 0x31, 0x86, 0xff, 0x86, 0x1d, 0x7a, 0xa9, 0x1a, 0x51, 0x85, 0xaa, 0x3c, 0x0c, 0xa6, 0x02, 0xed, 0x34, 0xee, 0x41, 0xe4, 0x81, 0x12, 0x51, 0xa5, 0x1b, 0xd6, 0x70, 0x10, 0xf8, 0xeb, 0x33, 0x55, 0xb8, 0x69, 0x1d, 0xad, 0x66, 0x03, 0x5e, 0x72, 0x3d, 0x97, 0x13, 0x46, 0xf5, 0x7c, 0x8a, 0x0f, 0x47, 0x9f, 0xef, 0x66, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1278 = { .name = "ecdsa_brainpoolp320r1_sha384_1278", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1278_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1278_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1278_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1279 for ECDSA, tcId is 269 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1279_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1279_msg[] = { 0x31, 0x34, 0x36, 0x30, 0x31, 0x35, 0x39, 0x38, 0x32, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1279_sig[] = { 0x6f, 0xc4, 0x2c, 0xf2, 0x3a, 0xa4, 0x2c, 0x36, 0x67, 0x5f, 0xf1, 0x26, 0x41, 0x2c, 0x75, 0x7d, 0xde, 0x74, 0xef, 0x73, 0xca, 0xdb, 0x04, 0x25, 0xe2, 0x3c, 0xb7, 0x62, 0x30, 0xa5, 0x8b, 0x3d, 0x00, 0x23, 0x70, 0xb4, 0x16, 0x6b, 0xfd, 0x29, 0x4e, 0x61, 0xb9, 0xb1, 0x0a, 0x13, 0xfe, 0x0d, 0xd2, 0x75, 0x87, 0x33, 0xf6, 0xb1, 0x78, 0xaf, 0x98, 0xe0, 0x07, 0x98, 0x67, 0x83, 0x7d, 0x55, 0xf8, 0xe5, 0xe9, 0x0b, 0x57, 0x7d, 0xe9, 0x0c, 0xe0, 0xd8, 0xdc, 0x34, 0x5e, 0xd1, 0x6b, 0x38, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1279 = { .name = "ecdsa_brainpoolp320r1_sha384_1279", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1279_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1279_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1279_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1280 for ECDSA, tcId is 270 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1280_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1280_msg[] = { 0x38, 0x39, 0x39, 0x30, 0x38, 0x35, 0x39, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1280_sig[] = { 0xb5, 0x29, 0xa5, 0x63, 0xa2, 0xf4, 0x06, 0x5d, 0x33, 0x3c, 0x81, 0x2b, 0x0b, 0x61, 0x34, 0xde, 0x97, 0x35, 0xbb, 0x26, 0x9f, 0xea, 0x76, 0x3f, 0x01, 0xcf, 0x7d, 0x1c, 0x6a, 0x0e, 0xc7, 0x0d, 0x72, 0x23, 0xc7, 0xe6, 0xc1, 0xb0, 0x40, 0xe8, 0x34, 0x7f, 0xcb, 0x8f, 0x39, 0x71, 0xb3, 0xd9, 0x68, 0xba, 0x70, 0x9b, 0x1b, 0xd4, 0xd3, 0x1b, 0x55, 0x0c, 0xce, 0xed, 0x23, 0x22, 0x68, 0xca, 0x0d, 0xf1, 0xe0, 0x05, 0x02, 0xa5, 0x6a, 0xa4, 0x2d, 0xde, 0x73, 0x30, 0xbd, 0x91, 0x9d, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1280 = { .name = "ecdsa_brainpoolp320r1_sha384_1280", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1280_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1280_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1280_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1281 for ECDSA, tcId is 271 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1281_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1281_msg[] = { 0x34, 0x33, 0x32, 0x36, 0x34, 0x34, 0x30, 0x39, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1281_sig[] = { 0xb9, 0x1b, 0x2a, 0x73, 0x44, 0x95, 0x60, 0x52, 0x21, 0x12, 0xfa, 0x4f, 0xd1, 0xb5, 0x7b, 0x8c, 0x24, 0x75, 0x47, 0x91, 0xaf, 0x24, 0x7a, 0x8c, 0x9d, 0xe4, 0x23, 0xe0, 0xbd, 0x53, 0x62, 0x89, 0xa4, 0xfe, 0x85, 0x0f, 0x7e, 0x3c, 0x43, 0xae, 0x2e, 0xb3, 0xf8, 0x74, 0xf2, 0xe5, 0xec, 0x56, 0x35, 0x6b, 0xf6, 0xba, 0xf1, 0x0b, 0x64, 0xb7, 0xc5, 0x4b, 0x13, 0x44, 0x7c, 0xcc, 0xa1, 0xff, 0xc6, 0x6a, 0x1f, 0xc8, 0x9d, 0xc8, 0xe9, 0x77, 0x80, 0x17, 0x48, 0xf8, 0xf0, 0xce, 0x5a, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1281 = { .name = "ecdsa_brainpoolp320r1_sha384_1281", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1281_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1281_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1281_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1282 for ECDSA, tcId is 272 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1282_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1282_msg[] = { 0x32, 0x33, 0x37, 0x36, 0x34, 0x33, 0x37, 0x35, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1282_sig[] = { 0x31, 0x43, 0x38, 0x68, 0x3f, 0x23, 0xb1, 0x11, 0x0d, 0x18, 0x40, 0x73, 0x2f, 0x67, 0x22, 0x54, 0xf3, 0x80, 0x79, 0xbf, 0x11, 0xee, 0xaf, 0xff, 0x1e, 0xc2, 0xe5, 0x3a, 0x53, 0x73, 0xf7, 0x4c, 0x98, 0x88, 0x7b, 0x11, 0xeb, 0xb7, 0x8c, 0x86, 0xb7, 0xe3, 0xa6, 0xb4, 0x59, 0xdd, 0x10, 0xcf, 0xb5, 0xdf, 0x6d, 0x2e, 0xa7, 0xaf, 0xb1, 0x5e, 0xfe, 0xb1, 0xe5, 0xe9, 0x17, 0xe5, 0xaa, 0x44, 0xfa, 0x54, 0x74, 0x36, 0x89, 0xd7, 0xda, 0xf1, 0x63, 0xf9, 0x98, 0xe0, 0x57, 0x19, 0x12, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1282 = { .name = "ecdsa_brainpoolp320r1_sha384_1282", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1282_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1282_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1282_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1283 for ECDSA, tcId is 273 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1283_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1283_msg[] = { 0x38, 0x36, 0x30, 0x33, 0x39, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1283_sig[] = { 0x22, 0xd1, 0x88, 0x1a, 0x94, 0xe1, 0xe1, 0x1c, 0xf1, 0x06, 0x20, 0xf3, 0x7d, 0x70, 0x8e, 0xbe, 0xd8, 0x47, 0xf1, 0x45, 0x91, 0x29, 0xa0, 0xd4, 0x2c, 0xb4, 0x57, 0xda, 0x80, 0x51, 0xf8, 0x1a, 0x0f, 0x9d, 0xa8, 0x46, 0x28, 0x1a, 0x68, 0xf7, 0x40, 0x46, 0x52, 0xeb, 0xd2, 0x61, 0xf5, 0xf6, 0xb1, 0x85, 0xde, 0x4a, 0x16, 0x98, 0x0d, 0xc3, 0x66, 0x2f, 0xc4, 0x57, 0x3e, 0x24, 0x55, 0x77, 0xe7, 0xef, 0x6e, 0x3c, 0xbf, 0xdd, 0x47, 0xbc, 0x1e, 0x48, 0x7b, 0xa2, 0x06, 0xcc, 0xf7, 0x60, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1283 = { .name = "ecdsa_brainpoolp320r1_sha384_1283", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1283_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1283_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1283_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1284 for ECDSA, tcId is 274 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1284_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1284_msg[] = { 0x35, 0x38, 0x30, 0x37, 0x37, 0x37, 0x33, 0x39, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1284_sig[] = { 0x86, 0x39, 0x70, 0xca, 0xec, 0x6c, 0x6f, 0xf0, 0xa1, 0xc7, 0x0f, 0x60, 0x85, 0x95, 0x76, 0xe3, 0x58, 0x3e, 0x6b, 0x52, 0x9d, 0xe3, 0xf9, 0x28, 0x13, 0x6e, 0x84, 0x8c, 0x56, 0xb6, 0xc6, 0x71, 0x50, 0x45, 0xfd, 0xfe, 0x52, 0x63, 0x77, 0x47, 0x66, 0x7f, 0x52, 0x5a, 0x88, 0xbe, 0x89, 0x1e, 0xc6, 0xb9, 0xf9, 0x6d, 0x1a, 0x68, 0xc4, 0xf0, 0x6b, 0x3b, 0x3d, 0x2a, 0xd1, 0xc1, 0x5f, 0x06, 0x3d, 0x11, 0x0e, 0xc9, 0xfb, 0x60, 0xae, 0x74, 0x63, 0xdd, 0x56, 0x8a, 0x69, 0xce, 0x45, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1284 = { .name = "ecdsa_brainpoolp320r1_sha384_1284", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1284_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1284_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1284_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1285 for ECDSA, tcId is 275 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1285_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1285_msg[] = { 0x35, 0x37, 0x31, 0x38, 0x36, 0x36, 0x38, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1285_sig[] = { 0x69, 0xcf, 0x06, 0x00, 0x38, 0x4c, 0xeb, 0x83, 0x2e, 0x23, 0x7b, 0x6b, 0x45, 0x3d, 0xea, 0x81, 0xa3, 0xc1, 0x9c, 0xb8, 0xfa, 0xe4, 0x8b, 0xa1, 0x86, 0xd2, 0x8e, 0x3b, 0x11, 0x84, 0x64, 0xb2, 0x7a, 0xf9, 0x10, 0x0f, 0x18, 0x1b, 0x73, 0x8a, 0x27, 0x80, 0x26, 0x9a, 0x8f, 0xa4, 0x07, 0x90, 0xed, 0x72, 0x63, 0x72, 0xee, 0x09, 0x56, 0x26, 0x5e, 0x72, 0x89, 0x6d, 0x9e, 0x84, 0xf7, 0x13, 0xf8, 0x83, 0xa3, 0xbc, 0x05, 0x48, 0xe8, 0xd3, 0xa2, 0xb3, 0x57, 0x33, 0x3d, 0xda, 0x4c, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1285 = { .name = "ecdsa_brainpoolp320r1_sha384_1285", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1285_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1285_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1285_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1286 for ECDSA, tcId is 276 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1286_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1286_msg[] = { 0x38, 0x36, 0x37, 0x37, 0x33, 0x30, 0x39, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1286_sig[] = { 0x30, 0xf3, 0x81, 0x39, 0x88, 0x3f, 0x71, 0xc0, 0xc6, 0x4d, 0x63, 0xad, 0xcb, 0x73, 0x1f, 0x1c, 0x38, 0x5d, 0xf8, 0x7d, 0xb7, 0xce, 0x73, 0x26, 0xbf, 0x50, 0x41, 0x0a, 0xcc, 0x50, 0xf0, 0xba, 0xbf, 0x50, 0x17, 0xf9, 0x2a, 0x1e, 0x1a, 0x6e, 0x59, 0x77, 0x34, 0x22, 0x24, 0x82, 0x72, 0x46, 0x43, 0xf6, 0x0e, 0x48, 0xb3, 0xb5, 0x89, 0xde, 0xaa, 0x37, 0xb8, 0x6e, 0x1d, 0xe1, 0xcf, 0x0b, 0x12, 0x9b, 0x28, 0x6e, 0xc6, 0x76, 0x86, 0x57, 0x4f, 0x16, 0xcf, 0xb5, 0xf2, 0xcc, 0x6f, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1286 = { .name = "ecdsa_brainpoolp320r1_sha384_1286", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1286_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1286_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1286_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1287 for ECDSA, tcId is 277 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1287_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1287_msg[] = { 0x32, 0x34, 0x37, 0x35, 0x35, 0x31, 0x35, 0x30, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1287_sig[] = { 0x17, 0x4a, 0xe9, 0x8c, 0xc2, 0x5d, 0xbe, 0xd7, 0x47, 0xce, 0xdf, 0x86, 0x97, 0x26, 0x6d, 0x16, 0xe9, 0x6b, 0xb4, 0xf8, 0x07, 0x1c, 0x90, 0x59, 0x90, 0xf4, 0xe7, 0x2c, 0x72, 0x8c, 0x94, 0xaa, 0xa3, 0x2d, 0xce, 0x24, 0xa5, 0x21, 0x66, 0xfb, 0x57, 0x80, 0x99, 0x83, 0x5a, 0x3d, 0xcb, 0x3d, 0xa2, 0xfd, 0x42, 0x75, 0x01, 0x80, 0x07, 0x9d, 0xa4, 0x07, 0xc7, 0xa1, 0x42, 0xcb, 0xcc, 0xb6, 0x99, 0xfe, 0xd7, 0xaf, 0x89, 0xdd, 0x70, 0x3b, 0xa0, 0xca, 0xd9, 0x4c, 0xdf, 0x2c, 0x05, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1287 = { .name = "ecdsa_brainpoolp320r1_sha384_1287", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1287_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1287_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1287_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1288 for ECDSA, tcId is 278 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1288_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1288_msg[] = { 0x39, 0x37, 0x33, 0x31, 0x37, 0x36, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1288_sig[] = { 0x58, 0xcf, 0xb1, 0x51, 0x1a, 0x22, 0x3c, 0x06, 0xb3, 0xe9, 0x74, 0xb6, 0x60, 0xbe, 0xd8, 0x27, 0xbe, 0xe3, 0x8c, 0x59, 0xc4, 0x52, 0x30, 0x68, 0xe9, 0xc9, 0xfa, 0xa3, 0x30, 0xc9, 0x70, 0xe6, 0x27, 0x1e, 0xa3, 0x87, 0xdb, 0x6b, 0x40, 0xb0, 0x76, 0x35, 0x94, 0xce, 0xd6, 0xe8, 0x41, 0x3b, 0xfd, 0x90, 0xd5, 0xce, 0xca, 0x18, 0xd6, 0x77, 0x4a, 0x3d, 0xa8, 0x74, 0x73, 0xcc, 0x4d, 0xee, 0x72, 0x6b, 0x03, 0x25, 0xe2, 0xdf, 0x8b, 0x25, 0x7d, 0x9e, 0x01, 0x31, 0x8a, 0xe7, 0xe0, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1288 = { .name = "ecdsa_brainpoolp320r1_sha384_1288", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1288_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1288_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1288_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1289 for ECDSA, tcId is 279 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1289_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1289_msg[] = { 0x33, 0x36, 0x39, 0x38, 0x30, 0x39, 0x35, 0x31, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1289_sig[] = { 0x8d, 0xdb, 0xa4, 0xf7, 0xaa, 0x8c, 0xc5, 0xe0, 0x0a, 0x3f, 0xfd, 0x2a, 0x08, 0x27, 0x10, 0xd4, 0x2d, 0x3a, 0x88, 0xf9, 0xf9, 0x47, 0xba, 0x51, 0xf0, 0x94, 0x66, 0xc2, 0xa9, 0x29, 0x5c, 0xaa, 0x13, 0x1b, 0x8a, 0xe9, 0xef, 0x51, 0xb3, 0x5c, 0xbc, 0x34, 0x10, 0x03, 0x3a, 0x57, 0x98, 0xd9, 0xe4, 0xc6, 0xa8, 0x17, 0xda, 0x17, 0x59, 0xc0, 0x0c, 0x0d, 0x38, 0xe3, 0xc1, 0xff, 0x22, 0xf0, 0xa4, 0x1e, 0x5a, 0xd0, 0xd1, 0xe9, 0x14, 0xe7, 0x1c, 0x90, 0x7d, 0xa8, 0xc2, 0x45, 0xca, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1289 = { .name = "ecdsa_brainpoolp320r1_sha384_1289", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1289_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1289_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1289_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1290 for ECDSA, tcId is 280 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1290_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1290_msg[] = { 0x31, 0x30, 0x37, 0x35, 0x30, 0x32, 0x36, 0x38, 0x35, 0x37, 0x36, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1290_sig[] = { 0x2f, 0x7e, 0x50, 0xee, 0x96, 0x70, 0x6d, 0x59, 0x7d, 0x8b, 0xf0, 0x10, 0x3f, 0xa4, 0x67, 0x86, 0x74, 0x6a, 0x2c, 0x65, 0xc0, 0x21, 0xfa, 0xc7, 0xfa, 0x37, 0x8d, 0x24, 0x4c, 0x41, 0x8a, 0x42, 0xb7, 0x90, 0x8f, 0x0f, 0xab, 0x2d, 0xff, 0xca, 0xb7, 0xb9, 0x4f, 0x2a, 0x88, 0x3b, 0xa1, 0xb4, 0x98, 0x58, 0x32, 0x9c, 0xc7, 0x8f, 0xc2, 0xa9, 0x92, 0x10, 0x98, 0x09, 0xb4, 0x70, 0xb8, 0x78, 0xcc, 0x38, 0xe1, 0xbd, 0xd4, 0xdf, 0x3e, 0xe0, 0x0a, 0x0a, 0xe7, 0xe2, 0x28, 0xe4, 0x66, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1290 = { .name = "ecdsa_brainpoolp320r1_sha384_1290", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1290_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1290_msg, .msglen = 11, .sig = ecdsa_brainpoolp320r1_sha384_1290_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1291 for ECDSA, tcId is 281 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1291_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1291_msg[] = { 0x38, 0x36, 0x39, 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1291_sig[] = { 0x45, 0x91, 0x49, 0x1e, 0xee, 0x04, 0xe1, 0x0a, 0x40, 0xa1, 0xe8, 0xeb, 0x82, 0x14, 0x81, 0x95, 0x12, 0x33, 0x48, 0xec, 0x1a, 0x7c, 0xba, 0x06, 0x04, 0x4e, 0x8f, 0x22, 0x6e, 0xd3, 0x09, 0x10, 0xb6, 0x93, 0xeb, 0xbb, 0xae, 0xe0, 0x68, 0x5f, 0x1b, 0x8b, 0x37, 0x33, 0xcc, 0x5c, 0xa1, 0x5d, 0xad, 0x84, 0x80, 0x9d, 0xf8, 0x49, 0x97, 0x88, 0xb4, 0x89, 0x9c, 0xba, 0x30, 0x7f, 0x93, 0xb4, 0x9e, 0xa6, 0xa6, 0x3b, 0x9e, 0x77, 0x48, 0x7c, 0x3c, 0x98, 0xb8, 0x03, 0xfc, 0xe6, 0x9c, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1291 = { .name = "ecdsa_brainpoolp320r1_sha384_1291", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1291_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1291_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1291_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1292 for ECDSA, tcId is 282 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1292_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1292_msg[] = { 0x32, 0x31, 0x37, 0x34, 0x36, 0x35, 0x35, 0x34, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1292_sig[] = { 0x9d, 0x22, 0xb8, 0x64, 0xe2, 0x70, 0x6f, 0xa4, 0x3a, 0x67, 0xea, 0x62, 0xf3, 0x9e, 0x4d, 0x3f, 0x40, 0x27, 0x67, 0xd9, 0xd0, 0x38, 0xc7, 0x8e, 0x28, 0x44, 0xd6, 0x99, 0xf4, 0x1e, 0xaf, 0x1a, 0x64, 0x1c, 0xfd, 0xd9, 0xd6, 0xa6, 0x3f, 0xb5, 0x1e, 0xaa, 0xcd, 0xad, 0x82, 0x94, 0xec, 0xc2, 0xca, 0x0c, 0x55, 0xe6, 0xe7, 0x3d, 0xf0, 0x3d, 0x83, 0x2b, 0xea, 0xfe, 0x04, 0x8f, 0xc6, 0x90, 0x89, 0x5b, 0xec, 0xa5, 0xce, 0xad, 0x9d, 0x01, 0xd3, 0x7b, 0x3f, 0xed, 0x57, 0x41, 0xcb, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1292 = { .name = "ecdsa_brainpoolp320r1_sha384_1292", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1292_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1292_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1292_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1293 for ECDSA, tcId is 283 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1293_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1293_msg[] = { 0x36, 0x34, 0x34, 0x35, 0x35, 0x30, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1293_sig[] = { 0x8f, 0x15, 0x02, 0x14, 0x3e, 0xff, 0x37, 0x2f, 0xb9, 0xbd, 0xd9, 0x56, 0xec, 0xe3, 0x5d, 0x23, 0x24, 0x03, 0xfe, 0xd7, 0xf7, 0x7e, 0xb4, 0xf4, 0x55, 0x2d, 0x4f, 0xc8, 0x4e, 0x4a, 0x2e, 0x5d, 0x6c, 0x8c, 0xcf, 0x06, 0xf5, 0xa6, 0xad, 0x61, 0x46, 0x21, 0xc9, 0xfb, 0xc3, 0x74, 0x66, 0xf7, 0xc7, 0x57, 0xf6, 0x6d, 0x17, 0x1d, 0xa8, 0xee, 0x0a, 0x0d, 0xd5, 0xf2, 0x41, 0x13, 0xe2, 0xf5, 0x17, 0xa0, 0x82, 0xb7, 0xab, 0x5d, 0x41, 0x23, 0xc3, 0xee, 0xc9, 0xee, 0xad, 0xf6, 0x99, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1293 = { .name = "ecdsa_brainpoolp320r1_sha384_1293", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1293_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1293_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1293_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1294 for ECDSA, tcId is 284 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1294_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1294_msg[] = { 0x35, 0x33, 0x32, 0x38, 0x31, 0x38, 0x33, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1294_sig[] = { 0x8d, 0xcd, 0xcc, 0x74, 0xa2, 0x5f, 0xcd, 0x92, 0xe4, 0x37, 0x2e, 0x11, 0x36, 0x4a, 0x36, 0x1c, 0x7a, 0x2d, 0x7f, 0x3d, 0xd7, 0x4c, 0x5d, 0x6b, 0xc3, 0x76, 0x1c, 0x07, 0xfe, 0x78, 0xf0, 0x84, 0x76, 0x5d, 0xe8, 0xce, 0x70, 0xe4, 0x48, 0xfa, 0xb3, 0xcf, 0xdb, 0x35, 0xc2, 0x0b, 0x1e, 0x30, 0xd3, 0xc2, 0x16, 0xdc, 0xef, 0x3c, 0x73, 0xcd, 0x44, 0xef, 0x19, 0x73, 0xc8, 0x69, 0x5c, 0x8a, 0xb4, 0x39, 0xf7, 0xe2, 0x66, 0x28, 0x57, 0x4e, 0x0f, 0x34, 0x9d, 0x81, 0xc5, 0x98, 0xd1, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1294 = { .name = "ecdsa_brainpoolp320r1_sha384_1294", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1294_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1294_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1294_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1295 for ECDSA, tcId is 285 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1295_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1295_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x30, 0x37, 0x36, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1295_sig[] = { 0xbc, 0x2a, 0x5b, 0x09, 0x8f, 0x72, 0x48, 0x30, 0xa1, 0x90, 0x48, 0x0f, 0xff, 0x5f, 0xaf, 0xa0, 0xf2, 0xfe, 0x85, 0xbf, 0x17, 0x17, 0x6a, 0xf8, 0xd4, 0xeb, 0x67, 0x0e, 0x1d, 0x55, 0x53, 0x3f, 0x82, 0x0d, 0x69, 0x0e, 0x76, 0xb3, 0xbc, 0xcd, 0x51, 0x6c, 0x57, 0x64, 0x44, 0xbe, 0x02, 0x50, 0xe3, 0x38, 0x23, 0x30, 0x2a, 0xdb, 0x70, 0x8b, 0x66, 0x22, 0xf1, 0x7e, 0x24, 0x38, 0xf0, 0x18, 0x00, 0xc5, 0x8e, 0xdc, 0xf9, 0x07, 0xe5, 0x05, 0xb4, 0x19, 0xf6, 0xc0, 0xdf, 0xf1, 0x1a, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1295 = { .name = "ecdsa_brainpoolp320r1_sha384_1295", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1295_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1295_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1295_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 285 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1296 for ECDSA, tcId is 286 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1296_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1296_msg[] = { 0x31, 0x35, 0x33, 0x32, 0x38, 0x34, 0x32, 0x32, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1296_sig[] = { 0xb3, 0x20, 0x8e, 0x3c, 0x49, 0xa8, 0xce, 0x5f, 0xb8, 0x9e, 0xff, 0xb2, 0x48, 0x0e, 0x8c, 0xa6, 0xb9, 0xe1, 0x1b, 0x16, 0xa0, 0x49, 0xae, 0xcf, 0x0c, 0xe3, 0x54, 0x50, 0xe1, 0xe5, 0x35, 0x09, 0x90, 0x9b, 0x02, 0xab, 0x33, 0xe6, 0x63, 0xe2, 0x36, 0x2a, 0xff, 0xc0, 0x91, 0xfa, 0x46, 0xd7, 0x1a, 0xe8, 0x4e, 0x27, 0x97, 0x9a, 0xb5, 0x75, 0xc6, 0x0f, 0x11, 0x58, 0x45, 0xfc, 0x52, 0x1e, 0x0a, 0x81, 0x59, 0x1a, 0xb2, 0x33, 0xbd, 0x32, 0xe6, 0xab, 0x0e, 0x8b, 0x08, 0x80, 0x98, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1296 = { .name = "ecdsa_brainpoolp320r1_sha384_1296", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1296_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1296_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1296_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 286 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1297 for ECDSA, tcId is 287 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1297_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1297_msg[] = { 0x31, 0x35, 0x36, 0x37, 0x31, 0x37, 0x37, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1297_sig[] = { 0x91, 0xcd, 0x13, 0x3d, 0x74, 0xc7, 0x01, 0xc9, 0x36, 0x75, 0x80, 0x54, 0x75, 0x35, 0x91, 0xd3, 0x1f, 0x1d, 0x85, 0x42, 0x13, 0xb4, 0x06, 0x7e, 0x03, 0x38, 0x80, 0x11, 0x6d, 0x46, 0x53, 0xcf, 0x25, 0x70, 0x15, 0x44, 0x5c, 0x55, 0x63, 0xea, 0x43, 0x18, 0x5b, 0x31, 0xdb, 0xee, 0x46, 0xdb, 0xb6, 0x2d, 0x1c, 0xda, 0xad, 0xf4, 0x79, 0xaa, 0x4f, 0x4b, 0x0b, 0x32, 0xdb, 0xc4, 0x9e, 0xf5, 0xcc, 0xad, 0x43, 0xc9, 0xf0, 0xfc, 0xd9, 0x4f, 0x06, 0xbd, 0xf6, 0x31, 0x5e, 0x67, 0xc7, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1297 = { .name = "ecdsa_brainpoolp320r1_sha384_1297", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1297_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1297_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1297_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 287 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1298 for ECDSA, tcId is 288 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1298_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1298_msg[] = { 0x34, 0x33, 0x30, 0x33, 0x30, 0x39, 0x31, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1298_sig[] = { 0xc6, 0x3a, 0xc9, 0xad, 0xa6, 0xe0, 0xa0, 0x0d, 0xbd, 0xc1, 0x71, 0xf4, 0xce, 0xd1, 0xc1, 0x62, 0x94, 0x88, 0x1c, 0xd7, 0xb8, 0xcc, 0x91, 0xe6, 0x7d, 0x0f, 0x97, 0xf5, 0xa6, 0x19, 0x09, 0xac, 0x6a, 0x69, 0x4a, 0xb0, 0xb0, 0xd3, 0x7a, 0x6c, 0xb3, 0x3d, 0x68, 0x76, 0xf4, 0x46, 0x4e, 0x7a, 0xd8, 0xe2, 0x7a, 0x19, 0x5f, 0x63, 0xb4, 0x9f, 0xad, 0x3b, 0xe8, 0xf4, 0x68, 0x4f, 0x4c, 0x3d, 0x42, 0xf5, 0x89, 0x13, 0x94, 0x4a, 0xbc, 0x60, 0x17, 0x3e, 0x51, 0x13, 0x58, 0x1d, 0x94, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1298 = { .name = "ecdsa_brainpoolp320r1_sha384_1298", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1298_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1298_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1298_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 288 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1299 for ECDSA, tcId is 289 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1299_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1299_msg[] = { 0x37, 0x37, 0x33, 0x35, 0x39, 0x31, 0x35, 0x35, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1299_sig[] = { 0x48, 0x9d, 0xb4, 0x6f, 0x6a, 0xb8, 0x76, 0x24, 0xa3, 0x32, 0x37, 0x67, 0x35, 0xaa, 0xf8, 0xe6, 0xc4, 0xc4, 0x3a, 0xff, 0xdb, 0x9b, 0x93, 0xc7, 0x86, 0x82, 0xd3, 0xf9, 0x0c, 0x1e, 0x01, 0xca, 0xad, 0xbc, 0xac, 0x4c, 0x97, 0x5a, 0x22, 0x13, 0x8e, 0x10, 0xc6, 0x41, 0x16, 0xc4, 0x04, 0x2b, 0x71, 0xbd, 0x98, 0x72, 0xc0, 0x50, 0x6a, 0x7b, 0x34, 0xb6, 0xff, 0xfa, 0x9c, 0x3e, 0x24, 0xf8, 0x43, 0xce, 0x18, 0x27, 0x0e, 0x3f, 0x16, 0x36, 0x59, 0xdd, 0xc4, 0xa2, 0x46, 0x0a, 0x43, 0x82, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1299 = { .name = "ecdsa_brainpoolp320r1_sha384_1299", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1299_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1299_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1299_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 289 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1300 for ECDSA, tcId is 290 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1300_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1300_msg[] = { 0x32, 0x34, 0x33, 0x39, 0x36, 0x36, 0x37, 0x34, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1300_sig[] = { 0x09, 0xf7, 0xe1, 0x03, 0x55, 0x03, 0x37, 0xe3, 0x6e, 0xa0, 0x9f, 0x9a, 0xb3, 0xb8, 0x35, 0x80, 0xdd, 0xc6, 0x25, 0x9f, 0xb9, 0xda, 0xf3, 0x8b, 0x42, 0x41, 0x75, 0xd6, 0x41, 0x34, 0xd1, 0x4c, 0xae, 0x31, 0x12, 0xbd, 0xdd, 0x7b, 0x21, 0xaf, 0x25, 0x37, 0x19, 0xf8, 0xce, 0x11, 0x61, 0x95, 0x98, 0x41, 0xb0, 0x6a, 0xe3, 0x1d, 0xc9, 0xd8, 0x4c, 0xf0, 0xdf, 0x90, 0xdf, 0xfc, 0x10, 0x1f, 0x04, 0x42, 0xc8, 0xe9, 0x8c, 0x04, 0x0e, 0x4d, 0x53, 0xf8, 0xec, 0xd7, 0x09, 0xb6, 0x20, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1300 = { .name = "ecdsa_brainpoolp320r1_sha384_1300", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1300_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1300_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1300_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 290 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1301 for ECDSA, tcId is 291 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1301_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1301_msg[] = { 0x34, 0x33, 0x32, 0x37, 0x36, 0x30, 0x32, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1301_sig[] = { 0x41, 0x31, 0x07, 0x39, 0xde, 0x7f, 0x1e, 0x06, 0x16, 0x9f, 0x37, 0x5d, 0x73, 0xe0, 0x65, 0x50, 0xa5, 0x08, 0x50, 0xbe, 0x6a, 0xef, 0x43, 0x2e, 0xf2, 0x14, 0x3d, 0x7a, 0xdd, 0xfa, 0xf2, 0x18, 0xf6, 0x88, 0x36, 0x37, 0x59, 0x21, 0x00, 0x6e, 0x43, 0xc4, 0x59, 0x4e, 0x62, 0x5f, 0x7a, 0xaa, 0x75, 0x7e, 0xea, 0x84, 0x74, 0x51, 0xd0, 0x15, 0x5b, 0xd6, 0xb8, 0x20, 0x88, 0x33, 0x06, 0xb9, 0x21, 0x18, 0x4e, 0xc8, 0x14, 0x1c, 0xa2, 0xb8, 0xc2, 0x3b, 0x1d, 0xd6, 0x4b, 0x98, 0x0f, 0x97, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1301 = { .name = "ecdsa_brainpoolp320r1_sha384_1301", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1301_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1301_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1301_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 291 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1302 for ECDSA, tcId is 292 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1302_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1302_msg[] = { 0x32, 0x39, 0x33, 0x32, 0x30, 0x30, 0x32, 0x35, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1302_sig[] = { 0xcf, 0x06, 0x72, 0xd1, 0x8f, 0x93, 0xbd, 0x9c, 0x8c, 0x1c, 0x5e, 0x17, 0xd9, 0x0a, 0x91, 0x8c, 0x5c, 0xc8, 0xfd, 0xb9, 0x67, 0xf9, 0xd2, 0xad, 0x72, 0x7d, 0xd7, 0x2e, 0xc9, 0x92, 0x11, 0x67, 0x41, 0xb1, 0x75, 0xd3, 0x53, 0x93, 0x88, 0x5d, 0x02, 0x9e, 0x74, 0x7e, 0xa2, 0xc1, 0xd6, 0x6f, 0x1b, 0x4c, 0x5b, 0xe4, 0x92, 0xbd, 0x3b, 0x0c, 0xe0, 0x1e, 0x84, 0x20, 0xa6, 0x26, 0xa8, 0xa8, 0xe1, 0x25, 0xc3, 0xb5, 0x8c, 0x61, 0x4c, 0xab, 0x12, 0xe6, 0xed, 0xbf, 0xc1, 0x3f, 0x8a, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1302 = { .name = "ecdsa_brainpoolp320r1_sha384_1302", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1302_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1302_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1302_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 292 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1303 for ECDSA, tcId is 293 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1303_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1303_msg[] = { 0x36, 0x34, 0x30, 0x39, 0x38, 0x37, 0x37, 0x32, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1303_sig[] = { 0x2a, 0x24, 0x7a, 0x37, 0xc4, 0x89, 0x97, 0x4e, 0xd8, 0x94, 0x6e, 0x5e, 0x8b, 0xd5, 0xa9, 0xd2, 0x98, 0xd7, 0xaf, 0xcc, 0x41, 0x6b, 0x5e, 0xfc, 0x3a, 0x9c, 0x69, 0xba, 0x61, 0xd6, 0x53, 0x8a, 0xd5, 0x29, 0x47, 0x75, 0xd1, 0xc2, 0xa4, 0x79, 0x48, 0xf5, 0x71, 0x6a, 0xb8, 0xb4, 0x09, 0xf2, 0x84, 0x35, 0x10, 0x51, 0xdc, 0xd2, 0x22, 0xcc, 0x5e, 0xc4, 0xf1, 0xb8, 0xc7, 0x17, 0x08, 0xb1, 0xe8, 0x5e, 0xd4, 0xdb, 0x1e, 0xce, 0xc7, 0x38, 0x88, 0xbd, 0x8f, 0x78, 0xc1, 0xe7, 0x4d, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1303 = { .name = "ecdsa_brainpoolp320r1_sha384_1303", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1303_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1303_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1303_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 293 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1304 for ECDSA, tcId is 294 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1304_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1304_msg[] = { 0x36, 0x30, 0x37, 0x35, 0x36, 0x39, 0x30, 0x34, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1304_sig[] = { 0x7a, 0x2d, 0x71, 0xce, 0x07, 0x4e, 0xaa, 0xa4, 0xdf, 0xf6, 0xd1, 0x04, 0xfb, 0x6e, 0x7b, 0x07, 0x0c, 0xb0, 0x9c, 0x23, 0x5d, 0xeb, 0x69, 0x7f, 0x53, 0x34, 0x91, 0x8e, 0x18, 0x1c, 0xe9, 0xbb, 0xe5, 0x47, 0xb7, 0x9a, 0xb3, 0x79, 0x69, 0xf1, 0x6d, 0xc1, 0x4d, 0x2b, 0xfa, 0x01, 0xe0, 0xcb, 0x36, 0x87, 0x8d, 0x1a, 0xef, 0x21, 0x6d, 0xf9, 0x92, 0xb5, 0xc3, 0xf0, 0x58, 0xfa, 0xb8, 0xce, 0x92, 0x22, 0x49, 0xb5, 0x9c, 0xb7, 0x25, 0x56, 0x36, 0x41, 0x38, 0x38, 0x95, 0x61, 0xaf, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1304 = { .name = "ecdsa_brainpoolp320r1_sha384_1304", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1304_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1304_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1304_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 294 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1305 for ECDSA, tcId is 295 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1305_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1305_msg[] = { 0x32, 0x33, 0x32, 0x31, 0x36, 0x32, 0x33, 0x31, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1305_sig[] = { 0x85, 0x1f, 0x1d, 0x14, 0x83, 0x71, 0x9c, 0xd1, 0x83, 0x94, 0x0c, 0xf4, 0xe9, 0xeb, 0x30, 0xea, 0xdd, 0xe6, 0x99, 0xd8, 0xba, 0x80, 0x90, 0xe2, 0x16, 0x12, 0x3f, 0xf6, 0x1e, 0x41, 0xd1, 0x66, 0x50, 0x5a, 0x59, 0x1a, 0x75, 0xda, 0xc6, 0xce, 0x29, 0x2a, 0x45, 0xf3, 0x1e, 0xf3, 0x4b, 0xf3, 0x4c, 0x3c, 0xcf, 0xd4, 0xa2, 0x2a, 0xdc, 0x4c, 0xc1, 0x9c, 0x41, 0x61, 0x51, 0xf7, 0x0e, 0x95, 0xad, 0x19, 0x99, 0x9f, 0x9c, 0x59, 0x68, 0x5e, 0x5f, 0xd9, 0x07, 0x9a, 0x27, 0xb8, 0x6f, 0xce, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1305 = { .name = "ecdsa_brainpoolp320r1_sha384_1305", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1305_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1305_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1305_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 295 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1306 for ECDSA, tcId is 296 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1306_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1306_msg[] = { 0x36, 0x34, 0x31, 0x30, 0x31, 0x35, 0x32, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1306_sig[] = { 0x06, 0x1d, 0xf3, 0x26, 0xb4, 0x3a, 0xd7, 0xaa, 0x7b, 0xc4, 0xaf, 0x8f, 0x3a, 0x58, 0x30, 0xbb, 0x0e, 0x63, 0x29, 0x7c, 0xf6, 0x90, 0xec, 0x60, 0xa7, 0x25, 0x9a, 0x94, 0x2d, 0xce, 0x63, 0x1e, 0x66, 0x76, 0x74, 0x2a, 0xd1, 0x28, 0x30, 0xcf, 0x0e, 0x88, 0x67, 0x52, 0x28, 0xb7, 0xfa, 0x47, 0x43, 0xab, 0x53, 0xd2, 0x48, 0x65, 0x19, 0x37, 0x42, 0xcd, 0x6c, 0x5d, 0xb2, 0x18, 0xdd, 0xe0, 0x04, 0x4b, 0x30, 0x16, 0x54, 0xbb, 0xab, 0x63, 0x9a, 0xbc, 0x77, 0x5a, 0xae, 0x69, 0x06, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1306 = { .name = "ecdsa_brainpoolp320r1_sha384_1306", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1306_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1306_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1306_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 296 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1307 for ECDSA, tcId is 297 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1307_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1307_msg[] = { 0x38, 0x33, 0x37, 0x32, 0x38, 0x35, 0x37, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1307_sig[] = { 0x56, 0x0e, 0x6e, 0x54, 0x14, 0x41, 0x4d, 0xbb, 0xd6, 0xe9, 0xd4, 0x05, 0x22, 0xc9, 0xf3, 0xfc, 0xe6, 0x65, 0xc4, 0x45, 0x5e, 0xae, 0x07, 0xea, 0xfa, 0x37, 0x24, 0xd7, 0x08, 0x68, 0x93, 0x15, 0xf6, 0xc7, 0x51, 0x5c, 0xfe, 0x1a, 0xed, 0xbf, 0xa3, 0xe6, 0x19, 0xbf, 0x5f, 0x9d, 0x77, 0x6a, 0x59, 0x1f, 0xf7, 0x4a, 0x92, 0x52, 0xe4, 0x3b, 0xd0, 0x4a, 0xe1, 0xf1, 0xc3, 0x4f, 0xe5, 0xb8, 0x4f, 0x04, 0xc3, 0xd9, 0xc9, 0x72, 0xa8, 0x0e, 0x18, 0x78, 0x88, 0xba, 0xde, 0x5a, 0xa9, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1307 = { .name = "ecdsa_brainpoolp320r1_sha384_1307", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1307_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1307_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1307_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 297 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1308 for ECDSA, tcId is 298 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1308_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1308_msg[] = { 0x33, 0x33, 0x32, 0x34, 0x37, 0x30, 0x34, 0x35, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1308_sig[] = { 0x34, 0xf9, 0xde, 0xf6, 0xf2, 0x1f, 0x53, 0x28, 0xd1, 0xc5, 0xe3, 0x49, 0x85, 0x7f, 0x3a, 0x70, 0x08, 0xf0, 0xaf, 0xa5, 0xbb, 0xcb, 0x89, 0x6f, 0xf6, 0x24, 0x7b, 0x21, 0xa4, 0xab, 0xac, 0x7a, 0xed, 0xad, 0xa6, 0x4f, 0xa2, 0x3f, 0x95, 0x6e, 0xcb, 0x44, 0xdb, 0xc5, 0x3b, 0x0b, 0x0b, 0x43, 0xd6, 0xb1, 0x58, 0xd9, 0x02, 0x47, 0x20, 0x9c, 0x2c, 0x74, 0x15, 0x2c, 0x4e, 0x19, 0xa1, 0xc7, 0x03, 0x57, 0x7c, 0xf4, 0x07, 0xad, 0xa1, 0x4b, 0x19, 0x8b, 0xde, 0x1b, 0xa7, 0x9a, 0x34, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1308 = { .name = "ecdsa_brainpoolp320r1_sha384_1308", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1308_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1308_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1308_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 298 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1309 for ECDSA, tcId is 299 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1309_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1309_msg[] = { 0x31, 0x34, 0x30, 0x33, 0x39, 0x36, 0x36, 0x38, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1309_sig[] = { 0x97, 0x21, 0xd7, 0x99, 0x1f, 0x29, 0x68, 0xc2, 0x38, 0x56, 0xa0, 0x75, 0xe8, 0x6b, 0x70, 0xa3, 0x9f, 0x4a, 0xa3, 0x0f, 0xd6, 0x87, 0x77, 0xdb, 0xbf, 0x46, 0xc1, 0xd3, 0x7c, 0xc3, 0xbe, 0x44, 0x97, 0xcb, 0x47, 0x14, 0xb2, 0xf1, 0x65, 0x6a, 0x0a, 0xa3, 0x4e, 0x85, 0x81, 0x75, 0xfe, 0xf3, 0xc0, 0x73, 0x4c, 0x5c, 0x7c, 0x4c, 0xcd, 0x04, 0x59, 0x92, 0x7b, 0x0f, 0x72, 0x2e, 0x86, 0xaf, 0x6c, 0x40, 0x45, 0x75, 0x2b, 0x4b, 0xa1, 0x54, 0xe7, 0x25, 0x94, 0x63, 0x19, 0xdc, 0x42, 0x74, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1309 = { .name = "ecdsa_brainpoolp320r1_sha384_1309", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1309_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1309_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1309_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 299 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1310 for ECDSA, tcId is 300 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1310_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1310_msg[] = { 0x31, 0x32, 0x32, 0x37, 0x36, 0x30, 0x35, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1310_sig[] = { 0xae, 0xc9, 0x21, 0x08, 0x75, 0x1a, 0xfc, 0x4a, 0x0c, 0x62, 0xa9, 0xda, 0x21, 0x63, 0xbb, 0x52, 0xbd, 0xab, 0xb9, 0xe7, 0xa8, 0xb5, 0x66, 0xca, 0x8d, 0x30, 0xfa, 0xc3, 0x89, 0xc6, 0x8a, 0x38, 0x17, 0xd2, 0x1a, 0x33, 0xdf, 0x2f, 0x68, 0xda, 0xbe, 0xfb, 0xac, 0xfb, 0x03, 0x95, 0x7c, 0x93, 0x78, 0x90, 0x3c, 0xf9, 0xb4, 0x32, 0x09, 0x3f, 0x78, 0x95, 0x4e, 0x52, 0x24, 0x30, 0x36, 0x11, 0xe9, 0xe9, 0x6c, 0x92, 0xa7, 0x67, 0x04, 0xe3, 0xa6, 0x43, 0x2a, 0x24, 0x41, 0x3b, 0xd2, 0x77, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1310 = { .name = "ecdsa_brainpoolp320r1_sha384_1310", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1310_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1310_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1310_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 300 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1311 for ECDSA, tcId is 301 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1311_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1311_msg[] = { 0x34, 0x39, 0x35, 0x31, 0x34, 0x38, 0x38, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1311_sig[] = { 0x6e, 0x85, 0x26, 0x89, 0xb9, 0x04, 0x51, 0xa1, 0x59, 0x2f, 0xad, 0x58, 0x5e, 0xa5, 0x7c, 0x71, 0xeb, 0x5b, 0x44, 0x61, 0x96, 0xc0, 0x7d, 0xcf, 0x45, 0x09, 0x72, 0xad, 0x13, 0xfd, 0xcd, 0x81, 0x17, 0x31, 0x9e, 0xec, 0x75, 0xd0, 0x78, 0x1f, 0x36, 0x08, 0xd1, 0x1f, 0x0b, 0x8e, 0xb7, 0x73, 0xb3, 0x58, 0x78, 0xcc, 0x43, 0xea, 0x95, 0xfb, 0x4d, 0x35, 0x4a, 0xb0, 0xff, 0xec, 0x9f, 0x78, 0x5a, 0x41, 0xa1, 0x7e, 0xbc, 0xf8, 0xf7, 0xd9, 0x57, 0xf7, 0x93, 0x47, 0x9a, 0xe8, 0x99, 0x99, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1311 = { .name = "ecdsa_brainpoolp320r1_sha384_1311", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1311_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1311_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1311_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 301 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1312 for ECDSA, tcId is 302 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1312_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1312_msg[] = { 0x32, 0x34, 0x35, 0x32, 0x31, 0x32, 0x37, 0x30, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1312_sig[] = { 0xa3, 0x4e, 0xbb, 0x41, 0x33, 0x6c, 0x25, 0x2a, 0x05, 0x60, 0x97, 0x98, 0x3d, 0x56, 0xde, 0xdd, 0x1e, 0xda, 0x04, 0x2c, 0x73, 0x78, 0xb8, 0xb5, 0x6d, 0x90, 0x5a, 0xa9, 0xbe, 0x1d, 0x7f, 0x6a, 0xfb, 0x60, 0x54, 0x66, 0xc0, 0x02, 0x6c, 0x44, 0x41, 0x4c, 0x12, 0xe2, 0xa9, 0x7f, 0x8e, 0x42, 0x7e, 0xe9, 0xbd, 0x95, 0xe1, 0x5b, 0xd5, 0xc1, 0x0c, 0x16, 0xc1, 0xee, 0xa6, 0x01, 0x1f, 0x01, 0xf2, 0x71, 0xfe, 0x75, 0x86, 0x9a, 0x60, 0x00, 0xfb, 0xfb, 0xc2, 0x5a, 0x6d, 0x1f, 0x85, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1312 = { .name = "ecdsa_brainpoolp320r1_sha384_1312", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1312_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1312_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1312_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 302 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1313 for ECDSA, tcId is 303 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1313_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1313_msg[] = { 0x31, 0x37, 0x33, 0x31, 0x35, 0x35, 0x30, 0x37, 0x30, 0x36, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1313_sig[] = { 0x1c, 0xf2, 0x7f, 0xa9, 0x6f, 0x13, 0x7e, 0x0f, 0xbc, 0xe4, 0xda, 0x47, 0x6b, 0xdb, 0x5c, 0x3b, 0x87, 0x5b, 0x7f, 0xb4, 0x55, 0xfc, 0xfe, 0x7e, 0xfd, 0x86, 0x3c, 0xb8, 0xed, 0x61, 0x09, 0x0f, 0x6c, 0xf6, 0xa2, 0xb9, 0x27, 0xfa, 0xbb, 0xdb, 0x94, 0x5b, 0xc7, 0xe4, 0xf3, 0x19, 0x00, 0x4b, 0x2e, 0xf4, 0xce, 0x2f, 0xa2, 0xef, 0x27, 0x0c, 0x4a, 0xbc, 0x36, 0x0e, 0x21, 0xd8, 0xf8, 0xb2, 0x10, 0x74, 0x08, 0x0e, 0xe8, 0xa3, 0x42, 0x21, 0x37, 0xc9, 0x6f, 0x82, 0xe2, 0x6c, 0xfa, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1313 = { .name = "ecdsa_brainpoolp320r1_sha384_1313", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1313_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1313_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1313_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 303 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1314 for ECDSA, tcId is 304 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1314_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1314_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x30, 0x36, 0x39, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1314_sig[] = { 0xcd, 0xb4, 0xf0, 0xb7, 0xf7, 0xde, 0x92, 0xec, 0x59, 0xa2, 0xe0, 0xa1, 0x90, 0x03, 0x18, 0xbd, 0xd6, 0x49, 0x15, 0x5b, 0xcd, 0x3e, 0x09, 0x14, 0x13, 0x6a, 0x7c, 0x46, 0xc5, 0xe4, 0xbf, 0xd8, 0x42, 0x31, 0xc0, 0x4d, 0x64, 0xcc, 0x5c, 0x53, 0x7b, 0x0e, 0xe0, 0xd7, 0xb7, 0x77, 0x3c, 0x3b, 0xcd, 0x59, 0x21, 0x23, 0x9f, 0x36, 0xb0, 0x93, 0xbd, 0x23, 0x28, 0x59, 0xd6, 0x85, 0x92, 0x0e, 0xaf, 0xf5, 0x3a, 0x91, 0xff, 0x71, 0x88, 0x34, 0x4a, 0x30, 0x75, 0xfe, 0x7f, 0x34, 0x2c, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1314 = { .name = "ecdsa_brainpoolp320r1_sha384_1314", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1314_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1314_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1314_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 304 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1315 for ECDSA, tcId is 305 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1315_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1315_msg[] = { 0x34, 0x34, 0x31, 0x35, 0x34, 0x37, 0x36, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1315_sig[] = { 0xaa, 0x8e, 0xf3, 0x3f, 0x59, 0x50, 0x8e, 0xa9, 0x61, 0x7a, 0x41, 0x08, 0x4a, 0x35, 0x32, 0xe1, 0x17, 0x9d, 0x0f, 0x57, 0x55, 0xe0, 0x82, 0x77, 0xa5, 0x68, 0x19, 0x22, 0x72, 0xce, 0xc6, 0x3f, 0x91, 0x03, 0x77, 0xa8, 0x71, 0x02, 0x1c, 0x7e, 0x70, 0x87, 0x51, 0xc6, 0x28, 0x4f, 0x7c, 0x3c, 0xfc, 0x57, 0xa5, 0x98, 0xc1, 0x19, 0x9c, 0x1c, 0xfc, 0xb3, 0xd2, 0x6e, 0x45, 0x46, 0x48, 0x4d, 0xe5, 0x52, 0x28, 0xc2, 0x92, 0xbc, 0xa9, 0x78, 0xea, 0x76, 0x98, 0xd3, 0xf7, 0xd8, 0x06, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1315 = { .name = "ecdsa_brainpoolp320r1_sha384_1315", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1315_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1315_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1315_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 305 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1316 for ECDSA, tcId is 306 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1316_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1316_msg[] = { 0x34, 0x32, 0x33, 0x39, 0x34, 0x34, 0x39, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1316_sig[] = { 0x7d, 0x57, 0xfe, 0x00, 0x6a, 0x05, 0x63, 0xd5, 0x57, 0x0a, 0xcb, 0xca, 0xbd, 0xf9, 0x4e, 0xd5, 0x15, 0x02, 0x9f, 0x52, 0xe0, 0x22, 0x98, 0xc7, 0x9c, 0x98, 0x91, 0x18, 0x1b, 0xd8, 0xb4, 0x97, 0x4d, 0xde, 0x57, 0x65, 0x43, 0x3d, 0x89, 0xcb, 0x3b, 0xe8, 0x3d, 0x7d, 0xc7, 0xa5, 0xdc, 0x1a, 0x15, 0x1f, 0x2b, 0x09, 0x57, 0xf6, 0x78, 0xb9, 0xef, 0xca, 0x3d, 0x08, 0x18, 0xec, 0x35, 0x92, 0x02, 0xd9, 0xa4, 0xcf, 0xe7, 0x92, 0xe9, 0x59, 0x24, 0xbe, 0x9e, 0x36, 0xe2, 0x0e, 0xf9, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1316 = { .name = "ecdsa_brainpoolp320r1_sha384_1316", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1316_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1316_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1316_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 306 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1317 for ECDSA, tcId is 307 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1317_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1317_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x36, 0x32, 0x30, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1317_sig[] = { 0x99, 0x8c, 0x25, 0x1f, 0x0c, 0x1f, 0x96, 0x23, 0x98, 0x0c, 0x1c, 0xff, 0x0e, 0x36, 0x9c, 0x7b, 0x0a, 0x38, 0x3f, 0xc7, 0x40, 0x79, 0x11, 0x31, 0x21, 0xf9, 0x82, 0xbf, 0xe7, 0xb8, 0x7f, 0x17, 0xb4, 0x8e, 0x5c, 0xdd, 0x29, 0xb0, 0xe1, 0xc0, 0xd0, 0xd3, 0x3d, 0x8b, 0xe8, 0xc3, 0x7f, 0xb4, 0x9c, 0x4f, 0x49, 0xce, 0xee, 0x32, 0x11, 0x86, 0xff, 0x30, 0xb9, 0x95, 0x0a, 0x70, 0x6c, 0x6f, 0xdd, 0xd1, 0x05, 0x47, 0x72, 0xaf, 0x3c, 0x32, 0x66, 0xfb, 0x28, 0x66, 0x77, 0x59, 0x2d, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1317 = { .name = "ecdsa_brainpoolp320r1_sha384_1317", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1317_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1317_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1317_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 307 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1318 for ECDSA, tcId is 308 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1318_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1318_msg[] = { 0x32, 0x31, 0x36, 0x34, 0x36, 0x36, 0x36, 0x32, 0x38, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1318_sig[] = { 0x2e, 0x23, 0x84, 0xe2, 0x62, 0x1b, 0x0f, 0x24, 0x8a, 0xd3, 0x49, 0x22, 0xf7, 0x21, 0xf4, 0x34, 0x52, 0x7d, 0x35, 0x4a, 0x7e, 0xf8, 0x76, 0xde, 0xfb, 0x8e, 0x80, 0xf6, 0x86, 0x48, 0x67, 0xae, 0x60, 0xc7, 0x6c, 0xe2, 0x48, 0x96, 0xa4, 0x0f, 0x08, 0xec, 0xea, 0x05, 0x48, 0x00, 0xec, 0x20, 0x1f, 0x0d, 0x1a, 0xc8, 0x93, 0xf3, 0xbd, 0x79, 0xae, 0x48, 0x53, 0x35, 0x29, 0x34, 0x5e, 0x1d, 0x33, 0x10, 0xfd, 0xc7, 0x47, 0xd7, 0x65, 0x97, 0x0f, 0xa5, 0x5e, 0xe0, 0xa4, 0x7b, 0xdc, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1318 = { .name = "ecdsa_brainpoolp320r1_sha384_1318", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1318_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1318_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1318_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 308 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1319 for ECDSA, tcId is 309 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1319_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1319_msg[] = { 0x31, 0x39, 0x34, 0x32, 0x38, 0x35, 0x33, 0x38, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1319_sig[] = { 0xd2, 0x90, 0xcf, 0x0f, 0x9f, 0xbd, 0x69, 0x17, 0x43, 0xb9, 0xdc, 0xdc, 0x00, 0xc0, 0x81, 0x6f, 0xb9, 0x9b, 0x5a, 0xd3, 0xb8, 0x9a, 0x23, 0xf1, 0x31, 0x3e, 0x0b, 0xf0, 0x0c, 0xb3, 0xe1, 0x2c, 0x95, 0x64, 0x8d, 0xce, 0x17, 0x5e, 0x34, 0x47, 0x58, 0x77, 0x07, 0xdb, 0x7e, 0x9d, 0xdf, 0x61, 0x3f, 0xf7, 0xd9, 0x79, 0xba, 0x9c, 0xa4, 0x11, 0xb4, 0xbb, 0x78, 0x26, 0x86, 0x2a, 0x38, 0x0c, 0xe7, 0xce, 0xbe, 0xcd, 0x52, 0xf5, 0x2f, 0xf8, 0x85, 0xf8, 0xad, 0x53, 0x6f, 0xbf, 0x11, 0x23, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1319 = { .name = "ecdsa_brainpoolp320r1_sha384_1319", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1319_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1319_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1319_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 309 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1320 for ECDSA, tcId is 310 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1320_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1320_msg[] = { 0x32, 0x32, 0x31, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1320_sig[] = { 0x34, 0xb2, 0x52, 0x60, 0x4e, 0xbd, 0x86, 0x75, 0x10, 0x42, 0x66, 0xbe, 0x4d, 0xf8, 0x4b, 0x51, 0x94, 0x26, 0x87, 0xa2, 0x12, 0x95, 0x7d, 0xed, 0xd4, 0xab, 0x6d, 0xff, 0x43, 0x55, 0xa0, 0x02, 0x7b, 0x71, 0x22, 0xae, 0xb1, 0xe9, 0xf4, 0x49, 0x15, 0x08, 0x2c, 0x57, 0x64, 0xdf, 0x74, 0x2c, 0x40, 0x19, 0x3a, 0x8b, 0xf1, 0xe3, 0x8d, 0x43, 0xa5, 0xfa, 0x4c, 0x77, 0x41, 0x6c, 0xd8, 0x75, 0x30, 0x57, 0x52, 0x1c, 0x76, 0x50, 0x62, 0xc6, 0x76, 0xf9, 0x9b, 0xe6, 0x59, 0xfc, 0xd0, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1320 = { .name = "ecdsa_brainpoolp320r1_sha384_1320", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1320_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1320_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1320_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 310 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1321 for ECDSA, tcId is 311 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1321_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1321_msg[] = { 0x39, 0x32, 0x36, 0x39, 0x33, 0x33, 0x34, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1321_sig[] = { 0xb4, 0x5b, 0xaf, 0x5e, 0xe1, 0x88, 0xce, 0xf5, 0x41, 0x3e, 0xf3, 0xe6, 0xf0, 0xd9, 0x17, 0xa9, 0x0c, 0xf2, 0x63, 0xd2, 0xbe, 0x0a, 0x70, 0x39, 0xa6, 0x06, 0x4e, 0x6e, 0x40, 0x53, 0xb6, 0xc9, 0x60, 0xf4, 0x4d, 0xe1, 0x59, 0x32, 0x85, 0x5a, 0x47, 0x60, 0x2d, 0xef, 0xee, 0x00, 0xb2, 0xfd, 0xea, 0x09, 0x53, 0x46, 0xde, 0xae, 0x00, 0xb4, 0x60, 0x69, 0xc9, 0x5c, 0x09, 0xe4, 0x35, 0x94, 0x88, 0x9b, 0x8d, 0x3a, 0xa3, 0xd7, 0x53, 0x50, 0x37, 0x7a, 0xa3, 0x43, 0x1e, 0xf6, 0x3c, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1321 = { .name = "ecdsa_brainpoolp320r1_sha384_1321", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1321_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1321_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1321_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 311 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1322 for ECDSA, tcId is 312 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1322_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1322_msg[] = { 0x37, 0x36, 0x39, 0x33, 0x38, 0x36, 0x33, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1322_sig[] = { 0x6d, 0x82, 0x67, 0x06, 0x5d, 0x60, 0xdc, 0xd3, 0x75, 0xce, 0x04, 0x18, 0x13, 0xd6, 0x08, 0x5f, 0xa9, 0x02, 0x46, 0xcd, 0xdb, 0xba, 0xba, 0x12, 0x64, 0x3c, 0x73, 0x6c, 0xc9, 0xb7, 0xe6, 0xd6, 0x19, 0x17, 0x8f, 0x12, 0xc6, 0xfd, 0x2d, 0x3a, 0x9b, 0x72, 0x61, 0x1a, 0x5b, 0x4f, 0x87, 0x63, 0xe3, 0x0c, 0x11, 0xaa, 0x79, 0x1e, 0xff, 0x6b, 0x74, 0xc3, 0x4d, 0x05, 0xe6, 0x54, 0x51, 0x73, 0x6e, 0x2a, 0x2b, 0x72, 0x8f, 0x2e, 0x5e, 0xf4, 0x85, 0xdc, 0x4e, 0x2e, 0x5c, 0x3d, 0xaa, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1322 = { .name = "ecdsa_brainpoolp320r1_sha384_1322", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1322_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1322_msg, .msglen = 9, .sig = ecdsa_brainpoolp320r1_sha384_1322_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 312 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1323 for ECDSA, tcId is 313 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1323_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1323_msg[] = { 0x32, 0x37, 0x33, 0x35, 0x39, 0x33, 0x30, 0x35, 0x37, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1323_sig[] = { 0xa1, 0xa3, 0x02, 0xaa, 0x27, 0xa3, 0x2c, 0xd2, 0x5c, 0x33, 0x6c, 0x9e, 0xd7, 0xad, 0xaf, 0x5c, 0xaf, 0x33, 0xdc, 0x34, 0x85, 0xa8, 0x13, 0x71, 0x8f, 0xce, 0x39, 0x5e, 0xc0, 0xc9, 0x3e, 0xef, 0x4c, 0xb3, 0x4a, 0x65, 0x18, 0xa6, 0x1c, 0xc8, 0x25, 0x8a, 0xcd, 0x1b, 0x45, 0x00, 0x82, 0xfd, 0xdc, 0x05, 0x43, 0x3e, 0x2d, 0xd6, 0x6b, 0x03, 0x21, 0x11, 0x43, 0x95, 0xa3, 0x3b, 0xd9, 0x82, 0x7d, 0x4c, 0x44, 0xd4, 0x86, 0xc8, 0x2c, 0x2d, 0x22, 0x98, 0x69, 0xf3, 0x76, 0x20, 0x12, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1323 = { .name = "ecdsa_brainpoolp320r1_sha384_1323", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1323_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1323_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1323_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 313 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1324 for ECDSA, tcId is 314 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1324_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1324_msg[] = { 0x38, 0x33, 0x30, 0x30, 0x35, 0x36, 0x34, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1324_sig[] = { 0x63, 0xfa, 0xd2, 0x85, 0x70, 0xb4, 0x20, 0x35, 0x02, 0xa1, 0xd1, 0x05, 0x90, 0x32, 0x44, 0xdf, 0xe2, 0xb0, 0x95, 0x30, 0xa9, 0x3d, 0x8e, 0xa4, 0x29, 0xa1, 0x97, 0xc7, 0x12, 0x13, 0x37, 0xa9, 0x9d, 0x4c, 0x73, 0x51, 0x6e, 0xc6, 0x61, 0x35, 0x7b, 0x4a, 0x08, 0xb7, 0xcd, 0xea, 0xf6, 0xee, 0xde, 0xec, 0x63, 0x06, 0xa0, 0xc4, 0x10, 0xb0, 0x92, 0x71, 0x8c, 0x25, 0x59, 0x01, 0x90, 0x03, 0x0c, 0x52, 0x55, 0xbf, 0x83, 0x73, 0x93, 0xd8, 0x29, 0x38, 0x90, 0xc8, 0x49, 0x09, 0xf4, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1324 = { .name = "ecdsa_brainpoolp320r1_sha384_1324", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1324_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1324_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1324_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 314 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1325 for ECDSA, tcId is 315 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1325_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1325_msg[] = { 0x34, 0x33, 0x30, 0x37, 0x36, 0x35, 0x35, 0x37, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1325_sig[] = { 0xc1, 0xe6, 0x23, 0x2f, 0x06, 0xa4, 0x4d, 0xe1, 0xd7, 0x21, 0x3b, 0x20, 0xea, 0xa1, 0xb8, 0x9c, 0x31, 0xdd, 0x2f, 0x5b, 0xb0, 0x33, 0x24, 0x5e, 0x81, 0x71, 0x52, 0x4c, 0xc9, 0x11, 0x08, 0x76, 0xd7, 0x78, 0xa0, 0x48, 0x34, 0xac, 0x88, 0xee, 0xcb, 0x4a, 0xa2, 0x0d, 0x15, 0x8c, 0x3b, 0x8d, 0x11, 0x5e, 0xc6, 0x2b, 0xb5, 0x15, 0x45, 0xbd, 0x58, 0xb6, 0x3f, 0x1f, 0x01, 0x76, 0xad, 0xa0, 0x48, 0x69, 0xdf, 0xee, 0x84, 0x01, 0x97, 0x37, 0xcb, 0x80, 0x72, 0xf7, 0xa8, 0xb9, 0x40, 0xf6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1325 = { .name = "ecdsa_brainpoolp320r1_sha384_1325", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1325_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1325_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1325_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 315 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1326 for ECDSA, tcId is 316 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1326_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1326_msg[] = { 0x39, 0x36, 0x35, 0x37, 0x30, 0x31, 0x38, 0x31, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1326_sig[] = { 0x47, 0xb6, 0xba, 0xa1, 0xa0, 0x53, 0xea, 0xb8, 0xb3, 0x8e, 0xd6, 0xc9, 0x86, 0x2f, 0x2f, 0xfe, 0xd3, 0x81, 0x14, 0x49, 0xe4, 0x9f, 0xf2, 0xe1, 0x8a, 0x58, 0x85, 0x12, 0x12, 0x9d, 0x1d, 0xea, 0x0a, 0x6c, 0x4f, 0xb8, 0x11, 0xdc, 0x5e, 0xb0, 0xa6, 0xcc, 0xee, 0xf5, 0xa1, 0xe1, 0x2f, 0x9b, 0x04, 0x9f, 0x72, 0xf5, 0x37, 0x32, 0xd4, 0x29, 0x03, 0xa7, 0x33, 0xca, 0x6f, 0x3f, 0xae, 0x95, 0x96, 0xe1, 0x7d, 0x9c, 0x75, 0x7e, 0xd4, 0xef, 0x04, 0xfc, 0xc3, 0x73, 0x02, 0xad, 0x1f, 0x45, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1326 = { .name = "ecdsa_brainpoolp320r1_sha384_1326", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1326_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1326_msg, .msglen = 10, .sig = ecdsa_brainpoolp320r1_sha384_1326_sig, .siglen = 80, .result = 1, .comment = "special case hash, tcId is 316 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1327 for ECDSA, tcId is 317 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1327_pubkey[] = { 0x0f, 0xcc, 0x88, 0x60, 0xcb, 0x26, 0xe2, 0x62, 0xca, 0x8b, 0x4e, 0xcb, 0x9c, 0x52, 0xf7, 0x8d, 0x82, 0xa1, 0x0a, 0x1d, 0x30, 0xdd, 0x0c, 0x8e, 0xcd, 0x75, 0x84, 0xce, 0x80, 0xdb, 0xb7, 0x5c, 0x48, 0x8a, 0x06, 0x2b, 0x64, 0x37, 0x55, 0x00, 0x1f, 0x27, 0xe6, 0x76, 0xc2, 0x6c, 0xd3, 0x48, 0x8c, 0x1e, 0xf4, 0xec, 0x3e, 0xdd, 0x88, 0xcf, 0x8a, 0xf7, 0x8d, 0xaf, 0x90, 0x36, 0x72, 0x4b, 0x57, 0xe6, 0x6d, 0xa0, 0x2c, 0xf7, 0xc6, 0x76, 0xa5, 0x36, 0x64, 0xbe, 0xcd, 0xfe, 0xdc, 0x3b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1327_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1327_sig[] = { 0x67, 0xbe, 0xa5, 0x34, 0x78, 0x36, 0x4a, 0xd2, 0xcc, 0x40, 0xea, 0xb4, 0x25, 0x35, 0xa4, 0xbf, 0x8e, 0x41, 0x58, 0x3c, 0x94, 0x1c, 0xb0, 0x4e, 0xf3, 0x7f, 0x11, 0xf0, 0x35, 0x65, 0x4c, 0x33, 0x1d, 0x3b, 0xb0, 0xdd, 0xfd, 0x74, 0x03, 0x1d, 0x76, 0xa9, 0xeb, 0xa4, 0x37, 0x13, 0xed, 0x88, 0x92, 0xa6, 0x27, 0xed, 0x3b, 0xcb, 0xf7, 0xd8, 0x7f, 0x79, 0x91, 0xd1, 0x28, 0x58, 0x0a, 0x05, 0x7c, 0x1b, 0x63, 0x88, 0xb6, 0x04, 0x95, 0x4d, 0x34, 0x0e, 0x92, 0xf4, 0x18, 0x27, 0x67, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1327 = { .name = "ecdsa_brainpoolp320r1_sha384_1327", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1327_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1327_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1327_sig, .siglen = 80, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 317 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1328 for ECDSA, tcId is 318 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1328_pubkey[] = { 0xb2, 0x1e, 0xcd, 0x48, 0xcc, 0x46, 0xfb, 0x30, 0x6e, 0xd5, 0x4e, 0x88, 0xad, 0xb6, 0x15, 0x20, 0x84, 0x57, 0xbd, 0x25, 0x7e, 0x7e, 0x9d, 0x81, 0xdb, 0x5b, 0xd1, 0xf5, 0x61, 0x00, 0xa7, 0xae, 0xbb, 0x13, 0x86, 0x46, 0x55, 0x07, 0xbb, 0xf3, 0x86, 0x22, 0x4c, 0xb3, 0x83, 0x81, 0x5e, 0x1b, 0xab, 0xe5, 0x61, 0xdc, 0xb6, 0xf4, 0x9a, 0xf0, 0x07, 0x3e, 0x1b, 0xfd, 0xa3, 0x66, 0x06, 0x6e, 0xf6, 0x24, 0x40, 0xfc, 0x81, 0xde, 0xc7, 0xec, 0xa0, 0x21, 0xcb, 0x0c, 0x05, 0x09, 0x1d, 0xfb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1328_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1328_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x40, 0x64, 0xfb, 0x4c, 0x22, 0x4a, 0x8b, 0x24, 0x8a, 0x0d, 0x93, 0x3f, 0x76, 0x42, 0xbd, 0x56, 0xac, 0xed, 0x9b, 0x12, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1328 = { .name = "ecdsa_brainpoolp320r1_sha384_1328", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1328_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1328_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1328_sig, .siglen = 80, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 318 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1329 for ECDSA, tcId is 319 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1329_pubkey[] = { 0xb2, 0x1e, 0xcd, 0x48, 0xcc, 0x46, 0xfb, 0x30, 0x6e, 0xd5, 0x4e, 0x88, 0xad, 0xb6, 0x15, 0x20, 0x84, 0x57, 0xbd, 0x25, 0x7e, 0x7e, 0x9d, 0x81, 0xdb, 0x5b, 0xd1, 0xf5, 0x61, 0x00, 0xa7, 0xae, 0xbb, 0x13, 0x86, 0x46, 0x55, 0x07, 0xbb, 0xf3, 0x86, 0x22, 0x4c, 0xb3, 0x83, 0x81, 0x5e, 0x1b, 0xab, 0xe5, 0x61, 0xdc, 0xb6, 0xf4, 0x9a, 0xf0, 0x07, 0x3e, 0x1b, 0xfd, 0xa3, 0x66, 0x06, 0x6e, 0xf6, 0x24, 0x40, 0xfc, 0x81, 0xde, 0xc7, 0xec, 0xa0, 0x21, 0xcb, 0x0c, 0x05, 0x09, 0x1d, 0xfb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1329_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1329_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa6, 0xf6, 0xf4, 0x0d, 0xef, 0x4f, 0x92, 0xb9, 0xec, 0x78, 0x93, 0xec, 0x28, 0xfc, 0xd4, 0x12, 0xb1, 0xf1, 0xb3, 0x2e, 0x23, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1329 = { .name = "ecdsa_brainpoolp320r1_sha384_1329", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1329_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1329_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1329_sig, .siglen = 80, .result = -1, .comment = "r too large, tcId is 319 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1330 for ECDSA, tcId is 320 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1330_pubkey[] = { 0x9c, 0x97, 0x01, 0xde, 0x2f, 0xfd, 0xb2, 0x96, 0xe6, 0xd5, 0x6a, 0x5f, 0x3c, 0x18, 0x9e, 0xcb, 0xb0, 0xe4, 0x44, 0x8e, 0x38, 0xed, 0x65, 0xda, 0x46, 0xee, 0xaa, 0x51, 0xa7, 0xb3, 0x4e, 0x65, 0x0a, 0x91, 0xda, 0x95, 0xfa, 0xf1, 0x79, 0x00, 0x1e, 0x0a, 0x98, 0xa5, 0x98, 0x52, 0x3a, 0x34, 0xc4, 0x91, 0x8d, 0x41, 0x80, 0xf8, 0x7d, 0x64, 0x1e, 0x46, 0x26, 0xce, 0x11, 0xfa, 0x3a, 0x24, 0x4a, 0xbf, 0xb2, 0x45, 0x07, 0x36, 0x69, 0x3d, 0x38, 0x65, 0x23, 0x09, 0x24, 0x0e, 0xbd, 0xa9, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1330_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1330_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0f, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1330 = { .name = "ecdsa_brainpoolp320r1_sha384_1330", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1330_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1330_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1330_sig, .siglen = 80, .result = 1, .comment = "r,s are large, tcId is 320 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1331 for ECDSA, tcId is 321 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1331_pubkey[] = { 0xb6, 0xf0, 0xdd, 0xc8, 0x34, 0xef, 0x8a, 0x67, 0x90, 0x36, 0x81, 0xea, 0x02, 0xb7, 0x88, 0xfc, 0xff, 0x82, 0xd1, 0x23, 0x07, 0xc8, 0xc3, 0xf4, 0xa4, 0x4b, 0x30, 0xd7, 0xc5, 0xf6, 0x14, 0xda, 0xfc, 0xc9, 0xa8, 0x39, 0x99, 0x1f, 0x8e, 0xe4, 0x27, 0x53, 0x8e, 0x30, 0xae, 0x51, 0x02, 0xb2, 0x04, 0x39, 0x57, 0xdd, 0x61, 0x24, 0xfb, 0xa3, 0xa1, 0xb6, 0x01, 0xc0, 0x4b, 0xdd, 0xaf, 0x6c, 0x92, 0x9f, 0xfd, 0xf2, 0xf7, 0x79, 0x6f, 0xd7, 0x09, 0x8c, 0x38, 0x7d, 0xbc, 0x0b, 0x26, 0xfb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1331_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1331_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8c, 0x07, 0x36, 0x55, 0x4d, 0xbc, 0x44, 0x60, 0x63, 0xe8, 0xe1, 0x5f, 0x29, 0x7f, 0xd4, 0xb6, 0x6f, 0xa8, 0x87, 0x99, 0x45, 0xbb, 0xb5, 0xc2, 0x27, 0x14, 0xa9, 0x64, 0x5f, 0x4f, 0xa4, 0xef, 0x9d, 0x71, 0x0e, 0xaf, 0xa6, 0xb2, 0x26, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1331 = { .name = "ecdsa_brainpoolp320r1_sha384_1331", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1331_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1331_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1331_sig, .siglen = 80, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 321 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1332 for ECDSA, tcId is 322 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1332_pubkey[] = { 0x6d, 0xf4, 0x43, 0x21, 0xd4, 0xa5, 0xf6, 0xaf, 0x63, 0xe0, 0x1b, 0x79, 0xbb, 0x60, 0x8e, 0xa0, 0x4a, 0xc6, 0xf3, 0x5f, 0x79, 0x50, 0x44, 0xa0, 0x4f, 0xf4, 0x00, 0xf5, 0x47, 0xfd, 0x34, 0xd9, 0xb7, 0x8c, 0x12, 0xc4, 0x59, 0x78, 0xf9, 0x6f, 0xb5, 0x29, 0x01, 0xce, 0xce, 0x48, 0xaa, 0xb4, 0x32, 0xc3, 0xdb, 0xdc, 0xbc, 0x0e, 0x27, 0x0b, 0x2c, 0xc9, 0xb9, 0x91, 0x5c, 0xc1, 0xff, 0xb6, 0x9a, 0x36, 0x5d, 0x84, 0xc3, 0x91, 0x86, 0xc4, 0x81, 0x77, 0x38, 0x7a, 0xa9, 0xee, 0x0a, 0x48, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1332_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1332_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x54, 0x07, 0xcd, 0xd5, 0x93, 0xac, 0xb5, 0x01, 0xfc, 0x28, 0x48, 0x35, 0x1f, 0x9d, 0x2e, 0x6b, 0x54, 0x57, 0xd3, 0xde, 0x43, 0xc3, 0x13, 0x0e, 0x3b, 0x74, 0xe6, 0xa9, 0x24, 0x2b, 0x3c, 0xce, 0x1c, 0x24, 0xf0, 0x94, 0xf1, 0x18, 0xbc, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1332 = { .name = "ecdsa_brainpoolp320r1_sha384_1332", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1332_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1332_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1332_sig, .siglen = 80, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 322 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1333 for ECDSA, tcId is 323 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1333_pubkey[] = { 0x4e, 0x49, 0x6f, 0x05, 0x6a, 0xb5, 0xd0, 0x7f, 0x96, 0x56, 0x2c, 0x68, 0x36, 0x43, 0x44, 0x0e, 0x31, 0xfe, 0xa2, 0x6d, 0x35, 0xe6, 0xc5, 0xb6, 0x9e, 0xef, 0xaa, 0x41, 0x07, 0xd3, 0x45, 0xc8, 0x07, 0xbf, 0x27, 0x9f, 0x2e, 0xa2, 0x6b, 0x60, 0x28, 0x85, 0x39, 0x76, 0x6f, 0xc7, 0x26, 0xcb, 0x9e, 0x84, 0x1d, 0xb5, 0xdc, 0xfb, 0xbb, 0x79, 0x2c, 0xad, 0xe3, 0xc1, 0xef, 0x64, 0xb6, 0x9d, 0xcb, 0xda, 0x7f, 0x5e, 0x49, 0x7b, 0x45, 0x5a, 0x91, 0x1c, 0xe2, 0xf0, 0xeb, 0xca, 0xca, 0xad, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1333_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1333_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1333 = { .name = "ecdsa_brainpoolp320r1_sha384_1333", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1333_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1333_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1333_sig, .siglen = 80, .result = 1, .comment = "small r and s, tcId is 323 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1334 for ECDSA, tcId is 324 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1334_pubkey[] = { 0x11, 0xe0, 0x94, 0xf4, 0x70, 0x94, 0x8e, 0x4e, 0xaa, 0x6a, 0xa1, 0x3f, 0xab, 0x4e, 0x06, 0x33, 0x86, 0xe9, 0x1a, 0x63, 0x8f, 0xa2, 0x26, 0xd9, 0x88, 0xd0, 0x69, 0x3d, 0xea, 0x71, 0x9c, 0xa9, 0x5f, 0x61, 0xe4, 0x93, 0xe9, 0x83, 0x5a, 0xf4, 0x3f, 0x53, 0x3e, 0x89, 0xaa, 0x20, 0x85, 0xa9, 0xf8, 0x12, 0x10, 0x86, 0xa2, 0x59, 0x7f, 0x10, 0x60, 0xf7, 0x3c, 0x8d, 0x75, 0xd6, 0x69, 0x40, 0xe5, 0x0e, 0xea, 0xd7, 0x3d, 0xfd, 0x03, 0xc4, 0x76, 0xea, 0x19, 0x47, 0xcd, 0xd4, 0xdd, 0x3f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1334_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1334_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1334 = { .name = "ecdsa_brainpoolp320r1_sha384_1334", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1334_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1334_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1334_sig, .siglen = 80, .result = 1, .comment = "small r and s, tcId is 324 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1335 for ECDSA, tcId is 325 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1335_pubkey[] = { 0x16, 0x51, 0x7a, 0x7d, 0x7b, 0xea, 0xb6, 0x47, 0x2e, 0xa8, 0xf6, 0xbc, 0x20, 0x41, 0x2a, 0x3c, 0xd9, 0x6d, 0x24, 0x2c, 0x24, 0x6c, 0xe9, 0xf9, 0x83, 0xb2, 0xef, 0x08, 0xb2, 0x84, 0xcf, 0xad, 0x1a, 0xc2, 0x85, 0x63, 0xb5, 0x6e, 0xda, 0xfb, 0x9f, 0x56, 0xfe, 0x2d, 0xf7, 0x8c, 0x23, 0x9a, 0xa1, 0x6c, 0x3c, 0x31, 0x8b, 0xc9, 0x19, 0x1a, 0x16, 0xec, 0x40, 0x7a, 0x70, 0x03, 0x54, 0x17, 0x3f, 0x8b, 0x86, 0x2d, 0x9a, 0x0a, 0xa1, 0x0d, 0x67, 0x39, 0x7f, 0x26, 0xe7, 0xc9, 0xc0, 0xbe, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1335_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1335_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1335 = { .name = "ecdsa_brainpoolp320r1_sha384_1335", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1335_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1335_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1335_sig, .siglen = 80, .result = 1, .comment = "small r and s, tcId is 325 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1336 for ECDSA, tcId is 326 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1336_pubkey[] = { 0x16, 0x51, 0x7a, 0x7d, 0x7b, 0xea, 0xb6, 0x47, 0x2e, 0xa8, 0xf6, 0xbc, 0x20, 0x41, 0x2a, 0x3c, 0xd9, 0x6d, 0x24, 0x2c, 0x24, 0x6c, 0xe9, 0xf9, 0x83, 0xb2, 0xef, 0x08, 0xb2, 0x84, 0xcf, 0xad, 0x1a, 0xc2, 0x85, 0x63, 0xb5, 0x6e, 0xda, 0xfb, 0x9f, 0x56, 0xfe, 0x2d, 0xf7, 0x8c, 0x23, 0x9a, 0xa1, 0x6c, 0x3c, 0x31, 0x8b, 0xc9, 0x19, 0x1a, 0x16, 0xec, 0x40, 0x7a, 0x70, 0x03, 0x54, 0x17, 0x3f, 0x8b, 0x86, 0x2d, 0x9a, 0x0a, 0xa1, 0x0d, 0x67, 0x39, 0x7f, 0x26, 0xe7, 0xc9, 0xc0, 0xbe, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1336_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1336_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x12, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1336 = { .name = "ecdsa_brainpoolp320r1_sha384_1336", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1336_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1336_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1336_sig, .siglen = 80, .result = -1, .comment = "r is larger than n, tcId is 326 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1337 for ECDSA, tcId is 327 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1337_pubkey[] = { 0x3a, 0x26, 0x68, 0xbc, 0x09, 0x61, 0x4d, 0x26, 0x38, 0xed, 0x58, 0xf1, 0xc4, 0x21, 0xbb, 0x61, 0xf2, 0xd4, 0x99, 0xa8, 0x6f, 0xe7, 0xd5, 0x73, 0xbd, 0x13, 0x92, 0xac, 0xef, 0x9e, 0x29, 0x6b, 0x1e, 0xf2, 0xb1, 0x0d, 0x7f, 0x4e, 0xc5, 0x24, 0xd1, 0xb7, 0x8e, 0xb2, 0x71, 0x6c, 0xe6, 0x68, 0x05, 0x4d, 0x29, 0x67, 0x7c, 0x6f, 0x4d, 0x32, 0x35, 0xf2, 0x7d, 0x3a, 0x92, 0x95, 0xec, 0xef, 0x9d, 0xdf, 0xd2, 0xf6, 0x58, 0xba, 0x00, 0x20, 0x52, 0xd0, 0xe1, 0xe6, 0x71, 0x72, 0x1e, 0x2e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1337_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1337_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xd8, 0x69, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1337 = { .name = "ecdsa_brainpoolp320r1_sha384_1337", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1337_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1337_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1337_sig, .siglen = 80, .result = -1, .comment = "s is larger than n, tcId is 327 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1338 for ECDSA, tcId is 328 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1338_pubkey[] = { 0xcd, 0x16, 0x97, 0xc6, 0xe1, 0x07, 0xf3, 0xd9, 0x0b, 0x8d, 0xf4, 0x62, 0xeb, 0x36, 0x8b, 0x75, 0xeb, 0xa5, 0x85, 0x63, 0x59, 0x50, 0x17, 0x7e, 0x0a, 0x64, 0xb1, 0xad, 0x4b, 0xe5, 0x27, 0xc9, 0x09, 0x57, 0xfb, 0xdf, 0x20, 0x3d, 0x67, 0xc8, 0x4b, 0x00, 0x3f, 0x20, 0xe8, 0x16, 0x59, 0x09, 0x9b, 0x7e, 0x46, 0x66, 0x18, 0xf2, 0x61, 0x0c, 0x6f, 0x1d, 0xf3, 0x15, 0xb2, 0x01, 0x1d, 0xb0, 0x7b, 0x90, 0xf3, 0x66, 0x2b, 0x51, 0x56, 0x1f, 0xff, 0xdf, 0x3e, 0xbb, 0x5d, 0x44, 0x34, 0x40, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1338_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1338_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x21, 0x49, 0x4d, 0xb8, 0x79, 0x80, 0x6d, 0x4f, 0x59, 0xe5, 0x3d, 0x49, 0x63, 0x97, 0x7a, 0x03, 0xf6, 0xec, 0x51, 0x14, 0x0c, 0x9f, 0x9a, 0x1d, 0xba, 0x88, 0x57, 0xff, 0x3b, 0xbc, 0x76, 0xd2, 0x21, 0x49, 0x47, 0xe6, 0x0e, 0xdc, 0x98, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1338 = { .name = "ecdsa_brainpoolp320r1_sha384_1338", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1338_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1338_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1338_sig, .siglen = 80, .result = 1, .comment = "small r and s^-1, tcId is 328 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1339 for ECDSA, tcId is 329 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1339_pubkey[] = { 0xb1, 0xe3, 0x61, 0x9d, 0x9e, 0x35, 0x87, 0x3e, 0x95, 0x9b, 0xb7, 0xde, 0x77, 0x40, 0xe9, 0x27, 0xe3, 0xcb, 0x7f, 0xcf, 0x44, 0x13, 0xbf, 0xdb, 0xbe, 0xd7, 0x2e, 0xcc, 0x9a, 0x86, 0xa5, 0x0d, 0x70, 0x29, 0xca, 0xe0, 0x8e, 0xc2, 0x85, 0xab, 0x48, 0x6b, 0x5d, 0x2f, 0x7c, 0x9b, 0x93, 0x14, 0x42, 0x0b, 0xc8, 0x64, 0xcf, 0xe2, 0x9b, 0x40, 0x64, 0xbf, 0x7b, 0x92, 0x2b, 0xbb, 0x5b, 0xbc, 0xd1, 0x6f, 0x3a, 0x81, 0xea, 0x7d, 0x0a, 0x61, 0xb0, 0xa0, 0x9a, 0x62, 0x95, 0x9b, 0x76, 0x90, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1339_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1339_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x43, 0xbe, 0xcc, 0x87, 0x6a, 0x63, 0x56, 0x4b, 0x45, 0x82, 0x80, 0x19, 0x9e, 0x38, 0x2c, 0xba, 0xd8, 0xef, 0x68, 0xd4, 0x06, 0x66, 0x5b, 0xbf, 0x30, 0x7f, 0xfe, 0xa4, 0x58, 0x45, 0xa9, 0xac, 0x69, 0x34, 0x5a, 0x84, 0xa5, 0xa7, 0x2b, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1339 = { .name = "ecdsa_brainpoolp320r1_sha384_1339", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1339_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1339_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1339_sig, .siglen = 80, .result = 1, .comment = "smallish r and s^-1, tcId is 329 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1340 for ECDSA, tcId is 330 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1340_pubkey[] = { 0x97, 0xcf, 0xeb, 0xab, 0x58, 0x8a, 0x54, 0x24, 0x2a, 0x4d, 0x96, 0x2e, 0xf8, 0x03, 0x37, 0x6c, 0x3f, 0x43, 0x07, 0x9a, 0xa5, 0x0a, 0x88, 0x71, 0xd6, 0xe7, 0x76, 0xf7, 0xa0, 0xb3, 0x3a, 0xea, 0x46, 0xab, 0x9a, 0x2d, 0xa6, 0x3a, 0x33, 0xd8, 0xc8, 0x1a, 0xf3, 0x4a, 0xf2, 0xe9, 0xa0, 0xc5, 0x71, 0xef, 0xfb, 0x50, 0x1c, 0x4a, 0x27, 0xfd, 0x2a, 0xed, 0xc1, 0x36, 0x23, 0x44, 0x7a, 0xf2, 0xbc, 0x8b, 0x6d, 0x5e, 0x72, 0x08, 0xc2, 0x3e, 0x87, 0xe2, 0xd7, 0x97, 0xcc, 0x3c, 0xf5, 0x7e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1340_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1340_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfc, 0x39, 0x92, 0x35, 0x3d, 0x91, 0x66, 0x17, 0xb4, 0x93, 0x03, 0x85, 0x64, 0x88, 0xe3, 0x9f, 0xbc, 0x26, 0x17, 0x3b, 0x8b, 0xc4, 0x26, 0xf8, 0x20, 0x7d, 0xe3, 0xd8, 0xf1, 0xb9, 0x7f, 0x3d, 0x12, 0xc8, 0x03, 0xb9, 0x9d, 0x57, 0x76, 0x8f, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1340 = { .name = "ecdsa_brainpoolp320r1_sha384_1340", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1340_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1340_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1340_sig, .siglen = 80, .result = 1, .comment = "100-bit r and small s^-1, tcId is 330 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1341 for ECDSA, tcId is 331 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1341_pubkey[] = { 0x29, 0x6e, 0x00, 0x67, 0x94, 0x7e, 0xfc, 0x07, 0xa0, 0x6a, 0xe2, 0x18, 0xfb, 0x00, 0x16, 0x4d, 0x1e, 0xbe, 0xbc, 0xd3, 0x78, 0x7f, 0x79, 0x34, 0x81, 0x40, 0x7e, 0x27, 0x96, 0x24, 0x8e, 0x8b, 0x65, 0xea, 0xc5, 0x7d, 0xb0, 0xc1, 0x46, 0x06, 0x72, 0x9e, 0x80, 0x94, 0xb9, 0xa5, 0x4e, 0xea, 0xc2, 0x3d, 0x98, 0xd5, 0x1d, 0x66, 0x2e, 0xff, 0x2d, 0xf3, 0x3a, 0x86, 0x93, 0x00, 0x8f, 0xd0, 0x2a, 0x04, 0x29, 0xef, 0x68, 0x51, 0xec, 0xbd, 0xcd, 0x93, 0xaa, 0xc6, 0x7c, 0x2f, 0xbd, 0xb6, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1341_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1341_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x84, 0x38, 0x08, 0x81, 0xb2, 0x43, 0x23, 0x69, 0x67, 0x22, 0x71, 0x91, 0x39, 0x8a, 0x3a, 0x49, 0x09, 0x00, 0x04, 0x25, 0x57, 0x6c, 0x79, 0x46, 0x5b, 0xda, 0xaa, 0x0a, 0x03, 0x26, 0x7b, 0x9e, 0x48, 0xf6, 0x8f, 0xa0, 0xa6, 0x8b, 0x29, 0xe3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1341 = { .name = "ecdsa_brainpoolp320r1_sha384_1341", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1341_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1341_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1341_sig, .siglen = 80, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 331 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1342 for ECDSA, tcId is 332 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1342_pubkey[] = { 0xa3, 0x78, 0x3b, 0x01, 0x45, 0x5d, 0x92, 0x08, 0x0f, 0x52, 0x0d, 0x17, 0x1f, 0x92, 0xab, 0xea, 0xf4, 0x8c, 0x72, 0x38, 0xe1, 0x68, 0xb2, 0x93, 0x1f, 0x2b, 0x32, 0x2f, 0x9c, 0x0f, 0xaa, 0x69, 0xa2, 0x40, 0x97, 0x83, 0x6c, 0xb0, 0xa6, 0x85, 0x1c, 0xbf, 0x1a, 0x22, 0xba, 0xc2, 0x43, 0x75, 0x51, 0x24, 0x46, 0x05, 0x68, 0x2d, 0xab, 0xcd, 0xd4, 0xcf, 0x39, 0xff, 0x9d, 0x08, 0x44, 0x39, 0x21, 0xc9, 0x94, 0x48, 0xcb, 0xce, 0xa5, 0xde, 0xb8, 0x5a, 0xd9, 0x52, 0xdb, 0xb2, 0xb9, 0x67, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1342_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1342_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0x84, 0x38, 0x08, 0x81, 0xb2, 0x43, 0x23, 0x69, 0x67, 0x22, 0x71, 0x91, 0x39, 0x8a, 0x3a, 0x49, 0x09, 0x00, 0x04, 0x25, 0x57, 0x6c, 0x79, 0x46, 0x5b, 0xda, 0xaa, 0x0a, 0x03, 0x26, 0x7b, 0x9e, 0x48, 0xf6, 0x8f, 0xa0, 0xa6, 0x8b, 0x29, 0xe3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1342 = { .name = "ecdsa_brainpoolp320r1_sha384_1342", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1342_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1342_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1342_sig, .siglen = 80, .result = 1, .comment = "100-bit r and s^-1, tcId is 332 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1343 for ECDSA, tcId is 333 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1343_pubkey[] = { 0x70, 0xd5, 0xfd, 0x41, 0xc4, 0x16, 0xd5, 0xb7, 0xcd, 0xbc, 0xb9, 0x44, 0x20, 0x5b, 0xd6, 0x9f, 0xf0, 0x0e, 0xd6, 0x35, 0x4a, 0xa5, 0x02, 0x75, 0x7e, 0x08, 0x9c, 0xb1, 0x9a, 0xf6, 0xf7, 0x77, 0xbe, 0xb0, 0xf6, 0x92, 0x1c, 0x0f, 0xaf, 0xac, 0x22, 0xae, 0x7c, 0xc6, 0x5e, 0x0e, 0x7b, 0x61, 0x74, 0x23, 0x75, 0x0b, 0x84, 0x93, 0xa5, 0x85, 0x12, 0xe3, 0x79, 0xc0, 0x0d, 0xe6, 0x26, 0xc1, 0x7f, 0x7c, 0x82, 0xbf, 0xc9, 0x07, 0xf2, 0x66, 0x10, 0xa3, 0xf1, 0xe4, 0xd1, 0x32, 0xc5, 0x75, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1343_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1343_sig[] = { 0xd3, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x92, 0x94, 0x8c, 0xe9, 0x84, 0xc0, 0x24, 0x7d, 0x8a, 0x7a, 0x96, 0x28, 0x50, 0x3f, 0x36, 0xab, 0xea, 0xee, 0xa6, 0x5f, 0xdf, 0xc3, 0xcf, 0x0a, 0x0c, 0x6c, 0xc8, 0xda, 0xc9, 0xda, 0x9f, 0x04, 0x3b, 0x46, 0x59, 0xb6, 0x38, 0xe7, 0x83, 0x2e, 0x62, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1343 = { .name = "ecdsa_brainpoolp320r1_sha384_1343", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1343_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1343_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1343_sig, .siglen = 80, .result = 1, .comment = "r and s^-1 are close to n, tcId is 333 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1344 for ECDSA, tcId is 334 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1344_pubkey[] = { 0x06, 0x82, 0x8c, 0xe6, 0x3f, 0x3b, 0x0d, 0x69, 0x4c, 0xe2, 0x99, 0x9d, 0x06, 0x94, 0x7f, 0xa9, 0xe2, 0xd1, 0xc1, 0x8a, 0xb8, 0x03, 0x26, 0x52, 0xfa, 0x7a, 0x98, 0xc6, 0x78, 0xcf, 0x6b, 0xb2, 0xc5, 0x2e, 0x73, 0x69, 0x08, 0x5e, 0x4e, 0xf7, 0xc5, 0x6d, 0xf6, 0x91, 0x28, 0x96, 0x2f, 0xbe, 0xfc, 0x2a, 0xef, 0x1b, 0x3f, 0x6c, 0x46, 0x7b, 0x72, 0xfc, 0x30, 0x5a, 0xcf, 0x51, 0xb3, 0x39, 0x64, 0x3c, 0xa2, 0xed, 0x6b, 0xde, 0x56, 0x31, 0x7c, 0x4c, 0xf5, 0x98, 0x95, 0x92, 0x3d, 0xed, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1344_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1344_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1344 = { .name = "ecdsa_brainpoolp320r1_sha384_1344", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1344_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1344_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1344_sig, .siglen = 80, .result = 1, .comment = "s == 1, tcId is 334 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1345 for ECDSA, tcId is 335 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1345_pubkey[] = { 0x06, 0x82, 0x8c, 0xe6, 0x3f, 0x3b, 0x0d, 0x69, 0x4c, 0xe2, 0x99, 0x9d, 0x06, 0x94, 0x7f, 0xa9, 0xe2, 0xd1, 0xc1, 0x8a, 0xb8, 0x03, 0x26, 0x52, 0xfa, 0x7a, 0x98, 0xc6, 0x78, 0xcf, 0x6b, 0xb2, 0xc5, 0x2e, 0x73, 0x69, 0x08, 0x5e, 0x4e, 0xf7, 0xc5, 0x6d, 0xf6, 0x91, 0x28, 0x96, 0x2f, 0xbe, 0xfc, 0x2a, 0xef, 0x1b, 0x3f, 0x6c, 0x46, 0x7b, 0x72, 0xfc, 0x30, 0x5a, 0xcf, 0x51, 0xb3, 0x39, 0x64, 0x3c, 0xa2, 0xed, 0x6b, 0xde, 0x56, 0x31, 0x7c, 0x4c, 0xf5, 0x98, 0x95, 0x92, 0x3d, 0xed, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1345_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1345_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1345 = { .name = "ecdsa_brainpoolp320r1_sha384_1345", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1345_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1345_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1345_sig, .siglen = 80, .result = -1, .comment = "s == 0, tcId is 335 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1346 for ECDSA, tcId is 336 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1346_pubkey[] = { 0x20, 0x25, 0x16, 0xad, 0x66, 0x37, 0x75, 0xf1, 0x21, 0x55, 0x52, 0x10, 0x79, 0x03, 0x7f, 0x3f, 0xca, 0x50, 0xc6, 0x4f, 0xaa, 0x4a, 0xfd, 0x88, 0x6a, 0xdd, 0x4d, 0xaa, 0xb9, 0x27, 0xf3, 0xf6, 0x2a, 0xa2, 0xda, 0xe6, 0x84, 0xa6, 0x35, 0xd6, 0x63, 0x2a, 0xed, 0xd5, 0x30, 0xe6, 0x1d, 0xab, 0x35, 0x91, 0x69, 0x62, 0xee, 0x8f, 0x23, 0xed, 0x68, 0x81, 0x98, 0xaf, 0xd5, 0xad, 0x6b, 0x07, 0x05, 0xe2, 0xef, 0x9d, 0x0b, 0xa3, 0xc5, 0x33, 0x3b, 0x15, 0xbd, 0xab, 0x43, 0x2e, 0xe3, 0x42, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1346_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1346_sig[] = { 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1346 = { .name = "ecdsa_brainpoolp320r1_sha384_1346", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1346_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1346_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1346_sig, .siglen = 80, .result = -1, .comment = "point at infinity during verify, tcId is 336 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1347 for ECDSA, tcId is 337 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1347_pubkey[] = { 0x82, 0x3a, 0x83, 0x0c, 0x58, 0xd9, 0xdd, 0x37, 0x0f, 0x68, 0x7f, 0xf8, 0x19, 0x14, 0x2b, 0x64, 0x4a, 0xc9, 0xdc, 0x18, 0xa9, 0x46, 0x81, 0xe2, 0x24, 0x5e, 0xb2, 0x2f, 0x27, 0xe3, 0x33, 0xe6, 0x2f, 0xec, 0xe3, 0x97, 0x23, 0x17, 0x69, 0xda, 0x36, 0xa7, 0xe2, 0x37, 0xea, 0x2f, 0x3e, 0x24, 0x72, 0xde, 0x14, 0x7e, 0x16, 0x6c, 0xe4, 0xbd, 0x82, 0x48, 0x20, 0x8d, 0xf5, 0x38, 0xac, 0x00, 0xf5, 0xb2, 0x29, 0x9e, 0x2d, 0x72, 0x9b, 0x0d, 0xd8, 0x0e, 0x3e, 0x10, 0x6c, 0x06, 0x08, 0x44, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1347_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1347_sig[] = { 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1347 = { .name = "ecdsa_brainpoolp320r1_sha384_1347", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1347_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1347_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1347_sig, .siglen = 80, .result = 1, .comment = "edge case for signature malleability, tcId is 337 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1348 for ECDSA, tcId is 338 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1348_pubkey[] = { 0x38, 0x7a, 0x75, 0x92, 0x84, 0xf6, 0x5d, 0x2d, 0x93, 0xf5, 0x41, 0xf2, 0x76, 0x6f, 0x84, 0x6a, 0xbd, 0xec, 0x23, 0x91, 0x90, 0xe8, 0xcd, 0xdb, 0xa9, 0xb7, 0x56, 0x4a, 0x83, 0xd5, 0x81, 0x62, 0xa4, 0x89, 0xf2, 0x5f, 0x0d, 0x43, 0xb4, 0xf8, 0x42, 0x46, 0x25, 0xa6, 0xc1, 0xe1, 0x58, 0x94, 0x74, 0xc3, 0x0e, 0x63, 0x83, 0xc9, 0x25, 0xb3, 0x63, 0x23, 0x9d, 0x1a, 0x87, 0xb9, 0x63, 0x4f, 0xd8, 0xaa, 0xc2, 0xeb, 0x0c, 0xe3, 0x9e, 0x37, 0x63, 0x87, 0x3d, 0xe7, 0x73, 0x58, 0xbd, 0x4b, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1348_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1348_sig[] = { 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x88, 0x69, 0xaf, 0x23, 0x90, 0x1b, 0x5e, 0x27, 0xdb, 0xf0, 0x9e, 0x3c, 0x2f, 0x69, 0x00, 0xf0, 0x32, 0xfc, 0xc7, 0xe7, 0xd2, 0xdb, 0x47, 0x89, 0x51, 0x96, 0xa4, 0x17, 0x63, 0xf7, 0x43, 0x2c, 0x74, 0xc3, 0x48, 0xaa, 0xad, 0xa2, 0x62, 0xc9, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1348 = { .name = "ecdsa_brainpoolp320r1_sha384_1348", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1348_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1348_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1348_sig, .siglen = 80, .result = 1, .comment = "edge case for signature malleability, tcId is 338 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1349 for ECDSA, tcId is 339 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1349_pubkey[] = { 0x6b, 0x43, 0x27, 0x11, 0x7e, 0x9c, 0x04, 0xd7, 0xa5, 0x82, 0x59, 0xc5, 0x20, 0x7a, 0x36, 0xe8, 0xd2, 0x78, 0xe8, 0x73, 0xb9, 0x2b, 0x5b, 0x3a, 0x70, 0xa3, 0xc4, 0x74, 0x2c, 0xc5, 0x83, 0xb4, 0x14, 0x08, 0xaa, 0xab, 0x23, 0xa1, 0x2a, 0x9c, 0x9b, 0x0b, 0x26, 0x16, 0x0c, 0x54, 0x8a, 0xba, 0xcd, 0x7f, 0x0e, 0x37, 0x27, 0x6f, 0x91, 0x7c, 0x09, 0x72, 0x1b, 0x38, 0x44, 0xd0, 0xb2, 0x6e, 0x9e, 0xd5, 0xc7, 0x6c, 0x99, 0x78, 0x79, 0x92, 0x25, 0x9b, 0xf0, 0xf7, 0xb0, 0x24, 0x45, 0xd3, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1349_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1349_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1349 = { .name = "ecdsa_brainpoolp320r1_sha384_1349", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1349_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1349_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1349_sig, .siglen = 80, .result = -1, .comment = "u1 == 1, tcId is 339 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1350 for ECDSA, tcId is 340 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1350_pubkey[] = { 0x27, 0x7f, 0x48, 0x7f, 0xaf, 0x77, 0xa6, 0x5d, 0xbb, 0x79, 0x15, 0x36, 0xe8, 0x63, 0xb8, 0xc7, 0x0f, 0x90, 0x4f, 0xcd, 0xca, 0xf5, 0x27, 0x40, 0xd4, 0xbd, 0x5c, 0x46, 0x97, 0x31, 0xe5, 0x8e, 0xa6, 0xbd, 0x53, 0xe8, 0xd7, 0x72, 0x02, 0x28, 0x2d, 0x34, 0x6f, 0x2b, 0x4c, 0xa7, 0xba, 0xcb, 0x88, 0x2f, 0xef, 0x74, 0x9c, 0x27, 0x13, 0xf1, 0xa7, 0x5f, 0x00, 0x82, 0x7e, 0x8b, 0x9b, 0x9f, 0x74, 0x4a, 0x0e, 0x1e, 0x34, 0xbc, 0xf8, 0x07, 0x99, 0xa1, 0x20, 0x95, 0x0d, 0xe9, 0x5d, 0x99, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1350_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1350_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0xad, 0x0b, 0x66, 0x4f, 0x95, 0x59, 0xe2, 0x9e, 0x46, 0xfd, 0x4f, 0xd3, 0x90, 0xe7, 0x5a, 0xbe, 0xbf, 0x14, 0x99, 0x7d, 0x17, 0xa1, 0xa3, 0x30, 0x4c, 0x80, 0xe4, 0x51, 0xfc, 0x8f, 0x79, 0xbb, 0x7c, 0xff, 0x16, 0x8e, 0x17, 0xde, 0x6f, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1350 = { .name = "ecdsa_brainpoolp320r1_sha384_1350", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1350_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1350_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1350_sig, .siglen = 80, .result = 1, .comment = "u1 == n - 1, tcId is 340 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1351 for ECDSA, tcId is 341 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1351_pubkey[] = { 0x73, 0xbd, 0x62, 0xf3, 0xbb, 0x32, 0x9d, 0x65, 0x09, 0x2b, 0x5d, 0x13, 0xc5, 0x74, 0x6d, 0x46, 0x24, 0x01, 0xd2, 0x60, 0x09, 0x94, 0xd8, 0xfe, 0x2e, 0xc5, 0xef, 0x5b, 0x9f, 0x33, 0x99, 0x08, 0x4b, 0x1d, 0xdc, 0x64, 0xcb, 0x33, 0x4b, 0xae, 0xc1, 0xd1, 0xac, 0x4f, 0x9a, 0x0c, 0x2a, 0x79, 0xef, 0x7c, 0xcc, 0x4a, 0xe9, 0x16, 0x5d, 0xdf, 0xa7, 0x61, 0x38, 0x23, 0x57, 0x18, 0xcf, 0x24, 0x03, 0x2c, 0x33, 0xf9, 0xdb, 0x4a, 0x26, 0xb2, 0xb0, 0x36, 0x92, 0xa5, 0x6f, 0x52, 0x02, 0xeb, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1351_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1351_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1351 = { .name = "ecdsa_brainpoolp320r1_sha384_1351", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1351_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1351_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1351_sig, .siglen = 80, .result = 1, .comment = "u2 == 1, tcId is 341 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1352 for ECDSA, tcId is 342 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1352_pubkey[] = { 0x20, 0xa7, 0x55, 0x51, 0x03, 0x5d, 0xb9, 0x5d, 0x7a, 0x1a, 0x67, 0x3d, 0x46, 0x4d, 0x27, 0x6d, 0xa0, 0x86, 0x10, 0x08, 0xe4, 0x64, 0x4c, 0x58, 0x2b, 0xc1, 0x0a, 0x1b, 0xee, 0xae, 0xb0, 0x70, 0x82, 0x3f, 0xd0, 0x64, 0xa2, 0x62, 0x5e, 0xbb, 0x5d, 0x47, 0xf0, 0xc7, 0x7f, 0xc5, 0x7e, 0x3b, 0xb0, 0xe1, 0x53, 0xbb, 0xc7, 0xe9, 0xbb, 0xde, 0x8d, 0xb9, 0x8b, 0x0c, 0x46, 0xc5, 0x81, 0x54, 0xaf, 0x5b, 0x97, 0x86, 0xb1, 0x0b, 0xa1, 0x2a, 0xb3, 0xba, 0x85, 0x33, 0xa3, 0x99, 0x28, 0x83, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1352_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1352_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x8c, 0xe9, 0x84, 0xc0, 0x24, 0x7d, 0x8a, 0x7a, 0x96, 0x28, 0x50, 0x3f, 0x36, 0xab, 0xea, 0xee, 0xa6, 0x5f, 0xdf, 0xc3, 0xcf, 0x0a, 0x0c, 0x6c, 0xc8, 0xda, 0xc9, 0xda, 0x9f, 0x04, 0x3b, 0x46, 0x59, 0xb6, 0x38, 0xe7, 0x83, 0x2e, 0x62, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1352 = { .name = "ecdsa_brainpoolp320r1_sha384_1352", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1352_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1352_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1352_sig, .siglen = 80, .result = 1, .comment = "u2 == n - 1, tcId is 342 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1353 for ECDSA, tcId is 343 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1353_pubkey[] = { 0x3f, 0x43, 0x6d, 0x07, 0xcb, 0x02, 0x64, 0xb1, 0x3f, 0x92, 0xfd, 0x69, 0x63, 0x34, 0xa4, 0xe5, 0x1b, 0x7d, 0x66, 0x19, 0xe2, 0xd0, 0x43, 0xb2, 0xd0, 0xd2, 0x78, 0x96, 0x3f, 0x25, 0x16, 0x20, 0x0e, 0xf9, 0x05, 0xeb, 0xf6, 0x71, 0x66, 0x63, 0x40, 0xe6, 0x42, 0xb6, 0xc9, 0x66, 0x07, 0x2b, 0x79, 0x27, 0x80, 0x03, 0x65, 0x11, 0x28, 0x87, 0x9f, 0x19, 0xde, 0xe0, 0x12, 0x73, 0xb6, 0x6b, 0xea, 0xd8, 0x04, 0x51, 0x94, 0x27, 0x7c, 0x92, 0x84, 0x09, 0x33, 0x48, 0xd9, 0x05, 0x69, 0xb1, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1353_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1353_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0c, 0xc6, 0x4a, 0xf0, 0x35, 0xcb, 0x79, 0xb3, 0x33, 0x6a, 0x62, 0xd9, 0x15, 0xb3, 0x81, 0xe2, 0x68, 0xd3, 0xbc, 0xb8, 0x34, 0xf9, 0xcf, 0xd0, 0xf5, 0x97, 0xc3, 0x7c, 0xa5, 0xfc, 0xf5, 0x0f, 0x58, 0x86, 0x14, 0xef, 0x0e, 0xf7, 0xb6, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1353 = { .name = "ecdsa_brainpoolp320r1_sha384_1353", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1353_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1353_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1353_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 343 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1354 for ECDSA, tcId is 344 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1354_pubkey[] = { 0xc1, 0x6f, 0xbe, 0x6d, 0x0d, 0x77, 0x32, 0x7c, 0xf9, 0xa6, 0x5f, 0x98, 0x7c, 0x2f, 0xe7, 0xee, 0x18, 0x07, 0x85, 0x1c, 0x0e, 0x1c, 0x8b, 0xc4, 0xf0, 0x62, 0x28, 0x07, 0xdc, 0xd4, 0xa8, 0x8b, 0x3b, 0x91, 0x2e, 0xb0, 0x47, 0x54, 0x71, 0xe5, 0x75, 0x42, 0x1c, 0x40, 0x54, 0x00, 0x50, 0x50, 0x7a, 0x16, 0x3f, 0x23, 0xcc, 0x7c, 0xb9, 0x0a, 0xcc, 0x52, 0x82, 0x2d, 0x01, 0xd2, 0x45, 0xab, 0x70, 0xdc, 0xaa, 0xc0, 0x6e, 0x2e, 0xa6, 0x44, 0x32, 0x7a, 0x85, 0xf5, 0x95, 0xd0, 0x26, 0xef, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1354_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1354_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x8e, 0x76, 0x5d, 0x0d, 0x1c, 0xf9, 0x53, 0x9f, 0x68, 0x2a, 0x41, 0x55, 0xb6, 0xd6, 0x0e, 0xb6, 0xaa, 0x68, 0x62, 0xb2, 0xaf, 0x9e, 0x9d, 0x3f, 0x94, 0xc9, 0xad, 0x46, 0xd3, 0x32, 0xf0, 0xe0, 0x29, 0x77, 0x55, 0x22, 0x81, 0x5c, 0x0e, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1354 = { .name = "ecdsa_brainpoolp320r1_sha384_1354", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1354_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1354_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1354_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 344 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1355 for ECDSA, tcId is 345 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1355_pubkey[] = { 0xbe, 0x92, 0x40, 0x07, 0xd6, 0xe2, 0x2b, 0x94, 0x4a, 0xc7, 0x6d, 0xa7, 0xfc, 0x26, 0x60, 0xd1, 0xae, 0xfa, 0xb6, 0x94, 0x71, 0xbd, 0x83, 0x5b, 0xd7, 0x8e, 0xdd, 0x2c, 0x10, 0x62, 0x1e, 0x76, 0xf7, 0x18, 0xbf, 0xd0, 0xa5, 0xe2, 0x30, 0x7e, 0xc6, 0x25, 0x83, 0xd5, 0xba, 0x5c, 0xc1, 0xc5, 0x47, 0x63, 0x04, 0x76, 0xb3, 0x99, 0x86, 0x6e, 0x7e, 0xd9, 0x53, 0xb5, 0x38, 0xf7, 0x6c, 0x86, 0xaf, 0xe9, 0xcf, 0xd0, 0x85, 0x4b, 0x57, 0xe3, 0x36, 0x91, 0xc7, 0x7e, 0x44, 0x4c, 0xca, 0xb8, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1355_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1355_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x72, 0x25, 0xa9, 0x60, 0xd9, 0x67, 0xcf, 0xe5, 0x2a, 0xc1, 0x26, 0xa5, 0x0f, 0xd7, 0x9f, 0xa8, 0x5a, 0x58, 0x63, 0x97, 0xc0, 0xb2, 0x98, 0xc8, 0xad, 0xfa, 0xf1, 0x38, 0x31, 0x7b, 0x0f, 0x79, 0x4b, 0x24, 0xf5, 0x3b, 0xd9, 0x20, 0xc1, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1355 = { .name = "ecdsa_brainpoolp320r1_sha384_1355", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1355_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1355_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1355_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 345 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1356 for ECDSA, tcId is 346 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1356_pubkey[] = { 0xac, 0xf2, 0x40, 0x13, 0x0d, 0x47, 0xd4, 0xa5, 0x7d, 0x60, 0x65, 0x95, 0xf9, 0x89, 0x12, 0x9f, 0xea, 0x7e, 0x97, 0x44, 0xb1, 0xe5, 0x3f, 0x5c, 0xe6, 0x79, 0xc2, 0x44, 0xc8, 0x5a, 0xf3, 0x5c, 0x61, 0x86, 0x07, 0xe2, 0xec, 0xce, 0x1a, 0x43, 0x1b, 0x69, 0x6a, 0x79, 0x59, 0xfe, 0x30, 0xd0, 0x49, 0x10, 0x0d, 0xd5, 0x42, 0x58, 0x18, 0x1b, 0x08, 0xa2, 0xfe, 0x44, 0x2e, 0x41, 0xff, 0x29, 0x52, 0x3c, 0x11, 0xa3, 0xe0, 0x10, 0x28, 0xeb, 0x64, 0xb3, 0x21, 0xc2, 0xb7, 0x02, 0x57, 0x9c, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1356_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1356_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x87, 0x4f, 0x31, 0x1b, 0x6b, 0x9a, 0xc7, 0x4f, 0xc3, 0x4c, 0x60, 0xc0, 0x94, 0x18, 0x73, 0x65, 0x1b, 0x3c, 0x0e, 0xc1, 0xd0, 0x97, 0xa7, 0x86, 0x1e, 0x0c, 0x7f, 0xbe, 0xc3, 0x22, 0x6f, 0x23, 0xa5, 0xe2, 0xc9, 0x29, 0xd8, 0x56, 0xec, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1356 = { .name = "ecdsa_brainpoolp320r1_sha384_1356", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1356_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1356_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1356_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 346 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1357 for ECDSA, tcId is 347 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1357_pubkey[] = { 0x46, 0x24, 0x3b, 0x39, 0xe7, 0x76, 0x39, 0xac, 0x19, 0xe9, 0xbe, 0x53, 0x66, 0x93, 0x17, 0xd9, 0x59, 0x8e, 0x03, 0xec, 0x30, 0xa0, 0xcf, 0x69, 0x30, 0xf8, 0x00, 0x00, 0x98, 0x33, 0x82, 0x6a, 0x59, 0xad, 0xe5, 0x32, 0x19, 0x33, 0xff, 0x2f, 0x69, 0xd7, 0x70, 0xb9, 0x78, 0xcc, 0xc3, 0x6c, 0x90, 0xb7, 0x48, 0xe5, 0x01, 0x06, 0x36, 0xe7, 0x00, 0x4d, 0xdc, 0x19, 0x88, 0x5d, 0xa7, 0xbb, 0x90, 0xdb, 0xfa, 0xd4, 0x79, 0xfc, 0x52, 0xdc, 0xe4, 0xb9, 0x28, 0x14, 0x05, 0xf1, 0xc6, 0xbd, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1357_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1357_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x13, 0x75, 0x3a, 0xc9, 0x0f, 0xbc, 0x7e, 0xdf, 0xdc, 0xb3, 0x2e, 0x16, 0x97, 0xfd, 0xfd, 0x41, 0xb1, 0xfb, 0x59, 0xc5, 0xad, 0x17, 0x7e, 0x96, 0xfe, 0xac, 0xc8, 0x75, 0x22, 0xef, 0x92, 0x8d, 0xe8, 0x0a, 0x60, 0xbb, 0x0f, 0x32, 0xe7, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1357 = { .name = "ecdsa_brainpoolp320r1_sha384_1357", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1357_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1357_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1357_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 347 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1358 for ECDSA, tcId is 348 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1358_pubkey[] = { 0xb4, 0xb9, 0xb6, 0xba, 0x3c, 0x0e, 0x75, 0x09, 0xc2, 0x75, 0x89, 0x4e, 0x84, 0xe8, 0x18, 0xd7, 0x1d, 0xe1, 0x45, 0x77, 0xbd, 0xb4, 0xbf, 0x0b, 0x8e, 0x5e, 0x13, 0x32, 0xd1, 0x08, 0x7f, 0x3c, 0x33, 0x3b, 0x73, 0xe8, 0xab, 0x75, 0xf2, 0xc9, 0x4f, 0x33, 0xd0, 0xe2, 0xab, 0x34, 0x2d, 0x2e, 0x19, 0x68, 0xce, 0x3e, 0x1c, 0x47, 0xbe, 0x87, 0xe3, 0x9e, 0xe8, 0x82, 0x73, 0xae, 0x4c, 0xf7, 0x77, 0x86, 0x9d, 0x3a, 0x17, 0x03, 0xb6, 0x3a, 0x98, 0x3d, 0x2d, 0x43, 0xc5, 0x93, 0x03, 0xe5, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1358_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1358_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x26, 0xea, 0x75, 0x92, 0x1f, 0x78, 0xfd, 0xbf, 0xb9, 0x66, 0x5c, 0x2d, 0x2f, 0xfb, 0xfa, 0x83, 0x63, 0xf6, 0xb3, 0x8b, 0x5a, 0x2e, 0xfd, 0x2d, 0xfd, 0x59, 0x90, 0xea, 0x45, 0xdf, 0x25, 0x1b, 0xd0, 0x14, 0xc1, 0x76, 0x1e, 0x65, 0xcf, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1358 = { .name = "ecdsa_brainpoolp320r1_sha384_1358", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1358_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1358_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1358_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 348 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1359 for ECDSA, tcId is 349 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1359_pubkey[] = { 0x03, 0x01, 0x5b, 0x3c, 0xa6, 0x76, 0x83, 0x46, 0x7c, 0x79, 0x44, 0x6d, 0x4b, 0x93, 0xd1, 0x09, 0x78, 0x33, 0x08, 0x56, 0xee, 0xe4, 0x0d, 0x6d, 0x58, 0x68, 0x3a, 0xc7, 0x35, 0x00, 0xae, 0x31, 0x5c, 0x5b, 0x58, 0x23, 0x51, 0xc4, 0x22, 0x6b, 0x18, 0xd8, 0x95, 0x61, 0xd3, 0xff, 0xa0, 0xf9, 0x31, 0x1a, 0xa6, 0x16, 0x54, 0x7f, 0x7e, 0xb1, 0xd3, 0x6e, 0x73, 0xa6, 0xcc, 0x4b, 0xd2, 0x30, 0xdf, 0x34, 0xa1, 0xf3, 0x19, 0xbe, 0x66, 0xbc, 0xb2, 0xfb, 0x0e, 0x1f, 0x68, 0xcc, 0x19, 0x2e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1359_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1359_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x9f, 0xee, 0x19, 0x29, 0x30, 0xd3, 0x05, 0x02, 0xc0, 0x5e, 0x56, 0xad, 0xf0, 0x86, 0xec, 0xd1, 0x3a, 0x92, 0xcd, 0x43, 0xce, 0x0c, 0x72, 0xea, 0x65, 0xea, 0xd4, 0x36, 0x67, 0x89, 0x0a, 0xe1, 0x9b, 0xe8, 0x35, 0x33, 0x3c, 0x32, 0xc5, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1359 = { .name = "ecdsa_brainpoolp320r1_sha384_1359", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1359_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1359_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1359_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 349 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1360 for ECDSA, tcId is 350 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1360_pubkey[] = { 0x18, 0x7d, 0x93, 0xf8, 0x4a, 0x0e, 0x60, 0x43, 0xf0, 0x97, 0xd0, 0xa8, 0x7f, 0x8d, 0xca, 0x07, 0x73, 0x9c, 0xf4, 0x45, 0x48, 0xa7, 0xd3, 0x40, 0x3e, 0x03, 0x9e, 0x49, 0xc4, 0xc5, 0x12, 0x85, 0x48, 0x29, 0x75, 0xaf, 0x54, 0xec, 0x05, 0x6c, 0x06, 0x23, 0xc5, 0x75, 0x38, 0xfe, 0xfb, 0x72, 0x31, 0xd6, 0x19, 0xbb, 0xef, 0xd4, 0xca, 0xb3, 0x73, 0xa5, 0x4b, 0x36, 0x13, 0x54, 0xe5, 0x86, 0xb1, 0xd9, 0x98, 0x1a, 0x88, 0x35, 0xe9, 0xc6, 0xbe, 0xab, 0x08, 0x2c, 0xb9, 0x3e, 0x13, 0xb6, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1360_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1360_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x96, 0x3f, 0x97, 0xcb, 0x35, 0xa3, 0x21, 0xdf, 0x62, 0xfc, 0x21, 0x9e, 0xb2, 0xf3, 0x70, 0x39, 0x49, 0xc4, 0x83, 0x16, 0x5d, 0x06, 0xdb, 0x13, 0xc4, 0x03, 0x08, 0x0a, 0x86, 0xc1, 0xe5, 0xd9, 0xb4, 0x3d, 0x2e, 0x8d, 0xd9, 0x64, 0x3c, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1360 = { .name = "ecdsa_brainpoolp320r1_sha384_1360", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1360_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1360_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1360_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 350 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1361 for ECDSA, tcId is 351 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1361_pubkey[] = { 0x08, 0x55, 0xcc, 0x20, 0x35, 0x11, 0x26, 0xb3, 0x8f, 0x93, 0x4f, 0xbb, 0x56, 0xc3, 0x02, 0xf6, 0x2a, 0x36, 0x0e, 0x62, 0x49, 0x3c, 0x2d, 0x52, 0x9f, 0xb8, 0x7c, 0xae, 0xa0, 0xd7, 0x1b, 0xfd, 0xaf, 0x5f, 0xcc, 0x33, 0x68, 0xd4, 0x95, 0xfd, 0x1c, 0xe7, 0x57, 0x86, 0x10, 0xcb, 0xec, 0x46, 0x53, 0x98, 0xb2, 0xc1, 0x23, 0x8b, 0x3e, 0x23, 0xb9, 0xe2, 0x9b, 0x47, 0x61, 0x96, 0x10, 0x64, 0x30, 0xd7, 0x63, 0x16, 0xaa, 0xf2, 0x99, 0x37, 0xac, 0xe6, 0x58, 0xb6, 0x9c, 0x8b, 0xfb, 0x99, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1361_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1361_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x13, 0xdb, 0xff, 0x9e, 0x66, 0x7e, 0x7b, 0xcd, 0x44, 0x95, 0x02, 0x26, 0xf9, 0x3b, 0x09, 0x73, 0x8e, 0x79, 0x35, 0x17, 0xc0, 0x28, 0x86, 0xae, 0x9f, 0x2b, 0x3d, 0xed, 0xed, 0xa7, 0x56, 0xc9, 0x04, 0x9a, 0xb9, 0xa4, 0x6b, 0xc7, 0xc9, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1361 = { .name = "ecdsa_brainpoolp320r1_sha384_1361", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1361_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1361_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1361_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 351 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1362 for ECDSA, tcId is 352 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1362_pubkey[] = { 0x94, 0xc5, 0x49, 0x19, 0x00, 0x40, 0x79, 0xbe, 0x0d, 0xb4, 0xc9, 0x2d, 0xc1, 0xfc, 0x94, 0x7d, 0x79, 0xeb, 0x0f, 0x8e, 0x86, 0x9d, 0x94, 0x81, 0x38, 0x86, 0xad, 0xa4, 0x25, 0x4f, 0x1d, 0xad, 0xb4, 0xd8, 0x7a, 0x61, 0x12, 0xa5, 0x83, 0x36, 0x86, 0xd8, 0xb5, 0xbe, 0xac, 0x00, 0xfa, 0xfd, 0x64, 0x7e, 0xf8, 0xb6, 0x31, 0xe8, 0x99, 0xa6, 0xa8, 0xb7, 0x2a, 0x51, 0x1d, 0x4f, 0x50, 0xce, 0x15, 0x66, 0x48, 0xad, 0x9c, 0xb7, 0x08, 0xfb, 0x2f, 0xb2, 0xc6, 0x38, 0xfd, 0xb9, 0xf3, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1362_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1362_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x85, 0x24, 0x66, 0xce, 0xf3, 0x16, 0x99, 0x2b, 0x3c, 0xa2, 0x5c, 0xc5, 0x4b, 0x7f, 0x4f, 0xda, 0x2e, 0x8a, 0x81, 0x9e, 0x7c, 0x4b, 0x04, 0x05, 0x43, 0xe9, 0x4f, 0x9c, 0xac, 0xa0, 0x29, 0x37, 0x68, 0x1c, 0x20, 0x19, 0xbb, 0x49, 0xee, 0x43, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1362 = { .name = "ecdsa_brainpoolp320r1_sha384_1362", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1362_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1362_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1362_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 352 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1363 for ECDSA, tcId is 353 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1363_pubkey[] = { 0x2b, 0xca, 0x76, 0x04, 0x37, 0x28, 0xb5, 0xee, 0xef, 0xde, 0x89, 0xd2, 0x5a, 0xcd, 0xf2, 0xe0, 0xb1, 0x60, 0xc5, 0xae, 0x0c, 0xcd, 0xab, 0x6b, 0xd3, 0xba, 0xa4, 0x79, 0xf1, 0x77, 0x53, 0xc3, 0xc0, 0x00, 0xcc, 0xf8, 0xba, 0x86, 0x23, 0xde, 0x92, 0xf0, 0xc2, 0xd6, 0x8a, 0x1b, 0xd4, 0x05, 0xe4, 0x49, 0x82, 0x3f, 0xe6, 0x3b, 0x21, 0x40, 0x2a, 0xef, 0x3e, 0x9a, 0x01, 0x7d, 0xcb, 0xc3, 0x0a, 0xf1, 0x8b, 0xcc, 0x79, 0xa8, 0x52, 0x64, 0x83, 0x43, 0x98, 0xc7, 0x2f, 0xa2, 0xbb, 0x16, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1363_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1363_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x63, 0x4b, 0xfe, 0x18, 0x00, 0x78, 0x6b, 0x02, 0x56, 0xe9, 0x0a, 0xc2, 0xde, 0x27, 0x2f, 0x41, 0xc8, 0x5e, 0x09, 0x76, 0xc0, 0xca, 0xa1, 0x69, 0x1b, 0xd8, 0x35, 0xa5, 0xa4, 0x44, 0xb1, 0xed, 0x17, 0x05, 0xa0, 0x36, 0x1a, 0xe6, 0xee, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1363 = { .name = "ecdsa_brainpoolp320r1_sha384_1363", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1363_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1363_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1363_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 353 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1364 for ECDSA, tcId is 354 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1364_pubkey[] = { 0x1c, 0x01, 0x3b, 0x3a, 0x32, 0x60, 0xcc, 0xfb, 0x53, 0xe3, 0xf6, 0xce, 0x93, 0xe6, 0x98, 0x48, 0x65, 0xdc, 0x8e, 0x12, 0x93, 0xe9, 0x23, 0x01, 0xf4, 0xcb, 0x3a, 0x55, 0x4b, 0xd5, 0xda, 0x8a, 0x53, 0xee, 0x10, 0x1b, 0x3e, 0x1a, 0x30, 0x09, 0x97, 0xd2, 0x90, 0x1e, 0x26, 0x72, 0x93, 0x03, 0xe1, 0xcb, 0x93, 0xa8, 0xb7, 0x2d, 0xc2, 0xaf, 0xc9, 0x0f, 0xf5, 0xb4, 0x4f, 0xd5, 0xb6, 0x62, 0x44, 0x55, 0x48, 0x79, 0x74, 0xed, 0x71, 0xc7, 0x83, 0x3e, 0xff, 0x03, 0xcc, 0x12, 0x8d, 0x0c, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1364_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1364_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xc6, 0x97, 0xfc, 0x30, 0x00, 0xf0, 0xd6, 0x04, 0xad, 0xd2, 0x15, 0x85, 0xbc, 0x4e, 0x5e, 0x83, 0x90, 0xbc, 0x12, 0xed, 0x81, 0x95, 0x42, 0xd2, 0x37, 0xb0, 0x6b, 0x4b, 0x48, 0x89, 0x63, 0xda, 0x2e, 0x0b, 0x40, 0x6c, 0x35, 0xcd, 0xdc, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1364 = { .name = "ecdsa_brainpoolp320r1_sha384_1364", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1364_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1364_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1364_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 354 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1365 for ECDSA, tcId is 355 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1365_pubkey[] = { 0x62, 0x4b, 0xec, 0x45, 0x20, 0xe6, 0x04, 0x4a, 0xbe, 0xd1, 0xee, 0xe4, 0x96, 0x46, 0x68, 0x77, 0x51, 0x81, 0x46, 0x4c, 0x5d, 0x6b, 0xf5, 0xa8, 0xb5, 0x39, 0xf1, 0x15, 0x6f, 0x32, 0x48, 0xc0, 0x22, 0x71, 0xbf, 0x94, 0x25, 0xb9, 0x66, 0xb5, 0x47, 0xf4, 0x06, 0xbc, 0xc1, 0x43, 0x22, 0x6d, 0x81, 0x4c, 0xdb, 0x98, 0x8d, 0x76, 0x41, 0x2a, 0xd1, 0x86, 0xbd, 0xee, 0xb8, 0x69, 0xad, 0x78, 0xa3, 0x2f, 0xe8, 0x7c, 0x76, 0xf2, 0x54, 0x54, 0x47, 0xdd, 0xf8, 0xfb, 0xd0, 0x43, 0x08, 0x11, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1365_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1365_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x56, 0x85, 0xb3, 0x27, 0xca, 0xac, 0xf1, 0x4f, 0x23, 0x7e, 0xa7, 0xe9, 0xc8, 0x73, 0xad, 0x5f, 0x5f, 0x8a, 0x4c, 0xbe, 0x8b, 0xd0, 0xd1, 0x98, 0x26, 0x40, 0x72, 0x28, 0xfe, 0x47, 0xbc, 0xdd, 0xbe, 0x7f, 0x8b, 0x47, 0x0b, 0xef, 0x37, 0x91, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1365 = { .name = "ecdsa_brainpoolp320r1_sha384_1365", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1365_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1365_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1365_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 355 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1366 for ECDSA, tcId is 356 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1366_pubkey[] = { 0x1b, 0x2b, 0x27, 0x38, 0xe3, 0x05, 0x5d, 0x15, 0x96, 0xf6, 0x41, 0x76, 0xcf, 0x0a, 0xc3, 0x81, 0xb3, 0xa8, 0x17, 0x8a, 0x2f, 0x02, 0x14, 0x03, 0x35, 0x02, 0x18, 0xfa, 0x18, 0xf9, 0xf8, 0x60, 0xc1, 0xbb, 0xa3, 0x9f, 0xc5, 0x24, 0xbc, 0x82, 0x09, 0xfb, 0xaf, 0xca, 0x1a, 0xfc, 0x5a, 0xf7, 0x59, 0x8b, 0x87, 0x8d, 0x69, 0xcb, 0x87, 0x5b, 0xe0, 0xd3, 0x9f, 0x41, 0xff, 0x01, 0xb0, 0x93, 0x88, 0x69, 0x3e, 0xb3, 0x10, 0xad, 0xc9, 0xd4, 0x83, 0x6e, 0x22, 0x6c, 0x23, 0x67, 0x7e, 0x51, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1366_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1366_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xa2, 0xc1, 0xf8, 0x40, 0x88, 0x12, 0x0f, 0xce, 0x85, 0xfe, 0xcf, 0x81, 0xf0, 0xec, 0xc0, 0x07, 0x29, 0xf4, 0x19, 0x9e, 0xbb, 0xa0, 0xd5, 0xb5, 0xed, 0xa1, 0x90, 0x00, 0x10, 0x00, 0xb4, 0x31, 0x68, 0xdb, 0x25, 0x4b, 0x8e, 0xf3, 0x2a, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1366 = { .name = "ecdsa_brainpoolp320r1_sha384_1366", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1366_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1366_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1366_sig, .siglen = 80, .result = 1, .comment = "edge case for u1, tcId is 356 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1367 for ECDSA, tcId is 357 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1367_pubkey[] = { 0x40, 0x90, 0x2b, 0xf6, 0xb2, 0x39, 0xd2, 0xf3, 0x58, 0x82, 0x60, 0xe9, 0xd7, 0xf5, 0x12, 0x25, 0x3f, 0xa4, 0x4f, 0x30, 0x8a, 0x0a, 0xb8, 0x1d, 0xff, 0x05, 0xb8, 0xfa, 0x2e, 0x25, 0x81, 0x4d, 0x65, 0xc2, 0x01, 0x8d, 0x49, 0x39, 0x0a, 0xae, 0x01, 0x6f, 0x8a, 0xe5, 0x69, 0x19, 0x38, 0x40, 0x2a, 0xdc, 0x0f, 0xfa, 0x29, 0xbb, 0x87, 0xef, 0x0a, 0xf0, 0xec, 0xf3, 0xcd, 0x44, 0x6d, 0x97, 0xc3, 0xe8, 0xd1, 0x2b, 0x3b, 0x09, 0xeb, 0x78, 0x90, 0x9c, 0x1b, 0x91, 0xb1, 0xb8, 0x78, 0x5f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1367_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1367_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x71, 0x1f, 0x6d, 0x0a, 0xbc, 0xe9, 0x6f, 0xe7, 0xf5, 0xbe, 0xd2, 0xca, 0x46, 0x00, 0xa0, 0x21, 0xfd, 0xda, 0x9a, 0x8c, 0x92, 0x2f, 0xb0, 0xe1, 0x0f, 0x18, 0x0f, 0x97, 0xfa, 0x2c, 0xc8, 0x4d, 0xd7, 0x85, 0xc7, 0x1e, 0x6c, 0x41, 0xdb, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1367 = { .name = "ecdsa_brainpoolp320r1_sha384_1367", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1367_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1367_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1367_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 357 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1368 for ECDSA, tcId is 358 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1368_pubkey[] = { 0x72, 0x65, 0x33, 0xe2, 0x67, 0x73, 0xac, 0x72, 0x0a, 0x11, 0x5b, 0x02, 0xde, 0x89, 0xac, 0x15, 0x96, 0x66, 0x77, 0xe2, 0x39, 0xb7, 0xc5, 0x77, 0xa1, 0xc1, 0x5b, 0x81, 0x02, 0x7b, 0x1f, 0xeb, 0x73, 0xe6, 0x73, 0x60, 0x1e, 0x21, 0x1a, 0xa9, 0x2a, 0xcc, 0xb5, 0x85, 0xbc, 0x06, 0xcc, 0x27, 0x4b, 0x61, 0xc9, 0xe6, 0x14, 0x74, 0x6e, 0xdd, 0x24, 0x8d, 0x1c, 0xcc, 0xf8, 0xd8, 0xb1, 0xab, 0x4b, 0xc1, 0x5c, 0xc5, 0x8c, 0xdf, 0x11, 0x60, 0x65, 0xce, 0x97, 0x67, 0xf2, 0xa3, 0x22, 0x3d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1368_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1368_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x02, 0xa6, 0xeb, 0x40, 0x84, 0x43, 0xd2, 0x4e, 0x96, 0xbe, 0x4c, 0xa0, 0x27, 0x84, 0x42, 0xa8, 0xa4, 0x26, 0x08, 0x7f, 0x9b, 0xeb, 0x03, 0xff, 0xe5, 0x52, 0x61, 0x62, 0xbf, 0x1d, 0xc3, 0x04, 0x34, 0xcf, 0x7e, 0xa7, 0x95, 0x74, 0xb1, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1368 = { .name = "ecdsa_brainpoolp320r1_sha384_1368", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1368_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1368_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1368_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 358 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1369 for ECDSA, tcId is 359 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1369_pubkey[] = { 0x53, 0xc3, 0xda, 0x4d, 0xe1, 0x4f, 0x7d, 0x35, 0x77, 0x5f, 0x9b, 0xec, 0xa6, 0xd5, 0x3e, 0xe7, 0x8d, 0xac, 0x73, 0xcd, 0x3f, 0x18, 0xc6, 0xfb, 0xf7, 0x09, 0xb4, 0xff, 0xa7, 0xdd, 0x3e, 0x70, 0xb4, 0x36, 0x40, 0x9b, 0x9b, 0x28, 0x5d, 0x1c, 0x2a, 0x5b, 0x60, 0xe4, 0x57, 0xe5, 0x84, 0x22, 0xc9, 0x59, 0x14, 0x2b, 0x5e, 0xcf, 0xf2, 0x36, 0xdf, 0xd7, 0x6c, 0x99, 0xc3, 0x01, 0x8c, 0xea, 0x90, 0x40, 0x58, 0x09, 0x9a, 0x13, 0x64, 0x7d, 0xb0, 0x88, 0x98, 0xcf, 0xd0, 0x50, 0x9e, 0x84, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1369_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1369_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xb6, 0xba, 0x1a, 0xec, 0xd2, 0x40, 0xde, 0xbe, 0x77, 0x21, 0x3a, 0x42, 0x28, 0xb1, 0x25, 0x60, 0x36, 0x71, 0xc9, 0xd5, 0x14, 0x7b, 0x6c, 0x0b, 0x36, 0xdd, 0x23, 0xe4, 0x2b, 0x7c, 0xb5, 0x07, 0x8a, 0x1b, 0x8f, 0xdf, 0x1b, 0x98, 0xb9, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1369 = { .name = "ecdsa_brainpoolp320r1_sha384_1369", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1369_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1369_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1369_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 359 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1370 for ECDSA, tcId is 360 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1370_pubkey[] = { 0xcd, 0x24, 0xae, 0x7f, 0x75, 0x23, 0xad, 0xf8, 0x59, 0xdb, 0x92, 0xe5, 0x1d, 0x48, 0x74, 0x6b, 0x8b, 0x2f, 0x86, 0x86, 0x20, 0x89, 0x8a, 0x9c, 0x42, 0xf8, 0xba, 0xe8, 0x17, 0x3e, 0x36, 0x46, 0xf5, 0x86, 0xfd, 0x81, 0x87, 0x12, 0x43, 0x0e, 0x55, 0xb1, 0x2d, 0x59, 0xf7, 0x34, 0x41, 0x68, 0xf7, 0x96, 0xfe, 0x59, 0xc0, 0x26, 0xea, 0xaa, 0x13, 0x97, 0x45, 0xa8, 0xac, 0xe9, 0x7d, 0xf1, 0xd5, 0xc6, 0xbc, 0xc2, 0x1f, 0x0c, 0xfa, 0x68, 0x60, 0xf9, 0xc8, 0xc7, 0x5f, 0x39, 0x16, 0x29, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1370_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1370_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x95, 0x7b, 0x38, 0x3b, 0xa1, 0xce, 0xbf, 0x5c, 0xa5, 0x79, 0xef, 0x6e, 0xd1, 0x00, 0x27, 0x98, 0x8f, 0x84, 0x24, 0xf4, 0x2f, 0xfb, 0xea, 0x2e, 0x51, 0xb3, 0x34, 0x0d, 0xf9, 0xf8, 0xc3, 0xc6, 0x0b, 0x55, 0x8d, 0x6d, 0xc2, 0xdf, 0x10, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1370 = { .name = "ecdsa_brainpoolp320r1_sha384_1370", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1370_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1370_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1370_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 360 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1371 for ECDSA, tcId is 361 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1371_pubkey[] = { 0x4d, 0xb4, 0x60, 0x20, 0x99, 0x72, 0xc8, 0xe9, 0xc3, 0x65, 0x11, 0x95, 0x46, 0xac, 0x45, 0x7a, 0xdd, 0x15, 0x7f, 0x0c, 0x4d, 0x2b, 0x3c, 0xd6, 0x5c, 0x63, 0x5d, 0xca, 0xec, 0xa6, 0x17, 0x02, 0x9c, 0xab, 0xf7, 0x5c, 0x06, 0x10, 0x1b, 0xb6, 0x9e, 0xf8, 0xb7, 0x62, 0x6e, 0x6b, 0x2f, 0x98, 0x45, 0xb0, 0x08, 0x6d, 0x2a, 0x96, 0x40, 0x18, 0xb9, 0xb2, 0x5e, 0xb8, 0xdb, 0x42, 0x6b, 0xc9, 0x06, 0x94, 0xcc, 0x61, 0x4b, 0x76, 0x02, 0xb1, 0xfd, 0x60, 0x87, 0xa9, 0xa7, 0x1c, 0xbf, 0x1f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1371_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1371_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x98, 0xff, 0x1d, 0xb1, 0xb9, 0xaf, 0xfa, 0x33, 0xa2, 0xe5, 0x3c, 0x68, 0x4d, 0x3f, 0x07, 0x61, 0x17, 0x72, 0x40, 0x5e, 0x8c, 0x20, 0x0f, 0x2a, 0xf2, 0xaf, 0xa9, 0xe5, 0x3c, 0x6e, 0x8e, 0xf3, 0x0c, 0xc1, 0x43, 0xb3, 0xf5, 0xff, 0x7f, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1371 = { .name = "ecdsa_brainpoolp320r1_sha384_1371", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1371_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1371_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1371_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 361 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1372 for ECDSA, tcId is 362 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1372_pubkey[] = { 0x3e, 0x7a, 0xb8, 0x50, 0x84, 0x0d, 0x75, 0x98, 0x7d, 0x33, 0x83, 0x7e, 0xad, 0x46, 0x49, 0x9c, 0xe4, 0x33, 0xf3, 0xfc, 0xe6, 0x73, 0x83, 0xb2, 0xe3, 0x25, 0xdd, 0x2f, 0xc7, 0xe0, 0xf5, 0x00, 0x76, 0x9c, 0xbb, 0x67, 0xb4, 0x55, 0x0a, 0x28, 0xc3, 0x03, 0x14, 0x48, 0x7a, 0x87, 0x09, 0x47, 0x50, 0x33, 0x44, 0x99, 0xdb, 0xfb, 0xeb, 0x2d, 0x5c, 0xb9, 0x76, 0xee, 0x2d, 0x47, 0x99, 0x73, 0x21, 0x59, 0x7a, 0x41, 0x12, 0x4a, 0x03, 0x8f, 0xe8, 0x67, 0xbe, 0x0e, 0xf6, 0x68, 0xc4, 0xce, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1372_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1372_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5e, 0x9f, 0xf4, 0x43, 0x3c, 0xa3, 0xa4, 0xaf, 0x64, 0x8e, 0x00, 0x71, 0xc8, 0x7c, 0x2e, 0x5c, 0x35, 0x54, 0xb1, 0x17, 0x61, 0xb1, 0x0b, 0xb2, 0xb8, 0x17, 0x25, 0x02, 0x8a, 0x56, 0xc4, 0xfc, 0x92, 0xf1, 0x32, 0x0c, 0xa7, 0x39, 0x6c, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1372 = { .name = "ecdsa_brainpoolp320r1_sha384_1372", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1372_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1372_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1372_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 362 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1373 for ECDSA, tcId is 363 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1373_pubkey[] = { 0x7a, 0xcc, 0x91, 0x99, 0x34, 0xb0, 0xfd, 0x90, 0x01, 0x1c, 0xd9, 0x6f, 0x59, 0xdd, 0xba, 0x52, 0xe1, 0x20, 0x94, 0xda, 0xc1, 0x8a, 0x2c, 0xad, 0xcb, 0x03, 0xa0, 0xf3, 0x1a, 0xc7, 0x2d, 0x3f, 0xd5, 0x98, 0x4a, 0x11, 0xe9, 0x22, 0x0f, 0x8c, 0x06, 0x29, 0xbc, 0x5f, 0x3f, 0x0d, 0xab, 0xbd, 0x3f, 0xdd, 0x30, 0xf4, 0x7a, 0x0a, 0x5b, 0xea, 0x30, 0x52, 0x89, 0x2f, 0x8e, 0x50, 0xa4, 0x03, 0x3b, 0xe4, 0x79, 0x5b, 0x32, 0xc6, 0x67, 0x1d, 0x14, 0x1b, 0x47, 0x30, 0x80, 0xe5, 0x79, 0x11, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1373_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1373_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xc7, 0x6c, 0xe5, 0x35, 0x60, 0x16, 0x3f, 0x15, 0x7b, 0x11, 0xe4, 0xd0, 0x5c, 0x61, 0x54, 0x0a, 0x5d, 0xf6, 0xb8, 0x24, 0x1c, 0xbd, 0x3b, 0xa7, 0xd9, 0x11, 0xa7, 0x54, 0x1e, 0xec, 0x55, 0xe9, 0x86, 0xeb, 0xf8, 0x11, 0xae, 0x50, 0xa8, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1373 = { .name = "ecdsa_brainpoolp320r1_sha384_1373", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1373_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1373_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1373_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 363 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1374 for ECDSA, tcId is 364 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1374_pubkey[] = { 0x12, 0xc1, 0x63, 0xfe, 0x25, 0xcb, 0x79, 0xad, 0x59, 0xc7, 0x6b, 0x52, 0x80, 0xdc, 0x67, 0x06, 0xa4, 0x2c, 0x58, 0x59, 0x62, 0x30, 0xbf, 0x7b, 0xa7, 0x20, 0x6e, 0x6c, 0xe2, 0xb4, 0x67, 0xe1, 0xb7, 0xa7, 0x06, 0x3e, 0x59, 0xb0, 0xbe, 0xd6, 0xcc, 0xbe, 0xaf, 0x22, 0xac, 0xcb, 0x1a, 0xc4, 0x1e, 0xd4, 0x3a, 0xc7, 0x75, 0xb9, 0x7a, 0xea, 0x3a, 0x68, 0x8e, 0x2f, 0x09, 0x6c, 0x3a, 0x5e, 0x59, 0xf8, 0x68, 0xbc, 0x91, 0x9d, 0xa5, 0xce, 0x25, 0x2c, 0xf5, 0xd7, 0x12, 0xe7, 0xde, 0x40, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1374_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1374_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x42, 0x18, 0xa4, 0x51, 0x16, 0xea, 0x65, 0xb2, 0x83, 0xcc, 0x7d, 0x90, 0xa5, 0x10, 0xf0, 0x77, 0xb1, 0xb0, 0x9e, 0xdd, 0xbc, 0xfc, 0xa3, 0xe7, 0xd2, 0x89, 0x6b, 0x86, 0x9d, 0xd3, 0xba, 0x55, 0x6c, 0x4f, 0x10, 0x59, 0x0b, 0x0e, 0x08, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1374 = { .name = "ecdsa_brainpoolp320r1_sha384_1374", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1374_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1374_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1374_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 364 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1375 for ECDSA, tcId is 365 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1375_pubkey[] = { 0x69, 0x60, 0xbf, 0xcd, 0xdd, 0x00, 0x21, 0xfc, 0xb8, 0xa3, 0xd7, 0xaa, 0x85, 0xf9, 0x6c, 0xf3, 0x60, 0xa7, 0x11, 0x3e, 0x38, 0x24, 0x50, 0x85, 0x25, 0x02, 0x1f, 0x83, 0xe3, 0x08, 0x59, 0x89, 0xc3, 0x5e, 0x0c, 0x57, 0x72, 0x65, 0x03, 0x30, 0x5c, 0x12, 0x75, 0xb9, 0xd8, 0xb5, 0x19, 0x9d, 0x46, 0x1f, 0xcb, 0x9d, 0x34, 0xf8, 0x85, 0x7b, 0x65, 0xa1, 0x40, 0x46, 0x2f, 0xd5, 0xcd, 0xc7, 0xa3, 0x3e, 0x5c, 0xf7, 0xf4, 0xe2, 0xd0, 0x8a, 0x5a, 0x34, 0xd9, 0xae, 0x00, 0xb2, 0x93, 0x9a, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1375_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1375_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5e, 0x5f, 0x32, 0x42, 0x3b, 0xad, 0x36, 0x44, 0xbe, 0x71, 0x8d, 0x81, 0x95, 0x34, 0x13, 0x62, 0xc9, 0xcb, 0xa5, 0x2b, 0x33, 0x0f, 0x91, 0x3b, 0x15, 0x21, 0xaf, 0x6e, 0x5e, 0x3e, 0xb2, 0x06, 0x94, 0x21, 0xb0, 0x5d, 0xca, 0xc2, 0x99, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1375 = { .name = "ecdsa_brainpoolp320r1_sha384_1375", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1375_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1375_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1375_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 365 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1376 for ECDSA, tcId is 366 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1376_pubkey[] = { 0x66, 0xad, 0x2c, 0x26, 0x01, 0x23, 0x88, 0xc8, 0xb9, 0x04, 0x6a, 0x46, 0x6b, 0x87, 0xbd, 0x71, 0xb6, 0x4a, 0xb8, 0x1b, 0x54, 0xcf, 0xfc, 0x5a, 0x61, 0x1f, 0x4b, 0x75, 0x81, 0xad, 0x83, 0x65, 0xed, 0xd0, 0x8e, 0x6a, 0xfd, 0x4a, 0x52, 0xf6, 0x1a, 0x30, 0x66, 0xc0, 0xb3, 0xb7, 0x03, 0xdd, 0xce, 0x74, 0x62, 0x39, 0xa4, 0xd3, 0xdb, 0xf1, 0x93, 0x89, 0x45, 0xf1, 0x5e, 0xa9, 0x49, 0x7b, 0xbf, 0xc4, 0x5b, 0x38, 0x9e, 0x13, 0x03, 0x50, 0xb9, 0x94, 0x59, 0x22, 0xb8, 0x7c, 0xe3, 0x74, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1376_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1376_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xac, 0x07, 0xaa, 0xad, 0xe5, 0xc5, 0xfb, 0x2f, 0xe5, 0xa1, 0x8b, 0xbe, 0xfd, 0x26, 0x2e, 0x0e, 0x43, 0x9f, 0xd6, 0x8e, 0x0a, 0x31, 0x7d, 0xb0, 0x6f, 0xf4, 0xba, 0x62, 0x3a, 0x2a, 0x03, 0x11, 0x4e, 0xc5, 0xb6, 0xe0, 0x84, 0x17, 0x10, 0x58, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1376 = { .name = "ecdsa_brainpoolp320r1_sha384_1376", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1376_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1376_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1376_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 366 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1377 for ECDSA, tcId is 367 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1377_pubkey[] = { 0x0c, 0xfa, 0x6e, 0x38, 0x38, 0xd8, 0x11, 0x3a, 0x24, 0xd8, 0x7d, 0xb9, 0x74, 0x17, 0xd6, 0x8f, 0x00, 0xc4, 0x26, 0xe9, 0xb8, 0x55, 0x0d, 0x8a, 0x95, 0x1f, 0xed, 0x53, 0x15, 0x72, 0xe7, 0xcc, 0xa6, 0x6f, 0xfe, 0x0a, 0xe1, 0x76, 0xff, 0x0e, 0x31, 0x2f, 0xa0, 0x2e, 0x5c, 0xc7, 0x7c, 0x21, 0xf4, 0xa6, 0x63, 0x0e, 0x25, 0xbc, 0xb9, 0x87, 0xdc, 0x1e, 0xef, 0x14, 0xae, 0xc8, 0x0c, 0x15, 0xb9, 0xb2, 0x92, 0xe3, 0xac, 0xfb, 0x30, 0xbc, 0x2c, 0x04, 0x38, 0xf0, 0xa9, 0x83, 0x1c, 0x07, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1377_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1377_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x31, 0x1f, 0x6d, 0x0a, 0xbc, 0xe9, 0x6f, 0xe7, 0xf5, 0xbe, 0xd2, 0xca, 0x46, 0x00, 0xa0, 0x21, 0xfd, 0xda, 0x9a, 0x8c, 0x92, 0x2f, 0xb0, 0xe1, 0x0f, 0x18, 0x0f, 0x97, 0xfa, 0x2c, 0xc8, 0x4d, 0xd7, 0x85, 0xc7, 0x1e, 0x6c, 0x41, 0xdb, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1377 = { .name = "ecdsa_brainpoolp320r1_sha384_1377", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1377_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1377_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1377_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 367 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1378 for ECDSA, tcId is 368 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1378_pubkey[] = { 0x3d, 0xab, 0xbc, 0x36, 0xa4, 0x55, 0xba, 0x07, 0x43, 0x2d, 0xa1, 0xaa, 0x72, 0x39, 0xae, 0xfd, 0xef, 0xb7, 0x2a, 0xc0, 0x93, 0x13, 0xc3, 0xa7, 0xf3, 0x43, 0x98, 0x50, 0xf6, 0x02, 0x54, 0x3e, 0xb4, 0xaf, 0xfc, 0x5d, 0x82, 0x25, 0xb5, 0xee, 0xce, 0x48, 0xe2, 0xf6, 0x7e, 0x82, 0xd4, 0x48, 0xb3, 0xd8, 0xb9, 0xb0, 0xfc, 0x20, 0x08, 0x32, 0xa3, 0xd1, 0xac, 0x88, 0x05, 0x88, 0x72, 0x76, 0x2f, 0xcb, 0xf0, 0x27, 0xe9, 0xf5, 0x70, 0x5d, 0x8f, 0x58, 0x12, 0xe5, 0x07, 0xda, 0xe1, 0x25, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1378_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1378_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x62, 0x3e, 0xda, 0x15, 0x79, 0xd2, 0xdf, 0xcf, 0xeb, 0x7d, 0xa5, 0x94, 0x8c, 0x01, 0x40, 0x43, 0xfb, 0xb5, 0x35, 0x19, 0x24, 0x5f, 0x61, 0xc2, 0x1e, 0x30, 0x1f, 0x2f, 0xf4, 0x59, 0x90, 0x9b, 0xaf, 0x0b, 0x8e, 0x3c, 0xd8, 0x83, 0xb7, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1378 = { .name = "ecdsa_brainpoolp320r1_sha384_1378", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1378_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1378_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1378_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 368 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1379 for ECDSA, tcId is 369 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1379_pubkey[] = { 0x8a, 0x96, 0x58, 0xdc, 0x5f, 0x91, 0xaa, 0x57, 0x77, 0x06, 0xf1, 0xd9, 0x1d, 0x22, 0x52, 0xcb, 0x0d, 0x09, 0xf2, 0x05, 0x3e, 0x56, 0x11, 0x29, 0x10, 0x5c, 0x7f, 0x37, 0xdd, 0xb2, 0xf9, 0x72, 0xb3, 0x22, 0x4f, 0x12, 0xcf, 0x9e, 0x43, 0xfe, 0x08, 0x78, 0x2e, 0xc6, 0x10, 0x5f, 0x4c, 0x06, 0x58, 0x7e, 0xb1, 0xec, 0xec, 0xb2, 0xf4, 0xf4, 0xa0, 0x4e, 0x23, 0x63, 0x04, 0xdc, 0x75, 0xeb, 0x2e, 0xff, 0xf0, 0xbe, 0x66, 0xb9, 0x77, 0xfa, 0x80, 0x4a, 0xf7, 0x3b, 0xfc, 0xba, 0xc7, 0x8e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1379_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1379_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x93, 0x5e, 0x47, 0x20, 0x36, 0xbc, 0x4f, 0xb7, 0xe1, 0x3c, 0x78, 0x5e, 0xd2, 0x01, 0xe0, 0x65, 0xf9, 0x8f, 0xcf, 0xa5, 0xb6, 0x8f, 0x12, 0xa3, 0x2d, 0x48, 0x2e, 0xc7, 0xee, 0x86, 0x58, 0xe9, 0x86, 0x91, 0x55, 0x5b, 0x44, 0xc5, 0x93, 0x13, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1379 = { .name = "ecdsa_brainpoolp320r1_sha384_1379", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1379_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1379_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1379_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 369 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1380 for ECDSA, tcId is 370 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1380_pubkey[] = { 0x06, 0xb4, 0x3b, 0xb9, 0x58, 0x7e, 0xe1, 0x58, 0xad, 0x57, 0x52, 0xd1, 0xad, 0x11, 0xf6, 0xf0, 0xf5, 0xe3, 0x16, 0xad, 0x21, 0x93, 0x7c, 0xdd, 0x92, 0x53, 0xf3, 0x84, 0x48, 0x57, 0xf0, 0xa2, 0x5e, 0x7b, 0x67, 0x7b, 0xbf, 0x99, 0x94, 0x44, 0x97, 0x05, 0x36, 0x23, 0x34, 0xbd, 0xce, 0xb6, 0x8a, 0xe6, 0xa5, 0x84, 0x64, 0x0c, 0x95, 0xcb, 0x10, 0x78, 0x9b, 0x19, 0x95, 0x3f, 0x5e, 0x11, 0x99, 0x73, 0xee, 0xd7, 0x35, 0x17, 0x7a, 0xab, 0xfc, 0xb2, 0x63, 0xfc, 0x8e, 0xf5, 0xef, 0x97, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1380_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1380_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5b, 0x5d, 0x0d, 0x76, 0x69, 0x20, 0x6f, 0x5f, 0x3b, 0x90, 0x9d, 0x21, 0x14, 0x58, 0x92, 0xb0, 0x1b, 0x38, 0xe4, 0xea, 0x8a, 0x3d, 0xb6, 0x05, 0x9b, 0x6e, 0x91, 0xf2, 0x15, 0xbe, 0x5a, 0x83, 0xc5, 0x0d, 0xc7, 0xef, 0x8d, 0xcc, 0x5c, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1380 = { .name = "ecdsa_brainpoolp320r1_sha384_1380", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1380_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1380_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1380_sig, .siglen = 80, .result = 1, .comment = "edge case for u2, tcId is 370 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1381 for ECDSA, tcId is 371 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1381_pubkey[] = { 0x56, 0x88, 0x03, 0xda, 0x07, 0x1e, 0x6b, 0x9f, 0x43, 0x80, 0xe3, 0x99, 0x54, 0xf2, 0xb0, 0xfc, 0x0f, 0x5b, 0xb5, 0x8a, 0x0f, 0x68, 0xb5, 0xd1, 0xa4, 0x2c, 0x7e, 0x90, 0x52, 0xec, 0xe2, 0xa0, 0xfc, 0x7a, 0xca, 0xdc, 0x0f, 0x42, 0x39, 0x99, 0xc0, 0x83, 0x67, 0x94, 0x54, 0x95, 0xd9, 0x33, 0xf2, 0x06, 0x92, 0x7a, 0x2b, 0x7f, 0x5b, 0x74, 0xb2, 0x2f, 0x97, 0x3a, 0x89, 0x83, 0x55, 0xaa, 0x2f, 0x7e, 0x29, 0x5e, 0x06, 0xef, 0x3a, 0x4f, 0x56, 0x15, 0x46, 0xdb, 0x97, 0xf7, 0x9a, 0xfa, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1381_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1381_sig[] = { 0x95, 0x63, 0xbd, 0x68, 0x54, 0x5c, 0xcd, 0x18, 0x5a, 0xe7, 0x24, 0xd8, 0xef, 0xcd, 0x4c, 0xc2, 0x32, 0x34, 0x93, 0x4e, 0xef, 0x10, 0xf2, 0x80, 0x79, 0x2b, 0x2f, 0x93, 0x0c, 0x97, 0xa6, 0xc1, 0xe0, 0x08, 0x29, 0xa8, 0xb9, 0x75, 0xb9, 0xee, 0xc5, 0xe7, 0x9c, 0x49, 0xab, 0xb1, 0x35, 0x12, 0x9f, 0x06, 0x36, 0xe1, 0x8e, 0x2e, 0x73, 0xbc, 0xed, 0x30, 0x85, 0x5d, 0xee, 0xba, 0x14, 0x77, 0xd9, 0x52, 0x1b, 0x33, 0xa3, 0x28, 0x65, 0x15, 0x51, 0x77, 0xd9, 0x46, 0xe1, 0xba, 0xbc, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1381 = { .name = "ecdsa_brainpoolp320r1_sha384_1381", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1381_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1381_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1381_sig, .siglen = 80, .result = 1, .comment = "point duplication during verification, tcId is 371 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1382 for ECDSA, tcId is 372 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1382_pubkey[] = { 0x56, 0x88, 0x03, 0xda, 0x07, 0x1e, 0x6b, 0x9f, 0x43, 0x80, 0xe3, 0x99, 0x54, 0xf2, 0xb0, 0xfc, 0x0f, 0x5b, 0xb5, 0x8a, 0x0f, 0x68, 0xb5, 0xd1, 0xa4, 0x2c, 0x7e, 0x90, 0x52, 0xec, 0xe2, 0xa0, 0xfc, 0x7a, 0xca, 0xdc, 0x0f, 0x42, 0x39, 0x99, 0x12, 0xda, 0xdf, 0x8b, 0xe2, 0x26, 0x76, 0x83, 0xef, 0x35, 0xe5, 0xe4, 0xa6, 0x82, 0x84, 0xf1, 0x47, 0x60, 0x38, 0x6c, 0x6d, 0x70, 0xb8, 0x45, 0x20, 0x14, 0x90, 0x8e, 0x71, 0xa4, 0xb1, 0xd9, 0xa6, 0xbe, 0xcb, 0xd6, 0x59, 0xbb, 0x93, 0x2d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1382_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1382_sig[] = { 0x95, 0x63, 0xbd, 0x68, 0x54, 0x5c, 0xcd, 0x18, 0x5a, 0xe7, 0x24, 0xd8, 0xef, 0xcd, 0x4c, 0xc2, 0x32, 0x34, 0x93, 0x4e, 0xef, 0x10, 0xf2, 0x80, 0x79, 0x2b, 0x2f, 0x93, 0x0c, 0x97, 0xa6, 0xc1, 0xe0, 0x08, 0x29, 0xa8, 0xb9, 0x75, 0xb9, 0xee, 0xc5, 0xe7, 0x9c, 0x49, 0xab, 0xb1, 0x35, 0x12, 0x9f, 0x06, 0x36, 0xe1, 0x8e, 0x2e, 0x73, 0xbc, 0xed, 0x30, 0x85, 0x5d, 0xee, 0xba, 0x14, 0x77, 0xd9, 0x52, 0x1b, 0x33, 0xa3, 0x28, 0x65, 0x15, 0x51, 0x77, 0xd9, 0x46, 0xe1, 0xba, 0xbc, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1382 = { .name = "ecdsa_brainpoolp320r1_sha384_1382", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1382_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1382_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1382_sig, .siglen = 80, .result = -1, .comment = "duplication bug, tcId is 372 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1383 for ECDSA, tcId is 373 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1383_pubkey[] = { 0x5d, 0x1a, 0x10, 0x01, 0x18, 0xbd, 0x36, 0x10, 0xf1, 0x0e, 0x13, 0xb5, 0xad, 0xcc, 0x7a, 0x90, 0xa3, 0x7f, 0x4f, 0x98, 0x8c, 0xfa, 0x4e, 0x22, 0xcc, 0xa7, 0x7e, 0x88, 0x44, 0x4b, 0x00, 0x21, 0x6d, 0xcf, 0xe5, 0xf6, 0x84, 0x18, 0xd3, 0x42, 0x5d, 0x5b, 0x88, 0xc9, 0xb8, 0xc9, 0x2b, 0x3d, 0xec, 0x7f, 0x7b, 0xcc, 0x68, 0x8a, 0x6d, 0x18, 0xe6, 0xcd, 0xeb, 0x91, 0x76, 0x15, 0x0d, 0x4b, 0x10, 0x62, 0xa8, 0x32, 0xc8, 0xa3, 0xbc, 0x37, 0x7f, 0x8d, 0x7e, 0x98, 0xb1, 0xdb, 0x0b, 0x9d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1383_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1383_sig[] = { 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, 0x2a, 0x46, 0x0e, 0x39, 0xa4, 0x8c, 0x0f, 0xf1, 0x93, 0x72, 0x7e, 0x79, 0x5d, 0x33, 0x93, 0x47, 0x98, 0x4f, 0xf6, 0x54, 0x57, 0xb6, 0x36, 0xed, 0x6f, 0x74, 0xd6, 0x27, 0xfc, 0x81, 0x44, 0xfb, 0x81, 0x50, 0x44, 0x45, 0x74, 0x27, 0x83, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1383 = { .name = "ecdsa_brainpoolp320r1_sha384_1383", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1383_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1383_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1383_sig, .siglen = 80, .result = -1, .comment = "comparison with point at infinity , tcId is 373 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1384 for ECDSA, tcId is 374 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1384_pubkey[] = { 0xcc, 0xa9, 0xac, 0x38, 0xde, 0x5b, 0x36, 0xcf, 0x79, 0xd8, 0xe4, 0x15, 0xcb, 0x72, 0x9e, 0x68, 0x5e, 0x0b, 0xbd, 0xaf, 0xe1, 0x61, 0xc5, 0xe7, 0xec, 0xfa, 0x41, 0x77, 0xe8, 0x26, 0xe8, 0x15, 0xd6, 0x65, 0x26, 0xaa, 0x5d, 0xaf, 0x32, 0x27, 0x9b, 0x77, 0x99, 0xbc, 0xef, 0xc6, 0xb5, 0xd8, 0xd0, 0x9f, 0xf1, 0xa0, 0x73, 0x9f, 0xd4, 0x23, 0x18, 0x81, 0x26, 0xf8, 0x0a, 0xf7, 0x03, 0x31, 0x4d, 0xa0, 0xd2, 0x6b, 0xa6, 0x71, 0x4a, 0xa1, 0x97, 0xa6, 0x58, 0x2c, 0x36, 0xb0, 0xf0, 0x5d, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1384_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1384_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1384 = { .name = "ecdsa_brainpoolp320r1_sha384_1384", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1384_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1384_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1384_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 374 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1385 for ECDSA, tcId is 375 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1385_pubkey[] = { 0xcc, 0xea, 0xa1, 0x20, 0x3b, 0xdc, 0xbe, 0x15, 0xe2, 0x04, 0x34, 0xd6, 0x24, 0xf0, 0xed, 0x9a, 0xca, 0x81, 0xd4, 0xc8, 0x2f, 0x84, 0x0b, 0xba, 0x3a, 0x86, 0xc6, 0x75, 0x62, 0x62, 0xaa, 0x37, 0xef, 0xed, 0x62, 0xf5, 0xf1, 0xd0, 0x97, 0xf7, 0x45, 0x70, 0x57, 0xb9, 0x8d, 0x2b, 0x9e, 0xa6, 0xbd, 0x28, 0x58, 0x1d, 0x40, 0xac, 0x20, 0xfc, 0xc9, 0xd5, 0x36, 0xa1, 0x17, 0x76, 0x92, 0x03, 0x44, 0x7b, 0xf4, 0x1e, 0x10, 0xce, 0x4d, 0xa1, 0xad, 0x79, 0x4c, 0xa2, 0x0f, 0x8e, 0xe1, 0x46, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1385_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1385_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1385 = { .name = "ecdsa_brainpoolp320r1_sha384_1385", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1385_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1385_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1385_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 375 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1386 for ECDSA, tcId is 376 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1386_pubkey[] = { 0xcc, 0x9e, 0xd2, 0x5f, 0x13, 0xe9, 0x4a, 0x6e, 0xbd, 0x53, 0x1f, 0x3b, 0x14, 0x2f, 0xab, 0xc4, 0xed, 0x52, 0x2d, 0xc6, 0x12, 0x78, 0x61, 0x52, 0x88, 0x30, 0xc6, 0x78, 0x7d, 0x6e, 0xcf, 0xd4, 0xb7, 0x04, 0xe1, 0x77, 0x4e, 0x91, 0x18, 0xed, 0x68, 0xe4, 0xe1, 0x72, 0xf9, 0x3f, 0x1d, 0x5b, 0x8d, 0x78, 0x60, 0xfa, 0xe2, 0xc1, 0x15, 0xf4, 0xaa, 0x0d, 0xaa, 0xf6, 0xdf, 0x5c, 0xa3, 0x80, 0x9d, 0x79, 0xac, 0xfd, 0xb9, 0xed, 0x2b, 0xe1, 0x99, 0x95, 0x65, 0x8d, 0x2f, 0x44, 0xd2, 0x35, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1386_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1386_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x2a, 0x46, 0x0e, 0x39, 0xa4, 0x8c, 0x0f, 0xf1, 0x93, 0x72, 0x7e, 0x79, 0x5d, 0x33, 0x93, 0x47, 0x98, 0x4f, 0xf6, 0x54, 0x57, 0xb6, 0x36, 0xed, 0x6f, 0x74, 0xd6, 0x27, 0xfc, 0x81, 0x44, 0xfb, 0x81, 0x50, 0x44, 0x45, 0x74, 0x27, 0x83, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1386 = { .name = "ecdsa_brainpoolp320r1_sha384_1386", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1386_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1386_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1386_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 376 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1387 for ECDSA, tcId is 377 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1387_pubkey[] = { 0x6a, 0x3c, 0xae, 0x0e, 0xdc, 0x84, 0x55, 0xae, 0x16, 0xb5, 0xee, 0xb6, 0x56, 0x96, 0x03, 0xbd, 0xae, 0xb5, 0x79, 0x36, 0x99, 0xe8, 0x5d, 0x37, 0x28, 0x57, 0xf1, 0x31, 0x9c, 0x70, 0xdd, 0x52, 0x5b, 0x1e, 0xa3, 0x0a, 0x0f, 0x5c, 0x7b, 0x44, 0x07, 0x55, 0x37, 0xcd, 0x82, 0x2d, 0x9e, 0xe2, 0xd0, 0xe7, 0xa4, 0x9c, 0x4c, 0x31, 0x41, 0x44, 0x5d, 0x01, 0xb7, 0x89, 0xbb, 0xca, 0xd0, 0x2e, 0xc4, 0x24, 0x9c, 0x2e, 0x23, 0x55, 0xd6, 0x1d, 0xb5, 0x58, 0x1d, 0xbd, 0xb3, 0x42, 0xc9, 0x93, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1387_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1387_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0xa9, 0x18, 0x38, 0xe6, 0x92, 0x30, 0x3f, 0xc6, 0x4d, 0xc9, 0xf9, 0xe5, 0x74, 0xce, 0x4d, 0x1e, 0x61, 0x3f, 0xd9, 0x51, 0x5e, 0xd8, 0xdb, 0xb5, 0xbd, 0xd3, 0x58, 0x9f, 0xf2, 0x05, 0x13, 0xee, 0x05, 0x41, 0x11, 0x15, 0xd0, 0x9e, 0x0f, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1387 = { .name = "ecdsa_brainpoolp320r1_sha384_1387", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1387_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1387_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1387_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 377 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1388 for ECDSA, tcId is 378 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1388_pubkey[] = { 0x4e, 0xfb, 0x51, 0x61, 0xca, 0x1a, 0x1e, 0xeb, 0x59, 0xa5, 0xfc, 0x39, 0xcd, 0x52, 0x1d, 0x40, 0xbd, 0x3e, 0x03, 0x45, 0x12, 0xfa, 0x2a, 0x1e, 0xaf, 0x3b, 0x7e, 0x92, 0xbb, 0x9e, 0x95, 0xc0, 0x6a, 0x4c, 0x72, 0x6c, 0xec, 0xcd, 0xf9, 0xbc, 0x6b, 0xfa, 0x80, 0x1b, 0x06, 0x71, 0x37, 0xf1, 0xb6, 0xb4, 0x50, 0x60, 0x41, 0x13, 0x0b, 0x4d, 0x40, 0x2d, 0x90, 0x08, 0x7a, 0xd0, 0x05, 0xe3, 0xf6, 0x52, 0xe1, 0xd9, 0x1c, 0x9d, 0x34, 0x4c, 0xd1, 0xee, 0xff, 0xff, 0x61, 0xd3, 0xa3, 0x06, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1388_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1388_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0xb5, 0x2c, 0x3c, 0xf7, 0x0a, 0x58, 0x44, 0x54, 0x77, 0xea, 0xb0, 0x51, 0x46, 0x4a, 0xc0, 0x57, 0x68, 0x32, 0x1f, 0xb2, 0x9c, 0x7a, 0xa2, 0x42, 0xb9, 0x19, 0x4c, 0xab, 0x5e, 0xbc, 0x4c, 0x35, 0xe1, 0x0e, 0xdb, 0x72, 0xcd, 0x3b, 0xa2, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1388 = { .name = "ecdsa_brainpoolp320r1_sha384_1388", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1388_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1388_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1388_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 378 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1389 for ECDSA, tcId is 379 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1389_pubkey[] = { 0x5f, 0x65, 0x86, 0x87, 0xe6, 0xa5, 0x42, 0xa9, 0x1d, 0x89, 0x3b, 0x48, 0x77, 0x6a, 0x86, 0xd5, 0x28, 0xfd, 0x39, 0x97, 0x81, 0xbb, 0xb9, 0x30, 0x5b, 0xe0, 0x79, 0x7e, 0x3a, 0x6f, 0x36, 0x11, 0x8a, 0xe1, 0x9e, 0x68, 0xdc, 0x16, 0x73, 0xf6, 0x67, 0x6e, 0x53, 0x6c, 0x78, 0x97, 0xa0, 0x00, 0x2f, 0x96, 0x64, 0x92, 0x96, 0x31, 0xf4, 0x18, 0xc4, 0x53, 0x7d, 0x23, 0x74, 0x92, 0x20, 0xc5, 0x0a, 0x32, 0x12, 0x1c, 0x43, 0x4d, 0xca, 0xd2, 0xa6, 0xcd, 0xc2, 0x03, 0xcd, 0x03, 0x5a, 0x32, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1389_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1389_sig[] = { 0x2f, 0xb4, 0x12, 0xf0, 0x3e, 0x6d, 0xeb, 0xdf, 0xbf, 0xa3, 0xa3, 0x09, 0x2f, 0x21, 0xc4, 0x61, 0x9e, 0x04, 0x27, 0x9b, 0xe0, 0x93, 0x16, 0x94, 0xab, 0x99, 0xc6, 0x50, 0x3e, 0x5a, 0x89, 0x4d, 0xef, 0x83, 0x77, 0xed, 0x05, 0x9a, 0x6d, 0xe8, 0x53, 0xbf, 0x06, 0xe4, 0x3f, 0xcc, 0x42, 0x36, 0xb2, 0xec, 0x0d, 0x88, 0x47, 0x13, 0x79, 0x05, 0x3f, 0x1f, 0x34, 0x37, 0x20, 0x7c, 0x5a, 0x75, 0xb0, 0x90, 0x36, 0xb1, 0xc4, 0x0f, 0xa8, 0xf3, 0x12, 0x82, 0x77, 0x89, 0x4a, 0x4c, 0x96, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1389 = { .name = "ecdsa_brainpoolp320r1_sha384_1389", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1389_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1389_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1389_sig, .siglen = 80, .result = 1, .comment = "extreme value for k, tcId is 379 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1390 for ECDSA, tcId is 380 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1390_pubkey[] = { 0x90, 0x53, 0x7a, 0x68, 0x27, 0xa2, 0x50, 0x60, 0x27, 0x3d, 0x44, 0xd4, 0x84, 0x6a, 0xea, 0x59, 0x66, 0x82, 0xdf, 0x0a, 0x59, 0xd0, 0xff, 0xe7, 0x9b, 0xe2, 0xa1, 0xeb, 0xe9, 0x18, 0x70, 0x3c, 0xab, 0xfa, 0xc6, 0x4d, 0xa5, 0xe5, 0x91, 0x00, 0x33, 0x09, 0x18, 0x0d, 0x9d, 0xa5, 0xe7, 0x82, 0x37, 0xb9, 0x54, 0x03, 0xc5, 0x2f, 0x3c, 0xee, 0xe5, 0x03, 0x06, 0x7b, 0x67, 0x27, 0x15, 0xe9, 0x7d, 0x8b, 0x63, 0x69, 0x34, 0x26, 0x84, 0xa7, 0x2f, 0x46, 0x76, 0x98, 0x74, 0x1b, 0x1a, 0x1f, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1390_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1390_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x46, 0x74, 0xc2, 0x60, 0x12, 0x3e, 0xc5, 0x3d, 0x4b, 0x14, 0x28, 0x1f, 0x9b, 0x55, 0xf5, 0x77, 0x53, 0x2f, 0xef, 0xe1, 0xe7, 0x85, 0x06, 0x36, 0x64, 0x6d, 0x64, 0xed, 0x4f, 0x82, 0x1d, 0xa3, 0x2c, 0xdb, 0x1c, 0x73, 0xc1, 0x97, 0x31, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1390 = { .name = "ecdsa_brainpoolp320r1_sha384_1390", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1390_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1390_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1390_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 380 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1391 for ECDSA, tcId is 381 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1391_pubkey[] = { 0xa8, 0x1c, 0xcb, 0xf4, 0xfc, 0x44, 0x57, 0x03, 0x3b, 0xd4, 0x9c, 0xea, 0xc8, 0xfa, 0x52, 0xe4, 0x59, 0x40, 0x07, 0x30, 0xb8, 0x77, 0x30, 0x5b, 0xe0, 0x41, 0x81, 0x53, 0xd2, 0x78, 0xd3, 0x0b, 0x59, 0x73, 0x77, 0x7a, 0x7d, 0xd1, 0xc2, 0xc1, 0x75, 0x44, 0xff, 0x1b, 0x76, 0x20, 0x8e, 0x84, 0x10, 0x53, 0xec, 0xae, 0xf7, 0xa5, 0x86, 0x9e, 0x92, 0xda, 0x08, 0xc5, 0xc4, 0xc3, 0xd0, 0xa1, 0x67, 0xd5, 0x68, 0x5e, 0xb7, 0x21, 0xd6, 0x20, 0x33, 0x9c, 0xc9, 0xb0, 0x01, 0x49, 0x83, 0x8e, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1391_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1391_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1391 = { .name = "ecdsa_brainpoolp320r1_sha384_1391", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1391_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1391_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1391_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 381 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1392 for ECDSA, tcId is 382 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1392_pubkey[] = { 0xba, 0x16, 0x00, 0x89, 0x32, 0x7c, 0xf8, 0xba, 0x16, 0x3e, 0xef, 0xa4, 0x76, 0xa4, 0xea, 0xfd, 0x0f, 0x6c, 0xe9, 0xd5, 0x52, 0x92, 0xf6, 0x72, 0x4d, 0x02, 0x0f, 0x0e, 0xfa, 0xc5, 0x4b, 0xf6, 0x84, 0xf9, 0xd5, 0xf5, 0x69, 0x5f, 0x89, 0xc2, 0xb4, 0xde, 0x70, 0xdc, 0x4a, 0xb2, 0x65, 0x76, 0x18, 0x27, 0x32, 0x3d, 0xa3, 0xb2, 0xb0, 0x55, 0xac, 0x11, 0x87, 0xfc, 0x53, 0x41, 0xe4, 0x55, 0x5e, 0xbc, 0x6f, 0x69, 0x93, 0xb4, 0xc3, 0xfd, 0xd8, 0x98, 0x63, 0xfc, 0x55, 0xea, 0x38, 0xb4, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1392_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1392_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x2a, 0x46, 0x0e, 0x39, 0xa4, 0x8c, 0x0f, 0xf1, 0x93, 0x72, 0x7e, 0x79, 0x5d, 0x33, 0x93, 0x47, 0x98, 0x4f, 0xf6, 0x54, 0x57, 0xb6, 0x36, 0xed, 0x6f, 0x74, 0xd6, 0x27, 0xfc, 0x81, 0x44, 0xfb, 0x81, 0x50, 0x44, 0x45, 0x74, 0x27, 0x83, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1392 = { .name = "ecdsa_brainpoolp320r1_sha384_1392", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1392_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1392_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1392_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 382 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1393 for ECDSA, tcId is 383 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1393_pubkey[] = { 0x4a, 0x5c, 0xf4, 0x47, 0x55, 0x0f, 0x0f, 0xf2, 0xef, 0xa1, 0x93, 0xc3, 0xe1, 0x85, 0xdb, 0x60, 0x4f, 0xcf, 0xd7, 0xde, 0x5c, 0x47, 0xa5, 0x9a, 0x39, 0x2d, 0xa0, 0xc7, 0x57, 0x2f, 0x06, 0x10, 0x38, 0xc6, 0xaf, 0x5a, 0xfc, 0xfa, 0x9b, 0xd5, 0x30, 0xb7, 0x68, 0x2b, 0x82, 0x01, 0x0c, 0x39, 0x33, 0x4b, 0xa2, 0xed, 0xec, 0xf0, 0xa2, 0x3b, 0xca, 0x09, 0xe8, 0x10, 0xd7, 0x45, 0xbd, 0xf7, 0x3e, 0x44, 0x5e, 0x80, 0xac, 0xe0, 0xe5, 0x39, 0x9f, 0xa2, 0x61, 0x02, 0xcb, 0x3f, 0xae, 0xe6, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1393_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1393_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xa9, 0x18, 0x38, 0xe6, 0x92, 0x30, 0x3f, 0xc6, 0x4d, 0xc9, 0xf9, 0xe5, 0x74, 0xce, 0x4d, 0x1e, 0x61, 0x3f, 0xd9, 0x51, 0x5e, 0xd8, 0xdb, 0xb5, 0xbd, 0xd3, 0x58, 0x9f, 0xf2, 0x05, 0x13, 0xee, 0x05, 0x41, 0x11, 0x15, 0xd0, 0x9e, 0x0f, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1393 = { .name = "ecdsa_brainpoolp320r1_sha384_1393", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1393_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1393_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1393_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 383 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1394 for ECDSA, tcId is 384 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1394_pubkey[] = { 0x5d, 0x3f, 0xef, 0x1b, 0x96, 0xdb, 0xc8, 0xca, 0x93, 0x30, 0x50, 0x8a, 0xd4, 0xce, 0xd4, 0x91, 0xe6, 0x27, 0xeb, 0x67, 0xcb, 0xa8, 0xc6, 0xb1, 0x53, 0x79, 0x37, 0x49, 0x8e, 0xe3, 0x02, 0x1b, 0x45, 0xca, 0x67, 0x59, 0x11, 0x7d, 0x89, 0xc4, 0xad, 0x2b, 0x69, 0x9e, 0x3e, 0xf9, 0x51, 0x6f, 0xff, 0x2e, 0xd2, 0xe1, 0x34, 0x93, 0x1c, 0x96, 0xd2, 0x8d, 0x3e, 0x14, 0xdd, 0x51, 0xc5, 0xb8, 0x75, 0x89, 0xa8, 0xfa, 0x88, 0xaf, 0x25, 0x29, 0xb8, 0xca, 0xa0, 0xf7, 0x85, 0xce, 0x20, 0x33, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1394_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1394_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xb5, 0x2c, 0x3c, 0xf7, 0x0a, 0x58, 0x44, 0x54, 0x77, 0xea, 0xb0, 0x51, 0x46, 0x4a, 0xc0, 0x57, 0x68, 0x32, 0x1f, 0xb2, 0x9c, 0x7a, 0xa2, 0x42, 0xb9, 0x19, 0x4c, 0xab, 0x5e, 0xbc, 0x4c, 0x35, 0xe1, 0x0e, 0xdb, 0x72, 0xcd, 0x3b, 0xa2, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1394 = { .name = "ecdsa_brainpoolp320r1_sha384_1394", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1394_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1394_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1394_sig, .siglen = 80, .result = 1, .comment = "extreme value for k and s^-1, tcId is 384 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1395 for ECDSA, tcId is 385 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1395_pubkey[] = { 0xa8, 0x33, 0x67, 0x02, 0xc1, 0x58, 0xdc, 0xae, 0x49, 0x5f, 0x1c, 0x9c, 0xd7, 0x20, 0xc3, 0x9f, 0x15, 0xc1, 0x23, 0xa6, 0x77, 0x50, 0xdc, 0xd7, 0x45, 0x20, 0xc3, 0x4c, 0xf6, 0x79, 0x07, 0xe4, 0x92, 0x20, 0xbc, 0xd0, 0x20, 0xcc, 0x3a, 0x60, 0x15, 0x1a, 0x43, 0x2e, 0xe3, 0xe2, 0x3a, 0x74, 0xc8, 0xb8, 0xa9, 0x8d, 0x8e, 0x7c, 0x67, 0x22, 0x16, 0xdf, 0x48, 0xd8, 0xa6, 0x0d, 0x3f, 0x59, 0x2f, 0x66, 0x73, 0x83, 0x0a, 0xc9, 0xec, 0xfb, 0xcd, 0x00, 0x55, 0x0d, 0xb7, 0xad, 0x5c, 0x62, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1395_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1395_sig[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x53, 0xbf, 0x06, 0xe4, 0x3f, 0xcc, 0x42, 0x36, 0xb2, 0xec, 0x0d, 0x88, 0x47, 0x13, 0x79, 0x05, 0x3f, 0x1f, 0x34, 0x37, 0x20, 0x7c, 0x5a, 0x75, 0xb0, 0x90, 0x36, 0xb1, 0xc4, 0x0f, 0xa8, 0xf3, 0x12, 0x82, 0x77, 0x89, 0x4a, 0x4c, 0x96, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1395 = { .name = "ecdsa_brainpoolp320r1_sha384_1395", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1395_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1395_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1395_sig, .siglen = 80, .result = 1, .comment = "extreme value for k, tcId is 385 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1396 for ECDSA, tcId is 386 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1396_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x14, 0xfd, 0xd0, 0x55, 0x45, 0xec, 0x1c, 0xc8, 0xab, 0x40, 0x93, 0x24, 0x7f, 0x77, 0x27, 0x5e, 0x07, 0x43, 0xff, 0xed, 0x11, 0x71, 0x82, 0xea, 0xa9, 0xc7, 0x78, 0x77, 0xaa, 0xac, 0x6a, 0xc7, 0xd3, 0x52, 0x45, 0xd1, 0x69, 0x2e, 0x8e, 0xe1, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1396_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1396_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1396 = { .name = "ecdsa_brainpoolp320r1_sha384_1396", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1396_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1396_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1396_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 386 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1397 for ECDSA, tcId is 387 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1397_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0x14, 0xfd, 0xd0, 0x55, 0x45, 0xec, 0x1c, 0xc8, 0xab, 0x40, 0x93, 0x24, 0x7f, 0x77, 0x27, 0x5e, 0x07, 0x43, 0xff, 0xed, 0x11, 0x71, 0x82, 0xea, 0xa9, 0xc7, 0x78, 0x77, 0xaa, 0xac, 0x6a, 0xc7, 0xd3, 0x52, 0x45, 0xd1, 0x69, 0x2e, 0x8e, 0xe1, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1397_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1397_sig[] = { 0xad, 0x0b, 0x66, 0x4f, 0x95, 0x59, 0xe2, 0x9e, 0x46, 0xfd, 0x4f, 0xd3, 0x90, 0xe7, 0x5a, 0xbe, 0xbf, 0x14, 0x99, 0x7d, 0x17, 0xa1, 0xa3, 0x30, 0x4c, 0x80, 0xe4, 0x51, 0xfc, 0x8f, 0x79, 0xbb, 0x7c, 0xff, 0x16, 0x8e, 0x17, 0xde, 0x6f, 0x22, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1397 = { .name = "ecdsa_brainpoolp320r1_sha384_1397", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1397_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1397_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1397_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 387 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1398 for ECDSA, tcId is 388 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1398_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xbe, 0x60, 0x76, 0xca, 0xf0, 0xd0, 0x32, 0xef, 0x35, 0xfb, 0xe5, 0x3a, 0x52, 0x8a, 0xb9, 0x07, 0xf2, 0x4b, 0xcf, 0xb9, 0xe5, 0x82, 0x8b, 0x04, 0xa5, 0xcb, 0x41, 0x74, 0xcd, 0xe7, 0x81, 0x61, 0x29, 0x81, 0xcc, 0xe0, 0x88, 0x84, 0x9f, 0x46, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1398_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1398_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1398 = { .name = "ecdsa_brainpoolp320r1_sha384_1398", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1398_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1398_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1398_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 388 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1399 for ECDSA, tcId is 389 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1399_pubkey[] = { 0x43, 0xbd, 0x7e, 0x9a, 0xfb, 0x53, 0xd8, 0xb8, 0x52, 0x89, 0xbc, 0xc4, 0x8e, 0xe5, 0xbf, 0xe6, 0xf2, 0x01, 0x37, 0xd1, 0x0a, 0x08, 0x7e, 0xb6, 0xe7, 0x87, 0x1e, 0x2a, 0x10, 0xa5, 0x99, 0xc7, 0x10, 0xaf, 0x8d, 0x0d, 0x39, 0xe2, 0x06, 0x11, 0xbe, 0x60, 0x76, 0xca, 0xf0, 0xd0, 0x32, 0xef, 0x35, 0xfb, 0xe5, 0x3a, 0x52, 0x8a, 0xb9, 0x07, 0xf2, 0x4b, 0xcf, 0xb9, 0xe5, 0x82, 0x8b, 0x04, 0xa5, 0xcb, 0x41, 0x74, 0xcd, 0xe7, 0x81, 0x61, 0x29, 0x81, 0xcc, 0xe0, 0x88, 0x84, 0x9f, 0x46, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1399_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1399_sig[] = { 0xad, 0x0b, 0x66, 0x4f, 0x95, 0x59, 0xe2, 0x9e, 0x46, 0xfd, 0x4f, 0xd3, 0x90, 0xe7, 0x5a, 0xbe, 0xbf, 0x14, 0x99, 0x7d, 0x17, 0xa1, 0xa3, 0x30, 0x4c, 0x80, 0xe4, 0x51, 0xfc, 0x8f, 0x79, 0xbb, 0x7c, 0xff, 0x16, 0x8e, 0x17, 0xde, 0x6f, 0x22, 0x1e, 0x32, 0x0a, 0x29, 0x2c, 0x64, 0x0b, 0x63, 0x69, 0x51, 0xc8, 0x0d, 0x8b, 0xb7, 0x20, 0x0e, 0x91, 0x5d, 0xaf, 0xf3, 0x1a, 0x14, 0x70, 0x60, 0x74, 0x2e, 0xe2, 0x1c, 0x8f, 0xca, 0x0c, 0xb3, 0xa5, 0x82, 0x79, 0xe8, 0x77, 0x89, 0xf0, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1399 = { .name = "ecdsa_brainpoolp320r1_sha384_1399", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1399_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1399_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1399_sig, .siglen = 80, .result = -1, .comment = "testing point duplication, tcId is 389 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1400 for ECDSA, tcId is 390 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1400_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1400_sig[] = { 0x9c, 0xf7, 0xf0, 0xd6, 0x0c, 0xc1, 0xfb, 0x2d, 0x4b, 0x3e, 0x78, 0xd5, 0xf8, 0x3b, 0x37, 0x4e, 0x17, 0xa4, 0xae, 0xbc, 0xcc, 0x6e, 0x72, 0x3f, 0x1a, 0xd3, 0x5b, 0xab, 0xb2, 0xac, 0xfb, 0x2b, 0x75, 0x53, 0x03, 0x89, 0x18, 0x93, 0x95, 0xf8, 0x00, 0x11, 0x10, 0xc5, 0xb8, 0xb8, 0xe5, 0xfa, 0x8d, 0xc7, 0x95, 0x2a, 0x7b, 0xf6, 0x20, 0x0b, 0xdd, 0xae, 0x6c, 0x1d, 0x66, 0x63, 0x9a, 0x07, 0xa4, 0xb6, 0x04, 0x6e, 0x00, 0xbf, 0xa7, 0xa2, 0xbd, 0x9d, 0x57, 0x77, 0xb8, 0x0c, 0x3a, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1400 = { .name = "ecdsa_brainpoolp320r1_sha384_1400", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1400_pubkey, .pubkeylen = 80, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp320r1_sha384_1400_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 390 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1401 for ECDSA, tcId is 391 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1401_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1401_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1401_sig[] = { 0x26, 0xfd, 0x69, 0x5e, 0xe1, 0xcc, 0x50, 0xc2, 0x66, 0x1c, 0x24, 0x34, 0xf8, 0x69, 0x95, 0x77, 0xaf, 0x18, 0x13, 0x04, 0xbc, 0xeb, 0x76, 0x90, 0xc5, 0x38, 0xb0, 0x34, 0x63, 0xdf, 0x24, 0x33, 0x43, 0x95, 0xe7, 0x91, 0xf6, 0x75, 0x0f, 0xf6, 0xb3, 0x22, 0x61, 0x8c, 0xd5, 0x0c, 0x6a, 0x7c, 0xff, 0xcb, 0x41, 0x9e, 0xc0, 0x5b, 0x67, 0xec, 0x6a, 0x11, 0x70, 0x88, 0xc7, 0x8d, 0x57, 0xce, 0xcd, 0xd2, 0x24, 0x90, 0x2d, 0x39, 0x18, 0x92, 0xca, 0x03, 0xe4, 0xbc, 0x1b, 0xd0, 0x46, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1401 = { .name = "ecdsa_brainpoolp320r1_sha384_1401", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1401_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1401_msg, .msglen = 3, .sig = ecdsa_brainpoolp320r1_sha384_1401_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 391 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1402 for ECDSA, tcId is 392 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1402_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1402_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1402_sig[] = { 0x7a, 0x31, 0xb7, 0x37, 0x5f, 0x92, 0x43, 0x69, 0xec, 0x12, 0xbc, 0x33, 0xb8, 0x34, 0x72, 0x6c, 0x95, 0x44, 0x4a, 0x4c, 0x26, 0x35, 0x57, 0x34, 0x4a, 0xfa, 0x73, 0x2c, 0xf4, 0x8a, 0x15, 0x5e, 0x71, 0xa6, 0xee, 0x7d, 0xe4, 0x2e, 0x91, 0xce, 0x24, 0xd3, 0xd7, 0x28, 0x61, 0xf4, 0xd2, 0xb5, 0x51, 0xc1, 0x0f, 0x02, 0x94, 0xd1, 0x6a, 0x3b, 0xf1, 0xd4, 0xee, 0x3e, 0x48, 0x44, 0x39, 0xb8, 0x04, 0xd0, 0x97, 0xde, 0xa2, 0xd7, 0xca, 0xce, 0x76, 0xad, 0xe1, 0x4a, 0xf1, 0x66, 0x33, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1402 = { .name = "ecdsa_brainpoolp320r1_sha384_1402", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1402_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1402_msg, .msglen = 6, .sig = ecdsa_brainpoolp320r1_sha384_1402_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 392 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1403 for ECDSA, tcId is 393 in file ecdsa_brainpoolP320r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp320r1_sha384_1403_pubkey[] = { 0x44, 0xab, 0x23, 0x20, 0xc2, 0x29, 0x7b, 0x66, 0x11, 0x44, 0x28, 0xdf, 0x33, 0xfe, 0x64, 0x19, 0x56, 0xf8, 0x20, 0x33, 0x89, 0x33, 0x98, 0xaf, 0x3b, 0x49, 0xb0, 0x02, 0x31, 0x79, 0x20, 0x1c, 0x27, 0xd2, 0x6d, 0xd6, 0x51, 0x21, 0xc0, 0x6e, 0x0c, 0x59, 0x52, 0x4c, 0x93, 0x8f, 0x19, 0xda, 0xff, 0xc2, 0xa9, 0xa4, 0x67, 0x9d, 0xba, 0x7c, 0xf1, 0x99, 0x1c, 0xed, 0x47, 0x00, 0x59, 0x2b, 0xb7, 0x5e, 0x98, 0xcf, 0x77, 0xdb, 0xf6, 0xc5, 0x84, 0xc2, 0xf7, 0x27, 0x35, 0x15, 0x29, 0x21, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1403_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp320r1_sha384_1403_sig[] = { 0x24, 0x17, 0xeb, 0x10, 0xa5, 0x38, 0x92, 0x16, 0x21, 0x06, 0x66, 0x08, 0x24, 0x3f, 0xd6, 0x57, 0x4d, 0xe8, 0x4e, 0xf1, 0x28, 0x15, 0x20, 0xf0, 0x1e, 0xbe, 0x04, 0x44, 0xb4, 0x6a, 0x60, 0x7a, 0xb9, 0xed, 0xa8, 0xf3, 0x72, 0x17, 0x79, 0xa6, 0x8f, 0x1e, 0x2e, 0xa2, 0x94, 0x02, 0x8b, 0xae, 0xb7, 0x38, 0x18, 0x1e, 0x12, 0x8c, 0x86, 0xad, 0x55, 0xcb, 0x19, 0x45, 0x43, 0x6c, 0xf6, 0x9e, 0x09, 0x0c, 0x2f, 0x61, 0x59, 0xf6, 0xf2, 0x20, 0x11, 0xd7, 0x31, 0x73, 0x3b, 0x44, 0x33, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp320r1_sha384_1403 = { .name = "ecdsa_brainpoolp320r1_sha384_1403", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp320r1_str_params, .pubkey = ecdsa_brainpoolp320r1_sha384_1403_pubkey, .pubkeylen = 80, .msg = ecdsa_brainpoolp320r1_sha384_1403_msg, .msglen = 20, .sig = ecdsa_brainpoolp320r1_sha384_1403_sig, .siglen = 80, .result = 1, .comment = "pseudorandom signature, tcId is 393 in file ecdsa_brainpoolP320r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP320R1) && defined(WITH_HASH_SHA384) */ /* Test 1404 for ECDSA, tcId is 1 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1404_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1404_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1404_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x83, 0xaa, 0x7b, 0xa4, 0x85, 0xdc, 0x06, 0x0d, 0xf9, 0x92, 0x2f, 0x9c, 0xcc, 0x5d, 0xa2, 0x9a, 0xdb, 0x75, 0xd4, 0x46, 0x71, 0xd1, 0x8b, 0xad, 0x06, 0x36, 0xd2, 0xe0, 0x9c, 0x5e, 0x2f, 0x95, 0xe8, 0x92, 0xa7, 0x9b, 0x9f, 0xd3, 0xb3, 0x7e, 0x1f, 0x79, 0x8b, 0x15, 0x7b, 0x56, 0x7a, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1404 = { .name = "ecdsa_brainpoolp384r1_sha384_1404", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1404_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1404_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1404_sig, .siglen = 96, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1405 for ECDSA, tcId is 2 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1405_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1405_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1405_sig[] = { 0x9b, 0x47, 0x2f, 0xcc, 0xbf, 0x6d, 0x81, 0x2d, 0x65, 0x69, 0x68, 0x52, 0xcb, 0xfc, 0xad, 0xdd, 0xaa, 0x9f, 0xf8, 0xb1, 0xed, 0x8f, 0x8b, 0xe7, 0x52, 0xcc, 0x82, 0xbc, 0x2a, 0xeb, 0xfc, 0x9f, 0x6b, 0xc8, 0x87, 0xfe, 0x5d, 0xa9, 0xbd, 0x8a, 0x6a, 0xaf, 0xb4, 0xc2, 0x1c, 0x74, 0xf0, 0xf6, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1405 = { .name = "ecdsa_brainpoolp384r1_sha384_1405", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1405_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1405_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1405_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1406 for ECDSA, tcId is 3 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1406_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1406_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1406_sig[] = { 0x7e, 0x2b, 0x0d, 0x38, 0x87, 0x03, 0x59, 0x22, 0xb9, 0x51, 0x76, 0xa9, 0xd5, 0xcf, 0xd5, 0xe0, 0x7f, 0xbe, 0xe9, 0x61, 0xed, 0x19, 0x21, 0x7e, 0xeb, 0x60, 0x5a, 0x1d, 0x2d, 0x1c, 0x4e, 0xb0, 0x32, 0xac, 0xe5, 0x60, 0x79, 0x55, 0xc8, 0x96, 0x0c, 0x60, 0xaf, 0x43, 0xb5, 0x93, 0xd9, 0xd4, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1406 = { .name = "ecdsa_brainpoolp384r1_sha384_1406", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1406_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1406_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1406_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1407 for ECDSA, tcId is 4 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1407_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1407_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1407_sig[] = { 0x01, 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x00, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1407 = { .name = "ecdsa_brainpoolp384r1_sha384_1407", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1407_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1407_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1407_sig, .siglen = 98, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1408 for ECDSA, tcId is 5 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1408_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1408_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1408_sig[] = { 0xf1, 0x71, 0xee, 0xb5, 0xe3, 0xca, 0xeb, 0xfa, 0xa9, 0xf4, 0x07, 0x2b, 0x84, 0xe9, 0x94, 0x01, 0x6a, 0x8f, 0x78, 0x57, 0xff, 0xc4, 0xca, 0xcb, 0xcc, 0x49, 0xeb, 0xb0, 0x81, 0x18, 0x29, 0x08, 0x63, 0x72, 0x2e, 0xb1, 0x0d, 0xd6, 0x05, 0x85, 0xd0, 0xd8, 0x7d, 0x40, 0xcc, 0x8f, 0x74, 0x6f, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1408 = { .name = "ecdsa_brainpoolp384r1_sha384_1408", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1408_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1408_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1408_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1409 for ECDSA, tcId is 6 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1409_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1409_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1409_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x95, 0xc7, 0xc1, 0x60, 0xc0, 0x94, 0xd4, 0x42, 0x25, 0x28, 0xaf, 0x5f, 0xd5, 0x6e, 0xe1, 0x23, 0x4e, 0xe9, 0x0d, 0xcd, 0x68, 0xd7, 0x21, 0xb9, 0x37, 0xf6, 0x09, 0xf8, 0xbb, 0xaa, 0x1b, 0xb9, 0xb5, 0xe2, 0xc5, 0xc3, 0x37, 0x2b, 0xd2, 0xa2, 0x57, 0x96, 0xd8, 0xf0, 0x56, 0xb2, 0x50, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1409 = { .name = "ecdsa_brainpoolp384r1_sha384_1409", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1409_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1409_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1409_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1410 for ECDSA, tcId is 7 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1410_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1410_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1410_sig[] = { 0x00, 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x01, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1410 = { .name = "ecdsa_brainpoolp384r1_sha384_1410", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1410_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1410_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1410_sig, .siglen = 98, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1411 for ECDSA, tcId is 8 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1411_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1411_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1411_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0xf6, 0xf1, 0x5d, 0x21, 0xe2, 0xa3, 0x98, 0xe5, 0xea, 0x34, 0xc0, 0x1e, 0x7b, 0x77, 0x60, 0xbb, 0xc6, 0x46, 0x63, 0x3c, 0x84, 0x7d, 0x34, 0xf9, 0xe7, 0x20, 0x64, 0x73, 0xf0, 0x5a, 0x09, 0xee, 0x19, 0x57, 0xf0, 0xec, 0x34, 0x53, 0xf0, 0x6d, 0xe3, 0xf1, 0x59, 0x12, 0x92, 0x52, 0x14, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1411 = { .name = "ecdsa_brainpoolp384r1_sha384_1411", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1411_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1411_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1411_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1412 for ECDSA, tcId is 9 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1412_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1412_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1412_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1412 = { .name = "ecdsa_brainpoolp384r1_sha384_1412", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1412_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1412_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1412_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1413 for ECDSA, tcId is 10 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1413_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1413_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1413_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1413 = { .name = "ecdsa_brainpoolp384r1_sha384_1413", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1413_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1413_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1413_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1414 for ECDSA, tcId is 11 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1414_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1414_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1414_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1414 = { .name = "ecdsa_brainpoolp384r1_sha384_1414", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1414_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1414_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1414_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1415 for ECDSA, tcId is 12 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1415_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1415_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1415_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1415 = { .name = "ecdsa_brainpoolp384r1_sha384_1415", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1415_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1415_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1415_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1416 for ECDSA, tcId is 13 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1416_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1416_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1416_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1416 = { .name = "ecdsa_brainpoolp384r1_sha384_1416", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1416_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1416_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1416_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1417 for ECDSA, tcId is 14 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1417_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1417_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1417_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1417 = { .name = "ecdsa_brainpoolp384r1_sha384_1417", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1417_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1417_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1417_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1418 for ECDSA, tcId is 15 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1418_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1418_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1418_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1418 = { .name = "ecdsa_brainpoolp384r1_sha384_1418", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1418_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1418_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1418_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1419 for ECDSA, tcId is 16 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1419_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1419_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1419_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1419 = { .name = "ecdsa_brainpoolp384r1_sha384_1419", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1419_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1419_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1419_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1420 for ECDSA, tcId is 17 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1420_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1420_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1420_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1420 = { .name = "ecdsa_brainpoolp384r1_sha384_1420", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1420_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1420_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1420_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1421 for ECDSA, tcId is 18 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1421_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1421_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1421_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1421 = { .name = "ecdsa_brainpoolp384r1_sha384_1421", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1421_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1421_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1421_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1422 for ECDSA, tcId is 19 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1422_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1422_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1422_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1422 = { .name = "ecdsa_brainpoolp384r1_sha384_1422", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1422_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1422_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1422_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1423 for ECDSA, tcId is 20 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1423_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1423_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1423_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1423 = { .name = "ecdsa_brainpoolp384r1_sha384_1423", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1423_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1423_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1423_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1424 for ECDSA, tcId is 21 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1424_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1424_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1424_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1424 = { .name = "ecdsa_brainpoolp384r1_sha384_1424", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1424_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1424_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1424_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1425 for ECDSA, tcId is 22 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1425_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1425_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1425_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1425 = { .name = "ecdsa_brainpoolp384r1_sha384_1425", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1425_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1425_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1425_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1426 for ECDSA, tcId is 23 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1426_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1426_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1426_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1426 = { .name = "ecdsa_brainpoolp384r1_sha384_1426", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1426_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1426_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1426_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1427 for ECDSA, tcId is 24 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1427_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1427_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1427_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1427 = { .name = "ecdsa_brainpoolp384r1_sha384_1427", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1427_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1427_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1427_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1428 for ECDSA, tcId is 25 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1428_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1428_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1428_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1428 = { .name = "ecdsa_brainpoolp384r1_sha384_1428", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1428_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1428_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1428_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1429 for ECDSA, tcId is 26 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1429_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1429_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1429_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1429 = { .name = "ecdsa_brainpoolp384r1_sha384_1429", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1429_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1429_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1429_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1430 for ECDSA, tcId is 27 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1430_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1430_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1430_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1430 = { .name = "ecdsa_brainpoolp384r1_sha384_1430", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1430_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1430_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1430_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1431 for ECDSA, tcId is 28 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1431_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1431_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1431_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1431 = { .name = "ecdsa_brainpoolp384r1_sha384_1431", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1431_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1431_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1431_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1432 for ECDSA, tcId is 29 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1432_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1432_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1432_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1432 = { .name = "ecdsa_brainpoolp384r1_sha384_1432", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1432_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1432_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1432_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1433 for ECDSA, tcId is 30 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1433_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1433_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1433_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1433 = { .name = "ecdsa_brainpoolp384r1_sha384_1433", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1433_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1433_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1433_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1434 for ECDSA, tcId is 31 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1434_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1434_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1434_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1434 = { .name = "ecdsa_brainpoolp384r1_sha384_1434", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1434_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1434_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1434_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1435 for ECDSA, tcId is 32 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1435_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1435_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1435_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1435 = { .name = "ecdsa_brainpoolp384r1_sha384_1435", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1435_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1435_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1435_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1436 for ECDSA, tcId is 33 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1436_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1436_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1436_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1436 = { .name = "ecdsa_brainpoolp384r1_sha384_1436", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1436_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1436_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1436_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1437 for ECDSA, tcId is 34 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1437_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1437_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1437_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1437 = { .name = "ecdsa_brainpoolp384r1_sha384_1437", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1437_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1437_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1437_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1438 for ECDSA, tcId is 35 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1438_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1438_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1438_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1438 = { .name = "ecdsa_brainpoolp384r1_sha384_1438", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1438_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1438_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1438_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1439 for ECDSA, tcId is 36 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1439_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1439_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1439_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1439 = { .name = "ecdsa_brainpoolp384r1_sha384_1439", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1439_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1439_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1439_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1440 for ECDSA, tcId is 37 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1440_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1440_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1440_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1440 = { .name = "ecdsa_brainpoolp384r1_sha384_1440", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1440_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1440_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1440_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1441 for ECDSA, tcId is 38 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1441_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1441_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1441_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1441 = { .name = "ecdsa_brainpoolp384r1_sha384_1441", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1441_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1441_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1441_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1442 for ECDSA, tcId is 39 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1442_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1442_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1442_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1442 = { .name = "ecdsa_brainpoolp384r1_sha384_1442", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1442_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1442_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1442_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1443 for ECDSA, tcId is 40 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1443_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1443_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1443_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1443 = { .name = "ecdsa_brainpoolp384r1_sha384_1443", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1443_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1443_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1443_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1444 for ECDSA, tcId is 41 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1444_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1444_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1444_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1444 = { .name = "ecdsa_brainpoolp384r1_sha384_1444", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1444_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1444_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1444_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1445 for ECDSA, tcId is 42 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1445_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1445_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1445_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1445 = { .name = "ecdsa_brainpoolp384r1_sha384_1445", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1445_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1445_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1445_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1446 for ECDSA, tcId is 43 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1446_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1446_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1446_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1446 = { .name = "ecdsa_brainpoolp384r1_sha384_1446", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1446_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1446_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1446_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1447 for ECDSA, tcId is 44 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1447_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1447_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1447_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1447 = { .name = "ecdsa_brainpoolp384r1_sha384_1447", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1447_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1447_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1447_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1448 for ECDSA, tcId is 45 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1448_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1448_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1448_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1448 = { .name = "ecdsa_brainpoolp384r1_sha384_1448", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1448_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1448_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1448_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1449 for ECDSA, tcId is 46 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1449_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1449_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1449_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1449 = { .name = "ecdsa_brainpoolp384r1_sha384_1449", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1449_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1449_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1449_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1450 for ECDSA, tcId is 47 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1450_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1450_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1450_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1450 = { .name = "ecdsa_brainpoolp384r1_sha384_1450", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1450_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1450_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1450_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1451 for ECDSA, tcId is 48 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1451_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1451_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1451_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1451 = { .name = "ecdsa_brainpoolp384r1_sha384_1451", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1451_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1451_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1451_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1452 for ECDSA, tcId is 49 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1452_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1452_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1452_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1452 = { .name = "ecdsa_brainpoolp384r1_sha384_1452", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1452_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1452_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1452_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1453 for ECDSA, tcId is 50 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1453_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1453_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1453_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1453 = { .name = "ecdsa_brainpoolp384r1_sha384_1453", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1453_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1453_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1453_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1454 for ECDSA, tcId is 51 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1454_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1454_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1454_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1454 = { .name = "ecdsa_brainpoolp384r1_sha384_1454", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1454_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1454_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1454_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1455 for ECDSA, tcId is 52 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1455_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1455_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1455_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1455 = { .name = "ecdsa_brainpoolp384r1_sha384_1455", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1455_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1455_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1455_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1456 for ECDSA, tcId is 53 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1456_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1456_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1456_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1456 = { .name = "ecdsa_brainpoolp384r1_sha384_1456", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1456_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1456_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1456_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1457 for ECDSA, tcId is 54 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1457_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1457_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1457_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1457 = { .name = "ecdsa_brainpoolp384r1_sha384_1457", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1457_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1457_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1457_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1458 for ECDSA, tcId is 55 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1458_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1458_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1458_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1458 = { .name = "ecdsa_brainpoolp384r1_sha384_1458", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1458_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1458_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1458_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1459 for ECDSA, tcId is 56 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1459_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1459_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1459_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1459 = { .name = "ecdsa_brainpoolp384r1_sha384_1459", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1459_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1459_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1459_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1460 for ECDSA, tcId is 57 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1460_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1460_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1460_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1460 = { .name = "ecdsa_brainpoolp384r1_sha384_1460", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1460_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1460_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1460_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1461 for ECDSA, tcId is 58 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1461_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1461_msg[] = { 0x33, 0x35, 0x37, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1461_sig[] = { 0x70, 0x5c, 0x79, 0x0f, 0x8f, 0x50, 0x06, 0x1c, 0x50, 0x8c, 0x15, 0xfc, 0x9a, 0xab, 0xc1, 0xf5, 0x81, 0x93, 0xab, 0x15, 0xb3, 0x94, 0xab, 0x21, 0x95, 0xe3, 0x58, 0xcb, 0x62, 0x0a, 0x5b, 0xf4, 0xb6, 0x54, 0x49, 0xaf, 0xb9, 0xc4, 0x17, 0xbd, 0x1a, 0x31, 0x05, 0xe5, 0x3a, 0x97, 0x42, 0xce, 0x6d, 0xd7, 0xab, 0xda, 0x40, 0x01, 0xbc, 0x41, 0x69, 0x82, 0xab, 0x43, 0x26, 0xb5, 0xd2, 0x7b, 0x12, 0x80, 0xf0, 0x2b, 0x14, 0x2f, 0x04, 0x0c, 0xe2, 0x49, 0x7f, 0x9e, 0x15, 0x3e, 0x4e, 0x1e, 0x3a, 0x35, 0xc5, 0xff, 0xae, 0xf7, 0x26, 0x94, 0xe6, 0x77, 0x87, 0x2e, 0xb1, 0x9d, 0xdf, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1461 = { .name = "ecdsa_brainpoolp384r1_sha384_1461", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1461_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1461_msg, .msglen = 5, .sig = ecdsa_brainpoolp384r1_sha384_1461_sig, .siglen = 96, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1462 for ECDSA, tcId is 59 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1462_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1462_msg[] = { 0x31, 0x37, 0x35, 0x30, 0x35, 0x35, 0x31, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1462_sig[] = { 0x79, 0xdf, 0x11, 0xf0, 0x22, 0x1d, 0xe0, 0x47, 0x3c, 0xcf, 0x84, 0x4c, 0xa7, 0x02, 0xb0, 0xd3, 0x98, 0x1b, 0x8a, 0x97, 0xeb, 0x8f, 0x68, 0x84, 0xf4, 0xef, 0xeb, 0x84, 0x71, 0x5d, 0x2c, 0x6e, 0xde, 0x43, 0x20, 0x8c, 0x7e, 0x98, 0xdb, 0x8e, 0x09, 0x1e, 0x6c, 0x91, 0x7f, 0xd9, 0xf0, 0xbb, 0x1d, 0xa9, 0x88, 0x19, 0x57, 0xbf, 0xfe, 0x20, 0x9d, 0x61, 0xdd, 0xe8, 0x7e, 0xcd, 0x9c, 0x9d, 0x8c, 0x5c, 0xda, 0xd0, 0xe4, 0xcf, 0xb6, 0xe0, 0x8c, 0xe2, 0xe0, 0x6a, 0x43, 0x1c, 0x3e, 0xeb, 0x2d, 0x14, 0x1d, 0x3b, 0x13, 0xb5, 0xba, 0xac, 0x30, 0xeb, 0xfd, 0x62, 0x2c, 0xbf, 0x5e, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1462 = { .name = "ecdsa_brainpoolp384r1_sha384_1462", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1462_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1462_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1462_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1463 for ECDSA, tcId is 60 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1463_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1463_msg[] = { 0x31, 0x30, 0x33, 0x36, 0x33, 0x30, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1463_sig[] = { 0x1c, 0xfc, 0xe0, 0xce, 0x5f, 0xbf, 0x61, 0x78, 0xab, 0xb6, 0xc2, 0x7d, 0xb2, 0xd4, 0xa4, 0x8b, 0xa5, 0x79, 0x7d, 0xc9, 0xb9, 0x9c, 0xdf, 0xe5, 0x2f, 0x74, 0x9d, 0x07, 0x9c, 0x78, 0x9e, 0xcb, 0xe1, 0xbd, 0x8e, 0x7d, 0xe1, 0x0e, 0x2a, 0xc7, 0xb8, 0x3d, 0x03, 0x81, 0xba, 0x0c, 0x61, 0x1f, 0x24, 0xc3, 0x7f, 0x70, 0x69, 0x1e, 0x44, 0x3b, 0x1b, 0x70, 0x29, 0x31, 0x00, 0xc9, 0x8c, 0xf5, 0x49, 0x4e, 0x0d, 0x6e, 0x0b, 0x14, 0xe4, 0x40, 0x0e, 0xef, 0x72, 0xcd, 0x0a, 0xa1, 0x0f, 0xb4, 0xa6, 0x89, 0xf6, 0xb8, 0x8a, 0xe0, 0xf0, 0xab, 0xc3, 0xaf, 0x7d, 0x09, 0xeb, 0x1b, 0x0c, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1463 = { .name = "ecdsa_brainpoolp384r1_sha384_1463", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1463_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1463_msg, .msglen = 8, .sig = ecdsa_brainpoolp384r1_sha384_1463_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1464 for ECDSA, tcId is 61 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1464_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1464_msg[] = { 0x32, 0x33, 0x36, 0x32, 0x34, 0x32, 0x31, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1464_sig[] = { 0x8c, 0x29, 0x75, 0x29, 0xb9, 0xce, 0x54, 0x01, 0xf5, 0x1e, 0x5e, 0xae, 0xb5, 0x31, 0x15, 0xf4, 0xb0, 0x70, 0x66, 0xc7, 0x9c, 0x4b, 0x54, 0xa9, 0xfa, 0xc0, 0x06, 0x38, 0xfc, 0xd1, 0x6c, 0xfa, 0xaa, 0x96, 0x26, 0xdc, 0x6d, 0xa6, 0x59, 0x88, 0x33, 0xd9, 0x24, 0xb0, 0xb9, 0x28, 0x67, 0xa6, 0x78, 0x77, 0x62, 0x67, 0x8f, 0x96, 0x85, 0x8f, 0x22, 0x25, 0x05, 0xf1, 0x10, 0xb9, 0x7a, 0x24, 0x98, 0x73, 0x38, 0xd5, 0xe5, 0xdc, 0x0c, 0x29, 0x06, 0x24, 0xc2, 0x43, 0x90, 0x4f, 0x65, 0xc0, 0xb5, 0x78, 0x05, 0x17, 0x83, 0x8a, 0x7b, 0xa2, 0x17, 0xfa, 0xc9, 0xff, 0x59, 0xb6, 0xde, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1464 = { .name = "ecdsa_brainpoolp384r1_sha384_1464", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1464_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1464_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1464_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1465 for ECDSA, tcId is 62 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1465_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1465_msg[] = { 0x34, 0x35, 0x38, 0x38, 0x30, 0x31, 0x34, 0x36, 0x35, 0x36, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1465_sig[] = { 0x69, 0xfc, 0xb7, 0x52, 0x54, 0x5d, 0x65, 0x76, 0xb0, 0xce, 0x45, 0xf8, 0x90, 0x36, 0x51, 0x83, 0x1e, 0x79, 0xef, 0x0e, 0x17, 0x3a, 0xd1, 0xc8, 0xfd, 0xad, 0x99, 0xd6, 0xb3, 0x80, 0xaa, 0x7c, 0xe4, 0xa5, 0x88, 0xd1, 0x4a, 0xaf, 0x0a, 0x30, 0x7e, 0x5b, 0xb0, 0x5b, 0x81, 0x94, 0x5d, 0x10, 0x3f, 0xc4, 0x15, 0x1f, 0x72, 0xc1, 0x11, 0xcd, 0x2b, 0x0a, 0x38, 0xfe, 0xc1, 0x38, 0x08, 0x3f, 0x7d, 0x05, 0x8b, 0x73, 0x89, 0xa2, 0x66, 0xf7, 0x03, 0x0f, 0xc5, 0x5b, 0x7d, 0x69, 0xe4, 0x90, 0xae, 0xe0, 0x5f, 0x93, 0x1c, 0x55, 0xb7, 0x69, 0xca, 0xe9, 0x32, 0x29, 0xe7, 0xaf, 0x5e, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1465 = { .name = "ecdsa_brainpoolp384r1_sha384_1465", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1465_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1465_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1465_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1466 for ECDSA, tcId is 63 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1466_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1466_msg[] = { 0x32, 0x31, 0x34, 0x36, 0x36, 0x30, 0x35, 0x36, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1466_sig[] = { 0x1f, 0xf3, 0x9a, 0xa7, 0xf8, 0x66, 0x34, 0x7b, 0x6c, 0x5a, 0x0b, 0x62, 0xbb, 0xc9, 0x32, 0x94, 0x83, 0x24, 0x5d, 0x52, 0x4e, 0x93, 0xdb, 0xae, 0x9f, 0xc3, 0x50, 0x19, 0x71, 0x43, 0x46, 0x0b, 0xa6, 0xbf, 0xf2, 0xa1, 0x24, 0x01, 0xac, 0x12, 0xc5, 0x75, 0xfc, 0x33, 0x1d, 0x89, 0x04, 0x2a, 0x15, 0x91, 0x93, 0x3f, 0x0e, 0x33, 0x89, 0x4a, 0xbc, 0xb7, 0x2c, 0x0e, 0x53, 0xde, 0x68, 0x89, 0xa0, 0x0e, 0xbc, 0x0a, 0xb5, 0x97, 0x4d, 0x3a, 0xb8, 0x61, 0x3a, 0x49, 0x3b, 0x16, 0x8d, 0xb3, 0x3d, 0xa5, 0x11, 0x8f, 0x3f, 0x34, 0x77, 0xa7, 0x3d, 0xf4, 0x9a, 0xf2, 0x7e, 0xd8, 0x0d, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1466 = { .name = "ecdsa_brainpoolp384r1_sha384_1466", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1466_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1466_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1466_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1467 for ECDSA, tcId is 64 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1467_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1467_msg[] = { 0x33, 0x33, 0x35, 0x33, 0x30, 0x30, 0x38, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1467_sig[] = { 0x61, 0xd3, 0x22, 0xd1, 0x6c, 0xa8, 0x06, 0x20, 0xbb, 0x09, 0x33, 0x33, 0xac, 0x1f, 0x7b, 0x5f, 0x38, 0xad, 0x5d, 0x1b, 0xf3, 0x9b, 0x68, 0x64, 0x71, 0xb3, 0x83, 0x8d, 0x19, 0x4a, 0x43, 0x37, 0xd3, 0xd0, 0xca, 0x30, 0x01, 0x25, 0xd4, 0xb7, 0x24, 0xdc, 0x6c, 0x7c, 0xd1, 0xb0, 0xaa, 0x00, 0x59, 0x5b, 0x3d, 0x2e, 0x24, 0x35, 0x48, 0x10, 0xc5, 0xd2, 0x0d, 0xc8, 0x1b, 0x2b, 0xa3, 0xd7, 0x19, 0x03, 0x6c, 0x7d, 0x40, 0x73, 0xb1, 0x70, 0xd3, 0x1d, 0x21, 0x0f, 0x58, 0xf3, 0xb5, 0xf7, 0xca, 0x0f, 0x03, 0x00, 0x7e, 0x33, 0x70, 0x2b, 0xe1, 0x49, 0x51, 0x7f, 0x8e, 0xd6, 0x9a, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1467 = { .name = "ecdsa_brainpoolp384r1_sha384_1467", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1467_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1467_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1467_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1468 for ECDSA, tcId is 65 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1468_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1468_msg[] = { 0x36, 0x33, 0x39, 0x36, 0x36, 0x30, 0x33, 0x36, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1468_sig[] = { 0x7c, 0x8c, 0xd6, 0xb9, 0xab, 0x60, 0x68, 0x29, 0x7f, 0x8b, 0xd2, 0xf4, 0xfb, 0x5c, 0xb8, 0x61, 0x82, 0x84, 0x3b, 0x80, 0xdd, 0x75, 0x82, 0x31, 0x7e, 0x81, 0x78, 0x99, 0xc6, 0x12, 0xbf, 0x13, 0xbc, 0xdf, 0x52, 0x0d, 0xcd, 0x61, 0x35, 0x3f, 0x27, 0xa4, 0x35, 0x6d, 0xbd, 0x16, 0x70, 0x70, 0x43, 0x31, 0xc1, 0x4c, 0x7f, 0x03, 0x3c, 0x5f, 0x6e, 0x5d, 0x9d, 0x2d, 0xe7, 0x6a, 0x90, 0x20, 0xb4, 0x26, 0x35, 0x7d, 0x5d, 0xdb, 0xaf, 0x12, 0x57, 0x65, 0xb8, 0xed, 0x47, 0x6a, 0x18, 0xeb, 0xe1, 0xba, 0xfa, 0xf9, 0x41, 0x7b, 0xbe, 0x0f, 0x8f, 0x96, 0x72, 0xfb, 0xf2, 0x0a, 0x5c, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1468 = { .name = "ecdsa_brainpoolp384r1_sha384_1468", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1468_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1468_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1468_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1469 for ECDSA, tcId is 66 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1469_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1469_msg[] = { 0x33, 0x33, 0x39, 0x31, 0x36, 0x36, 0x30, 0x37, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1469_sig[] = { 0x77, 0x11, 0x17, 0x17, 0x74, 0x96, 0xa9, 0x11, 0x8f, 0x28, 0x83, 0xe5, 0x7f, 0x63, 0xa5, 0x89, 0x98, 0xd5, 0x78, 0x79, 0x16, 0x66, 0x59, 0x31, 0x4c, 0x50, 0x8b, 0x60, 0x28, 0x09, 0x4d, 0x4e, 0x16, 0x09, 0x0f, 0x27, 0x7a, 0xcf, 0xd4, 0x7e, 0x09, 0x7f, 0x5b, 0xef, 0x3d, 0xc6, 0x59, 0x39, 0x3e, 0xc4, 0xbc, 0x04, 0x0a, 0xaf, 0x47, 0xf9, 0xac, 0xba, 0x60, 0x93, 0xc8, 0x2c, 0x3e, 0x07, 0xc1, 0xe6, 0x07, 0xee, 0x23, 0x8b, 0xeb, 0xb5, 0xdb, 0x96, 0x59, 0x69, 0x64, 0xbc, 0x3a, 0xf7, 0xe5, 0x7b, 0x80, 0x8c, 0x2f, 0x6b, 0xe0, 0x41, 0x28, 0x46, 0x7a, 0x56, 0x57, 0x7b, 0x40, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1469 = { .name = "ecdsa_brainpoolp384r1_sha384_1469", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1469_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1469_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1469_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1470 for ECDSA, tcId is 67 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1470_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1470_msg[] = { 0x31, 0x34, 0x34, 0x36, 0x39, 0x37, 0x35, 0x39, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1470_sig[] = { 0x6a, 0x05, 0x48, 0x8b, 0x75, 0xac, 0xec, 0x47, 0x18, 0xd7, 0x16, 0x4e, 0xc1, 0x9d, 0xcd, 0x6d, 0x35, 0x1a, 0x5f, 0xb2, 0x85, 0x2a, 0xfc, 0x49, 0x15, 0xe9, 0xeb, 0xcd, 0x80, 0x73, 0x89, 0x7a, 0x5d, 0x55, 0x9d, 0xc9, 0xec, 0x56, 0xa5, 0xaa, 0xe4, 0x00, 0xdd, 0x0c, 0xde, 0xef, 0xc7, 0x16, 0x2e, 0x51, 0x1d, 0x8b, 0xf6, 0x0e, 0xbe, 0x46, 0x8f, 0x5e, 0x04, 0x53, 0x33, 0xd4, 0x3d, 0x4b, 0xe5, 0x9b, 0x43, 0x93, 0xc8, 0xe6, 0x50, 0xe3, 0xe6, 0xfa, 0xbc, 0xbf, 0x10, 0xda, 0x7a, 0xe5, 0xf2, 0x31, 0x8b, 0xff, 0x04, 0x74, 0x13, 0xdf, 0x4d, 0xc1, 0x7f, 0xb3, 0x72, 0xd9, 0x8d, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1470 = { .name = "ecdsa_brainpoolp384r1_sha384_1470", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1470_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1470_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1470_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1471 for ECDSA, tcId is 68 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1471_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1471_msg[] = { 0x35, 0x31, 0x35, 0x39, 0x34, 0x37, 0x38, 0x36, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1471_sig[] = { 0x85, 0x42, 0xc5, 0x84, 0x27, 0xf1, 0xde, 0xb1, 0xdb, 0xd3, 0x62, 0x27, 0xeb, 0x96, 0xfb, 0xff, 0x15, 0x3e, 0xdb, 0xd2, 0x3e, 0xbd, 0x13, 0xe7, 0x86, 0xa5, 0x2e, 0x48, 0x63, 0xc8, 0x88, 0xa2, 0xdd, 0x50, 0x94, 0x16, 0x54, 0xe5, 0x51, 0xa4, 0xfc, 0xa9, 0x1b, 0x5b, 0xf3, 0x51, 0x97, 0x89, 0x82, 0xb6, 0x8b, 0x14, 0xb6, 0x08, 0x03, 0x29, 0x45, 0xbd, 0xe3, 0xd7, 0x06, 0x1d, 0x5f, 0x68, 0x74, 0x58, 0xed, 0xe1, 0xb3, 0x02, 0xaf, 0x88, 0x42, 0x44, 0x97, 0x88, 0xf8, 0x31, 0x4b, 0x10, 0x85, 0x79, 0xf6, 0xc5, 0x28, 0xbd, 0xc8, 0x00, 0xaf, 0xe6, 0xb2, 0xc8, 0xb1, 0x85, 0xfb, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1471 = { .name = "ecdsa_brainpoolp384r1_sha384_1471", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1471_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1471_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1471_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1472 for ECDSA, tcId is 69 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1472_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1472_msg[] = { 0x35, 0x32, 0x34, 0x31, 0x37, 0x39, 0x32, 0x33, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1472_sig[] = { 0x58, 0xfb, 0x97, 0x4b, 0xef, 0x2a, 0xca, 0xf2, 0x54, 0x7c, 0xac, 0xb6, 0xf0, 0xcc, 0x93, 0x4b, 0x59, 0x91, 0xc6, 0x6e, 0xb7, 0xa2, 0x23, 0x75, 0x52, 0x09, 0xac, 0xaf, 0x5b, 0x9e, 0x4b, 0x0f, 0xed, 0x71, 0x2c, 0x76, 0x60, 0x6c, 0x59, 0xc1, 0x01, 0x4b, 0xa2, 0xc2, 0xeb, 0x1b, 0xb3, 0x22, 0x7d, 0x9e, 0x26, 0x5d, 0xc0, 0x9e, 0x03, 0x10, 0x14, 0x18, 0x2b, 0x36, 0x9e, 0x15, 0xb4, 0xa3, 0x4d, 0xba, 0x39, 0x01, 0x06, 0x2d, 0x62, 0x7c, 0xff, 0xab, 0x56, 0x1e, 0x73, 0xd3, 0x8b, 0xbe, 0xa9, 0x07, 0x27, 0x23, 0x46, 0xfb, 0xb2, 0x47, 0xd3, 0xec, 0x63, 0x56, 0x4f, 0xe1, 0xcb, 0xef, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1472 = { .name = "ecdsa_brainpoolp384r1_sha384_1472", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1472_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1472_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1472_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1473 for ECDSA, tcId is 70 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1473_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1473_msg[] = { 0x31, 0x31, 0x34, 0x37, 0x32, 0x39, 0x30, 0x32, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1473_sig[] = { 0x06, 0x5e, 0xd5, 0x99, 0x4d, 0x4b, 0x49, 0x8a, 0xf7, 0xf5, 0xab, 0x7d, 0x4c, 0x08, 0x81, 0x0c, 0xb7, 0x6d, 0x24, 0x2b, 0x5d, 0x8b, 0x7b, 0x55, 0x37, 0xcb, 0x8a, 0xfa, 0x6e, 0xa8, 0x52, 0xab, 0x71, 0x4f, 0x66, 0xb1, 0x44, 0xa4, 0x86, 0xd0, 0x5b, 0x2a, 0x56, 0xf2, 0x05, 0x6b, 0xaa, 0x11, 0x37, 0xe6, 0x76, 0xa8, 0xd5, 0x35, 0xd0, 0xa8, 0x18, 0xdc, 0xec, 0xcc, 0xaa, 0x47, 0x83, 0xdb, 0x6d, 0x25, 0x49, 0x25, 0xa0, 0x0d, 0xcf, 0x6a, 0x03, 0x5a, 0x7d, 0x9e, 0x0d, 0x67, 0x7d, 0xc7, 0x81, 0x95, 0xa7, 0xec, 0xcf, 0xc7, 0xbe, 0xee, 0x8e, 0x8e, 0xea, 0x74, 0x56, 0xc3, 0x69, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1473 = { .name = "ecdsa_brainpoolp384r1_sha384_1473", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1473_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1473_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1473_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1474 for ECDSA, tcId is 71 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1474_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1474_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x32, 0x35, 0x36, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1474_sig[] = { 0x25, 0xc1, 0x47, 0xaa, 0x99, 0xa6, 0x15, 0xa3, 0x4a, 0x6b, 0xd1, 0x52, 0xd1, 0x71, 0x84, 0xc4, 0x8d, 0x28, 0xbf, 0x79, 0xfa, 0x6f, 0xba, 0x92, 0x8e, 0x67, 0x8e, 0xf6, 0x38, 0xa0, 0x64, 0xda, 0x79, 0xd5, 0xf2, 0x53, 0xf7, 0xfe, 0xb8, 0x91, 0x5a, 0x40, 0xd6, 0x43, 0x7b, 0x7b, 0xdf, 0xa5, 0x0c, 0xf7, 0xe1, 0x4c, 0x03, 0xcf, 0x67, 0x89, 0x57, 0x21, 0xcc, 0x2f, 0xbd, 0xd6, 0x2d, 0x6a, 0x0f, 0x89, 0xae, 0xc4, 0x3d, 0xd1, 0x23, 0xd5, 0x1f, 0x81, 0x3d, 0x9b, 0x5c, 0x82, 0x85, 0x0c, 0x07, 0xd0, 0x89, 0xe7, 0xae, 0xa0, 0xdf, 0x2f, 0x59, 0x7e, 0x6a, 0x1c, 0x8e, 0x2b, 0xfd, 0x29, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1474 = { .name = "ecdsa_brainpoolp384r1_sha384_1474", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1474_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1474_msg, .msglen = 11, .sig = ecdsa_brainpoolp384r1_sha384_1474_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1475 for ECDSA, tcId is 72 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1475_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1475_msg[] = { 0x37, 0x33, 0x34, 0x33, 0x33, 0x30, 0x36, 0x35, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1475_sig[] = { 0x85, 0x3d, 0xf8, 0xd6, 0x19, 0xf3, 0xaa, 0x7d, 0xd0, 0xbd, 0xd2, 0x4c, 0x34, 0xd3, 0x87, 0xcc, 0x59, 0xab, 0xff, 0x4a, 0x05, 0x85, 0xe2, 0xe9, 0xc8, 0x20, 0x66, 0xe4, 0xd2, 0xe9, 0x57, 0xb0, 0x43, 0x70, 0x31, 0xbc, 0x12, 0x84, 0xba, 0x3d, 0x39, 0x54, 0x5d, 0x5e, 0x85, 0x0e, 0x27, 0xa3, 0x04, 0x35, 0x98, 0x2c, 0xef, 0xe2, 0xcd, 0x15, 0x81, 0xf3, 0x78, 0xc6, 0xbe, 0x16, 0xea, 0x77, 0x28, 0x4a, 0x17, 0x8b, 0x3f, 0x0d, 0xc1, 0x4c, 0x16, 0x9c, 0x9e, 0xd8, 0x63, 0xcc, 0x4a, 0x8d, 0x8f, 0x78, 0x65, 0x13, 0x80, 0x60, 0x9d, 0xf5, 0xe0, 0x5b, 0x65, 0x04, 0x1d, 0xd7, 0xa2, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1475 = { .name = "ecdsa_brainpoolp384r1_sha384_1475", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1475_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1475_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1475_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1476 for ECDSA, tcId is 73 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1476_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1476_msg[] = { 0x39, 0x37, 0x34, 0x34, 0x36, 0x30, 0x39, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1476_sig[] = { 0x1b, 0x29, 0xb1, 0xe6, 0x08, 0x95, 0xa4, 0x92, 0x0d, 0x68, 0x61, 0x83, 0x6f, 0xaa, 0x22, 0x77, 0x65, 0x40, 0x46, 0x02, 0xf4, 0xbb, 0xa3, 0xb4, 0xfa, 0xa8, 0x88, 0xa4, 0xb1, 0x69, 0x3a, 0x7c, 0x8b, 0x58, 0x5b, 0x59, 0xb9, 0x42, 0x48, 0x71, 0x22, 0xa9, 0x88, 0x9f, 0x4f, 0x14, 0x54, 0xef, 0x7d, 0x9f, 0xcf, 0xbc, 0x2e, 0xe7, 0x1f, 0xbe, 0x32, 0xa4, 0x26, 0x2e, 0x47, 0x77, 0xda, 0xa3, 0x8f, 0x97, 0x22, 0xb0, 0xa6, 0x75, 0x00, 0xb9, 0x50, 0xaa, 0xe4, 0xb4, 0x69, 0xbf, 0xf9, 0x52, 0x5a, 0xe1, 0xde, 0x38, 0x9c, 0xc1, 0x7a, 0xe7, 0x19, 0xe2, 0x4e, 0xcd, 0x19, 0x72, 0x84, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1476 = { .name = "ecdsa_brainpoolp384r1_sha384_1476", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1476_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1476_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1476_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1477 for ECDSA, tcId is 74 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1477_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1477_msg[] = { 0x33, 0x32, 0x32, 0x37, 0x30, 0x38, 0x36, 0x38, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1477_sig[] = { 0x89, 0x37, 0xdd, 0x05, 0x00, 0x4f, 0x6e, 0x78, 0x2a, 0x2c, 0x91, 0xc8, 0xd7, 0x9f, 0x40, 0x79, 0x5d, 0x16, 0x9f, 0xab, 0x6a, 0xf3, 0x85, 0xf9, 0x1f, 0x5c, 0xee, 0x92, 0x8c, 0x2a, 0x22, 0x86, 0x9f, 0x10, 0x93, 0x8e, 0xe2, 0xed, 0xb3, 0xed, 0x0e, 0x0a, 0x0e, 0x38, 0x14, 0x4d, 0x50, 0x64, 0x48, 0xc6, 0x92, 0xb4, 0xb8, 0x87, 0x76, 0xb0, 0x15, 0x8b, 0x99, 0xe1, 0x5e, 0x99, 0xde, 0x39, 0x55, 0xab, 0x9d, 0x88, 0x44, 0x77, 0x41, 0x8c, 0xb7, 0x40, 0xff, 0x91, 0x7a, 0x70, 0x4c, 0x77, 0x07, 0xf3, 0x99, 0x54, 0x18, 0x6a, 0x03, 0x97, 0x7c, 0xbe, 0xdf, 0x34, 0xba, 0xc0, 0x27, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1477 = { .name = "ecdsa_brainpoolp384r1_sha384_1477", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1477_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1477_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1477_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1478 for ECDSA, tcId is 75 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1478_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1478_msg[] = { 0x32, 0x33, 0x32, 0x39, 0x37, 0x36, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1478_sig[] = { 0x1e, 0x42, 0xfa, 0xe8, 0x34, 0x60, 0xbb, 0x8f, 0x30, 0xd7, 0xd6, 0xbe, 0xdf, 0x98, 0x46, 0x22, 0xa5, 0x50, 0x35, 0xd5, 0x02, 0xfc, 0x2d, 0x7f, 0x9c, 0xe5, 0x2c, 0x56, 0x51, 0x5f, 0xd6, 0x6d, 0x1d, 0x59, 0x30, 0x94, 0xd4, 0x16, 0x7f, 0x4a, 0xe0, 0x51, 0xf2, 0xb1, 0x2d, 0x0e, 0x67, 0xab, 0x28, 0x4d, 0x00, 0xf9, 0x8f, 0x29, 0x20, 0x2f, 0x03, 0xb3, 0x79, 0x71, 0x97, 0x8e, 0xeb, 0xf2, 0xfb, 0xfb, 0x94, 0xbe, 0xf2, 0xb4, 0xd6, 0x3f, 0xbe, 0xd8, 0x8c, 0x7d, 0x29, 0xd1, 0x8b, 0x61, 0xca, 0x40, 0x98, 0x82, 0xae, 0xee, 0xa9, 0x7e, 0x30, 0xa0, 0xb1, 0x56, 0xdc, 0xe2, 0xbb, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1478 = { .name = "ecdsa_brainpoolp384r1_sha384_1478", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1478_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1478_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1478_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1479 for ECDSA, tcId is 76 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1479_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1479_msg[] = { 0x39, 0x34, 0x30, 0x34, 0x37, 0x33, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1479_sig[] = { 0x2c, 0x07, 0xe1, 0x85, 0x94, 0x1b, 0x20, 0x62, 0x8d, 0xf8, 0x48, 0x08, 0xff, 0x9a, 0x01, 0x0e, 0x5e, 0x11, 0x2c, 0x06, 0x32, 0xcb, 0x32, 0x31, 0x26, 0x6e, 0x84, 0x18, 0xab, 0x06, 0xf6, 0xf1, 0x8e, 0xb4, 0x1f, 0x2f, 0x98, 0xa5, 0xa0, 0xca, 0x1a, 0x46, 0x23, 0x39, 0x22, 0x8f, 0xad, 0x9a, 0x29, 0x05, 0x1e, 0x92, 0x31, 0xd6, 0x8a, 0xb4, 0x62, 0xba, 0x7a, 0xae, 0xe3, 0x9e, 0xde, 0xf6, 0x9c, 0x05, 0xf8, 0x1b, 0xa7, 0xea, 0xb1, 0x61, 0x45, 0x4b, 0xcf, 0x49, 0x69, 0xba, 0x29, 0x34, 0x63, 0xe6, 0xde, 0x2e, 0x78, 0x46, 0x77, 0xe8, 0xd2, 0xa9, 0x29, 0x53, 0x40, 0x0f, 0xe9, 0x57, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1479 = { .name = "ecdsa_brainpoolp384r1_sha384_1479", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1479_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1479_msg, .msglen = 8, .sig = ecdsa_brainpoolp384r1_sha384_1479_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1480 for ECDSA, tcId is 77 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1480_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1480_msg[] = { 0x33, 0x32, 0x32, 0x30, 0x35, 0x36, 0x39, 0x31, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1480_sig[] = { 0x03, 0x06, 0x87, 0x25, 0x3a, 0xd2, 0xcc, 0xb9, 0x43, 0x42, 0xd3, 0x25, 0xa8, 0xad, 0x19, 0x27, 0x8f, 0xf2, 0xac, 0x8c, 0xfe, 0x00, 0x20, 0x9a, 0xb0, 0x30, 0xc7, 0x99, 0x7b, 0x30, 0x08, 0xd4, 0xe9, 0x58, 0x8b, 0xa2, 0x92, 0x2d, 0x62, 0xe7, 0x5a, 0x5e, 0x6c, 0xb8, 0x42, 0x32, 0x4f, 0x72, 0x75, 0x2a, 0xe1, 0xbd, 0xbd, 0x94, 0xe3, 0x5b, 0xc5, 0x78, 0x15, 0xd2, 0x75, 0x8b, 0x1f, 0xdf, 0xee, 0x70, 0x6f, 0x41, 0x0c, 0x0e, 0xd9, 0x66, 0xbe, 0x87, 0x92, 0xee, 0xb5, 0x4c, 0xae, 0x86, 0x31, 0xba, 0xa0, 0xc0, 0x95, 0xe0, 0x74, 0x2d, 0x6d, 0xd7, 0xd1, 0xe0, 0x41, 0x9b, 0xc5, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1480 = { .name = "ecdsa_brainpoolp384r1_sha384_1480", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1480_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1480_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1480_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1481 for ECDSA, tcId is 78 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1481_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1481_msg[] = { 0x34, 0x31, 0x34, 0x30, 0x35, 0x33, 0x39, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1481_sig[] = { 0x39, 0xab, 0xdc, 0x19, 0x43, 0x60, 0x8e, 0xf4, 0xf5, 0xc4, 0x6b, 0xac, 0x7a, 0xe1, 0xe2, 0x3d, 0x2e, 0x32, 0x52, 0xe6, 0xfc, 0xc2, 0xb0, 0xce, 0x8f, 0x41, 0x50, 0x1d, 0xf0, 0x24, 0xb7, 0xd2, 0x97, 0x36, 0x24, 0x01, 0xbe, 0x87, 0xb1, 0x22, 0xbb, 0x9c, 0xcd, 0x98, 0xda, 0xa5, 0x33, 0xce, 0x58, 0xf8, 0xd8, 0x08, 0x8f, 0xaf, 0x75, 0xfa, 0x06, 0xd7, 0x6e, 0x8c, 0xc1, 0x0a, 0x1d, 0x7b, 0xcf, 0xc2, 0x25, 0xd5, 0x8b, 0x75, 0xd8, 0xa2, 0x04, 0xe6, 0xa5, 0xce, 0x4d, 0x6d, 0x95, 0x14, 0x6e, 0x85, 0x3b, 0x68, 0x18, 0x74, 0x6c, 0xeb, 0xf7, 0x86, 0x4f, 0xac, 0xb4, 0x4a, 0x21, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1481 = { .name = "ecdsa_brainpoolp384r1_sha384_1481", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1481_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1481_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1481_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1482 for ECDSA, tcId is 79 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1482_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1482_msg[] = { 0x31, 0x39, 0x35, 0x31, 0x35, 0x36, 0x38, 0x36, 0x34, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1482_sig[] = { 0x51, 0x0f, 0x56, 0x02, 0xdb, 0xf3, 0xa0, 0x95, 0x27, 0x6e, 0x99, 0xa6, 0x7a, 0x65, 0x24, 0x92, 0x17, 0xc6, 0xe6, 0xc1, 0x68, 0xa6, 0xca, 0xa6, 0x4f, 0x5a, 0xad, 0x80, 0x6b, 0x57, 0xd2, 0x90, 0x02, 0xe6, 0x07, 0x86, 0xc6, 0xf3, 0xed, 0x27, 0x46, 0x90, 0x58, 0x3d, 0x18, 0xcd, 0xe7, 0x2b, 0x68, 0x75, 0x68, 0xeb, 0x41, 0xaf, 0x3f, 0x5c, 0xcf, 0x7f, 0x2b, 0x16, 0xe6, 0x7a, 0x1f, 0x4f, 0xbc, 0xb3, 0xbf, 0x68, 0x3d, 0x86, 0xe4, 0x9a, 0x61, 0xff, 0xf0, 0xc2, 0x8f, 0xc0, 0x3d, 0x79, 0x7a, 0x72, 0x2a, 0xf9, 0xb0, 0x2c, 0x39, 0x1a, 0x49, 0xf5, 0x66, 0x9c, 0x79, 0x68, 0xdb, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1482 = { .name = "ecdsa_brainpoolp384r1_sha384_1482", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1482_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1482_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1482_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1483 for ECDSA, tcId is 80 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1483_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1483_msg[] = { 0x35, 0x39, 0x35, 0x39, 0x30, 0x37, 0x31, 0x36, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1483_sig[] = { 0x84, 0xbe, 0xda, 0xfb, 0x46, 0x87, 0x32, 0x74, 0xef, 0x91, 0xde, 0x67, 0xb2, 0x03, 0x75, 0xc7, 0x69, 0x8a, 0xfb, 0xe3, 0x7f, 0x3d, 0x5b, 0xac, 0x1b, 0xbc, 0xab, 0xcb, 0xb4, 0xaa, 0x66, 0x16, 0xb3, 0x45, 0x26, 0x7f, 0xc9, 0xd5, 0x28, 0x5b, 0xaa, 0xcc, 0xa6, 0xf1, 0xb6, 0x94, 0x61, 0x9f, 0x89, 0xb3, 0x91, 0x65, 0x94, 0x9c, 0xc4, 0x35, 0x50, 0x3f, 0x4a, 0x6a, 0xc5, 0x75, 0x4d, 0x2a, 0xfd, 0xdb, 0x99, 0xb5, 0x5a, 0x3b, 0xa8, 0x40, 0x04, 0x0d, 0x51, 0x62, 0x4a, 0x09, 0x85, 0x25, 0x1f, 0x2c, 0x97, 0x87, 0xb5, 0xcb, 0x26, 0x6a, 0x21, 0x81, 0x43, 0xdb, 0x5b, 0x04, 0x18, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1483 = { .name = "ecdsa_brainpoolp384r1_sha384_1483", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1483_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1483_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1483_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1484 for ECDSA, tcId is 81 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1484_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1484_msg[] = { 0x32, 0x31, 0x35, 0x33, 0x34, 0x36, 0x39, 0x35, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1484_sig[] = { 0x25, 0x1b, 0x50, 0xb6, 0x3f, 0xe1, 0xcb, 0xae, 0x21, 0x04, 0x31, 0xbd, 0x1e, 0x76, 0x56, 0x3f, 0x07, 0x84, 0x54, 0xf7, 0xc2, 0xb2, 0xe4, 0x75, 0xab, 0xc1, 0xb7, 0x75, 0x89, 0x20, 0xf0, 0x3b, 0x97, 0x11, 0x12, 0xc6, 0x2c, 0xa6, 0x13, 0x2a, 0x48, 0x07, 0x38, 0x76, 0x8e, 0xdc, 0x35, 0xd3, 0x8b, 0x8c, 0x16, 0x46, 0x90, 0x06, 0x01, 0xde, 0x4f, 0xc9, 0xc9, 0xdb, 0xea, 0x22, 0x8c, 0xe9, 0xc9, 0xed, 0xbb, 0xce, 0x7c, 0x31, 0xa4, 0x2d, 0x3c, 0xba, 0x58, 0x0e, 0x19, 0x1c, 0x92, 0xd1, 0x23, 0xe1, 0x1c, 0x06, 0x34, 0xb8, 0x7b, 0xc0, 0x94, 0xcf, 0xf1, 0x6e, 0x20, 0x9b, 0x69, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1484 = { .name = "ecdsa_brainpoolp384r1_sha384_1484", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1484_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1484_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1484_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1485 for ECDSA, tcId is 82 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1485_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1485_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x31, 0x30, 0x39, 0x38, 0x33, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1485_sig[] = { 0x34, 0xb3, 0xc6, 0xaf, 0xc0, 0xfa, 0x7a, 0x75, 0x38, 0x5e, 0x3d, 0x0d, 0xbf, 0xb2, 0x37, 0xb5, 0xc7, 0x6a, 0xfe, 0x16, 0xf0, 0xf6, 0x9e, 0x44, 0x53, 0x3b, 0x7a, 0xc3, 0xab, 0xf4, 0x23, 0x37, 0x99, 0x20, 0x15, 0x04, 0xeb, 0xec, 0x03, 0x10, 0xb2, 0xfd, 0x7e, 0x86, 0x7f, 0x9f, 0xdd, 0x01, 0x2f, 0x83, 0x1f, 0x59, 0x55, 0xc2, 0xe4, 0xfa, 0x5b, 0x29, 0x8b, 0xef, 0x8f, 0x09, 0x73, 0x2d, 0x0b, 0x15, 0xea, 0x7c, 0xe1, 0x41, 0xa6, 0xdc, 0xdb, 0xbc, 0x60, 0x37, 0x8f, 0xd9, 0xc9, 0x69, 0x33, 0x9e, 0x82, 0x6d, 0xef, 0x56, 0x81, 0xe9, 0x6f, 0x0a, 0x1d, 0xbc, 0x36, 0xad, 0xaf, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1485 = { .name = "ecdsa_brainpoolp384r1_sha384_1485", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1485_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1485_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1485_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1486 for ECDSA, tcId is 83 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1486_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1486_msg[] = { 0x34, 0x39, 0x32, 0x39, 0x33, 0x39, 0x36, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1486_sig[] = { 0x33, 0x5b, 0xf6, 0xb1, 0x52, 0x64, 0x7b, 0xdf, 0x8a, 0x3c, 0x5d, 0xe8, 0xde, 0x3c, 0x69, 0x83, 0x21, 0x01, 0x90, 0x26, 0x79, 0xbc, 0x80, 0x26, 0x12, 0xd2, 0xf4, 0xbf, 0xf8, 0xc7, 0xed, 0x7d, 0xf2, 0x25, 0xa0, 0x80, 0xef, 0xf6, 0xde, 0xaa, 0x5d, 0xac, 0xc7, 0x40, 0x16, 0xc5, 0xce, 0x3d, 0x7f, 0x1b, 0x11, 0x6f, 0x8d, 0x27, 0xd8, 0x94, 0xff, 0xe6, 0xab, 0x57, 0x54, 0x68, 0x51, 0xba, 0xa5, 0x51, 0x3d, 0x11, 0x0e, 0x69, 0x60, 0xd7, 0x13, 0x26, 0x3a, 0xfd, 0x54, 0x2e, 0x97, 0xf0, 0x1f, 0x4d, 0xf4, 0xf7, 0xb6, 0x4d, 0x49, 0x49, 0x6d, 0x22, 0xc2, 0xf6, 0xc5, 0x60, 0x50, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1486 = { .name = "ecdsa_brainpoolp384r1_sha384_1486", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1486_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1486_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1486_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1487 for ECDSA, tcId is 84 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1487_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1487_msg[] = { 0x32, 0x31, 0x31, 0x32, 0x33, 0x35, 0x35, 0x39, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1487_sig[] = { 0x32, 0x9c, 0x5d, 0x35, 0xad, 0xef, 0x35, 0x73, 0x39, 0xf9, 0x01, 0x65, 0x7a, 0xf5, 0x5d, 0xa7, 0xb0, 0x41, 0xe8, 0xc1, 0x83, 0x74, 0xc7, 0x9a, 0xb4, 0x44, 0x49, 0xb2, 0x7a, 0x83, 0x02, 0x28, 0x00, 0xf0, 0xc9, 0x38, 0x50, 0x3b, 0xdd, 0x85, 0xb7, 0x88, 0x4a, 0x32, 0xdf, 0x90, 0x57, 0xfe, 0x74, 0xf5, 0x61, 0x01, 0xc7, 0xf7, 0xb3, 0x6d, 0x63, 0x4c, 0x21, 0x75, 0xa0, 0xd1, 0x7c, 0xec, 0x05, 0x46, 0xb6, 0xcd, 0xf1, 0x8e, 0x86, 0xef, 0x9a, 0xbb, 0x6d, 0x6d, 0x0b, 0xcc, 0xdd, 0x04, 0x42, 0xaf, 0x12, 0x55, 0xe0, 0x2a, 0x5d, 0xde, 0x70, 0x78, 0x40, 0xdb, 0x48, 0x54, 0x31, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1487 = { .name = "ecdsa_brainpoolp384r1_sha384_1487", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1487_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1487_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1487_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1488 for ECDSA, tcId is 85 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1488_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1488_msg[] = { 0x31, 0x32, 0x33, 0x39, 0x32, 0x37, 0x35, 0x37, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1488_sig[] = { 0x1a, 0xc3, 0xd4, 0x63, 0xdf, 0x22, 0x19, 0x45, 0xad, 0xbd, 0x28, 0xa7, 0x46, 0x81, 0x7b, 0xa8, 0x3d, 0x59, 0x57, 0xd9, 0x56, 0x57, 0xc7, 0x24, 0xf1, 0xad, 0x68, 0xb9, 0x8b, 0xde, 0x6b, 0xf7, 0x95, 0x9f, 0x73, 0x63, 0x25, 0x3e, 0xce, 0x17, 0x4d, 0x7a, 0xed, 0x34, 0x64, 0x10, 0xdc, 0x21, 0x2a, 0x5a, 0x30, 0xa8, 0x19, 0x1a, 0x48, 0x83, 0xba, 0xbf, 0x69, 0xba, 0x88, 0x3a, 0xf7, 0xf5, 0x06, 0x7b, 0xc9, 0x90, 0xf8, 0xda, 0xc4, 0xa3, 0x5b, 0xc6, 0xef, 0x38, 0x71, 0x02, 0xfa, 0xd8, 0x5d, 0x26, 0x85, 0x64, 0xc6, 0x12, 0x46, 0xdf, 0xf1, 0x75, 0x10, 0x63, 0x41, 0x68, 0xa1, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1488 = { .name = "ecdsa_brainpoolp384r1_sha384_1488", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1488_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1488_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1488_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1489 for ECDSA, tcId is 86 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1489_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1489_msg[] = { 0x32, 0x30, 0x38, 0x31, 0x31, 0x38, 0x38, 0x37, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1489_sig[] = { 0x5c, 0xc9, 0xa0, 0x74, 0xe1, 0x0c, 0x41, 0x72, 0x4d, 0x55, 0x50, 0x2d, 0x72, 0x43, 0x0d, 0x70, 0x7b, 0xa7, 0x55, 0xc4, 0x1d, 0x56, 0x8d, 0x79, 0x98, 0x7d, 0xc3, 0xcd, 0xe4, 0x5c, 0xf6, 0xf7, 0x03, 0x41, 0xf9, 0x1f, 0xa2, 0xa2, 0x0e, 0x3b, 0xa5, 0xb5, 0x7f, 0xeb, 0xde, 0x05, 0xb5, 0xc4, 0x6d, 0x80, 0x25, 0x16, 0x2a, 0xf3, 0x0c, 0xfa, 0xb2, 0xcd, 0x16, 0xa1, 0x34, 0x2b, 0x41, 0x74, 0xae, 0x17, 0x1d, 0xc3, 0xc7, 0x5b, 0xc1, 0xfe, 0x99, 0x4e, 0xc6, 0xc0, 0x35, 0x92, 0x95, 0xf0, 0x39, 0x0e, 0x65, 0x85, 0x6a, 0xec, 0x5e, 0xbd, 0x89, 0x4a, 0x15, 0xc6, 0x85, 0x77, 0xab, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1489 = { .name = "ecdsa_brainpoolp384r1_sha384_1489", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1489_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1489_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1489_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1490 for ECDSA, tcId is 87 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1490_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1490_msg[] = { 0x34, 0x35, 0x34, 0x36, 0x30, 0x38, 0x39, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1490_sig[] = { 0x0c, 0x13, 0xdd, 0xef, 0x4e, 0x7e, 0x83, 0x16, 0x30, 0x90, 0x55, 0x9f, 0xa5, 0x92, 0xed, 0xba, 0x35, 0xa9, 0x2d, 0x66, 0xe5, 0x4a, 0x34, 0xaa, 0xe2, 0x90, 0x5a, 0x10, 0xb0, 0x3a, 0x31, 0x6f, 0xfd, 0x0c, 0x01, 0x3f, 0x7b, 0x06, 0x19, 0x09, 0xf3, 0xa9, 0x24, 0xac, 0x25, 0xf1, 0xc9, 0x0a, 0x40, 0xab, 0x2d, 0x40, 0xb4, 0x00, 0x7f, 0xec, 0x32, 0xa6, 0x47, 0x78, 0x4a, 0xe4, 0xa2, 0xd5, 0xcb, 0x4f, 0x70, 0x42, 0xcc, 0xe8, 0xc3, 0x74, 0x29, 0x8c, 0x34, 0x51, 0x80, 0xd0, 0xe3, 0x8a, 0xaa, 0x5d, 0x73, 0x87, 0x5e, 0xb8, 0x59, 0xb0, 0x82, 0xd0, 0xa1, 0x7c, 0xd4, 0x96, 0xd2, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1490 = { .name = "ecdsa_brainpoolp384r1_sha384_1490", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1490_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1490_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1490_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1491 for ECDSA, tcId is 88 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1491_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1491_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x36, 0x38, 0x37, 0x31, 0x31, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1491_sig[] = { 0x0a, 0xf7, 0x4a, 0x3e, 0xa3, 0xc4, 0x12, 0x17, 0x11, 0xd1, 0x0f, 0x2e, 0x4d, 0x72, 0x50, 0x31, 0xb1, 0xb0, 0x8c, 0xf8, 0xef, 0xf2, 0x28, 0x34, 0x74, 0x84, 0x02, 0x45, 0x3b, 0x8e, 0xaa, 0x00, 0xb1, 0x57, 0x86, 0x11, 0xee, 0x45, 0x22, 0x07, 0x53, 0xbc, 0xbd, 0x20, 0xa3, 0x91, 0x40, 0x2e, 0x15, 0xeb, 0x2d, 0xaf, 0x4f, 0xb9, 0x32, 0x12, 0x83, 0xf6, 0x91, 0x57, 0xe7, 0xc7, 0x47, 0xd6, 0x37, 0x67, 0x59, 0xd0, 0x13, 0x0e, 0x79, 0x05, 0x52, 0xb4, 0xfd, 0x89, 0x57, 0x71, 0x39, 0xa2, 0x8d, 0xae, 0xd4, 0x3b, 0xa9, 0x76, 0xa7, 0x6b, 0xec, 0x1c, 0x7d, 0x53, 0xa4, 0x9c, 0x98, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1491 = { .name = "ecdsa_brainpoolp384r1_sha384_1491", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1491_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1491_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1491_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1492 for ECDSA, tcId is 89 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1492_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1492_msg[] = { 0x32, 0x30, 0x33, 0x31, 0x33, 0x38, 0x31, 0x38, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1492_sig[] = { 0x67, 0x4b, 0x6a, 0xc9, 0x89, 0x0d, 0xcb, 0xab, 0xa4, 0xd7, 0x44, 0xce, 0x99, 0x92, 0xe9, 0xdc, 0x69, 0x8e, 0x52, 0x4b, 0x0d, 0x1c, 0xf4, 0xd7, 0x6d, 0x35, 0x53, 0x72, 0x63, 0x1d, 0x6f, 0x7d, 0xce, 0x6f, 0xf5, 0xa6, 0x07, 0x27, 0x3c, 0x0c, 0x14, 0x69, 0xd8, 0xe5, 0xb1, 0x2a, 0xb6, 0x0e, 0x7c, 0xf8, 0xf9, 0x83, 0x28, 0xf9, 0x20, 0xd2, 0x94, 0x75, 0xd5, 0xcb, 0x38, 0xbc, 0x35, 0xfe, 0x71, 0xff, 0xd8, 0x7f, 0x1b, 0xe7, 0x88, 0xd2, 0x02, 0x90, 0x8e, 0xb9, 0x39, 0xc7, 0x6b, 0x76, 0x94, 0xce, 0xcf, 0xc2, 0x1d, 0xae, 0x50, 0xf4, 0x33, 0x77, 0x3d, 0x75, 0xe2, 0x79, 0xe3, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1492 = { .name = "ecdsa_brainpoolp384r1_sha384_1492", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1492_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1492_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1492_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1493 for ECDSA, tcId is 90 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1493_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1493_msg[] = { 0x32, 0x35, 0x35, 0x33, 0x35, 0x38, 0x33, 0x33, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1493_sig[] = { 0x89, 0xab, 0x51, 0x35, 0x7a, 0x7d, 0xb3, 0x6d, 0x1c, 0x26, 0xb1, 0xe9, 0x06, 0x08, 0x8b, 0x9a, 0xa3, 0xe3, 0xd5, 0x96, 0x58, 0xe2, 0xbe, 0xd5, 0x5d, 0xd0, 0x3d, 0xeb, 0x56, 0x90, 0x86, 0x77, 0xa5, 0x9a, 0x4b, 0x24, 0xcd, 0x65, 0xea, 0xe6, 0x35, 0x1b, 0x03, 0xa9, 0x30, 0x0a, 0xe5, 0x18, 0x39, 0x5e, 0x10, 0xa6, 0xac, 0xcc, 0x3c, 0x6e, 0x56, 0x68, 0x44, 0xc4, 0xfa, 0xc4, 0xca, 0xa2, 0xa8, 0xce, 0xda, 0x47, 0x51, 0xdf, 0x5a, 0xab, 0x5b, 0x32, 0x75, 0xf8, 0x25, 0xc5, 0x94, 0x0b, 0x1d, 0xb6, 0x08, 0x86, 0xf1, 0x39, 0x53, 0x18, 0x11, 0x0c, 0xa5, 0x3c, 0x69, 0x32, 0x83, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1493 = { .name = "ecdsa_brainpoolp384r1_sha384_1493", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1493_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1493_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1493_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1494 for ECDSA, tcId is 91 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1494_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1494_msg[] = { 0x34, 0x36, 0x31, 0x38, 0x38, 0x34, 0x31, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1494_sig[] = { 0x5b, 0x3f, 0x30, 0xc8, 0x3a, 0xca, 0xa0, 0x88, 0xa3, 0x72, 0xd5, 0x58, 0x82, 0x29, 0xa3, 0x55, 0x5d, 0xba, 0x14, 0xfb, 0xed, 0x8c, 0xbc, 0x29, 0x35, 0xf6, 0xf6, 0xea, 0xbd, 0x80, 0x77, 0xc8, 0x53, 0xdb, 0xc7, 0xb2, 0xe3, 0x54, 0x68, 0x3d, 0x41, 0xdc, 0xe5, 0xb5, 0xd4, 0xc9, 0xde, 0x58, 0x76, 0x70, 0x24, 0x28, 0x0e, 0x5e, 0x13, 0x1b, 0x4a, 0x46, 0xd6, 0x6b, 0x35, 0xf2, 0xb3, 0x04, 0xa5, 0x5e, 0x64, 0x81, 0xf0, 0x94, 0xb3, 0x55, 0xe8, 0x73, 0xa7, 0xf8, 0x61, 0x02, 0x96, 0x02, 0x09, 0x7a, 0x4d, 0x30, 0x01, 0x36, 0xea, 0x00, 0x5b, 0xf5, 0xfb, 0xc1, 0x08, 0x43, 0xba, 0x95, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1494 = { .name = "ecdsa_brainpoolp384r1_sha384_1494", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1494_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1494_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1494_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1495 for ECDSA, tcId is 92 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1495_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1495_msg[] = { 0x31, 0x30, 0x30, 0x39, 0x32, 0x34, 0x35, 0x38, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1495_sig[] = { 0x32, 0xe8, 0xab, 0xc3, 0x66, 0x23, 0xfc, 0xb2, 0x03, 0x46, 0x62, 0x10, 0x50, 0x66, 0xaf, 0xd7, 0x1f, 0xae, 0x4d, 0x75, 0xb8, 0x30, 0x0e, 0x32, 0xbe, 0xf4, 0x63, 0x2f, 0xac, 0x65, 0xec, 0xbd, 0x28, 0x5c, 0x40, 0x61, 0xca, 0x64, 0xf6, 0x81, 0x3e, 0xdd, 0x2a, 0xbf, 0xbc, 0xc2, 0x13, 0xe8, 0x0b, 0x00, 0x13, 0xe2, 0xa5, 0x6c, 0x36, 0xde, 0x1b, 0xa1, 0x9a, 0x9c, 0x30, 0x48, 0x69, 0xf3, 0xd6, 0x98, 0x06, 0xec, 0xe6, 0xf4, 0xa8, 0x01, 0xc2, 0x7a, 0x3d, 0x4f, 0x1c, 0x20, 0xaf, 0x5e, 0xb1, 0x75, 0xe9, 0x5e, 0x73, 0x4e, 0xf6, 0x37, 0x65, 0x3a, 0x6c, 0xdb, 0x2a, 0x9e, 0xcb, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1495 = { .name = "ecdsa_brainpoolp384r1_sha384_1495", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1495_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1495_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1495_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1496 for ECDSA, tcId is 93 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1496_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1496_msg[] = { 0x32, 0x37, 0x35, 0x36, 0x34, 0x36, 0x36, 0x35, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1496_sig[] = { 0x45, 0xdf, 0x52, 0x9d, 0x25, 0x31, 0xd4, 0x8c, 0xab, 0x41, 0x2b, 0x68, 0x0c, 0xad, 0xb5, 0x32, 0xcd, 0x62, 0x25, 0x30, 0x4f, 0xb7, 0x42, 0x84, 0x1c, 0x89, 0x54, 0x59, 0x59, 0xb7, 0x9e, 0x19, 0x8c, 0x3b, 0x12, 0x97, 0xdc, 0x5c, 0x4b, 0xd9, 0xaa, 0x75, 0x49, 0x19, 0x3e, 0x07, 0x80, 0xd1, 0x5c, 0x8f, 0x62, 0xfc, 0x48, 0x52, 0x06, 0x9d, 0x35, 0x23, 0x2a, 0xab, 0x77, 0x25, 0x71, 0x5e, 0x91, 0x57, 0xd1, 0xaa, 0x68, 0x80, 0x50, 0xf8, 0x96, 0xd6, 0x90, 0xdc, 0xd4, 0xe4, 0x1b, 0xaa, 0x66, 0xea, 0x6f, 0x9b, 0x34, 0xde, 0xea, 0x5a, 0x60, 0x7c, 0xc3, 0x91, 0xff, 0x09, 0x7d, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1496 = { .name = "ecdsa_brainpoolp384r1_sha384_1496", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1496_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1496_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1496_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1497 for ECDSA, tcId is 94 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1497_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1497_msg[] = { 0x31, 0x31, 0x39, 0x36, 0x39, 0x37, 0x31, 0x30, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1497_sig[] = { 0x10, 0x20, 0x07, 0x8f, 0x6e, 0x57, 0x17, 0x53, 0x8f, 0xef, 0x87, 0x9c, 0x56, 0x35, 0xd4, 0xd7, 0xd5, 0x27, 0x21, 0xbe, 0x15, 0x29, 0x58, 0x5b, 0x0a, 0x77, 0x08, 0x3c, 0x5f, 0x34, 0x7f, 0x21, 0xb1, 0x31, 0x6d, 0x03, 0x99, 0xa8, 0xbc, 0x17, 0xb3, 0x67, 0x33, 0x64, 0x75, 0xa6, 0xd9, 0x7e, 0x1a, 0xde, 0x87, 0xed, 0x2e, 0x2b, 0xdb, 0x24, 0x81, 0xa0, 0x27, 0xdd, 0x3f, 0xa5, 0xb9, 0x3a, 0x81, 0xf4, 0xff, 0xdc, 0x33, 0xd4, 0xa9, 0x08, 0xd9, 0x7b, 0x40, 0xf8, 0x41, 0x82, 0x1c, 0x02, 0x92, 0x9b, 0x03, 0x61, 0x35, 0xf4, 0x19, 0x75, 0x2c, 0x88, 0xd5, 0x75, 0x09, 0xd1, 0x7b, 0xef, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1497 = { .name = "ecdsa_brainpoolp384r1_sha384_1497", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1497_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1497_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1497_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1498 for ECDSA, tcId is 95 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1498_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1498_msg[] = { 0x32, 0x33, 0x33, 0x31, 0x34, 0x32, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1498_sig[] = { 0x0d, 0x93, 0xd5, 0xc6, 0x37, 0x41, 0x44, 0x7f, 0xdb, 0xed, 0x17, 0xa7, 0x38, 0xa4, 0x1e, 0xfd, 0xbb, 0x70, 0x93, 0x33, 0x37, 0x97, 0x49, 0x9f, 0xe7, 0x0d, 0x5c, 0x54, 0xbc, 0x86, 0xb6, 0xbb, 0x65, 0x04, 0x24, 0xbb, 0xd6, 0x49, 0x07, 0x37, 0x5e, 0xf9, 0x2e, 0xfd, 0x13, 0xee, 0x25, 0xec, 0x66, 0x19, 0x2a, 0xc1, 0xfb, 0x22, 0xdb, 0x75, 0x88, 0x1d, 0xf7, 0xae, 0x89, 0x0d, 0xa4, 0x95, 0x3a, 0x74, 0xfa, 0x95, 0x4e, 0x0b, 0x5e, 0x6b, 0x69, 0x2e, 0xca, 0x23, 0xc3, 0xbc, 0xfd, 0x5f, 0xb3, 0x22, 0x8d, 0x09, 0x2d, 0x99, 0x91, 0x07, 0x1b, 0xaa, 0x4b, 0x6e, 0x8f, 0xa2, 0x06, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1498 = { .name = "ecdsa_brainpoolp384r1_sha384_1498", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1498_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1498_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1498_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1499 for ECDSA, tcId is 96 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1499_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1499_msg[] = { 0x31, 0x36, 0x37, 0x33, 0x34, 0x38, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1499_sig[] = { 0x04, 0x93, 0x34, 0xbf, 0x43, 0xf7, 0xd9, 0xc2, 0x13, 0x44, 0x3c, 0x96, 0xc4, 0xba, 0x11, 0x9b, 0x33, 0x57, 0x57, 0xa3, 0xe6, 0x9b, 0xa8, 0x73, 0xbd, 0xc4, 0xef, 0x64, 0x21, 0x39, 0xb8, 0x68, 0x7a, 0x8a, 0x57, 0x82, 0xb6, 0xa9, 0x00, 0x21, 0x1d, 0x6f, 0xc1, 0xec, 0xf1, 0x4c, 0x2c, 0xf9, 0x18, 0x29, 0x90, 0xbe, 0xe4, 0x78, 0x72, 0x67, 0xb6, 0xd6, 0x3b, 0x7e, 0xa6, 0x7a, 0x25, 0x85, 0x29, 0x51, 0xd1, 0x45, 0xcf, 0x5a, 0x39, 0xd2, 0x01, 0xba, 0xbe, 0x9f, 0x3f, 0x11, 0x20, 0x92, 0x4e, 0x5b, 0x28, 0x3e, 0xeb, 0x63, 0x6a, 0x8f, 0xbb, 0xb0, 0xc2, 0xfc, 0x66, 0xdd, 0xf7, 0x55, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1499 = { .name = "ecdsa_brainpoolp384r1_sha384_1499", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1499_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1499_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1499_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1500 for ECDSA, tcId is 97 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1500_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1500_msg[] = { 0x31, 0x34, 0x36, 0x30, 0x31, 0x35, 0x39, 0x38, 0x32, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1500_sig[] = { 0x6b, 0x0c, 0x24, 0x8f, 0xa3, 0x93, 0x17, 0x62, 0x1a, 0xf5, 0x34, 0x4f, 0x97, 0x8b, 0xd7, 0x65, 0xec, 0x61, 0x25, 0xcc, 0xe2, 0xf4, 0x0c, 0xdd, 0xdf, 0xa4, 0x0f, 0x7e, 0x8c, 0x7f, 0x4f, 0xe9, 0x21, 0x63, 0x54, 0xbd, 0xaf, 0xc2, 0x06, 0x72, 0x88, 0xc5, 0x67, 0x94, 0xeb, 0x5d, 0x17, 0xd2, 0x75, 0x84, 0xc0, 0x77, 0xad, 0x35, 0xb5, 0x8f, 0xb2, 0x94, 0x03, 0xb9, 0xc2, 0xc6, 0x41, 0x27, 0x17, 0x94, 0xe2, 0x6b, 0x24, 0x1d, 0xfc, 0x8d, 0x74, 0xd4, 0xda, 0xa7, 0xde, 0x3f, 0x07, 0x6c, 0x9c, 0x4c, 0x6d, 0x39, 0x09, 0xe2, 0xc0, 0xab, 0x9b, 0x9a, 0x70, 0x2c, 0x08, 0x12, 0xee, 0xad, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1500 = { .name = "ecdsa_brainpoolp384r1_sha384_1500", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1500_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1500_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1500_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1501 for ECDSA, tcId is 98 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1501_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1501_msg[] = { 0x38, 0x39, 0x39, 0x30, 0x38, 0x35, 0x39, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1501_sig[] = { 0x8c, 0x04, 0x8a, 0x8e, 0xab, 0xa1, 0xb6, 0x54, 0xc3, 0xf6, 0x87, 0xdf, 0x01, 0x71, 0x4d, 0xf3, 0xb6, 0x1b, 0x98, 0xe5, 0x78, 0x20, 0x5c, 0x80, 0x4a, 0x72, 0xbd, 0xe3, 0x2d, 0xaa, 0xe8, 0x7b, 0x37, 0xfd, 0x2f, 0x9f, 0x5f, 0x82, 0xb3, 0xc5, 0xf7, 0xb4, 0xa0, 0x07, 0xea, 0xa1, 0x98, 0x6a, 0x30, 0xb7, 0x9f, 0x44, 0xc8, 0x3b, 0xd5, 0x2e, 0x53, 0x7c, 0xcf, 0x9a, 0x35, 0x77, 0x2f, 0xab, 0x5b, 0xa9, 0xfa, 0xf0, 0xde, 0xcb, 0xe3, 0x47, 0x63, 0xb5, 0xae, 0x28, 0x09, 0x84, 0xac, 0x7f, 0xf2, 0x7f, 0xb8, 0xdb, 0xad, 0x57, 0x21, 0x8c, 0x36, 0x4b, 0x39, 0xdc, 0x2a, 0x03, 0xb5, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1501 = { .name = "ecdsa_brainpoolp384r1_sha384_1501", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1501_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1501_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1501_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1502 for ECDSA, tcId is 99 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1502_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1502_msg[] = { 0x34, 0x33, 0x32, 0x36, 0x34, 0x34, 0x30, 0x39, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1502_sig[] = { 0x2e, 0xbc, 0xd9, 0x4d, 0x17, 0x12, 0x24, 0x42, 0xd3, 0xe7, 0xbd, 0x12, 0xc4, 0xb6, 0x09, 0xdb, 0xce, 0xef, 0x69, 0xb3, 0x24, 0x60, 0x92, 0xe4, 0xad, 0x0c, 0x83, 0xd6, 0x02, 0xc2, 0x51, 0x6e, 0x09, 0x16, 0x9b, 0x59, 0x2f, 0xdf, 0x61, 0xa7, 0xe8, 0x81, 0xe2, 0x62, 0xbf, 0x49, 0x57, 0x14, 0x70, 0x39, 0x2c, 0xd4, 0xe5, 0xe1, 0x76, 0x06, 0x60, 0x8c, 0x2e, 0x4f, 0xff, 0xf7, 0xa9, 0xc0, 0xe9, 0x17, 0x11, 0x98, 0x91, 0x5c, 0xf7, 0xe5, 0x06, 0x33, 0x26, 0x3d, 0x7e, 0x07, 0x19, 0x54, 0xf1, 0x2e, 0xbb, 0x1a, 0x4f, 0x4a, 0xcc, 0x76, 0x83, 0xa1, 0x60, 0xd6, 0x4d, 0xda, 0x3b, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1502 = { .name = "ecdsa_brainpoolp384r1_sha384_1502", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1502_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1502_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1502_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1503 for ECDSA, tcId is 100 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1503_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1503_msg[] = { 0x32, 0x33, 0x37, 0x36, 0x34, 0x33, 0x37, 0x35, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1503_sig[] = { 0x4d, 0x71, 0x91, 0x59, 0x6f, 0x50, 0xb8, 0x30, 0x9e, 0x14, 0x90, 0x89, 0x5e, 0x62, 0xb1, 0x6c, 0x41, 0x5c, 0x1f, 0x7b, 0x50, 0xd2, 0xa4, 0x26, 0x09, 0x04, 0xbc, 0x5b, 0x7b, 0xff, 0xde, 0x4f, 0x92, 0x68, 0x7b, 0x02, 0x9f, 0x32, 0x6f, 0x4b, 0x48, 0xe6, 0xfd, 0x8d, 0x1f, 0x19, 0xee, 0x50, 0x0a, 0x54, 0x51, 0x5f, 0xad, 0x47, 0xbb, 0x08, 0xe5, 0x86, 0x69, 0x7f, 0x28, 0xe2, 0xbb, 0xf9, 0x8d, 0x75, 0x75, 0xc7, 0xbb, 0x91, 0x1b, 0xd7, 0x4d, 0xb3, 0xd9, 0xaa, 0x84, 0x84, 0x75, 0xbb, 0xdd, 0xac, 0x66, 0x18, 0x1e, 0xfd, 0x63, 0xa2, 0x49, 0x18, 0xde, 0xc2, 0xdd, 0x01, 0xa2, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1503 = { .name = "ecdsa_brainpoolp384r1_sha384_1503", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1503_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1503_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1503_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1504 for ECDSA, tcId is 101 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1504_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1504_msg[] = { 0x38, 0x36, 0x30, 0x33, 0x39, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1504_sig[] = { 0x6f, 0xde, 0xfa, 0x7d, 0x91, 0x2c, 0xd2, 0xc3, 0x0c, 0xf1, 0x2b, 0xae, 0x60, 0x8a, 0xb8, 0x7d, 0xe1, 0x2d, 0x49, 0xee, 0x08, 0x4d, 0x23, 0x90, 0x81, 0xe8, 0x92, 0x46, 0xe4, 0x93, 0x9d, 0x60, 0x71, 0xdf, 0xd1, 0x1f, 0x74, 0x01, 0x89, 0x4a, 0xee, 0x9c, 0x13, 0xd1, 0x10, 0x13, 0xec, 0x75, 0x79, 0x37, 0x49, 0x5d, 0xc0, 0xa3, 0xa3, 0xd6, 0x6c, 0x43, 0x94, 0x5d, 0x99, 0xcd, 0x98, 0xdc, 0x84, 0x2a, 0xe8, 0x67, 0x7f, 0x14, 0xd6, 0x49, 0xb2, 0x2c, 0x1e, 0x7e, 0xc1, 0x48, 0x57, 0xa0, 0x56, 0x39, 0xec, 0x1f, 0xe0, 0x8b, 0xe2, 0x28, 0x11, 0x28, 0x32, 0xb5, 0xe3, 0x2f, 0xcf, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1504 = { .name = "ecdsa_brainpoolp384r1_sha384_1504", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1504_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1504_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1504_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1505 for ECDSA, tcId is 102 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1505_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1505_msg[] = { 0x35, 0x38, 0x30, 0x37, 0x37, 0x37, 0x33, 0x39, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1505_sig[] = { 0x05, 0x86, 0x7e, 0x5f, 0x8a, 0xbd, 0x70, 0x40, 0x07, 0xb9, 0x8c, 0x1a, 0x8f, 0x2c, 0x69, 0xf4, 0xee, 0xa1, 0x4c, 0xb4, 0xa4, 0x21, 0x02, 0x62, 0xb4, 0x74, 0xc4, 0xeb, 0xa9, 0x07, 0x33, 0x74, 0xca, 0xb5, 0xdd, 0x1b, 0xb5, 0xc7, 0x81, 0xdf, 0x04, 0x0d, 0xf3, 0x2b, 0xf7, 0x94, 0x31, 0x87, 0x68, 0xaf, 0xdc, 0x70, 0xaa, 0xca, 0x5f, 0x1b, 0x36, 0xef, 0x32, 0x59, 0x3d, 0x88, 0x9e, 0x37, 0x7d, 0x3f, 0x83, 0xb3, 0x29, 0x38, 0x6c, 0x98, 0x2a, 0xcf, 0x9b, 0x40, 0x1b, 0x7c, 0xd2, 0x6b, 0x75, 0xa5, 0x38, 0x93, 0x95, 0xc1, 0x5d, 0x50, 0x7d, 0x7d, 0x67, 0x02, 0x3d, 0x6d, 0x07, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1505 = { .name = "ecdsa_brainpoolp384r1_sha384_1505", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1505_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1505_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1505_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1506 for ECDSA, tcId is 103 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1506_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1506_msg[] = { 0x35, 0x37, 0x31, 0x38, 0x36, 0x36, 0x38, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1506_sig[] = { 0x88, 0xd5, 0xf4, 0x06, 0x9b, 0xe3, 0x1f, 0xc5, 0x8a, 0x38, 0xfd, 0x8d, 0xe9, 0xdb, 0xc7, 0xfe, 0xc6, 0x40, 0x65, 0xde, 0x42, 0x68, 0xd4, 0x1c, 0x8d, 0xb7, 0x99, 0xd0, 0xa2, 0x0a, 0xe1, 0x04, 0x92, 0xc7, 0xe8, 0x0b, 0x30, 0x03, 0x4b, 0x7f, 0x32, 0x1c, 0xd4, 0x9b, 0x2b, 0x9c, 0x3f, 0x33, 0x09, 0x91, 0x2b, 0x63, 0xc4, 0xf8, 0x8b, 0xe7, 0x72, 0x11, 0xab, 0x53, 0x3c, 0xf1, 0x3f, 0x2b, 0x63, 0x47, 0x20, 0x06, 0xaa, 0xb5, 0xe7, 0x0d, 0xf2, 0x1b, 0x87, 0x30, 0x1f, 0xe5, 0x13, 0x9a, 0xae, 0xd4, 0x84, 0x5a, 0x42, 0x1b, 0x0f, 0x07, 0x6f, 0x96, 0x8a, 0xe4, 0xb3, 0x24, 0x90, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1506 = { .name = "ecdsa_brainpoolp384r1_sha384_1506", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1506_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1506_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1506_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1507 for ECDSA, tcId is 104 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1507_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1507_msg[] = { 0x38, 0x36, 0x37, 0x37, 0x33, 0x30, 0x39, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1507_sig[] = { 0x75, 0x0e, 0x5b, 0xae, 0xef, 0x69, 0x34, 0xb3, 0x65, 0x12, 0x57, 0x2d, 0xd3, 0x30, 0xfa, 0x88, 0x35, 0x3e, 0x32, 0x1a, 0x52, 0x13, 0x63, 0xbd, 0xa8, 0x89, 0xfd, 0x25, 0x7e, 0x4e, 0xa4, 0x02, 0x4f, 0xb5, 0xf9, 0x2e, 0x39, 0xf2, 0x65, 0xd7, 0x89, 0xd2, 0xa9, 0x49, 0xdd, 0x91, 0x84, 0x3b, 0x18, 0xb8, 0x46, 0x7c, 0x63, 0x89, 0x25, 0x14, 0x84, 0x7c, 0x3b, 0x98, 0xee, 0x27, 0x9e, 0x3f, 0x41, 0xb3, 0x91, 0xa4, 0x79, 0x75, 0xd7, 0xf4, 0xd6, 0x66, 0x93, 0x85, 0xac, 0x0b, 0xd2, 0xe3, 0x22, 0xf8, 0x86, 0x08, 0x87, 0x03, 0x10, 0xb6, 0x35, 0xad, 0x28, 0x25, 0x6d, 0x8d, 0xca, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1507 = { .name = "ecdsa_brainpoolp384r1_sha384_1507", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1507_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1507_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1507_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1508 for ECDSA, tcId is 105 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1508_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1508_msg[] = { 0x32, 0x34, 0x37, 0x35, 0x35, 0x31, 0x35, 0x30, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1508_sig[] = { 0x8b, 0xb6, 0x56, 0x97, 0x37, 0xc5, 0xe0, 0x1d, 0x25, 0x96, 0xd3, 0xba, 0x5d, 0x01, 0x89, 0x0f, 0x23, 0x11, 0x36, 0xc6, 0x9c, 0x6c, 0x9f, 0x42, 0xa9, 0x44, 0xf0, 0x66, 0x02, 0x29, 0x6b, 0x11, 0x59, 0xf2, 0x9f, 0xc1, 0xd9, 0x8b, 0x68, 0xbe, 0x06, 0xf3, 0x05, 0x2c, 0x5f, 0xa8, 0x61, 0x9b, 0x2d, 0x1d, 0x4c, 0xcd, 0x79, 0xb0, 0x09, 0x98, 0xac, 0xf0, 0x3d, 0x34, 0x12, 0x88, 0x8f, 0x27, 0xd2, 0x74, 0xb8, 0x78, 0x87, 0x42, 0xbe, 0x27, 0xd7, 0x98, 0xdd, 0x7d, 0xb6, 0x54, 0xd9, 0x64, 0xfa, 0x4c, 0xde, 0x33, 0x84, 0xd8, 0x8c, 0x2a, 0x50, 0x24, 0x77, 0x92, 0xe8, 0x82, 0x0a, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1508 = { .name = "ecdsa_brainpoolp384r1_sha384_1508", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1508_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1508_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1508_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1509 for ECDSA, tcId is 106 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1509_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1509_msg[] = { 0x39, 0x37, 0x33, 0x31, 0x37, 0x36, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1509_sig[] = { 0x27, 0x7b, 0x8f, 0xe0, 0x06, 0x51, 0x99, 0x8c, 0xdc, 0xf8, 0xb4, 0xf4, 0x07, 0x95, 0xf4, 0x54, 0xe4, 0xdc, 0xa2, 0xfd, 0xc2, 0xc1, 0x0d, 0xce, 0x1f, 0xff, 0x8f, 0x0c, 0x85, 0x2a, 0xac, 0x0b, 0xf6, 0x18, 0x3b, 0x1a, 0xc3, 0xc3, 0x82, 0x67, 0x06, 0xc3, 0xe6, 0x59, 0x85, 0x41, 0x98, 0xa0, 0x0d, 0x71, 0xf3, 0xf3, 0xf6, 0x81, 0xfc, 0x39, 0x1c, 0x3c, 0xfd, 0xb8, 0x1b, 0x61, 0xeb, 0xa0, 0x15, 0x5c, 0xb4, 0xa8, 0xe9, 0xce, 0x80, 0x49, 0xcd, 0xf9, 0xb4, 0x59, 0xaa, 0xf2, 0x64, 0x52, 0x5f, 0xbb, 0x89, 0x3e, 0xaa, 0x71, 0x59, 0x3a, 0x96, 0x18, 0xc0, 0xf1, 0x17, 0xef, 0xd9, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1509 = { .name = "ecdsa_brainpoolp384r1_sha384_1509", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1509_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1509_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1509_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1510 for ECDSA, tcId is 107 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1510_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1510_msg[] = { 0x33, 0x36, 0x39, 0x38, 0x30, 0x39, 0x35, 0x31, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1510_sig[] = { 0x26, 0x9d, 0x14, 0xd9, 0x86, 0x7e, 0xd2, 0x34, 0x10, 0xca, 0xf2, 0x4f, 0x5f, 0x9f, 0x17, 0x1b, 0xc0, 0xe5, 0x2f, 0x00, 0x6d, 0x8d, 0x16, 0xc0, 0x2c, 0x81, 0xf1, 0xb4, 0xed, 0xba, 0x22, 0x2d, 0xe7, 0x35, 0x1a, 0xd7, 0x29, 0x43, 0xed, 0x09, 0xa2, 0xe7, 0xac, 0x17, 0x6a, 0x1b, 0x21, 0x56, 0x4a, 0xf9, 0x3b, 0x80, 0x0f, 0xbd, 0xca, 0x45, 0xac, 0x74, 0xcf, 0xd2, 0x2c, 0xba, 0x9a, 0x50, 0x87, 0x39, 0xf8, 0xfc, 0xf3, 0xce, 0x14, 0xe5, 0x5c, 0x39, 0xbc, 0x77, 0x0a, 0x14, 0x3f, 0x80, 0x99, 0x70, 0xe8, 0x36, 0x44, 0x7a, 0x45, 0x42, 0xd0, 0xbb, 0x36, 0x7d, 0xe6, 0x61, 0x2c, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1510 = { .name = "ecdsa_brainpoolp384r1_sha384_1510", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1510_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1510_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1510_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1511 for ECDSA, tcId is 108 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1511_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1511_msg[] = { 0x31, 0x30, 0x37, 0x35, 0x30, 0x32, 0x36, 0x38, 0x35, 0x37, 0x36, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1511_sig[] = { 0x40, 0x73, 0x1d, 0xbe, 0x64, 0x63, 0x6c, 0xd5, 0xef, 0x5d, 0x25, 0x60, 0xa2, 0x3f, 0x38, 0x91, 0xac, 0xcf, 0x0a, 0x53, 0x0a, 0x44, 0x6c, 0x6a, 0xd2, 0x13, 0xb4, 0xba, 0x7f, 0xf9, 0xcb, 0x50, 0x5a, 0xba, 0x93, 0x31, 0x83, 0x6a, 0xb8, 0xa9, 0x8f, 0xe5, 0x65, 0xe8, 0x66, 0xc8, 0x79, 0x79, 0x19, 0xeb, 0x3c, 0xf6, 0xb5, 0xfa, 0xf1, 0x1e, 0x97, 0x17, 0xd6, 0xd0, 0x44, 0x96, 0x24, 0xa5, 0x09, 0x35, 0x89, 0x36, 0xdd, 0x00, 0x67, 0xff, 0xc1, 0x8f, 0x22, 0xe6, 0xbc, 0xbc, 0x6a, 0xa1, 0xdf, 0x3a, 0x45, 0xf1, 0x5a, 0xe7, 0x32, 0x19, 0x77, 0x90, 0xcc, 0x6f, 0xdb, 0x92, 0xc3, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1511 = { .name = "ecdsa_brainpoolp384r1_sha384_1511", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1511_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1511_msg, .msglen = 11, .sig = ecdsa_brainpoolp384r1_sha384_1511_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1512 for ECDSA, tcId is 109 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1512_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1512_msg[] = { 0x38, 0x36, 0x39, 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1512_sig[] = { 0x84, 0x33, 0x5a, 0x1c, 0x93, 0xd9, 0x96, 0xe3, 0x6c, 0x22, 0xae, 0xe4, 0xf3, 0x3c, 0xef, 0xf7, 0xc6, 0xff, 0x08, 0x8c, 0xd5, 0x60, 0x4d, 0xb8, 0x27, 0x50, 0x98, 0x60, 0x06, 0x66, 0x14, 0x46, 0x07, 0xbc, 0xfa, 0xc7, 0xe6, 0x95, 0xf2, 0xf7, 0x9a, 0x77, 0x56, 0x28, 0xa1, 0xab, 0x6f, 0x82, 0x28, 0xca, 0x8c, 0xdc, 0x6b, 0xd7, 0x72, 0xcc, 0x9f, 0x24, 0xc1, 0x4e, 0xf7, 0x13, 0x32, 0xf1, 0x92, 0xfe, 0xfd, 0x52, 0xd0, 0x3b, 0x8d, 0xf9, 0x9a, 0x25, 0x7f, 0x31, 0x5e, 0x0f, 0x6f, 0x32, 0x96, 0xe4, 0xa4, 0x5f, 0xd1, 0x82, 0xf0, 0x6a, 0x3d, 0x2b, 0xa2, 0x77, 0x9c, 0x10, 0xa4, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1512 = { .name = "ecdsa_brainpoolp384r1_sha384_1512", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1512_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1512_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1512_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1513 for ECDSA, tcId is 110 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1513_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1513_msg[] = { 0x32, 0x31, 0x37, 0x34, 0x36, 0x35, 0x35, 0x34, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1513_sig[] = { 0x52, 0x0b, 0x74, 0xd5, 0xd3, 0x3b, 0xa2, 0x89, 0xff, 0xcc, 0xf5, 0x18, 0x7a, 0x60, 0x00, 0x38, 0x0c, 0x31, 0x30, 0x4b, 0x1d, 0x6f, 0x8f, 0xb5, 0x4d, 0x88, 0x0c, 0x19, 0x08, 0xfb, 0xd8, 0xdf, 0x5e, 0x08, 0x57, 0xff, 0xa8, 0xca, 0x34, 0x4f, 0xf7, 0xa4, 0xfa, 0x9b, 0xb6, 0xed, 0x5f, 0x38, 0x03, 0xae, 0x87, 0x7b, 0xc1, 0xf0, 0xbc, 0x8e, 0x7c, 0x90, 0x39, 0x38, 0x1f, 0x0b, 0x66, 0xa5, 0x20, 0x47, 0x16, 0x3c, 0xb7, 0x8e, 0xab, 0xd7, 0xa3, 0xdb, 0xfc, 0x53, 0x8b, 0x42, 0x4f, 0xef, 0x31, 0xd1, 0xe0, 0xaf, 0x76, 0xc0, 0xe1, 0xbe, 0xd7, 0x93, 0x6a, 0x88, 0x33, 0x8f, 0x1b, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1513 = { .name = "ecdsa_brainpoolp384r1_sha384_1513", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1513_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1513_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1513_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1514 for ECDSA, tcId is 111 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1514_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1514_msg[] = { 0x36, 0x34, 0x34, 0x35, 0x35, 0x30, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1514_sig[] = { 0x59, 0x49, 0x2f, 0x3e, 0x58, 0xb5, 0xba, 0xd9, 0x41, 0x21, 0x05, 0xb4, 0x82, 0x4d, 0xbe, 0x93, 0x9d, 0x7c, 0xb2, 0x86, 0x4a, 0x27, 0x68, 0x06, 0x20, 0xac, 0x10, 0x72, 0x85, 0x50, 0x5c, 0x42, 0xeb, 0xfa, 0xeb, 0x15, 0x4c, 0x4e, 0xb6, 0xd9, 0xe6, 0x78, 0x3a, 0x12, 0xab, 0xaa, 0x35, 0xaa, 0x8b, 0x41, 0x14, 0xca, 0xf3, 0x26, 0x0e, 0x50, 0x96, 0x58, 0x24, 0x3a, 0x5f, 0x41, 0x90, 0xe4, 0x0c, 0x26, 0x8d, 0x01, 0x25, 0x78, 0xdf, 0x86, 0x86, 0x6a, 0x4e, 0x95, 0x03, 0xc8, 0x49, 0x08, 0x04, 0x88, 0x2d, 0x08, 0x12, 0xaa, 0x10, 0x5e, 0x24, 0x5c, 0x8c, 0x46, 0xfb, 0x36, 0x48, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1514 = { .name = "ecdsa_brainpoolp384r1_sha384_1514", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1514_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1514_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1514_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1515 for ECDSA, tcId is 112 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1515_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1515_msg[] = { 0x35, 0x33, 0x32, 0x38, 0x31, 0x38, 0x33, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1515_sig[] = { 0x42, 0x1d, 0xc8, 0x54, 0x47, 0x9a, 0xa6, 0x11, 0x88, 0x7a, 0xa3, 0x68, 0x9b, 0x63, 0x27, 0x6f, 0xbd, 0xc1, 0x6e, 0xc7, 0xd3, 0xdc, 0xa4, 0x49, 0xb4, 0x82, 0xdd, 0x27, 0xb1, 0x40, 0x3c, 0x91, 0x1e, 0xf6, 0x26, 0x5a, 0xd6, 0x25, 0x27, 0x9e, 0x9d, 0x83, 0xce, 0x75, 0x34, 0xf4, 0xac, 0x3f, 0x28, 0x52, 0xe1, 0x6b, 0x42, 0x76, 0x21, 0x5a, 0x62, 0xeb, 0xcb, 0xcf, 0xfa, 0xdd, 0xbd, 0xb2, 0x35, 0x8d, 0xce, 0xa7, 0x08, 0x49, 0x48, 0xbc, 0x94, 0x8f, 0x9b, 0x3d, 0x0f, 0x91, 0x69, 0x3a, 0xba, 0x66, 0x36, 0x2d, 0x4a, 0x2c, 0xec, 0x70, 0xf7, 0x95, 0x2e, 0x37, 0x48, 0x86, 0x21, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1515 = { .name = "ecdsa_brainpoolp384r1_sha384_1515", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1515_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1515_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1515_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1516 for ECDSA, tcId is 113 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1516_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1516_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x30, 0x37, 0x36, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1516_sig[] = { 0x49, 0x11, 0x0e, 0x41, 0x3a, 0xa3, 0xe0, 0x2f, 0xc0, 0x59, 0x37, 0xd1, 0x00, 0xae, 0x4d, 0xb1, 0x4c, 0xf3, 0xf0, 0x03, 0x8b, 0x38, 0x67, 0x9a, 0x4a, 0xa2, 0x97, 0xb1, 0x1f, 0x9c, 0x47, 0xf7, 0xdf, 0x53, 0x8d, 0xf8, 0xce, 0xe3, 0x0e, 0xfd, 0xa4, 0xdd, 0xab, 0x2c, 0xc5, 0x1a, 0x6b, 0x0f, 0x01, 0x8a, 0x09, 0xa1, 0x8e, 0x1e, 0x79, 0x83, 0xe5, 0x2b, 0x8e, 0x6c, 0xc8, 0xda, 0x9c, 0x6d, 0x71, 0x55, 0xc5, 0x40, 0x90, 0x82, 0xf6, 0x95, 0x87, 0x42, 0x09, 0x06, 0xb7, 0x5c, 0xb5, 0x15, 0x7d, 0x37, 0x58, 0xe9, 0x92, 0xb2, 0x23, 0xeb, 0x7e, 0x9c, 0x27, 0x4f, 0xbf, 0xf4, 0xa9, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1516 = { .name = "ecdsa_brainpoolp384r1_sha384_1516", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1516_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1516_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1516_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 113 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1517 for ECDSA, tcId is 114 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1517_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1517_msg[] = { 0x31, 0x35, 0x33, 0x32, 0x38, 0x34, 0x32, 0x32, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1517_sig[] = { 0x88, 0x4c, 0xf6, 0x4c, 0xe7, 0x26, 0xd5, 0x75, 0x8e, 0xfb, 0x9f, 0x2f, 0x35, 0xc9, 0x2d, 0xcc, 0x60, 0x63, 0xb0, 0x1b, 0x74, 0x32, 0xfa, 0xff, 0xd0, 0xf8, 0x18, 0x6a, 0xc1, 0x77, 0xe3, 0x11, 0x29, 0x63, 0x3a, 0x64, 0x8a, 0x1a, 0x69, 0x86, 0x14, 0x83, 0x84, 0xa7, 0xd1, 0xc4, 0xd3, 0xf5, 0x01, 0x85, 0x07, 0x18, 0xd7, 0xa2, 0xd4, 0x1e, 0xb9, 0x89, 0x2f, 0x54, 0x40, 0xef, 0x4b, 0x9f, 0xc8, 0xb9, 0x96, 0xd3, 0xb6, 0x74, 0x2e, 0xae, 0xc3, 0xd4, 0x0b, 0x10, 0xc5, 0xca, 0xa8, 0x90, 0xb9, 0xa8, 0x53, 0xe1, 0xd2, 0x11, 0xf7, 0xfd, 0x11, 0x78, 0x11, 0x6a, 0x9e, 0x7c, 0x5f, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1517 = { .name = "ecdsa_brainpoolp384r1_sha384_1517", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1517_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1517_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1517_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 114 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1518 for ECDSA, tcId is 115 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1518_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1518_msg[] = { 0x31, 0x35, 0x36, 0x37, 0x31, 0x37, 0x37, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1518_sig[] = { 0x0d, 0x9d, 0xbf, 0x8e, 0xbc, 0xf8, 0x0f, 0x25, 0x6e, 0xe2, 0xd1, 0xf4, 0xfb, 0x45, 0xcd, 0x54, 0x33, 0x81, 0xf6, 0x27, 0x5c, 0x4c, 0x10, 0xaf, 0xa8, 0x52, 0x08, 0x82, 0x8e, 0x27, 0xe6, 0xfb, 0x3d, 0xf3, 0xca, 0x74, 0x91, 0x89, 0x9c, 0x68, 0x30, 0x7d, 0xb6, 0x6a, 0x50, 0x5c, 0x7a, 0x90, 0x1f, 0x0d, 0xb2, 0x6d, 0xc6, 0x91, 0x68, 0x08, 0x32, 0xb3, 0xe3, 0x59, 0x90, 0x5e, 0x5e, 0x63, 0x2b, 0xc9, 0xea, 0xef, 0xd1, 0xd5, 0xeb, 0x4f, 0x05, 0x8a, 0x0d, 0x88, 0xf8, 0xf2, 0xdf, 0x0d, 0x1a, 0x60, 0xc2, 0xf7, 0x71, 0x72, 0xca, 0xf6, 0x55, 0x4b, 0x2d, 0x25, 0x6c, 0xce, 0x8c, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1518 = { .name = "ecdsa_brainpoolp384r1_sha384_1518", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1518_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1518_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1518_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 115 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1519 for ECDSA, tcId is 116 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1519_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1519_msg[] = { 0x34, 0x33, 0x30, 0x33, 0x30, 0x39, 0x31, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1519_sig[] = { 0x6f, 0xa1, 0x80, 0x2a, 0xc4, 0xc2, 0xe7, 0x9b, 0x8b, 0x5a, 0x47, 0x7b, 0x0a, 0x5f, 0xeb, 0xf6, 0x30, 0xc2, 0x9c, 0x08, 0x98, 0x41, 0x48, 0x4c, 0x1d, 0x56, 0x9d, 0xae, 0xdb, 0xf1, 0x3c, 0x0b, 0xdf, 0x79, 0x3d, 0x0a, 0x8f, 0x69, 0x15, 0xbd, 0xc6, 0x7d, 0xd1, 0x48, 0x08, 0x24, 0xa1, 0xce, 0x28, 0xb8, 0x06, 0x32, 0x58, 0x11, 0x1e, 0x32, 0xaa, 0x10, 0xaf, 0x0b, 0x20, 0x68, 0xc7, 0xf5, 0x4f, 0x0d, 0x5e, 0x9f, 0x02, 0xad, 0x39, 0xa4, 0x15, 0xc9, 0x17, 0x43, 0xd6, 0x44, 0x4c, 0x20, 0x15, 0x6c, 0x35, 0x92, 0xd2, 0xbc, 0xc2, 0x34, 0xf2, 0x65, 0xb4, 0x6a, 0x35, 0x86, 0x4e, 0x57, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1519 = { .name = "ecdsa_brainpoolp384r1_sha384_1519", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1519_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1519_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1519_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 116 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1520 for ECDSA, tcId is 117 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1520_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1520_msg[] = { 0x37, 0x37, 0x33, 0x35, 0x39, 0x31, 0x35, 0x35, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1520_sig[] = { 0x3d, 0xc1, 0x36, 0x3d, 0xd0, 0x11, 0x9a, 0x50, 0x54, 0xaf, 0xd9, 0x94, 0x84, 0x02, 0x6a, 0x26, 0x92, 0x56, 0x7d, 0x2f, 0xbe, 0xeb, 0x4c, 0x6d, 0x80, 0xa3, 0x0d, 0x22, 0xf1, 0x66, 0xb6, 0x30, 0x45, 0x44, 0x24, 0x6a, 0x35, 0xba, 0x85, 0x4f, 0x85, 0x46, 0x01, 0x39, 0x7c, 0xe4, 0x5b, 0xd5, 0x2b, 0x02, 0x0a, 0x77, 0x09, 0x01, 0x10, 0x8c, 0xe6, 0xdd, 0xf6, 0x91, 0x17, 0xa2, 0xe8, 0x07, 0x34, 0x78, 0x81, 0x71, 0x60, 0x4a, 0x8f, 0x05, 0x71, 0xdb, 0x61, 0xa4, 0xa8, 0xc3, 0xc4, 0xda, 0xe3, 0x3a, 0xf8, 0x41, 0xaf, 0xe4, 0xa9, 0x89, 0x23, 0x06, 0xb4, 0xf9, 0xec, 0xb1, 0x9b, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1520 = { .name = "ecdsa_brainpoolp384r1_sha384_1520", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1520_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1520_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1520_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 117 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1521 for ECDSA, tcId is 118 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1521_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1521_msg[] = { 0x32, 0x34, 0x33, 0x39, 0x36, 0x36, 0x37, 0x34, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1521_sig[] = { 0x7b, 0x98, 0x4b, 0xfa, 0x80, 0x7a, 0x8e, 0x9b, 0x0e, 0xef, 0x94, 0xed, 0x28, 0xc2, 0x4b, 0x04, 0xd4, 0x2e, 0x06, 0x64, 0xfb, 0xfc, 0x0e, 0xe1, 0xc1, 0xb5, 0x94, 0x5c, 0x8f, 0x0e, 0x97, 0xfd, 0xc5, 0x15, 0xfe, 0x09, 0xed, 0xd6, 0xcd, 0xaf, 0x7f, 0xef, 0x31, 0x51, 0xca, 0x40, 0x44, 0xdf, 0x4e, 0x87, 0x87, 0x41, 0x52, 0x9d, 0x7a, 0x90, 0x12, 0x5d, 0xeb, 0x8f, 0xa5, 0xfd, 0xab, 0x8e, 0x9f, 0x7d, 0x25, 0x4b, 0x8a, 0xa4, 0x8a, 0x59, 0xa2, 0xf3, 0x35, 0xc7, 0xd4, 0x34, 0x02, 0xf2, 0x59, 0x0f, 0x10, 0x82, 0xc7, 0x6b, 0x22, 0x63, 0x58, 0x2c, 0x9d, 0xd9, 0x8c, 0xa6, 0x86, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1521 = { .name = "ecdsa_brainpoolp384r1_sha384_1521", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1521_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1521_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1521_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 118 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1522 for ECDSA, tcId is 119 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1522_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1522_msg[] = { 0x34, 0x33, 0x32, 0x37, 0x36, 0x30, 0x32, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1522_sig[] = { 0x87, 0x73, 0x15, 0x25, 0xe7, 0x87, 0x23, 0x9a, 0x23, 0x2b, 0xa3, 0xc2, 0x4b, 0x9c, 0xae, 0xff, 0x3c, 0xe5, 0x91, 0xc1, 0x68, 0x22, 0x7b, 0x8e, 0x28, 0x64, 0x14, 0x0b, 0x1d, 0x7c, 0x0c, 0x50, 0xa7, 0xd5, 0xfa, 0x9f, 0x4f, 0x64, 0x68, 0xbc, 0xa8, 0x17, 0x45, 0x8c, 0x17, 0x1a, 0xa4, 0x47, 0x67, 0x05, 0x98, 0xb6, 0xe5, 0xdf, 0xba, 0xab, 0x3b, 0x62, 0x2b, 0xad, 0x9b, 0x5b, 0x6a, 0xe4, 0x2c, 0x9d, 0x27, 0xbd, 0x45, 0xb1, 0xb0, 0xb8, 0x92, 0xaf, 0x9f, 0xd9, 0x73, 0x9d, 0xd5, 0x04, 0x14, 0xe8, 0xee, 0xde, 0x3c, 0x6d, 0xc1, 0x0f, 0xc2, 0x24, 0x46, 0x3b, 0x44, 0xc8, 0xc2, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1522 = { .name = "ecdsa_brainpoolp384r1_sha384_1522", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1522_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1522_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1522_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 119 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1523 for ECDSA, tcId is 120 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1523_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1523_msg[] = { 0x32, 0x39, 0x33, 0x32, 0x30, 0x30, 0x32, 0x35, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1523_sig[] = { 0x19, 0x01, 0xd0, 0xd8, 0x61, 0x20, 0x5c, 0xc3, 0xe3, 0xf4, 0xa1, 0x89, 0xb8, 0x79, 0xee, 0x24, 0x64, 0x86, 0xf0, 0xcf, 0xdc, 0x48, 0x1d, 0x63, 0x72, 0x73, 0x84, 0xfe, 0xed, 0xc4, 0x6c, 0x8b, 0xad, 0xdf, 0x89, 0x1a, 0x6e, 0x6e, 0xab, 0x6b, 0xed, 0xe4, 0xe4, 0x6b, 0xbf, 0xf1, 0x64, 0x96, 0x40, 0x17, 0xc9, 0xed, 0xda, 0xea, 0x31, 0x12, 0xf2, 0x6f, 0x7c, 0x6e, 0xe4, 0x72, 0xee, 0x19, 0x83, 0xd7, 0xa2, 0x96, 0xa7, 0x40, 0x22, 0x95, 0x79, 0x4f, 0xdd, 0xd9, 0xe2, 0x67, 0xfe, 0x62, 0xd8, 0x5b, 0x07, 0xb9, 0x9e, 0x81, 0xea, 0x51, 0x3e, 0xca, 0x8d, 0x1a, 0x67, 0xe7, 0x05, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1523 = { .name = "ecdsa_brainpoolp384r1_sha384_1523", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1523_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1523_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1523_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 120 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1524 for ECDSA, tcId is 121 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1524_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1524_msg[] = { 0x36, 0x34, 0x30, 0x39, 0x38, 0x37, 0x37, 0x32, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1524_sig[] = { 0x04, 0x14, 0x3d, 0x73, 0xf1, 0x40, 0xfe, 0xba, 0xc8, 0xfd, 0x4d, 0x67, 0x62, 0xb9, 0xa5, 0x5b, 0xc9, 0x32, 0x64, 0xcc, 0x33, 0x72, 0xbf, 0x16, 0x61, 0xb3, 0x5a, 0x4b, 0x11, 0xbe, 0x9a, 0xf7, 0x91, 0x0d, 0x3a, 0xa8, 0xe4, 0xf5, 0xcb, 0x5e, 0xaf, 0xe1, 0xde, 0x3a, 0x9d, 0x96, 0x95, 0x77, 0x59, 0x66, 0xb4, 0xe1, 0xe9, 0xef, 0x78, 0xe5, 0x23, 0x91, 0x6d, 0xbe, 0xa3, 0x7e, 0x03, 0xec, 0xc3, 0x56, 0xf4, 0x66, 0x44, 0x1d, 0xc4, 0x5b, 0x9b, 0x98, 0xfe, 0x6d, 0x09, 0xaf, 0x83, 0xe7, 0xd5, 0x7a, 0x86, 0x1c, 0x5d, 0x2c, 0xf9, 0x4b, 0xf0, 0xb8, 0x7f, 0x62, 0x75, 0x2b, 0x28, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1524 = { .name = "ecdsa_brainpoolp384r1_sha384_1524", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1524_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1524_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1524_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 121 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1525 for ECDSA, tcId is 122 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1525_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1525_msg[] = { 0x36, 0x30, 0x37, 0x35, 0x36, 0x39, 0x30, 0x34, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1525_sig[] = { 0x5d, 0x24, 0xa6, 0xcb, 0x0a, 0x9f, 0x7f, 0x8b, 0x9f, 0x8d, 0x72, 0xda, 0x98, 0x9f, 0xcb, 0xe8, 0x5c, 0x94, 0x48, 0xb4, 0x25, 0xa3, 0x68, 0x20, 0x7f, 0xce, 0x84, 0x21, 0xe5, 0xa6, 0x0f, 0x02, 0x91, 0x84, 0xf1, 0x86, 0x11, 0xb9, 0xa5, 0xa1, 0xeb, 0x66, 0xd0, 0x54, 0xd3, 0x60, 0x57, 0xda, 0x32, 0xb8, 0xa4, 0xd4, 0xac, 0xa1, 0x7e, 0x83, 0x35, 0xd8, 0x4f, 0x2a, 0x68, 0xd7, 0x4f, 0x38, 0xd8, 0xcc, 0xe5, 0x29, 0x7e, 0xfe, 0x9e, 0x6d, 0x0e, 0x1a, 0x8e, 0x5b, 0xed, 0x1b, 0x57, 0x59, 0xbc, 0xb7, 0x3c, 0xff, 0x28, 0x06, 0x29, 0x63, 0xa2, 0x8b, 0xbc, 0x1c, 0x57, 0x1e, 0x3e, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1525 = { .name = "ecdsa_brainpoolp384r1_sha384_1525", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1525_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1525_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1525_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 122 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1526 for ECDSA, tcId is 123 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1526_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1526_msg[] = { 0x32, 0x33, 0x32, 0x31, 0x36, 0x32, 0x33, 0x31, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1526_sig[] = { 0x1d, 0x10, 0xc1, 0xec, 0x20, 0x3f, 0xa0, 0x5d, 0xee, 0xd6, 0x26, 0x44, 0xb8, 0x09, 0x15, 0x0c, 0xd5, 0xe3, 0xfa, 0x15, 0xc9, 0x12, 0x91, 0x56, 0xfb, 0xc0, 0x47, 0x77, 0x42, 0x32, 0x8d, 0x8d, 0x35, 0xb1, 0xc4, 0xca, 0x8b, 0xaa, 0x61, 0x38, 0xe2, 0xe1, 0x29, 0x36, 0xa0, 0xf4, 0xc3, 0x32, 0x4a, 0x02, 0x9b, 0xb5, 0x2d, 0xdf, 0xb1, 0x71, 0xe4, 0xb1, 0x25, 0xd3, 0x32, 0x6d, 0xee, 0xc4, 0x88, 0xcc, 0x9f, 0x6f, 0x2b, 0x36, 0xd0, 0x51, 0xa3, 0x5d, 0x75, 0xc1, 0xde, 0x4b, 0x7a, 0xbd, 0x17, 0x8c, 0x7d, 0x43, 0x90, 0xe5, 0x11, 0xf1, 0x4d, 0x58, 0xf4, 0x9b, 0xae, 0xf6, 0x2d, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1526 = { .name = "ecdsa_brainpoolp384r1_sha384_1526", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1526_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1526_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1526_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 123 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1527 for ECDSA, tcId is 124 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1527_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1527_msg[] = { 0x36, 0x34, 0x31, 0x30, 0x31, 0x35, 0x32, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1527_sig[] = { 0x2d, 0xcd, 0xa3, 0x11, 0x89, 0xd8, 0xd1, 0x79, 0xf7, 0xde, 0xff, 0x20, 0x8a, 0xea, 0x8b, 0xdf, 0xe0, 0xcb, 0x08, 0xa6, 0xda, 0x46, 0xf6, 0x63, 0xc5, 0xca, 0x64, 0x9c, 0x84, 0xd8, 0xfe, 0xc9, 0xc4, 0x49, 0x59, 0x21, 0xc7, 0x79, 0x1d, 0x32, 0xac, 0xa4, 0x25, 0x57, 0xc3, 0xbf, 0x65, 0x8b, 0x67, 0x53, 0x6e, 0x33, 0x64, 0x28, 0xbd, 0xdf, 0xb0, 0x86, 0x2b, 0xff, 0x5b, 0xf5, 0xd5, 0xb1, 0x69, 0x4b, 0x82, 0xc1, 0xe1, 0x48, 0x54, 0x98, 0xe1, 0x4f, 0xe5, 0xc8, 0x8f, 0x75, 0xa9, 0xd7, 0xf5, 0x20, 0x11, 0x5a, 0x35, 0x70, 0x3c, 0xc3, 0x0b, 0xa0, 0xce, 0x97, 0x38, 0x15, 0x18, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1527 = { .name = "ecdsa_brainpoolp384r1_sha384_1527", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1527_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1527_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1527_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 124 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1528 for ECDSA, tcId is 125 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1528_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1528_msg[] = { 0x38, 0x33, 0x37, 0x32, 0x38, 0x35, 0x37, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1528_sig[] = { 0x2c, 0xb8, 0x1c, 0x03, 0xc3, 0xce, 0xfc, 0x41, 0x7f, 0xc6, 0x0f, 0x19, 0xb7, 0x40, 0xe2, 0x30, 0x98, 0x2e, 0x0b, 0x1c, 0x68, 0xce, 0xd1, 0x21, 0x21, 0x30, 0x0d, 0x53, 0x3f, 0x48, 0x55, 0x97, 0xd1, 0xc5, 0x32, 0xd8, 0x7b, 0x23, 0x5d, 0x13, 0x6b, 0xe3, 0xa4, 0x3d, 0xd8, 0x58, 0x82, 0xca, 0x48, 0xa0, 0x4c, 0x5d, 0x8d, 0x86, 0x7e, 0x88, 0x49, 0xbd, 0x3b, 0x98, 0x1f, 0x01, 0x06, 0x91, 0xf0, 0xe7, 0x42, 0x28, 0x82, 0x57, 0x3b, 0xd5, 0xbf, 0xcc, 0x33, 0xd6, 0xf0, 0x69, 0xa6, 0x22, 0xd1, 0x59, 0xca, 0x71, 0xbd, 0x56, 0x25, 0x02, 0xec, 0x00, 0x1b, 0xd2, 0xb4, 0x53, 0x71, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1528 = { .name = "ecdsa_brainpoolp384r1_sha384_1528", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1528_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1528_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1528_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 125 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1529 for ECDSA, tcId is 126 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1529_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1529_msg[] = { 0x33, 0x33, 0x32, 0x34, 0x37, 0x30, 0x34, 0x35, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1529_sig[] = { 0x15, 0x24, 0x64, 0x66, 0x8c, 0xef, 0xda, 0x80, 0xde, 0xa5, 0x23, 0x2d, 0x36, 0xbf, 0x24, 0x0a, 0xc3, 0x25, 0xe3, 0xca, 0x27, 0x9d, 0x8c, 0x8e, 0x04, 0x58, 0x30, 0x6b, 0x18, 0xfb, 0x12, 0xac, 0x1e, 0xd1, 0x65, 0x86, 0xd2, 0xd0, 0x75, 0x62, 0x69, 0x1c, 0x32, 0x05, 0xeb, 0xb4, 0xc7, 0x74, 0x3c, 0x38, 0x55, 0x67, 0x26, 0x92, 0x79, 0xe9, 0xbc, 0x5a, 0x2d, 0x07, 0x6a, 0xe9, 0xa0, 0x9e, 0x79, 0x0d, 0x1d, 0x8d, 0x08, 0x97, 0x88, 0x71, 0xdf, 0xc5, 0x86, 0x29, 0x8f, 0x56, 0x12, 0x1b, 0x4b, 0xc8, 0x4f, 0x78, 0x91, 0xe9, 0x1c, 0x3d, 0x76, 0x12, 0x24, 0x9d, 0x32, 0x0e, 0x36, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1529 = { .name = "ecdsa_brainpoolp384r1_sha384_1529", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1529_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1529_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1529_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 126 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1530 for ECDSA, tcId is 127 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1530_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1530_msg[] = { 0x31, 0x34, 0x30, 0x33, 0x39, 0x36, 0x36, 0x38, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1530_sig[] = { 0x05, 0x25, 0x95, 0xa1, 0x6d, 0x03, 0xa1, 0x38, 0xd6, 0x56, 0xde, 0xc7, 0x5a, 0x55, 0x40, 0xb8, 0x0f, 0x7e, 0xfe, 0x63, 0xb1, 0x93, 0x25, 0x0d, 0xe3, 0xbf, 0x81, 0x1f, 0xb2, 0x79, 0x9d, 0x7e, 0xb9, 0xa6, 0xae, 0x27, 0x4a, 0xc9, 0x53, 0xa8, 0xfb, 0xee, 0x74, 0x1d, 0xc1, 0xf5, 0x21, 0x00, 0x55, 0xf0, 0x59, 0x4f, 0xfa, 0x8d, 0x32, 0xb9, 0x1e, 0xea, 0x8b, 0xf0, 0x79, 0xb8, 0xf5, 0xa9, 0xf6, 0xb6, 0x08, 0x88, 0x50, 0x02, 0x25, 0x01, 0x60, 0x95, 0xb3, 0xe7, 0x11, 0x81, 0xff, 0x32, 0xdb, 0xab, 0xca, 0xa5, 0xe9, 0x92, 0xb4, 0x34, 0x09, 0xf5, 0x54, 0x67, 0xbb, 0xb6, 0x51, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1530 = { .name = "ecdsa_brainpoolp384r1_sha384_1530", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1530_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1530_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1530_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 127 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1531 for ECDSA, tcId is 128 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1531_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1531_msg[] = { 0x31, 0x32, 0x32, 0x37, 0x36, 0x30, 0x35, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1531_sig[] = { 0x29, 0x6f, 0x6b, 0x38, 0x51, 0x55, 0x32, 0x03, 0x82, 0x2d, 0x74, 0x17, 0xc1, 0x76, 0xeb, 0x3e, 0xc5, 0xe5, 0x56, 0xe3, 0x52, 0xd2, 0x4f, 0x28, 0x34, 0xbb, 0xdf, 0x70, 0x89, 0xa1, 0x68, 0xe6, 0x37, 0xf3, 0xe8, 0x09, 0x99, 0xe7, 0xa8, 0x61, 0x14, 0x66, 0xde, 0xc3, 0x70, 0x59, 0x00, 0x29, 0x64, 0xf7, 0x96, 0x94, 0x5f, 0x53, 0xfe, 0x0b, 0x27, 0xbb, 0xfb, 0xc5, 0xb5, 0xe9, 0x57, 0xd4, 0x13, 0x2c, 0x24, 0xc8, 0xb4, 0x62, 0x07, 0x5e, 0x82, 0x1b, 0xca, 0x24, 0x98, 0x3e, 0x8b, 0x8f, 0x85, 0x05, 0x31, 0x61, 0x7a, 0x42, 0xed, 0x31, 0x57, 0xdb, 0xe2, 0x0e, 0xab, 0x31, 0xcb, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1531 = { .name = "ecdsa_brainpoolp384r1_sha384_1531", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1531_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1531_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1531_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 128 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1532 for ECDSA, tcId is 129 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1532_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1532_msg[] = { 0x34, 0x39, 0x35, 0x31, 0x34, 0x38, 0x38, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1532_sig[] = { 0x61, 0x93, 0x80, 0x55, 0x8c, 0xd1, 0x4a, 0xc9, 0x09, 0xb5, 0x65, 0xe0, 0x49, 0xaf, 0xa2, 0x24, 0xf7, 0xe7, 0x20, 0xaf, 0x1b, 0x22, 0xe1, 0x8b, 0x59, 0xcb, 0x05, 0x5f, 0xdc, 0x0f, 0x19, 0x1d, 0xef, 0xf4, 0x6a, 0x60, 0x50, 0xd1, 0x64, 0x2c, 0x56, 0x36, 0xc0, 0x32, 0xe9, 0xa7, 0xb4, 0x6b, 0x3c, 0x3f, 0xd2, 0xf2, 0x78, 0xf0, 0x79, 0x54, 0x93, 0x6c, 0x61, 0x83, 0xda, 0x8a, 0xaf, 0xc0, 0xf6, 0x13, 0x19, 0xd9, 0xa9, 0x0b, 0x7d, 0x3d, 0xd1, 0x1a, 0xbe, 0x13, 0xe5, 0x5e, 0x2a, 0xfa, 0x81, 0x51, 0x2f, 0x38, 0x4c, 0x13, 0x33, 0x1a, 0xf1, 0xd6, 0xfb, 0x4d, 0x7c, 0x69, 0x29, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1532 = { .name = "ecdsa_brainpoolp384r1_sha384_1532", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1532_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1532_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1532_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 129 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1533 for ECDSA, tcId is 130 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1533_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1533_msg[] = { 0x32, 0x34, 0x35, 0x32, 0x31, 0x32, 0x37, 0x30, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1533_sig[] = { 0x35, 0x4e, 0xe9, 0x49, 0xbf, 0xac, 0xa3, 0x5b, 0x19, 0x34, 0xe8, 0x8e, 0x03, 0x6b, 0x7f, 0x37, 0x60, 0x06, 0xb7, 0x98, 0x86, 0x13, 0x3d, 0x07, 0xff, 0x4a, 0xea, 0x3e, 0x05, 0x7e, 0xee, 0xee, 0xc0, 0xb9, 0x3f, 0x62, 0x99, 0x61, 0xc9, 0xac, 0x1e, 0xe1, 0x88, 0xc1, 0xc8, 0x7e, 0x2c, 0xd2, 0x1d, 0x02, 0x62, 0x4a, 0x91, 0x10, 0xf7, 0xba, 0xd6, 0x3e, 0xf7, 0x0e, 0x13, 0x4a, 0x7f, 0xf5, 0x72, 0xd7, 0x72, 0xaa, 0xe3, 0x0b, 0x4d, 0xe6, 0x79, 0x49, 0x4d, 0x00, 0xba, 0x9c, 0xd8, 0x35, 0xd4, 0xec, 0x84, 0x0d, 0x77, 0x2a, 0xf9, 0xf7, 0xc0, 0xb0, 0xda, 0xe8, 0xca, 0xd3, 0x83, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1533 = { .name = "ecdsa_brainpoolp384r1_sha384_1533", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1533_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1533_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1533_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 130 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1534 for ECDSA, tcId is 131 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1534_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1534_msg[] = { 0x31, 0x37, 0x33, 0x31, 0x35, 0x35, 0x30, 0x37, 0x30, 0x36, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1534_sig[] = { 0x88, 0x1e, 0x4e, 0xae, 0xff, 0x3d, 0x3e, 0xd1, 0x73, 0xda, 0xa1, 0x66, 0x22, 0x3d, 0x95, 0x83, 0xac, 0x8d, 0xd2, 0x8a, 0x31, 0x07, 0x65, 0xe7, 0x26, 0x1b, 0x0f, 0xf5, 0x2b, 0x2b, 0x3f, 0xaf, 0xee, 0x80, 0x5d, 0x61, 0x32, 0x58, 0xad, 0xd6, 0xd0, 0x56, 0x15, 0x7c, 0xcc, 0x40, 0xda, 0x73, 0x53, 0xbc, 0x28, 0xcf, 0xfd, 0xed, 0xab, 0x64, 0x52, 0x16, 0x1e, 0x05, 0x51, 0x71, 0x94, 0xe6, 0x6a, 0xfc, 0xc1, 0x4d, 0x10, 0x7d, 0x1e, 0x5d, 0xed, 0x72, 0x9f, 0x66, 0x1c, 0xd6, 0x63, 0x0d, 0x8b, 0x65, 0x81, 0xa8, 0xc2, 0x52, 0x51, 0xed, 0x7c, 0x4b, 0x5c, 0x36, 0x41, 0x29, 0xb5, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1534 = { .name = "ecdsa_brainpoolp384r1_sha384_1534", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1534_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1534_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1534_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 131 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1535 for ECDSA, tcId is 132 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1535_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1535_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x30, 0x36, 0x39, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1535_sig[] = { 0x17, 0x34, 0xf6, 0x66, 0xae, 0x2d, 0x87, 0x27, 0x1d, 0x9e, 0xde, 0x0d, 0xa5, 0x3b, 0xa8, 0xfc, 0x6c, 0xc2, 0xf8, 0x3e, 0xdc, 0x15, 0xdd, 0x26, 0xb9, 0x34, 0x9c, 0x9e, 0x4c, 0xc5, 0x38, 0x04, 0x34, 0xfc, 0x37, 0xb4, 0xff, 0xcf, 0xd9, 0xb7, 0x81, 0xf0, 0x71, 0x25, 0xd8, 0x5d, 0xd6, 0x60, 0x53, 0x1d, 0xae, 0xd4, 0xb8, 0x55, 0xe9, 0x11, 0x7a, 0x1e, 0xba, 0xfa, 0x23, 0x2f, 0x06, 0xb4, 0x7f, 0x50, 0xbe, 0x43, 0x86, 0xdb, 0x27, 0xff, 0xa5, 0xce, 0xca, 0x3e, 0x24, 0x7b, 0xe9, 0x54, 0x97, 0x56, 0x5c, 0x0c, 0x97, 0xb4, 0x37, 0xd3, 0x2d, 0x76, 0x94, 0x97, 0x4b, 0x22, 0xf2, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1535 = { .name = "ecdsa_brainpoolp384r1_sha384_1535", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1535_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1535_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1535_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 132 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1536 for ECDSA, tcId is 133 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1536_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1536_msg[] = { 0x34, 0x34, 0x31, 0x35, 0x34, 0x37, 0x36, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1536_sig[] = { 0x29, 0x69, 0x17, 0xdd, 0x85, 0x47, 0x5f, 0x8e, 0x7b, 0x6f, 0x85, 0x8e, 0x84, 0x74, 0x0b, 0xfa, 0x96, 0x79, 0x96, 0xe1, 0x73, 0xd6, 0x3d, 0x85, 0xaa, 0x08, 0xf1, 0xb6, 0xd3, 0x68, 0x30, 0x97, 0x39, 0x5e, 0x4a, 0x76, 0x48, 0xd1, 0x4e, 0x0b, 0xed, 0xbb, 0xe3, 0x66, 0x7d, 0x3d, 0xb4, 0xf5, 0x4d, 0x3e, 0x02, 0x79, 0xe9, 0x3b, 0xb1, 0x92, 0xf2, 0x44, 0x18, 0xa0, 0xa0, 0x5b, 0xf1, 0x72, 0x38, 0xdc, 0xf7, 0x8d, 0xbe, 0x83, 0x43, 0xe5, 0x5a, 0x66, 0x34, 0x18, 0x10, 0x6d, 0x7a, 0xe2, 0x28, 0x45, 0x94, 0x34, 0x59, 0xb2, 0x64, 0x1f, 0x45, 0xef, 0x4e, 0xd6, 0x06, 0xc5, 0x34, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1536 = { .name = "ecdsa_brainpoolp384r1_sha384_1536", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1536_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1536_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1536_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 133 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1537 for ECDSA, tcId is 134 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1537_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1537_msg[] = { 0x34, 0x32, 0x33, 0x39, 0x34, 0x34, 0x39, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1537_sig[] = { 0x47, 0xf3, 0x15, 0x0d, 0xb2, 0xf4, 0xfa, 0x59, 0x8e, 0xc2, 0x5d, 0xfe, 0x86, 0x4e, 0x11, 0xf9, 0x2b, 0xbd, 0xd5, 0xd6, 0x04, 0x6a, 0xef, 0x74, 0x4b, 0x79, 0x4f, 0x56, 0x70, 0x4e, 0x32, 0x3c, 0xde, 0x1e, 0xb6, 0xea, 0xbd, 0xc3, 0xf7, 0x2f, 0x89, 0x40, 0xd6, 0xa6, 0xfb, 0x30, 0xa1, 0xc8, 0x4e, 0x41, 0xa7, 0x4f, 0x6f, 0x6c, 0xd1, 0x95, 0x0d, 0xf4, 0x11, 0x33, 0xc5, 0x86, 0x08, 0xfb, 0xd8, 0xfb, 0x92, 0xb1, 0x7b, 0xd3, 0xbf, 0xbe, 0xb1, 0xc1, 0xcc, 0x77, 0x84, 0x89, 0xa4, 0xfc, 0xf8, 0x84, 0xe8, 0x00, 0x65, 0x46, 0xcb, 0x69, 0xfa, 0x9d, 0x34, 0x92, 0x65, 0x2d, 0x12, 0x55, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1537 = { .name = "ecdsa_brainpoolp384r1_sha384_1537", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1537_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1537_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1537_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 134 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1538 for ECDSA, tcId is 135 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1538_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1538_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x36, 0x32, 0x30, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1538_sig[] = { 0x41, 0xb9, 0x03, 0xc2, 0x55, 0xe9, 0x0c, 0xb7, 0x19, 0xb7, 0x46, 0x84, 0xed, 0x97, 0x00, 0xa9, 0x24, 0x36, 0x2e, 0xcd, 0x1c, 0xc8, 0xce, 0x35, 0xb4, 0x4d, 0xaa, 0x1d, 0x41, 0xe3, 0xae, 0x2a, 0xd3, 0xdf, 0x2d, 0x01, 0xb9, 0x10, 0x03, 0x37, 0xef, 0xba, 0xb6, 0x8c, 0x53, 0xc6, 0xc7, 0x6b, 0x47, 0x1f, 0x45, 0x1c, 0x32, 0x40, 0x25, 0xdd, 0xbf, 0xbe, 0x35, 0x9f, 0x1d, 0x3a, 0xc5, 0xe4, 0x0f, 0x71, 0x2b, 0x4e, 0x8a, 0xe0, 0xbb, 0x31, 0x6f, 0x54, 0xa1, 0xae, 0x1d, 0xef, 0x08, 0xc9, 0x5f, 0x53, 0xec, 0xc5, 0x1a, 0xfc, 0x37, 0x5d, 0xe4, 0x36, 0x8d, 0x03, 0xd5, 0x09, 0x59, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1538 = { .name = "ecdsa_brainpoolp384r1_sha384_1538", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1538_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1538_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1538_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 135 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1539 for ECDSA, tcId is 136 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1539_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1539_msg[] = { 0x32, 0x31, 0x36, 0x34, 0x36, 0x36, 0x36, 0x32, 0x38, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1539_sig[] = { 0x61, 0xb9, 0xb0, 0x42, 0xfd, 0x65, 0x4c, 0xa9, 0xc6, 0x85, 0xaa, 0xab, 0x03, 0xed, 0x05, 0x44, 0xe3, 0x9e, 0x18, 0x48, 0x37, 0x05, 0x37, 0xa0, 0xd0, 0xac, 0x42, 0xea, 0x74, 0x53, 0xd6, 0x85, 0x37, 0x95, 0x69, 0x5d, 0xda, 0x8f, 0x4c, 0x34, 0x9b, 0x89, 0x7c, 0x2f, 0x61, 0xf9, 0x50, 0x36, 0x63, 0x4d, 0x5a, 0x0a, 0x8c, 0x85, 0x71, 0xf7, 0x68, 0x5c, 0x6c, 0x4b, 0x68, 0xde, 0x8b, 0x29, 0x16, 0xd8, 0xaf, 0x22, 0x33, 0x69, 0x3a, 0x17, 0x39, 0x9a, 0xcb, 0x60, 0x48, 0xa4, 0xd1, 0x41, 0x6e, 0xd3, 0xb2, 0xf9, 0x1b, 0x78, 0x53, 0x86, 0x8d, 0xef, 0x58, 0xa0, 0xea, 0xdd, 0xce, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1539 = { .name = "ecdsa_brainpoolp384r1_sha384_1539", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1539_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1539_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1539_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 136 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1540 for ECDSA, tcId is 137 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1540_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1540_msg[] = { 0x31, 0x39, 0x34, 0x32, 0x38, 0x35, 0x33, 0x38, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1540_sig[] = { 0x1a, 0xc6, 0xec, 0x44, 0x2c, 0xbc, 0xea, 0x48, 0xa8, 0xc4, 0x04, 0xac, 0x27, 0xe4, 0x2e, 0x21, 0x22, 0xa1, 0x21, 0xef, 0x84, 0x84, 0xbd, 0x91, 0xc0, 0x4a, 0xa2, 0x59, 0x43, 0x8f, 0xed, 0x1e, 0xe8, 0xa8, 0x0b, 0xa5, 0x94, 0x64, 0xb8, 0xa4, 0x35, 0x10, 0x89, 0x92, 0x3b, 0xb0, 0x1e, 0x92, 0x78, 0xc0, 0xed, 0x4e, 0xea, 0x7f, 0xed, 0xda, 0x04, 0xda, 0xd0, 0xd3, 0xf0, 0xd2, 0x28, 0xbc, 0x54, 0x14, 0x8b, 0x12, 0x38, 0xc6, 0x34, 0x28, 0xfc, 0x39, 0xa7, 0x72, 0x14, 0x69, 0x47, 0x79, 0x89, 0x65, 0xca, 0xf7, 0xec, 0x92, 0x76, 0xa0, 0x5a, 0x97, 0x2c, 0xa1, 0xe4, 0x21, 0x8f, 0x84, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1540 = { .name = "ecdsa_brainpoolp384r1_sha384_1540", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1540_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1540_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1540_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 137 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1541 for ECDSA, tcId is 138 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1541_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1541_msg[] = { 0x32, 0x32, 0x31, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1541_sig[] = { 0x6d, 0xf0, 0xb3, 0x64, 0x56, 0xbd, 0xcf, 0x91, 0xf6, 0x65, 0x7d, 0x05, 0xb9, 0x37, 0x38, 0x77, 0x1f, 0x18, 0x39, 0x12, 0xe2, 0x7b, 0x9f, 0xd8, 0x88, 0xaf, 0x48, 0x50, 0xb3, 0xd9, 0x79, 0xc4, 0xb7, 0xcb, 0x04, 0x2f, 0x27, 0xe3, 0x86, 0x15, 0xf0, 0x54, 0xd5, 0x17, 0x59, 0x38, 0x13, 0x18, 0x6a, 0x63, 0x8b, 0xe5, 0xf7, 0x7c, 0xbe, 0xc3, 0x7a, 0x97, 0x66, 0x03, 0x6e, 0xfb, 0xc9, 0x00, 0x49, 0x8e, 0xe4, 0xfc, 0x85, 0x0a, 0xc9, 0x83, 0xe5, 0xb6, 0x02, 0xc9, 0x48, 0x30, 0x38, 0xda, 0x98, 0x73, 0x74, 0xd7, 0x55, 0xaa, 0x08, 0x9c, 0xfd, 0x50, 0xbf, 0x2c, 0xc2, 0xde, 0x3b, 0x95, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1541 = { .name = "ecdsa_brainpoolp384r1_sha384_1541", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1541_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1541_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1541_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 138 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1542 for ECDSA, tcId is 139 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1542_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1542_msg[] = { 0x39, 0x32, 0x36, 0x39, 0x33, 0x33, 0x34, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1542_sig[] = { 0x31, 0xc8, 0x68, 0xd4, 0xf0, 0x28, 0xe3, 0x18, 0xc6, 0x91, 0x3a, 0x8d, 0x1a, 0xf0, 0x8a, 0xbb, 0x1f, 0x8a, 0xd9, 0x61, 0xa8, 0x53, 0x38, 0xf8, 0xba, 0xed, 0x7c, 0xbd, 0x8d, 0x79, 0xe1, 0x33, 0x7f, 0x35, 0xbe, 0x3b, 0x03, 0xf1, 0xf6, 0x2c, 0x03, 0x3f, 0x13, 0x88, 0xd6, 0x2b, 0x70, 0x1e, 0x77, 0xa8, 0xd6, 0x3d, 0xe6, 0x8f, 0x69, 0xca, 0x29, 0x9a, 0xa3, 0xeb, 0xab, 0x08, 0x36, 0xd1, 0xe7, 0x17, 0x28, 0x5b, 0xf4, 0x03, 0x68, 0x3e, 0x03, 0x21, 0x0b, 0xd2, 0xa3, 0x33, 0xd7, 0xb6, 0x19, 0x84, 0xd1, 0xe1, 0x39, 0x18, 0x91, 0x3c, 0x8d, 0x1e, 0x7d, 0x6a, 0x93, 0xab, 0x7f, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1542 = { .name = "ecdsa_brainpoolp384r1_sha384_1542", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1542_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1542_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1542_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 139 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1543 for ECDSA, tcId is 140 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1543_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1543_msg[] = { 0x37, 0x36, 0x39, 0x33, 0x38, 0x36, 0x33, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1543_sig[] = { 0x7d, 0x45, 0xc7, 0xdf, 0xa5, 0x9f, 0x13, 0x83, 0x0e, 0x9d, 0xd7, 0x9a, 0x28, 0x3e, 0x21, 0x29, 0xd5, 0x82, 0x9b, 0xe4, 0xcb, 0x84, 0xe0, 0x43, 0x69, 0xed, 0x3b, 0xfa, 0xa0, 0x8f, 0xdb, 0x38, 0xea, 0x64, 0x3c, 0xce, 0xda, 0x16, 0x3f, 0xdb, 0xe5, 0x01, 0x66, 0x23, 0xd3, 0xf1, 0xe4, 0x1e, 0x5b, 0x51, 0xf7, 0xb0, 0xca, 0x78, 0x01, 0x25, 0xdd, 0x6f, 0x60, 0xd3, 0xb4, 0x09, 0x23, 0xfc, 0xaf, 0xe6, 0xe0, 0xd4, 0x9b, 0x84, 0xb3, 0xdb, 0xe5, 0x08, 0xbb, 0x16, 0x94, 0x59, 0x49, 0x5a, 0x84, 0x20, 0x02, 0x8a, 0x3e, 0x44, 0x84, 0x41, 0x20, 0x48, 0x42, 0x9e, 0x67, 0xca, 0x60, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1543 = { .name = "ecdsa_brainpoolp384r1_sha384_1543", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1543_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1543_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1543_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 140 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1544 for ECDSA, tcId is 141 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1544_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1544_msg[] = { 0x32, 0x37, 0x33, 0x35, 0x39, 0x33, 0x30, 0x35, 0x37, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1544_sig[] = { 0x87, 0x32, 0x95, 0x1e, 0x64, 0xe1, 0x5e, 0xc1, 0x20, 0x33, 0x32, 0xb9, 0xca, 0x9a, 0x1d, 0xfb, 0xed, 0xdf, 0xb0, 0xd1, 0x23, 0x1d, 0x0e, 0x28, 0x98, 0xc0, 0x99, 0xf7, 0x5e, 0xfd, 0x4d, 0xe9, 0xa4, 0x6d, 0xb9, 0xa7, 0x80, 0x53, 0x9b, 0xb0, 0xe2, 0x84, 0x35, 0xd5, 0xb2, 0x97, 0x00, 0x78, 0x86, 0xb2, 0x11, 0x84, 0x54, 0x2c, 0xe5, 0x0d, 0x04, 0x6d, 0x49, 0xec, 0x53, 0x9d, 0x33, 0x56, 0x9a, 0x5c, 0xc4, 0x5c, 0x64, 0x32, 0xd9, 0x65, 0xfb, 0x4c, 0x45, 0x5c, 0x63, 0xd4, 0x48, 0x19, 0x43, 0x55, 0x77, 0x1d, 0x7d, 0xdc, 0x47, 0xaf, 0x74, 0xfd, 0x28, 0x27, 0xe1, 0xd7, 0x2e, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1544 = { .name = "ecdsa_brainpoolp384r1_sha384_1544", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1544_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1544_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1544_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 141 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1545 for ECDSA, tcId is 142 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1545_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1545_msg[] = { 0x38, 0x33, 0x30, 0x30, 0x35, 0x36, 0x34, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1545_sig[] = { 0x26, 0x31, 0xc7, 0x59, 0xa6, 0xa8, 0x69, 0x14, 0x16, 0x07, 0x66, 0xb9, 0x4a, 0x4e, 0x4f, 0x47, 0x4a, 0x0a, 0xd6, 0x79, 0xb5, 0xaf, 0xed, 0x8a, 0x72, 0x37, 0xea, 0xc7, 0x73, 0xc6, 0xb0, 0xd6, 0x7f, 0xf3, 0xec, 0x36, 0xdf, 0x37, 0x30, 0xe8, 0x1a, 0xde, 0xba, 0x58, 0xd6, 0xe2, 0x95, 0x17, 0x16, 0x20, 0x9d, 0xcc, 0x92, 0x37, 0xa9, 0xae, 0x32, 0xd8, 0x62, 0xb3, 0x31, 0x53, 0x94, 0x3f, 0x1e, 0xaf, 0x2a, 0x92, 0x14, 0x6a, 0xf7, 0x73, 0xcf, 0x3e, 0x5b, 0xba, 0x48, 0xa8, 0x55, 0x1d, 0x9c, 0x2f, 0xa1, 0x2a, 0x01, 0xdf, 0xf3, 0xb0, 0x05, 0x42, 0x6c, 0xda, 0xff, 0x05, 0xa8, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1545 = { .name = "ecdsa_brainpoolp384r1_sha384_1545", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1545_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1545_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1545_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 142 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1546 for ECDSA, tcId is 143 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1546_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1546_msg[] = { 0x34, 0x33, 0x30, 0x37, 0x36, 0x35, 0x35, 0x37, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1546_sig[] = { 0x59, 0xb1, 0x2f, 0x62, 0x20, 0xb0, 0x46, 0xb0, 0x8f, 0x89, 0x2d, 0x69, 0xba, 0xef, 0xc8, 0x1c, 0x51, 0x0c, 0xc2, 0x5a, 0xd0, 0x90, 0x61, 0x6b, 0x35, 0x06, 0x06, 0x08, 0x42, 0x16, 0xe6, 0xc4, 0x0e, 0x1d, 0x8c, 0xd9, 0x6a, 0x1b, 0x31, 0x5e, 0x64, 0xce, 0x1d, 0x84, 0x98, 0x6d, 0x89, 0xac, 0x39, 0x94, 0xa6, 0x85, 0x2b, 0x23, 0x77, 0xdc, 0xc8, 0x09, 0x35, 0xe2, 0xea, 0x1e, 0xaf, 0x78, 0x89, 0xed, 0x69, 0x4c, 0xd3, 0x21, 0xbb, 0xda, 0x34, 0x2d, 0xbd, 0x57, 0xed, 0xe1, 0xa4, 0x7c, 0x2b, 0x30, 0xde, 0x46, 0xbb, 0x05, 0xca, 0xc6, 0x6a, 0x62, 0x35, 0xc4, 0xbb, 0x29, 0x0c, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1546 = { .name = "ecdsa_brainpoolp384r1_sha384_1546", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1546_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1546_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1546_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 143 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1547 for ECDSA, tcId is 144 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1547_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1547_msg[] = { 0x39, 0x36, 0x35, 0x37, 0x30, 0x31, 0x38, 0x31, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1547_sig[] = { 0x4f, 0x69, 0x18, 0x0f, 0xb6, 0x60, 0x59, 0x7f, 0x8e, 0x70, 0x33, 0x4b, 0x7b, 0x6f, 0xa9, 0x7e, 0x59, 0x28, 0xa6, 0xc1, 0x75, 0xde, 0x91, 0x29, 0x05, 0x26, 0x1f, 0x3e, 0x1f, 0x4d, 0xf1, 0x75, 0x2d, 0x34, 0x15, 0x37, 0x0e, 0x62, 0x72, 0x71, 0x0c, 0x7b, 0xd4, 0xbd, 0x42, 0xed, 0xad, 0xec, 0x44, 0x5b, 0x0b, 0x78, 0x09, 0x9b, 0xd9, 0x9f, 0xa7, 0x8a, 0x99, 0x45, 0xd7, 0xbd, 0x20, 0x58, 0xa9, 0x00, 0xb9, 0x41, 0x38, 0xd6, 0x7a, 0xbd, 0x37, 0xfd, 0xfc, 0xf2, 0xe9, 0xfa, 0xb6, 0x64, 0x4c, 0xb1, 0xa8, 0xc3, 0x76, 0x16, 0x3e, 0xcb, 0x69, 0x95, 0x5e, 0x95, 0x4c, 0xe8, 0xc3, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1547 = { .name = "ecdsa_brainpoolp384r1_sha384_1547", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1547_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1547_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1547_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 144 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1548 for ECDSA, tcId is 145 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1548_pubkey[] = { 0x8a, 0x94, 0x16, 0x4d, 0xc7, 0x65, 0x4f, 0xda, 0x3c, 0xd4, 0x30, 0x1d, 0x3e, 0x97, 0x20, 0x24, 0xc2, 0xda, 0xba, 0x71, 0xd4, 0x42, 0x12, 0x8c, 0x7f, 0x3f, 0xae, 0xcd, 0xb9, 0xe3, 0x75, 0xa8, 0x5a, 0xa8, 0x0c, 0x4a, 0xc2, 0x88, 0x89, 0xf2, 0x58, 0xe6, 0xcb, 0xa8, 0x86, 0xd4, 0x76, 0x36, 0x54, 0x8b, 0x3b, 0xf1, 0xb6, 0x75, 0xf2, 0x31, 0x8c, 0x3d, 0x8a, 0xb7, 0xa1, 0xc2, 0x81, 0xa3, 0x32, 0x41, 0xc1, 0x21, 0xb3, 0x59, 0x0b, 0xfd, 0xf7, 0x03, 0xc7, 0xcd, 0x4b, 0xae, 0x8f, 0x45, 0x18, 0x86, 0xd9, 0x89, 0x23, 0x4c, 0x1b, 0x8c, 0x58, 0x96, 0x14, 0x55, 0x4d, 0x42, 0x93, 0x92, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1548_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1548_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xf3, 0x9b, 0x6b, 0xac, 0xd3, 0xb2, 0xeb, 0x7b, 0xdd, 0x98, 0xf0, 0x7a, 0x24, 0x9d, 0x57, 0x61, 0x4b, 0xbe, 0xce, 0x10, 0x48, 0x03, 0x86, 0xe8, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1548 = { .name = "ecdsa_brainpoolp384r1_sha384_1548", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1548_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1548_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1548_sig, .siglen = 96, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 145 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1549 for ECDSA, tcId is 146 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1549_pubkey[] = { 0x8a, 0x94, 0x16, 0x4d, 0xc7, 0x65, 0x4f, 0xda, 0x3c, 0xd4, 0x30, 0x1d, 0x3e, 0x97, 0x20, 0x24, 0xc2, 0xda, 0xba, 0x71, 0xd4, 0x42, 0x12, 0x8c, 0x7f, 0x3f, 0xae, 0xcd, 0xb9, 0xe3, 0x75, 0xa8, 0x5a, 0xa8, 0x0c, 0x4a, 0xc2, 0x88, 0x89, 0xf2, 0x58, 0xe6, 0xcb, 0xa8, 0x86, 0xd4, 0x76, 0x36, 0x54, 0x8b, 0x3b, 0xf1, 0xb6, 0x75, 0xf2, 0x31, 0x8c, 0x3d, 0x8a, 0xb7, 0xa1, 0xc2, 0x81, 0xa3, 0x32, 0x41, 0xc1, 0x21, 0xb3, 0x59, 0x0b, 0xfd, 0xf7, 0x03, 0xc7, 0xcd, 0x4b, 0xae, 0x8f, 0x45, 0x18, 0x86, 0xd9, 0x89, 0x23, 0x4c, 0x1b, 0x8c, 0x58, 0x96, 0x14, 0x55, 0x4d, 0x42, 0x93, 0x92, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1549_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1549_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x4d, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1549 = { .name = "ecdsa_brainpoolp384r1_sha384_1549", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1549_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1549_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1549_sig, .siglen = 96, .result = -1, .comment = "r too large, tcId is 146 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1550 for ECDSA, tcId is 147 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1550_pubkey[] = { 0x73, 0xf8, 0x4a, 0xb6, 0x37, 0x89, 0x30, 0x1e, 0x88, 0xb4, 0xcb, 0x82, 0xcb, 0x93, 0x5d, 0xec, 0xff, 0xb8, 0xf4, 0x2b, 0x2c, 0x97, 0x84, 0xc7, 0x54, 0x46, 0x15, 0xb9, 0x07, 0x6e, 0xc7, 0xa7, 0xab, 0x94, 0x70, 0x2c, 0xa7, 0xf1, 0xd9, 0xaa, 0xcf, 0xb9, 0x05, 0x37, 0xb5, 0xd3, 0x68, 0xdc, 0x50, 0x2c, 0xb7, 0xc8, 0xc1, 0x82, 0x85, 0x99, 0x4c, 0x7b, 0x19, 0xfa, 0x3e, 0x24, 0x01, 0xfd, 0xc2, 0x6d, 0xe5, 0x4f, 0xfe, 0x00, 0x6b, 0xb7, 0x9b, 0xdd, 0x78, 0x52, 0xc6, 0x66, 0xd7, 0x30, 0xbd, 0xf7, 0x6a, 0x16, 0xc0, 0x79, 0x2a, 0x6c, 0x66, 0x81, 0xed, 0x6b, 0x64, 0x7f, 0xc8, 0x1b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1550_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1550_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x63, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1550 = { .name = "ecdsa_brainpoolp384r1_sha384_1550", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1550_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1550_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1550_sig, .siglen = 96, .result = 1, .comment = "r,s are large, tcId is 147 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1551 for ECDSA, tcId is 148 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1551_pubkey[] = { 0x89, 0x5e, 0x84, 0x61, 0xed, 0xdb, 0xe2, 0x13, 0x67, 0xa9, 0x5b, 0x25, 0xcd, 0x85, 0xcd, 0x31, 0xe8, 0x0e, 0xcf, 0x1f, 0x95, 0x53, 0x90, 0x56, 0xfb, 0x7e, 0x10, 0xb4, 0xaa, 0x49, 0x90, 0x0b, 0x21, 0x94, 0xd9, 0x19, 0xb2, 0x9c, 0xd9, 0xbf, 0x37, 0x3a, 0x1d, 0x53, 0xef, 0x57, 0x11, 0x74, 0x76, 0x7c, 0x02, 0xe3, 0x6b, 0x93, 0x5a, 0x65, 0xe5, 0xa9, 0xcb, 0xb3, 0x55, 0x89, 0xa2, 0xa0, 0x18, 0x48, 0x20, 0x65, 0xc5, 0xe3, 0x3d, 0xa8, 0xce, 0x48, 0x3d, 0xc7, 0xf7, 0xfe, 0x44, 0x15, 0x74, 0xf9, 0xe7, 0xab, 0x06, 0x14, 0xbd, 0xcf, 0xc6, 0x10, 0x22, 0xc7, 0x80, 0xa3, 0x00, 0x09, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1551_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1551_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0x48, 0x0e, 0xca, 0x28, 0x74, 0xaa, 0x6b, 0xa7, 0x1e, 0x7f, 0xb5, 0x71, 0x13, 0x39, 0xac, 0x0a, 0x7b, 0xf8, 0x40, 0x65, 0xb3, 0xc7, 0xd5, 0x9c, 0x64, 0xa2, 0xc6, 0x01, 0x5e, 0x6f, 0x79, 0x4e, 0x7d, 0xfa, 0x2b, 0x1f, 0xec, 0x73, 0xa7, 0x2a, 0xdb, 0x32, 0xbd, 0xb7, 0xdd, 0x55, 0xcd, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1551 = { .name = "ecdsa_brainpoolp384r1_sha384_1551", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1551_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1551_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1551_sig, .siglen = 96, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 148 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1552 for ECDSA, tcId is 149 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1552_pubkey[] = { 0x61, 0x8a, 0xd8, 0x19, 0x12, 0xe4, 0xc3, 0x1f, 0x23, 0xea, 0xb2, 0xf0, 0xc6, 0x93, 0xb3, 0xef, 0x84, 0x04, 0x07, 0x4a, 0xb1, 0xdc, 0xe0, 0x1d, 0xc8, 0x2a, 0x76, 0x81, 0x51, 0xc9, 0xfa, 0x03, 0x93, 0xb4, 0xd6, 0xae, 0xae, 0xec, 0x68, 0x58, 0xd3, 0xf4, 0x19, 0x95, 0x7a, 0x5b, 0x99, 0x7f, 0x31, 0xfa, 0x80, 0x9b, 0x1b, 0x44, 0x67, 0x7c, 0xc5, 0xae, 0xf1, 0x89, 0x48, 0x46, 0x14, 0x2c, 0x3e, 0x44, 0xbb, 0xa6, 0xc4, 0x71, 0x12, 0x3f, 0xa1, 0x4f, 0xeb, 0x8f, 0x3a, 0xa9, 0xe9, 0x2f, 0x76, 0x9b, 0xe5, 0x49, 0xce, 0xf9, 0xc1, 0xd5, 0x5b, 0xc6, 0xf1, 0xf4, 0xf8, 0x41, 0x81, 0x3d, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1552_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1552_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0x16, 0x29, 0xef, 0x2d, 0x71, 0x82, 0xd6, 0x7b, 0x6b, 0xd9, 0xcf, 0x68, 0x42, 0x25, 0x1f, 0xe0, 0x9c, 0x96, 0xbf, 0xe0, 0x22, 0xb8, 0xad, 0x9a, 0x0e, 0x54, 0x6f, 0xdc, 0x8e, 0xcf, 0x5d, 0xc8, 0x63, 0x6f, 0xa1, 0x30, 0x59, 0xd7, 0xe9, 0xd8, 0x3f, 0xde, 0x50, 0xe0, 0xd2, 0xb3, 0x92, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1552 = { .name = "ecdsa_brainpoolp384r1_sha384_1552", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1552_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1552_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1552_sig, .siglen = 96, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 149 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1553 for ECDSA, tcId is 150 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1553_pubkey[] = { 0x79, 0x58, 0x3b, 0x49, 0x68, 0xb5, 0x76, 0x81, 0x1b, 0x56, 0x7e, 0x16, 0x20, 0xe0, 0x0b, 0x0a, 0xab, 0x8a, 0xa2, 0x23, 0xc5, 0xe6, 0x55, 0xb2, 0x7b, 0x1e, 0xbe, 0xaf, 0x83, 0xbc, 0xd3, 0x5f, 0x42, 0x05, 0xa5, 0xa0, 0xe5, 0x1a, 0x20, 0x52, 0xff, 0xfe, 0x9f, 0xd2, 0x37, 0x85, 0xc9, 0x8f, 0x77, 0x35, 0x7c, 0x8a, 0x10, 0x08, 0xfc, 0xb7, 0xa3, 0x57, 0x96, 0x14, 0xc2, 0xff, 0x47, 0x98, 0x0f, 0xa9, 0xe4, 0x4b, 0x6b, 0x5e, 0xa3, 0xf8, 0xa3, 0x3c, 0x91, 0x9d, 0xd2, 0xae, 0xa5, 0xda, 0xd0, 0xca, 0x1a, 0x01, 0xa9, 0xe2, 0x10, 0x65, 0x18, 0xb1, 0x64, 0x29, 0x06, 0xe4, 0xf2, 0x75, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1553_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1553_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1553 = { .name = "ecdsa_brainpoolp384r1_sha384_1553", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1553_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1553_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1553_sig, .siglen = 96, .result = 1, .comment = "small r and s, tcId is 150 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1554 for ECDSA, tcId is 151 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1554_pubkey[] = { 0x79, 0x58, 0x3b, 0x49, 0x68, 0xb5, 0x76, 0x81, 0x1b, 0x56, 0x7e, 0x16, 0x20, 0xe0, 0x0b, 0x0a, 0xab, 0x8a, 0xa2, 0x23, 0xc5, 0xe6, 0x55, 0xb2, 0x7b, 0x1e, 0xbe, 0xaf, 0x83, 0xbc, 0xd3, 0x5f, 0x42, 0x05, 0xa5, 0xa0, 0xe5, 0x1a, 0x20, 0x52, 0xff, 0xfe, 0x9f, 0xd2, 0x37, 0x85, 0xc9, 0x8f, 0x77, 0x35, 0x7c, 0x8a, 0x10, 0x08, 0xfc, 0xb7, 0xa3, 0x57, 0x96, 0x14, 0xc2, 0xff, 0x47, 0x98, 0x0f, 0xa9, 0xe4, 0x4b, 0x6b, 0x5e, 0xa3, 0xf8, 0xa3, 0x3c, 0x91, 0x9d, 0xd2, 0xae, 0xa5, 0xda, 0xd0, 0xca, 0x1a, 0x01, 0xa9, 0xe2, 0x10, 0x65, 0x18, 0xb1, 0x64, 0x29, 0x06, 0xe4, 0xf2, 0x75, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1554_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1554_sig[] = { 0x01, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1554 = { .name = "ecdsa_brainpoolp384r1_sha384_1554", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1554_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1554_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1554_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 151 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1555 for ECDSA, tcId is 152 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1555_pubkey[] = { 0x89, 0x65, 0x7b, 0xac, 0x21, 0x6c, 0x3a, 0xc4, 0xa3, 0xa2, 0xd5, 0xaf, 0xd3, 0x42, 0xad, 0x24, 0xa4, 0xeb, 0x10, 0x3d, 0x4d, 0xbe, 0x2e, 0x44, 0x61, 0xe0, 0x3c, 0x70, 0x11, 0x82, 0x65, 0x13, 0xfe, 0x82, 0xbd, 0x06, 0xe1, 0x7e, 0x3a, 0xe8, 0xeb, 0x58, 0x11, 0xda, 0x0b, 0xec, 0x88, 0xbb, 0x33, 0xee, 0x1e, 0xdd, 0xd5, 0xd4, 0x9d, 0xd8, 0x6e, 0x78, 0x5f, 0xbf, 0xeb, 0xb9, 0x28, 0x86, 0x61, 0x96, 0x4e, 0x6f, 0xbe, 0x0c, 0x07, 0xaf, 0x9a, 0x4b, 0xa3, 0x14, 0x5f, 0xc4, 0xbe, 0x11, 0xe5, 0x48, 0x4b, 0x65, 0x0c, 0x97, 0x09, 0x6d, 0xb8, 0x2e, 0xbb, 0x0c, 0xa2, 0xbb, 0x84, 0xed, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1555_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1555_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1555 = { .name = "ecdsa_brainpoolp384r1_sha384_1555", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1555_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1555_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1555_sig, .siglen = 96, .result = 1, .comment = "small r and s, tcId is 152 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1556 for ECDSA, tcId is 153 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1556_pubkey[] = { 0x89, 0x65, 0x7b, 0xac, 0x21, 0x6c, 0x3a, 0xc4, 0xa3, 0xa2, 0xd5, 0xaf, 0xd3, 0x42, 0xad, 0x24, 0xa4, 0xeb, 0x10, 0x3d, 0x4d, 0xbe, 0x2e, 0x44, 0x61, 0xe0, 0x3c, 0x70, 0x11, 0x82, 0x65, 0x13, 0xfe, 0x82, 0xbd, 0x06, 0xe1, 0x7e, 0x3a, 0xe8, 0xeb, 0x58, 0x11, 0xda, 0x0b, 0xec, 0x88, 0xbb, 0x33, 0xee, 0x1e, 0xdd, 0xd5, 0xd4, 0x9d, 0xd8, 0x6e, 0x78, 0x5f, 0xbf, 0xeb, 0xb9, 0x28, 0x86, 0x61, 0x96, 0x4e, 0x6f, 0xbe, 0x0c, 0x07, 0xaf, 0x9a, 0x4b, 0xa3, 0x14, 0x5f, 0xc4, 0xbe, 0x11, 0xe5, 0x48, 0x4b, 0x65, 0x0c, 0x97, 0x09, 0x6d, 0xb8, 0x2e, 0xbb, 0x0c, 0xa2, 0xbb, 0x84, 0xed, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1556_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1556_sig[] = { 0x01, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1556 = { .name = "ecdsa_brainpoolp384r1_sha384_1556", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1556_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1556_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1556_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 153 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1557 for ECDSA, tcId is 154 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1557_pubkey[] = { 0x58, 0x76, 0xf4, 0x14, 0xfa, 0x38, 0x5b, 0x40, 0x3a, 0x2d, 0x10, 0xda, 0x5d, 0x89, 0xb1, 0x10, 0x34, 0x4a, 0xd0, 0x05, 0xbf, 0xaf, 0x8c, 0x75, 0x9a, 0xb1, 0xe3, 0x56, 0x1a, 0x39, 0xff, 0x0d, 0xb9, 0xff, 0x91, 0xec, 0x60, 0x40, 0x31, 0x6e, 0x2f, 0xca, 0x36, 0x54, 0xa4, 0x8c, 0x0e, 0x89, 0x0d, 0xcb, 0x77, 0xf8, 0x96, 0xea, 0x47, 0x5c, 0xb9, 0x76, 0x72, 0xa8, 0x40, 0x03, 0x29, 0x55, 0x4c, 0x94, 0x1b, 0x61, 0xb4, 0xa8, 0x4b, 0xde, 0x1f, 0x8c, 0x8f, 0xc5, 0x25, 0x0c, 0x29, 0x16, 0x1f, 0xc3, 0xca, 0x50, 0x45, 0x8a, 0x41, 0xc7, 0x7a, 0x48, 0xbb, 0x33, 0x68, 0x82, 0xf2, 0xea, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1557_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1557_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1557 = { .name = "ecdsa_brainpoolp384r1_sha384_1557", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1557_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1557_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1557_sig, .siglen = 96, .result = 1, .comment = "small r and s, tcId is 154 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1558 for ECDSA, tcId is 155 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1558_pubkey[] = { 0x58, 0x76, 0xf4, 0x14, 0xfa, 0x38, 0x5b, 0x40, 0x3a, 0x2d, 0x10, 0xda, 0x5d, 0x89, 0xb1, 0x10, 0x34, 0x4a, 0xd0, 0x05, 0xbf, 0xaf, 0x8c, 0x75, 0x9a, 0xb1, 0xe3, 0x56, 0x1a, 0x39, 0xff, 0x0d, 0xb9, 0xff, 0x91, 0xec, 0x60, 0x40, 0x31, 0x6e, 0x2f, 0xca, 0x36, 0x54, 0xa4, 0x8c, 0x0e, 0x89, 0x0d, 0xcb, 0x77, 0xf8, 0x96, 0xea, 0x47, 0x5c, 0xb9, 0x76, 0x72, 0xa8, 0x40, 0x03, 0x29, 0x55, 0x4c, 0x94, 0x1b, 0x61, 0xb4, 0xa8, 0x4b, 0xde, 0x1f, 0x8c, 0x8f, 0xc5, 0x25, 0x0c, 0x29, 0x16, 0x1f, 0xc3, 0xca, 0x50, 0x45, 0x8a, 0x41, 0xc7, 0x7a, 0x48, 0xbb, 0x33, 0x68, 0x82, 0xf2, 0xea, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1558_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1558_sig[] = { 0x01, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1558 = { .name = "ecdsa_brainpoolp384r1_sha384_1558", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1558_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1558_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1558_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 155 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1559 for ECDSA, tcId is 156 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1559_pubkey[] = { 0x58, 0x76, 0xf4, 0x14, 0xfa, 0x38, 0x5b, 0x40, 0x3a, 0x2d, 0x10, 0xda, 0x5d, 0x89, 0xb1, 0x10, 0x34, 0x4a, 0xd0, 0x05, 0xbf, 0xaf, 0x8c, 0x75, 0x9a, 0xb1, 0xe3, 0x56, 0x1a, 0x39, 0xff, 0x0d, 0xb9, 0xff, 0x91, 0xec, 0x60, 0x40, 0x31, 0x6e, 0x2f, 0xca, 0x36, 0x54, 0xa4, 0x8c, 0x0e, 0x89, 0x0d, 0xcb, 0x77, 0xf8, 0x96, 0xea, 0x47, 0x5c, 0xb9, 0x76, 0x72, 0xa8, 0x40, 0x03, 0x29, 0x55, 0x4c, 0x94, 0x1b, 0x61, 0xb4, 0xa8, 0x4b, 0xde, 0x1f, 0x8c, 0x8f, 0xc5, 0x25, 0x0c, 0x29, 0x16, 0x1f, 0xc3, 0xca, 0x50, 0x45, 0x8a, 0x41, 0xc7, 0x7a, 0x48, 0xbb, 0x33, 0x68, 0x82, 0xf2, 0xea, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1559_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1559_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1559 = { .name = "ecdsa_brainpoolp384r1_sha384_1559", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1559_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1559_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1559_sig, .siglen = 96, .result = -1, .comment = "r is larger than n, tcId is 156 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1560 for ECDSA, tcId is 157 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1560_pubkey[] = { 0x1b, 0xee, 0x74, 0x1f, 0xa1, 0x92, 0xa9, 0xbd, 0x05, 0x35, 0xd0, 0x06, 0x27, 0x73, 0x70, 0x79, 0xe9, 0x8f, 0x00, 0x07, 0x63, 0x94, 0xc9, 0x78, 0xa9, 0x6a, 0x0f, 0x9f, 0xba, 0x64, 0xe9, 0xe2, 0x1d, 0xec, 0xff, 0x6b, 0x4b, 0x8f, 0xe1, 0x1f, 0x60, 0xb1, 0x8d, 0x5d, 0x75, 0x86, 0x84, 0xde, 0x06, 0xd1, 0x93, 0x21, 0xea, 0xb7, 0xe8, 0x60, 0x1f, 0x8f, 0x46, 0x06, 0xfe, 0x93, 0xfd, 0x3b, 0x2f, 0x02, 0x98, 0x6a, 0x58, 0xca, 0x56, 0x41, 0x32, 0x82, 0xc6, 0x6d, 0xd3, 0x6b, 0xa6, 0x72, 0x4a, 0x3c, 0xbc, 0xee, 0xe7, 0x99, 0x48, 0xba, 0x2d, 0x55, 0xc7, 0x56, 0x58, 0x6b, 0x58, 0xe2, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1560_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1560_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x17, 0x3b, 0xec, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1560 = { .name = "ecdsa_brainpoolp384r1_sha384_1560", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1560_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1560_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1560_sig, .siglen = 96, .result = -1, .comment = "s is larger than n, tcId is 157 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1561 for ECDSA, tcId is 158 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1561_pubkey[] = { 0x6b, 0x25, 0xf8, 0xc1, 0x62, 0x9f, 0x75, 0x79, 0xe3, 0xc7, 0xee, 0x4b, 0x02, 0x9c, 0xc0, 0x29, 0xb4, 0xbd, 0xbe, 0xd8, 0x8b, 0x9b, 0x39, 0x93, 0x03, 0xe4, 0xa1, 0x43, 0x52, 0xd1, 0xf3, 0xf6, 0x04, 0x8e, 0xcd, 0xd0, 0x62, 0xd3, 0x7c, 0xba, 0x7b, 0x70, 0xbc, 0xbd, 0x58, 0x72, 0x31, 0xe7, 0x62, 0x13, 0x13, 0xf9, 0x3d, 0x31, 0x0f, 0x14, 0x4b, 0xd3, 0x32, 0x25, 0x82, 0x80, 0x46, 0x39, 0xdd, 0x29, 0x60, 0x96, 0x9a, 0x99, 0x3a, 0x9f, 0x2a, 0x36, 0x09, 0xf8, 0x56, 0xe1, 0x41, 0x5a, 0x0a, 0x4d, 0xcf, 0x58, 0xa7, 0x86, 0x4e, 0x41, 0xe2, 0xa8, 0xc8, 0x0d, 0xfc, 0x15, 0x8a, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1561_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1561_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x89, 0x66, 0x21, 0xd2, 0x32, 0x83, 0xb1, 0x21, 0x11, 0x04, 0x8d, 0x1c, 0x97, 0x8e, 0x2c, 0x28, 0x6d, 0x60, 0xb6, 0xef, 0x7c, 0xe3, 0x7a, 0xf3, 0x6c, 0xf7, 0xaa, 0x4d, 0xe2, 0x68, 0xd6, 0x26, 0xde, 0x7d, 0xdc, 0xb3, 0x56, 0xd1, 0x67, 0xc7, 0x48, 0x3c, 0x69, 0x45, 0x5c, 0x75, 0x2c, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1561 = { .name = "ecdsa_brainpoolp384r1_sha384_1561", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1561_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1561_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1561_sig, .siglen = 96, .result = 1, .comment = "small r and s^-1, tcId is 158 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1562 for ECDSA, tcId is 159 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1562_pubkey[] = { 0x5d, 0x08, 0x2c, 0xde, 0x60, 0x86, 0xf8, 0xea, 0x69, 0x94, 0xf4, 0x6e, 0x9d, 0xc0, 0x6c, 0x1c, 0x1d, 0x2c, 0x3a, 0x3c, 0x2d, 0xc5, 0xc9, 0x7b, 0xf1, 0x37, 0x65, 0x3d, 0x9b, 0x2e, 0xd2, 0x11, 0x01, 0xba, 0xd8, 0x43, 0xd4, 0x6e, 0x4b, 0x79, 0x25, 0xb9, 0xaf, 0x70, 0x34, 0xc6, 0xd0, 0x21, 0x12, 0xc7, 0xf5, 0x6e, 0x65, 0xd2, 0x33, 0x10, 0x40, 0x63, 0x39, 0x1f, 0xb3, 0x82, 0x8b, 0x39, 0x90, 0xe6, 0x89, 0x3d, 0x77, 0x74, 0x6e, 0x42, 0x30, 0x5e, 0x6a, 0x5b, 0xa1, 0x11, 0xd9, 0x76, 0xd6, 0x93, 0xf5, 0x95, 0xaf, 0x85, 0x8f, 0x19, 0xfa, 0xc7, 0x23, 0x4f, 0x74, 0x84, 0xc4, 0x89, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1562_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1562_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x38, 0xe8, 0xda, 0xe2, 0x16, 0xc6, 0x3f, 0x06, 0xb3, 0xed, 0xbd, 0x0f, 0x9b, 0xa7, 0xa5, 0xe4, 0xa3, 0x32, 0xec, 0x18, 0x72, 0x51, 0xe3, 0xd6, 0x27, 0x83, 0x9d, 0x1b, 0xaa, 0xc6, 0x67, 0xd7, 0xca, 0xad, 0x2a, 0xb0, 0xa1, 0xea, 0x9f, 0xbb, 0x12, 0xdc, 0x5a, 0x71, 0xe3, 0xb4, 0x9b, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1562 = { .name = "ecdsa_brainpoolp384r1_sha384_1562", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1562_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1562_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1562_sig, .siglen = 96, .result = 1, .comment = "smallish r and s^-1, tcId is 159 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1563 for ECDSA, tcId is 160 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1563_pubkey[] = { 0x74, 0x07, 0xca, 0x6c, 0x2a, 0x18, 0x3f, 0x9c, 0xa1, 0x37, 0x66, 0x09, 0xe9, 0xc7, 0x8a, 0x8d, 0x08, 0x0e, 0xff, 0xad, 0x15, 0xa4, 0xf6, 0x3c, 0xbb, 0x7a, 0x16, 0x8e, 0x3c, 0x78, 0x9b, 0x8b, 0x59, 0xce, 0x4d, 0x31, 0x22, 0xca, 0x08, 0xa8, 0x69, 0x07, 0xba, 0x48, 0x7f, 0x71, 0x7f, 0xbc, 0x3e, 0x2c, 0x56, 0xa9, 0xb3, 0x46, 0x0a, 0x51, 0x36, 0xb2, 0x13, 0xbe, 0x8d, 0x48, 0xcb, 0x3d, 0xc9, 0xc7, 0xad, 0x94, 0x5b, 0x1d, 0xce, 0xcb, 0xf9, 0x3f, 0xa6, 0xcf, 0xaa, 0xf8, 0xdb, 0xd7, 0x0f, 0x10, 0x40, 0xb9, 0x7a, 0xd8, 0xe3, 0xac, 0x30, 0xf2, 0xe6, 0x4f, 0xd7, 0xcc, 0x76, 0xd6, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1563_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1563_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfc, 0x0d, 0x24, 0x36, 0xa5, 0x99, 0xb3, 0x96, 0xa5, 0x1c, 0x54, 0x6e, 0x05, 0xd1, 0xc3, 0xd2, 0x5a, 0x8f, 0x6d, 0x05, 0x93, 0x5a, 0xe5, 0x03, 0x1d, 0xad, 0x3c, 0xdd, 0x7c, 0xb3, 0x6c, 0xf6, 0x91, 0x2a, 0x43, 0x3d, 0xe2, 0x8f, 0x84, 0x75, 0xd3, 0xb1, 0xe2, 0xe1, 0xce, 0x77, 0x61, 0x08, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1563 = { .name = "ecdsa_brainpoolp384r1_sha384_1563", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1563_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1563_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1563_sig, .siglen = 96, .result = 1, .comment = "100-bit r and small s^-1, tcId is 160 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1564 for ECDSA, tcId is 161 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1564_pubkey[] = { 0x4f, 0xc3, 0x2a, 0x52, 0x26, 0x82, 0x0e, 0xc9, 0xc3, 0xff, 0xf2, 0xc7, 0x4e, 0x0b, 0x36, 0xd7, 0xde, 0x02, 0x8e, 0x59, 0xfc, 0x00, 0x5f, 0x38, 0x07, 0xa3, 0xbd, 0x59, 0x89, 0x2c, 0x9a, 0xd2, 0x0d, 0xba, 0x71, 0x68, 0xef, 0x9e, 0xd9, 0xbf, 0x99, 0xb2, 0x5e, 0xd0, 0x1b, 0xcf, 0xc6, 0xca, 0x6a, 0x13, 0xda, 0x2e, 0x85, 0x27, 0x77, 0xa6, 0xf9, 0x9d, 0x04, 0x32, 0x2a, 0x1b, 0x9f, 0xb4, 0x22, 0x76, 0x84, 0xbf, 0x7c, 0x40, 0xd4, 0xd3, 0xef, 0x92, 0x79, 0x80, 0x03, 0xa3, 0xbf, 0x2d, 0xa1, 0x58, 0xd5, 0x68, 0x64, 0x57, 0xc3, 0x3d, 0x0e, 0x24, 0xbe, 0x5c, 0x26, 0x5f, 0xc4, 0x73, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1564_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1564_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x4a, 0x28, 0x9a, 0xda, 0xd7, 0xce, 0xec, 0x67, 0xae, 0x99, 0xef, 0x5d, 0xa7, 0x97, 0xb6, 0xbb, 0x17, 0xd9, 0xc1, 0x68, 0x42, 0x8a, 0xb3, 0x0e, 0xa9, 0xa6, 0x8b, 0x89, 0x65, 0x2c, 0x4b, 0x9e, 0x9b, 0xae, 0x87, 0x6a, 0xb3, 0xd7, 0xfb, 0xdf, 0x1e, 0xb9, 0x2e, 0xd4, 0x22, 0xbd, 0x3b, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1564 = { .name = "ecdsa_brainpoolp384r1_sha384_1564", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1564_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1564_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1564_sig, .siglen = 96, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 161 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1565 for ECDSA, tcId is 162 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1565_pubkey[] = { 0x73, 0x50, 0xa7, 0xd0, 0x0d, 0x77, 0x19, 0xa3, 0x18, 0x52, 0x2e, 0xf4, 0xc5, 0xe6, 0xbe, 0x24, 0xb3, 0xb2, 0xcb, 0x30, 0x0c, 0x59, 0x6f, 0x79, 0xe8, 0xdd, 0x31, 0xa4, 0x68, 0x8f, 0xe6, 0x5a, 0x54, 0xb2, 0xd7, 0x49, 0x7a, 0x06, 0x82, 0x1e, 0xec, 0xba, 0xf3, 0x1b, 0x2f, 0xa7, 0xcd, 0xcb, 0x4b, 0xd7, 0x2f, 0xc7, 0xf0, 0x5e, 0x32, 0x45, 0x7f, 0xda, 0x0c, 0xc3, 0xf3, 0x21, 0x15, 0x77, 0x44, 0xf1, 0x84, 0x1c, 0x30, 0xbd, 0x08, 0x6e, 0x6d, 0xdd, 0x5b, 0xf4, 0x15, 0xeb, 0x71, 0xec, 0xbe, 0x36, 0xf0, 0xf3, 0xfd, 0x23, 0xd3, 0xc4, 0x14, 0x87, 0xfb, 0x28, 0x3e, 0x0e, 0x97, 0x94, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1565_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1565_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0x4a, 0x28, 0x9a, 0xda, 0xd7, 0xce, 0xec, 0x67, 0xae, 0x99, 0xef, 0x5d, 0xa7, 0x97, 0xb6, 0xbb, 0x17, 0xd9, 0xc1, 0x68, 0x42, 0x8a, 0xb3, 0x0e, 0xa9, 0xa6, 0x8b, 0x89, 0x65, 0x2c, 0x4b, 0x9e, 0x9b, 0xae, 0x87, 0x6a, 0xb3, 0xd7, 0xfb, 0xdf, 0x1e, 0xb9, 0x2e, 0xd4, 0x22, 0xbd, 0x3b, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1565 = { .name = "ecdsa_brainpoolp384r1_sha384_1565", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1565_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1565_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1565_sig, .siglen = 96, .result = 1, .comment = "100-bit r and s^-1, tcId is 162 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1566 for ECDSA, tcId is 163 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1566_pubkey[] = { 0x61, 0x49, 0x8a, 0xd3, 0x1a, 0x84, 0xee, 0xd1, 0x02, 0xba, 0x27, 0x12, 0xeb, 0x8a, 0x7b, 0xd9, 0x23, 0x20, 0xbd, 0xa4, 0xac, 0x6d, 0x07, 0xb4, 0x32, 0x6a, 0x30, 0x86, 0x9d, 0x19, 0xeb, 0x1b, 0x96, 0x22, 0x9d, 0x21, 0xef, 0xd7, 0x11, 0xdc, 0xf7, 0x30, 0x48, 0xbf, 0x16, 0x68, 0x00, 0xe3, 0x0c, 0xfc, 0xc1, 0x3a, 0x09, 0x14, 0x13, 0x22, 0x84, 0xdb, 0xea, 0xb6, 0xfc, 0xf5, 0xd7, 0x0b, 0x34, 0xca, 0x86, 0xa6, 0x81, 0x15, 0x7e, 0x48, 0x74, 0xab, 0xff, 0xae, 0xeb, 0xb6, 0x9b, 0x8b, 0x71, 0xf6, 0x9d, 0x33, 0x23, 0x06, 0x56, 0x78, 0x23, 0xdd, 0xe5, 0x40, 0x7c, 0xe7, 0x39, 0xe8, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1566_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1566_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x64, 0xe5, 0x5d, 0xd0, 0xbf, 0x01, 0xc2, 0x25, 0x9e, 0x1a, 0xb4, 0xe8, 0xf4, 0xfe, 0xe0, 0x99, 0x81, 0x3f, 0x63, 0x74, 0xf6, 0x06, 0x9e, 0x38, 0x39, 0xcc, 0xbf, 0x64, 0x49, 0x9d, 0xc8, 0x02, 0xc3, 0xc5, 0x34, 0xd1, 0xcf, 0x1f, 0x9c, 0xff, 0xd7, 0x60, 0x27, 0xb0, 0x21, 0x57, 0x46, 0x02, 0xee, 0x43, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1566 = { .name = "ecdsa_brainpoolp384r1_sha384_1566", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1566_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1566_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1566_sig, .siglen = 96, .result = 1, .comment = "r and s^-1 are close to n, tcId is 163 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1567 for ECDSA, tcId is 164 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1567_pubkey[] = { 0x05, 0x05, 0x92, 0xf3, 0x4d, 0xb0, 0x26, 0x3d, 0xf4, 0xc6, 0x69, 0xb8, 0x99, 0x19, 0x41, 0xbe, 0x18, 0x23, 0x7a, 0x10, 0x45, 0xbf, 0xd1, 0x65, 0xea, 0x4a, 0xf3, 0x85, 0x37, 0x65, 0x64, 0xed, 0xf6, 0x65, 0x4a, 0x0d, 0xff, 0x7b, 0x5d, 0x84, 0x47, 0x40, 0x90, 0xf2, 0x65, 0xc4, 0x6b, 0x51, 0x15, 0x45, 0x91, 0x8c, 0xd8, 0xf2, 0x22, 0x60, 0xce, 0x21, 0xa5, 0x84, 0xed, 0xfa, 0x0b, 0x16, 0x44, 0x48, 0x8c, 0x99, 0x7d, 0x95, 0x65, 0x29, 0x26, 0x2a, 0xef, 0x40, 0x0c, 0xc0, 0x32, 0x0e, 0xd2, 0x7d, 0xdc, 0xec, 0x3b, 0xde, 0x6b, 0x9f, 0xd7, 0x9b, 0x37, 0x4a, 0xf6, 0x88, 0xfa, 0x9f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1567_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1567_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1567 = { .name = "ecdsa_brainpoolp384r1_sha384_1567", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1567_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1567_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1567_sig, .siglen = 96, .result = 1, .comment = "s == 1, tcId is 164 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1568 for ECDSA, tcId is 165 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1568_pubkey[] = { 0x05, 0x05, 0x92, 0xf3, 0x4d, 0xb0, 0x26, 0x3d, 0xf4, 0xc6, 0x69, 0xb8, 0x99, 0x19, 0x41, 0xbe, 0x18, 0x23, 0x7a, 0x10, 0x45, 0xbf, 0xd1, 0x65, 0xea, 0x4a, 0xf3, 0x85, 0x37, 0x65, 0x64, 0xed, 0xf6, 0x65, 0x4a, 0x0d, 0xff, 0x7b, 0x5d, 0x84, 0x47, 0x40, 0x90, 0xf2, 0x65, 0xc4, 0x6b, 0x51, 0x15, 0x45, 0x91, 0x8c, 0xd8, 0xf2, 0x22, 0x60, 0xce, 0x21, 0xa5, 0x84, 0xed, 0xfa, 0x0b, 0x16, 0x44, 0x48, 0x8c, 0x99, 0x7d, 0x95, 0x65, 0x29, 0x26, 0x2a, 0xef, 0x40, 0x0c, 0xc0, 0x32, 0x0e, 0xd2, 0x7d, 0xdc, 0xec, 0x3b, 0xde, 0x6b, 0x9f, 0xd7, 0x9b, 0x37, 0x4a, 0xf6, 0x88, 0xfa, 0x9f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1568_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1568_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1568 = { .name = "ecdsa_brainpoolp384r1_sha384_1568", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1568_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1568_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1568_sig, .siglen = 96, .result = -1, .comment = "s == 0, tcId is 165 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1569 for ECDSA, tcId is 166 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1569_pubkey[] = { 0x4d, 0xf8, 0x98, 0x54, 0x4c, 0x2b, 0x10, 0xdc, 0x3c, 0x4d, 0x32, 0x49, 0xfc, 0xa5, 0x13, 0x0e, 0x75, 0x3d, 0x26, 0xe0, 0x83, 0x20, 0xbd, 0x82, 0x39, 0x26, 0xac, 0xb0, 0x50, 0xd8, 0xb6, 0xa4, 0xfe, 0xad, 0xf2, 0x9b, 0xef, 0x07, 0xec, 0xdb, 0x00, 0xe8, 0x5b, 0x34, 0x1f, 0x22, 0x06, 0x9a, 0x00, 0x33, 0x43, 0x69, 0x5d, 0x1e, 0x0a, 0xc0, 0xa7, 0x8b, 0x38, 0x49, 0x0d, 0x97, 0xc1, 0xe9, 0x0e, 0x4f, 0xf4, 0xca, 0x0d, 0x21, 0x40, 0xb9, 0x10, 0x1f, 0x1b, 0x63, 0xf2, 0x9c, 0xa4, 0xf2, 0xbf, 0x91, 0x76, 0xe1, 0x60, 0x04, 0x83, 0x91, 0x62, 0x16, 0xbd, 0x35, 0xab, 0xce, 0x67, 0x41, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1569_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1569_sig[] = { 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb2, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1569 = { .name = "ecdsa_brainpoolp384r1_sha384_1569", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1569_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1569_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1569_sig, .siglen = 96, .result = -1, .comment = "point at infinity during verify, tcId is 166 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1570 for ECDSA, tcId is 167 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1570_pubkey[] = { 0x3e, 0x95, 0x5d, 0x28, 0x45, 0x89, 0x77, 0x58, 0x37, 0xc9, 0xb8, 0x3d, 0xbc, 0xb4, 0x91, 0x86, 0xd6, 0x95, 0xd6, 0xb5, 0x3f, 0x57, 0x71, 0x68, 0x9f, 0x64, 0x58, 0xe4, 0x0a, 0x2b, 0x6d, 0xad, 0x62, 0x54, 0xcb, 0xb2, 0x27, 0xde, 0x46, 0x75, 0x84, 0x9d, 0x11, 0xe0, 0xfd, 0xf3, 0x21, 0x14, 0x3c, 0x4f, 0x0a, 0xe8, 0x80, 0x33, 0x67, 0x71, 0x61, 0x86, 0x17, 0x4f, 0x91, 0xb7, 0x03, 0x5b, 0x35, 0xbf, 0x84, 0x90, 0xe4, 0x9f, 0x9c, 0x46, 0x14, 0x7b, 0x6d, 0x3b, 0x71, 0xd9, 0x6f, 0x74, 0xab, 0xfa, 0x5e, 0x40, 0xf3, 0x3c, 0x10, 0x0f, 0x79, 0xd4, 0x59, 0x62, 0x41, 0x91, 0xce, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1570_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1570_sig[] = { 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb7, 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1570 = { .name = "ecdsa_brainpoolp384r1_sha384_1570", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1570_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1570_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1570_sig, .siglen = 96, .result = 1, .comment = "edge case for signature malleability, tcId is 167 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1571 for ECDSA, tcId is 168 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1571_pubkey[] = { 0x39, 0xc4, 0x48, 0x73, 0xcc, 0xab, 0x02, 0x3c, 0x4b, 0x36, 0x6a, 0x64, 0x6d, 0xec, 0xb4, 0xbe, 0xb5, 0x67, 0x2b, 0x6d, 0x21, 0x40, 0xfa, 0x0f, 0xd2, 0x00, 0x37, 0x4a, 0xa0, 0x13, 0x01, 0x00, 0x8c, 0x04, 0x19, 0xc3, 0x39, 0x2c, 0x58, 0x90, 0x00, 0x81, 0x6e, 0x1f, 0x18, 0x05, 0x9a, 0x4c, 0x2b, 0x61, 0x04, 0xbe, 0x5e, 0x26, 0xc6, 0x57, 0xaa, 0x1f, 0x6f, 0xa4, 0xad, 0xdf, 0x3f, 0xf5, 0x2a, 0x45, 0x67, 0x98, 0x00, 0xdd, 0x28, 0xcd, 0x62, 0x87, 0x11, 0xf2, 0xd1, 0xc1, 0x11, 0x53, 0xa3, 0x6c, 0x6c, 0x42, 0xfb, 0xa6, 0x95, 0x4c, 0xd3, 0x7f, 0xd2, 0x52, 0x11, 0x2d, 0xe1, 0xa4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1571_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1571_sig[] = { 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb7, 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1571 = { .name = "ecdsa_brainpoolp384r1_sha384_1571", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1571_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1571_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1571_sig, .siglen = 96, .result = 1, .comment = "edge case for signature malleability, tcId is 168 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1572 for ECDSA, tcId is 169 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1572_pubkey[] = { 0x5d, 0x77, 0x13, 0x4e, 0x89, 0x0a, 0xc7, 0x2f, 0x9c, 0x69, 0xfc, 0xc3, 0xf1, 0x81, 0xae, 0x74, 0x6f, 0xef, 0xff, 0xda, 0xfc, 0x1d, 0xfc, 0x79, 0x1c, 0xf3, 0x3a, 0x22, 0xfb, 0x0f, 0x8e, 0x58, 0x61, 0x88, 0xcf, 0x2d, 0x5d, 0x06, 0x0d, 0xdb, 0x04, 0x00, 0x4b, 0xaf, 0x56, 0x19, 0x1c, 0x9f, 0x0e, 0x74, 0x01, 0xdd, 0xcc, 0x47, 0xa0, 0x9b, 0x5e, 0xcf, 0x27, 0x19, 0xcc, 0x93, 0x60, 0x10, 0xa9, 0x37, 0x1a, 0x7f, 0x76, 0x24, 0xe6, 0x3e, 0x7a, 0x00, 0x55, 0x0a, 0x13, 0xd0, 0x35, 0xcf, 0x58, 0x6d, 0x3b, 0x52, 0x2c, 0x7f, 0xd0, 0x62, 0x51, 0xad, 0xbb, 0x0f, 0x0a, 0xad, 0x3d, 0xd7, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1572_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1572_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x2d, 0xfa, 0xfd, 0xff, 0xfc, 0x8d, 0xea, 0xce, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1572 = { .name = "ecdsa_brainpoolp384r1_sha384_1572", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1572_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1572_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1572_sig, .siglen = 96, .result = -1, .comment = "u1 == 1, tcId is 169 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1573 for ECDSA, tcId is 170 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1573_pubkey[] = { 0x60, 0x7c, 0xd9, 0x4c, 0x42, 0xf5, 0xbb, 0xfc, 0xf8, 0x57, 0xa7, 0x08, 0xac, 0x16, 0x3f, 0x0a, 0xfc, 0x0a, 0x65, 0xc8, 0xd8, 0x87, 0x25, 0xf1, 0x8c, 0x4b, 0xf7, 0xeb, 0x7c, 0xf5, 0xd3, 0x4a, 0xca, 0x60, 0x08, 0xa2, 0x7b, 0x4e, 0x5f, 0xd9, 0x47, 0x61, 0x34, 0xed, 0x85, 0xfc, 0xd3, 0x2c, 0x89, 0xf2, 0x48, 0x29, 0x0c, 0x59, 0xb8, 0xfb, 0x96, 0x3e, 0x90, 0xba, 0xb9, 0xb0, 0xb3, 0xe3, 0x13, 0xd3, 0xb8, 0xe0, 0xa6, 0xc8, 0x90, 0x14, 0x55, 0xa2, 0x2b, 0x7b, 0x74, 0xa1, 0x08, 0x15, 0x2c, 0x5b, 0x81, 0x4b, 0xa5, 0x75, 0xde, 0x8d, 0xe0, 0x7c, 0xdb, 0x8d, 0x67, 0xba, 0x2b, 0x50, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1573_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1573_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x1f, 0xc1, 0x15, 0x14, 0x6e, 0x52, 0x1d, 0x7e, 0xa3, 0x3f, 0x3e, 0x12, 0x8e, 0xb0, 0x1d, 0xb0, 0xf6, 0x53, 0xdc, 0x45, 0x85, 0x2c, 0x2b, 0x50, 0x30, 0x1d, 0x63, 0x9b, 0x77, 0x8b, 0x13, 0x38, 0x0e, 0x51, 0xd9, 0x36, 0x65, 0x52, 0xcf, 0x20, 0x49, 0x15, 0x66, 0x05, 0xd5, 0x7a, 0xdf, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1573 = { .name = "ecdsa_brainpoolp384r1_sha384_1573", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1573_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1573_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1573_sig, .siglen = 96, .result = 1, .comment = "u1 == n - 1, tcId is 170 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1574 for ECDSA, tcId is 171 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1574_pubkey[] = { 0x4b, 0x4a, 0xfb, 0xd9, 0x17, 0x46, 0xb1, 0xa4, 0xdf, 0x6d, 0x0d, 0x71, 0x7a, 0xfc, 0x75, 0x28, 0xfa, 0x4a, 0x9d, 0xda, 0x9a, 0x62, 0xaf, 0xee, 0x19, 0xa7, 0x2f, 0xc0, 0x01, 0x9a, 0xa2, 0xea, 0x89, 0xa1, 0x25, 0xbe, 0xa7, 0x67, 0x55, 0x06, 0x23, 0x06, 0x56, 0xca, 0xaf, 0xf5, 0x2c, 0x73, 0x5f, 0x5c, 0x35, 0x75, 0xbf, 0x66, 0x96, 0x37, 0xef, 0xdb, 0x67, 0x24, 0x77, 0x50, 0x0f, 0x1f, 0xe3, 0x7b, 0x45, 0xdc, 0xf8, 0x79, 0x48, 0x7a, 0xd6, 0xca, 0x36, 0xc4, 0x14, 0x73, 0x29, 0xfb, 0x74, 0x17, 0x06, 0xce, 0x9b, 0x92, 0x8c, 0xe4, 0x7b, 0xf6, 0xdc, 0x0f, 0x9e, 0x44, 0x01, 0x7f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1574_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1574_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1574 = { .name = "ecdsa_brainpoolp384r1_sha384_1574", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1574_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1574_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1574_sig, .siglen = 96, .result = 1, .comment = "u2 == 1, tcId is 171 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1575 for ECDSA, tcId is 172 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1575_pubkey[] = { 0x0d, 0x8b, 0x24, 0x6c, 0x62, 0x31, 0x88, 0xb7, 0x45, 0x57, 0x16, 0xac, 0x18, 0x9b, 0x9a, 0xf4, 0x41, 0x67, 0x6a, 0x1c, 0x41, 0xcd, 0x57, 0x57, 0x54, 0xbd, 0x02, 0xae, 0x4d, 0x68, 0x25, 0x30, 0x4b, 0x96, 0x1d, 0xdf, 0x08, 0x26, 0xbb, 0x16, 0x1e, 0x3d, 0x63, 0xe9, 0xbc, 0x71, 0xf1, 0xd4, 0x6e, 0xdb, 0xed, 0xdc, 0x2d, 0x40, 0xda, 0xfd, 0xcc, 0xac, 0x90, 0xae, 0x85, 0xcd, 0x61, 0x6a, 0x0e, 0xa1, 0xe4, 0xa0, 0x8a, 0xe8, 0xfc, 0x33, 0x58, 0xce, 0x7d, 0x51, 0x42, 0xee, 0xe8, 0xf3, 0xbe, 0xbd, 0xc1, 0x45, 0x91, 0xc4, 0xc9, 0xb1, 0x5b, 0xff, 0x12, 0xb8, 0xcf, 0x08, 0x33, 0x4a, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1575_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1575_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x5d, 0xd0, 0xbf, 0x01, 0xc2, 0x25, 0x9e, 0x1a, 0xb4, 0xe8, 0xf4, 0xfe, 0xe0, 0x99, 0x81, 0x3f, 0x63, 0x74, 0xf6, 0x06, 0x9e, 0x38, 0x39, 0xcc, 0xbf, 0x64, 0x49, 0x9d, 0xc8, 0x02, 0xc3, 0xc5, 0x34, 0xd1, 0xcf, 0x1f, 0x9c, 0xff, 0xd7, 0x60, 0x27, 0xb0, 0x21, 0x57, 0x46, 0x02, 0xee, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1575 = { .name = "ecdsa_brainpoolp384r1_sha384_1575", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1575_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1575_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1575_sig, .siglen = 96, .result = 1, .comment = "u2 == n - 1, tcId is 172 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1576 for ECDSA, tcId is 173 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1576_pubkey[] = { 0x04, 0xd9, 0xd4, 0xa6, 0x2d, 0x6e, 0xb0, 0x20, 0x73, 0xe7, 0x38, 0xb1, 0xe4, 0x39, 0xce, 0xcd, 0x54, 0x40, 0x03, 0x19, 0x11, 0xf4, 0x51, 0x90, 0xeb, 0x60, 0x62, 0xa3, 0x35, 0x35, 0xfc, 0x52, 0x69, 0xbc, 0xfc, 0x25, 0xd4, 0xaf, 0xc1, 0xda, 0xe0, 0xeb, 0xad, 0x94, 0x8d, 0x77, 0x32, 0xd8, 0x02, 0x9a, 0xf3, 0x7e, 0x89, 0xa3, 0xce, 0xa7, 0xdf, 0x38, 0xb0, 0x20, 0xf6, 0x24, 0x90, 0x6f, 0xca, 0x6d, 0x94, 0x4e, 0x14, 0x86, 0x85, 0x3f, 0xe8, 0xe5, 0xba, 0x9c, 0xfb, 0xa2, 0xd7, 0x4a, 0x85, 0x2e, 0xc5, 0x87, 0xd4, 0x6f, 0xe4, 0x99, 0x17, 0xc3, 0x64, 0x41, 0x8e, 0xf7, 0xec, 0xa5, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1576_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1576_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x53, 0x3b, 0x0d, 0x50, 0x48, 0x0a, 0x3e, 0xf0, 0x7e, 0x7e, 0x8a, 0xf8, 0xb1, 0x09, 0x77, 0x59, 0xbc, 0x03, 0xac, 0x9a, 0x1c, 0x7e, 0xd6, 0x07, 0x5a, 0x05, 0x28, 0x69, 0xf5, 0x7f, 0x12, 0xb2, 0x85, 0x61, 0x31, 0x62, 0xd0, 0x8e, 0xe7, 0xaa, 0xb9, 0xfe, 0x54, 0xaa, 0xa9, 0x84, 0xa3, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1576 = { .name = "ecdsa_brainpoolp384r1_sha384_1576", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1576_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1576_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1576_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 173 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1577 for ECDSA, tcId is 174 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1577_pubkey[] = { 0x1a, 0x4a, 0x55, 0xc9, 0xb0, 0xce, 0x43, 0xd7, 0xed, 0x78, 0xa9, 0x8d, 0x9b, 0xf6, 0x45, 0x9c, 0xcf, 0x34, 0x94, 0x66, 0xfc, 0xcc, 0x45, 0x75, 0x98, 0xfc, 0x15, 0xa1, 0xd6, 0x95, 0x6d, 0x8c, 0xe8, 0x34, 0x8b, 0x23, 0x32, 0xff, 0xfb, 0x3d, 0x51, 0x6b, 0x07, 0x8d, 0x28, 0xd3, 0x29, 0xdd, 0x73, 0xf4, 0x5a, 0x4c, 0xe1, 0xf5, 0xdc, 0x77, 0x2f, 0x3c, 0x32, 0x83, 0xaf, 0x65, 0x64, 0xe6, 0xe4, 0x10, 0xf9, 0xd5, 0x06, 0x4b, 0x64, 0x84, 0x06, 0x59, 0x66, 0x93, 0x66, 0x93, 0xf6, 0x2a, 0xc9, 0x94, 0x0e, 0xb2, 0x89, 0x14, 0xa0, 0x91, 0xd2, 0x96, 0x4c, 0xd8, 0x43, 0xb4, 0x10, 0x28, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1577_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1577_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x70, 0xa8, 0xe8, 0x17, 0xf4, 0xea, 0x82, 0xb8, 0x31, 0xba, 0x5e, 0x67, 0x18, 0x30, 0xb4, 0x31, 0x28, 0x46, 0xb2, 0x3d, 0xa1, 0x4f, 0xf7, 0xd4, 0x3b, 0xaf, 0x3a, 0x7e, 0xe7, 0xaa, 0x06, 0x1c, 0x86, 0x42, 0x2a, 0xaf, 0x27, 0xff, 0xc5, 0xc6, 0x55, 0x40, 0x68, 0x68, 0xb5, 0xbf, 0x19, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1577 = { .name = "ecdsa_brainpoolp384r1_sha384_1577", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1577_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1577_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1577_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 174 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1578 for ECDSA, tcId is 175 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1578_pubkey[] = { 0x37, 0x3a, 0xc9, 0x8f, 0x08, 0x82, 0x68, 0xa8, 0x6d, 0x13, 0x6d, 0xe4, 0xfa, 0x0c, 0xe2, 0xc4, 0x10, 0x42, 0xcd, 0x33, 0xed, 0x2d, 0x07, 0x25, 0x0f, 0x53, 0xcd, 0x4e, 0xd4, 0x3f, 0xa1, 0xda, 0x42, 0x5d, 0xa5, 0x97, 0xbd, 0x5b, 0x41, 0x3d, 0x56, 0xcf, 0xff, 0x95, 0x42, 0x67, 0x10, 0x4f, 0x06, 0x9e, 0x04, 0x53, 0xbb, 0xbd, 0x79, 0x28, 0x03, 0x16, 0xf8, 0xc1, 0xc1, 0x61, 0xa8, 0x46, 0xaf, 0x37, 0x9a, 0x94, 0x1e, 0xd2, 0x86, 0xe5, 0x93, 0xe7, 0xf2, 0x89, 0xba, 0x4f, 0xff, 0x42, 0x45, 0x8b, 0x27, 0x3a, 0x3b, 0xa4, 0x99, 0x57, 0x4e, 0x13, 0x4e, 0x7f, 0xb4, 0xa7, 0xdc, 0x19, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1578_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1578_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x32, 0x6c, 0x08, 0x72, 0xa7, 0x22, 0x4e, 0x7a, 0x10, 0x40, 0x87, 0xac, 0xf4, 0xc4, 0xb4, 0xe3, 0xe5, 0xab, 0xa4, 0xff, 0xe4, 0x62, 0x5f, 0xc3, 0x95, 0x5c, 0xe9, 0x64, 0x7b, 0xf7, 0x1f, 0xb5, 0x96, 0xb8, 0x39, 0x71, 0xad, 0x2b, 0x52, 0x47, 0x3a, 0x28, 0x21, 0x99, 0x1c, 0x80, 0x89, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1578 = { .name = "ecdsa_brainpoolp384r1_sha384_1578", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1578_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1578_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1578_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 175 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1579 for ECDSA, tcId is 176 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1579_pubkey[] = { 0x7e, 0x6a, 0xb4, 0x29, 0xb9, 0xe3, 0x3a, 0x97, 0x4f, 0x6a, 0xb9, 0xa4, 0x9e, 0xb1, 0x52, 0xc4, 0x84, 0x57, 0x5f, 0xad, 0x5d, 0x9b, 0xcd, 0xdc, 0xb8, 0x7e, 0xdc, 0xe1, 0x6e, 0x79, 0x33, 0x3a, 0x93, 0x72, 0x76, 0xf3, 0x6a, 0xec, 0x91, 0x21, 0xde, 0x45, 0x03, 0x84, 0xcb, 0x20, 0xbb, 0x2e, 0x85, 0x95, 0xf6, 0xc2, 0x88, 0x0d, 0x89, 0x19, 0x8e, 0x1b, 0x62, 0x5e, 0x65, 0x05, 0x6d, 0x0a, 0x19, 0xa5, 0x8d, 0x1d, 0x1c, 0x55, 0x1b, 0xcc, 0x5d, 0xd3, 0x9d, 0x28, 0x1d, 0x72, 0x6d, 0xad, 0x41, 0x08, 0x48, 0x8c, 0x8f, 0x94, 0x1a, 0xc9, 0x83, 0x16, 0x9c, 0xac, 0xe3, 0xec, 0xc7, 0x1b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1579_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1579_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x65, 0xcf, 0x0a, 0x5b, 0xce, 0x70, 0xaf, 0x07, 0x8a, 0xf6, 0xd5, 0xa1, 0x45, 0x45, 0xca, 0x61, 0x9e, 0x47, 0xd6, 0xeb, 0x0f, 0xd0, 0x53, 0x1e, 0xcc, 0x74, 0x3a, 0x76, 0x85, 0x53, 0x02, 0x84, 0xa8, 0x32, 0x89, 0xc2, 0xd0, 0x9e, 0x02, 0x43, 0x84, 0xae, 0x5e, 0x77, 0x87, 0x99, 0xe4, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1579 = { .name = "ecdsa_brainpoolp384r1_sha384_1579", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1579_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1579_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1579_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 176 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1580 for ECDSA, tcId is 177 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1580_pubkey[] = { 0x1f, 0xbb, 0x37, 0xf7, 0x51, 0x95, 0xc3, 0xf2, 0xde, 0x3a, 0xfc, 0xc8, 0x8a, 0xd7, 0xeb, 0x32, 0x10, 0x81, 0x44, 0x60, 0x89, 0x43, 0xfa, 0xce, 0x3a, 0x89, 0x00, 0x05, 0xff, 0x2a, 0x3e, 0x0b, 0x55, 0x80, 0x79, 0xc5, 0x84, 0x26, 0x20, 0xf4, 0x4a, 0xdc, 0x0c, 0x38, 0xdd, 0x88, 0xaa, 0xc5, 0x51, 0x73, 0x4f, 0x8e, 0xb8, 0x27, 0xdf, 0x92, 0x9d, 0x73, 0x17, 0x71, 0x4a, 0x29, 0xcf, 0x8b, 0xa4, 0x32, 0xca, 0xf6, 0x89, 0x09, 0x4d, 0x00, 0xeb, 0x9d, 0x63, 0xcb, 0xc9, 0x08, 0xba, 0x76, 0xca, 0x5b, 0x1f, 0x93, 0xd2, 0x29, 0x47, 0x7c, 0x96, 0x08, 0x42, 0x94, 0x0f, 0x42, 0x24, 0xd3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1580_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1580_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x2e, 0x09, 0x9a, 0xdf, 0xe4, 0xd9, 0x12, 0x05, 0x96, 0xe8, 0xa1, 0x52, 0x03, 0x99, 0xb0, 0xe2, 0x49, 0x55, 0x5b, 0x17, 0x1e, 0x0a, 0x71, 0x96, 0x73, 0x07, 0x54, 0x8a, 0x3c, 0x28, 0x75, 0x3f, 0xa4, 0x0b, 0xbc, 0xb0, 0xa8, 0x65, 0x83, 0x69, 0xdc, 0x8c, 0xa0, 0xca, 0xa0, 0x5f, 0xb0, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1580 = { .name = "ecdsa_brainpoolp384r1_sha384_1580", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1580_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1580_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1580_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 177 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1581 for ECDSA, tcId is 178 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1581_pubkey[] = { 0x07, 0xfa, 0x30, 0xc8, 0x37, 0xc8, 0xad, 0x02, 0x93, 0x26, 0xa1, 0xd4, 0x48, 0xbd, 0x27, 0x52, 0x1b, 0x5d, 0x26, 0xaa, 0xd4, 0xd8, 0x24, 0x4b, 0x72, 0x42, 0x49, 0x3d, 0xf7, 0x01, 0x72, 0xe6, 0xdd, 0x1d, 0xaf, 0x5c, 0x7e, 0x07, 0xf4, 0xfa, 0x10, 0x2f, 0x5c, 0x41, 0x5a, 0x4e, 0xc6, 0x1f, 0x09, 0x04, 0x52, 0x7d, 0xf8, 0x77, 0x52, 0x7f, 0x7d, 0x0f, 0x5a, 0x7f, 0x71, 0xb6, 0xd9, 0xc0, 0x3f, 0x2d, 0xe1, 0xdf, 0x88, 0x04, 0x86, 0x8e, 0x73, 0x37, 0xda, 0x35, 0xc9, 0xb1, 0xff, 0xc9, 0xbf, 0x2e, 0x27, 0x9c, 0x3a, 0xf8, 0xa0, 0x78, 0x6e, 0x6f, 0x39, 0x83, 0x2c, 0xc6, 0xed, 0x1b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1581_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1581_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5c, 0x13, 0x35, 0xbf, 0xc9, 0xb2, 0x24, 0x0b, 0x2d, 0xd1, 0x42, 0xa4, 0x07, 0x33, 0x61, 0xc4, 0x92, 0xaa, 0xb6, 0x2e, 0x3c, 0x14, 0xe3, 0x2c, 0xe6, 0x0e, 0xa9, 0x14, 0x78, 0x50, 0xea, 0x7f, 0x48, 0x17, 0x79, 0x61, 0x50, 0xcb, 0x06, 0xd3, 0xb9, 0x19, 0x41, 0x95, 0x40, 0xbf, 0x60, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1581 = { .name = "ecdsa_brainpoolp384r1_sha384_1581", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1581_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1581_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1581_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 178 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1582 for ECDSA, tcId is 179 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1582_pubkey[] = { 0x61, 0x39, 0x7a, 0xe7, 0xfe, 0x8e, 0x7e, 0x89, 0x4b, 0xfa, 0x68, 0x9e, 0x58, 0x13, 0x51, 0x42, 0x93, 0xa0, 0xf1, 0xb9, 0xf1, 0x09, 0x0c, 0x0d, 0x96, 0x96, 0x37, 0x9b, 0x61, 0x28, 0x7a, 0x75, 0x2a, 0x3f, 0x7d, 0x1d, 0x24, 0x80, 0xfe, 0x41, 0x27, 0x49, 0x8d, 0x0e, 0xed, 0xa8, 0x4c, 0x63, 0x0c, 0x2f, 0xad, 0xd3, 0x7e, 0xa3, 0x6b, 0xfe, 0x53, 0x2b, 0x5d, 0x3a, 0x0f, 0x10, 0x1d, 0xdd, 0x3a, 0xc5, 0x94, 0x58, 0x39, 0x96, 0x48, 0xf3, 0xef, 0xaf, 0x58, 0x33, 0xde, 0xc1, 0xc8, 0xc8, 0xec, 0xe0, 0x55, 0x15, 0x89, 0x35, 0x53, 0xef, 0x4d, 0x58, 0x12, 0x0d, 0x37, 0xce, 0x2e, 0xcd, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1582_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1582_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x25, 0x91, 0x60, 0xb3, 0x21, 0xc3, 0x50, 0xf4, 0xf2, 0x29, 0x9a, 0xa7, 0x7c, 0x72, 0xa0, 0x92, 0x48, 0x92, 0x79, 0x57, 0xb6, 0x41, 0x43, 0x08, 0xbf, 0x8c, 0x7f, 0xb4, 0xf2, 0xdb, 0xba, 0x5c, 0xa7, 0x91, 0x98, 0xf8, 0x0a, 0x15, 0x0e, 0x1c, 0xeb, 0x5a, 0x98, 0x45, 0x14, 0x4e, 0xee, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1582 = { .name = "ecdsa_brainpoolp384r1_sha384_1582", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1582_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1582_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1582_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 179 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1583 for ECDSA, tcId is 180 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1583_pubkey[] = { 0x7f, 0x16, 0x6e, 0xfa, 0x8d, 0x84, 0x16, 0xd9, 0x22, 0xf5, 0x76, 0x73, 0xa2, 0x18, 0x0c, 0xfb, 0xb4, 0x9e, 0x8d, 0x16, 0x0d, 0x60, 0xba, 0x5e, 0xc9, 0x0b, 0xa5, 0x47, 0xf3, 0xec, 0xcd, 0x22, 0xce, 0x6a, 0xfd, 0x99, 0xa0, 0xfb, 0x29, 0x2c, 0xfd, 0x16, 0xb0, 0x69, 0x2b, 0x9c, 0xab, 0x03, 0x41, 0x85, 0x79, 0xe6, 0x7c, 0x87, 0xb3, 0x59, 0x91, 0x2f, 0x6c, 0xb4, 0x15, 0x8b, 0xdd, 0x7e, 0xa1, 0x30, 0xb5, 0x00, 0x77, 0x26, 0xdf, 0x2f, 0xce, 0x31, 0x99, 0x15, 0xde, 0xed, 0xc4, 0xf7, 0xe8, 0x9e, 0xe2, 0x3f, 0x78, 0x6e, 0x25, 0x37, 0x3c, 0x99, 0x37, 0x49, 0x8b, 0xab, 0x81, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1583_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1583_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x88, 0x19, 0x64, 0xe1, 0xbb, 0xa9, 0xa2, 0x8c, 0x7a, 0x1d, 0x84, 0x37, 0x9c, 0x65, 0xbb, 0x3d, 0xa7, 0x2f, 0x3c, 0xc8, 0x79, 0xf7, 0xf5, 0x79, 0xd2, 0xf9, 0xb3, 0x4a, 0x57, 0x44, 0x32, 0xd6, 0xc7, 0xd1, 0xc2, 0x29, 0xee, 0x22, 0x7d, 0x4d, 0xdb, 0xdd, 0x9f, 0x15, 0xdf, 0x99, 0x78, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1583 = { .name = "ecdsa_brainpoolp384r1_sha384_1583", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1583_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1583_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1583_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 180 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1584 for ECDSA, tcId is 181 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1584_pubkey[] = { 0x77, 0xc9, 0xc2, 0xe6, 0x58, 0xb0, 0x04, 0xab, 0x68, 0x40, 0xd7, 0xc3, 0x3a, 0x5e, 0x7e, 0xb5, 0xf9, 0x3b, 0xa3, 0xa7, 0xc5, 0xb3, 0x2f, 0x72, 0x75, 0xfd, 0x75, 0xb0, 0x7c, 0x1c, 0x92, 0xf5, 0xae, 0x31, 0x57, 0x6b, 0x9c, 0xbc, 0xa0, 0x46, 0x33, 0x7e, 0x6d, 0x6e, 0xa7, 0x6c, 0x14, 0x5e, 0x67, 0xc5, 0x60, 0x10, 0xdd, 0x97, 0x49, 0xe2, 0xd9, 0x0b, 0x3e, 0xb5, 0x7e, 0xf1, 0xc4, 0xc7, 0x37, 0x41, 0x23, 0x3a, 0x32, 0xa6, 0xa4, 0x35, 0x5b, 0x8c, 0x4e, 0x3a, 0x24, 0xbc, 0xf5, 0x98, 0x66, 0x27, 0xc7, 0x48, 0x07, 0x83, 0x16, 0x1d, 0xb1, 0xd2, 0xa5, 0x33, 0x2b, 0xd7, 0x5f, 0xef, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1584_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1584_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0e, 0x3c, 0x83, 0xbb, 0x59, 0xab, 0xc5, 0x72, 0x20, 0x17, 0x01, 0x52, 0x25, 0x1c, 0xf0, 0x10, 0xb0, 0x08, 0x1f, 0xec, 0xca, 0x2c, 0x95, 0x7c, 0xa7, 0xec, 0x1a, 0x33, 0xda, 0xe3, 0xca, 0x1d, 0x70, 0x94, 0xb1, 0xc0, 0xf7, 0x1b, 0x03, 0xe0, 0x08, 0xbb, 0xe6, 0x46, 0x59, 0x11, 0x9f, 0x09, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1584 = { .name = "ecdsa_brainpoolp384r1_sha384_1584", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1584_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1584_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1584_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 181 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1585 for ECDSA, tcId is 182 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1585_pubkey[] = { 0x64, 0xd9, 0xa3, 0x17, 0xd5, 0xb4, 0x1a, 0xf3, 0x0f, 0xdf, 0xc7, 0x38, 0x94, 0x60, 0xf3, 0x57, 0xfa, 0x99, 0x78, 0x30, 0x4d, 0x02, 0x6b, 0x31, 0x2a, 0xa5, 0xca, 0x04, 0xa1, 0x9b, 0xdc, 0x0c, 0x56, 0x44, 0x0c, 0xfd, 0x14, 0xa0, 0xb0, 0x60, 0xc3, 0xb8, 0xf4, 0xee, 0x8d, 0x4a, 0x5a, 0x37, 0x77, 0x29, 0x9b, 0x22, 0x80, 0xab, 0x4c, 0x85, 0x7e, 0xd2, 0x53, 0x1e, 0x8d, 0xb0, 0x27, 0xf8, 0xc7, 0x23, 0x80, 0x28, 0xbd, 0x7f, 0x7b, 0xa5, 0x9b, 0xc8, 0x05, 0x47, 0xd4, 0xf1, 0x0d, 0xa6, 0xf2, 0xe6, 0x13, 0x58, 0x05, 0x53, 0x40, 0x6f, 0x04, 0x27, 0xec, 0xbd, 0x7b, 0x75, 0x91, 0x6e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1585_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1585_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x63, 0x1b, 0x97, 0xda, 0x7f, 0x33, 0x4d, 0xaf, 0xd0, 0x1e, 0x2a, 0x01, 0xf8, 0x61, 0x86, 0x32, 0x37, 0x2d, 0x9a, 0xbc, 0xdf, 0x14, 0xeb, 0xaf, 0x72, 0x13, 0xda, 0x37, 0xb1, 0x44, 0x9c, 0x4e, 0x8c, 0x8a, 0x1d, 0xfe, 0x03, 0x38, 0x4f, 0x3a, 0xde, 0x89, 0x07, 0xad, 0x94, 0x42, 0x13, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1585 = { .name = "ecdsa_brainpoolp384r1_sha384_1585", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1585_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1585_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1585_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 182 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1586 for ECDSA, tcId is 183 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1586_pubkey[] = { 0x26, 0x4b, 0xa4, 0x47, 0xf8, 0x0d, 0x72, 0x1b, 0xf1, 0xe7, 0x98, 0x77, 0xf2, 0x7a, 0x23, 0xee, 0x58, 0x56, 0x5e, 0x88, 0xc4, 0x9f, 0x6b, 0x9c, 0xd6, 0x44, 0x8c, 0x02, 0x4b, 0x6f, 0xf5, 0x3a, 0xeb, 0xb2, 0xb0, 0x8c, 0xec, 0x22, 0xeb, 0x2e, 0xb3, 0x8e, 0x30, 0xfd, 0x54, 0x72, 0x7f, 0x01, 0x80, 0x18, 0x87, 0xf9, 0xf9, 0x4d, 0xce, 0x62, 0x5e, 0xd1, 0xd5, 0x63, 0x50, 0xa4, 0xb2, 0x52, 0xe0, 0xdc, 0xfc, 0x09, 0x84, 0x92, 0x8f, 0x25, 0xad, 0x22, 0xa1, 0x31, 0x35, 0xba, 0xf9, 0x96, 0xbf, 0xa8, 0x28, 0x09, 0xfb, 0xe7, 0x9c, 0x09, 0x79, 0x67, 0x0f, 0xdd, 0xc9, 0xfb, 0xa9, 0xe6, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1586_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1586_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x39, 0x7e, 0x11, 0x32, 0x5b, 0x2e, 0x2e, 0x37, 0x90, 0xde, 0xe4, 0x85, 0x9f, 0xdc, 0xca, 0x85, 0x59, 0x2b, 0xc4, 0x6f, 0xd0, 0xd5, 0x80, 0xab, 0xc5, 0x11, 0x46, 0x02, 0xb6, 0x85, 0x12, 0xf5, 0x49, 0xd9, 0x85, 0x4c, 0x9a, 0xf0, 0xdb, 0x65, 0x81, 0x89, 0xdd, 0x58, 0x3f, 0x7f, 0xc1, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1586 = { .name = "ecdsa_brainpoolp384r1_sha384_1586", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1586_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1586_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1586_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 183 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1587 for ECDSA, tcId is 184 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1587_pubkey[] = { 0x04, 0x91, 0x80, 0x40, 0xa5, 0x8d, 0xc4, 0x77, 0xa7, 0x24, 0x55, 0x61, 0x27, 0x3d, 0xf2, 0xd8, 0xbd, 0x97, 0x7e, 0x5f, 0xd3, 0x9c, 0x40, 0xd3, 0x01, 0x15, 0x36, 0xcb, 0x2b, 0x9c, 0xfe, 0xe8, 0x2e, 0x2a, 0xb5, 0xf5, 0x39, 0xe5, 0x90, 0x8d, 0xcb, 0xf3, 0xff, 0x24, 0xc6, 0x45, 0xdb, 0x4e, 0x59, 0x69, 0xa9, 0xd8, 0xdf, 0x5c, 0xda, 0xaf, 0xe3, 0x49, 0x0c, 0xaa, 0x49, 0x46, 0xac, 0xf5, 0xeb, 0xe3, 0xe9, 0x3a, 0xab, 0x28, 0xa8, 0xd4, 0xa6, 0xf6, 0x1e, 0x2c, 0x8e, 0x5c, 0x02, 0xdc, 0x60, 0x5c, 0x75, 0x80, 0x6d, 0xdd, 0xdd, 0xeb, 0xe2, 0x39, 0x15, 0x63, 0x11, 0x59, 0xc1, 0xf7, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1587_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1587_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0f, 0xe0, 0x8a, 0x8a, 0x37, 0x29, 0x0e, 0xbf, 0x51, 0x9f, 0x9f, 0x09, 0x47, 0x58, 0x0e, 0xd8, 0x7b, 0x29, 0xee, 0x22, 0xc2, 0x96, 0x15, 0xa8, 0x18, 0x0e, 0xb1, 0xcd, 0xbb, 0xc5, 0x89, 0x9c, 0x07, 0x28, 0xec, 0x9b, 0x32, 0xa9, 0x67, 0x90, 0x24, 0x8a, 0xb3, 0x02, 0xea, 0xbd, 0x6f, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1587 = { .name = "ecdsa_brainpoolp384r1_sha384_1587", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1587_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1587_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1587_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 184 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1588 for ECDSA, tcId is 185 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1588_pubkey[] = { 0x22, 0xe4, 0x4e, 0xbe, 0x0a, 0x35, 0x1e, 0x4c, 0x91, 0xf7, 0xbd, 0xfc, 0x0c, 0x0c, 0x3c, 0x6e, 0x1c, 0x67, 0x9d, 0xa8, 0x4a, 0x32, 0x53, 0x9c, 0x2d, 0xbb, 0x41, 0xea, 0x31, 0x06, 0x1b, 0x08, 0x25, 0xe3, 0xf3, 0x4d, 0x7b, 0x0a, 0xd5, 0x25, 0x26, 0x1e, 0xb9, 0xe4, 0x57, 0xc4, 0x08, 0x19, 0x60, 0x89, 0xe3, 0x30, 0x34, 0x73, 0x1b, 0xa8, 0xe9, 0xf9, 0x5f, 0x5a, 0x23, 0x4b, 0xf8, 0xd3, 0x53, 0x9c, 0x83, 0x81, 0xf4, 0xd9, 0x55, 0x10, 0xd5, 0xe0, 0xf1, 0x45, 0xfd, 0x48, 0x20, 0x5e, 0x5c, 0x60, 0x21, 0x8c, 0x3f, 0x84, 0xb1, 0x89, 0xc8, 0xe4, 0xfd, 0x56, 0x08, 0xb4, 0x97, 0x78, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1588_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1588_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5f, 0x92, 0x93, 0x7a, 0xa5, 0x2d, 0x5d, 0xd1, 0x0f, 0xce, 0xfb, 0x95, 0xa2, 0xd5, 0x7b, 0x61, 0x7d, 0x6d, 0x8b, 0x04, 0xe8, 0xdb, 0x5b, 0x3b, 0x5a, 0x39, 0xab, 0xe8, 0x93, 0xfd, 0xa2, 0xae, 0xb2, 0xf9, 0x78, 0x10, 0x8c, 0x55, 0x8a, 0xab, 0xba, 0xd8, 0x29, 0xce, 0x02, 0xc2, 0x77, 0x35, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1588 = { .name = "ecdsa_brainpoolp384r1_sha384_1588", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1588_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1588_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1588_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 185 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1589 for ECDSA, tcId is 186 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1589_pubkey[] = { 0x66, 0xed, 0x49, 0x77, 0x9e, 0xd6, 0xa7, 0xb1, 0x0c, 0x81, 0x2b, 0xc7, 0xee, 0x7b, 0x47, 0xa5, 0xd1, 0x1c, 0x5e, 0xa5, 0x02, 0x77, 0x27, 0x3d, 0xa1, 0x40, 0xbc, 0x1b, 0x0c, 0xf5, 0xb8, 0x21, 0x0a, 0x6a, 0x73, 0x7f, 0x7e, 0x9d, 0x92, 0xee, 0xe6, 0xd8, 0x45, 0x13, 0x7e, 0x5c, 0x44, 0xa2, 0x8a, 0xcc, 0xb8, 0xf6, 0x37, 0x38, 0x5c, 0xf6, 0x51, 0x9b, 0xfa, 0xe3, 0xed, 0x3a, 0xe4, 0xd0, 0xac, 0xaa, 0x19, 0xa2, 0x60, 0xa0, 0x1b, 0xd8, 0xcb, 0x53, 0xad, 0x24, 0xda, 0xca, 0xb1, 0x95, 0x4b, 0x20, 0xd1, 0x47, 0x2c, 0xf3, 0x97, 0x5e, 0x87, 0xcc, 0x73, 0x3f, 0x32, 0x9a, 0xb6, 0xbd, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1589_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1589_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x59, 0x93, 0x0a, 0x2b, 0x8b, 0xbd, 0x79, 0xb8, 0x05, 0x1f, 0x25, 0x2a, 0x1a, 0xf7, 0x6b, 0x4a, 0x5c, 0x65, 0x25, 0xad, 0xf9, 0xc6, 0xc7, 0x91, 0x0a, 0x5c, 0xcf, 0x79, 0x8e, 0xac, 0x0c, 0x8d, 0x45, 0x13, 0x92, 0x3a, 0x79, 0x2a, 0x96, 0x5a, 0xbe, 0x82, 0xbb, 0x56, 0x4d, 0xac, 0x21, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1589 = { .name = "ecdsa_brainpoolp384r1_sha384_1589", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1589_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1589_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1589_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 186 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1590 for ECDSA, tcId is 187 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1590_pubkey[] = { 0x30, 0x24, 0x91, 0x20, 0x41, 0xbc, 0x98, 0x9a, 0x93, 0x6f, 0xb4, 0xdc, 0xdd, 0x17, 0x8b, 0x15, 0xe0, 0x3a, 0x0a, 0xa9, 0x4a, 0xba, 0xfb, 0x44, 0x65, 0xb4, 0xa8, 0x9d, 0x44, 0x16, 0xb7, 0xa8, 0xb0, 0x29, 0xd4, 0x7c, 0x17, 0xe6, 0x9a, 0x25, 0x96, 0x2f, 0xf3, 0xae, 0xfe, 0x86, 0x2d, 0xcb, 0x24, 0x9e, 0xe9, 0x25, 0x2b, 0x57, 0x13, 0xe7, 0x47, 0xa2, 0xda, 0x8a, 0xac, 0x2b, 0x96, 0x1e, 0xe2, 0xb6, 0xac, 0xa1, 0x57, 0xa4, 0x48, 0x88, 0x74, 0x86, 0x48, 0xfb, 0xcd, 0xc5, 0x66, 0x1c, 0xd4, 0xa1, 0x69, 0xbb, 0x92, 0xc9, 0xc1, 0xce, 0x50, 0xa7, 0x9a, 0x63, 0x73, 0x50, 0x02, 0xa1, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1590_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1590_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x14, 0x49, 0x90, 0x1c, 0xe4, 0xb0, 0x0f, 0x0e, 0x3a, 0x5f, 0xf8, 0x4c, 0xff, 0x8c, 0x13, 0x48, 0x54, 0xb8, 0x08, 0xe5, 0x04, 0xd1, 0xb8, 0xf0, 0x27, 0xac, 0xe9, 0x59, 0x12, 0x34, 0xe3, 0xf6, 0x2c, 0xe7, 0x0c, 0x35, 0xa8, 0xaa, 0x8e, 0x60, 0xca, 0xfe, 0x1e, 0x0d, 0xf3, 0xed, 0x80, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1590 = { .name = "ecdsa_brainpoolp384r1_sha384_1590", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1590_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1590_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1590_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 187 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1591 for ECDSA, tcId is 188 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1591_pubkey[] = { 0x6c, 0x93, 0x93, 0xb0, 0x0e, 0x9a, 0x62, 0xce, 0x0b, 0x83, 0x67, 0x4c, 0xdc, 0xca, 0x59, 0xb1, 0x8d, 0x5b, 0x34, 0x24, 0x63, 0x48, 0xe3, 0x7c, 0x1d, 0x78, 0x89, 0x8a, 0x52, 0x2d, 0x81, 0x3c, 0x49, 0xd0, 0x8e, 0xfc, 0x5f, 0x3f, 0x7e, 0xf3, 0x3f, 0x3d, 0xc9, 0xdd, 0x1b, 0xc2, 0xe5, 0xc2, 0x00, 0x0b, 0x94, 0x10, 0xce, 0x04, 0xa6, 0x4c, 0xd0, 0x95, 0xae, 0x11, 0x94, 0xbc, 0x1f, 0x51, 0x4c, 0x70, 0x09, 0xa4, 0xe0, 0x68, 0x71, 0xb5, 0x57, 0x15, 0x4c, 0xf4, 0x92, 0xe7, 0xc5, 0x77, 0x49, 0x48, 0x7e, 0xcf, 0xcd, 0x04, 0xcb, 0x31, 0x42, 0x6a, 0xb7, 0x85, 0xff, 0xa9, 0x5e, 0x2f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1591_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1591_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x89, 0xae, 0x6f, 0x8e, 0x21, 0x5b, 0xcf, 0x35, 0xc7, 0xe2, 0xaf, 0xed, 0x1a, 0x6b, 0x98, 0x55, 0x17, 0x16, 0x87, 0xd9, 0xed, 0xbe, 0xa8, 0xaf, 0x5b, 0xf8, 0xe9, 0xdd, 0xc6, 0x67, 0xaa, 0xc4, 0xe1, 0x66, 0xf0, 0x50, 0x97, 0x38, 0x5f, 0xa9, 0xea, 0x3a, 0x62, 0x45, 0xfc, 0x07, 0xb4, 0xad, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1591 = { .name = "ecdsa_brainpoolp384r1_sha384_1591", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1591_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1591_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1591_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 188 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1592 for ECDSA, tcId is 189 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1592_pubkey[] = { 0x2c, 0x58, 0x27, 0x7a, 0xaa, 0x61, 0xc4, 0x00, 0xd7, 0x03, 0x61, 0x83, 0xaf, 0x49, 0xc9, 0x9a, 0x97, 0xfe, 0xa5, 0xa8, 0xd5, 0xf8, 0x60, 0x8c, 0x4c, 0x6a, 0xc7, 0xa2, 0x82, 0x75, 0x7e, 0x4d, 0xc4, 0xb6, 0xf9, 0x2d, 0x82, 0xa1, 0x02, 0x72, 0xf2, 0xa1, 0x96, 0x96, 0xa4, 0x8f, 0xa7, 0x9f, 0x5a, 0x8a, 0xdb, 0x77, 0x07, 0x40, 0x66, 0x9d, 0x60, 0x10, 0xe5, 0x5f, 0x66, 0x25, 0xb1, 0x41, 0xbe, 0x46, 0x9f, 0xe1, 0x77, 0x9f, 0x4a, 0xdf, 0xe6, 0x4e, 0xab, 0x2e, 0x4a, 0x9a, 0xc5, 0xbf, 0x1c, 0x25, 0xb3, 0xde, 0x0b, 0x74, 0xb8, 0xf9, 0x64, 0x4f, 0xc2, 0x16, 0x01, 0x0d, 0x96, 0x59, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1592_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1592_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3f, 0xc1, 0x62, 0x56, 0xa0, 0x91, 0x4c, 0xe2, 0x66, 0x1a, 0x54, 0x68, 0x8a, 0xf4, 0xb2, 0x54, 0x6b, 0x1b, 0x59, 0xb0, 0x43, 0x66, 0x7d, 0xa6, 0xab, 0xb5, 0xb1, 0xa1, 0xe0, 0xe2, 0xe6, 0xab, 0x86, 0x2f, 0xe8, 0xbb, 0x74, 0x9f, 0x72, 0x51, 0x57, 0x2b, 0xc1, 0x60, 0x56, 0x75, 0x30, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1592 = { .name = "ecdsa_brainpoolp384r1_sha384_1592", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1592_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1592_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1592_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 189 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1593 for ECDSA, tcId is 190 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1593_pubkey[] = { 0x6e, 0x5f, 0x82, 0x7e, 0x1a, 0xa2, 0x25, 0xc4, 0xb9, 0x5d, 0xb5, 0x26, 0x55, 0xf6, 0x7d, 0x65, 0x4b, 0xdc, 0x69, 0xa4, 0xbf, 0x8f, 0x49, 0xc1, 0x9d, 0x1e, 0x65, 0xdc, 0xf1, 0x2c, 0xa5, 0x11, 0x50, 0x5a, 0xa1, 0x72, 0x6c, 0xa2, 0xf5, 0xcd, 0xf8, 0xab, 0x37, 0x6f, 0x94, 0xa0, 0xc5, 0xbd, 0x5d, 0xae, 0xc6, 0xf3, 0x5f, 0x1d, 0xfb, 0xc6, 0x8f, 0xba, 0x02, 0x4c, 0xc8, 0xc5, 0xf7, 0x9c, 0xe9, 0xba, 0xa8, 0x6a, 0xdf, 0xd8, 0xd2, 0xba, 0x53, 0xa7, 0x98, 0xcd, 0xcc, 0x90, 0x25, 0xeb, 0x97, 0x97, 0xd3, 0xbe, 0x20, 0x7b, 0xc6, 0x94, 0xab, 0xb3, 0x38, 0xe4, 0x37, 0x78, 0xff, 0xdd, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1593_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1593_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x64, 0xc1, 0x55, 0x6c, 0x5e, 0xef, 0x31, 0x1a, 0x4f, 0x3b, 0xa4, 0x63, 0x16, 0xad, 0xf7, 0x37, 0x32, 0xd6, 0xed, 0x47, 0xb1, 0xba, 0x2e, 0xcd, 0x17, 0x8f, 0xf8, 0x9b, 0xbc, 0x5d, 0xdd, 0x6c, 0x64, 0x19, 0xf6, 0x2e, 0x04, 0x5e, 0xa2, 0xd3, 0x5c, 0x33, 0xa2, 0x50, 0xdc, 0x2f, 0xb9, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1593 = { .name = "ecdsa_brainpoolp384r1_sha384_1593", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1593_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1593_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1593_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 190 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1594 for ECDSA, tcId is 191 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1594_pubkey[] = { 0x7f, 0xe8, 0x52, 0xa7, 0x61, 0x2a, 0x67, 0x3d, 0xf3, 0x51, 0xf0, 0x5a, 0xfe, 0xaf, 0xcb, 0xb1, 0x6c, 0xe4, 0xca, 0xdf, 0x85, 0x68, 0x1b, 0x2b, 0x5f, 0x46, 0xcc, 0x31, 0xef, 0x33, 0xd6, 0xb6, 0x95, 0x37, 0x8e, 0x73, 0x25, 0xe9, 0xcb, 0x31, 0x85, 0xd7, 0x13, 0x7b, 0x2b, 0x17, 0x00, 0x46, 0x5c, 0xbd, 0x4c, 0x81, 0x00, 0x76, 0xd1, 0x35, 0x31, 0x68, 0x87, 0xe9, 0x4b, 0x14, 0xb4, 0xb0, 0x10, 0x8d, 0xb1, 0xc9, 0x44, 0x79, 0x4c, 0x39, 0x89, 0x38, 0xd4, 0x21, 0x76, 0xc3, 0x25, 0x75, 0xb6, 0x42, 0x8b, 0x3e, 0x37, 0xb6, 0x02, 0x21, 0x1c, 0x57, 0x4a, 0xca, 0xfe, 0xf0, 0x91, 0x1e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1594_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1594_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3c, 0xc9, 0x8c, 0x56, 0x1a, 0xa5, 0xf5, 0x0c, 0x8f, 0x19, 0xd9, 0x47, 0xdc, 0x75, 0xac, 0x8f, 0x50, 0x7e, 0x69, 0x85, 0x76, 0x20, 0x06, 0xe7, 0x10, 0x09, 0x82, 0xca, 0xcc, 0xb7, 0x95, 0x30, 0xf8, 0xf9, 0x35, 0xac, 0x9d, 0x3d, 0x82, 0x96, 0x7c, 0xdf, 0x12, 0x9e, 0xcf, 0x5b, 0x0c, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1594 = { .name = "ecdsa_brainpoolp384r1_sha384_1594", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1594_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1594_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1594_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 191 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1595 for ECDSA, tcId is 192 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1595_pubkey[] = { 0x0a, 0x49, 0xdc, 0x35, 0x9e, 0xd4, 0xfe, 0xf6, 0x83, 0xe4, 0x62, 0xdf, 0xe6, 0x85, 0x44, 0x2c, 0xea, 0x77, 0xb7, 0x33, 0xfd, 0x95, 0x63, 0x32, 0x16, 0x79, 0x4d, 0x9a, 0x61, 0xf7, 0xe1, 0x02, 0x2d, 0x94, 0x2a, 0x36, 0xe7, 0x81, 0xa4, 0x84, 0xa2, 0xb4, 0x79, 0xa6, 0x43, 0x46, 0x9a, 0xf4, 0x51, 0x2e, 0xbd, 0x09, 0x66, 0xb6, 0x8b, 0xfe, 0xcf, 0x7a, 0x47, 0x02, 0x1b, 0xcd, 0x9e, 0x6a, 0xa2, 0x70, 0x3d, 0xcc, 0x55, 0x6a, 0x9a, 0x44, 0x3d, 0x16, 0x19, 0x5a, 0xa1, 0x45, 0x73, 0x8f, 0xa3, 0x6a, 0x4d, 0xff, 0x3d, 0x09, 0x48, 0x1f, 0x4a, 0x86, 0x55, 0x0a, 0x8d, 0x1f, 0x35, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1595_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1595_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3f, 0x20, 0x95, 0x53, 0x0f, 0x36, 0x14, 0x4e, 0x00, 0x90, 0x19, 0xee, 0xe1, 0x02, 0xb2, 0x86, 0x7d, 0x83, 0xc9, 0xeb, 0x4f, 0x28, 0xbc, 0xb3, 0x1b, 0x38, 0x3e, 0x00, 0xc8, 0xc3, 0x74, 0x6b, 0x20, 0xcc, 0x90, 0xe8, 0xef, 0xc8, 0x13, 0xae, 0xfb, 0x5b, 0x6a, 0x49, 0x65, 0x20, 0x4c, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1595 = { .name = "ecdsa_brainpoolp384r1_sha384_1595", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1595_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1595_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1595_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 192 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1596 for ECDSA, tcId is 193 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1596_pubkey[] = { 0x27, 0x67, 0x15, 0x08, 0x74, 0x95, 0xd5, 0x2c, 0x41, 0x60, 0xd1, 0x54, 0x46, 0xeb, 0xb4, 0xd7, 0x58, 0x29, 0x1b, 0xf5, 0xbc, 0x9c, 0xa8, 0x7b, 0x56, 0xc3, 0xf0, 0x0a, 0xdc, 0x41, 0xfa, 0x45, 0x2d, 0x66, 0x68, 0x41, 0x52, 0xd3, 0xe1, 0x9d, 0x2f, 0xc3, 0xad, 0x5d, 0x28, 0x97, 0x87, 0xad, 0x36, 0x73, 0x85, 0xd3, 0xc3, 0xf5, 0xc3, 0xc2, 0xc6, 0xc3, 0x16, 0x6a, 0xdc, 0xfa, 0xfc, 0x3d, 0x20, 0x44, 0x53, 0xca, 0xb8, 0x79, 0x7d, 0x56, 0xe9, 0x55, 0xfb, 0xf1, 0xcf, 0x42, 0x17, 0x63, 0xa6, 0x65, 0x3e, 0x40, 0xef, 0xd9, 0x03, 0x5d, 0xf8, 0x12, 0x81, 0x35, 0x54, 0x6b, 0x62, 0x61, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1596_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1596_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x70, 0x4a, 0xfc, 0x6a, 0x72, 0x08, 0x0d, 0x17, 0x28, 0xf6, 0xcc, 0x9f, 0xd0, 0x23, 0xe9, 0xd2, 0x37, 0x30, 0x23, 0x37, 0x7f, 0x02, 0x59, 0x9b, 0x6e, 0xa9, 0xfb, 0x29, 0x23, 0xdd, 0x74, 0x03, 0xfe, 0x2f, 0xd7, 0x39, 0x99, 0xf6, 0x53, 0x16, 0xb5, 0x3f, 0x91, 0x0b, 0xda, 0x4f, 0x6f, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1596 = { .name = "ecdsa_brainpoolp384r1_sha384_1596", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1596_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1596_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1596_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 193 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1597 for ECDSA, tcId is 194 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1597_pubkey[] = { 0x59, 0x43, 0xdb, 0xd6, 0x6c, 0x79, 0xfc, 0xb8, 0x82, 0x93, 0x6e, 0xcc, 0xdd, 0x6d, 0x86, 0x0c, 0x42, 0xe2, 0x07, 0x27, 0xa2, 0xcd, 0xb2, 0x91, 0x65, 0xc8, 0x42, 0x6c, 0x9d, 0x19, 0x29, 0x90, 0xb7, 0x1d, 0x9a, 0x3c, 0x7f, 0x24, 0x0e, 0x46, 0xac, 0xab, 0x27, 0x41, 0xb7, 0xee, 0x9c, 0x7a, 0x46, 0x1e, 0x5a, 0xb1, 0xdb, 0x3e, 0xb9, 0xb5, 0x1b, 0x32, 0x38, 0xd3, 0xad, 0xa3, 0x35, 0x67, 0xd2, 0x51, 0xd8, 0xfd, 0x0f, 0xba, 0xf5, 0x9a, 0xa1, 0xcf, 0xb4, 0x0f, 0xe7, 0xb2, 0x2e, 0x02, 0x77, 0xf1, 0x66, 0xa3, 0x2e, 0xdb, 0x81, 0xab, 0x6a, 0x85, 0x80, 0xf9, 0xb1, 0xfb, 0x3e, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1597_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1597_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x46, 0xf0, 0x9c, 0x47, 0x41, 0xc1, 0xaf, 0xe7, 0x4e, 0x32, 0xf6, 0xff, 0x14, 0xda, 0xaf, 0x90, 0xf4, 0x48, 0x6c, 0x33, 0xf5, 0xd0, 0xe9, 0x78, 0xf9, 0xaf, 0x24, 0xf5, 0x75, 0x19, 0x88, 0xe7, 0x2b, 0x37, 0x4c, 0x5f, 0xae, 0xff, 0xde, 0xc3, 0x09, 0x33, 0x04, 0x01, 0x96, 0x5f, 0x7d, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1597 = { .name = "ecdsa_brainpoolp384r1_sha384_1597", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1597_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1597_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1597_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 194 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1598 for ECDSA, tcId is 195 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1598_pubkey[] = { 0x52, 0x85, 0xd7, 0x29, 0x25, 0xc8, 0x7c, 0x75, 0xb6, 0xad, 0x99, 0x55, 0x06, 0x41, 0x82, 0xbf, 0x2d, 0xeb, 0xcb, 0x25, 0xc8, 0x8d, 0x06, 0x06, 0xf6, 0x67, 0x28, 0x63, 0xde, 0x41, 0x3e, 0x54, 0x96, 0x88, 0xa4, 0xfc, 0xfb, 0xe6, 0x68, 0x9b, 0xb2, 0x3d, 0xba, 0x2b, 0x75, 0x7b, 0xcd, 0xa6, 0x4e, 0xf6, 0xb0, 0x17, 0x66, 0xc9, 0x5b, 0x66, 0xff, 0x10, 0x49, 0x6d, 0x5d, 0xee, 0xba, 0xc4, 0xb4, 0xbf, 0x8c, 0x3b, 0xb4, 0x23, 0x2c, 0x01, 0x9f, 0x80, 0xb6, 0x9d, 0x8a, 0xb0, 0x21, 0x4c, 0xea, 0xf5, 0x81, 0x30, 0x27, 0xec, 0xec, 0x13, 0x3a, 0x5a, 0x5b, 0x97, 0x19, 0x48, 0x82, 0x2e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1598_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1598_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x19, 0x93, 0x0a, 0x2b, 0x8b, 0xbd, 0x79, 0xb8, 0x05, 0x1f, 0x25, 0x2a, 0x1a, 0xf7, 0x6b, 0x4a, 0x5c, 0x65, 0x25, 0xad, 0xf9, 0xc6, 0xc7, 0x91, 0x0a, 0x5c, 0xcf, 0x79, 0x8e, 0xac, 0x0c, 0x8d, 0x45, 0x13, 0x92, 0x3a, 0x79, 0x2a, 0x96, 0x5a, 0xbe, 0x82, 0xbb, 0x56, 0x4d, 0xac, 0x21, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1598 = { .name = "ecdsa_brainpoolp384r1_sha384_1598", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1598_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1598_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1598_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 195 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1599 for ECDSA, tcId is 196 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1599_pubkey[] = { 0x07, 0x86, 0xaf, 0xb0, 0x3d, 0xd7, 0x91, 0xdb, 0xfc, 0x37, 0x1a, 0xb5, 0x1f, 0xfa, 0x28, 0x8b, 0x7c, 0xed, 0xd9, 0x0d, 0x6a, 0x35, 0xa3, 0xc3, 0xa9, 0x25, 0x66, 0xf8, 0x95, 0xf3, 0x8c, 0xb1, 0x85, 0x36, 0x13, 0x7e, 0x01, 0x0f, 0x1c, 0xfb, 0xa2, 0xfb, 0xed, 0x70, 0x56, 0x8d, 0x77, 0xb8, 0x4e, 0xec, 0x84, 0x0c, 0xca, 0x8b, 0x6f, 0x3f, 0x61, 0x23, 0x04, 0xb6, 0x02, 0xff, 0xad, 0x8d, 0xcb, 0xae, 0x17, 0x86, 0xb2, 0xc2, 0x21, 0x6e, 0x9a, 0x1e, 0x59, 0xa6, 0xb6, 0x96, 0x28, 0xb5, 0x2a, 0x40, 0x8b, 0x6a, 0x08, 0x3d, 0x72, 0x7f, 0x3c, 0xcd, 0x0e, 0x70, 0x6f, 0x9a, 0xee, 0xf8, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1599_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1599_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x33, 0x26, 0x14, 0x57, 0x17, 0x7a, 0xf3, 0x70, 0x0a, 0x3e, 0x4a, 0x54, 0x35, 0xee, 0xd6, 0x94, 0xb8, 0xca, 0x4b, 0x5b, 0xf3, 0x8d, 0x8f, 0x22, 0x14, 0xb9, 0x9e, 0xf3, 0x1d, 0x58, 0x19, 0x1a, 0x8a, 0x27, 0x24, 0x74, 0xf2, 0x55, 0x2c, 0xb5, 0x7d, 0x05, 0x76, 0xac, 0x9b, 0x58, 0x43, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1599 = { .name = "ecdsa_brainpoolp384r1_sha384_1599", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1599_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1599_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1599_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 196 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1600 for ECDSA, tcId is 197 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1600_pubkey[] = { 0x46, 0x69, 0x0d, 0xb4, 0x03, 0x90, 0x42, 0x28, 0xe4, 0xf7, 0x36, 0xb1, 0x34, 0x47, 0x91, 0x59, 0x66, 0x28, 0xe8, 0x56, 0x69, 0xd4, 0xdd, 0x01, 0x37, 0x4b, 0x21, 0x27, 0x42, 0x80, 0xb4, 0x21, 0xe4, 0x2f, 0x5b, 0xa3, 0xf3, 0xf2, 0xfa, 0xda, 0xd2, 0x7d, 0x44, 0x69, 0xbe, 0x7d, 0x9b, 0xdb, 0x7e, 0x88, 0x3b, 0x43, 0xc2, 0x72, 0x17, 0xf6, 0x06, 0xe0, 0xa5, 0xba, 0x6c, 0x9d, 0xf7, 0x81, 0xc1, 0x45, 0x77, 0x6c, 0x0e, 0x5a, 0x89, 0x93, 0xf0, 0xed, 0x65, 0xc6, 0xde, 0xd6, 0x5a, 0x43, 0xbd, 0xdd, 0x0f, 0xe7, 0x61, 0x14, 0x85, 0xe8, 0xe8, 0xd9, 0xe7, 0xde, 0xcd, 0xf2, 0xd8, 0xb5, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1600_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1600_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x4c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1600 = { .name = "ecdsa_brainpoolp384r1_sha384_1600", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1600_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1600_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1600_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 197 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1601 for ECDSA, tcId is 198 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1601_pubkey[] = { 0x8b, 0xe6, 0x92, 0x8a, 0xca, 0xd4, 0x4c, 0x95, 0x71, 0xb5, 0xc4, 0x01, 0x5f, 0xa3, 0xff, 0xae, 0x5e, 0x63, 0x9e, 0x41, 0x30, 0xa1, 0xa6, 0x6b, 0x47, 0x3e, 0x5d, 0xfd, 0xfe, 0x93, 0xb6, 0x8a, 0x8d, 0xe8, 0x95, 0x83, 0x66, 0x6d, 0x4d, 0x69, 0x9e, 0x88, 0x85, 0x46, 0x9f, 0x9b, 0x1a, 0x4d, 0x83, 0xb1, 0xd5, 0x31, 0x23, 0x10, 0xe4, 0x45, 0xae, 0x57, 0xc8, 0x5a, 0xb1, 0xa3, 0xdf, 0x8d, 0xbb, 0xb7, 0x06, 0xa5, 0x98, 0xfb, 0xc0, 0x07, 0xef, 0xb6, 0x02, 0xa1, 0x4a, 0x59, 0x52, 0xfd, 0x7e, 0x7d, 0xf0, 0x46, 0x4d, 0x53, 0x3e, 0x06, 0x2e, 0xa2, 0x11, 0x28, 0x5c, 0x2f, 0x5c, 0x27, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1601_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1601_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x8b, 0x33, 0xc7, 0x08, 0x62, 0x4a, 0x1e, 0x2e, 0xeb, 0xa0, 0x0f, 0xb5, 0xb5, 0xa8, 0xed, 0x1a, 0x16, 0x22, 0xfc, 0x71, 0xed, 0x89, 0x7f, 0xb1, 0x3d, 0x87, 0xac, 0x25, 0x39, 0x35, 0xe8, 0x36, 0x58, 0x50, 0xd3, 0x80, 0x01, 0x5c, 0x11, 0x5d, 0x12, 0xe1, 0x4a, 0x24, 0x72, 0x86, 0x0d, 0x09, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1601 = { .name = "ecdsa_brainpoolp384r1_sha384_1601", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1601_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1601_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1601_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 198 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1602 for ECDSA, tcId is 199 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1602_pubkey[] = { 0x18, 0x86, 0xdd, 0xd2, 0x82, 0xb0, 0x23, 0x08, 0x49, 0x53, 0xef, 0x7d, 0x9e, 0x85, 0x3a, 0x6a, 0xdc, 0x13, 0x60, 0xce, 0xf7, 0xf5, 0x6d, 0xf7, 0xda, 0x0c, 0xa7, 0xbd, 0xcf, 0x4f, 0x3a, 0x5d, 0x22, 0x7a, 0x73, 0x0f, 0x9f, 0x20, 0xf9, 0x43, 0x4b, 0x56, 0x5d, 0xc4, 0xfa, 0x81, 0x9e, 0x85, 0x6a, 0x0f, 0x0e, 0xd8, 0xd7, 0xf2, 0x8f, 0x91, 0x6a, 0x4e, 0x72, 0x7e, 0x55, 0xbf, 0x08, 0x18, 0xdc, 0xc8, 0x4e, 0xd1, 0x13, 0x2b, 0xd7, 0xda, 0x9f, 0x98, 0xff, 0x95, 0xfb, 0x2a, 0xec, 0x23, 0x8f, 0x4d, 0xf9, 0x18, 0x5b, 0x09, 0x82, 0xa6, 0x68, 0x2c, 0x06, 0xc8, 0x5e, 0x6a, 0x89, 0x5e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1602_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1602_sig[] = { 0x87, 0x29, 0xcb, 0xb9, 0x06, 0xf6, 0x9d, 0x8d, 0x43, 0xf9, 0x4c, 0xb8, 0xc4, 0xb9, 0x57, 0x2c, 0x95, 0x82, 0x72, 0xf5, 0xc6, 0xff, 0x75, 0x9b, 0xa9, 0x11, 0x3f, 0x34, 0x0b, 0x9f, 0x9a, 0xa5, 0x98, 0x83, 0x7a, 0xa3, 0x7a, 0x43, 0x11, 0x71, 0x7f, 0xaf, 0x4c, 0xf6, 0x67, 0x47, 0xa5, 0xb4, 0x28, 0xa9, 0xb8, 0xc5, 0x5e, 0xb6, 0xf5, 0xf1, 0xcf, 0x5c, 0x23, 0x3a, 0xff, 0x64, 0x0f, 0x48, 0x21, 0x1c, 0xd2, 0xb9, 0xcf, 0x05, 0x93, 0xe8, 0xb9, 0xff, 0xff, 0x67, 0xc7, 0xe6, 0x97, 0x03, 0xf8, 0xa6, 0xc5, 0x38, 0x2a, 0x36, 0x76, 0x9d, 0x3c, 0xca, 0x57, 0x71, 0x1a, 0xb6, 0x3c, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1602 = { .name = "ecdsa_brainpoolp384r1_sha384_1602", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1602_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1602_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1602_sig, .siglen = 96, .result = 1, .comment = "point duplication during verification, tcId is 199 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1603 for ECDSA, tcId is 200 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1603_pubkey[] = { 0x18, 0x86, 0xdd, 0xd2, 0x82, 0xb0, 0x23, 0x08, 0x49, 0x53, 0xef, 0x7d, 0x9e, 0x85, 0x3a, 0x6a, 0xdc, 0x13, 0x60, 0xce, 0xf7, 0xf5, 0x6d, 0xf7, 0xda, 0x0c, 0xa7, 0xbd, 0xcf, 0x4f, 0x3a, 0x5d, 0x22, 0x7a, 0x73, 0x0f, 0x9f, 0x20, 0xf9, 0x43, 0x4b, 0x56, 0x5d, 0xc4, 0xfa, 0x81, 0x9e, 0x85, 0x22, 0xaa, 0x0f, 0xa9, 0xcb, 0x45, 0xdd, 0x96, 0xa5, 0x0e, 0xfc, 0xff, 0xfb, 0x27, 0x39, 0xc6, 0x38, 0x67, 0x22, 0x38, 0xda, 0x28, 0x7e, 0xd9, 0x73, 0x18, 0xda, 0x83, 0x84, 0x8c, 0x25, 0x00, 0x1d, 0x85, 0xae, 0x11, 0x35, 0x13, 0x97, 0xcb, 0x1f, 0x1a, 0xf9, 0x4a, 0xd2, 0x9d, 0x62, 0xf5, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1603_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1603_sig[] = { 0x87, 0x29, 0xcb, 0xb9, 0x06, 0xf6, 0x9d, 0x8d, 0x43, 0xf9, 0x4c, 0xb8, 0xc4, 0xb9, 0x57, 0x2c, 0x95, 0x82, 0x72, 0xf5, 0xc6, 0xff, 0x75, 0x9b, 0xa9, 0x11, 0x3f, 0x34, 0x0b, 0x9f, 0x9a, 0xa5, 0x98, 0x83, 0x7a, 0xa3, 0x7a, 0x43, 0x11, 0x71, 0x7f, 0xaf, 0x4c, 0xf6, 0x67, 0x47, 0xa5, 0xb4, 0x28, 0xa9, 0xb8, 0xc5, 0x5e, 0xb6, 0xf5, 0xf1, 0xcf, 0x5c, 0x23, 0x3a, 0xff, 0x64, 0x0f, 0x48, 0x21, 0x1c, 0xd2, 0xb9, 0xcf, 0x05, 0x93, 0xe8, 0xb9, 0xff, 0xff, 0x67, 0xc7, 0xe6, 0x97, 0x03, 0xf8, 0xa6, 0xc5, 0x38, 0x2a, 0x36, 0x76, 0x9d, 0x3c, 0xca, 0x57, 0x71, 0x1a, 0xb6, 0x3c, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1603 = { .name = "ecdsa_brainpoolp384r1_sha384_1603", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1603_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1603_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1603_sig, .siglen = 96, .result = -1, .comment = "duplication bug, tcId is 200 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1604 for ECDSA, tcId is 201 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1604_pubkey[] = { 0x89, 0xdd, 0x73, 0x8e, 0xfc, 0xb0, 0xf7, 0x98, 0x11, 0xdf, 0x6b, 0xec, 0x87, 0x34, 0x85, 0x16, 0x94, 0x50, 0xad, 0xa1, 0x8e, 0x60, 0x27, 0x21, 0xe6, 0x17, 0x68, 0xbe, 0x0d, 0x81, 0xe5, 0xd4, 0x13, 0x81, 0xf2, 0x46, 0x68, 0x27, 0x6f, 0x32, 0xbf, 0xe3, 0x1f, 0xf1, 0xc1, 0x6b, 0xcb, 0x6b, 0x1f, 0x7a, 0x4d, 0x28, 0x23, 0xbc, 0xd7, 0x3f, 0x23, 0x6d, 0x90, 0xb6, 0xea, 0x61, 0xd8, 0x92, 0x02, 0x61, 0x90, 0xe1, 0x43, 0x17, 0xb5, 0xd1, 0x10, 0x52, 0x6e, 0x9e, 0x26, 0x75, 0xf0, 0x3d, 0x5e, 0xf3, 0xfc, 0xe8, 0x7b, 0x58, 0x27, 0xa3, 0x7e, 0x0c, 0xf1, 0x9b, 0x4d, 0x39, 0x88, 0xc0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1604_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1604_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x1c, 0x25, 0x06, 0x1a, 0x20, 0xa4, 0xe2, 0xa1, 0x9c, 0xac, 0x49, 0x7f, 0xa9, 0xc7, 0xa6, 0xc6, 0x37, 0x6f, 0xe3, 0x68, 0x62, 0xaa, 0x77, 0xbd, 0x6c, 0x9e, 0x16, 0x15, 0xbc, 0x00, 0xd4, 0x54, 0xc3, 0x0b, 0xbe, 0x23, 0x15, 0x7f, 0xf3, 0xd0, 0x0b, 0xe8, 0x0a, 0x00, 0x95, 0x00, 0xe1, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1604 = { .name = "ecdsa_brainpoolp384r1_sha384_1604", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1604_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1604_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1604_sig, .siglen = 96, .result = -1, .comment = "comparison with point at infinity , tcId is 201 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1605 for ECDSA, tcId is 202 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1605_pubkey[] = { 0x79, 0x55, 0x92, 0xa6, 0x73, 0xe8, 0x2d, 0xff, 0x3d, 0x77, 0x45, 0x01, 0x94, 0xe5, 0x30, 0x8d, 0x64, 0xf4, 0x5f, 0x11, 0xf7, 0x59, 0xf3, 0x4f, 0x7c, 0x7b, 0x5b, 0x7c, 0xc6, 0xad, 0x73, 0xf9, 0xbf, 0xf8, 0xf6, 0x63, 0x3c, 0xc2, 0x03, 0x78, 0xcf, 0xf2, 0xe5, 0x3f, 0xb7, 0xa5, 0x30, 0x30, 0x85, 0xb5, 0xcd, 0x46, 0x21, 0x66, 0x5a, 0xac, 0x84, 0x35, 0xd8, 0xce, 0x85, 0xb2, 0x6d, 0x44, 0x45, 0x08, 0xb7, 0x7b, 0x28, 0x2e, 0x91, 0xcd, 0x53, 0x15, 0xc7, 0x01, 0xd2, 0xe5, 0xb6, 0x6b, 0xa4, 0xc0, 0x0b, 0xf7, 0xe1, 0xeb, 0x08, 0x59, 0xa1, 0x3c, 0xc3, 0x51, 0xd0, 0x00, 0x41, 0xa1, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1605_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1605_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1605 = { .name = "ecdsa_brainpoolp384r1_sha384_1605", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1605_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1605_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1605_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 202 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1606 for ECDSA, tcId is 203 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1606_pubkey[] = { 0x39, 0xd9, 0x4f, 0xf8, 0x75, 0x7d, 0xcd, 0xb6, 0x74, 0x80, 0xcb, 0xc4, 0x8e, 0x96, 0x79, 0x42, 0x3e, 0x57, 0xde, 0x5a, 0x23, 0x23, 0x2d, 0xf0, 0xdb, 0x1e, 0x0f, 0xf7, 0xe9, 0x08, 0x61, 0x44, 0x01, 0xe6, 0xcd, 0x8d, 0x61, 0x50, 0x08, 0xea, 0x8b, 0xe5, 0x12, 0x99, 0xd9, 0xe2, 0x2d, 0xe9, 0x43, 0x81, 0x26, 0xd7, 0x0d, 0x14, 0xe7, 0x5c, 0xe4, 0x1e, 0xa2, 0xf4, 0x09, 0xbe, 0x88, 0xe2, 0x80, 0x6f, 0x7f, 0x73, 0xbd, 0x51, 0x37, 0x31, 0x69, 0x6b, 0xc5, 0x9e, 0x7a, 0x2c, 0x1d, 0x44, 0xd5, 0x68, 0x3d, 0x3b, 0xdc, 0x92, 0xba, 0xba, 0x1c, 0x2a, 0xda, 0x58, 0x80, 0x9f, 0x8b, 0xef, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1606_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1606_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1606 = { .name = "ecdsa_brainpoolp384r1_sha384_1606", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1606_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1606_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1606_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 203 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1607 for ECDSA, tcId is 204 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1607_pubkey[] = { 0x20, 0xb1, 0xfc, 0x8e, 0x24, 0x80, 0xa9, 0x73, 0xe0, 0x97, 0x33, 0x73, 0x43, 0x49, 0x0b, 0x12, 0xae, 0x40, 0x65, 0x2e, 0x41, 0x80, 0xdd, 0x4a, 0xe5, 0x6d, 0xf5, 0x21, 0xda, 0xa9, 0xe3, 0x91, 0x77, 0x7c, 0x0d, 0x46, 0x6f, 0x01, 0x8a, 0xf5, 0x55, 0x19, 0x03, 0x8d, 0xea, 0xd3, 0x55, 0x01, 0x72, 0x32, 0x88, 0x2b, 0xca, 0x3c, 0xcd, 0x6b, 0x37, 0x55, 0x91, 0xf5, 0xb5, 0x09, 0x65, 0x38, 0xca, 0x57, 0x78, 0x35, 0x53, 0x07, 0xe6, 0x03, 0x14, 0x8f, 0xde, 0x31, 0xf5, 0xac, 0xff, 0xeb, 0x4c, 0x68, 0x63, 0x54, 0x1a, 0xd2, 0x33, 0xde, 0x3f, 0x28, 0x1e, 0xa0, 0xd2, 0x35, 0xb6, 0xf3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1607_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1607_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x1c, 0x25, 0x06, 0x1a, 0x20, 0xa4, 0xe2, 0xa1, 0x9c, 0xac, 0x49, 0x7f, 0xa9, 0xc7, 0xa6, 0xc6, 0x37, 0x6f, 0xe3, 0x68, 0x62, 0xaa, 0x77, 0xbd, 0x6c, 0x9e, 0x16, 0x15, 0xbc, 0x00, 0xd4, 0x54, 0xc3, 0x0b, 0xbe, 0x23, 0x15, 0x7f, 0xf3, 0xd0, 0x0b, 0xe8, 0x0a, 0x00, 0x95, 0x00, 0xe1, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1607 = { .name = "ecdsa_brainpoolp384r1_sha384_1607", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1607_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1607_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1607_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 204 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1608 for ECDSA, tcId is 205 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1608_pubkey[] = { 0x4a, 0x39, 0x1d, 0x79, 0xcf, 0xa8, 0x2b, 0x94, 0x31, 0x23, 0xd6, 0x9e, 0xe2, 0xd1, 0xbc, 0x0e, 0x0b, 0x7e, 0x1e, 0x6f, 0x93, 0xc6, 0x91, 0x23, 0xbf, 0xce, 0x0b, 0xd4, 0xf3, 0x1a, 0x5e, 0x34, 0x34, 0x06, 0x2d, 0xd0, 0xe1, 0xaa, 0x8b, 0x88, 0x6c, 0xeb, 0xa3, 0x62, 0xc4, 0xd6, 0x72, 0x0c, 0x7a, 0x2b, 0x05, 0x43, 0xa1, 0x56, 0xf1, 0x93, 0x4e, 0x02, 0xd3, 0x1e, 0x81, 0xd5, 0xd2, 0x78, 0x5a, 0x71, 0xd5, 0x41, 0xcc, 0x7e, 0x1e, 0x6e, 0x61, 0x32, 0xeb, 0xee, 0x42, 0x11, 0x1f, 0x52, 0xa8, 0x44, 0x93, 0x72, 0x60, 0x71, 0x90, 0x56, 0xae, 0x7b, 0x10, 0xf7, 0x51, 0x60, 0x6c, 0x41, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1608_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1608_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x70, 0x94, 0x18, 0x68, 0x82, 0x93, 0x8a, 0x86, 0x72, 0xb1, 0x25, 0xfe, 0xa7, 0x1e, 0x9b, 0x18, 0xdd, 0xbf, 0x8d, 0xa1, 0x8a, 0xa9, 0xde, 0xf5, 0xb2, 0x78, 0x58, 0x56, 0xf0, 0x03, 0x51, 0x53, 0x0c, 0x2e, 0xf8, 0x8c, 0x55, 0xff, 0xcf, 0x40, 0x2f, 0xa0, 0x28, 0x02, 0x54, 0x03, 0x84, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1608 = { .name = "ecdsa_brainpoolp384r1_sha384_1608", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1608_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1608_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1608_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 205 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1609 for ECDSA, tcId is 206 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1609_pubkey[] = { 0x36, 0x85, 0x4a, 0xda, 0xcf, 0x83, 0xce, 0x5f, 0x0e, 0x44, 0x22, 0x40, 0x6d, 0x7b, 0x6f, 0x7d, 0xb6, 0x3d, 0x73, 0xd4, 0xc8, 0x92, 0xa0, 0x1e, 0x97, 0x5e, 0xf6, 0xee, 0x6b, 0x71, 0xa9, 0x33, 0x4c, 0x9d, 0x57, 0xce, 0x6f, 0xfc, 0xdb, 0x1a, 0x2e, 0x41, 0x74, 0xdd, 0xba, 0x79, 0x9e, 0x12, 0x7d, 0x61, 0x96, 0x72, 0x03, 0x5d, 0xb4, 0xfd, 0x73, 0xe5, 0xe4, 0xb4, 0xea, 0x92, 0x0b, 0x74, 0xf2, 0xe7, 0x0f, 0xd2, 0x4e, 0xbc, 0xa4, 0x9d, 0x22, 0xfd, 0xb1, 0x1e, 0x96, 0xb7, 0x86, 0x7f, 0xa1, 0x83, 0x8c, 0xa5, 0xba, 0xbc, 0xd9, 0xdd, 0x09, 0x6a, 0xb8, 0x5e, 0x2f, 0x97, 0xb5, 0xae, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1609_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1609_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x78, 0x9e, 0xac, 0x6f, 0xf9, 0x9e, 0x14, 0x6b, 0x7a, 0xe2, 0x5f, 0x90, 0xd7, 0xa0, 0xca, 0xbf, 0x36, 0xba, 0xf3, 0x2d, 0x14, 0x91, 0x6e, 0xe2, 0xac, 0xee, 0xa7, 0xca, 0xdc, 0x95, 0xd7, 0x22, 0x1f, 0x56, 0xe5, 0xba, 0xee, 0x6d, 0x82, 0xa0, 0x33, 0x07, 0x06, 0x4b, 0xa3, 0x28, 0x56, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1609 = { .name = "ecdsa_brainpoolp384r1_sha384_1609", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1609_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1609_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1609_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 206 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1610 for ECDSA, tcId is 207 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1610_pubkey[] = { 0x80, 0x4e, 0x6c, 0x71, 0xe4, 0x93, 0xb7, 0x83, 0xec, 0xd3, 0x75, 0xa4, 0xed, 0xcf, 0x86, 0xc7, 0x7b, 0x1c, 0x2d, 0xf5, 0x51, 0xbb, 0xc7, 0x3b, 0xed, 0x85, 0x16, 0xe4, 0xd1, 0x1c, 0xe5, 0x1a, 0x1d, 0xd0, 0x81, 0xe1, 0x9a, 0xa6, 0xf5, 0x1c, 0x65, 0x68, 0x18, 0xb8, 0x53, 0x96, 0x21, 0x78, 0x58, 0x0b, 0xd6, 0xb2, 0xc4, 0xea, 0xbc, 0xf5, 0xb3, 0x74, 0x1e, 0x6b, 0x7d, 0x59, 0xb0, 0xe7, 0xf2, 0xbd, 0xdb, 0x24, 0x7f, 0x5f, 0x9d, 0x67, 0x51, 0xcf, 0x09, 0xe3, 0xc6, 0xc9, 0xd1, 0xf7, 0xc2, 0x7c, 0x0b, 0xb8, 0xd2, 0x1e, 0x77, 0xa8, 0x0e, 0xba, 0xda, 0xf9, 0x0a, 0xf8, 0xb0, 0xd0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1610_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1610_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x64, 0xdc, 0x78, 0xd1, 0x12, 0xcd, 0x6e, 0xd6, 0x7d, 0x43, 0x23, 0xb3, 0x02, 0x65, 0x0a, 0x60, 0x6e, 0xd4, 0x14, 0x15, 0xbd, 0x8c, 0xfc, 0x40, 0xec, 0x74, 0x38, 0xa7, 0x0e, 0xe3, 0xd8, 0x68, 0x04, 0x20, 0xe5, 0xf6, 0x02, 0xae, 0xd5, 0x91, 0xa3, 0x24, 0x76, 0x0c, 0x58, 0x14, 0x06, 0x42, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1610 = { .name = "ecdsa_brainpoolp384r1_sha384_1610", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1610_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1610_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1610_sig, .siglen = 96, .result = 1, .comment = "extreme value for k, tcId is 207 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1611 for ECDSA, tcId is 208 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1611_pubkey[] = { 0x2c, 0x11, 0x57, 0x72, 0xdd, 0x29, 0x86, 0x12, 0x19, 0x7a, 0x1c, 0x59, 0xdf, 0x9c, 0x25, 0xa8, 0x6a, 0xc1, 0x6f, 0xa4, 0xf2, 0x7a, 0xdf, 0x74, 0xbc, 0xc6, 0x73, 0xbb, 0x4a, 0x6a, 0x4b, 0xb5, 0xd0, 0xb5, 0xb6, 0x44, 0x70, 0xd5, 0xd2, 0x6e, 0x03, 0x00, 0x92, 0x2a, 0xb7, 0x23, 0x73, 0x24, 0x42, 0xf6, 0xec, 0x20, 0x9e, 0x27, 0xce, 0x0b, 0x12, 0x7d, 0x33, 0x47, 0x45, 0x27, 0x26, 0x43, 0xd3, 0x66, 0x6b, 0xff, 0x54, 0x92, 0x74, 0x19, 0x76, 0x4d, 0xe5, 0x23, 0x22, 0xee, 0x16, 0x96, 0xe6, 0x20, 0xd1, 0x5e, 0x0e, 0xea, 0x62, 0xfe, 0xd0, 0xf2, 0x0e, 0xfe, 0x6c, 0x91, 0xe1, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1611_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1611_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1611 = { .name = "ecdsa_brainpoolp384r1_sha384_1611", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1611_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1611_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1611_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 208 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1612 for ECDSA, tcId is 209 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1612_pubkey[] = { 0x29, 0x57, 0x78, 0xc9, 0xa3, 0xbe, 0x2b, 0x37, 0x34, 0x50, 0xf5, 0x7d, 0xaf, 0x10, 0xde, 0x66, 0xd3, 0x24, 0x41, 0x75, 0x0a, 0xc4, 0x28, 0x9f, 0x67, 0x51, 0xff, 0x61, 0x40, 0x5c, 0xe0, 0x23, 0x7f, 0x64, 0xe2, 0x8a, 0xc5, 0x28, 0x1a, 0x81, 0xd1, 0x3f, 0xba, 0x81, 0xa8, 0x45, 0x4e, 0x58, 0x4c, 0x9f, 0x39, 0x91, 0xd6, 0x15, 0x51, 0x2f, 0xaf, 0x0d, 0xc9, 0x10, 0x71, 0x93, 0xb1, 0xb6, 0xf5, 0xcd, 0x68, 0x43, 0x56, 0xca, 0x51, 0x50, 0x4d, 0x15, 0xc1, 0xca, 0x4b, 0xa0, 0x0b, 0x21, 0xc7, 0xc6, 0x8e, 0xb4, 0x68, 0x32, 0x22, 0xa8, 0x21, 0x1e, 0x4f, 0xfd, 0x56, 0xda, 0x0e, 0x06, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1612_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1612_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1612 = { .name = "ecdsa_brainpoolp384r1_sha384_1612", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1612_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1612_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1612_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 209 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1613 for ECDSA, tcId is 210 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1613_pubkey[] = { 0x65, 0xa3, 0x40, 0xbc, 0x68, 0xf3, 0xfc, 0xea, 0xd4, 0xf0, 0x42, 0x77, 0xee, 0x86, 0x75, 0xf9, 0xc1, 0x7b, 0xc8, 0xc8, 0x84, 0x26, 0xc5, 0xba, 0x03, 0x13, 0xb8, 0xce, 0x7d, 0xa5, 0x8d, 0x92, 0xca, 0x9a, 0x0f, 0xfa, 0x32, 0xc7, 0xee, 0xe1, 0x95, 0x85, 0x7d, 0x86, 0x0b, 0xa1, 0xee, 0xbe, 0x4d, 0xcd, 0x5b, 0xe3, 0xa6, 0x77, 0x80, 0x08, 0xb3, 0x6e, 0xa1, 0x9d, 0x90, 0x2d, 0x93, 0xdd, 0x48, 0x8f, 0x6f, 0xb6, 0x5d, 0xc0, 0x71, 0x95, 0x21, 0x55, 0x3b, 0x39, 0xcb, 0x3c, 0x52, 0x4b, 0x12, 0x68, 0x1d, 0x2e, 0x07, 0xa8, 0xef, 0x72, 0x0c, 0xdc, 0x15, 0x01, 0x1c, 0x23, 0xba, 0x9d, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1613_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1613_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x1c, 0x25, 0x06, 0x1a, 0x20, 0xa4, 0xe2, 0xa1, 0x9c, 0xac, 0x49, 0x7f, 0xa9, 0xc7, 0xa6, 0xc6, 0x37, 0x6f, 0xe3, 0x68, 0x62, 0xaa, 0x77, 0xbd, 0x6c, 0x9e, 0x16, 0x15, 0xbc, 0x00, 0xd4, 0x54, 0xc3, 0x0b, 0xbe, 0x23, 0x15, 0x7f, 0xf3, 0xd0, 0x0b, 0xe8, 0x0a, 0x00, 0x95, 0x00, 0xe1, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1613 = { .name = "ecdsa_brainpoolp384r1_sha384_1613", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1613_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1613_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1613_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 210 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1614 for ECDSA, tcId is 211 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1614_pubkey[] = { 0x54, 0xa0, 0x39, 0x02, 0x65, 0x6b, 0xfa, 0xf4, 0xd6, 0xa5, 0x4f, 0xf3, 0x42, 0x9d, 0x9f, 0x97, 0x19, 0xbb, 0x61, 0xe6, 0xca, 0xf0, 0x00, 0xe1, 0x00, 0x99, 0x2b, 0x31, 0x70, 0x0e, 0x78, 0x0e, 0x0f, 0x73, 0xf5, 0x16, 0x14, 0x95, 0x4a, 0xcd, 0xdd, 0xca, 0xaa, 0x8b, 0x23, 0x11, 0x19, 0x5b, 0x04, 0xad, 0x3b, 0x19, 0xb0, 0x1e, 0x15, 0x0a, 0x39, 0xdc, 0x0c, 0xfa, 0xec, 0xc6, 0x49, 0x8b, 0x18, 0x13, 0x8c, 0xe6, 0x12, 0xc4, 0x92, 0x79, 0x56, 0x87, 0xa4, 0x88, 0x52, 0x26, 0x44, 0xb3, 0xdd, 0xf7, 0x46, 0x2c, 0x3c, 0x35, 0x9b, 0xd0, 0x91, 0xb7, 0xd3, 0x94, 0x69, 0x57, 0x18, 0x79, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1614_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1614_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x70, 0x94, 0x18, 0x68, 0x82, 0x93, 0x8a, 0x86, 0x72, 0xb1, 0x25, 0xfe, 0xa7, 0x1e, 0x9b, 0x18, 0xdd, 0xbf, 0x8d, 0xa1, 0x8a, 0xa9, 0xde, 0xf5, 0xb2, 0x78, 0x58, 0x56, 0xf0, 0x03, 0x51, 0x53, 0x0c, 0x2e, 0xf8, 0x8c, 0x55, 0xff, 0xcf, 0x40, 0x2f, 0xa0, 0x28, 0x02, 0x54, 0x03, 0x84, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1614 = { .name = "ecdsa_brainpoolp384r1_sha384_1614", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1614_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1614_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1614_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 211 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1615 for ECDSA, tcId is 212 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1615_pubkey[] = { 0x46, 0xd1, 0x0d, 0x74, 0x9a, 0x47, 0xa4, 0xd3, 0xf2, 0x5b, 0x6f, 0x28, 0x95, 0x1a, 0x11, 0xf0, 0x1a, 0x54, 0xc2, 0x41, 0x39, 0x57, 0xa4, 0x77, 0x16, 0x2d, 0xab, 0xe0, 0xd0, 0x8d, 0x8a, 0xe9, 0xb6, 0xa9, 0xf4, 0x4b, 0x68, 0xef, 0x34, 0x1f, 0xb8, 0x20, 0xb0, 0xc2, 0x4c, 0x7a, 0x1c, 0x0e, 0x67, 0x1f, 0xf1, 0x66, 0xcd, 0x35, 0xd2, 0xf3, 0xcc, 0x82, 0x1d, 0x58, 0xfa, 0x18, 0xe3, 0x5d, 0x25, 0xe6, 0x03, 0x3b, 0x9e, 0x79, 0x0f, 0xce, 0x48, 0x18, 0xf9, 0xe5, 0x70, 0x92, 0x1c, 0x00, 0x34, 0xb3, 0x81, 0xcc, 0x9a, 0xd2, 0x54, 0xee, 0xaf, 0x1b, 0x38, 0x6e, 0x51, 0x1b, 0x7c, 0x89, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1615_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1615_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x78, 0x9e, 0xac, 0x6f, 0xf9, 0x9e, 0x14, 0x6b, 0x7a, 0xe2, 0x5f, 0x90, 0xd7, 0xa0, 0xca, 0xbf, 0x36, 0xba, 0xf3, 0x2d, 0x14, 0x91, 0x6e, 0xe2, 0xac, 0xee, 0xa7, 0xca, 0xdc, 0x95, 0xd7, 0x22, 0x1f, 0x56, 0xe5, 0xba, 0xee, 0x6d, 0x82, 0xa0, 0x33, 0x07, 0x06, 0x4b, 0xa3, 0x28, 0x56, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1615 = { .name = "ecdsa_brainpoolp384r1_sha384_1615", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1615_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1615_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1615_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 212 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1616 for ECDSA, tcId is 213 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1616_pubkey[] = { 0x8a, 0xe9, 0x2d, 0xe1, 0x0b, 0x24, 0x4a, 0xc7, 0xf0, 0xde, 0xb6, 0xb1, 0x02, 0xd0, 0x75, 0x95, 0x1d, 0x8c, 0x13, 0xb2, 0x96, 0x0c, 0x2e, 0x98, 0xd7, 0xfb, 0x42, 0xb8, 0xab, 0xe9, 0x0f, 0xd0, 0x7a, 0x4a, 0x21, 0xb8, 0x6e, 0xb4, 0xc7, 0x7e, 0xfe, 0x9a, 0xdb, 0x67, 0x25, 0x67, 0x6d, 0x17, 0x36, 0x06, 0x3f, 0x34, 0x07, 0xc7, 0x16, 0x27, 0xac, 0xaa, 0x83, 0xbe, 0x90, 0x29, 0xc7, 0xa4, 0x0e, 0x8a, 0xa8, 0x96, 0xcb, 0x68, 0xa9, 0xc2, 0xfa, 0x2a, 0xaa, 0x10, 0x79, 0x03, 0x5a, 0x28, 0x31, 0x81, 0xcd, 0x3f, 0x27, 0x23, 0xb2, 0x21, 0xd5, 0xa8, 0x74, 0x7a, 0xd3, 0x92, 0xa0, 0xf9, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1616_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1616_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x64, 0xdc, 0x78, 0xd1, 0x12, 0xcd, 0x6e, 0xd6, 0x7d, 0x43, 0x23, 0xb3, 0x02, 0x65, 0x0a, 0x60, 0x6e, 0xd4, 0x14, 0x15, 0xbd, 0x8c, 0xfc, 0x40, 0xec, 0x74, 0x38, 0xa7, 0x0e, 0xe3, 0xd8, 0x68, 0x04, 0x20, 0xe5, 0xf6, 0x02, 0xae, 0xd5, 0x91, 0xa3, 0x24, 0x76, 0x0c, 0x58, 0x14, 0x06, 0x42, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1616 = { .name = "ecdsa_brainpoolp384r1_sha384_1616", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1616_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1616_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1616_sig, .siglen = 96, .result = 1, .comment = "extreme value for k, tcId is 213 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1617 for ECDSA, tcId is 214 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1617_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52, 0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28, 0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1617_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1617_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x2d, 0xfa, 0xfd, 0xff, 0xfc, 0x8d, 0xea, 0xce, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1617 = { .name = "ecdsa_brainpoolp384r1_sha384_1617", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1617_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1617_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1617_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 214 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1618 for ECDSA, tcId is 215 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1618_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52, 0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28, 0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1618_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1618_sig[] = { 0x1f, 0xc1, 0x15, 0x14, 0x6e, 0x52, 0x1d, 0x7e, 0xa3, 0x3f, 0x3e, 0x12, 0x8e, 0xb0, 0x1d, 0xb0, 0xf6, 0x53, 0xdc, 0x45, 0x85, 0x2c, 0x2b, 0x50, 0x30, 0x1d, 0x63, 0x9b, 0x77, 0x8b, 0x13, 0x38, 0x0e, 0x51, 0xd9, 0x36, 0x65, 0x52, 0xcf, 0x20, 0x49, 0x15, 0x66, 0x05, 0xd5, 0x7a, 0xdf, 0xfc, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1618 = { .name = "ecdsa_brainpoolp384r1_sha384_1618", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1618_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1618_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1618_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 215 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1619 for ECDSA, tcId is 216 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1619_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x01, 0xfb, 0x01, 0x0d, 0x82, 0x3e, 0xaa, 0x83, 0xb2, 0xab, 0x83, 0xef, 0xbb, 0x16, 0x6c, 0x8c, 0xb2, 0x78, 0x65, 0xdf, 0xee, 0x67, 0xfe, 0x4f, 0x31, 0x15, 0xd4, 0xc9, 0x86, 0x25, 0xe7, 0xfb, 0x9e, 0x8d, 0x61, 0x08, 0x18, 0x8b, 0x99, 0x60, 0x44, 0xc4, 0xfc, 0xd2, 0x0a, 0xcb, 0x99, 0x3e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1619_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1619_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x2d, 0xfa, 0xfd, 0xff, 0xfc, 0x8d, 0xea, 0xce, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1619 = { .name = "ecdsa_brainpoolp384r1_sha384_1619", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1619_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1619_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1619_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 216 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1620 for ECDSA, tcId is 217 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1620_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x01, 0xfb, 0x01, 0x0d, 0x82, 0x3e, 0xaa, 0x83, 0xb2, 0xab, 0x83, 0xef, 0xbb, 0x16, 0x6c, 0x8c, 0xb2, 0x78, 0x65, 0xdf, 0xee, 0x67, 0xfe, 0x4f, 0x31, 0x15, 0xd4, 0xc9, 0x86, 0x25, 0xe7, 0xfb, 0x9e, 0x8d, 0x61, 0x08, 0x18, 0x8b, 0x99, 0x60, 0x44, 0xc4, 0xfc, 0xd2, 0x0a, 0xcb, 0x99, 0x3e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1620_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1620_sig[] = { 0x1f, 0xc1, 0x15, 0x14, 0x6e, 0x52, 0x1d, 0x7e, 0xa3, 0x3f, 0x3e, 0x12, 0x8e, 0xb0, 0x1d, 0xb0, 0xf6, 0x53, 0xdc, 0x45, 0x85, 0x2c, 0x2b, 0x50, 0x30, 0x1d, 0x63, 0x9b, 0x77, 0x8b, 0x13, 0x38, 0x0e, 0x51, 0xd9, 0x36, 0x65, 0x52, 0xcf, 0x20, 0x49, 0x15, 0x66, 0x05, 0xd5, 0x7a, 0xdf, 0xfc, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1620 = { .name = "ecdsa_brainpoolp384r1_sha384_1620", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1620_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1620_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1620_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 217 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1621 for ECDSA, tcId is 218 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1621_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1621_sig[] = { 0x65, 0xfd, 0x45, 0x68, 0x14, 0x37, 0x1d, 0x60, 0x88, 0x3f, 0xfd, 0xa5, 0xf7, 0x4f, 0x36, 0xdc, 0x2d, 0x45, 0x88, 0x61, 0x21, 0x77, 0x0e, 0x29, 0xed, 0x31, 0x63, 0x75, 0x47, 0x16, 0xd1, 0x2c, 0x1c, 0xab, 0x03, 0xa2, 0xcb, 0x6a, 0x6e, 0x33, 0x76, 0xfc, 0x96, 0xd8, 0x72, 0x7b, 0xd1, 0xbf, 0x1a, 0xa6, 0x5e, 0x57, 0x93, 0x2d, 0x05, 0x78, 0x84, 0x13, 0x21, 0x9b, 0x7a, 0xb2, 0x3e, 0x53, 0x37, 0xf6, 0x3f, 0xb2, 0xdc, 0xb0, 0xf8, 0x9b, 0x42, 0x27, 0xd2, 0x84, 0xa3, 0xfc, 0xbd, 0xf3, 0xc5, 0x4c, 0x02, 0x1a, 0x6c, 0x0c, 0xa4, 0x24, 0x45, 0xbf, 0x80, 0x22, 0x13, 0x12, 0x16, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1621 = { .name = "ecdsa_brainpoolp384r1_sha384_1621", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1621_pubkey, .pubkeylen = 96, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp384r1_sha384_1621_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 218 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1622 for ECDSA, tcId is 219 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1622_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1622_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1622_sig[] = { 0x01, 0x05, 0x7e, 0x36, 0xad, 0x00, 0xf7, 0x9e, 0x7c, 0x1c, 0xfc, 0xf4, 0xde, 0xa3, 0x01, 0xe4, 0xe2, 0x35, 0x06, 0x44, 0xd5, 0xef, 0xf4, 0xd4, 0xc7, 0xf2, 0x3c, 0xdd, 0x2f, 0x4f, 0x23, 0x60, 0x93, 0xff, 0x27, 0xe3, 0x3e, 0xb4, 0x4f, 0xd8, 0x04, 0xb2, 0xf0, 0xda, 0xf5, 0xc3, 0x27, 0xa4, 0x2a, 0x9b, 0x2b, 0x91, 0x0d, 0xd2, 0x3b, 0x99, 0x4c, 0xac, 0x12, 0xf3, 0x22, 0x82, 0x84, 0x61, 0x09, 0x4c, 0x87, 0x90, 0x48, 0x1b, 0x39, 0x25, 0x69, 0xc6, 0x67, 0x4a, 0xc2, 0xec, 0xa7, 0x4d, 0xd7, 0x49, 0x57, 0xd9, 0x44, 0x56, 0x54, 0x85, 0x46, 0xb6, 0x5b, 0xd5, 0x05, 0x58, 0xf4, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1622 = { .name = "ecdsa_brainpoolp384r1_sha384_1622", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1622_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1622_msg, .msglen = 3, .sig = ecdsa_brainpoolp384r1_sha384_1622_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 219 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1623 for ECDSA, tcId is 220 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1623_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1623_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1623_sig[] = { 0x6d, 0xd9, 0xd4, 0xe9, 0x8c, 0x9c, 0x38, 0x82, 0x40, 0xe9, 0x5c, 0x49, 0xb2, 0x10, 0x0a, 0xfb, 0xe0, 0xd7, 0x22, 0xf8, 0xa1, 0x52, 0x65, 0x1c, 0x61, 0xd7, 0xef, 0x9b, 0xf4, 0x61, 0x50, 0xe3, 0xcd, 0xf9, 0xbf, 0x63, 0x30, 0xe7, 0x5e, 0x4b, 0xf2, 0xc2, 0x94, 0xcd, 0x66, 0xe4, 0x8d, 0x06, 0x12, 0x82, 0xd3, 0x3b, 0x5b, 0x79, 0xd4, 0xea, 0xaf, 0xa0, 0x3a, 0x77, 0xbb, 0x8b, 0xa2, 0xc3, 0x18, 0x29, 0x1f, 0x6e, 0xa0, 0x9d, 0x54, 0x8b, 0x77, 0x04, 0xbb, 0x00, 0x91, 0x08, 0x56, 0xdd, 0x36, 0x05, 0x57, 0xe6, 0x09, 0xad, 0xd8, 0x91, 0xc6, 0x43, 0x5d, 0x7a, 0x80, 0xaf, 0xdd, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1623 = { .name = "ecdsa_brainpoolp384r1_sha384_1623", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1623_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1623_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1623_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 220 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1624 for ECDSA, tcId is 221 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1624_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1624_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1624_sig[] = { 0x46, 0xcb, 0x43, 0x79, 0x8b, 0xc0, 0x6d, 0xbe, 0x78, 0x8a, 0x4f, 0x4b, 0x2b, 0x98, 0x13, 0x0e, 0x3a, 0xae, 0x91, 0x7f, 0x1d, 0x2a, 0x00, 0x56, 0x56, 0xbd, 0x70, 0xa3, 0x28, 0x8c, 0xaf, 0x7c, 0x37, 0xd1, 0xde, 0xe0, 0xc9, 0x10, 0x88, 0x28, 0xa6, 0x9d, 0x2a, 0x1e, 0xea, 0xe1, 0x13, 0xc6, 0x81, 0x80, 0xd0, 0xc5, 0xba, 0x1b, 0xed, 0x4f, 0x2b, 0x0d, 0x4d, 0x8e, 0xd7, 0xea, 0x17, 0x91, 0x6b, 0x63, 0x40, 0x03, 0x97, 0xe7, 0xb6, 0xd7, 0x0e, 0x73, 0x12, 0xc5, 0xff, 0x0f, 0x45, 0x24, 0xa4, 0x9a, 0xbf, 0x70, 0x71, 0xc8, 0xba, 0x47, 0x0d, 0xe6, 0x4f, 0xb6, 0x68, 0x57, 0x03, 0x80, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1624 = { .name = "ecdsa_brainpoolp384r1_sha384_1624", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1624_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1624_msg, .msglen = 20, .sig = ecdsa_brainpoolp384r1_sha384_1624_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 221 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1625 for ECDSA, tcId is 222 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1625_pubkey[] = { 0x46, 0x21, 0x17, 0xd2, 0xe3, 0x3a, 0x7d, 0xb1, 0xb9, 0x5c, 0x8a, 0x6a, 0x3c, 0x79, 0x82, 0xf8, 0x3d, 0xa9, 0x68, 0x17, 0xe7, 0x49, 0x71, 0x8c, 0xae, 0xe7, 0xb6, 0xaa, 0x9c, 0x9d, 0xa4, 0xe8, 0xf2, 0xff, 0x79, 0x51, 0x67, 0x4e, 0xed, 0x2b, 0x56, 0x9a, 0xb8, 0x46, 0xf5, 0x90, 0x02, 0xa8, 0x50, 0xe6, 0x60, 0x6a, 0x97, 0x26, 0xa9, 0x20, 0x9c, 0x9e, 0x94, 0x5f, 0xbf, 0x6c, 0xbb, 0xc9, 0xa4, 0x87, 0xc4, 0xa4, 0xd8, 0x1c, 0x52, 0xac, 0x36, 0x84, 0xc2, 0x6c, 0x33, 0x92, 0xb9, 0xbd, 0x24, 0xf7, 0x18, 0x48, 0x21, 0xbe, 0x06, 0xf6, 0x44, 0x8b, 0x24, 0xa8, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1625_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1625_sig[] = { 0x43, 0xa3, 0xac, 0x2f, 0x3d, 0x2b, 0x4d, 0x37, 0x23, 0xa9, 0x79, 0x30, 0xb0, 0x23, 0xee, 0x73, 0x01, 0x0a, 0x7c, 0xf8, 0xd2, 0xa9, 0x93, 0x72, 0xf3, 0x13, 0x2b, 0xd7, 0xd9, 0xc8, 0x35, 0x74, 0xde, 0x3a, 0xb8, 0x65, 0x25, 0xef, 0xc4, 0xee, 0x2c, 0x59, 0x79, 0x9d, 0x5f, 0xf7, 0xef, 0xb4, 0x34, 0xf5, 0x9a, 0x3e, 0xa9, 0xf5, 0x26, 0x7f, 0x84, 0x58, 0xaf, 0xda, 0xa3, 0x87, 0x3e, 0x23, 0x36, 0xe0, 0xab, 0x8a, 0x40, 0xca, 0x1b, 0x79, 0x7c, 0xbd, 0x97, 0x7d, 0x19, 0x2f, 0x20, 0x24, 0xf9, 0xeb, 0x8d, 0x39, 0xb3, 0x7b, 0x9a, 0x23, 0x8f, 0x20, 0x8d, 0x66, 0xba, 0xcd, 0x27, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1625 = { .name = "ecdsa_brainpoolp384r1_sha384_1625", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1625_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1625_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1625_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 222 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1626 for ECDSA, tcId is 223 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1626_pubkey[] = { 0x46, 0x21, 0x17, 0xd2, 0xe3, 0x3a, 0x7d, 0xb1, 0xb9, 0x5c, 0x8a, 0x6a, 0x3c, 0x79, 0x82, 0xf8, 0x3d, 0xa9, 0x68, 0x17, 0xe7, 0x49, 0x71, 0x8c, 0xae, 0xe7, 0xb6, 0xaa, 0x9c, 0x9d, 0xa4, 0xe8, 0xf2, 0xff, 0x79, 0x51, 0x67, 0x4e, 0xed, 0x2b, 0x56, 0x9a, 0xb8, 0x46, 0xf5, 0x90, 0x02, 0xa8, 0x50, 0xe6, 0x60, 0x6a, 0x97, 0x26, 0xa9, 0x20, 0x9c, 0x9e, 0x94, 0x5f, 0xbf, 0x6c, 0xbb, 0xc9, 0xa4, 0x87, 0xc4, 0xa4, 0xd8, 0x1c, 0x52, 0xac, 0x36, 0x84, 0xc2, 0x6c, 0x33, 0x92, 0xb9, 0xbd, 0x24, 0xf7, 0x18, 0x48, 0x21, 0xbe, 0x06, 0xf6, 0x44, 0x8b, 0x24, 0xa8, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1626_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1626_sig[] = { 0x35, 0x31, 0xad, 0xa2, 0x5b, 0x8d, 0x9a, 0xf9, 0xb8, 0x7e, 0x52, 0x24, 0xcd, 0x6a, 0x6d, 0x95, 0x6c, 0x17, 0xdc, 0x32, 0x3e, 0xf8, 0x98, 0x0f, 0x49, 0x7a, 0x6e, 0x7e, 0x44, 0xc8, 0x3d, 0x69, 0xb7, 0x4d, 0xe7, 0x91, 0xd6, 0x2b, 0xce, 0xac, 0xaf, 0xf7, 0x37, 0x88, 0x63, 0xdd, 0x72, 0x5b, 0x45, 0x9d, 0x15, 0x53, 0x93, 0x99, 0x40, 0x93, 0x80, 0xaf, 0x99, 0xd5, 0x60, 0xc5, 0x61, 0x21, 0x7d, 0xaa, 0x5c, 0x53, 0x97, 0x29, 0x45, 0x30, 0x67, 0xdd, 0x1a, 0xa4, 0xbd, 0x9d, 0xf2, 0xb5, 0x34, 0x92, 0x0f, 0x0d, 0x62, 0x13, 0x26, 0x1e, 0xce, 0xa1, 0x6f, 0x0e, 0xd6, 0x85, 0x36, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1626 = { .name = "ecdsa_brainpoolp384r1_sha384_1626", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1626_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1626_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1626_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 223 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1627 for ECDSA, tcId is 224 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1627_pubkey[] = { 0x46, 0x21, 0x17, 0xd2, 0xe3, 0x3a, 0x7d, 0xb1, 0xb9, 0x5c, 0x8a, 0x6a, 0x3c, 0x79, 0x82, 0xf8, 0x3d, 0xa9, 0x68, 0x17, 0xe7, 0x49, 0x71, 0x8c, 0xae, 0xe7, 0xb6, 0xaa, 0x9c, 0x9d, 0xa4, 0xe8, 0xf2, 0xff, 0x79, 0x51, 0x67, 0x4e, 0xed, 0x2b, 0x56, 0x9a, 0xb8, 0x46, 0xf5, 0x90, 0x02, 0xa8, 0x50, 0xe6, 0x60, 0x6a, 0x97, 0x26, 0xa9, 0x20, 0x9c, 0x9e, 0x94, 0x5f, 0xbf, 0x6c, 0xbb, 0xc9, 0xa4, 0x87, 0xc4, 0xa4, 0xd8, 0x1c, 0x52, 0xac, 0x36, 0x84, 0xc2, 0x6c, 0x33, 0x92, 0xb9, 0xbd, 0x24, 0xf7, 0x18, 0x48, 0x21, 0xbe, 0x06, 0xf6, 0x44, 0x8b, 0x24, 0xa8, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1627_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1627_sig[] = { 0x43, 0x8a, 0x0c, 0xff, 0x9f, 0xcf, 0xcf, 0x58, 0x7f, 0x8c, 0x40, 0x77, 0x5a, 0xd4, 0x4e, 0xa4, 0xb0, 0xed, 0x69, 0xf2, 0xd5, 0x47, 0xbe, 0xfe, 0x29, 0x5d, 0x1f, 0xb9, 0xc2, 0x4d, 0xdc, 0xb9, 0x7f, 0x22, 0x80, 0x27, 0xdf, 0x55, 0x2a, 0x06, 0xbf, 0x65, 0x7b, 0x4c, 0x20, 0x27, 0x26, 0x15, 0x5e, 0x15, 0x76, 0x30, 0xbb, 0x74, 0x4f, 0xc8, 0xe7, 0xf7, 0x59, 0x01, 0xde, 0x49, 0x8e, 0x5a, 0xf0, 0xb5, 0x51, 0x1d, 0xfe, 0xee, 0x0c, 0x4c, 0x1f, 0x2e, 0x5c, 0x4a, 0xa0, 0x12, 0x9d, 0xe5, 0x7b, 0x87, 0xa2, 0xa1, 0x3e, 0xa5, 0x9d, 0x18, 0x7d, 0x51, 0xcb, 0xeb, 0x6e, 0xf2, 0x24, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1627 = { .name = "ecdsa_brainpoolp384r1_sha384_1627", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1627_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1627_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1627_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 224 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1628 for ECDSA, tcId is 225 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1628_pubkey[] = { 0x8c, 0xb9, 0x1e, 0x81, 0xee, 0x59, 0x01, 0xb7, 0x1a, 0x59, 0xa4, 0xf7, 0xc8, 0x17, 0x4a, 0xe0, 0x5f, 0xe3, 0xba, 0x00, 0xf6, 0x99, 0xdc, 0xbc, 0x3c, 0x92, 0x33, 0x26, 0x5c, 0x64, 0x05, 0x87, 0xb3, 0xc1, 0x65, 0x59, 0x3c, 0x2d, 0x76, 0xb5, 0xff, 0xc4, 0xb8, 0xdc, 0xbc, 0xb0, 0xe6, 0x55, 0x3a, 0x0e, 0x5d, 0x14, 0xf2, 0xd0, 0xe8, 0xef, 0xe2, 0xbd, 0x8a, 0xa2, 0x60, 0xd8, 0xac, 0xe0, 0x6b, 0xf9, 0x64, 0xc5, 0x1b, 0xab, 0x82, 0x07, 0x07, 0x0a, 0x2d, 0x30, 0x41, 0x0b, 0xb6, 0xb8, 0x7a, 0xee, 0xcb, 0x7f, 0xff, 0x80, 0x2f, 0x2d, 0x4e, 0xa3, 0xca, 0xf6, 0xe0, 0xe7, 0xe7, 0x26, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1628_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1628_sig[] = { 0x16, 0x49, 0x6c, 0x08, 0xc3, 0x07, 0x67, 0x73, 0xfc, 0xd8, 0x41, 0xa5, 0xe2, 0x5e, 0x1a, 0x87, 0x10, 0x8e, 0x0b, 0xa9, 0x0f, 0x97, 0x27, 0xf5, 0x39, 0x03, 0x4b, 0xd2, 0xcf, 0x68, 0x8e, 0x01, 0xa9, 0x55, 0x68, 0x6a, 0x15, 0x11, 0x2e, 0x05, 0x90, 0xfc, 0x91, 0xe3, 0x99, 0x5f, 0xf5, 0xf8, 0x31, 0xb1, 0xb7, 0x33, 0x8f, 0x74, 0xad, 0xba, 0x33, 0x71, 0x2a, 0x83, 0xa7, 0xc6, 0x85, 0xe7, 0xcd, 0x5f, 0x3b, 0xe8, 0x4e, 0xf9, 0x51, 0xec, 0xad, 0x50, 0xfa, 0xcb, 0x7c, 0x6e, 0xc3, 0x93, 0xa3, 0xba, 0xc5, 0x2e, 0xa7, 0xb1, 0x21, 0x2b, 0xd9, 0x2f, 0x4f, 0x45, 0xa9, 0xf8, 0x51, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1628 = { .name = "ecdsa_brainpoolp384r1_sha384_1628", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1628_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1628_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1628_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 225 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1629 for ECDSA, tcId is 226 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1629_pubkey[] = { 0x8c, 0xb9, 0x1e, 0x81, 0xee, 0x59, 0x01, 0xb7, 0x1a, 0x59, 0xa4, 0xf7, 0xc8, 0x17, 0x4a, 0xe0, 0x5f, 0xe3, 0xba, 0x00, 0xf6, 0x99, 0xdc, 0xbc, 0x3c, 0x92, 0x33, 0x26, 0x5c, 0x64, 0x05, 0x87, 0xb3, 0xc1, 0x65, 0x59, 0x3c, 0x2d, 0x76, 0xb5, 0xff, 0xc4, 0xb8, 0xdc, 0xbc, 0xb0, 0xe6, 0x55, 0x3a, 0x0e, 0x5d, 0x14, 0xf2, 0xd0, 0xe8, 0xef, 0xe2, 0xbd, 0x8a, 0xa2, 0x60, 0xd8, 0xac, 0xe0, 0x6b, 0xf9, 0x64, 0xc5, 0x1b, 0xab, 0x82, 0x07, 0x07, 0x0a, 0x2d, 0x30, 0x41, 0x0b, 0xb6, 0xb8, 0x7a, 0xee, 0xcb, 0x7f, 0xff, 0x80, 0x2f, 0x2d, 0x4e, 0xa3, 0xca, 0xf6, 0xe0, 0xe7, 0xe7, 0x26, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1629_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1629_sig[] = { 0x87, 0xf3, 0x09, 0x02, 0x92, 0xe7, 0x9b, 0x72, 0x2c, 0xde, 0x5a, 0xed, 0xaf, 0xa4, 0x24, 0x4f, 0x6e, 0xb4, 0x60, 0xa2, 0x80, 0xe2, 0xe0, 0x50, 0x39, 0x9b, 0x9d, 0x80, 0x23, 0x91, 0xad, 0x50, 0x21, 0x08, 0x70, 0x4a, 0x3c, 0x0b, 0xb9, 0xf9, 0xae, 0x57, 0x1c, 0x3f, 0x7d, 0xec, 0x6c, 0x0b, 0x89, 0xae, 0x00, 0x43, 0xde, 0x38, 0xa5, 0x85, 0xa1, 0x63, 0x2c, 0x72, 0x11, 0xb7, 0x83, 0x03, 0xaf, 0xa3, 0xf8, 0x93, 0x61, 0x54, 0xa6, 0xe6, 0x5a, 0x6f, 0x72, 0x9c, 0x3b, 0x1e, 0xc6, 0x6a, 0x17, 0x75, 0xaa, 0x46, 0x5a, 0xf8, 0xee, 0xd6, 0xdf, 0xea, 0xa5, 0xba, 0x98, 0xce, 0xdb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1629 = { .name = "ecdsa_brainpoolp384r1_sha384_1629", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1629_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1629_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1629_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 226 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1630 for ECDSA, tcId is 227 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1630_pubkey[] = { 0x8c, 0xb9, 0x1e, 0x81, 0xee, 0x59, 0x01, 0xb7, 0x1a, 0x59, 0xa4, 0xf7, 0xc8, 0x17, 0x4a, 0xe0, 0x5f, 0xe3, 0xba, 0x00, 0xf6, 0x99, 0xdc, 0xbc, 0x3c, 0x92, 0x33, 0x26, 0x5c, 0x64, 0x05, 0x87, 0xb3, 0xc1, 0x65, 0x59, 0x3c, 0x2d, 0x76, 0xb5, 0xff, 0xc4, 0xb8, 0xdc, 0xbc, 0xb0, 0xe6, 0x55, 0x3a, 0x0e, 0x5d, 0x14, 0xf2, 0xd0, 0xe8, 0xef, 0xe2, 0xbd, 0x8a, 0xa2, 0x60, 0xd8, 0xac, 0xe0, 0x6b, 0xf9, 0x64, 0xc5, 0x1b, 0xab, 0x82, 0x07, 0x07, 0x0a, 0x2d, 0x30, 0x41, 0x0b, 0xb6, 0xb8, 0x7a, 0xee, 0xcb, 0x7f, 0xff, 0x80, 0x2f, 0x2d, 0x4e, 0xa3, 0xca, 0xf6, 0xe0, 0xe7, 0xe7, 0x26, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1630_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1630_sig[] = { 0x72, 0x08, 0x22, 0xab, 0xef, 0xa9, 0x12, 0x65, 0xa7, 0xb8, 0xd4, 0x46, 0xec, 0x3b, 0xc4, 0x05, 0xfd, 0x19, 0x21, 0x78, 0xaa, 0x1b, 0x85, 0xdd, 0x66, 0x33, 0x96, 0xa8, 0x96, 0xa3, 0x2c, 0x11, 0x9e, 0x64, 0xb1, 0xa2, 0x08, 0x43, 0xf8, 0x1e, 0xdd, 0x43, 0xc0, 0x37, 0x09, 0xb8, 0xdb, 0xc6, 0x20, 0x6a, 0xe9, 0x5b, 0xb1, 0x8d, 0x2d, 0x38, 0x44, 0xa3, 0x93, 0x40, 0x87, 0x2e, 0xdb, 0xa1, 0x61, 0x1e, 0x3e, 0xa0, 0xe8, 0x4c, 0xea, 0x7c, 0xb6, 0xcf, 0xf2, 0x82, 0xaf, 0x41, 0x4d, 0x8b, 0x5a, 0xa0, 0xbe, 0x8a, 0xab, 0xc1, 0xb5, 0x1b, 0x71, 0x21, 0xd4, 0x26, 0x91, 0x6b, 0x01, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1630 = { .name = "ecdsa_brainpoolp384r1_sha384_1630", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1630_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1630_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1630_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 227 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1631 for ECDSA, tcId is 228 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1631_pubkey[] = { 0x69, 0xeb, 0xf3, 0x32, 0xe1, 0xeb, 0x24, 0x55, 0x32, 0x4a, 0x75, 0x72, 0xa1, 0x79, 0x77, 0xa4, 0xe2, 0x95, 0x51, 0x08, 0xee, 0x8b, 0xd8, 0x1b, 0xd6, 0xd1, 0xf5, 0x55, 0xd6, 0x08, 0x68, 0x7f, 0x5b, 0xbb, 0x39, 0x85, 0x8e, 0xbe, 0xe3, 0x04, 0x98, 0x5b, 0xaa, 0x7d, 0x09, 0xc8, 0x30, 0xbb, 0x67, 0x2b, 0x9c, 0x96, 0x68, 0x4d, 0xfc, 0x00, 0x7f, 0x01, 0x5e, 0x39, 0xcd, 0xad, 0xa9, 0xfe, 0x16, 0xdb, 0x50, 0x22, 0xbf, 0xd1, 0x73, 0x34, 0x8c, 0xaa, 0xfc, 0x52, 0x86, 0x84, 0x62, 0x1f, 0x97, 0xfb, 0xa2, 0x4f, 0x2c, 0x30, 0xe3, 0xdc, 0x72, 0x87, 0x72, 0xe8, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1631_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1631_sig[] = { 0x1e, 0x50, 0x27, 0xfc, 0xc6, 0x30, 0xaa, 0x08, 0x75, 0x0a, 0x47, 0x25, 0x91, 0x9d, 0xd9, 0x07, 0x24, 0x22, 0xa2, 0x1a, 0xca, 0x9d, 0x33, 0x26, 0xbe, 0xc3, 0xe6, 0xac, 0x04, 0x0b, 0xa9, 0x78, 0x49, 0x51, 0xb1, 0xfd, 0xa6, 0xf5, 0x88, 0xe6, 0x0d, 0xcb, 0x55, 0x0b, 0x75, 0x79, 0x3a, 0x4e, 0x0d, 0xf3, 0x22, 0x46, 0x41, 0xf6, 0x80, 0x4f, 0x4d, 0x1b, 0xf9, 0x51, 0x05, 0x1e, 0x08, 0x7c, 0xe1, 0xfa, 0x73, 0x65, 0xc4, 0x3b, 0xd2, 0x78, 0x78, 0x62, 0x68, 0x33, 0xf0, 0x91, 0x90, 0xcc, 0x0a, 0x7f, 0xa2, 0x9b, 0x16, 0xbc, 0x2c, 0xa0, 0xd3, 0x4f, 0xd0, 0x66, 0x0d, 0x24, 0x71, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1631 = { .name = "ecdsa_brainpoolp384r1_sha384_1631", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1631_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1631_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1631_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 228 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1632 for ECDSA, tcId is 229 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1632_pubkey[] = { 0x69, 0xeb, 0xf3, 0x32, 0xe1, 0xeb, 0x24, 0x55, 0x32, 0x4a, 0x75, 0x72, 0xa1, 0x79, 0x77, 0xa4, 0xe2, 0x95, 0x51, 0x08, 0xee, 0x8b, 0xd8, 0x1b, 0xd6, 0xd1, 0xf5, 0x55, 0xd6, 0x08, 0x68, 0x7f, 0x5b, 0xbb, 0x39, 0x85, 0x8e, 0xbe, 0xe3, 0x04, 0x98, 0x5b, 0xaa, 0x7d, 0x09, 0xc8, 0x30, 0xbb, 0x67, 0x2b, 0x9c, 0x96, 0x68, 0x4d, 0xfc, 0x00, 0x7f, 0x01, 0x5e, 0x39, 0xcd, 0xad, 0xa9, 0xfe, 0x16, 0xdb, 0x50, 0x22, 0xbf, 0xd1, 0x73, 0x34, 0x8c, 0xaa, 0xfc, 0x52, 0x86, 0x84, 0x62, 0x1f, 0x97, 0xfb, 0xa2, 0x4f, 0x2c, 0x30, 0xe3, 0xdc, 0x72, 0x87, 0x72, 0xe8, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1632_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1632_sig[] = { 0x4e, 0x61, 0xe3, 0x47, 0x40, 0xa9, 0xf6, 0xdb, 0x08, 0x54, 0xfa, 0xf2, 0x05, 0x71, 0x9a, 0x3d, 0x98, 0xef, 0x64, 0x4b, 0x86, 0x24, 0x1b, 0x85, 0x8f, 0xa2, 0x29, 0x59, 0xc0, 0x43, 0x95, 0x57, 0x8b, 0xef, 0x7b, 0xe3, 0x50, 0x36, 0xae, 0x7a, 0x9f, 0xfe, 0xb9, 0xa2, 0x17, 0x33, 0x11, 0xf4, 0x1e, 0x96, 0x7c, 0x3b, 0x60, 0x71, 0xd3, 0x75, 0x60, 0xfd, 0x64, 0xa4, 0xfe, 0x09, 0x21, 0xb1, 0xd6, 0x00, 0xf6, 0x0d, 0x88, 0x3f, 0xde, 0xc8, 0x16, 0x83, 0x61, 0x76, 0xc5, 0xe6, 0x7a, 0xd0, 0x51, 0x82, 0xaa, 0x08, 0x0c, 0x7e, 0x21, 0x84, 0xc0, 0x71, 0x00, 0x50, 0xd5, 0x23, 0xf0, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1632 = { .name = "ecdsa_brainpoolp384r1_sha384_1632", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1632_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1632_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1632_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 229 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1633 for ECDSA, tcId is 230 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1633_pubkey[] = { 0x69, 0xeb, 0xf3, 0x32, 0xe1, 0xeb, 0x24, 0x55, 0x32, 0x4a, 0x75, 0x72, 0xa1, 0x79, 0x77, 0xa4, 0xe2, 0x95, 0x51, 0x08, 0xee, 0x8b, 0xd8, 0x1b, 0xd6, 0xd1, 0xf5, 0x55, 0xd6, 0x08, 0x68, 0x7f, 0x5b, 0xbb, 0x39, 0x85, 0x8e, 0xbe, 0xe3, 0x04, 0x98, 0x5b, 0xaa, 0x7d, 0x09, 0xc8, 0x30, 0xbb, 0x67, 0x2b, 0x9c, 0x96, 0x68, 0x4d, 0xfc, 0x00, 0x7f, 0x01, 0x5e, 0x39, 0xcd, 0xad, 0xa9, 0xfe, 0x16, 0xdb, 0x50, 0x22, 0xbf, 0xd1, 0x73, 0x34, 0x8c, 0xaa, 0xfc, 0x52, 0x86, 0x84, 0x62, 0x1f, 0x97, 0xfb, 0xa2, 0x4f, 0x2c, 0x30, 0xe3, 0xdc, 0x72, 0x87, 0x72, 0xe8, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1633_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1633_sig[] = { 0x2c, 0x30, 0x90, 0xc5, 0x81, 0xe5, 0x75, 0xda, 0x58, 0xa8, 0xf6, 0x59, 0xf7, 0x4c, 0x5e, 0xee, 0x56, 0x64, 0x00, 0xeb, 0x1d, 0x91, 0xde, 0x0a, 0x95, 0x0e, 0x78, 0x75, 0x42, 0xe6, 0x57, 0x2f, 0x73, 0xb9, 0xf6, 0xd4, 0xf8, 0x1f, 0x1c, 0x8e, 0x42, 0xf9, 0xe4, 0x60, 0xda, 0xc3, 0xc1, 0xdc, 0x75, 0x6b, 0x1b, 0x69, 0x3e, 0x7f, 0xe0, 0x66, 0x86, 0x70, 0x8c, 0x2a, 0x60, 0x98, 0x54, 0xac, 0xcd, 0x21, 0xe3, 0x19, 0x5d, 0x84, 0xb7, 0x2c, 0x11, 0xc8, 0x73, 0x90, 0x8d, 0x17, 0x5d, 0xfc, 0x00, 0xc0, 0x0e, 0xbb, 0xdf, 0x8e, 0x2b, 0xb6, 0x97, 0x0f, 0x2f, 0x19, 0x78, 0x53, 0x03, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1633 = { .name = "ecdsa_brainpoolp384r1_sha384_1633", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1633_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1633_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1633_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 230 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1634 for ECDSA, tcId is 231 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1634_pubkey[] = { 0x4f, 0xb5, 0x68, 0x86, 0x66, 0x67, 0x3f, 0x10, 0x42, 0x87, 0x42, 0x8b, 0x5b, 0xae, 0x6b, 0xd8, 0x2a, 0x5c, 0x69, 0xb5, 0x23, 0x76, 0x2a, 0xa7, 0x39, 0xb2, 0x45, 0x94, 0xa9, 0xa8, 0x12, 0x97, 0x31, 0x8d, 0xf6, 0x13, 0xf6, 0xb7, 0x37, 0x9a, 0xf4, 0x79, 0x79, 0xae, 0x7f, 0xff, 0xff, 0xff, 0x7e, 0x2d, 0x32, 0x5b, 0x41, 0xfe, 0x83, 0x1a, 0x23, 0xcb, 0x69, 0x4c, 0xb8, 0x0a, 0x30, 0x11, 0x9c, 0x19, 0x61, 0x43, 0x53, 0x6e, 0xe3, 0x34, 0x41, 0x6b, 0xa4, 0x37, 0xa4, 0x19, 0x05, 0x4c, 0x18, 0x0a, 0x94, 0x51, 0x54, 0x59, 0x6b, 0x83, 0xd7, 0xf7, 0xc3, 0xa6, 0xb6, 0x05, 0x96, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1634_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1634_sig[] = { 0x09, 0x2f, 0x0e, 0xe1, 0xfe, 0xeb, 0x79, 0xc0, 0x54, 0xae, 0x36, 0x23, 0x5f, 0x87, 0x17, 0xe9, 0xee, 0x72, 0xb4, 0x66, 0xb1, 0x70, 0x4d, 0x4f, 0xa7, 0x8a, 0xdd, 0xfc, 0xd1, 0x35, 0x18, 0xa6, 0x4d, 0xb2, 0xb2, 0xfd, 0xb0, 0x64, 0x39, 0xac, 0xbc, 0x4c, 0x04, 0x5f, 0xb2, 0xc2, 0x3c, 0x3a, 0x23, 0x71, 0xca, 0x6d, 0x36, 0xf4, 0x26, 0x61, 0x62, 0xee, 0x5c, 0x65, 0x7c, 0x71, 0xce, 0xa3, 0x5d, 0xce, 0xc3, 0x63, 0x2c, 0x5b, 0x22, 0x0a, 0x6f, 0x23, 0xac, 0xe1, 0xba, 0x65, 0x62, 0xa8, 0x41, 0xae, 0xee, 0xef, 0xe8, 0x7a, 0x79, 0x98, 0xad, 0xfa, 0xf1, 0x85, 0xb8, 0x55, 0x8e, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1634 = { .name = "ecdsa_brainpoolp384r1_sha384_1634", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1634_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1634_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1634_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 231 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1635 for ECDSA, tcId is 232 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1635_pubkey[] = { 0x4f, 0xb5, 0x68, 0x86, 0x66, 0x67, 0x3f, 0x10, 0x42, 0x87, 0x42, 0x8b, 0x5b, 0xae, 0x6b, 0xd8, 0x2a, 0x5c, 0x69, 0xb5, 0x23, 0x76, 0x2a, 0xa7, 0x39, 0xb2, 0x45, 0x94, 0xa9, 0xa8, 0x12, 0x97, 0x31, 0x8d, 0xf6, 0x13, 0xf6, 0xb7, 0x37, 0x9a, 0xf4, 0x79, 0x79, 0xae, 0x7f, 0xff, 0xff, 0xff, 0x7e, 0x2d, 0x32, 0x5b, 0x41, 0xfe, 0x83, 0x1a, 0x23, 0xcb, 0x69, 0x4c, 0xb8, 0x0a, 0x30, 0x11, 0x9c, 0x19, 0x61, 0x43, 0x53, 0x6e, 0xe3, 0x34, 0x41, 0x6b, 0xa4, 0x37, 0xa4, 0x19, 0x05, 0x4c, 0x18, 0x0a, 0x94, 0x51, 0x54, 0x59, 0x6b, 0x83, 0xd7, 0xf7, 0xc3, 0xa6, 0xb6, 0x05, 0x96, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1635_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1635_sig[] = { 0x6c, 0x8f, 0x4b, 0xe6, 0x41, 0xaf, 0xaf, 0x5b, 0xf9, 0x1c, 0xe0, 0x89, 0x74, 0xd2, 0x84, 0xec, 0xe6, 0xae, 0xc7, 0x47, 0x92, 0x24, 0x72, 0x29, 0xfa, 0x86, 0xc6, 0x59, 0x7e, 0xed, 0x3f, 0xb5, 0x07, 0xb7, 0x12, 0xbb, 0x77, 0xaf, 0x02, 0x26, 0xe1, 0xbb, 0xb3, 0xba, 0xd6, 0x32, 0xb0, 0xd8, 0x77, 0x59, 0x54, 0xfe, 0x8b, 0xf9, 0x36, 0x15, 0x7b, 0x7a, 0xb7, 0xa6, 0x83, 0xf6, 0xdc, 0x18, 0x38, 0xa8, 0x71, 0x82, 0x00, 0x62, 0x1b, 0xc8, 0xbf, 0x2f, 0x32, 0xb7, 0x78, 0xf6, 0xc8, 0xe8, 0xc6, 0x56, 0x53, 0x2b, 0x50, 0xde, 0x39, 0xac, 0x22, 0xd2, 0x2b, 0x37, 0xdc, 0xcf, 0xd1, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1635 = { .name = "ecdsa_brainpoolp384r1_sha384_1635", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1635_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1635_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1635_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 232 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1636 for ECDSA, tcId is 233 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1636_pubkey[] = { 0x4f, 0xb5, 0x68, 0x86, 0x66, 0x67, 0x3f, 0x10, 0x42, 0x87, 0x42, 0x8b, 0x5b, 0xae, 0x6b, 0xd8, 0x2a, 0x5c, 0x69, 0xb5, 0x23, 0x76, 0x2a, 0xa7, 0x39, 0xb2, 0x45, 0x94, 0xa9, 0xa8, 0x12, 0x97, 0x31, 0x8d, 0xf6, 0x13, 0xf6, 0xb7, 0x37, 0x9a, 0xf4, 0x79, 0x79, 0xae, 0x7f, 0xff, 0xff, 0xff, 0x7e, 0x2d, 0x32, 0x5b, 0x41, 0xfe, 0x83, 0x1a, 0x23, 0xcb, 0x69, 0x4c, 0xb8, 0x0a, 0x30, 0x11, 0x9c, 0x19, 0x61, 0x43, 0x53, 0x6e, 0xe3, 0x34, 0x41, 0x6b, 0xa4, 0x37, 0xa4, 0x19, 0x05, 0x4c, 0x18, 0x0a, 0x94, 0x51, 0x54, 0x59, 0x6b, 0x83, 0xd7, 0xf7, 0xc3, 0xa6, 0xb6, 0x05, 0x96, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1636_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1636_sig[] = { 0x76, 0xe5, 0xc0, 0x75, 0x82, 0x17, 0x74, 0x00, 0xdf, 0x45, 0x31, 0x14, 0xfe, 0xd7, 0x46, 0xf4, 0x07, 0x04, 0x19, 0x78, 0x97, 0xb4, 0xca, 0x21, 0xb7, 0x2e, 0x5b, 0x44, 0xd4, 0xca, 0x40, 0xcf, 0xca, 0xa5, 0x5e, 0x44, 0x46, 0x35, 0x5c, 0x91, 0xea, 0x97, 0x67, 0xf3, 0x8c, 0x81, 0x72, 0xdf, 0x0c, 0x6d, 0xd7, 0x3e, 0xef, 0xbb, 0x4c, 0x06, 0xe8, 0x23, 0x22, 0x4d, 0x8e, 0xfa, 0xa3, 0xee, 0x93, 0x4e, 0x4a, 0x97, 0xee, 0xd2, 0x83, 0x35, 0x13, 0xb4, 0xd7, 0x35, 0xed, 0x06, 0xeb, 0x55, 0x0b, 0x2a, 0x5f, 0xa7, 0xf8, 0x66, 0x13, 0xd6, 0x27, 0xd9, 0xdb, 0x46, 0x6a, 0xfa, 0x66, 0x46, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1636 = { .name = "ecdsa_brainpoolp384r1_sha384_1636", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1636_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1636_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1636_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 233 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1637 for ECDSA, tcId is 234 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1637_pubkey[] = { 0x34, 0x77, 0x0c, 0x73, 0xa7, 0xe4, 0x2c, 0xe7, 0xa5, 0x7d, 0x1d, 0xe6, 0xe5, 0x4f, 0x35, 0xf1, 0x75, 0x20, 0x47, 0xf6, 0x51, 0x35, 0x84, 0xc7, 0xb1, 0x4b, 0xca, 0x17, 0xd7, 0xab, 0xc4, 0x99, 0xf8, 0xab, 0x03, 0x7c, 0x70, 0xfd, 0x2e, 0x13, 0xa8, 0xb9, 0x7b, 0x2a, 0xe2, 0x63, 0x68, 0x86, 0x22, 0x42, 0x16, 0x15, 0xba, 0x36, 0x3f, 0x1f, 0xfe, 0x9a, 0x8f, 0x2f, 0xe0, 0xf6, 0xe2, 0x46, 0xfd, 0xa1, 0x14, 0x62, 0xa3, 0xec, 0x00, 0x0c, 0x68, 0x5e, 0x09, 0xa9, 0x0d, 0xbc, 0xdc, 0x2a, 0xf6, 0x46, 0x7f, 0x9e, 0xe6, 0x9b, 0x5e, 0x7b, 0xea, 0xd9, 0xb8, 0x46, 0x1f, 0x4a, 0x4b, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1637_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1637_sig[] = { 0x0e, 0x44, 0xfd, 0xc3, 0x3a, 0xed, 0x0c, 0x32, 0x0e, 0x37, 0x1e, 0x2a, 0x78, 0xe9, 0xf1, 0x8f, 0xde, 0x83, 0x43, 0x4e, 0x68, 0x1a, 0xfb, 0x05, 0xa5, 0xbd, 0xb0, 0xf4, 0x3c, 0xac, 0x70, 0xe8, 0x3e, 0xde, 0x56, 0xbf, 0x8c, 0x56, 0xac, 0xf7, 0x0e, 0x05, 0x4e, 0x2f, 0xfe, 0xf5, 0x49, 0xcf, 0x13, 0x24, 0xb4, 0xcf, 0xe6, 0x84, 0xd4, 0x01, 0xea, 0xc1, 0x5b, 0x09, 0x40, 0xf5, 0x83, 0x54, 0x36, 0xd3, 0xa1, 0x02, 0x8e, 0x27, 0xc1, 0x96, 0x6d, 0xbf, 0x69, 0xfe, 0xfe, 0xf8, 0x27, 0x48, 0xa0, 0x5b, 0x44, 0x43, 0xc7, 0x7c, 0x87, 0x07, 0x89, 0x13, 0x57, 0x55, 0xd0, 0xd1, 0x84, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1637 = { .name = "ecdsa_brainpoolp384r1_sha384_1637", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1637_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1637_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1637_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP384t1, tcId is 234 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1638 for ECDSA, tcId is 235 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1638_pubkey[] = { 0x34, 0x77, 0x0c, 0x73, 0xa7, 0xe4, 0x2c, 0xe7, 0xa5, 0x7d, 0x1d, 0xe6, 0xe5, 0x4f, 0x35, 0xf1, 0x75, 0x20, 0x47, 0xf6, 0x51, 0x35, 0x84, 0xc7, 0xb1, 0x4b, 0xca, 0x17, 0xd7, 0xab, 0xc4, 0x99, 0xf8, 0xab, 0x03, 0x7c, 0x70, 0xfd, 0x2e, 0x13, 0xa8, 0xb9, 0x7b, 0x2a, 0xe2, 0x63, 0x68, 0x86, 0x22, 0x42, 0x16, 0x15, 0xba, 0x36, 0x3f, 0x1f, 0xfe, 0x9a, 0x8f, 0x2f, 0xe0, 0xf6, 0xe2, 0x46, 0xfd, 0xa1, 0x14, 0x62, 0xa3, 0xec, 0x00, 0x0c, 0x68, 0x5e, 0x09, 0xa9, 0x0d, 0xbc, 0xdc, 0x2a, 0xf6, 0x46, 0x7f, 0x9e, 0xe6, 0x9b, 0x5e, 0x7b, 0xea, 0xd9, 0xb8, 0x46, 0x1f, 0x4a, 0x4b, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1638_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1638_sig[] = { 0x59, 0x66, 0xac, 0xd8, 0xa7, 0x71, 0x4f, 0x20, 0x15, 0xe3, 0x6f, 0xd4, 0xfd, 0xb3, 0x45, 0x22, 0x58, 0xce, 0x0a, 0xae, 0xfb, 0x39, 0x72, 0x09, 0x1b, 0x49, 0x6b, 0xd5, 0x30, 0xbb, 0xaf, 0x1e, 0xc6, 0x7d, 0x7e, 0x37, 0xe5, 0x00, 0x31, 0xb3, 0xee, 0xa4, 0x4a, 0x8b, 0xb8, 0xf6, 0x2c, 0x20, 0x2a, 0x5f, 0x30, 0x9d, 0x2f, 0xad, 0x55, 0xb9, 0x3a, 0x7a, 0x30, 0x12, 0xcb, 0xda, 0x28, 0x45, 0xef, 0xaa, 0x4e, 0xa0, 0xd1, 0x87, 0xd3, 0x82, 0x4f, 0x4a, 0x6a, 0x92, 0x27, 0x73, 0x0d, 0x3a, 0xb1, 0x52, 0x46, 0xd8, 0xd0, 0x95, 0x2c, 0x7e, 0xe8, 0xc0, 0xb9, 0xeb, 0x83, 0xd1, 0xc2, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1638 = { .name = "ecdsa_brainpoolp384r1_sha384_1638", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1638_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1638_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1638_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP384t1, tcId is 235 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1639 for ECDSA, tcId is 236 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1639_pubkey[] = { 0x34, 0x77, 0x0c, 0x73, 0xa7, 0xe4, 0x2c, 0xe7, 0xa5, 0x7d, 0x1d, 0xe6, 0xe5, 0x4f, 0x35, 0xf1, 0x75, 0x20, 0x47, 0xf6, 0x51, 0x35, 0x84, 0xc7, 0xb1, 0x4b, 0xca, 0x17, 0xd7, 0xab, 0xc4, 0x99, 0xf8, 0xab, 0x03, 0x7c, 0x70, 0xfd, 0x2e, 0x13, 0xa8, 0xb9, 0x7b, 0x2a, 0xe2, 0x63, 0x68, 0x86, 0x22, 0x42, 0x16, 0x15, 0xba, 0x36, 0x3f, 0x1f, 0xfe, 0x9a, 0x8f, 0x2f, 0xe0, 0xf6, 0xe2, 0x46, 0xfd, 0xa1, 0x14, 0x62, 0xa3, 0xec, 0x00, 0x0c, 0x68, 0x5e, 0x09, 0xa9, 0x0d, 0xbc, 0xdc, 0x2a, 0xf6, 0x46, 0x7f, 0x9e, 0xe6, 0x9b, 0x5e, 0x7b, 0xea, 0xd9, 0xb8, 0x46, 0x1f, 0x4a, 0x4b, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1639_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1639_sig[] = { 0x26, 0x6e, 0xac, 0xe6, 0x57, 0xe1, 0xec, 0x88, 0xa2, 0xad, 0xbb, 0x38, 0xa5, 0xaf, 0xb4, 0xf7, 0x50, 0x27, 0x4c, 0xa6, 0x14, 0xd1, 0xfd, 0xe9, 0xea, 0x39, 0xdf, 0xf6, 0xf2, 0xa2, 0xaa, 0x69, 0x92, 0x3e, 0x9a, 0x74, 0x89, 0xf0, 0x6b, 0xf9, 0xd8, 0x4c, 0x51, 0x8c, 0xee, 0x57, 0xe5, 0x5b, 0x3d, 0x19, 0x02, 0x76, 0x84, 0xef, 0x22, 0x12, 0x16, 0xf6, 0x3a, 0x59, 0x1d, 0x8e, 0x79, 0x35, 0x24, 0xe4, 0xc1, 0x23, 0x4a, 0x56, 0xce, 0x41, 0x5b, 0xb9, 0xad, 0x9e, 0x2e, 0xbf, 0x25, 0xac, 0x94, 0xa9, 0x92, 0x61, 0xb9, 0x15, 0x7d, 0x19, 0xda, 0xa5, 0xaa, 0x87, 0x62, 0x91, 0xf3, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1639 = { .name = "ecdsa_brainpoolp384r1_sha384_1639", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1639_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1639_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1639_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP384t1, tcId is 236 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1640 for ECDSA, tcId is 237 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1640_pubkey[] = { 0x86, 0xf0, 0xfc, 0x89, 0xb7, 0x86, 0x1e, 0xc3, 0xbd, 0x58, 0x21, 0x61, 0xae, 0xcf, 0xc9, 0x57, 0x89, 0xae, 0x40, 0x24, 0x59, 0xeb, 0x7f, 0x30, 0x15, 0xb7, 0xdd, 0x24, 0xe2, 0x0f, 0xc9, 0xb0, 0x05, 0xc6, 0x35, 0xfc, 0x29, 0x0a, 0x0e, 0x2a, 0x9f, 0xf3, 0x58, 0x63, 0xb7, 0xb8, 0x2e, 0x3e, 0x01, 0xeb, 0xba, 0x48, 0x9e, 0x92, 0x3d, 0xad, 0x88, 0x14, 0x60, 0x77, 0x91, 0x4e, 0x3a, 0xe5, 0xc5, 0x75, 0xe1, 0xbe, 0xce, 0xce, 0xc7, 0x10, 0x96, 0x2a, 0x18, 0xff, 0xd9, 0x10, 0x05, 0x77, 0x6c, 0x4d, 0x9e, 0x4b, 0xd9, 0x52, 0xc7, 0x93, 0x58, 0x7a, 0x70, 0x29, 0x1c, 0xe4, 0x78, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1640_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1640_sig[] = { 0x13, 0xde, 0x6e, 0xb5, 0x32, 0x32, 0x1c, 0x02, 0x30, 0x92, 0xaa, 0x78, 0xc1, 0x99, 0xf9, 0xee, 0x4d, 0xce, 0x7a, 0x18, 0xdf, 0x15, 0x8c, 0x3e, 0x79, 0x94, 0x61, 0xaf, 0x9d, 0x96, 0xc2, 0xd3, 0x87, 0x65, 0xa7, 0x8f, 0xdb, 0x14, 0x40, 0x4d, 0x19, 0x93, 0x65, 0xde, 0x05, 0xbd, 0x44, 0xc5, 0x25, 0x14, 0xa0, 0x35, 0x9b, 0xcb, 0x66, 0x12, 0x2b, 0xf4, 0x8c, 0x18, 0x6a, 0x4b, 0xb2, 0xed, 0xcc, 0xf3, 0x05, 0xb0, 0x64, 0x14, 0xb1, 0x1f, 0x47, 0x0d, 0x25, 0x12, 0xca, 0xdd, 0xa1, 0x29, 0x36, 0x6f, 0x60, 0x72, 0xde, 0x71, 0x5b, 0xc2, 0xba, 0xbb, 0x8a, 0x3a, 0x5f, 0x26, 0x0d, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1640 = { .name = "ecdsa_brainpoolp384r1_sha384_1640", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1640_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1640_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1640_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP384t1, tcId is 237 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1641 for ECDSA, tcId is 238 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1641_pubkey[] = { 0x86, 0xf0, 0xfc, 0x89, 0xb7, 0x86, 0x1e, 0xc3, 0xbd, 0x58, 0x21, 0x61, 0xae, 0xcf, 0xc9, 0x57, 0x89, 0xae, 0x40, 0x24, 0x59, 0xeb, 0x7f, 0x30, 0x15, 0xb7, 0xdd, 0x24, 0xe2, 0x0f, 0xc9, 0xb0, 0x05, 0xc6, 0x35, 0xfc, 0x29, 0x0a, 0x0e, 0x2a, 0x9f, 0xf3, 0x58, 0x63, 0xb7, 0xb8, 0x2e, 0x3e, 0x01, 0xeb, 0xba, 0x48, 0x9e, 0x92, 0x3d, 0xad, 0x88, 0x14, 0x60, 0x77, 0x91, 0x4e, 0x3a, 0xe5, 0xc5, 0x75, 0xe1, 0xbe, 0xce, 0xce, 0xc7, 0x10, 0x96, 0x2a, 0x18, 0xff, 0xd9, 0x10, 0x05, 0x77, 0x6c, 0x4d, 0x9e, 0x4b, 0xd9, 0x52, 0xc7, 0x93, 0x58, 0x7a, 0x70, 0x29, 0x1c, 0xe4, 0x78, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1641_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1641_sig[] = { 0x13, 0x08, 0xd3, 0xd9, 0xed, 0xfe, 0x3a, 0xd0, 0x7e, 0x21, 0x5a, 0x97, 0x5b, 0x2b, 0x06, 0x7e, 0x9f, 0x0b, 0x80, 0x33, 0x71, 0xb3, 0x02, 0x9f, 0x43, 0x88, 0xa3, 0x47, 0x1f, 0x4d, 0xb2, 0x3f, 0x35, 0x8a, 0xea, 0x5c, 0x03, 0xdb, 0x62, 0xd7, 0x71, 0x15, 0xc5, 0x6c, 0x49, 0x62, 0x63, 0x3b, 0x4b, 0x8b, 0x1f, 0xe4, 0x4b, 0x32, 0xcc, 0x66, 0x91, 0x14, 0xa1, 0xce, 0x0b, 0xa0, 0x55, 0x54, 0x46, 0xd0, 0xc9, 0x6a, 0x32, 0xcb, 0x60, 0x21, 0x85, 0xe8, 0xfb, 0xa4, 0x14, 0xd3, 0xa8, 0x31, 0xcb, 0xf5, 0xb5, 0x19, 0xb0, 0xf9, 0x06, 0x47, 0xdc, 0x45, 0xe3, 0x0a, 0x1f, 0x23, 0xef, 0x90, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1641 = { .name = "ecdsa_brainpoolp384r1_sha384_1641", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1641_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1641_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1641_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP384t1, tcId is 238 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1642 for ECDSA, tcId is 239 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1642_pubkey[] = { 0x86, 0xf0, 0xfc, 0x89, 0xb7, 0x86, 0x1e, 0xc3, 0xbd, 0x58, 0x21, 0x61, 0xae, 0xcf, 0xc9, 0x57, 0x89, 0xae, 0x40, 0x24, 0x59, 0xeb, 0x7f, 0x30, 0x15, 0xb7, 0xdd, 0x24, 0xe2, 0x0f, 0xc9, 0xb0, 0x05, 0xc6, 0x35, 0xfc, 0x29, 0x0a, 0x0e, 0x2a, 0x9f, 0xf3, 0x58, 0x63, 0xb7, 0xb8, 0x2e, 0x3e, 0x01, 0xeb, 0xba, 0x48, 0x9e, 0x92, 0x3d, 0xad, 0x88, 0x14, 0x60, 0x77, 0x91, 0x4e, 0x3a, 0xe5, 0xc5, 0x75, 0xe1, 0xbe, 0xce, 0xce, 0xc7, 0x10, 0x96, 0x2a, 0x18, 0xff, 0xd9, 0x10, 0x05, 0x77, 0x6c, 0x4d, 0x9e, 0x4b, 0xd9, 0x52, 0xc7, 0x93, 0x58, 0x7a, 0x70, 0x29, 0x1c, 0xe4, 0x78, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1642_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1642_sig[] = { 0x5d, 0xa3, 0xdf, 0x09, 0x41, 0x55, 0xb8, 0xf8, 0x81, 0x2d, 0x0c, 0x63, 0x45, 0x34, 0x4e, 0x41, 0xc3, 0xb5, 0x91, 0xb6, 0x5b, 0x95, 0xfe, 0xdb, 0xbc, 0xbd, 0x3c, 0x3a, 0x3b, 0xb1, 0xc1, 0xdb, 0xfc, 0x4d, 0x4c, 0x5b, 0x84, 0x1b, 0x8f, 0x88, 0x74, 0xd5, 0x9b, 0x07, 0xcf, 0x22, 0x88, 0xfc, 0x4a, 0x1e, 0x4a, 0x83, 0x99, 0xab, 0xbd, 0xf2, 0x46, 0x92, 0x9b, 0x25, 0x59, 0xbb, 0x0f, 0xa4, 0x04, 0x77, 0x27, 0x55, 0xfc, 0x74, 0x52, 0x36, 0x26, 0xae, 0xef, 0x43, 0x2f, 0xe4, 0x76, 0x4d, 0xf1, 0xe1, 0xf5, 0xc9, 0xb0, 0xf8, 0x97, 0xed, 0x8f, 0x1f, 0xfd, 0x7a, 0x88, 0x16, 0x7f, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1642 = { .name = "ecdsa_brainpoolp384r1_sha384_1642", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1642_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1642_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1642_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP384t1, tcId is 239 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1643 for ECDSA, tcId is 240 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1643_pubkey[] = { 0x08, 0x2f, 0x7d, 0xce, 0xb5, 0x85, 0xc5, 0xba, 0x48, 0x94, 0xb0, 0xfa, 0xf6, 0x60, 0x4d, 0xa8, 0x88, 0xa3, 0x11, 0xad, 0x9f, 0x41, 0x73, 0x1a, 0x1d, 0x39, 0x37, 0x16, 0x8a, 0x10, 0xb0, 0x79, 0x5a, 0x1f, 0xae, 0x49, 0x6c, 0xb9, 0xa9, 0x07, 0x39, 0xe1, 0xc0, 0xa6, 0xe5, 0x31, 0xe8, 0x07, 0x2c, 0x3b, 0x85, 0x68, 0xea, 0xa1, 0xc6, 0xf5, 0x41, 0xa6, 0x65, 0xce, 0x7a, 0x66, 0xf7, 0x8e, 0xa2, 0xd5, 0x89, 0x31, 0x03, 0xe6, 0x02, 0x8a, 0xdd, 0x62, 0x35, 0x64, 0x92, 0xd8, 0xb5, 0xac, 0x6a, 0xb8, 0x90, 0x1d, 0x59, 0x62, 0x1c, 0x33, 0x41, 0x6c, 0x33, 0x98, 0x1b, 0xd5, 0x94, 0xec, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1643_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1643_sig[] = { 0x0b, 0xf6, 0xfe, 0xc0, 0xa5, 0xbe, 0x27, 0xcd, 0xdb, 0x0e, 0x76, 0x69, 0xae, 0x06, 0xd1, 0x5d, 0xfa, 0x75, 0x83, 0x7f, 0x8e, 0xe7, 0x2b, 0x47, 0x44, 0x3a, 0xc8, 0x45, 0xff, 0xcd, 0x42, 0x7b, 0x08, 0x93, 0xe1, 0x0c, 0x85, 0xc2, 0x0c, 0x7a, 0xa5, 0x76, 0xfb, 0x70, 0xe8, 0x77, 0x61, 0xab, 0x74, 0x18, 0xb6, 0xf3, 0x74, 0x93, 0x6a, 0xdc, 0xa8, 0xb0, 0x7d, 0xc5, 0x15, 0x45, 0xee, 0x34, 0xed, 0x2e, 0x9f, 0x56, 0xf3, 0x26, 0x70, 0x33, 0xe3, 0x0e, 0xa0, 0x9a, 0x0a, 0xcd, 0x31, 0xb6, 0xce, 0x83, 0x50, 0x3e, 0xe7, 0xe0, 0x98, 0x62, 0x7f, 0x8b, 0xa8, 0xb4, 0xc5, 0x84, 0x34, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1643 = { .name = "ecdsa_brainpoolp384r1_sha384_1643", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1643_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1643_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1643_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 240 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1644 for ECDSA, tcId is 241 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1644_pubkey[] = { 0x08, 0x2f, 0x7d, 0xce, 0xb5, 0x85, 0xc5, 0xba, 0x48, 0x94, 0xb0, 0xfa, 0xf6, 0x60, 0x4d, 0xa8, 0x88, 0xa3, 0x11, 0xad, 0x9f, 0x41, 0x73, 0x1a, 0x1d, 0x39, 0x37, 0x16, 0x8a, 0x10, 0xb0, 0x79, 0x5a, 0x1f, 0xae, 0x49, 0x6c, 0xb9, 0xa9, 0x07, 0x39, 0xe1, 0xc0, 0xa6, 0xe5, 0x31, 0xe8, 0x07, 0x2c, 0x3b, 0x85, 0x68, 0xea, 0xa1, 0xc6, 0xf5, 0x41, 0xa6, 0x65, 0xce, 0x7a, 0x66, 0xf7, 0x8e, 0xa2, 0xd5, 0x89, 0x31, 0x03, 0xe6, 0x02, 0x8a, 0xdd, 0x62, 0x35, 0x64, 0x92, 0xd8, 0xb5, 0xac, 0x6a, 0xb8, 0x90, 0x1d, 0x59, 0x62, 0x1c, 0x33, 0x41, 0x6c, 0x33, 0x98, 0x1b, 0xd5, 0x94, 0xec, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1644_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1644_sig[] = { 0x03, 0xe3, 0x06, 0xa8, 0x6f, 0x6b, 0x2c, 0xb2, 0x48, 0xfc, 0xb6, 0x8d, 0x1d, 0x31, 0x7a, 0x60, 0x42, 0xb7, 0x08, 0x9e, 0x96, 0xd7, 0x4c, 0x2f, 0x5b, 0x93, 0x4e, 0x2e, 0x12, 0x28, 0x31, 0x26, 0x8a, 0x45, 0xe2, 0x18, 0x5b, 0x7c, 0x21, 0x27, 0x0e, 0x8b, 0x90, 0x6c, 0xd3, 0x72, 0xe6, 0xd7, 0x4c, 0x82, 0xab, 0x6d, 0xe6, 0xbc, 0x01, 0x94, 0xac, 0x1a, 0x2e, 0x34, 0x80, 0xa0, 0xc8, 0x04, 0x66, 0xaf, 0x7d, 0x2a, 0x32, 0x9d, 0x20, 0xb0, 0x31, 0x51, 0xd1, 0x80, 0x6a, 0x0b, 0xc0, 0x72, 0x0f, 0x55, 0xd3, 0x78, 0x1a, 0x7d, 0xb9, 0xfe, 0xbe, 0x7d, 0x8b, 0xbd, 0x0a, 0x71, 0x9b, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1644 = { .name = "ecdsa_brainpoolp384r1_sha384_1644", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1644_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1644_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1644_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 241 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1645 for ECDSA, tcId is 242 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1645_pubkey[] = { 0x08, 0x2f, 0x7d, 0xce, 0xb5, 0x85, 0xc5, 0xba, 0x48, 0x94, 0xb0, 0xfa, 0xf6, 0x60, 0x4d, 0xa8, 0x88, 0xa3, 0x11, 0xad, 0x9f, 0x41, 0x73, 0x1a, 0x1d, 0x39, 0x37, 0x16, 0x8a, 0x10, 0xb0, 0x79, 0x5a, 0x1f, 0xae, 0x49, 0x6c, 0xb9, 0xa9, 0x07, 0x39, 0xe1, 0xc0, 0xa6, 0xe5, 0x31, 0xe8, 0x07, 0x2c, 0x3b, 0x85, 0x68, 0xea, 0xa1, 0xc6, 0xf5, 0x41, 0xa6, 0x65, 0xce, 0x7a, 0x66, 0xf7, 0x8e, 0xa2, 0xd5, 0x89, 0x31, 0x03, 0xe6, 0x02, 0x8a, 0xdd, 0x62, 0x35, 0x64, 0x92, 0xd8, 0xb5, 0xac, 0x6a, 0xb8, 0x90, 0x1d, 0x59, 0x62, 0x1c, 0x33, 0x41, 0x6c, 0x33, 0x98, 0x1b, 0xd5, 0x94, 0xec, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1645_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1645_sig[] = { 0x14, 0xd1, 0xdf, 0x9b, 0x3d, 0xb5, 0x5e, 0xcc, 0x8d, 0x1e, 0x12, 0x66, 0x25, 0xbd, 0xf5, 0xb6, 0x31, 0x6b, 0xba, 0x1e, 0x7f, 0x4e, 0xa5, 0xec, 0x77, 0x41, 0x8c, 0x75, 0x4a, 0x59, 0x75, 0x63, 0xdc, 0x5d, 0xc2, 0x91, 0xb7, 0xdd, 0x04, 0x77, 0x82, 0xd5, 0x18, 0xfe, 0x74, 0xe0, 0xbe, 0x83, 0x33, 0xef, 0x70, 0x1c, 0x44, 0x0f, 0x28, 0x0e, 0xdf, 0x81, 0xa9, 0x63, 0x2d, 0xde, 0x9d, 0xc1, 0x7d, 0xe5, 0xf4, 0x38, 0xdc, 0xc1, 0x9e, 0x9c, 0xa5, 0x91, 0x9b, 0x4b, 0x73, 0xe6, 0x29, 0x05, 0xe5, 0xf7, 0xe0, 0xbc, 0x9d, 0xb0, 0xb1, 0x4b, 0xc5, 0x33, 0x27, 0xf7, 0x9f, 0x70, 0xc6, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1645 = { .name = "ecdsa_brainpoolp384r1_sha384_1645", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1645_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1645_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1645_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 242 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1646 for ECDSA, tcId is 243 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1646_pubkey[] = { 0x6a, 0xfe, 0x4e, 0xa7, 0x70, 0x54, 0x92, 0xbd, 0xa3, 0x08, 0xb7, 0x89, 0xd7, 0x0d, 0xa4, 0x94, 0x57, 0xdd, 0xe8, 0x25, 0xd5, 0x25, 0x89, 0x60, 0xa7, 0xa3, 0x66, 0xe4, 0x66, 0x5a, 0xf9, 0xd3, 0x26, 0x39, 0x2c, 0x26, 0x72, 0x16, 0x5e, 0xa4, 0xbb, 0xdc, 0x33, 0x37, 0x4d, 0x88, 0xe7, 0x49, 0x84, 0x75, 0xe6, 0x93, 0x7a, 0x10, 0xa6, 0xf6, 0xa5, 0x0f, 0x23, 0xde, 0x91, 0x26, 0xba, 0x04, 0xe5, 0x65, 0x0a, 0x1c, 0xd0, 0x6a, 0x80, 0x66, 0xca, 0x42, 0x33, 0x39, 0xfc, 0x2c, 0xe5, 0x3d, 0x91, 0x48, 0x27, 0x44, 0xa4, 0xcd, 0xf2, 0xf9, 0x37, 0xf7, 0x6f, 0x12, 0xaa, 0xe3, 0xf6, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1646_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1646_sig[] = { 0x6a, 0x3a, 0x18, 0x40, 0x06, 0x86, 0x63, 0x5a, 0xe2, 0x79, 0xc3, 0x85, 0xb6, 0x40, 0xd4, 0xfa, 0x08, 0x0d, 0x9c, 0x44, 0xa5, 0xd4, 0x21, 0xfe, 0x4b, 0xe5, 0xa5, 0xec, 0x7a, 0x8a, 0xe3, 0x1b, 0x00, 0xbf, 0xa4, 0x06, 0xe9, 0x19, 0xe5, 0x7e, 0x39, 0xc1, 0x13, 0x60, 0xe6, 0x70, 0xd8, 0x69, 0x72, 0x9c, 0x0b, 0x9f, 0xf7, 0x7f, 0x88, 0xf8, 0x10, 0x54, 0x8d, 0x6d, 0xb1, 0x83, 0x53, 0x12, 0xa4, 0x48, 0x11, 0x4a, 0x3b, 0xd9, 0x3c, 0xf5, 0x94, 0x22, 0xfa, 0xa2, 0xea, 0x02, 0x6f, 0x5d, 0x47, 0x62, 0x7f, 0x0c, 0x11, 0xfb, 0x85, 0x91, 0x12, 0x24, 0x6d, 0x87, 0x9c, 0x85, 0x95, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1646 = { .name = "ecdsa_brainpoolp384r1_sha384_1646", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1646_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1646_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1646_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP384t1, tcId is 243 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1647 for ECDSA, tcId is 244 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1647_pubkey[] = { 0x6a, 0xfe, 0x4e, 0xa7, 0x70, 0x54, 0x92, 0xbd, 0xa3, 0x08, 0xb7, 0x89, 0xd7, 0x0d, 0xa4, 0x94, 0x57, 0xdd, 0xe8, 0x25, 0xd5, 0x25, 0x89, 0x60, 0xa7, 0xa3, 0x66, 0xe4, 0x66, 0x5a, 0xf9, 0xd3, 0x26, 0x39, 0x2c, 0x26, 0x72, 0x16, 0x5e, 0xa4, 0xbb, 0xdc, 0x33, 0x37, 0x4d, 0x88, 0xe7, 0x49, 0x84, 0x75, 0xe6, 0x93, 0x7a, 0x10, 0xa6, 0xf6, 0xa5, 0x0f, 0x23, 0xde, 0x91, 0x26, 0xba, 0x04, 0xe5, 0x65, 0x0a, 0x1c, 0xd0, 0x6a, 0x80, 0x66, 0xca, 0x42, 0x33, 0x39, 0xfc, 0x2c, 0xe5, 0x3d, 0x91, 0x48, 0x27, 0x44, 0xa4, 0xcd, 0xf2, 0xf9, 0x37, 0xf7, 0x6f, 0x12, 0xaa, 0xe3, 0xf6, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1647_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1647_sig[] = { 0x1a, 0xb8, 0xd6, 0xc3, 0x1d, 0x45, 0x77, 0xf5, 0x9c, 0xa5, 0x71, 0x4c, 0x9e, 0xad, 0xa9, 0x79, 0xfd, 0xb9, 0xec, 0x0c, 0xad, 0x32, 0xd8, 0xcb, 0x91, 0x5d, 0xbd, 0x70, 0x49, 0x29, 0x47, 0x18, 0x7f, 0x5a, 0x52, 0x71, 0x8e, 0x19, 0x98, 0x2f, 0x7a, 0x2d, 0x4c, 0xb4, 0x8b, 0x22, 0x77, 0x23, 0x87, 0x2e, 0x3c, 0xe7, 0xd1, 0xfd, 0x5a, 0xe1, 0x80, 0xfa, 0xf1, 0x99, 0x0b, 0x11, 0x93, 0x75, 0x58, 0xaa, 0x44, 0xcc, 0xda, 0xb6, 0x31, 0x49, 0x2b, 0x89, 0x25, 0xbe, 0x84, 0xfb, 0xcb, 0x45, 0x21, 0x48, 0xed, 0xad, 0x5b, 0xbf, 0xe4, 0x8c, 0x06, 0xb8, 0xc9, 0x90, 0x8c, 0xa2, 0x52, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1647 = { .name = "ecdsa_brainpoolp384r1_sha384_1647", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1647_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1647_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1647_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP384t1, tcId is 244 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1648 for ECDSA, tcId is 245 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1648_pubkey[] = { 0x6a, 0xfe, 0x4e, 0xa7, 0x70, 0x54, 0x92, 0xbd, 0xa3, 0x08, 0xb7, 0x89, 0xd7, 0x0d, 0xa4, 0x94, 0x57, 0xdd, 0xe8, 0x25, 0xd5, 0x25, 0x89, 0x60, 0xa7, 0xa3, 0x66, 0xe4, 0x66, 0x5a, 0xf9, 0xd3, 0x26, 0x39, 0x2c, 0x26, 0x72, 0x16, 0x5e, 0xa4, 0xbb, 0xdc, 0x33, 0x37, 0x4d, 0x88, 0xe7, 0x49, 0x84, 0x75, 0xe6, 0x93, 0x7a, 0x10, 0xa6, 0xf6, 0xa5, 0x0f, 0x23, 0xde, 0x91, 0x26, 0xba, 0x04, 0xe5, 0x65, 0x0a, 0x1c, 0xd0, 0x6a, 0x80, 0x66, 0xca, 0x42, 0x33, 0x39, 0xfc, 0x2c, 0xe5, 0x3d, 0x91, 0x48, 0x27, 0x44, 0xa4, 0xcd, 0xf2, 0xf9, 0x37, 0xf7, 0x6f, 0x12, 0xaa, 0xe3, 0xf6, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1648_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1648_sig[] = { 0x80, 0x3f, 0xfc, 0x58, 0xf8, 0x15, 0x0a, 0x9c, 0x4c, 0x22, 0x9a, 0x7b, 0x52, 0x23, 0x57, 0xf4, 0x9f, 0x9a, 0x5f, 0x48, 0xf8, 0x2d, 0x8b, 0xb9, 0x82, 0x95, 0x43, 0x95, 0x83, 0x6e, 0x09, 0xeb, 0x5f, 0x8c, 0xf1, 0xf3, 0x45, 0xce, 0x28, 0x46, 0x74, 0xbc, 0x36, 0x9d, 0x04, 0x6d, 0x5c, 0x8a, 0x8a, 0x9f, 0xeb, 0x64, 0xc4, 0x10, 0xcf, 0x3a, 0xe6, 0x26, 0x1a, 0xd3, 0x5f, 0x7e, 0x3e, 0x8d, 0xa1, 0x31, 0x29, 0xda, 0xf9, 0x49, 0x44, 0xf8, 0xe0, 0x8e, 0x96, 0x49, 0xcd, 0x00, 0x66, 0x22, 0xc3, 0xd5, 0xc9, 0x1e, 0xc5, 0xb9, 0x79, 0x8a, 0x1b, 0xe3, 0xa3, 0x15, 0x33, 0xa0, 0xa8, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1648 = { .name = "ecdsa_brainpoolp384r1_sha384_1648", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1648_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1648_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1648_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP384t1, tcId is 245 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1649 for ECDSA, tcId is 246 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1649_pubkey[] = { 0x4b, 0xc6, 0x52, 0x62, 0xc2, 0x2d, 0x32, 0x2e, 0xa8, 0x91, 0x46, 0xcc, 0xb5, 0xc6, 0x0c, 0x42, 0x87, 0xb6, 0x5a, 0x35, 0x22, 0x87, 0x43, 0xa5, 0xb9, 0xdc, 0xd1, 0x54, 0x93, 0xbd, 0x86, 0x42, 0x47, 0x89, 0x87, 0xc4, 0x21, 0x63, 0x7d, 0xd0, 0x71, 0x50, 0x79, 0xec, 0x90, 0xfb, 0x8c, 0xd4, 0x7a, 0x45, 0x55, 0x7e, 0xf6, 0x53, 0xd0, 0x77, 0x3d, 0xbe, 0x26, 0x30, 0xf8, 0xe0, 0x00, 0x62, 0x9e, 0xd8, 0x29, 0x3e, 0x1a, 0xa4, 0xa9, 0x6f, 0x3b, 0x15, 0x9a, 0x24, 0x5a, 0xa3, 0x5a, 0xd9, 0x2a, 0x10, 0x19, 0xc7, 0xe0, 0x9a, 0x9a, 0xb7, 0x5b, 0xa4, 0x3c, 0x07, 0x86, 0x92, 0x82, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1649_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1649_sig[] = { 0x2e, 0xd5, 0x69, 0xf1, 0x2d, 0xbe, 0x30, 0xa2, 0xab, 0xf0, 0x21, 0x90, 0xbb, 0x9e, 0x4d, 0xe7, 0xe2, 0x18, 0xe9, 0xfd, 0x70, 0x5d, 0xc7, 0x1c, 0xbe, 0x14, 0x80, 0x02, 0x27, 0x81, 0xb2, 0xa2, 0x21, 0x3c, 0x3e, 0xf2, 0xf9, 0x10, 0x52, 0xe9, 0x08, 0x40, 0xa1, 0x8f, 0x74, 0xe3, 0x75, 0xae, 0x88, 0x72, 0xb5, 0x66, 0xf3, 0x87, 0xc2, 0xbc, 0xb6, 0x39, 0xdf, 0x9c, 0x2d, 0x86, 0x6f, 0x76, 0x31, 0xdf, 0x29, 0x0c, 0x5f, 0x66, 0xc2, 0x64, 0xd4, 0x94, 0x9e, 0x25, 0x63, 0x83, 0xb1, 0xb4, 0xb2, 0x09, 0x8c, 0x12, 0x0f, 0x13, 0x44, 0x9d, 0x9d, 0x7b, 0xff, 0x68, 0x91, 0x91, 0x9c, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1649 = { .name = "ecdsa_brainpoolp384r1_sha384_1649", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1649_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1649_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1649_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 246 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1650 for ECDSA, tcId is 247 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1650_pubkey[] = { 0x4b, 0xc6, 0x52, 0x62, 0xc2, 0x2d, 0x32, 0x2e, 0xa8, 0x91, 0x46, 0xcc, 0xb5, 0xc6, 0x0c, 0x42, 0x87, 0xb6, 0x5a, 0x35, 0x22, 0x87, 0x43, 0xa5, 0xb9, 0xdc, 0xd1, 0x54, 0x93, 0xbd, 0x86, 0x42, 0x47, 0x89, 0x87, 0xc4, 0x21, 0x63, 0x7d, 0xd0, 0x71, 0x50, 0x79, 0xec, 0x90, 0xfb, 0x8c, 0xd4, 0x7a, 0x45, 0x55, 0x7e, 0xf6, 0x53, 0xd0, 0x77, 0x3d, 0xbe, 0x26, 0x30, 0xf8, 0xe0, 0x00, 0x62, 0x9e, 0xd8, 0x29, 0x3e, 0x1a, 0xa4, 0xa9, 0x6f, 0x3b, 0x15, 0x9a, 0x24, 0x5a, 0xa3, 0x5a, 0xd9, 0x2a, 0x10, 0x19, 0xc7, 0xe0, 0x9a, 0x9a, 0xb7, 0x5b, 0xa4, 0x3c, 0x07, 0x86, 0x92, 0x82, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1650_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1650_sig[] = { 0x4b, 0x7e, 0x56, 0x51, 0xb0, 0x35, 0x95, 0x92, 0x95, 0x09, 0x2e, 0x2e, 0xfe, 0x54, 0x8d, 0xa5, 0x22, 0x06, 0xc8, 0xd0, 0xe4, 0x8b, 0xa4, 0x3e, 0x2b, 0x8e, 0xcd, 0x98, 0xec, 0xe2, 0x5d, 0xc0, 0x89, 0x55, 0xb6, 0xe7, 0xb0, 0x5e, 0x38, 0xc4, 0xe2, 0x28, 0x29, 0xd1, 0x65, 0x87, 0x11, 0xb5, 0x44, 0xa9, 0x73, 0xb7, 0x55, 0x28, 0x40, 0x0c, 0xef, 0x3f, 0x63, 0xf5, 0x5f, 0x21, 0x54, 0xd4, 0x8b, 0xb0, 0xb8, 0x26, 0x21, 0x42, 0x00, 0xd3, 0xf3, 0x3c, 0x7b, 0xc3, 0x11, 0x55, 0x24, 0x2d, 0x4e, 0x24, 0xf0, 0x7e, 0xd1, 0x96, 0x06, 0xfd, 0xb2, 0xc8, 0xec, 0xae, 0xb6, 0x98, 0x1e, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1650 = { .name = "ecdsa_brainpoolp384r1_sha384_1650", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1650_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1650_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1650_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 247 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1651 for ECDSA, tcId is 248 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1651_pubkey[] = { 0x4b, 0xc6, 0x52, 0x62, 0xc2, 0x2d, 0x32, 0x2e, 0xa8, 0x91, 0x46, 0xcc, 0xb5, 0xc6, 0x0c, 0x42, 0x87, 0xb6, 0x5a, 0x35, 0x22, 0x87, 0x43, 0xa5, 0xb9, 0xdc, 0xd1, 0x54, 0x93, 0xbd, 0x86, 0x42, 0x47, 0x89, 0x87, 0xc4, 0x21, 0x63, 0x7d, 0xd0, 0x71, 0x50, 0x79, 0xec, 0x90, 0xfb, 0x8c, 0xd4, 0x7a, 0x45, 0x55, 0x7e, 0xf6, 0x53, 0xd0, 0x77, 0x3d, 0xbe, 0x26, 0x30, 0xf8, 0xe0, 0x00, 0x62, 0x9e, 0xd8, 0x29, 0x3e, 0x1a, 0xa4, 0xa9, 0x6f, 0x3b, 0x15, 0x9a, 0x24, 0x5a, 0xa3, 0x5a, 0xd9, 0x2a, 0x10, 0x19, 0xc7, 0xe0, 0x9a, 0x9a, 0xb7, 0x5b, 0xa4, 0x3c, 0x07, 0x86, 0x92, 0x82, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1651_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1651_sig[] = { 0x1e, 0xca, 0xda, 0xce, 0xaa, 0x47, 0x9f, 0xa4, 0xe9, 0xaa, 0xba, 0xc4, 0x21, 0x0b, 0x1a, 0xb7, 0x7f, 0xc1, 0xd1, 0x3a, 0x9c, 0x4c, 0xb0, 0x22, 0x82, 0x6b, 0xb1, 0x80, 0x65, 0x75, 0x11, 0x58, 0x34, 0xa6, 0xec, 0xb9, 0xde, 0xc3, 0xe6, 0x68, 0xb8, 0xc9, 0x1d, 0x4a, 0xca, 0x28, 0x3d, 0xc9, 0x2d, 0xe8, 0x96, 0x5a, 0x66, 0xd5, 0x65, 0x45, 0xad, 0x84, 0xfd, 0xae, 0xe1, 0x6f, 0xff, 0xa0, 0xeb, 0x31, 0x02, 0x21, 0x86, 0xa5, 0xb6, 0xbe, 0x2a, 0x24, 0x75, 0x95, 0x8b, 0x9a, 0xd7, 0x2f, 0x48, 0x3e, 0xbd, 0x4b, 0x25, 0x57, 0x48, 0xa8, 0x11, 0x80, 0x6b, 0xcd, 0x42, 0x8a, 0xcf, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1651 = { .name = "ecdsa_brainpoolp384r1_sha384_1651", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1651_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1651_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1651_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 248 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1652 for ECDSA, tcId is 249 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1652_pubkey[] = { 0x2a, 0xc3, 0x93, 0xf2, 0x0c, 0x11, 0x0e, 0x3f, 0x97, 0x06, 0x53, 0x04, 0x39, 0x7e, 0xae, 0x0e, 0x23, 0x18, 0x7b, 0x2b, 0x61, 0x63, 0xdc, 0x66, 0x08, 0x3e, 0x82, 0xaf, 0xf5, 0x68, 0x42, 0x68, 0x43, 0x05, 0x6a, 0xff, 0x8d, 0xc2, 0x3e, 0xeb, 0xce, 0x29, 0x7f, 0x74, 0x78, 0x30, 0xe2, 0x17, 0x34, 0xc9, 0x35, 0x67, 0x13, 0x91, 0xc6, 0xef, 0xa8, 0xb4, 0x6c, 0x5c, 0x37, 0xb3, 0xf8, 0x4a, 0x82, 0xe4, 0x29, 0xa7, 0x58, 0x0f, 0xeb, 0x9a, 0x13, 0x83, 0xb5, 0x5c, 0x83, 0xa9, 0x39, 0x8e, 0x8e, 0xcc, 0x7b, 0x15, 0xd6, 0x99, 0xe6, 0x39, 0x62, 0x32, 0x91, 0x02, 0xa1, 0x57, 0x6f, 0x2b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1652_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1652_sig[] = { 0x37, 0xe2, 0x56, 0x87, 0x23, 0x40, 0xda, 0x9d, 0xc8, 0x84, 0xfd, 0x00, 0xda, 0xa1, 0x46, 0x28, 0x37, 0x2b, 0x4b, 0xed, 0xc0, 0xa8, 0xa0, 0x9f, 0x9d, 0x75, 0x13, 0x52, 0x1d, 0x3b, 0x80, 0x3a, 0x78, 0xdc, 0x0e, 0xdb, 0xab, 0x3c, 0x7d, 0xc2, 0xb2, 0x01, 0x4b, 0xaf, 0x7a, 0x9d, 0x21, 0x0e, 0x1b, 0xa4, 0xb4, 0x08, 0x79, 0x73, 0x07, 0x0c, 0xca, 0x9b, 0x95, 0x76, 0x50, 0x17, 0x7e, 0xeb, 0x41, 0xc5, 0x57, 0x73, 0x15, 0x96, 0xa9, 0x66, 0xb0, 0xb7, 0xf6, 0x87, 0x17, 0xd8, 0xe7, 0xb5, 0x54, 0xaf, 0xd0, 0x7c, 0x29, 0x37, 0xc9, 0x54, 0x03, 0xa9, 0x0c, 0x3a, 0x05, 0xfa, 0x96, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1652 = { .name = "ecdsa_brainpoolp384r1_sha384_1652", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1652_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1652_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1652_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 249 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1653 for ECDSA, tcId is 250 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1653_pubkey[] = { 0x2a, 0xc3, 0x93, 0xf2, 0x0c, 0x11, 0x0e, 0x3f, 0x97, 0x06, 0x53, 0x04, 0x39, 0x7e, 0xae, 0x0e, 0x23, 0x18, 0x7b, 0x2b, 0x61, 0x63, 0xdc, 0x66, 0x08, 0x3e, 0x82, 0xaf, 0xf5, 0x68, 0x42, 0x68, 0x43, 0x05, 0x6a, 0xff, 0x8d, 0xc2, 0x3e, 0xeb, 0xce, 0x29, 0x7f, 0x74, 0x78, 0x30, 0xe2, 0x17, 0x34, 0xc9, 0x35, 0x67, 0x13, 0x91, 0xc6, 0xef, 0xa8, 0xb4, 0x6c, 0x5c, 0x37, 0xb3, 0xf8, 0x4a, 0x82, 0xe4, 0x29, 0xa7, 0x58, 0x0f, 0xeb, 0x9a, 0x13, 0x83, 0xb5, 0x5c, 0x83, 0xa9, 0x39, 0x8e, 0x8e, 0xcc, 0x7b, 0x15, 0xd6, 0x99, 0xe6, 0x39, 0x62, 0x32, 0x91, 0x02, 0xa1, 0x57, 0x6f, 0x2b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1653_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1653_sig[] = { 0x00, 0x12, 0x8c, 0x19, 0x9d, 0xc2, 0x76, 0x77, 0xf2, 0x3f, 0xea, 0xe2, 0x8a, 0x9b, 0x28, 0x81, 0x3c, 0xbc, 0x3b, 0x02, 0xfc, 0xa4, 0x93, 0x00, 0x5a, 0x67, 0xc3, 0x12, 0x6a, 0x70, 0x5c, 0x49, 0xb9, 0x82, 0xcb, 0x58, 0x17, 0xee, 0x2c, 0x81, 0x16, 0x1e, 0x80, 0xb7, 0x38, 0xbb, 0xb5, 0x12, 0x73, 0xcb, 0x6d, 0x45, 0x47, 0x77, 0x1d, 0x25, 0x4b, 0xe7, 0x43, 0x48, 0x95, 0x5b, 0xee, 0x97, 0x90, 0x71, 0x35, 0x8a, 0xa3, 0xaf, 0xd6, 0x2a, 0x58, 0x38, 0x17, 0x9a, 0x09, 0x65, 0x46, 0x5a, 0xec, 0x79, 0xbd, 0x6c, 0xbd, 0x9b, 0x8b, 0x2a, 0xa2, 0xc7, 0x9b, 0xb8, 0x8a, 0xb2, 0x15, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1653 = { .name = "ecdsa_brainpoolp384r1_sha384_1653", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1653_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1653_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1653_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 250 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1654 for ECDSA, tcId is 251 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1654_pubkey[] = { 0x2a, 0xc3, 0x93, 0xf2, 0x0c, 0x11, 0x0e, 0x3f, 0x97, 0x06, 0x53, 0x04, 0x39, 0x7e, 0xae, 0x0e, 0x23, 0x18, 0x7b, 0x2b, 0x61, 0x63, 0xdc, 0x66, 0x08, 0x3e, 0x82, 0xaf, 0xf5, 0x68, 0x42, 0x68, 0x43, 0x05, 0x6a, 0xff, 0x8d, 0xc2, 0x3e, 0xeb, 0xce, 0x29, 0x7f, 0x74, 0x78, 0x30, 0xe2, 0x17, 0x34, 0xc9, 0x35, 0x67, 0x13, 0x91, 0xc6, 0xef, 0xa8, 0xb4, 0x6c, 0x5c, 0x37, 0xb3, 0xf8, 0x4a, 0x82, 0xe4, 0x29, 0xa7, 0x58, 0x0f, 0xeb, 0x9a, 0x13, 0x83, 0xb5, 0x5c, 0x83, 0xa9, 0x39, 0x8e, 0x8e, 0xcc, 0x7b, 0x15, 0xd6, 0x99, 0xe6, 0x39, 0x62, 0x32, 0x91, 0x02, 0xa1, 0x57, 0x6f, 0x2b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1654_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1654_sig[] = { 0x81, 0x8b, 0x0f, 0xd6, 0xca, 0x09, 0x78, 0xa5, 0x9c, 0xad, 0x3f, 0xa1, 0x5e, 0x84, 0xdb, 0x28, 0x96, 0xf3, 0x9b, 0x2a, 0xa4, 0x62, 0xf0, 0x58, 0x38, 0x34, 0xfa, 0x44, 0x44, 0xd1, 0x53, 0xfe, 0x61, 0xe0, 0xc9, 0x30, 0x71, 0xba, 0x96, 0xc5, 0xff, 0xa7, 0x19, 0x3f, 0x77, 0xb8, 0x06, 0xf3, 0x1d, 0x2d, 0x61, 0x44, 0x17, 0x23, 0x85, 0xf8, 0x57, 0xdb, 0x4b, 0x7e, 0x7e, 0x86, 0x39, 0x62, 0xea, 0xca, 0xcd, 0xec, 0x03, 0x4b, 0x4b, 0x4a, 0x9d, 0xd1, 0xaf, 0x27, 0x26, 0x04, 0x40, 0x3f, 0x39, 0xf4, 0x5a, 0x21, 0x94, 0x8b, 0x30, 0x97, 0x6e, 0x73, 0x8e, 0x9e, 0x98, 0xfd, 0x9c, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1654 = { .name = "ecdsa_brainpoolp384r1_sha384_1654", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1654_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1654_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1654_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 251 in file ecdsa_brainpoolP384r1_sha384_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1655 for ECDSA, tcId is 1 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1655_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1655_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1655_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x83, 0xaa, 0x7b, 0xa4, 0x85, 0xdc, 0x06, 0x0d, 0xf9, 0x92, 0x2f, 0x9c, 0xcc, 0x5d, 0xa2, 0x9a, 0xdb, 0x75, 0xd4, 0x46, 0x71, 0xd1, 0x8b, 0xad, 0x06, 0x36, 0xd2, 0xe0, 0x9c, 0x5e, 0x2f, 0x95, 0xe8, 0x92, 0xa7, 0x9b, 0x9f, 0xd3, 0xb3, 0x7e, 0x1f, 0x79, 0x8b, 0x15, 0x7b, 0x56, 0x7a, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1655 = { .name = "ecdsa_brainpoolp384r1_sha384_1655", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1655_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1655_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1655_sig, .siglen = 96, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1656 for ECDSA, tcId is 2 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1656_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1656_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1656_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1656 = { .name = "ecdsa_brainpoolp384r1_sha384_1656", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1656_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1656_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1656_sig, .siglen = 96, .result = 1, .comment = "valid, tcId is 2 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1657 for ECDSA, tcId is 3 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1657_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1657_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1657_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1657 = { .name = "ecdsa_brainpoolp384r1_sha384_1657", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1657_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1657_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1657_sig, .siglen = 96, .result = 0, .comment = "long form encoding of length of sequence, tcId is 3 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1658 for ECDSA, tcId is 4 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1658_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1658_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1658_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1658 = { .name = "ecdsa_brainpoolp384r1_sha384_1658", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1658_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1658_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1658_sig, .siglen = 96, .result = 0, .comment = "length of sequence contains leading 0, tcId is 4 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1659 for ECDSA, tcId is 67 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1659_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1659_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1659_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1659 = { .name = "ecdsa_brainpoolp384r1_sha384_1659", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1659_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1659_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1659_sig, .siglen = 96, .result = 0, .comment = "long form encoding of length of integer, tcId is 67 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1660 for ECDSA, tcId is 68 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1660_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1660_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1660_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1660 = { .name = "ecdsa_brainpoolp384r1_sha384_1660", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1660_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1660_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1660_sig, .siglen = 96, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1661 for ECDSA, tcId is 69 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1661_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1661_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1661_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1661 = { .name = "ecdsa_brainpoolp384r1_sha384_1661", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1661_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1661_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1661_sig, .siglen = 96, .result = 0, .comment = "length of integer contains leading 0, tcId is 69 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1662 for ECDSA, tcId is 70 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1662_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1662_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1662_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1662 = { .name = "ecdsa_brainpoolp384r1_sha384_1662", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1662_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1662_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1662_sig, .siglen = 96, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1663 for ECDSA, tcId is 92 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1663_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1663_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1663_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x00, 0x00, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1663 = { .name = "ecdsa_brainpoolp384r1_sha384_1663", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1663_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1663_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1663_sig, .siglen = 98, .result = -1, .comment = "appending 0's to integer, tcId is 92 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1664 for ECDSA, tcId is 93 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1664_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1664_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1664_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1664 = { .name = "ecdsa_brainpoolp384r1_sha384_1664", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1664_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1664_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1664_sig, .siglen = 98, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1665 for ECDSA, tcId is 94 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1665_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1665_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1665_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1665 = { .name = "ecdsa_brainpoolp384r1_sha384_1665", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1665_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1665_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1665_sig, .siglen = 96, .result = 0, .comment = "prepending 0's to integer, tcId is 94 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1666 for ECDSA, tcId is 95 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1666_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1666_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1666_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1666 = { .name = "ecdsa_brainpoolp384r1_sha384_1666", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1666_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1666_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1666_sig, .siglen = 96, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1667 for ECDSA, tcId is 97 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1667_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1667_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1667_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x05, 0x00, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1667 = { .name = "ecdsa_brainpoolp384r1_sha384_1667", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1667_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1667_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1667_sig, .siglen = 98, .result = -1, .comment = "appending null value to integer, tcId is 97 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1668 for ECDSA, tcId is 98 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1668_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1668_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1668_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1668 = { .name = "ecdsa_brainpoolp384r1_sha384_1668", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1668_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1668_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1668_sig, .siglen = 98, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1669 for ECDSA, tcId is 113 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1669_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1669_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1669_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1669 = { .name = "ecdsa_brainpoolp384r1_sha384_1669", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1669_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1669_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1669_sig, .siglen = 96, .result = -1, .comment = "dropping value of integer, tcId is 113 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1670 for ECDSA, tcId is 114 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1670_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1670_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1670_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1670 = { .name = "ecdsa_brainpoolp384r1_sha384_1670", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1670_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1670_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1670_sig, .siglen = 96, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1671 for ECDSA, tcId is 117 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1671_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1671_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1671_sig[] = { 0x0c, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1671 = { .name = "ecdsa_brainpoolp384r1_sha384_1671", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1671_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1671_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1671_sig, .siglen = 96, .result = -1, .comment = "modify first byte of integer, tcId is 117 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1672 for ECDSA, tcId is 118 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1672_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1672_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1672_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x0b, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1672 = { .name = "ecdsa_brainpoolp384r1_sha384_1672", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1672_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1672_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1672_sig, .siglen = 96, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1673 for ECDSA, tcId is 119 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1673_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1673_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1673_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x11, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1673 = { .name = "ecdsa_brainpoolp384r1_sha384_1673", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1673_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1673_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1673_sig, .siglen = 96, .result = -1, .comment = "modify last byte of integer, tcId is 119 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1674 for ECDSA, tcId is 120 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1674_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1674_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1674_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1674 = { .name = "ecdsa_brainpoolp384r1_sha384_1674", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1674_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1674_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1674_sig, .siglen = 96, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1675 for ECDSA, tcId is 121 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1675_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1675_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1675_sig[] = { 0x00, 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1675 = { .name = "ecdsa_brainpoolp384r1_sha384_1675", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1675_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1675_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1675_sig, .siglen = 96, .result = -1, .comment = "truncated integer, tcId is 121 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1676 for ECDSA, tcId is 122 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1676_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1676_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1676_sig[] = { 0x00, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1676 = { .name = "ecdsa_brainpoolp384r1_sha384_1676", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1676_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1676_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1676_sig, .siglen = 96, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1677 for ECDSA, tcId is 123 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1677_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1677_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1677_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x00, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1677 = { .name = "ecdsa_brainpoolp384r1_sha384_1677", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1677_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1677_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1677_sig, .siglen = 96, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1678 for ECDSA, tcId is 124 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1678_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1678_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1678_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x00, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1678 = { .name = "ecdsa_brainpoolp384r1_sha384_1678", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1678_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1678_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1678_sig, .siglen = 96, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1679 for ECDSA, tcId is 125 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1679_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1679_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1679_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1679 = { .name = "ecdsa_brainpoolp384r1_sha384_1679", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1679_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1679_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1679_sig, .siglen = 96, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1680 for ECDSA, tcId is 126 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1680_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1680_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1680_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1680 = { .name = "ecdsa_brainpoolp384r1_sha384_1680", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1680_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1680_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1680_sig, .siglen = 96, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_brainpoolP384r1_sha384_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1681 for ECDSA, tcId is 129 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1681_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1681_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1681_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1681 = { .name = "ecdsa_brainpoolp384r1_sha384_1681", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1681_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1681_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1681_sig, .siglen = 96, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1682 for ECDSA, tcId is 130 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1682_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1682_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1682_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1682 = { .name = "ecdsa_brainpoolp384r1_sha384_1682", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1682_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1682_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1682_sig, .siglen = 96, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1683 for ECDSA, tcId is 131 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1683_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1683_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1683_sig[] = { 0x9b, 0x47, 0x2f, 0xcc, 0xbf, 0x6d, 0x81, 0x2d, 0x65, 0x69, 0x68, 0x52, 0xcb, 0xfc, 0xad, 0xdd, 0xaa, 0x9f, 0xf8, 0xb1, 0xed, 0x8f, 0x8b, 0xe7, 0x52, 0xcc, 0x82, 0xbc, 0x2a, 0xeb, 0xfc, 0x9f, 0x6b, 0xc8, 0x87, 0xfe, 0x5d, 0xa9, 0xbd, 0x8a, 0x6a, 0xaf, 0xb4, 0xc2, 0x1c, 0x74, 0xf0, 0xf6, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1683 = { .name = "ecdsa_brainpoolp384r1_sha384_1683", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1683_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1683_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1683_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1684 for ECDSA, tcId is 132 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1684_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1684_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1684_sig[] = { 0x81, 0xd4, 0xf2, 0xc7, 0x78, 0xfc, 0xa6, 0xdd, 0x46, 0xae, 0x89, 0x56, 0x2a, 0x30, 0x2a, 0x1f, 0x80, 0x41, 0x16, 0x9e, 0x12, 0xe6, 0xde, 0x81, 0x14, 0x9f, 0xa5, 0xe2, 0xd2, 0xe3, 0xb1, 0x4f, 0xcd, 0x53, 0x1a, 0x9f, 0x86, 0xaa, 0x37, 0x69, 0xf3, 0x9f, 0x50, 0xbc, 0x4a, 0x6c, 0x26, 0x2c, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1684 = { .name = "ecdsa_brainpoolp384r1_sha384_1684", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1684_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1684_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1684_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1685 for ECDSA, tcId is 133 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1685_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1685_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1685_sig[] = { 0xf1, 0x71, 0xee, 0xb5, 0xe3, 0xca, 0xeb, 0xfa, 0xa9, 0xf4, 0x07, 0x2b, 0x84, 0xe9, 0x94, 0x01, 0x6a, 0x8f, 0x78, 0x57, 0xff, 0xc4, 0xca, 0xcb, 0xcc, 0x49, 0xeb, 0xb0, 0x81, 0x18, 0x29, 0x08, 0x63, 0x72, 0x2e, 0xb1, 0x0d, 0xd6, 0x05, 0x85, 0xd0, 0xd8, 0x7d, 0x40, 0xcc, 0x8f, 0x74, 0x6f, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1685 = { .name = "ecdsa_brainpoolp384r1_sha384_1685", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1685_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1685_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1685_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1686 for ECDSA, tcId is 134 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1686_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1686_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1686_sig[] = { 0x7e, 0x2b, 0x0d, 0x38, 0x87, 0x03, 0x59, 0x22, 0xb9, 0x51, 0x76, 0xa9, 0xd5, 0xcf, 0xd5, 0xe0, 0x7f, 0xbe, 0xe9, 0x61, 0xed, 0x19, 0x21, 0x7e, 0xeb, 0x60, 0x5a, 0x1d, 0x2d, 0x1c, 0x4e, 0xb0, 0x32, 0xac, 0xe5, 0x60, 0x79, 0x55, 0xc8, 0x96, 0x0c, 0x60, 0xaf, 0x43, 0xb5, 0x93, 0xd9, 0xd4, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1686 = { .name = "ecdsa_brainpoolp384r1_sha384_1686", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1686_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1686_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1686_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1687 for ECDSA, tcId is 135 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1687_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1687_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1687_sig[] = { 0x64, 0xb8, 0xd0, 0x33, 0x40, 0x92, 0x7e, 0xd2, 0x9a, 0x96, 0x97, 0xad, 0x34, 0x03, 0x52, 0x22, 0x55, 0x60, 0x07, 0x4e, 0x12, 0x70, 0x74, 0x18, 0xad, 0x33, 0x7d, 0x43, 0xd5, 0x14, 0x03, 0x60, 0x94, 0x37, 0x78, 0x01, 0xa2, 0x56, 0x42, 0x75, 0x95, 0x50, 0x4b, 0x3d, 0xe3, 0x8b, 0x0f, 0x0a, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1687 = { .name = "ecdsa_brainpoolp384r1_sha384_1687", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1687_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1687_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1687_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1688 for ECDSA, tcId is 136 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1688_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1688_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1688_sig[] = { 0x01, 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1688 = { .name = "ecdsa_brainpoolp384r1_sha384_1688", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1688_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1688_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1688_sig, .siglen = 97, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1689 for ECDSA, tcId is 137 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1689_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1689_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1689_sig[] = { 0xf1, 0x71, 0xee, 0xb5, 0xe3, 0xca, 0xeb, 0xfa, 0xa9, 0xf4, 0x07, 0x2b, 0x84, 0xe9, 0x94, 0x01, 0x6a, 0x8f, 0x78, 0x57, 0xff, 0xc4, 0xca, 0xcb, 0xcc, 0x49, 0xeb, 0xb0, 0x81, 0x18, 0x29, 0x08, 0x63, 0x72, 0x2e, 0xb1, 0x0d, 0xd6, 0x05, 0x85, 0xd0, 0xd8, 0x7d, 0x40, 0xcc, 0x8f, 0x74, 0x6f, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1689 = { .name = "ecdsa_brainpoolp384r1_sha384_1689", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1689_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1689_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1689_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1690 for ECDSA, tcId is 138 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1690_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1690_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1690_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x95, 0xc7, 0xc1, 0x60, 0xc0, 0x94, 0xd4, 0x42, 0x25, 0x28, 0xaf, 0x5f, 0xd5, 0x6e, 0xe1, 0x23, 0x4e, 0xe9, 0x0d, 0xcd, 0x68, 0xd7, 0x21, 0xb9, 0x37, 0xf6, 0x09, 0xf8, 0xbb, 0xaa, 0x1b, 0xb9, 0xb5, 0xe2, 0xc5, 0xc3, 0x37, 0x2b, 0xd2, 0xa2, 0x57, 0x96, 0xd8, 0xf0, 0x56, 0xb2, 0x50, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1690 = { .name = "ecdsa_brainpoolp384r1_sha384_1690", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1690_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1690_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1690_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1691 for ECDSA, tcId is 139 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1691_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1691_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1691_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x7c, 0x55, 0x84, 0x5b, 0x7a, 0x23, 0xf9, 0xf2, 0x06, 0x6d, 0xd0, 0x63, 0x33, 0xa2, 0x5d, 0x65, 0x24, 0x8a, 0x2b, 0xb9, 0x8e, 0x2e, 0x74, 0x52, 0xf9, 0xc9, 0x2d, 0x1f, 0x63, 0xa1, 0xd0, 0x6a, 0x17, 0x6d, 0x58, 0x64, 0x60, 0x2c, 0x4c, 0x81, 0xe0, 0x86, 0x74, 0xea, 0x84, 0xa9, 0x85, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1691 = { .name = "ecdsa_brainpoolp384r1_sha384_1691", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1691_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1691_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1691_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1692 for ECDSA, tcId is 140 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1692_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1692_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1692_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0xf6, 0xf1, 0x5d, 0x21, 0xe2, 0xa3, 0x98, 0xe5, 0xea, 0x34, 0xc0, 0x1e, 0x7b, 0x77, 0x60, 0xbb, 0xc6, 0x46, 0x63, 0x3c, 0x84, 0x7d, 0x34, 0xf9, 0xe7, 0x20, 0x64, 0x73, 0xf0, 0x5a, 0x09, 0xee, 0x19, 0x57, 0xf0, 0xec, 0x34, 0x53, 0xf0, 0x6d, 0xe3, 0xf1, 0x59, 0x12, 0x92, 0x52, 0x14, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1692 = { .name = "ecdsa_brainpoolp384r1_sha384_1692", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1692_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1692_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1692_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1693 for ECDSA, tcId is 141 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1693_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1693_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1693_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x6a, 0x38, 0x3e, 0x9f, 0x3f, 0x6b, 0x2b, 0xbd, 0xda, 0xd7, 0x50, 0xa0, 0x2a, 0x91, 0x1e, 0xdc, 0xb1, 0x16, 0xf2, 0x32, 0x97, 0x28, 0xde, 0x46, 0xc8, 0x09, 0xf6, 0x07, 0x44, 0x55, 0xe4, 0x46, 0x4a, 0x1d, 0x3a, 0x3c, 0xc8, 0xd4, 0x2d, 0x5d, 0xa8, 0x69, 0x27, 0x0f, 0xa9, 0x4d, 0xaf, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1693 = { .name = "ecdsa_brainpoolp384r1_sha384_1693", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1693_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1693_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1693_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1694 for ECDSA, tcId is 142 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1694_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1694_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1694_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0x01, 0x09, 0x0e, 0xa2, 0xde, 0x1d, 0x5c, 0x67, 0x1a, 0x15, 0xcb, 0x3f, 0xe1, 0x84, 0x88, 0x9f, 0x44, 0x39, 0xb9, 0x9c, 0xc3, 0x7b, 0x82, 0xcb, 0x06, 0x18, 0xdf, 0x9b, 0x8c, 0x0f, 0xa5, 0xf6, 0x11, 0xe6, 0xa8, 0x0f, 0x13, 0xcb, 0xac, 0x0f, 0x92, 0x1c, 0x0e, 0xa6, 0xed, 0x6d, 0xad, 0xeb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1694 = { .name = "ecdsa_brainpoolp384r1_sha384_1694", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1694_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1694_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1694_sig, .siglen = 97, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1695 for ECDSA, tcId is 143 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1695_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1695_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1695_sig[] = { 0x0e, 0x8e, 0x11, 0x4a, 0x1c, 0x35, 0x14, 0x05, 0x56, 0x0b, 0xf8, 0xd4, 0x7b, 0x16, 0x6b, 0xfe, 0x95, 0x70, 0x87, 0xa8, 0x00, 0x3b, 0x35, 0x34, 0x33, 0xb6, 0x14, 0x4f, 0x7e, 0xe7, 0xd6, 0xf7, 0x9c, 0x8d, 0xd1, 0x4e, 0xf2, 0x29, 0xfa, 0x7a, 0x2f, 0x27, 0x82, 0xbf, 0x33, 0x70, 0x8b, 0x91, 0xf6, 0xf1, 0x5d, 0x21, 0xe2, 0xa3, 0x98, 0xe5, 0xea, 0x34, 0xc0, 0x1e, 0x7b, 0x77, 0x60, 0xbb, 0xc6, 0x46, 0x63, 0x3c, 0x84, 0x7d, 0x34, 0xf9, 0xe7, 0x20, 0x64, 0x73, 0xf0, 0x5a, 0x09, 0xee, 0x19, 0x57, 0xf0, 0xec, 0x34, 0x53, 0xf0, 0x6d, 0xe3, 0xf1, 0x59, 0x12, 0x92, 0x52, 0x14, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1695 = { .name = "ecdsa_brainpoolp384r1_sha384_1695", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1695_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1695_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1695_sig, .siglen = 96, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1696 for ECDSA, tcId is 144 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1696_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1696_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1696_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1696 = { .name = "ecdsa_brainpoolp384r1_sha384_1696", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1696_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1696_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1696_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1697 for ECDSA, tcId is 145 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1697_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1697_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1697_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1697 = { .name = "ecdsa_brainpoolp384r1_sha384_1697", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1697_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1697_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1697_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1698 for ECDSA, tcId is 146 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1698_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1698_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1698_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1698 = { .name = "ecdsa_brainpoolp384r1_sha384_1698", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1698_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1698_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1698_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1699 for ECDSA, tcId is 147 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1699_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1699_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1699_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1699 = { .name = "ecdsa_brainpoolp384r1_sha384_1699", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1699_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1699_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1699_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1700 for ECDSA, tcId is 148 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1700_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1700_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1700_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1700 = { .name = "ecdsa_brainpoolp384r1_sha384_1700", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1700_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1700_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1700_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1701 for ECDSA, tcId is 149 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1701_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1701_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1701_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1701 = { .name = "ecdsa_brainpoolp384r1_sha384_1701", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1701_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1701_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1701_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1702 for ECDSA, tcId is 150 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1702_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1702_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1702_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1702 = { .name = "ecdsa_brainpoolp384r1_sha384_1702", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1702_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1702_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1702_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1703 for ECDSA, tcId is 151 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1703_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1703_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1703_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1703 = { .name = "ecdsa_brainpoolp384r1_sha384_1703", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1703_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1703_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1703_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1704 for ECDSA, tcId is 154 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1704_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1704_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1704_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1704 = { .name = "ecdsa_brainpoolp384r1_sha384_1704", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1704_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1704_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1704_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1705 for ECDSA, tcId is 155 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1705_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1705_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1705_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1705 = { .name = "ecdsa_brainpoolp384r1_sha384_1705", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1705_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1705_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1705_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1706 for ECDSA, tcId is 156 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1706_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1706_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1706_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1706 = { .name = "ecdsa_brainpoolp384r1_sha384_1706", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1706_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1706_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1706_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1707 for ECDSA, tcId is 157 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1707_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1707_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1707_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1707 = { .name = "ecdsa_brainpoolp384r1_sha384_1707", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1707_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1707_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1707_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1708 for ECDSA, tcId is 158 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1708_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1708_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1708_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1708 = { .name = "ecdsa_brainpoolp384r1_sha384_1708", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1708_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1708_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1708_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1709 for ECDSA, tcId is 159 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1709_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1709_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1709_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1709 = { .name = "ecdsa_brainpoolp384r1_sha384_1709", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1709_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1709_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1709_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1710 for ECDSA, tcId is 160 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1710_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1710_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1710_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1710 = { .name = "ecdsa_brainpoolp384r1_sha384_1710", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1710_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1710_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1710_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1711 for ECDSA, tcId is 161 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1711_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1711_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1711_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1711 = { .name = "ecdsa_brainpoolp384r1_sha384_1711", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1711_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1711_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1711_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1712 for ECDSA, tcId is 164 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1712_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1712_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1712_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1712 = { .name = "ecdsa_brainpoolp384r1_sha384_1712", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1712_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1712_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1712_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1713 for ECDSA, tcId is 165 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1713_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1713_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1713_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1713 = { .name = "ecdsa_brainpoolp384r1_sha384_1713", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1713_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1713_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1713_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1714 for ECDSA, tcId is 166 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1714_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1714_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1714_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1714 = { .name = "ecdsa_brainpoolp384r1_sha384_1714", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1714_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1714_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1714_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1715 for ECDSA, tcId is 167 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1715_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1715_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1715_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1715 = { .name = "ecdsa_brainpoolp384r1_sha384_1715", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1715_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1715_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1715_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1716 for ECDSA, tcId is 168 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1716_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1716_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1716_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1716 = { .name = "ecdsa_brainpoolp384r1_sha384_1716", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1716_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1716_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1716_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1717 for ECDSA, tcId is 169 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1717_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1717_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1717_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1717 = { .name = "ecdsa_brainpoolp384r1_sha384_1717", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1717_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1717_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1717_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1718 for ECDSA, tcId is 170 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1718_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1718_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1718_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1718 = { .name = "ecdsa_brainpoolp384r1_sha384_1718", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1718_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1718_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1718_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1719 for ECDSA, tcId is 171 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1719_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1719_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1719_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1719 = { .name = "ecdsa_brainpoolp384r1_sha384_1719", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1719_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1719_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1719_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1720 for ECDSA, tcId is 174 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1720_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1720_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1720_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1720 = { .name = "ecdsa_brainpoolp384r1_sha384_1720", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1720_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1720_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1720_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1721 for ECDSA, tcId is 175 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1721_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1721_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1721_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1721 = { .name = "ecdsa_brainpoolp384r1_sha384_1721", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1721_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1721_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1721_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1722 for ECDSA, tcId is 176 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1722_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1722_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1722_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1722 = { .name = "ecdsa_brainpoolp384r1_sha384_1722", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1722_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1722_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1722_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1723 for ECDSA, tcId is 177 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1723_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1723_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1723_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1723 = { .name = "ecdsa_brainpoolp384r1_sha384_1723", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1723_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1723_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1723_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1724 for ECDSA, tcId is 178 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1724_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1724_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1724_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1724 = { .name = "ecdsa_brainpoolp384r1_sha384_1724", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1724_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1724_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1724_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1725 for ECDSA, tcId is 179 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1725_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1725_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1725_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1725 = { .name = "ecdsa_brainpoolp384r1_sha384_1725", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1725_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1725_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1725_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1726 for ECDSA, tcId is 180 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1726_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1726_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1726_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1726 = { .name = "ecdsa_brainpoolp384r1_sha384_1726", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1726_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1726_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1726_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1727 for ECDSA, tcId is 181 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1727_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1727_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1727_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1727 = { .name = "ecdsa_brainpoolp384r1_sha384_1727", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1727_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1727_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1727_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1728 for ECDSA, tcId is 184 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1728_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1728_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1728_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1728 = { .name = "ecdsa_brainpoolp384r1_sha384_1728", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1728_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1728_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1728_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1729 for ECDSA, tcId is 185 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1729_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1729_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1729_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1729 = { .name = "ecdsa_brainpoolp384r1_sha384_1729", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1729_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1729_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1729_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1730 for ECDSA, tcId is 186 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1730_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1730_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1730_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1730 = { .name = "ecdsa_brainpoolp384r1_sha384_1730", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1730_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1730_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1730_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1731 for ECDSA, tcId is 187 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1731_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1731_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1731_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1731 = { .name = "ecdsa_brainpoolp384r1_sha384_1731", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1731_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1731_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1731_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1732 for ECDSA, tcId is 188 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1732_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1732_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1732_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1732 = { .name = "ecdsa_brainpoolp384r1_sha384_1732", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1732_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1732_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1732_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1733 for ECDSA, tcId is 189 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1733_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1733_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1733_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1733 = { .name = "ecdsa_brainpoolp384r1_sha384_1733", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1733_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1733_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1733_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1734 for ECDSA, tcId is 190 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1734_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1734_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1734_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1734 = { .name = "ecdsa_brainpoolp384r1_sha384_1734", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1734_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1734_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1734_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1735 for ECDSA, tcId is 191 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1735_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1735_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1735_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1735 = { .name = "ecdsa_brainpoolp384r1_sha384_1735", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1735_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1735_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1735_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1736 for ECDSA, tcId is 194 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1736_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1736_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1736_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1736 = { .name = "ecdsa_brainpoolp384r1_sha384_1736", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1736_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1736_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1736_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1737 for ECDSA, tcId is 195 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1737_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1737_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1737_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1737 = { .name = "ecdsa_brainpoolp384r1_sha384_1737", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1737_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1737_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1737_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1738 for ECDSA, tcId is 196 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1738_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1738_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1738_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1738 = { .name = "ecdsa_brainpoolp384r1_sha384_1738", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1738_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1738_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1738_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1739 for ECDSA, tcId is 197 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1739_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1739_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1739_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1739 = { .name = "ecdsa_brainpoolp384r1_sha384_1739", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1739_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1739_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1739_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1740 for ECDSA, tcId is 198 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1740_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1740_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1740_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1740 = { .name = "ecdsa_brainpoolp384r1_sha384_1740", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1740_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1740_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1740_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1741 for ECDSA, tcId is 199 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1741_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1741_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1741_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1741 = { .name = "ecdsa_brainpoolp384r1_sha384_1741", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1741_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1741_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1741_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1742 for ECDSA, tcId is 200 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1742_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1742_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1742_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1742 = { .name = "ecdsa_brainpoolp384r1_sha384_1742", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1742_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1742_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1742_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1743 for ECDSA, tcId is 201 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1743_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1743_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1743_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1743 = { .name = "ecdsa_brainpoolp384r1_sha384_1743", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1743_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1743_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1743_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1744 for ECDSA, tcId is 204 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1744_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1744_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1744_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1744 = { .name = "ecdsa_brainpoolp384r1_sha384_1744", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1744_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1744_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1744_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1745 for ECDSA, tcId is 205 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1745_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1745_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1745_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1745 = { .name = "ecdsa_brainpoolp384r1_sha384_1745", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1745_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1745_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1745_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1746 for ECDSA, tcId is 206 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1746_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1746_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1746_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1746 = { .name = "ecdsa_brainpoolp384r1_sha384_1746", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1746_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1746_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1746_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1747 for ECDSA, tcId is 207 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1747_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1747_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1747_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1747 = { .name = "ecdsa_brainpoolp384r1_sha384_1747", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1747_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1747_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1747_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1748 for ECDSA, tcId is 208 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1748_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1748_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1748_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1748 = { .name = "ecdsa_brainpoolp384r1_sha384_1748", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1748_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1748_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1748_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1749 for ECDSA, tcId is 209 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1749_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1749_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1749_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1749 = { .name = "ecdsa_brainpoolp384r1_sha384_1749", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1749_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1749_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1749_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1750 for ECDSA, tcId is 210 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1750_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1750_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1750_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1750 = { .name = "ecdsa_brainpoolp384r1_sha384_1750", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1750_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1750_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1750_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1751 for ECDSA, tcId is 211 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1751_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1751_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1751_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1751 = { .name = "ecdsa_brainpoolp384r1_sha384_1751", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1751_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1751_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1751_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1752 for ECDSA, tcId is 214 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1752_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1752_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1752_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1752 = { .name = "ecdsa_brainpoolp384r1_sha384_1752", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1752_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1752_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1752_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1753 for ECDSA, tcId is 215 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1753_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1753_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1753_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1753 = { .name = "ecdsa_brainpoolp384r1_sha384_1753", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1753_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1753_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1753_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1754 for ECDSA, tcId is 216 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1754_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1754_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1754_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1754 = { .name = "ecdsa_brainpoolp384r1_sha384_1754", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1754_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1754_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1754_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1755 for ECDSA, tcId is 217 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1755_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1755_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1755_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1755 = { .name = "ecdsa_brainpoolp384r1_sha384_1755", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1755_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1755_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1755_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1756 for ECDSA, tcId is 218 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1756_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1756_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1756_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1756 = { .name = "ecdsa_brainpoolp384r1_sha384_1756", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1756_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1756_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1756_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1757 for ECDSA, tcId is 219 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1757_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1757_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1757_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1757 = { .name = "ecdsa_brainpoolp384r1_sha384_1757", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1757_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1757_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1757_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1758 for ECDSA, tcId is 220 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1758_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1758_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1758_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1758 = { .name = "ecdsa_brainpoolp384r1_sha384_1758", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1758_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1758_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1758_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1759 for ECDSA, tcId is 221 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1759_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1759_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1759_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1759 = { .name = "ecdsa_brainpoolp384r1_sha384_1759", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1759_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1759_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1759_sig, .siglen = 96, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1760 for ECDSA, tcId is 230 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1760_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1760_msg[] = { 0x33, 0x35, 0x37, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1760_sig[] = { 0x70, 0x5c, 0x79, 0x0f, 0x8f, 0x50, 0x06, 0x1c, 0x50, 0x8c, 0x15, 0xfc, 0x9a, 0xab, 0xc1, 0xf5, 0x81, 0x93, 0xab, 0x15, 0xb3, 0x94, 0xab, 0x21, 0x95, 0xe3, 0x58, 0xcb, 0x62, 0x0a, 0x5b, 0xf4, 0xb6, 0x54, 0x49, 0xaf, 0xb9, 0xc4, 0x17, 0xbd, 0x1a, 0x31, 0x05, 0xe5, 0x3a, 0x97, 0x42, 0xce, 0x6d, 0xd7, 0xab, 0xda, 0x40, 0x01, 0xbc, 0x41, 0x69, 0x82, 0xab, 0x43, 0x26, 0xb5, 0xd2, 0x7b, 0x12, 0x80, 0xf0, 0x2b, 0x14, 0x2f, 0x04, 0x0c, 0xe2, 0x49, 0x7f, 0x9e, 0x15, 0x3e, 0x4e, 0x1e, 0x3a, 0x35, 0xc5, 0xff, 0xae, 0xf7, 0x26, 0x94, 0xe6, 0x77, 0x87, 0x2e, 0xb1, 0x9d, 0xdf, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1760 = { .name = "ecdsa_brainpoolp384r1_sha384_1760", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1760_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1760_msg, .msglen = 5, .sig = ecdsa_brainpoolp384r1_sha384_1760_sig, .siglen = 96, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1761 for ECDSA, tcId is 231 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1761_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1761_msg[] = { 0x31, 0x37, 0x35, 0x30, 0x35, 0x35, 0x31, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1761_sig[] = { 0x79, 0xdf, 0x11, 0xf0, 0x22, 0x1d, 0xe0, 0x47, 0x3c, 0xcf, 0x84, 0x4c, 0xa7, 0x02, 0xb0, 0xd3, 0x98, 0x1b, 0x8a, 0x97, 0xeb, 0x8f, 0x68, 0x84, 0xf4, 0xef, 0xeb, 0x84, 0x71, 0x5d, 0x2c, 0x6e, 0xde, 0x43, 0x20, 0x8c, 0x7e, 0x98, 0xdb, 0x8e, 0x09, 0x1e, 0x6c, 0x91, 0x7f, 0xd9, 0xf0, 0xbb, 0x1d, 0xa9, 0x88, 0x19, 0x57, 0xbf, 0xfe, 0x20, 0x9d, 0x61, 0xdd, 0xe8, 0x7e, 0xcd, 0x9c, 0x9d, 0x8c, 0x5c, 0xda, 0xd0, 0xe4, 0xcf, 0xb6, 0xe0, 0x8c, 0xe2, 0xe0, 0x6a, 0x43, 0x1c, 0x3e, 0xeb, 0x2d, 0x14, 0x1d, 0x3b, 0x13, 0xb5, 0xba, 0xac, 0x30, 0xeb, 0xfd, 0x62, 0x2c, 0xbf, 0x5e, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1761 = { .name = "ecdsa_brainpoolp384r1_sha384_1761", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1761_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1761_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1761_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1762 for ECDSA, tcId is 232 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1762_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1762_msg[] = { 0x31, 0x30, 0x33, 0x36, 0x33, 0x30, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1762_sig[] = { 0x1c, 0xfc, 0xe0, 0xce, 0x5f, 0xbf, 0x61, 0x78, 0xab, 0xb6, 0xc2, 0x7d, 0xb2, 0xd4, 0xa4, 0x8b, 0xa5, 0x79, 0x7d, 0xc9, 0xb9, 0x9c, 0xdf, 0xe5, 0x2f, 0x74, 0x9d, 0x07, 0x9c, 0x78, 0x9e, 0xcb, 0xe1, 0xbd, 0x8e, 0x7d, 0xe1, 0x0e, 0x2a, 0xc7, 0xb8, 0x3d, 0x03, 0x81, 0xba, 0x0c, 0x61, 0x1f, 0x24, 0xc3, 0x7f, 0x70, 0x69, 0x1e, 0x44, 0x3b, 0x1b, 0x70, 0x29, 0x31, 0x00, 0xc9, 0x8c, 0xf5, 0x49, 0x4e, 0x0d, 0x6e, 0x0b, 0x14, 0xe4, 0x40, 0x0e, 0xef, 0x72, 0xcd, 0x0a, 0xa1, 0x0f, 0xb4, 0xa6, 0x89, 0xf6, 0xb8, 0x8a, 0xe0, 0xf0, 0xab, 0xc3, 0xaf, 0x7d, 0x09, 0xeb, 0x1b, 0x0c, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1762 = { .name = "ecdsa_brainpoolp384r1_sha384_1762", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1762_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1762_msg, .msglen = 8, .sig = ecdsa_brainpoolp384r1_sha384_1762_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1763 for ECDSA, tcId is 233 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1763_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1763_msg[] = { 0x32, 0x33, 0x36, 0x32, 0x34, 0x32, 0x31, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1763_sig[] = { 0x8c, 0x29, 0x75, 0x29, 0xb9, 0xce, 0x54, 0x01, 0xf5, 0x1e, 0x5e, 0xae, 0xb5, 0x31, 0x15, 0xf4, 0xb0, 0x70, 0x66, 0xc7, 0x9c, 0x4b, 0x54, 0xa9, 0xfa, 0xc0, 0x06, 0x38, 0xfc, 0xd1, 0x6c, 0xfa, 0xaa, 0x96, 0x26, 0xdc, 0x6d, 0xa6, 0x59, 0x88, 0x33, 0xd9, 0x24, 0xb0, 0xb9, 0x28, 0x67, 0xa6, 0x78, 0x77, 0x62, 0x67, 0x8f, 0x96, 0x85, 0x8f, 0x22, 0x25, 0x05, 0xf1, 0x10, 0xb9, 0x7a, 0x24, 0x98, 0x73, 0x38, 0xd5, 0xe5, 0xdc, 0x0c, 0x29, 0x06, 0x24, 0xc2, 0x43, 0x90, 0x4f, 0x65, 0xc0, 0xb5, 0x78, 0x05, 0x17, 0x83, 0x8a, 0x7b, 0xa2, 0x17, 0xfa, 0xc9, 0xff, 0x59, 0xb6, 0xde, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1763 = { .name = "ecdsa_brainpoolp384r1_sha384_1763", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1763_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1763_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1763_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1764 for ECDSA, tcId is 234 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1764_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1764_msg[] = { 0x34, 0x35, 0x38, 0x38, 0x30, 0x31, 0x34, 0x36, 0x35, 0x36, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1764_sig[] = { 0x69, 0xfc, 0xb7, 0x52, 0x54, 0x5d, 0x65, 0x76, 0xb0, 0xce, 0x45, 0xf8, 0x90, 0x36, 0x51, 0x83, 0x1e, 0x79, 0xef, 0x0e, 0x17, 0x3a, 0xd1, 0xc8, 0xfd, 0xad, 0x99, 0xd6, 0xb3, 0x80, 0xaa, 0x7c, 0xe4, 0xa5, 0x88, 0xd1, 0x4a, 0xaf, 0x0a, 0x30, 0x7e, 0x5b, 0xb0, 0x5b, 0x81, 0x94, 0x5d, 0x10, 0x3f, 0xc4, 0x15, 0x1f, 0x72, 0xc1, 0x11, 0xcd, 0x2b, 0x0a, 0x38, 0xfe, 0xc1, 0x38, 0x08, 0x3f, 0x7d, 0x05, 0x8b, 0x73, 0x89, 0xa2, 0x66, 0xf7, 0x03, 0x0f, 0xc5, 0x5b, 0x7d, 0x69, 0xe4, 0x90, 0xae, 0xe0, 0x5f, 0x93, 0x1c, 0x55, 0xb7, 0x69, 0xca, 0xe9, 0x32, 0x29, 0xe7, 0xaf, 0x5e, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1764 = { .name = "ecdsa_brainpoolp384r1_sha384_1764", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1764_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1764_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1764_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1765 for ECDSA, tcId is 235 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1765_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1765_msg[] = { 0x32, 0x31, 0x34, 0x36, 0x36, 0x30, 0x35, 0x36, 0x34, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1765_sig[] = { 0x1f, 0xf3, 0x9a, 0xa7, 0xf8, 0x66, 0x34, 0x7b, 0x6c, 0x5a, 0x0b, 0x62, 0xbb, 0xc9, 0x32, 0x94, 0x83, 0x24, 0x5d, 0x52, 0x4e, 0x93, 0xdb, 0xae, 0x9f, 0xc3, 0x50, 0x19, 0x71, 0x43, 0x46, 0x0b, 0xa6, 0xbf, 0xf2, 0xa1, 0x24, 0x01, 0xac, 0x12, 0xc5, 0x75, 0xfc, 0x33, 0x1d, 0x89, 0x04, 0x2a, 0x15, 0x91, 0x93, 0x3f, 0x0e, 0x33, 0x89, 0x4a, 0xbc, 0xb7, 0x2c, 0x0e, 0x53, 0xde, 0x68, 0x89, 0xa0, 0x0e, 0xbc, 0x0a, 0xb5, 0x97, 0x4d, 0x3a, 0xb8, 0x61, 0x3a, 0x49, 0x3b, 0x16, 0x8d, 0xb3, 0x3d, 0xa5, 0x11, 0x8f, 0x3f, 0x34, 0x77, 0xa7, 0x3d, 0xf4, 0x9a, 0xf2, 0x7e, 0xd8, 0x0d, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1765 = { .name = "ecdsa_brainpoolp384r1_sha384_1765", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1765_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1765_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1765_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1766 for ECDSA, tcId is 236 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1766_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1766_msg[] = { 0x33, 0x33, 0x35, 0x33, 0x30, 0x30, 0x38, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1766_sig[] = { 0x61, 0xd3, 0x22, 0xd1, 0x6c, 0xa8, 0x06, 0x20, 0xbb, 0x09, 0x33, 0x33, 0xac, 0x1f, 0x7b, 0x5f, 0x38, 0xad, 0x5d, 0x1b, 0xf3, 0x9b, 0x68, 0x64, 0x71, 0xb3, 0x83, 0x8d, 0x19, 0x4a, 0x43, 0x37, 0xd3, 0xd0, 0xca, 0x30, 0x01, 0x25, 0xd4, 0xb7, 0x24, 0xdc, 0x6c, 0x7c, 0xd1, 0xb0, 0xaa, 0x00, 0x59, 0x5b, 0x3d, 0x2e, 0x24, 0x35, 0x48, 0x10, 0xc5, 0xd2, 0x0d, 0xc8, 0x1b, 0x2b, 0xa3, 0xd7, 0x19, 0x03, 0x6c, 0x7d, 0x40, 0x73, 0xb1, 0x70, 0xd3, 0x1d, 0x21, 0x0f, 0x58, 0xf3, 0xb5, 0xf7, 0xca, 0x0f, 0x03, 0x00, 0x7e, 0x33, 0x70, 0x2b, 0xe1, 0x49, 0x51, 0x7f, 0x8e, 0xd6, 0x9a, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1766 = { .name = "ecdsa_brainpoolp384r1_sha384_1766", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1766_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1766_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1766_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1767 for ECDSA, tcId is 237 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1767_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1767_msg[] = { 0x36, 0x33, 0x39, 0x36, 0x36, 0x30, 0x33, 0x36, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1767_sig[] = { 0x7c, 0x8c, 0xd6, 0xb9, 0xab, 0x60, 0x68, 0x29, 0x7f, 0x8b, 0xd2, 0xf4, 0xfb, 0x5c, 0xb8, 0x61, 0x82, 0x84, 0x3b, 0x80, 0xdd, 0x75, 0x82, 0x31, 0x7e, 0x81, 0x78, 0x99, 0xc6, 0x12, 0xbf, 0x13, 0xbc, 0xdf, 0x52, 0x0d, 0xcd, 0x61, 0x35, 0x3f, 0x27, 0xa4, 0x35, 0x6d, 0xbd, 0x16, 0x70, 0x70, 0x43, 0x31, 0xc1, 0x4c, 0x7f, 0x03, 0x3c, 0x5f, 0x6e, 0x5d, 0x9d, 0x2d, 0xe7, 0x6a, 0x90, 0x20, 0xb4, 0x26, 0x35, 0x7d, 0x5d, 0xdb, 0xaf, 0x12, 0x57, 0x65, 0xb8, 0xed, 0x47, 0x6a, 0x18, 0xeb, 0xe1, 0xba, 0xfa, 0xf9, 0x41, 0x7b, 0xbe, 0x0f, 0x8f, 0x96, 0x72, 0xfb, 0xf2, 0x0a, 0x5c, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1767 = { .name = "ecdsa_brainpoolp384r1_sha384_1767", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1767_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1767_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1767_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1768 for ECDSA, tcId is 238 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1768_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1768_msg[] = { 0x33, 0x33, 0x39, 0x31, 0x36, 0x36, 0x30, 0x37, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1768_sig[] = { 0x77, 0x11, 0x17, 0x17, 0x74, 0x96, 0xa9, 0x11, 0x8f, 0x28, 0x83, 0xe5, 0x7f, 0x63, 0xa5, 0x89, 0x98, 0xd5, 0x78, 0x79, 0x16, 0x66, 0x59, 0x31, 0x4c, 0x50, 0x8b, 0x60, 0x28, 0x09, 0x4d, 0x4e, 0x16, 0x09, 0x0f, 0x27, 0x7a, 0xcf, 0xd4, 0x7e, 0x09, 0x7f, 0x5b, 0xef, 0x3d, 0xc6, 0x59, 0x39, 0x3e, 0xc4, 0xbc, 0x04, 0x0a, 0xaf, 0x47, 0xf9, 0xac, 0xba, 0x60, 0x93, 0xc8, 0x2c, 0x3e, 0x07, 0xc1, 0xe6, 0x07, 0xee, 0x23, 0x8b, 0xeb, 0xb5, 0xdb, 0x96, 0x59, 0x69, 0x64, 0xbc, 0x3a, 0xf7, 0xe5, 0x7b, 0x80, 0x8c, 0x2f, 0x6b, 0xe0, 0x41, 0x28, 0x46, 0x7a, 0x56, 0x57, 0x7b, 0x40, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1768 = { .name = "ecdsa_brainpoolp384r1_sha384_1768", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1768_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1768_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1768_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1769 for ECDSA, tcId is 239 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1769_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1769_msg[] = { 0x31, 0x34, 0x34, 0x36, 0x39, 0x37, 0x35, 0x39, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1769_sig[] = { 0x6a, 0x05, 0x48, 0x8b, 0x75, 0xac, 0xec, 0x47, 0x18, 0xd7, 0x16, 0x4e, 0xc1, 0x9d, 0xcd, 0x6d, 0x35, 0x1a, 0x5f, 0xb2, 0x85, 0x2a, 0xfc, 0x49, 0x15, 0xe9, 0xeb, 0xcd, 0x80, 0x73, 0x89, 0x7a, 0x5d, 0x55, 0x9d, 0xc9, 0xec, 0x56, 0xa5, 0xaa, 0xe4, 0x00, 0xdd, 0x0c, 0xde, 0xef, 0xc7, 0x16, 0x2e, 0x51, 0x1d, 0x8b, 0xf6, 0x0e, 0xbe, 0x46, 0x8f, 0x5e, 0x04, 0x53, 0x33, 0xd4, 0x3d, 0x4b, 0xe5, 0x9b, 0x43, 0x93, 0xc8, 0xe6, 0x50, 0xe3, 0xe6, 0xfa, 0xbc, 0xbf, 0x10, 0xda, 0x7a, 0xe5, 0xf2, 0x31, 0x8b, 0xff, 0x04, 0x74, 0x13, 0xdf, 0x4d, 0xc1, 0x7f, 0xb3, 0x72, 0xd9, 0x8d, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1769 = { .name = "ecdsa_brainpoolp384r1_sha384_1769", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1769_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1769_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1769_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1770 for ECDSA, tcId is 240 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1770_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1770_msg[] = { 0x35, 0x31, 0x35, 0x39, 0x34, 0x37, 0x38, 0x36, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1770_sig[] = { 0x85, 0x42, 0xc5, 0x84, 0x27, 0xf1, 0xde, 0xb1, 0xdb, 0xd3, 0x62, 0x27, 0xeb, 0x96, 0xfb, 0xff, 0x15, 0x3e, 0xdb, 0xd2, 0x3e, 0xbd, 0x13, 0xe7, 0x86, 0xa5, 0x2e, 0x48, 0x63, 0xc8, 0x88, 0xa2, 0xdd, 0x50, 0x94, 0x16, 0x54, 0xe5, 0x51, 0xa4, 0xfc, 0xa9, 0x1b, 0x5b, 0xf3, 0x51, 0x97, 0x89, 0x82, 0xb6, 0x8b, 0x14, 0xb6, 0x08, 0x03, 0x29, 0x45, 0xbd, 0xe3, 0xd7, 0x06, 0x1d, 0x5f, 0x68, 0x74, 0x58, 0xed, 0xe1, 0xb3, 0x02, 0xaf, 0x88, 0x42, 0x44, 0x97, 0x88, 0xf8, 0x31, 0x4b, 0x10, 0x85, 0x79, 0xf6, 0xc5, 0x28, 0xbd, 0xc8, 0x00, 0xaf, 0xe6, 0xb2, 0xc8, 0xb1, 0x85, 0xfb, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1770 = { .name = "ecdsa_brainpoolp384r1_sha384_1770", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1770_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1770_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1770_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1771 for ECDSA, tcId is 241 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1771_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1771_msg[] = { 0x35, 0x32, 0x34, 0x31, 0x37, 0x39, 0x32, 0x33, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1771_sig[] = { 0x58, 0xfb, 0x97, 0x4b, 0xef, 0x2a, 0xca, 0xf2, 0x54, 0x7c, 0xac, 0xb6, 0xf0, 0xcc, 0x93, 0x4b, 0x59, 0x91, 0xc6, 0x6e, 0xb7, 0xa2, 0x23, 0x75, 0x52, 0x09, 0xac, 0xaf, 0x5b, 0x9e, 0x4b, 0x0f, 0xed, 0x71, 0x2c, 0x76, 0x60, 0x6c, 0x59, 0xc1, 0x01, 0x4b, 0xa2, 0xc2, 0xeb, 0x1b, 0xb3, 0x22, 0x7d, 0x9e, 0x26, 0x5d, 0xc0, 0x9e, 0x03, 0x10, 0x14, 0x18, 0x2b, 0x36, 0x9e, 0x15, 0xb4, 0xa3, 0x4d, 0xba, 0x39, 0x01, 0x06, 0x2d, 0x62, 0x7c, 0xff, 0xab, 0x56, 0x1e, 0x73, 0xd3, 0x8b, 0xbe, 0xa9, 0x07, 0x27, 0x23, 0x46, 0xfb, 0xb2, 0x47, 0xd3, 0xec, 0x63, 0x56, 0x4f, 0xe1, 0xcb, 0xef, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1771 = { .name = "ecdsa_brainpoolp384r1_sha384_1771", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1771_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1771_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1771_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1772 for ECDSA, tcId is 242 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1772_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1772_msg[] = { 0x31, 0x31, 0x34, 0x37, 0x32, 0x39, 0x30, 0x32, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1772_sig[] = { 0x06, 0x5e, 0xd5, 0x99, 0x4d, 0x4b, 0x49, 0x8a, 0xf7, 0xf5, 0xab, 0x7d, 0x4c, 0x08, 0x81, 0x0c, 0xb7, 0x6d, 0x24, 0x2b, 0x5d, 0x8b, 0x7b, 0x55, 0x37, 0xcb, 0x8a, 0xfa, 0x6e, 0xa8, 0x52, 0xab, 0x71, 0x4f, 0x66, 0xb1, 0x44, 0xa4, 0x86, 0xd0, 0x5b, 0x2a, 0x56, 0xf2, 0x05, 0x6b, 0xaa, 0x11, 0x37, 0xe6, 0x76, 0xa8, 0xd5, 0x35, 0xd0, 0xa8, 0x18, 0xdc, 0xec, 0xcc, 0xaa, 0x47, 0x83, 0xdb, 0x6d, 0x25, 0x49, 0x25, 0xa0, 0x0d, 0xcf, 0x6a, 0x03, 0x5a, 0x7d, 0x9e, 0x0d, 0x67, 0x7d, 0xc7, 0x81, 0x95, 0xa7, 0xec, 0xcf, 0xc7, 0xbe, 0xee, 0x8e, 0x8e, 0xea, 0x74, 0x56, 0xc3, 0x69, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1772 = { .name = "ecdsa_brainpoolp384r1_sha384_1772", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1772_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1772_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1772_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1773 for ECDSA, tcId is 243 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1773_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1773_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x32, 0x35, 0x36, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1773_sig[] = { 0x25, 0xc1, 0x47, 0xaa, 0x99, 0xa6, 0x15, 0xa3, 0x4a, 0x6b, 0xd1, 0x52, 0xd1, 0x71, 0x84, 0xc4, 0x8d, 0x28, 0xbf, 0x79, 0xfa, 0x6f, 0xba, 0x92, 0x8e, 0x67, 0x8e, 0xf6, 0x38, 0xa0, 0x64, 0xda, 0x79, 0xd5, 0xf2, 0x53, 0xf7, 0xfe, 0xb8, 0x91, 0x5a, 0x40, 0xd6, 0x43, 0x7b, 0x7b, 0xdf, 0xa5, 0x0c, 0xf7, 0xe1, 0x4c, 0x03, 0xcf, 0x67, 0x89, 0x57, 0x21, 0xcc, 0x2f, 0xbd, 0xd6, 0x2d, 0x6a, 0x0f, 0x89, 0xae, 0xc4, 0x3d, 0xd1, 0x23, 0xd5, 0x1f, 0x81, 0x3d, 0x9b, 0x5c, 0x82, 0x85, 0x0c, 0x07, 0xd0, 0x89, 0xe7, 0xae, 0xa0, 0xdf, 0x2f, 0x59, 0x7e, 0x6a, 0x1c, 0x8e, 0x2b, 0xfd, 0x29, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1773 = { .name = "ecdsa_brainpoolp384r1_sha384_1773", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1773_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1773_msg, .msglen = 11, .sig = ecdsa_brainpoolp384r1_sha384_1773_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1774 for ECDSA, tcId is 244 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1774_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1774_msg[] = { 0x37, 0x33, 0x34, 0x33, 0x33, 0x30, 0x36, 0x35, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1774_sig[] = { 0x85, 0x3d, 0xf8, 0xd6, 0x19, 0xf3, 0xaa, 0x7d, 0xd0, 0xbd, 0xd2, 0x4c, 0x34, 0xd3, 0x87, 0xcc, 0x59, 0xab, 0xff, 0x4a, 0x05, 0x85, 0xe2, 0xe9, 0xc8, 0x20, 0x66, 0xe4, 0xd2, 0xe9, 0x57, 0xb0, 0x43, 0x70, 0x31, 0xbc, 0x12, 0x84, 0xba, 0x3d, 0x39, 0x54, 0x5d, 0x5e, 0x85, 0x0e, 0x27, 0xa3, 0x04, 0x35, 0x98, 0x2c, 0xef, 0xe2, 0xcd, 0x15, 0x81, 0xf3, 0x78, 0xc6, 0xbe, 0x16, 0xea, 0x77, 0x28, 0x4a, 0x17, 0x8b, 0x3f, 0x0d, 0xc1, 0x4c, 0x16, 0x9c, 0x9e, 0xd8, 0x63, 0xcc, 0x4a, 0x8d, 0x8f, 0x78, 0x65, 0x13, 0x80, 0x60, 0x9d, 0xf5, 0xe0, 0x5b, 0x65, 0x04, 0x1d, 0xd7, 0xa2, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1774 = { .name = "ecdsa_brainpoolp384r1_sha384_1774", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1774_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1774_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1774_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1775 for ECDSA, tcId is 245 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1775_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1775_msg[] = { 0x39, 0x37, 0x34, 0x34, 0x36, 0x30, 0x39, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1775_sig[] = { 0x1b, 0x29, 0xb1, 0xe6, 0x08, 0x95, 0xa4, 0x92, 0x0d, 0x68, 0x61, 0x83, 0x6f, 0xaa, 0x22, 0x77, 0x65, 0x40, 0x46, 0x02, 0xf4, 0xbb, 0xa3, 0xb4, 0xfa, 0xa8, 0x88, 0xa4, 0xb1, 0x69, 0x3a, 0x7c, 0x8b, 0x58, 0x5b, 0x59, 0xb9, 0x42, 0x48, 0x71, 0x22, 0xa9, 0x88, 0x9f, 0x4f, 0x14, 0x54, 0xef, 0x7d, 0x9f, 0xcf, 0xbc, 0x2e, 0xe7, 0x1f, 0xbe, 0x32, 0xa4, 0x26, 0x2e, 0x47, 0x77, 0xda, 0xa3, 0x8f, 0x97, 0x22, 0xb0, 0xa6, 0x75, 0x00, 0xb9, 0x50, 0xaa, 0xe4, 0xb4, 0x69, 0xbf, 0xf9, 0x52, 0x5a, 0xe1, 0xde, 0x38, 0x9c, 0xc1, 0x7a, 0xe7, 0x19, 0xe2, 0x4e, 0xcd, 0x19, 0x72, 0x84, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1775 = { .name = "ecdsa_brainpoolp384r1_sha384_1775", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1775_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1775_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1775_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1776 for ECDSA, tcId is 246 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1776_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1776_msg[] = { 0x33, 0x32, 0x32, 0x37, 0x30, 0x38, 0x36, 0x38, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1776_sig[] = { 0x89, 0x37, 0xdd, 0x05, 0x00, 0x4f, 0x6e, 0x78, 0x2a, 0x2c, 0x91, 0xc8, 0xd7, 0x9f, 0x40, 0x79, 0x5d, 0x16, 0x9f, 0xab, 0x6a, 0xf3, 0x85, 0xf9, 0x1f, 0x5c, 0xee, 0x92, 0x8c, 0x2a, 0x22, 0x86, 0x9f, 0x10, 0x93, 0x8e, 0xe2, 0xed, 0xb3, 0xed, 0x0e, 0x0a, 0x0e, 0x38, 0x14, 0x4d, 0x50, 0x64, 0x48, 0xc6, 0x92, 0xb4, 0xb8, 0x87, 0x76, 0xb0, 0x15, 0x8b, 0x99, 0xe1, 0x5e, 0x99, 0xde, 0x39, 0x55, 0xab, 0x9d, 0x88, 0x44, 0x77, 0x41, 0x8c, 0xb7, 0x40, 0xff, 0x91, 0x7a, 0x70, 0x4c, 0x77, 0x07, 0xf3, 0x99, 0x54, 0x18, 0x6a, 0x03, 0x97, 0x7c, 0xbe, 0xdf, 0x34, 0xba, 0xc0, 0x27, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1776 = { .name = "ecdsa_brainpoolp384r1_sha384_1776", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1776_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1776_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1776_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1777 for ECDSA, tcId is 247 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1777_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1777_msg[] = { 0x32, 0x33, 0x32, 0x39, 0x37, 0x36, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1777_sig[] = { 0x1e, 0x42, 0xfa, 0xe8, 0x34, 0x60, 0xbb, 0x8f, 0x30, 0xd7, 0xd6, 0xbe, 0xdf, 0x98, 0x46, 0x22, 0xa5, 0x50, 0x35, 0xd5, 0x02, 0xfc, 0x2d, 0x7f, 0x9c, 0xe5, 0x2c, 0x56, 0x51, 0x5f, 0xd6, 0x6d, 0x1d, 0x59, 0x30, 0x94, 0xd4, 0x16, 0x7f, 0x4a, 0xe0, 0x51, 0xf2, 0xb1, 0x2d, 0x0e, 0x67, 0xab, 0x28, 0x4d, 0x00, 0xf9, 0x8f, 0x29, 0x20, 0x2f, 0x03, 0xb3, 0x79, 0x71, 0x97, 0x8e, 0xeb, 0xf2, 0xfb, 0xfb, 0x94, 0xbe, 0xf2, 0xb4, 0xd6, 0x3f, 0xbe, 0xd8, 0x8c, 0x7d, 0x29, 0xd1, 0x8b, 0x61, 0xca, 0x40, 0x98, 0x82, 0xae, 0xee, 0xa9, 0x7e, 0x30, 0xa0, 0xb1, 0x56, 0xdc, 0xe2, 0xbb, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1777 = { .name = "ecdsa_brainpoolp384r1_sha384_1777", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1777_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1777_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1777_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1778 for ECDSA, tcId is 248 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1778_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1778_msg[] = { 0x39, 0x34, 0x30, 0x34, 0x37, 0x33, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1778_sig[] = { 0x2c, 0x07, 0xe1, 0x85, 0x94, 0x1b, 0x20, 0x62, 0x8d, 0xf8, 0x48, 0x08, 0xff, 0x9a, 0x01, 0x0e, 0x5e, 0x11, 0x2c, 0x06, 0x32, 0xcb, 0x32, 0x31, 0x26, 0x6e, 0x84, 0x18, 0xab, 0x06, 0xf6, 0xf1, 0x8e, 0xb4, 0x1f, 0x2f, 0x98, 0xa5, 0xa0, 0xca, 0x1a, 0x46, 0x23, 0x39, 0x22, 0x8f, 0xad, 0x9a, 0x29, 0x05, 0x1e, 0x92, 0x31, 0xd6, 0x8a, 0xb4, 0x62, 0xba, 0x7a, 0xae, 0xe3, 0x9e, 0xde, 0xf6, 0x9c, 0x05, 0xf8, 0x1b, 0xa7, 0xea, 0xb1, 0x61, 0x45, 0x4b, 0xcf, 0x49, 0x69, 0xba, 0x29, 0x34, 0x63, 0xe6, 0xde, 0x2e, 0x78, 0x46, 0x77, 0xe8, 0xd2, 0xa9, 0x29, 0x53, 0x40, 0x0f, 0xe9, 0x57, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1778 = { .name = "ecdsa_brainpoolp384r1_sha384_1778", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1778_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1778_msg, .msglen = 8, .sig = ecdsa_brainpoolp384r1_sha384_1778_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1779 for ECDSA, tcId is 249 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1779_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1779_msg[] = { 0x33, 0x32, 0x32, 0x30, 0x35, 0x36, 0x39, 0x31, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1779_sig[] = { 0x03, 0x06, 0x87, 0x25, 0x3a, 0xd2, 0xcc, 0xb9, 0x43, 0x42, 0xd3, 0x25, 0xa8, 0xad, 0x19, 0x27, 0x8f, 0xf2, 0xac, 0x8c, 0xfe, 0x00, 0x20, 0x9a, 0xb0, 0x30, 0xc7, 0x99, 0x7b, 0x30, 0x08, 0xd4, 0xe9, 0x58, 0x8b, 0xa2, 0x92, 0x2d, 0x62, 0xe7, 0x5a, 0x5e, 0x6c, 0xb8, 0x42, 0x32, 0x4f, 0x72, 0x75, 0x2a, 0xe1, 0xbd, 0xbd, 0x94, 0xe3, 0x5b, 0xc5, 0x78, 0x15, 0xd2, 0x75, 0x8b, 0x1f, 0xdf, 0xee, 0x70, 0x6f, 0x41, 0x0c, 0x0e, 0xd9, 0x66, 0xbe, 0x87, 0x92, 0xee, 0xb5, 0x4c, 0xae, 0x86, 0x31, 0xba, 0xa0, 0xc0, 0x95, 0xe0, 0x74, 0x2d, 0x6d, 0xd7, 0xd1, 0xe0, 0x41, 0x9b, 0xc5, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1779 = { .name = "ecdsa_brainpoolp384r1_sha384_1779", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1779_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1779_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1779_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1780 for ECDSA, tcId is 250 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1780_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1780_msg[] = { 0x34, 0x31, 0x34, 0x30, 0x35, 0x33, 0x39, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1780_sig[] = { 0x39, 0xab, 0xdc, 0x19, 0x43, 0x60, 0x8e, 0xf4, 0xf5, 0xc4, 0x6b, 0xac, 0x7a, 0xe1, 0xe2, 0x3d, 0x2e, 0x32, 0x52, 0xe6, 0xfc, 0xc2, 0xb0, 0xce, 0x8f, 0x41, 0x50, 0x1d, 0xf0, 0x24, 0xb7, 0xd2, 0x97, 0x36, 0x24, 0x01, 0xbe, 0x87, 0xb1, 0x22, 0xbb, 0x9c, 0xcd, 0x98, 0xda, 0xa5, 0x33, 0xce, 0x58, 0xf8, 0xd8, 0x08, 0x8f, 0xaf, 0x75, 0xfa, 0x06, 0xd7, 0x6e, 0x8c, 0xc1, 0x0a, 0x1d, 0x7b, 0xcf, 0xc2, 0x25, 0xd5, 0x8b, 0x75, 0xd8, 0xa2, 0x04, 0xe6, 0xa5, 0xce, 0x4d, 0x6d, 0x95, 0x14, 0x6e, 0x85, 0x3b, 0x68, 0x18, 0x74, 0x6c, 0xeb, 0xf7, 0x86, 0x4f, 0xac, 0xb4, 0x4a, 0x21, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1780 = { .name = "ecdsa_brainpoolp384r1_sha384_1780", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1780_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1780_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1780_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1781 for ECDSA, tcId is 251 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1781_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1781_msg[] = { 0x31, 0x39, 0x35, 0x31, 0x35, 0x36, 0x38, 0x36, 0x34, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1781_sig[] = { 0x51, 0x0f, 0x56, 0x02, 0xdb, 0xf3, 0xa0, 0x95, 0x27, 0x6e, 0x99, 0xa6, 0x7a, 0x65, 0x24, 0x92, 0x17, 0xc6, 0xe6, 0xc1, 0x68, 0xa6, 0xca, 0xa6, 0x4f, 0x5a, 0xad, 0x80, 0x6b, 0x57, 0xd2, 0x90, 0x02, 0xe6, 0x07, 0x86, 0xc6, 0xf3, 0xed, 0x27, 0x46, 0x90, 0x58, 0x3d, 0x18, 0xcd, 0xe7, 0x2b, 0x68, 0x75, 0x68, 0xeb, 0x41, 0xaf, 0x3f, 0x5c, 0xcf, 0x7f, 0x2b, 0x16, 0xe6, 0x7a, 0x1f, 0x4f, 0xbc, 0xb3, 0xbf, 0x68, 0x3d, 0x86, 0xe4, 0x9a, 0x61, 0xff, 0xf0, 0xc2, 0x8f, 0xc0, 0x3d, 0x79, 0x7a, 0x72, 0x2a, 0xf9, 0xb0, 0x2c, 0x39, 0x1a, 0x49, 0xf5, 0x66, 0x9c, 0x79, 0x68, 0xdb, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1781 = { .name = "ecdsa_brainpoolp384r1_sha384_1781", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1781_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1781_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1781_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1782 for ECDSA, tcId is 252 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1782_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1782_msg[] = { 0x35, 0x39, 0x35, 0x39, 0x30, 0x37, 0x31, 0x36, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1782_sig[] = { 0x84, 0xbe, 0xda, 0xfb, 0x46, 0x87, 0x32, 0x74, 0xef, 0x91, 0xde, 0x67, 0xb2, 0x03, 0x75, 0xc7, 0x69, 0x8a, 0xfb, 0xe3, 0x7f, 0x3d, 0x5b, 0xac, 0x1b, 0xbc, 0xab, 0xcb, 0xb4, 0xaa, 0x66, 0x16, 0xb3, 0x45, 0x26, 0x7f, 0xc9, 0xd5, 0x28, 0x5b, 0xaa, 0xcc, 0xa6, 0xf1, 0xb6, 0x94, 0x61, 0x9f, 0x89, 0xb3, 0x91, 0x65, 0x94, 0x9c, 0xc4, 0x35, 0x50, 0x3f, 0x4a, 0x6a, 0xc5, 0x75, 0x4d, 0x2a, 0xfd, 0xdb, 0x99, 0xb5, 0x5a, 0x3b, 0xa8, 0x40, 0x04, 0x0d, 0x51, 0x62, 0x4a, 0x09, 0x85, 0x25, 0x1f, 0x2c, 0x97, 0x87, 0xb5, 0xcb, 0x26, 0x6a, 0x21, 0x81, 0x43, 0xdb, 0x5b, 0x04, 0x18, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1782 = { .name = "ecdsa_brainpoolp384r1_sha384_1782", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1782_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1782_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1782_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1783 for ECDSA, tcId is 253 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1783_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1783_msg[] = { 0x32, 0x31, 0x35, 0x33, 0x34, 0x36, 0x39, 0x35, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1783_sig[] = { 0x25, 0x1b, 0x50, 0xb6, 0x3f, 0xe1, 0xcb, 0xae, 0x21, 0x04, 0x31, 0xbd, 0x1e, 0x76, 0x56, 0x3f, 0x07, 0x84, 0x54, 0xf7, 0xc2, 0xb2, 0xe4, 0x75, 0xab, 0xc1, 0xb7, 0x75, 0x89, 0x20, 0xf0, 0x3b, 0x97, 0x11, 0x12, 0xc6, 0x2c, 0xa6, 0x13, 0x2a, 0x48, 0x07, 0x38, 0x76, 0x8e, 0xdc, 0x35, 0xd3, 0x8b, 0x8c, 0x16, 0x46, 0x90, 0x06, 0x01, 0xde, 0x4f, 0xc9, 0xc9, 0xdb, 0xea, 0x22, 0x8c, 0xe9, 0xc9, 0xed, 0xbb, 0xce, 0x7c, 0x31, 0xa4, 0x2d, 0x3c, 0xba, 0x58, 0x0e, 0x19, 0x1c, 0x92, 0xd1, 0x23, 0xe1, 0x1c, 0x06, 0x34, 0xb8, 0x7b, 0xc0, 0x94, 0xcf, 0xf1, 0x6e, 0x20, 0x9b, 0x69, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1783 = { .name = "ecdsa_brainpoolp384r1_sha384_1783", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1783_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1783_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1783_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1784 for ECDSA, tcId is 254 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1784_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1784_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x31, 0x30, 0x39, 0x38, 0x33, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1784_sig[] = { 0x34, 0xb3, 0xc6, 0xaf, 0xc0, 0xfa, 0x7a, 0x75, 0x38, 0x5e, 0x3d, 0x0d, 0xbf, 0xb2, 0x37, 0xb5, 0xc7, 0x6a, 0xfe, 0x16, 0xf0, 0xf6, 0x9e, 0x44, 0x53, 0x3b, 0x7a, 0xc3, 0xab, 0xf4, 0x23, 0x37, 0x99, 0x20, 0x15, 0x04, 0xeb, 0xec, 0x03, 0x10, 0xb2, 0xfd, 0x7e, 0x86, 0x7f, 0x9f, 0xdd, 0x01, 0x2f, 0x83, 0x1f, 0x59, 0x55, 0xc2, 0xe4, 0xfa, 0x5b, 0x29, 0x8b, 0xef, 0x8f, 0x09, 0x73, 0x2d, 0x0b, 0x15, 0xea, 0x7c, 0xe1, 0x41, 0xa6, 0xdc, 0xdb, 0xbc, 0x60, 0x37, 0x8f, 0xd9, 0xc9, 0x69, 0x33, 0x9e, 0x82, 0x6d, 0xef, 0x56, 0x81, 0xe9, 0x6f, 0x0a, 0x1d, 0xbc, 0x36, 0xad, 0xaf, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1784 = { .name = "ecdsa_brainpoolp384r1_sha384_1784", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1784_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1784_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1784_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1785 for ECDSA, tcId is 255 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1785_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1785_msg[] = { 0x34, 0x39, 0x32, 0x39, 0x33, 0x39, 0x36, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1785_sig[] = { 0x33, 0x5b, 0xf6, 0xb1, 0x52, 0x64, 0x7b, 0xdf, 0x8a, 0x3c, 0x5d, 0xe8, 0xde, 0x3c, 0x69, 0x83, 0x21, 0x01, 0x90, 0x26, 0x79, 0xbc, 0x80, 0x26, 0x12, 0xd2, 0xf4, 0xbf, 0xf8, 0xc7, 0xed, 0x7d, 0xf2, 0x25, 0xa0, 0x80, 0xef, 0xf6, 0xde, 0xaa, 0x5d, 0xac, 0xc7, 0x40, 0x16, 0xc5, 0xce, 0x3d, 0x7f, 0x1b, 0x11, 0x6f, 0x8d, 0x27, 0xd8, 0x94, 0xff, 0xe6, 0xab, 0x57, 0x54, 0x68, 0x51, 0xba, 0xa5, 0x51, 0x3d, 0x11, 0x0e, 0x69, 0x60, 0xd7, 0x13, 0x26, 0x3a, 0xfd, 0x54, 0x2e, 0x97, 0xf0, 0x1f, 0x4d, 0xf4, 0xf7, 0xb6, 0x4d, 0x49, 0x49, 0x6d, 0x22, 0xc2, 0xf6, 0xc5, 0x60, 0x50, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1785 = { .name = "ecdsa_brainpoolp384r1_sha384_1785", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1785_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1785_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1785_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1786 for ECDSA, tcId is 256 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1786_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1786_msg[] = { 0x32, 0x31, 0x31, 0x32, 0x33, 0x35, 0x35, 0x39, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1786_sig[] = { 0x32, 0x9c, 0x5d, 0x35, 0xad, 0xef, 0x35, 0x73, 0x39, 0xf9, 0x01, 0x65, 0x7a, 0xf5, 0x5d, 0xa7, 0xb0, 0x41, 0xe8, 0xc1, 0x83, 0x74, 0xc7, 0x9a, 0xb4, 0x44, 0x49, 0xb2, 0x7a, 0x83, 0x02, 0x28, 0x00, 0xf0, 0xc9, 0x38, 0x50, 0x3b, 0xdd, 0x85, 0xb7, 0x88, 0x4a, 0x32, 0xdf, 0x90, 0x57, 0xfe, 0x74, 0xf5, 0x61, 0x01, 0xc7, 0xf7, 0xb3, 0x6d, 0x63, 0x4c, 0x21, 0x75, 0xa0, 0xd1, 0x7c, 0xec, 0x05, 0x46, 0xb6, 0xcd, 0xf1, 0x8e, 0x86, 0xef, 0x9a, 0xbb, 0x6d, 0x6d, 0x0b, 0xcc, 0xdd, 0x04, 0x42, 0xaf, 0x12, 0x55, 0xe0, 0x2a, 0x5d, 0xde, 0x70, 0x78, 0x40, 0xdb, 0x48, 0x54, 0x31, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1786 = { .name = "ecdsa_brainpoolp384r1_sha384_1786", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1786_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1786_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1786_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1787 for ECDSA, tcId is 257 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1787_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1787_msg[] = { 0x31, 0x32, 0x33, 0x39, 0x32, 0x37, 0x35, 0x37, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1787_sig[] = { 0x1a, 0xc3, 0xd4, 0x63, 0xdf, 0x22, 0x19, 0x45, 0xad, 0xbd, 0x28, 0xa7, 0x46, 0x81, 0x7b, 0xa8, 0x3d, 0x59, 0x57, 0xd9, 0x56, 0x57, 0xc7, 0x24, 0xf1, 0xad, 0x68, 0xb9, 0x8b, 0xde, 0x6b, 0xf7, 0x95, 0x9f, 0x73, 0x63, 0x25, 0x3e, 0xce, 0x17, 0x4d, 0x7a, 0xed, 0x34, 0x64, 0x10, 0xdc, 0x21, 0x2a, 0x5a, 0x30, 0xa8, 0x19, 0x1a, 0x48, 0x83, 0xba, 0xbf, 0x69, 0xba, 0x88, 0x3a, 0xf7, 0xf5, 0x06, 0x7b, 0xc9, 0x90, 0xf8, 0xda, 0xc4, 0xa3, 0x5b, 0xc6, 0xef, 0x38, 0x71, 0x02, 0xfa, 0xd8, 0x5d, 0x26, 0x85, 0x64, 0xc6, 0x12, 0x46, 0xdf, 0xf1, 0x75, 0x10, 0x63, 0x41, 0x68, 0xa1, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1787 = { .name = "ecdsa_brainpoolp384r1_sha384_1787", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1787_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1787_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1787_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1788 for ECDSA, tcId is 258 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1788_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1788_msg[] = { 0x32, 0x30, 0x38, 0x31, 0x31, 0x38, 0x38, 0x37, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1788_sig[] = { 0x5c, 0xc9, 0xa0, 0x74, 0xe1, 0x0c, 0x41, 0x72, 0x4d, 0x55, 0x50, 0x2d, 0x72, 0x43, 0x0d, 0x70, 0x7b, 0xa7, 0x55, 0xc4, 0x1d, 0x56, 0x8d, 0x79, 0x98, 0x7d, 0xc3, 0xcd, 0xe4, 0x5c, 0xf6, 0xf7, 0x03, 0x41, 0xf9, 0x1f, 0xa2, 0xa2, 0x0e, 0x3b, 0xa5, 0xb5, 0x7f, 0xeb, 0xde, 0x05, 0xb5, 0xc4, 0x6d, 0x80, 0x25, 0x16, 0x2a, 0xf3, 0x0c, 0xfa, 0xb2, 0xcd, 0x16, 0xa1, 0x34, 0x2b, 0x41, 0x74, 0xae, 0x17, 0x1d, 0xc3, 0xc7, 0x5b, 0xc1, 0xfe, 0x99, 0x4e, 0xc6, 0xc0, 0x35, 0x92, 0x95, 0xf0, 0x39, 0x0e, 0x65, 0x85, 0x6a, 0xec, 0x5e, 0xbd, 0x89, 0x4a, 0x15, 0xc6, 0x85, 0x77, 0xab, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1788 = { .name = "ecdsa_brainpoolp384r1_sha384_1788", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1788_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1788_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1788_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1789 for ECDSA, tcId is 259 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1789_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1789_msg[] = { 0x34, 0x35, 0x34, 0x36, 0x30, 0x38, 0x39, 0x36, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1789_sig[] = { 0x0c, 0x13, 0xdd, 0xef, 0x4e, 0x7e, 0x83, 0x16, 0x30, 0x90, 0x55, 0x9f, 0xa5, 0x92, 0xed, 0xba, 0x35, 0xa9, 0x2d, 0x66, 0xe5, 0x4a, 0x34, 0xaa, 0xe2, 0x90, 0x5a, 0x10, 0xb0, 0x3a, 0x31, 0x6f, 0xfd, 0x0c, 0x01, 0x3f, 0x7b, 0x06, 0x19, 0x09, 0xf3, 0xa9, 0x24, 0xac, 0x25, 0xf1, 0xc9, 0x0a, 0x40, 0xab, 0x2d, 0x40, 0xb4, 0x00, 0x7f, 0xec, 0x32, 0xa6, 0x47, 0x78, 0x4a, 0xe4, 0xa2, 0xd5, 0xcb, 0x4f, 0x70, 0x42, 0xcc, 0xe8, 0xc3, 0x74, 0x29, 0x8c, 0x34, 0x51, 0x80, 0xd0, 0xe3, 0x8a, 0xaa, 0x5d, 0x73, 0x87, 0x5e, 0xb8, 0x59, 0xb0, 0x82, 0xd0, 0xa1, 0x7c, 0xd4, 0x96, 0xd2, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1789 = { .name = "ecdsa_brainpoolp384r1_sha384_1789", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1789_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1789_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1789_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1790 for ECDSA, tcId is 260 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1790_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1790_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x36, 0x38, 0x37, 0x31, 0x31, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1790_sig[] = { 0x0a, 0xf7, 0x4a, 0x3e, 0xa3, 0xc4, 0x12, 0x17, 0x11, 0xd1, 0x0f, 0x2e, 0x4d, 0x72, 0x50, 0x31, 0xb1, 0xb0, 0x8c, 0xf8, 0xef, 0xf2, 0x28, 0x34, 0x74, 0x84, 0x02, 0x45, 0x3b, 0x8e, 0xaa, 0x00, 0xb1, 0x57, 0x86, 0x11, 0xee, 0x45, 0x22, 0x07, 0x53, 0xbc, 0xbd, 0x20, 0xa3, 0x91, 0x40, 0x2e, 0x15, 0xeb, 0x2d, 0xaf, 0x4f, 0xb9, 0x32, 0x12, 0x83, 0xf6, 0x91, 0x57, 0xe7, 0xc7, 0x47, 0xd6, 0x37, 0x67, 0x59, 0xd0, 0x13, 0x0e, 0x79, 0x05, 0x52, 0xb4, 0xfd, 0x89, 0x57, 0x71, 0x39, 0xa2, 0x8d, 0xae, 0xd4, 0x3b, 0xa9, 0x76, 0xa7, 0x6b, 0xec, 0x1c, 0x7d, 0x53, 0xa4, 0x9c, 0x98, 0x22, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1790 = { .name = "ecdsa_brainpoolp384r1_sha384_1790", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1790_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1790_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1790_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1791 for ECDSA, tcId is 261 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1791_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1791_msg[] = { 0x32, 0x30, 0x33, 0x31, 0x33, 0x38, 0x31, 0x38, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1791_sig[] = { 0x67, 0x4b, 0x6a, 0xc9, 0x89, 0x0d, 0xcb, 0xab, 0xa4, 0xd7, 0x44, 0xce, 0x99, 0x92, 0xe9, 0xdc, 0x69, 0x8e, 0x52, 0x4b, 0x0d, 0x1c, 0xf4, 0xd7, 0x6d, 0x35, 0x53, 0x72, 0x63, 0x1d, 0x6f, 0x7d, 0xce, 0x6f, 0xf5, 0xa6, 0x07, 0x27, 0x3c, 0x0c, 0x14, 0x69, 0xd8, 0xe5, 0xb1, 0x2a, 0xb6, 0x0e, 0x7c, 0xf8, 0xf9, 0x83, 0x28, 0xf9, 0x20, 0xd2, 0x94, 0x75, 0xd5, 0xcb, 0x38, 0xbc, 0x35, 0xfe, 0x71, 0xff, 0xd8, 0x7f, 0x1b, 0xe7, 0x88, 0xd2, 0x02, 0x90, 0x8e, 0xb9, 0x39, 0xc7, 0x6b, 0x76, 0x94, 0xce, 0xcf, 0xc2, 0x1d, 0xae, 0x50, 0xf4, 0x33, 0x77, 0x3d, 0x75, 0xe2, 0x79, 0xe3, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1791 = { .name = "ecdsa_brainpoolp384r1_sha384_1791", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1791_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1791_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1791_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1792 for ECDSA, tcId is 262 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1792_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1792_msg[] = { 0x32, 0x35, 0x35, 0x33, 0x35, 0x38, 0x33, 0x33, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1792_sig[] = { 0x89, 0xab, 0x51, 0x35, 0x7a, 0x7d, 0xb3, 0x6d, 0x1c, 0x26, 0xb1, 0xe9, 0x06, 0x08, 0x8b, 0x9a, 0xa3, 0xe3, 0xd5, 0x96, 0x58, 0xe2, 0xbe, 0xd5, 0x5d, 0xd0, 0x3d, 0xeb, 0x56, 0x90, 0x86, 0x77, 0xa5, 0x9a, 0x4b, 0x24, 0xcd, 0x65, 0xea, 0xe6, 0x35, 0x1b, 0x03, 0xa9, 0x30, 0x0a, 0xe5, 0x18, 0x39, 0x5e, 0x10, 0xa6, 0xac, 0xcc, 0x3c, 0x6e, 0x56, 0x68, 0x44, 0xc4, 0xfa, 0xc4, 0xca, 0xa2, 0xa8, 0xce, 0xda, 0x47, 0x51, 0xdf, 0x5a, 0xab, 0x5b, 0x32, 0x75, 0xf8, 0x25, 0xc5, 0x94, 0x0b, 0x1d, 0xb6, 0x08, 0x86, 0xf1, 0x39, 0x53, 0x18, 0x11, 0x0c, 0xa5, 0x3c, 0x69, 0x32, 0x83, 0x52, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1792 = { .name = "ecdsa_brainpoolp384r1_sha384_1792", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1792_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1792_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1792_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1793 for ECDSA, tcId is 263 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1793_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1793_msg[] = { 0x34, 0x36, 0x31, 0x38, 0x38, 0x34, 0x31, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1793_sig[] = { 0x5b, 0x3f, 0x30, 0xc8, 0x3a, 0xca, 0xa0, 0x88, 0xa3, 0x72, 0xd5, 0x58, 0x82, 0x29, 0xa3, 0x55, 0x5d, 0xba, 0x14, 0xfb, 0xed, 0x8c, 0xbc, 0x29, 0x35, 0xf6, 0xf6, 0xea, 0xbd, 0x80, 0x77, 0xc8, 0x53, 0xdb, 0xc7, 0xb2, 0xe3, 0x54, 0x68, 0x3d, 0x41, 0xdc, 0xe5, 0xb5, 0xd4, 0xc9, 0xde, 0x58, 0x76, 0x70, 0x24, 0x28, 0x0e, 0x5e, 0x13, 0x1b, 0x4a, 0x46, 0xd6, 0x6b, 0x35, 0xf2, 0xb3, 0x04, 0xa5, 0x5e, 0x64, 0x81, 0xf0, 0x94, 0xb3, 0x55, 0xe8, 0x73, 0xa7, 0xf8, 0x61, 0x02, 0x96, 0x02, 0x09, 0x7a, 0x4d, 0x30, 0x01, 0x36, 0xea, 0x00, 0x5b, 0xf5, 0xfb, 0xc1, 0x08, 0x43, 0xba, 0x95, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1793 = { .name = "ecdsa_brainpoolp384r1_sha384_1793", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1793_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1793_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1793_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1794 for ECDSA, tcId is 264 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1794_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1794_msg[] = { 0x31, 0x30, 0x30, 0x39, 0x32, 0x34, 0x35, 0x38, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1794_sig[] = { 0x32, 0xe8, 0xab, 0xc3, 0x66, 0x23, 0xfc, 0xb2, 0x03, 0x46, 0x62, 0x10, 0x50, 0x66, 0xaf, 0xd7, 0x1f, 0xae, 0x4d, 0x75, 0xb8, 0x30, 0x0e, 0x32, 0xbe, 0xf4, 0x63, 0x2f, 0xac, 0x65, 0xec, 0xbd, 0x28, 0x5c, 0x40, 0x61, 0xca, 0x64, 0xf6, 0x81, 0x3e, 0xdd, 0x2a, 0xbf, 0xbc, 0xc2, 0x13, 0xe8, 0x0b, 0x00, 0x13, 0xe2, 0xa5, 0x6c, 0x36, 0xde, 0x1b, 0xa1, 0x9a, 0x9c, 0x30, 0x48, 0x69, 0xf3, 0xd6, 0x98, 0x06, 0xec, 0xe6, 0xf4, 0xa8, 0x01, 0xc2, 0x7a, 0x3d, 0x4f, 0x1c, 0x20, 0xaf, 0x5e, 0xb1, 0x75, 0xe9, 0x5e, 0x73, 0x4e, 0xf6, 0x37, 0x65, 0x3a, 0x6c, 0xdb, 0x2a, 0x9e, 0xcb, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1794 = { .name = "ecdsa_brainpoolp384r1_sha384_1794", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1794_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1794_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1794_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1795 for ECDSA, tcId is 265 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1795_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1795_msg[] = { 0x32, 0x37, 0x35, 0x36, 0x34, 0x36, 0x36, 0x35, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1795_sig[] = { 0x45, 0xdf, 0x52, 0x9d, 0x25, 0x31, 0xd4, 0x8c, 0xab, 0x41, 0x2b, 0x68, 0x0c, 0xad, 0xb5, 0x32, 0xcd, 0x62, 0x25, 0x30, 0x4f, 0xb7, 0x42, 0x84, 0x1c, 0x89, 0x54, 0x59, 0x59, 0xb7, 0x9e, 0x19, 0x8c, 0x3b, 0x12, 0x97, 0xdc, 0x5c, 0x4b, 0xd9, 0xaa, 0x75, 0x49, 0x19, 0x3e, 0x07, 0x80, 0xd1, 0x5c, 0x8f, 0x62, 0xfc, 0x48, 0x52, 0x06, 0x9d, 0x35, 0x23, 0x2a, 0xab, 0x77, 0x25, 0x71, 0x5e, 0x91, 0x57, 0xd1, 0xaa, 0x68, 0x80, 0x50, 0xf8, 0x96, 0xd6, 0x90, 0xdc, 0xd4, 0xe4, 0x1b, 0xaa, 0x66, 0xea, 0x6f, 0x9b, 0x34, 0xde, 0xea, 0x5a, 0x60, 0x7c, 0xc3, 0x91, 0xff, 0x09, 0x7d, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1795 = { .name = "ecdsa_brainpoolp384r1_sha384_1795", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1795_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1795_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1795_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1796 for ECDSA, tcId is 266 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1796_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1796_msg[] = { 0x31, 0x31, 0x39, 0x36, 0x39, 0x37, 0x31, 0x30, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1796_sig[] = { 0x10, 0x20, 0x07, 0x8f, 0x6e, 0x57, 0x17, 0x53, 0x8f, 0xef, 0x87, 0x9c, 0x56, 0x35, 0xd4, 0xd7, 0xd5, 0x27, 0x21, 0xbe, 0x15, 0x29, 0x58, 0x5b, 0x0a, 0x77, 0x08, 0x3c, 0x5f, 0x34, 0x7f, 0x21, 0xb1, 0x31, 0x6d, 0x03, 0x99, 0xa8, 0xbc, 0x17, 0xb3, 0x67, 0x33, 0x64, 0x75, 0xa6, 0xd9, 0x7e, 0x1a, 0xde, 0x87, 0xed, 0x2e, 0x2b, 0xdb, 0x24, 0x81, 0xa0, 0x27, 0xdd, 0x3f, 0xa5, 0xb9, 0x3a, 0x81, 0xf4, 0xff, 0xdc, 0x33, 0xd4, 0xa9, 0x08, 0xd9, 0x7b, 0x40, 0xf8, 0x41, 0x82, 0x1c, 0x02, 0x92, 0x9b, 0x03, 0x61, 0x35, 0xf4, 0x19, 0x75, 0x2c, 0x88, 0xd5, 0x75, 0x09, 0xd1, 0x7b, 0xef, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1796 = { .name = "ecdsa_brainpoolp384r1_sha384_1796", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1796_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1796_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1796_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1797 for ECDSA, tcId is 267 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1797_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1797_msg[] = { 0x32, 0x33, 0x33, 0x31, 0x34, 0x32, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1797_sig[] = { 0x0d, 0x93, 0xd5, 0xc6, 0x37, 0x41, 0x44, 0x7f, 0xdb, 0xed, 0x17, 0xa7, 0x38, 0xa4, 0x1e, 0xfd, 0xbb, 0x70, 0x93, 0x33, 0x37, 0x97, 0x49, 0x9f, 0xe7, 0x0d, 0x5c, 0x54, 0xbc, 0x86, 0xb6, 0xbb, 0x65, 0x04, 0x24, 0xbb, 0xd6, 0x49, 0x07, 0x37, 0x5e, 0xf9, 0x2e, 0xfd, 0x13, 0xee, 0x25, 0xec, 0x66, 0x19, 0x2a, 0xc1, 0xfb, 0x22, 0xdb, 0x75, 0x88, 0x1d, 0xf7, 0xae, 0x89, 0x0d, 0xa4, 0x95, 0x3a, 0x74, 0xfa, 0x95, 0x4e, 0x0b, 0x5e, 0x6b, 0x69, 0x2e, 0xca, 0x23, 0xc3, 0xbc, 0xfd, 0x5f, 0xb3, 0x22, 0x8d, 0x09, 0x2d, 0x99, 0x91, 0x07, 0x1b, 0xaa, 0x4b, 0x6e, 0x8f, 0xa2, 0x06, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1797 = { .name = "ecdsa_brainpoolp384r1_sha384_1797", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1797_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1797_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1797_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1798 for ECDSA, tcId is 268 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1798_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1798_msg[] = { 0x31, 0x36, 0x37, 0x33, 0x34, 0x38, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1798_sig[] = { 0x04, 0x93, 0x34, 0xbf, 0x43, 0xf7, 0xd9, 0xc2, 0x13, 0x44, 0x3c, 0x96, 0xc4, 0xba, 0x11, 0x9b, 0x33, 0x57, 0x57, 0xa3, 0xe6, 0x9b, 0xa8, 0x73, 0xbd, 0xc4, 0xef, 0x64, 0x21, 0x39, 0xb8, 0x68, 0x7a, 0x8a, 0x57, 0x82, 0xb6, 0xa9, 0x00, 0x21, 0x1d, 0x6f, 0xc1, 0xec, 0xf1, 0x4c, 0x2c, 0xf9, 0x18, 0x29, 0x90, 0xbe, 0xe4, 0x78, 0x72, 0x67, 0xb6, 0xd6, 0x3b, 0x7e, 0xa6, 0x7a, 0x25, 0x85, 0x29, 0x51, 0xd1, 0x45, 0xcf, 0x5a, 0x39, 0xd2, 0x01, 0xba, 0xbe, 0x9f, 0x3f, 0x11, 0x20, 0x92, 0x4e, 0x5b, 0x28, 0x3e, 0xeb, 0x63, 0x6a, 0x8f, 0xbb, 0xb0, 0xc2, 0xfc, 0x66, 0xdd, 0xf7, 0x55, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1798 = { .name = "ecdsa_brainpoolp384r1_sha384_1798", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1798_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1798_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1798_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1799 for ECDSA, tcId is 269 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1799_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1799_msg[] = { 0x31, 0x34, 0x36, 0x30, 0x31, 0x35, 0x39, 0x38, 0x32, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1799_sig[] = { 0x6b, 0x0c, 0x24, 0x8f, 0xa3, 0x93, 0x17, 0x62, 0x1a, 0xf5, 0x34, 0x4f, 0x97, 0x8b, 0xd7, 0x65, 0xec, 0x61, 0x25, 0xcc, 0xe2, 0xf4, 0x0c, 0xdd, 0xdf, 0xa4, 0x0f, 0x7e, 0x8c, 0x7f, 0x4f, 0xe9, 0x21, 0x63, 0x54, 0xbd, 0xaf, 0xc2, 0x06, 0x72, 0x88, 0xc5, 0x67, 0x94, 0xeb, 0x5d, 0x17, 0xd2, 0x75, 0x84, 0xc0, 0x77, 0xad, 0x35, 0xb5, 0x8f, 0xb2, 0x94, 0x03, 0xb9, 0xc2, 0xc6, 0x41, 0x27, 0x17, 0x94, 0xe2, 0x6b, 0x24, 0x1d, 0xfc, 0x8d, 0x74, 0xd4, 0xda, 0xa7, 0xde, 0x3f, 0x07, 0x6c, 0x9c, 0x4c, 0x6d, 0x39, 0x09, 0xe2, 0xc0, 0xab, 0x9b, 0x9a, 0x70, 0x2c, 0x08, 0x12, 0xee, 0xad, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1799 = { .name = "ecdsa_brainpoolp384r1_sha384_1799", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1799_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1799_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1799_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1800 for ECDSA, tcId is 270 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1800_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1800_msg[] = { 0x38, 0x39, 0x39, 0x30, 0x38, 0x35, 0x39, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1800_sig[] = { 0x8c, 0x04, 0x8a, 0x8e, 0xab, 0xa1, 0xb6, 0x54, 0xc3, 0xf6, 0x87, 0xdf, 0x01, 0x71, 0x4d, 0xf3, 0xb6, 0x1b, 0x98, 0xe5, 0x78, 0x20, 0x5c, 0x80, 0x4a, 0x72, 0xbd, 0xe3, 0x2d, 0xaa, 0xe8, 0x7b, 0x37, 0xfd, 0x2f, 0x9f, 0x5f, 0x82, 0xb3, 0xc5, 0xf7, 0xb4, 0xa0, 0x07, 0xea, 0xa1, 0x98, 0x6a, 0x30, 0xb7, 0x9f, 0x44, 0xc8, 0x3b, 0xd5, 0x2e, 0x53, 0x7c, 0xcf, 0x9a, 0x35, 0x77, 0x2f, 0xab, 0x5b, 0xa9, 0xfa, 0xf0, 0xde, 0xcb, 0xe3, 0x47, 0x63, 0xb5, 0xae, 0x28, 0x09, 0x84, 0xac, 0x7f, 0xf2, 0x7f, 0xb8, 0xdb, 0xad, 0x57, 0x21, 0x8c, 0x36, 0x4b, 0x39, 0xdc, 0x2a, 0x03, 0xb5, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1800 = { .name = "ecdsa_brainpoolp384r1_sha384_1800", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1800_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1800_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1800_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1801 for ECDSA, tcId is 271 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1801_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1801_msg[] = { 0x34, 0x33, 0x32, 0x36, 0x34, 0x34, 0x30, 0x39, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1801_sig[] = { 0x2e, 0xbc, 0xd9, 0x4d, 0x17, 0x12, 0x24, 0x42, 0xd3, 0xe7, 0xbd, 0x12, 0xc4, 0xb6, 0x09, 0xdb, 0xce, 0xef, 0x69, 0xb3, 0x24, 0x60, 0x92, 0xe4, 0xad, 0x0c, 0x83, 0xd6, 0x02, 0xc2, 0x51, 0x6e, 0x09, 0x16, 0x9b, 0x59, 0x2f, 0xdf, 0x61, 0xa7, 0xe8, 0x81, 0xe2, 0x62, 0xbf, 0x49, 0x57, 0x14, 0x70, 0x39, 0x2c, 0xd4, 0xe5, 0xe1, 0x76, 0x06, 0x60, 0x8c, 0x2e, 0x4f, 0xff, 0xf7, 0xa9, 0xc0, 0xe9, 0x17, 0x11, 0x98, 0x91, 0x5c, 0xf7, 0xe5, 0x06, 0x33, 0x26, 0x3d, 0x7e, 0x07, 0x19, 0x54, 0xf1, 0x2e, 0xbb, 0x1a, 0x4f, 0x4a, 0xcc, 0x76, 0x83, 0xa1, 0x60, 0xd6, 0x4d, 0xda, 0x3b, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1801 = { .name = "ecdsa_brainpoolp384r1_sha384_1801", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1801_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1801_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1801_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1802 for ECDSA, tcId is 272 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1802_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1802_msg[] = { 0x32, 0x33, 0x37, 0x36, 0x34, 0x33, 0x37, 0x35, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1802_sig[] = { 0x4d, 0x71, 0x91, 0x59, 0x6f, 0x50, 0xb8, 0x30, 0x9e, 0x14, 0x90, 0x89, 0x5e, 0x62, 0xb1, 0x6c, 0x41, 0x5c, 0x1f, 0x7b, 0x50, 0xd2, 0xa4, 0x26, 0x09, 0x04, 0xbc, 0x5b, 0x7b, 0xff, 0xde, 0x4f, 0x92, 0x68, 0x7b, 0x02, 0x9f, 0x32, 0x6f, 0x4b, 0x48, 0xe6, 0xfd, 0x8d, 0x1f, 0x19, 0xee, 0x50, 0x0a, 0x54, 0x51, 0x5f, 0xad, 0x47, 0xbb, 0x08, 0xe5, 0x86, 0x69, 0x7f, 0x28, 0xe2, 0xbb, 0xf9, 0x8d, 0x75, 0x75, 0xc7, 0xbb, 0x91, 0x1b, 0xd7, 0x4d, 0xb3, 0xd9, 0xaa, 0x84, 0x84, 0x75, 0xbb, 0xdd, 0xac, 0x66, 0x18, 0x1e, 0xfd, 0x63, 0xa2, 0x49, 0x18, 0xde, 0xc2, 0xdd, 0x01, 0xa2, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1802 = { .name = "ecdsa_brainpoolp384r1_sha384_1802", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1802_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1802_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1802_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1803 for ECDSA, tcId is 273 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1803_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1803_msg[] = { 0x38, 0x36, 0x30, 0x33, 0x39, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1803_sig[] = { 0x6f, 0xde, 0xfa, 0x7d, 0x91, 0x2c, 0xd2, 0xc3, 0x0c, 0xf1, 0x2b, 0xae, 0x60, 0x8a, 0xb8, 0x7d, 0xe1, 0x2d, 0x49, 0xee, 0x08, 0x4d, 0x23, 0x90, 0x81, 0xe8, 0x92, 0x46, 0xe4, 0x93, 0x9d, 0x60, 0x71, 0xdf, 0xd1, 0x1f, 0x74, 0x01, 0x89, 0x4a, 0xee, 0x9c, 0x13, 0xd1, 0x10, 0x13, 0xec, 0x75, 0x79, 0x37, 0x49, 0x5d, 0xc0, 0xa3, 0xa3, 0xd6, 0x6c, 0x43, 0x94, 0x5d, 0x99, 0xcd, 0x98, 0xdc, 0x84, 0x2a, 0xe8, 0x67, 0x7f, 0x14, 0xd6, 0x49, 0xb2, 0x2c, 0x1e, 0x7e, 0xc1, 0x48, 0x57, 0xa0, 0x56, 0x39, 0xec, 0x1f, 0xe0, 0x8b, 0xe2, 0x28, 0x11, 0x28, 0x32, 0xb5, 0xe3, 0x2f, 0xcf, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1803 = { .name = "ecdsa_brainpoolp384r1_sha384_1803", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1803_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1803_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1803_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1804 for ECDSA, tcId is 274 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1804_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1804_msg[] = { 0x35, 0x38, 0x30, 0x37, 0x37, 0x37, 0x33, 0x39, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1804_sig[] = { 0x05, 0x86, 0x7e, 0x5f, 0x8a, 0xbd, 0x70, 0x40, 0x07, 0xb9, 0x8c, 0x1a, 0x8f, 0x2c, 0x69, 0xf4, 0xee, 0xa1, 0x4c, 0xb4, 0xa4, 0x21, 0x02, 0x62, 0xb4, 0x74, 0xc4, 0xeb, 0xa9, 0x07, 0x33, 0x74, 0xca, 0xb5, 0xdd, 0x1b, 0xb5, 0xc7, 0x81, 0xdf, 0x04, 0x0d, 0xf3, 0x2b, 0xf7, 0x94, 0x31, 0x87, 0x68, 0xaf, 0xdc, 0x70, 0xaa, 0xca, 0x5f, 0x1b, 0x36, 0xef, 0x32, 0x59, 0x3d, 0x88, 0x9e, 0x37, 0x7d, 0x3f, 0x83, 0xb3, 0x29, 0x38, 0x6c, 0x98, 0x2a, 0xcf, 0x9b, 0x40, 0x1b, 0x7c, 0xd2, 0x6b, 0x75, 0xa5, 0x38, 0x93, 0x95, 0xc1, 0x5d, 0x50, 0x7d, 0x7d, 0x67, 0x02, 0x3d, 0x6d, 0x07, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1804 = { .name = "ecdsa_brainpoolp384r1_sha384_1804", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1804_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1804_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1804_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1805 for ECDSA, tcId is 275 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1805_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1805_msg[] = { 0x35, 0x37, 0x31, 0x38, 0x36, 0x36, 0x38, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1805_sig[] = { 0x88, 0xd5, 0xf4, 0x06, 0x9b, 0xe3, 0x1f, 0xc5, 0x8a, 0x38, 0xfd, 0x8d, 0xe9, 0xdb, 0xc7, 0xfe, 0xc6, 0x40, 0x65, 0xde, 0x42, 0x68, 0xd4, 0x1c, 0x8d, 0xb7, 0x99, 0xd0, 0xa2, 0x0a, 0xe1, 0x04, 0x92, 0xc7, 0xe8, 0x0b, 0x30, 0x03, 0x4b, 0x7f, 0x32, 0x1c, 0xd4, 0x9b, 0x2b, 0x9c, 0x3f, 0x33, 0x09, 0x91, 0x2b, 0x63, 0xc4, 0xf8, 0x8b, 0xe7, 0x72, 0x11, 0xab, 0x53, 0x3c, 0xf1, 0x3f, 0x2b, 0x63, 0x47, 0x20, 0x06, 0xaa, 0xb5, 0xe7, 0x0d, 0xf2, 0x1b, 0x87, 0x30, 0x1f, 0xe5, 0x13, 0x9a, 0xae, 0xd4, 0x84, 0x5a, 0x42, 0x1b, 0x0f, 0x07, 0x6f, 0x96, 0x8a, 0xe4, 0xb3, 0x24, 0x90, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1805 = { .name = "ecdsa_brainpoolp384r1_sha384_1805", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1805_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1805_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1805_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1806 for ECDSA, tcId is 276 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1806_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1806_msg[] = { 0x38, 0x36, 0x37, 0x37, 0x33, 0x30, 0x39, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1806_sig[] = { 0x75, 0x0e, 0x5b, 0xae, 0xef, 0x69, 0x34, 0xb3, 0x65, 0x12, 0x57, 0x2d, 0xd3, 0x30, 0xfa, 0x88, 0x35, 0x3e, 0x32, 0x1a, 0x52, 0x13, 0x63, 0xbd, 0xa8, 0x89, 0xfd, 0x25, 0x7e, 0x4e, 0xa4, 0x02, 0x4f, 0xb5, 0xf9, 0x2e, 0x39, 0xf2, 0x65, 0xd7, 0x89, 0xd2, 0xa9, 0x49, 0xdd, 0x91, 0x84, 0x3b, 0x18, 0xb8, 0x46, 0x7c, 0x63, 0x89, 0x25, 0x14, 0x84, 0x7c, 0x3b, 0x98, 0xee, 0x27, 0x9e, 0x3f, 0x41, 0xb3, 0x91, 0xa4, 0x79, 0x75, 0xd7, 0xf4, 0xd6, 0x66, 0x93, 0x85, 0xac, 0x0b, 0xd2, 0xe3, 0x22, 0xf8, 0x86, 0x08, 0x87, 0x03, 0x10, 0xb6, 0x35, 0xad, 0x28, 0x25, 0x6d, 0x8d, 0xca, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1806 = { .name = "ecdsa_brainpoolp384r1_sha384_1806", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1806_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1806_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1806_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1807 for ECDSA, tcId is 277 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1807_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1807_msg[] = { 0x32, 0x34, 0x37, 0x35, 0x35, 0x31, 0x35, 0x30, 0x36, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1807_sig[] = { 0x8b, 0xb6, 0x56, 0x97, 0x37, 0xc5, 0xe0, 0x1d, 0x25, 0x96, 0xd3, 0xba, 0x5d, 0x01, 0x89, 0x0f, 0x23, 0x11, 0x36, 0xc6, 0x9c, 0x6c, 0x9f, 0x42, 0xa9, 0x44, 0xf0, 0x66, 0x02, 0x29, 0x6b, 0x11, 0x59, 0xf2, 0x9f, 0xc1, 0xd9, 0x8b, 0x68, 0xbe, 0x06, 0xf3, 0x05, 0x2c, 0x5f, 0xa8, 0x61, 0x9b, 0x2d, 0x1d, 0x4c, 0xcd, 0x79, 0xb0, 0x09, 0x98, 0xac, 0xf0, 0x3d, 0x34, 0x12, 0x88, 0x8f, 0x27, 0xd2, 0x74, 0xb8, 0x78, 0x87, 0x42, 0xbe, 0x27, 0xd7, 0x98, 0xdd, 0x7d, 0xb6, 0x54, 0xd9, 0x64, 0xfa, 0x4c, 0xde, 0x33, 0x84, 0xd8, 0x8c, 0x2a, 0x50, 0x24, 0x77, 0x92, 0xe8, 0x82, 0x0a, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1807 = { .name = "ecdsa_brainpoolp384r1_sha384_1807", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1807_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1807_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1807_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1808 for ECDSA, tcId is 278 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1808_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1808_msg[] = { 0x39, 0x37, 0x33, 0x31, 0x37, 0x36, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1808_sig[] = { 0x27, 0x7b, 0x8f, 0xe0, 0x06, 0x51, 0x99, 0x8c, 0xdc, 0xf8, 0xb4, 0xf4, 0x07, 0x95, 0xf4, 0x54, 0xe4, 0xdc, 0xa2, 0xfd, 0xc2, 0xc1, 0x0d, 0xce, 0x1f, 0xff, 0x8f, 0x0c, 0x85, 0x2a, 0xac, 0x0b, 0xf6, 0x18, 0x3b, 0x1a, 0xc3, 0xc3, 0x82, 0x67, 0x06, 0xc3, 0xe6, 0x59, 0x85, 0x41, 0x98, 0xa0, 0x0d, 0x71, 0xf3, 0xf3, 0xf6, 0x81, 0xfc, 0x39, 0x1c, 0x3c, 0xfd, 0xb8, 0x1b, 0x61, 0xeb, 0xa0, 0x15, 0x5c, 0xb4, 0xa8, 0xe9, 0xce, 0x80, 0x49, 0xcd, 0xf9, 0xb4, 0x59, 0xaa, 0xf2, 0x64, 0x52, 0x5f, 0xbb, 0x89, 0x3e, 0xaa, 0x71, 0x59, 0x3a, 0x96, 0x18, 0xc0, 0xf1, 0x17, 0xef, 0xd9, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1808 = { .name = "ecdsa_brainpoolp384r1_sha384_1808", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1808_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1808_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1808_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1809 for ECDSA, tcId is 279 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1809_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1809_msg[] = { 0x33, 0x36, 0x39, 0x38, 0x30, 0x39, 0x35, 0x31, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1809_sig[] = { 0x26, 0x9d, 0x14, 0xd9, 0x86, 0x7e, 0xd2, 0x34, 0x10, 0xca, 0xf2, 0x4f, 0x5f, 0x9f, 0x17, 0x1b, 0xc0, 0xe5, 0x2f, 0x00, 0x6d, 0x8d, 0x16, 0xc0, 0x2c, 0x81, 0xf1, 0xb4, 0xed, 0xba, 0x22, 0x2d, 0xe7, 0x35, 0x1a, 0xd7, 0x29, 0x43, 0xed, 0x09, 0xa2, 0xe7, 0xac, 0x17, 0x6a, 0x1b, 0x21, 0x56, 0x4a, 0xf9, 0x3b, 0x80, 0x0f, 0xbd, 0xca, 0x45, 0xac, 0x74, 0xcf, 0xd2, 0x2c, 0xba, 0x9a, 0x50, 0x87, 0x39, 0xf8, 0xfc, 0xf3, 0xce, 0x14, 0xe5, 0x5c, 0x39, 0xbc, 0x77, 0x0a, 0x14, 0x3f, 0x80, 0x99, 0x70, 0xe8, 0x36, 0x44, 0x7a, 0x45, 0x42, 0xd0, 0xbb, 0x36, 0x7d, 0xe6, 0x61, 0x2c, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1809 = { .name = "ecdsa_brainpoolp384r1_sha384_1809", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1809_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1809_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1809_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1810 for ECDSA, tcId is 280 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1810_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1810_msg[] = { 0x31, 0x30, 0x37, 0x35, 0x30, 0x32, 0x36, 0x38, 0x35, 0x37, 0x36, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1810_sig[] = { 0x40, 0x73, 0x1d, 0xbe, 0x64, 0x63, 0x6c, 0xd5, 0xef, 0x5d, 0x25, 0x60, 0xa2, 0x3f, 0x38, 0x91, 0xac, 0xcf, 0x0a, 0x53, 0x0a, 0x44, 0x6c, 0x6a, 0xd2, 0x13, 0xb4, 0xba, 0x7f, 0xf9, 0xcb, 0x50, 0x5a, 0xba, 0x93, 0x31, 0x83, 0x6a, 0xb8, 0xa9, 0x8f, 0xe5, 0x65, 0xe8, 0x66, 0xc8, 0x79, 0x79, 0x19, 0xeb, 0x3c, 0xf6, 0xb5, 0xfa, 0xf1, 0x1e, 0x97, 0x17, 0xd6, 0xd0, 0x44, 0x96, 0x24, 0xa5, 0x09, 0x35, 0x89, 0x36, 0xdd, 0x00, 0x67, 0xff, 0xc1, 0x8f, 0x22, 0xe6, 0xbc, 0xbc, 0x6a, 0xa1, 0xdf, 0x3a, 0x45, 0xf1, 0x5a, 0xe7, 0x32, 0x19, 0x77, 0x90, 0xcc, 0x6f, 0xdb, 0x92, 0xc3, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1810 = { .name = "ecdsa_brainpoolp384r1_sha384_1810", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1810_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1810_msg, .msglen = 11, .sig = ecdsa_brainpoolp384r1_sha384_1810_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1811 for ECDSA, tcId is 281 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1811_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1811_msg[] = { 0x38, 0x36, 0x39, 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1811_sig[] = { 0x84, 0x33, 0x5a, 0x1c, 0x93, 0xd9, 0x96, 0xe3, 0x6c, 0x22, 0xae, 0xe4, 0xf3, 0x3c, 0xef, 0xf7, 0xc6, 0xff, 0x08, 0x8c, 0xd5, 0x60, 0x4d, 0xb8, 0x27, 0x50, 0x98, 0x60, 0x06, 0x66, 0x14, 0x46, 0x07, 0xbc, 0xfa, 0xc7, 0xe6, 0x95, 0xf2, 0xf7, 0x9a, 0x77, 0x56, 0x28, 0xa1, 0xab, 0x6f, 0x82, 0x28, 0xca, 0x8c, 0xdc, 0x6b, 0xd7, 0x72, 0xcc, 0x9f, 0x24, 0xc1, 0x4e, 0xf7, 0x13, 0x32, 0xf1, 0x92, 0xfe, 0xfd, 0x52, 0xd0, 0x3b, 0x8d, 0xf9, 0x9a, 0x25, 0x7f, 0x31, 0x5e, 0x0f, 0x6f, 0x32, 0x96, 0xe4, 0xa4, 0x5f, 0xd1, 0x82, 0xf0, 0x6a, 0x3d, 0x2b, 0xa2, 0x77, 0x9c, 0x10, 0xa4, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1811 = { .name = "ecdsa_brainpoolp384r1_sha384_1811", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1811_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1811_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1811_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1812 for ECDSA, tcId is 282 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1812_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1812_msg[] = { 0x32, 0x31, 0x37, 0x34, 0x36, 0x35, 0x35, 0x34, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1812_sig[] = { 0x52, 0x0b, 0x74, 0xd5, 0xd3, 0x3b, 0xa2, 0x89, 0xff, 0xcc, 0xf5, 0x18, 0x7a, 0x60, 0x00, 0x38, 0x0c, 0x31, 0x30, 0x4b, 0x1d, 0x6f, 0x8f, 0xb5, 0x4d, 0x88, 0x0c, 0x19, 0x08, 0xfb, 0xd8, 0xdf, 0x5e, 0x08, 0x57, 0xff, 0xa8, 0xca, 0x34, 0x4f, 0xf7, 0xa4, 0xfa, 0x9b, 0xb6, 0xed, 0x5f, 0x38, 0x03, 0xae, 0x87, 0x7b, 0xc1, 0xf0, 0xbc, 0x8e, 0x7c, 0x90, 0x39, 0x38, 0x1f, 0x0b, 0x66, 0xa5, 0x20, 0x47, 0x16, 0x3c, 0xb7, 0x8e, 0xab, 0xd7, 0xa3, 0xdb, 0xfc, 0x53, 0x8b, 0x42, 0x4f, 0xef, 0x31, 0xd1, 0xe0, 0xaf, 0x76, 0xc0, 0xe1, 0xbe, 0xd7, 0x93, 0x6a, 0x88, 0x33, 0x8f, 0x1b, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1812 = { .name = "ecdsa_brainpoolp384r1_sha384_1812", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1812_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1812_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1812_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1813 for ECDSA, tcId is 283 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1813_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1813_msg[] = { 0x36, 0x34, 0x34, 0x35, 0x35, 0x30, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1813_sig[] = { 0x59, 0x49, 0x2f, 0x3e, 0x58, 0xb5, 0xba, 0xd9, 0x41, 0x21, 0x05, 0xb4, 0x82, 0x4d, 0xbe, 0x93, 0x9d, 0x7c, 0xb2, 0x86, 0x4a, 0x27, 0x68, 0x06, 0x20, 0xac, 0x10, 0x72, 0x85, 0x50, 0x5c, 0x42, 0xeb, 0xfa, 0xeb, 0x15, 0x4c, 0x4e, 0xb6, 0xd9, 0xe6, 0x78, 0x3a, 0x12, 0xab, 0xaa, 0x35, 0xaa, 0x8b, 0x41, 0x14, 0xca, 0xf3, 0x26, 0x0e, 0x50, 0x96, 0x58, 0x24, 0x3a, 0x5f, 0x41, 0x90, 0xe4, 0x0c, 0x26, 0x8d, 0x01, 0x25, 0x78, 0xdf, 0x86, 0x86, 0x6a, 0x4e, 0x95, 0x03, 0xc8, 0x49, 0x08, 0x04, 0x88, 0x2d, 0x08, 0x12, 0xaa, 0x10, 0x5e, 0x24, 0x5c, 0x8c, 0x46, 0xfb, 0x36, 0x48, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1813 = { .name = "ecdsa_brainpoolp384r1_sha384_1813", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1813_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1813_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1813_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1814 for ECDSA, tcId is 284 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1814_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1814_msg[] = { 0x35, 0x33, 0x32, 0x38, 0x31, 0x38, 0x33, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1814_sig[] = { 0x42, 0x1d, 0xc8, 0x54, 0x47, 0x9a, 0xa6, 0x11, 0x88, 0x7a, 0xa3, 0x68, 0x9b, 0x63, 0x27, 0x6f, 0xbd, 0xc1, 0x6e, 0xc7, 0xd3, 0xdc, 0xa4, 0x49, 0xb4, 0x82, 0xdd, 0x27, 0xb1, 0x40, 0x3c, 0x91, 0x1e, 0xf6, 0x26, 0x5a, 0xd6, 0x25, 0x27, 0x9e, 0x9d, 0x83, 0xce, 0x75, 0x34, 0xf4, 0xac, 0x3f, 0x28, 0x52, 0xe1, 0x6b, 0x42, 0x76, 0x21, 0x5a, 0x62, 0xeb, 0xcb, 0xcf, 0xfa, 0xdd, 0xbd, 0xb2, 0x35, 0x8d, 0xce, 0xa7, 0x08, 0x49, 0x48, 0xbc, 0x94, 0x8f, 0x9b, 0x3d, 0x0f, 0x91, 0x69, 0x3a, 0xba, 0x66, 0x36, 0x2d, 0x4a, 0x2c, 0xec, 0x70, 0xf7, 0x95, 0x2e, 0x37, 0x48, 0x86, 0x21, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1814 = { .name = "ecdsa_brainpoolp384r1_sha384_1814", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1814_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1814_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1814_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1815 for ECDSA, tcId is 285 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1815_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1815_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x30, 0x37, 0x36, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1815_sig[] = { 0x49, 0x11, 0x0e, 0x41, 0x3a, 0xa3, 0xe0, 0x2f, 0xc0, 0x59, 0x37, 0xd1, 0x00, 0xae, 0x4d, 0xb1, 0x4c, 0xf3, 0xf0, 0x03, 0x8b, 0x38, 0x67, 0x9a, 0x4a, 0xa2, 0x97, 0xb1, 0x1f, 0x9c, 0x47, 0xf7, 0xdf, 0x53, 0x8d, 0xf8, 0xce, 0xe3, 0x0e, 0xfd, 0xa4, 0xdd, 0xab, 0x2c, 0xc5, 0x1a, 0x6b, 0x0f, 0x01, 0x8a, 0x09, 0xa1, 0x8e, 0x1e, 0x79, 0x83, 0xe5, 0x2b, 0x8e, 0x6c, 0xc8, 0xda, 0x9c, 0x6d, 0x71, 0x55, 0xc5, 0x40, 0x90, 0x82, 0xf6, 0x95, 0x87, 0x42, 0x09, 0x06, 0xb7, 0x5c, 0xb5, 0x15, 0x7d, 0x37, 0x58, 0xe9, 0x92, 0xb2, 0x23, 0xeb, 0x7e, 0x9c, 0x27, 0x4f, 0xbf, 0xf4, 0xa9, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1815 = { .name = "ecdsa_brainpoolp384r1_sha384_1815", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1815_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1815_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1815_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 285 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1816 for ECDSA, tcId is 286 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1816_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1816_msg[] = { 0x31, 0x35, 0x33, 0x32, 0x38, 0x34, 0x32, 0x32, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1816_sig[] = { 0x88, 0x4c, 0xf6, 0x4c, 0xe7, 0x26, 0xd5, 0x75, 0x8e, 0xfb, 0x9f, 0x2f, 0x35, 0xc9, 0x2d, 0xcc, 0x60, 0x63, 0xb0, 0x1b, 0x74, 0x32, 0xfa, 0xff, 0xd0, 0xf8, 0x18, 0x6a, 0xc1, 0x77, 0xe3, 0x11, 0x29, 0x63, 0x3a, 0x64, 0x8a, 0x1a, 0x69, 0x86, 0x14, 0x83, 0x84, 0xa7, 0xd1, 0xc4, 0xd3, 0xf5, 0x01, 0x85, 0x07, 0x18, 0xd7, 0xa2, 0xd4, 0x1e, 0xb9, 0x89, 0x2f, 0x54, 0x40, 0xef, 0x4b, 0x9f, 0xc8, 0xb9, 0x96, 0xd3, 0xb6, 0x74, 0x2e, 0xae, 0xc3, 0xd4, 0x0b, 0x10, 0xc5, 0xca, 0xa8, 0x90, 0xb9, 0xa8, 0x53, 0xe1, 0xd2, 0x11, 0xf7, 0xfd, 0x11, 0x78, 0x11, 0x6a, 0x9e, 0x7c, 0x5f, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1816 = { .name = "ecdsa_brainpoolp384r1_sha384_1816", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1816_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1816_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1816_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 286 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1817 for ECDSA, tcId is 287 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1817_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1817_msg[] = { 0x31, 0x35, 0x36, 0x37, 0x31, 0x37, 0x37, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1817_sig[] = { 0x0d, 0x9d, 0xbf, 0x8e, 0xbc, 0xf8, 0x0f, 0x25, 0x6e, 0xe2, 0xd1, 0xf4, 0xfb, 0x45, 0xcd, 0x54, 0x33, 0x81, 0xf6, 0x27, 0x5c, 0x4c, 0x10, 0xaf, 0xa8, 0x52, 0x08, 0x82, 0x8e, 0x27, 0xe6, 0xfb, 0x3d, 0xf3, 0xca, 0x74, 0x91, 0x89, 0x9c, 0x68, 0x30, 0x7d, 0xb6, 0x6a, 0x50, 0x5c, 0x7a, 0x90, 0x1f, 0x0d, 0xb2, 0x6d, 0xc6, 0x91, 0x68, 0x08, 0x32, 0xb3, 0xe3, 0x59, 0x90, 0x5e, 0x5e, 0x63, 0x2b, 0xc9, 0xea, 0xef, 0xd1, 0xd5, 0xeb, 0x4f, 0x05, 0x8a, 0x0d, 0x88, 0xf8, 0xf2, 0xdf, 0x0d, 0x1a, 0x60, 0xc2, 0xf7, 0x71, 0x72, 0xca, 0xf6, 0x55, 0x4b, 0x2d, 0x25, 0x6c, 0xce, 0x8c, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1817 = { .name = "ecdsa_brainpoolp384r1_sha384_1817", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1817_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1817_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1817_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 287 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1818 for ECDSA, tcId is 288 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1818_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1818_msg[] = { 0x34, 0x33, 0x30, 0x33, 0x30, 0x39, 0x31, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1818_sig[] = { 0x6f, 0xa1, 0x80, 0x2a, 0xc4, 0xc2, 0xe7, 0x9b, 0x8b, 0x5a, 0x47, 0x7b, 0x0a, 0x5f, 0xeb, 0xf6, 0x30, 0xc2, 0x9c, 0x08, 0x98, 0x41, 0x48, 0x4c, 0x1d, 0x56, 0x9d, 0xae, 0xdb, 0xf1, 0x3c, 0x0b, 0xdf, 0x79, 0x3d, 0x0a, 0x8f, 0x69, 0x15, 0xbd, 0xc6, 0x7d, 0xd1, 0x48, 0x08, 0x24, 0xa1, 0xce, 0x28, 0xb8, 0x06, 0x32, 0x58, 0x11, 0x1e, 0x32, 0xaa, 0x10, 0xaf, 0x0b, 0x20, 0x68, 0xc7, 0xf5, 0x4f, 0x0d, 0x5e, 0x9f, 0x02, 0xad, 0x39, 0xa4, 0x15, 0xc9, 0x17, 0x43, 0xd6, 0x44, 0x4c, 0x20, 0x15, 0x6c, 0x35, 0x92, 0xd2, 0xbc, 0xc2, 0x34, 0xf2, 0x65, 0xb4, 0x6a, 0x35, 0x86, 0x4e, 0x57, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1818 = { .name = "ecdsa_brainpoolp384r1_sha384_1818", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1818_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1818_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1818_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 288 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1819 for ECDSA, tcId is 289 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1819_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1819_msg[] = { 0x37, 0x37, 0x33, 0x35, 0x39, 0x31, 0x35, 0x35, 0x38, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1819_sig[] = { 0x3d, 0xc1, 0x36, 0x3d, 0xd0, 0x11, 0x9a, 0x50, 0x54, 0xaf, 0xd9, 0x94, 0x84, 0x02, 0x6a, 0x26, 0x92, 0x56, 0x7d, 0x2f, 0xbe, 0xeb, 0x4c, 0x6d, 0x80, 0xa3, 0x0d, 0x22, 0xf1, 0x66, 0xb6, 0x30, 0x45, 0x44, 0x24, 0x6a, 0x35, 0xba, 0x85, 0x4f, 0x85, 0x46, 0x01, 0x39, 0x7c, 0xe4, 0x5b, 0xd5, 0x2b, 0x02, 0x0a, 0x77, 0x09, 0x01, 0x10, 0x8c, 0xe6, 0xdd, 0xf6, 0x91, 0x17, 0xa2, 0xe8, 0x07, 0x34, 0x78, 0x81, 0x71, 0x60, 0x4a, 0x8f, 0x05, 0x71, 0xdb, 0x61, 0xa4, 0xa8, 0xc3, 0xc4, 0xda, 0xe3, 0x3a, 0xf8, 0x41, 0xaf, 0xe4, 0xa9, 0x89, 0x23, 0x06, 0xb4, 0xf9, 0xec, 0xb1, 0x9b, 0x49, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1819 = { .name = "ecdsa_brainpoolp384r1_sha384_1819", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1819_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1819_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1819_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 289 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1820 for ECDSA, tcId is 290 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1820_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1820_msg[] = { 0x32, 0x34, 0x33, 0x39, 0x36, 0x36, 0x37, 0x34, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1820_sig[] = { 0x7b, 0x98, 0x4b, 0xfa, 0x80, 0x7a, 0x8e, 0x9b, 0x0e, 0xef, 0x94, 0xed, 0x28, 0xc2, 0x4b, 0x04, 0xd4, 0x2e, 0x06, 0x64, 0xfb, 0xfc, 0x0e, 0xe1, 0xc1, 0xb5, 0x94, 0x5c, 0x8f, 0x0e, 0x97, 0xfd, 0xc5, 0x15, 0xfe, 0x09, 0xed, 0xd6, 0xcd, 0xaf, 0x7f, 0xef, 0x31, 0x51, 0xca, 0x40, 0x44, 0xdf, 0x4e, 0x87, 0x87, 0x41, 0x52, 0x9d, 0x7a, 0x90, 0x12, 0x5d, 0xeb, 0x8f, 0xa5, 0xfd, 0xab, 0x8e, 0x9f, 0x7d, 0x25, 0x4b, 0x8a, 0xa4, 0x8a, 0x59, 0xa2, 0xf3, 0x35, 0xc7, 0xd4, 0x34, 0x02, 0xf2, 0x59, 0x0f, 0x10, 0x82, 0xc7, 0x6b, 0x22, 0x63, 0x58, 0x2c, 0x9d, 0xd9, 0x8c, 0xa6, 0x86, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1820 = { .name = "ecdsa_brainpoolp384r1_sha384_1820", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1820_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1820_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1820_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 290 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1821 for ECDSA, tcId is 291 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1821_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1821_msg[] = { 0x34, 0x33, 0x32, 0x37, 0x36, 0x30, 0x32, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1821_sig[] = { 0x87, 0x73, 0x15, 0x25, 0xe7, 0x87, 0x23, 0x9a, 0x23, 0x2b, 0xa3, 0xc2, 0x4b, 0x9c, 0xae, 0xff, 0x3c, 0xe5, 0x91, 0xc1, 0x68, 0x22, 0x7b, 0x8e, 0x28, 0x64, 0x14, 0x0b, 0x1d, 0x7c, 0x0c, 0x50, 0xa7, 0xd5, 0xfa, 0x9f, 0x4f, 0x64, 0x68, 0xbc, 0xa8, 0x17, 0x45, 0x8c, 0x17, 0x1a, 0xa4, 0x47, 0x67, 0x05, 0x98, 0xb6, 0xe5, 0xdf, 0xba, 0xab, 0x3b, 0x62, 0x2b, 0xad, 0x9b, 0x5b, 0x6a, 0xe4, 0x2c, 0x9d, 0x27, 0xbd, 0x45, 0xb1, 0xb0, 0xb8, 0x92, 0xaf, 0x9f, 0xd9, 0x73, 0x9d, 0xd5, 0x04, 0x14, 0xe8, 0xee, 0xde, 0x3c, 0x6d, 0xc1, 0x0f, 0xc2, 0x24, 0x46, 0x3b, 0x44, 0xc8, 0xc2, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1821 = { .name = "ecdsa_brainpoolp384r1_sha384_1821", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1821_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1821_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1821_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 291 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1822 for ECDSA, tcId is 292 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1822_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1822_msg[] = { 0x32, 0x39, 0x33, 0x32, 0x30, 0x30, 0x32, 0x35, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1822_sig[] = { 0x19, 0x01, 0xd0, 0xd8, 0x61, 0x20, 0x5c, 0xc3, 0xe3, 0xf4, 0xa1, 0x89, 0xb8, 0x79, 0xee, 0x24, 0x64, 0x86, 0xf0, 0xcf, 0xdc, 0x48, 0x1d, 0x63, 0x72, 0x73, 0x84, 0xfe, 0xed, 0xc4, 0x6c, 0x8b, 0xad, 0xdf, 0x89, 0x1a, 0x6e, 0x6e, 0xab, 0x6b, 0xed, 0xe4, 0xe4, 0x6b, 0xbf, 0xf1, 0x64, 0x96, 0x40, 0x17, 0xc9, 0xed, 0xda, 0xea, 0x31, 0x12, 0xf2, 0x6f, 0x7c, 0x6e, 0xe4, 0x72, 0xee, 0x19, 0x83, 0xd7, 0xa2, 0x96, 0xa7, 0x40, 0x22, 0x95, 0x79, 0x4f, 0xdd, 0xd9, 0xe2, 0x67, 0xfe, 0x62, 0xd8, 0x5b, 0x07, 0xb9, 0x9e, 0x81, 0xea, 0x51, 0x3e, 0xca, 0x8d, 0x1a, 0x67, 0xe7, 0x05, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1822 = { .name = "ecdsa_brainpoolp384r1_sha384_1822", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1822_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1822_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1822_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 292 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1823 for ECDSA, tcId is 293 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1823_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1823_msg[] = { 0x36, 0x34, 0x30, 0x39, 0x38, 0x37, 0x37, 0x32, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1823_sig[] = { 0x04, 0x14, 0x3d, 0x73, 0xf1, 0x40, 0xfe, 0xba, 0xc8, 0xfd, 0x4d, 0x67, 0x62, 0xb9, 0xa5, 0x5b, 0xc9, 0x32, 0x64, 0xcc, 0x33, 0x72, 0xbf, 0x16, 0x61, 0xb3, 0x5a, 0x4b, 0x11, 0xbe, 0x9a, 0xf7, 0x91, 0x0d, 0x3a, 0xa8, 0xe4, 0xf5, 0xcb, 0x5e, 0xaf, 0xe1, 0xde, 0x3a, 0x9d, 0x96, 0x95, 0x77, 0x59, 0x66, 0xb4, 0xe1, 0xe9, 0xef, 0x78, 0xe5, 0x23, 0x91, 0x6d, 0xbe, 0xa3, 0x7e, 0x03, 0xec, 0xc3, 0x56, 0xf4, 0x66, 0x44, 0x1d, 0xc4, 0x5b, 0x9b, 0x98, 0xfe, 0x6d, 0x09, 0xaf, 0x83, 0xe7, 0xd5, 0x7a, 0x86, 0x1c, 0x5d, 0x2c, 0xf9, 0x4b, 0xf0, 0xb8, 0x7f, 0x62, 0x75, 0x2b, 0x28, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1823 = { .name = "ecdsa_brainpoolp384r1_sha384_1823", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1823_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1823_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1823_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 293 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1824 for ECDSA, tcId is 294 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1824_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1824_msg[] = { 0x36, 0x30, 0x37, 0x35, 0x36, 0x39, 0x30, 0x34, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1824_sig[] = { 0x5d, 0x24, 0xa6, 0xcb, 0x0a, 0x9f, 0x7f, 0x8b, 0x9f, 0x8d, 0x72, 0xda, 0x98, 0x9f, 0xcb, 0xe8, 0x5c, 0x94, 0x48, 0xb4, 0x25, 0xa3, 0x68, 0x20, 0x7f, 0xce, 0x84, 0x21, 0xe5, 0xa6, 0x0f, 0x02, 0x91, 0x84, 0xf1, 0x86, 0x11, 0xb9, 0xa5, 0xa1, 0xeb, 0x66, 0xd0, 0x54, 0xd3, 0x60, 0x57, 0xda, 0x32, 0xb8, 0xa4, 0xd4, 0xac, 0xa1, 0x7e, 0x83, 0x35, 0xd8, 0x4f, 0x2a, 0x68, 0xd7, 0x4f, 0x38, 0xd8, 0xcc, 0xe5, 0x29, 0x7e, 0xfe, 0x9e, 0x6d, 0x0e, 0x1a, 0x8e, 0x5b, 0xed, 0x1b, 0x57, 0x59, 0xbc, 0xb7, 0x3c, 0xff, 0x28, 0x06, 0x29, 0x63, 0xa2, 0x8b, 0xbc, 0x1c, 0x57, 0x1e, 0x3e, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1824 = { .name = "ecdsa_brainpoolp384r1_sha384_1824", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1824_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1824_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1824_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 294 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1825 for ECDSA, tcId is 295 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1825_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1825_msg[] = { 0x32, 0x33, 0x32, 0x31, 0x36, 0x32, 0x33, 0x31, 0x33, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1825_sig[] = { 0x1d, 0x10, 0xc1, 0xec, 0x20, 0x3f, 0xa0, 0x5d, 0xee, 0xd6, 0x26, 0x44, 0xb8, 0x09, 0x15, 0x0c, 0xd5, 0xe3, 0xfa, 0x15, 0xc9, 0x12, 0x91, 0x56, 0xfb, 0xc0, 0x47, 0x77, 0x42, 0x32, 0x8d, 0x8d, 0x35, 0xb1, 0xc4, 0xca, 0x8b, 0xaa, 0x61, 0x38, 0xe2, 0xe1, 0x29, 0x36, 0xa0, 0xf4, 0xc3, 0x32, 0x4a, 0x02, 0x9b, 0xb5, 0x2d, 0xdf, 0xb1, 0x71, 0xe4, 0xb1, 0x25, 0xd3, 0x32, 0x6d, 0xee, 0xc4, 0x88, 0xcc, 0x9f, 0x6f, 0x2b, 0x36, 0xd0, 0x51, 0xa3, 0x5d, 0x75, 0xc1, 0xde, 0x4b, 0x7a, 0xbd, 0x17, 0x8c, 0x7d, 0x43, 0x90, 0xe5, 0x11, 0xf1, 0x4d, 0x58, 0xf4, 0x9b, 0xae, 0xf6, 0x2d, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1825 = { .name = "ecdsa_brainpoolp384r1_sha384_1825", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1825_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1825_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1825_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 295 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1826 for ECDSA, tcId is 296 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1826_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1826_msg[] = { 0x36, 0x34, 0x31, 0x30, 0x31, 0x35, 0x32, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1826_sig[] = { 0x2d, 0xcd, 0xa3, 0x11, 0x89, 0xd8, 0xd1, 0x79, 0xf7, 0xde, 0xff, 0x20, 0x8a, 0xea, 0x8b, 0xdf, 0xe0, 0xcb, 0x08, 0xa6, 0xda, 0x46, 0xf6, 0x63, 0xc5, 0xca, 0x64, 0x9c, 0x84, 0xd8, 0xfe, 0xc9, 0xc4, 0x49, 0x59, 0x21, 0xc7, 0x79, 0x1d, 0x32, 0xac, 0xa4, 0x25, 0x57, 0xc3, 0xbf, 0x65, 0x8b, 0x67, 0x53, 0x6e, 0x33, 0x64, 0x28, 0xbd, 0xdf, 0xb0, 0x86, 0x2b, 0xff, 0x5b, 0xf5, 0xd5, 0xb1, 0x69, 0x4b, 0x82, 0xc1, 0xe1, 0x48, 0x54, 0x98, 0xe1, 0x4f, 0xe5, 0xc8, 0x8f, 0x75, 0xa9, 0xd7, 0xf5, 0x20, 0x11, 0x5a, 0x35, 0x70, 0x3c, 0xc3, 0x0b, 0xa0, 0xce, 0x97, 0x38, 0x15, 0x18, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1826 = { .name = "ecdsa_brainpoolp384r1_sha384_1826", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1826_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1826_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1826_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 296 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1827 for ECDSA, tcId is 297 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1827_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1827_msg[] = { 0x38, 0x33, 0x37, 0x32, 0x38, 0x35, 0x37, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1827_sig[] = { 0x2c, 0xb8, 0x1c, 0x03, 0xc3, 0xce, 0xfc, 0x41, 0x7f, 0xc6, 0x0f, 0x19, 0xb7, 0x40, 0xe2, 0x30, 0x98, 0x2e, 0x0b, 0x1c, 0x68, 0xce, 0xd1, 0x21, 0x21, 0x30, 0x0d, 0x53, 0x3f, 0x48, 0x55, 0x97, 0xd1, 0xc5, 0x32, 0xd8, 0x7b, 0x23, 0x5d, 0x13, 0x6b, 0xe3, 0xa4, 0x3d, 0xd8, 0x58, 0x82, 0xca, 0x48, 0xa0, 0x4c, 0x5d, 0x8d, 0x86, 0x7e, 0x88, 0x49, 0xbd, 0x3b, 0x98, 0x1f, 0x01, 0x06, 0x91, 0xf0, 0xe7, 0x42, 0x28, 0x82, 0x57, 0x3b, 0xd5, 0xbf, 0xcc, 0x33, 0xd6, 0xf0, 0x69, 0xa6, 0x22, 0xd1, 0x59, 0xca, 0x71, 0xbd, 0x56, 0x25, 0x02, 0xec, 0x00, 0x1b, 0xd2, 0xb4, 0x53, 0x71, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1827 = { .name = "ecdsa_brainpoolp384r1_sha384_1827", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1827_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1827_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1827_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 297 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1828 for ECDSA, tcId is 298 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1828_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1828_msg[] = { 0x33, 0x33, 0x32, 0x34, 0x37, 0x30, 0x34, 0x35, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1828_sig[] = { 0x15, 0x24, 0x64, 0x66, 0x8c, 0xef, 0xda, 0x80, 0xde, 0xa5, 0x23, 0x2d, 0x36, 0xbf, 0x24, 0x0a, 0xc3, 0x25, 0xe3, 0xca, 0x27, 0x9d, 0x8c, 0x8e, 0x04, 0x58, 0x30, 0x6b, 0x18, 0xfb, 0x12, 0xac, 0x1e, 0xd1, 0x65, 0x86, 0xd2, 0xd0, 0x75, 0x62, 0x69, 0x1c, 0x32, 0x05, 0xeb, 0xb4, 0xc7, 0x74, 0x3c, 0x38, 0x55, 0x67, 0x26, 0x92, 0x79, 0xe9, 0xbc, 0x5a, 0x2d, 0x07, 0x6a, 0xe9, 0xa0, 0x9e, 0x79, 0x0d, 0x1d, 0x8d, 0x08, 0x97, 0x88, 0x71, 0xdf, 0xc5, 0x86, 0x29, 0x8f, 0x56, 0x12, 0x1b, 0x4b, 0xc8, 0x4f, 0x78, 0x91, 0xe9, 0x1c, 0x3d, 0x76, 0x12, 0x24, 0x9d, 0x32, 0x0e, 0x36, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1828 = { .name = "ecdsa_brainpoolp384r1_sha384_1828", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1828_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1828_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1828_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 298 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1829 for ECDSA, tcId is 299 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1829_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1829_msg[] = { 0x31, 0x34, 0x30, 0x33, 0x39, 0x36, 0x36, 0x38, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1829_sig[] = { 0x05, 0x25, 0x95, 0xa1, 0x6d, 0x03, 0xa1, 0x38, 0xd6, 0x56, 0xde, 0xc7, 0x5a, 0x55, 0x40, 0xb8, 0x0f, 0x7e, 0xfe, 0x63, 0xb1, 0x93, 0x25, 0x0d, 0xe3, 0xbf, 0x81, 0x1f, 0xb2, 0x79, 0x9d, 0x7e, 0xb9, 0xa6, 0xae, 0x27, 0x4a, 0xc9, 0x53, 0xa8, 0xfb, 0xee, 0x74, 0x1d, 0xc1, 0xf5, 0x21, 0x00, 0x55, 0xf0, 0x59, 0x4f, 0xfa, 0x8d, 0x32, 0xb9, 0x1e, 0xea, 0x8b, 0xf0, 0x79, 0xb8, 0xf5, 0xa9, 0xf6, 0xb6, 0x08, 0x88, 0x50, 0x02, 0x25, 0x01, 0x60, 0x95, 0xb3, 0xe7, 0x11, 0x81, 0xff, 0x32, 0xdb, 0xab, 0xca, 0xa5, 0xe9, 0x92, 0xb4, 0x34, 0x09, 0xf5, 0x54, 0x67, 0xbb, 0xb6, 0x51, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1829 = { .name = "ecdsa_brainpoolp384r1_sha384_1829", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1829_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1829_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1829_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 299 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1830 for ECDSA, tcId is 300 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1830_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1830_msg[] = { 0x31, 0x32, 0x32, 0x37, 0x36, 0x30, 0x35, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1830_sig[] = { 0x29, 0x6f, 0x6b, 0x38, 0x51, 0x55, 0x32, 0x03, 0x82, 0x2d, 0x74, 0x17, 0xc1, 0x76, 0xeb, 0x3e, 0xc5, 0xe5, 0x56, 0xe3, 0x52, 0xd2, 0x4f, 0x28, 0x34, 0xbb, 0xdf, 0x70, 0x89, 0xa1, 0x68, 0xe6, 0x37, 0xf3, 0xe8, 0x09, 0x99, 0xe7, 0xa8, 0x61, 0x14, 0x66, 0xde, 0xc3, 0x70, 0x59, 0x00, 0x29, 0x64, 0xf7, 0x96, 0x94, 0x5f, 0x53, 0xfe, 0x0b, 0x27, 0xbb, 0xfb, 0xc5, 0xb5, 0xe9, 0x57, 0xd4, 0x13, 0x2c, 0x24, 0xc8, 0xb4, 0x62, 0x07, 0x5e, 0x82, 0x1b, 0xca, 0x24, 0x98, 0x3e, 0x8b, 0x8f, 0x85, 0x05, 0x31, 0x61, 0x7a, 0x42, 0xed, 0x31, 0x57, 0xdb, 0xe2, 0x0e, 0xab, 0x31, 0xcb, 0x28, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1830 = { .name = "ecdsa_brainpoolp384r1_sha384_1830", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1830_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1830_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1830_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 300 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1831 for ECDSA, tcId is 301 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1831_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1831_msg[] = { 0x34, 0x39, 0x35, 0x31, 0x34, 0x38, 0x38, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1831_sig[] = { 0x61, 0x93, 0x80, 0x55, 0x8c, 0xd1, 0x4a, 0xc9, 0x09, 0xb5, 0x65, 0xe0, 0x49, 0xaf, 0xa2, 0x24, 0xf7, 0xe7, 0x20, 0xaf, 0x1b, 0x22, 0xe1, 0x8b, 0x59, 0xcb, 0x05, 0x5f, 0xdc, 0x0f, 0x19, 0x1d, 0xef, 0xf4, 0x6a, 0x60, 0x50, 0xd1, 0x64, 0x2c, 0x56, 0x36, 0xc0, 0x32, 0xe9, 0xa7, 0xb4, 0x6b, 0x3c, 0x3f, 0xd2, 0xf2, 0x78, 0xf0, 0x79, 0x54, 0x93, 0x6c, 0x61, 0x83, 0xda, 0x8a, 0xaf, 0xc0, 0xf6, 0x13, 0x19, 0xd9, 0xa9, 0x0b, 0x7d, 0x3d, 0xd1, 0x1a, 0xbe, 0x13, 0xe5, 0x5e, 0x2a, 0xfa, 0x81, 0x51, 0x2f, 0x38, 0x4c, 0x13, 0x33, 0x1a, 0xf1, 0xd6, 0xfb, 0x4d, 0x7c, 0x69, 0x29, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1831 = { .name = "ecdsa_brainpoolp384r1_sha384_1831", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1831_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1831_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1831_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 301 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1832 for ECDSA, tcId is 302 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1832_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1832_msg[] = { 0x32, 0x34, 0x35, 0x32, 0x31, 0x32, 0x37, 0x30, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1832_sig[] = { 0x35, 0x4e, 0xe9, 0x49, 0xbf, 0xac, 0xa3, 0x5b, 0x19, 0x34, 0xe8, 0x8e, 0x03, 0x6b, 0x7f, 0x37, 0x60, 0x06, 0xb7, 0x98, 0x86, 0x13, 0x3d, 0x07, 0xff, 0x4a, 0xea, 0x3e, 0x05, 0x7e, 0xee, 0xee, 0xc0, 0xb9, 0x3f, 0x62, 0x99, 0x61, 0xc9, 0xac, 0x1e, 0xe1, 0x88, 0xc1, 0xc8, 0x7e, 0x2c, 0xd2, 0x1d, 0x02, 0x62, 0x4a, 0x91, 0x10, 0xf7, 0xba, 0xd6, 0x3e, 0xf7, 0x0e, 0x13, 0x4a, 0x7f, 0xf5, 0x72, 0xd7, 0x72, 0xaa, 0xe3, 0x0b, 0x4d, 0xe6, 0x79, 0x49, 0x4d, 0x00, 0xba, 0x9c, 0xd8, 0x35, 0xd4, 0xec, 0x84, 0x0d, 0x77, 0x2a, 0xf9, 0xf7, 0xc0, 0xb0, 0xda, 0xe8, 0xca, 0xd3, 0x83, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1832 = { .name = "ecdsa_brainpoolp384r1_sha384_1832", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1832_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1832_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1832_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 302 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1833 for ECDSA, tcId is 303 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1833_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1833_msg[] = { 0x31, 0x37, 0x33, 0x31, 0x35, 0x35, 0x30, 0x37, 0x30, 0x36, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1833_sig[] = { 0x88, 0x1e, 0x4e, 0xae, 0xff, 0x3d, 0x3e, 0xd1, 0x73, 0xda, 0xa1, 0x66, 0x22, 0x3d, 0x95, 0x83, 0xac, 0x8d, 0xd2, 0x8a, 0x31, 0x07, 0x65, 0xe7, 0x26, 0x1b, 0x0f, 0xf5, 0x2b, 0x2b, 0x3f, 0xaf, 0xee, 0x80, 0x5d, 0x61, 0x32, 0x58, 0xad, 0xd6, 0xd0, 0x56, 0x15, 0x7c, 0xcc, 0x40, 0xda, 0x73, 0x53, 0xbc, 0x28, 0xcf, 0xfd, 0xed, 0xab, 0x64, 0x52, 0x16, 0x1e, 0x05, 0x51, 0x71, 0x94, 0xe6, 0x6a, 0xfc, 0xc1, 0x4d, 0x10, 0x7d, 0x1e, 0x5d, 0xed, 0x72, 0x9f, 0x66, 0x1c, 0xd6, 0x63, 0x0d, 0x8b, 0x65, 0x81, 0xa8, 0xc2, 0x52, 0x51, 0xed, 0x7c, 0x4b, 0x5c, 0x36, 0x41, 0x29, 0xb5, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1833 = { .name = "ecdsa_brainpoolp384r1_sha384_1833", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1833_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1833_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1833_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 303 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1834 for ECDSA, tcId is 304 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1834_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1834_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x30, 0x36, 0x39, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1834_sig[] = { 0x17, 0x34, 0xf6, 0x66, 0xae, 0x2d, 0x87, 0x27, 0x1d, 0x9e, 0xde, 0x0d, 0xa5, 0x3b, 0xa8, 0xfc, 0x6c, 0xc2, 0xf8, 0x3e, 0xdc, 0x15, 0xdd, 0x26, 0xb9, 0x34, 0x9c, 0x9e, 0x4c, 0xc5, 0x38, 0x04, 0x34, 0xfc, 0x37, 0xb4, 0xff, 0xcf, 0xd9, 0xb7, 0x81, 0xf0, 0x71, 0x25, 0xd8, 0x5d, 0xd6, 0x60, 0x53, 0x1d, 0xae, 0xd4, 0xb8, 0x55, 0xe9, 0x11, 0x7a, 0x1e, 0xba, 0xfa, 0x23, 0x2f, 0x06, 0xb4, 0x7f, 0x50, 0xbe, 0x43, 0x86, 0xdb, 0x27, 0xff, 0xa5, 0xce, 0xca, 0x3e, 0x24, 0x7b, 0xe9, 0x54, 0x97, 0x56, 0x5c, 0x0c, 0x97, 0xb4, 0x37, 0xd3, 0x2d, 0x76, 0x94, 0x97, 0x4b, 0x22, 0xf2, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1834 = { .name = "ecdsa_brainpoolp384r1_sha384_1834", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1834_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1834_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1834_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 304 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1835 for ECDSA, tcId is 305 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1835_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1835_msg[] = { 0x34, 0x34, 0x31, 0x35, 0x34, 0x37, 0x36, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1835_sig[] = { 0x29, 0x69, 0x17, 0xdd, 0x85, 0x47, 0x5f, 0x8e, 0x7b, 0x6f, 0x85, 0x8e, 0x84, 0x74, 0x0b, 0xfa, 0x96, 0x79, 0x96, 0xe1, 0x73, 0xd6, 0x3d, 0x85, 0xaa, 0x08, 0xf1, 0xb6, 0xd3, 0x68, 0x30, 0x97, 0x39, 0x5e, 0x4a, 0x76, 0x48, 0xd1, 0x4e, 0x0b, 0xed, 0xbb, 0xe3, 0x66, 0x7d, 0x3d, 0xb4, 0xf5, 0x4d, 0x3e, 0x02, 0x79, 0xe9, 0x3b, 0xb1, 0x92, 0xf2, 0x44, 0x18, 0xa0, 0xa0, 0x5b, 0xf1, 0x72, 0x38, 0xdc, 0xf7, 0x8d, 0xbe, 0x83, 0x43, 0xe5, 0x5a, 0x66, 0x34, 0x18, 0x10, 0x6d, 0x7a, 0xe2, 0x28, 0x45, 0x94, 0x34, 0x59, 0xb2, 0x64, 0x1f, 0x45, 0xef, 0x4e, 0xd6, 0x06, 0xc5, 0x34, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1835 = { .name = "ecdsa_brainpoolp384r1_sha384_1835", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1835_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1835_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1835_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 305 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1836 for ECDSA, tcId is 306 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1836_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1836_msg[] = { 0x34, 0x32, 0x33, 0x39, 0x34, 0x34, 0x39, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1836_sig[] = { 0x47, 0xf3, 0x15, 0x0d, 0xb2, 0xf4, 0xfa, 0x59, 0x8e, 0xc2, 0x5d, 0xfe, 0x86, 0x4e, 0x11, 0xf9, 0x2b, 0xbd, 0xd5, 0xd6, 0x04, 0x6a, 0xef, 0x74, 0x4b, 0x79, 0x4f, 0x56, 0x70, 0x4e, 0x32, 0x3c, 0xde, 0x1e, 0xb6, 0xea, 0xbd, 0xc3, 0xf7, 0x2f, 0x89, 0x40, 0xd6, 0xa6, 0xfb, 0x30, 0xa1, 0xc8, 0x4e, 0x41, 0xa7, 0x4f, 0x6f, 0x6c, 0xd1, 0x95, 0x0d, 0xf4, 0x11, 0x33, 0xc5, 0x86, 0x08, 0xfb, 0xd8, 0xfb, 0x92, 0xb1, 0x7b, 0xd3, 0xbf, 0xbe, 0xb1, 0xc1, 0xcc, 0x77, 0x84, 0x89, 0xa4, 0xfc, 0xf8, 0x84, 0xe8, 0x00, 0x65, 0x46, 0xcb, 0x69, 0xfa, 0x9d, 0x34, 0x92, 0x65, 0x2d, 0x12, 0x55, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1836 = { .name = "ecdsa_brainpoolp384r1_sha384_1836", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1836_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1836_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1836_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 306 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1837 for ECDSA, tcId is 307 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1837_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1837_msg[] = { 0x34, 0x38, 0x30, 0x37, 0x36, 0x32, 0x30, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1837_sig[] = { 0x41, 0xb9, 0x03, 0xc2, 0x55, 0xe9, 0x0c, 0xb7, 0x19, 0xb7, 0x46, 0x84, 0xed, 0x97, 0x00, 0xa9, 0x24, 0x36, 0x2e, 0xcd, 0x1c, 0xc8, 0xce, 0x35, 0xb4, 0x4d, 0xaa, 0x1d, 0x41, 0xe3, 0xae, 0x2a, 0xd3, 0xdf, 0x2d, 0x01, 0xb9, 0x10, 0x03, 0x37, 0xef, 0xba, 0xb6, 0x8c, 0x53, 0xc6, 0xc7, 0x6b, 0x47, 0x1f, 0x45, 0x1c, 0x32, 0x40, 0x25, 0xdd, 0xbf, 0xbe, 0x35, 0x9f, 0x1d, 0x3a, 0xc5, 0xe4, 0x0f, 0x71, 0x2b, 0x4e, 0x8a, 0xe0, 0xbb, 0x31, 0x6f, 0x54, 0xa1, 0xae, 0x1d, 0xef, 0x08, 0xc9, 0x5f, 0x53, 0xec, 0xc5, 0x1a, 0xfc, 0x37, 0x5d, 0xe4, 0x36, 0x8d, 0x03, 0xd5, 0x09, 0x59, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1837 = { .name = "ecdsa_brainpoolp384r1_sha384_1837", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1837_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1837_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1837_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 307 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1838 for ECDSA, tcId is 308 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1838_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1838_msg[] = { 0x32, 0x31, 0x36, 0x34, 0x36, 0x36, 0x36, 0x32, 0x38, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1838_sig[] = { 0x61, 0xb9, 0xb0, 0x42, 0xfd, 0x65, 0x4c, 0xa9, 0xc6, 0x85, 0xaa, 0xab, 0x03, 0xed, 0x05, 0x44, 0xe3, 0x9e, 0x18, 0x48, 0x37, 0x05, 0x37, 0xa0, 0xd0, 0xac, 0x42, 0xea, 0x74, 0x53, 0xd6, 0x85, 0x37, 0x95, 0x69, 0x5d, 0xda, 0x8f, 0x4c, 0x34, 0x9b, 0x89, 0x7c, 0x2f, 0x61, 0xf9, 0x50, 0x36, 0x63, 0x4d, 0x5a, 0x0a, 0x8c, 0x85, 0x71, 0xf7, 0x68, 0x5c, 0x6c, 0x4b, 0x68, 0xde, 0x8b, 0x29, 0x16, 0xd8, 0xaf, 0x22, 0x33, 0x69, 0x3a, 0x17, 0x39, 0x9a, 0xcb, 0x60, 0x48, 0xa4, 0xd1, 0x41, 0x6e, 0xd3, 0xb2, 0xf9, 0x1b, 0x78, 0x53, 0x86, 0x8d, 0xef, 0x58, 0xa0, 0xea, 0xdd, 0xce, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1838 = { .name = "ecdsa_brainpoolp384r1_sha384_1838", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1838_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1838_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1838_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 308 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1839 for ECDSA, tcId is 309 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1839_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1839_msg[] = { 0x31, 0x39, 0x34, 0x32, 0x38, 0x35, 0x33, 0x38, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1839_sig[] = { 0x1a, 0xc6, 0xec, 0x44, 0x2c, 0xbc, 0xea, 0x48, 0xa8, 0xc4, 0x04, 0xac, 0x27, 0xe4, 0x2e, 0x21, 0x22, 0xa1, 0x21, 0xef, 0x84, 0x84, 0xbd, 0x91, 0xc0, 0x4a, 0xa2, 0x59, 0x43, 0x8f, 0xed, 0x1e, 0xe8, 0xa8, 0x0b, 0xa5, 0x94, 0x64, 0xb8, 0xa4, 0x35, 0x10, 0x89, 0x92, 0x3b, 0xb0, 0x1e, 0x92, 0x78, 0xc0, 0xed, 0x4e, 0xea, 0x7f, 0xed, 0xda, 0x04, 0xda, 0xd0, 0xd3, 0xf0, 0xd2, 0x28, 0xbc, 0x54, 0x14, 0x8b, 0x12, 0x38, 0xc6, 0x34, 0x28, 0xfc, 0x39, 0xa7, 0x72, 0x14, 0x69, 0x47, 0x79, 0x89, 0x65, 0xca, 0xf7, 0xec, 0x92, 0x76, 0xa0, 0x5a, 0x97, 0x2c, 0xa1, 0xe4, 0x21, 0x8f, 0x84, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1839 = { .name = "ecdsa_brainpoolp384r1_sha384_1839", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1839_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1839_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1839_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 309 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1840 for ECDSA, tcId is 310 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1840_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1840_msg[] = { 0x32, 0x32, 0x31, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1840_sig[] = { 0x6d, 0xf0, 0xb3, 0x64, 0x56, 0xbd, 0xcf, 0x91, 0xf6, 0x65, 0x7d, 0x05, 0xb9, 0x37, 0x38, 0x77, 0x1f, 0x18, 0x39, 0x12, 0xe2, 0x7b, 0x9f, 0xd8, 0x88, 0xaf, 0x48, 0x50, 0xb3, 0xd9, 0x79, 0xc4, 0xb7, 0xcb, 0x04, 0x2f, 0x27, 0xe3, 0x86, 0x15, 0xf0, 0x54, 0xd5, 0x17, 0x59, 0x38, 0x13, 0x18, 0x6a, 0x63, 0x8b, 0xe5, 0xf7, 0x7c, 0xbe, 0xc3, 0x7a, 0x97, 0x66, 0x03, 0x6e, 0xfb, 0xc9, 0x00, 0x49, 0x8e, 0xe4, 0xfc, 0x85, 0x0a, 0xc9, 0x83, 0xe5, 0xb6, 0x02, 0xc9, 0x48, 0x30, 0x38, 0xda, 0x98, 0x73, 0x74, 0xd7, 0x55, 0xaa, 0x08, 0x9c, 0xfd, 0x50, 0xbf, 0x2c, 0xc2, 0xde, 0x3b, 0x95, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1840 = { .name = "ecdsa_brainpoolp384r1_sha384_1840", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1840_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1840_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1840_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 310 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1841 for ECDSA, tcId is 311 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1841_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1841_msg[] = { 0x39, 0x32, 0x36, 0x39, 0x33, 0x33, 0x34, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1841_sig[] = { 0x31, 0xc8, 0x68, 0xd4, 0xf0, 0x28, 0xe3, 0x18, 0xc6, 0x91, 0x3a, 0x8d, 0x1a, 0xf0, 0x8a, 0xbb, 0x1f, 0x8a, 0xd9, 0x61, 0xa8, 0x53, 0x38, 0xf8, 0xba, 0xed, 0x7c, 0xbd, 0x8d, 0x79, 0xe1, 0x33, 0x7f, 0x35, 0xbe, 0x3b, 0x03, 0xf1, 0xf6, 0x2c, 0x03, 0x3f, 0x13, 0x88, 0xd6, 0x2b, 0x70, 0x1e, 0x77, 0xa8, 0xd6, 0x3d, 0xe6, 0x8f, 0x69, 0xca, 0x29, 0x9a, 0xa3, 0xeb, 0xab, 0x08, 0x36, 0xd1, 0xe7, 0x17, 0x28, 0x5b, 0xf4, 0x03, 0x68, 0x3e, 0x03, 0x21, 0x0b, 0xd2, 0xa3, 0x33, 0xd7, 0xb6, 0x19, 0x84, 0xd1, 0xe1, 0x39, 0x18, 0x91, 0x3c, 0x8d, 0x1e, 0x7d, 0x6a, 0x93, 0xab, 0x7f, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1841 = { .name = "ecdsa_brainpoolp384r1_sha384_1841", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1841_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1841_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1841_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 311 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1842 for ECDSA, tcId is 312 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1842_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1842_msg[] = { 0x37, 0x36, 0x39, 0x33, 0x38, 0x36, 0x33, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1842_sig[] = { 0x7d, 0x45, 0xc7, 0xdf, 0xa5, 0x9f, 0x13, 0x83, 0x0e, 0x9d, 0xd7, 0x9a, 0x28, 0x3e, 0x21, 0x29, 0xd5, 0x82, 0x9b, 0xe4, 0xcb, 0x84, 0xe0, 0x43, 0x69, 0xed, 0x3b, 0xfa, 0xa0, 0x8f, 0xdb, 0x38, 0xea, 0x64, 0x3c, 0xce, 0xda, 0x16, 0x3f, 0xdb, 0xe5, 0x01, 0x66, 0x23, 0xd3, 0xf1, 0xe4, 0x1e, 0x5b, 0x51, 0xf7, 0xb0, 0xca, 0x78, 0x01, 0x25, 0xdd, 0x6f, 0x60, 0xd3, 0xb4, 0x09, 0x23, 0xfc, 0xaf, 0xe6, 0xe0, 0xd4, 0x9b, 0x84, 0xb3, 0xdb, 0xe5, 0x08, 0xbb, 0x16, 0x94, 0x59, 0x49, 0x5a, 0x84, 0x20, 0x02, 0x8a, 0x3e, 0x44, 0x84, 0x41, 0x20, 0x48, 0x42, 0x9e, 0x67, 0xca, 0x60, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1842 = { .name = "ecdsa_brainpoolp384r1_sha384_1842", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1842_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1842_msg, .msglen = 9, .sig = ecdsa_brainpoolp384r1_sha384_1842_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 312 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1843 for ECDSA, tcId is 313 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1843_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1843_msg[] = { 0x32, 0x37, 0x33, 0x35, 0x39, 0x33, 0x30, 0x35, 0x37, 0x33, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1843_sig[] = { 0x87, 0x32, 0x95, 0x1e, 0x64, 0xe1, 0x5e, 0xc1, 0x20, 0x33, 0x32, 0xb9, 0xca, 0x9a, 0x1d, 0xfb, 0xed, 0xdf, 0xb0, 0xd1, 0x23, 0x1d, 0x0e, 0x28, 0x98, 0xc0, 0x99, 0xf7, 0x5e, 0xfd, 0x4d, 0xe9, 0xa4, 0x6d, 0xb9, 0xa7, 0x80, 0x53, 0x9b, 0xb0, 0xe2, 0x84, 0x35, 0xd5, 0xb2, 0x97, 0x00, 0x78, 0x86, 0xb2, 0x11, 0x84, 0x54, 0x2c, 0xe5, 0x0d, 0x04, 0x6d, 0x49, 0xec, 0x53, 0x9d, 0x33, 0x56, 0x9a, 0x5c, 0xc4, 0x5c, 0x64, 0x32, 0xd9, 0x65, 0xfb, 0x4c, 0x45, 0x5c, 0x63, 0xd4, 0x48, 0x19, 0x43, 0x55, 0x77, 0x1d, 0x7d, 0xdc, 0x47, 0xaf, 0x74, 0xfd, 0x28, 0x27, 0xe1, 0xd7, 0x2e, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1843 = { .name = "ecdsa_brainpoolp384r1_sha384_1843", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1843_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1843_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1843_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 313 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1844 for ECDSA, tcId is 314 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1844_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1844_msg[] = { 0x38, 0x33, 0x30, 0x30, 0x35, 0x36, 0x34, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1844_sig[] = { 0x26, 0x31, 0xc7, 0x59, 0xa6, 0xa8, 0x69, 0x14, 0x16, 0x07, 0x66, 0xb9, 0x4a, 0x4e, 0x4f, 0x47, 0x4a, 0x0a, 0xd6, 0x79, 0xb5, 0xaf, 0xed, 0x8a, 0x72, 0x37, 0xea, 0xc7, 0x73, 0xc6, 0xb0, 0xd6, 0x7f, 0xf3, 0xec, 0x36, 0xdf, 0x37, 0x30, 0xe8, 0x1a, 0xde, 0xba, 0x58, 0xd6, 0xe2, 0x95, 0x17, 0x16, 0x20, 0x9d, 0xcc, 0x92, 0x37, 0xa9, 0xae, 0x32, 0xd8, 0x62, 0xb3, 0x31, 0x53, 0x94, 0x3f, 0x1e, 0xaf, 0x2a, 0x92, 0x14, 0x6a, 0xf7, 0x73, 0xcf, 0x3e, 0x5b, 0xba, 0x48, 0xa8, 0x55, 0x1d, 0x9c, 0x2f, 0xa1, 0x2a, 0x01, 0xdf, 0xf3, 0xb0, 0x05, 0x42, 0x6c, 0xda, 0xff, 0x05, 0xa8, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1844 = { .name = "ecdsa_brainpoolp384r1_sha384_1844", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1844_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1844_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1844_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 314 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1845 for ECDSA, tcId is 315 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1845_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1845_msg[] = { 0x34, 0x33, 0x30, 0x37, 0x36, 0x35, 0x35, 0x37, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1845_sig[] = { 0x59, 0xb1, 0x2f, 0x62, 0x20, 0xb0, 0x46, 0xb0, 0x8f, 0x89, 0x2d, 0x69, 0xba, 0xef, 0xc8, 0x1c, 0x51, 0x0c, 0xc2, 0x5a, 0xd0, 0x90, 0x61, 0x6b, 0x35, 0x06, 0x06, 0x08, 0x42, 0x16, 0xe6, 0xc4, 0x0e, 0x1d, 0x8c, 0xd9, 0x6a, 0x1b, 0x31, 0x5e, 0x64, 0xce, 0x1d, 0x84, 0x98, 0x6d, 0x89, 0xac, 0x39, 0x94, 0xa6, 0x85, 0x2b, 0x23, 0x77, 0xdc, 0xc8, 0x09, 0x35, 0xe2, 0xea, 0x1e, 0xaf, 0x78, 0x89, 0xed, 0x69, 0x4c, 0xd3, 0x21, 0xbb, 0xda, 0x34, 0x2d, 0xbd, 0x57, 0xed, 0xe1, 0xa4, 0x7c, 0x2b, 0x30, 0xde, 0x46, 0xbb, 0x05, 0xca, 0xc6, 0x6a, 0x62, 0x35, 0xc4, 0xbb, 0x29, 0x0c, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1845 = { .name = "ecdsa_brainpoolp384r1_sha384_1845", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1845_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1845_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1845_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 315 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1846 for ECDSA, tcId is 316 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1846_pubkey[] = { 0x19, 0x2e, 0xd5, 0xce, 0x54, 0x7d, 0x23, 0x36, 0x91, 0x1d, 0x3f, 0x6c, 0xec, 0xba, 0x22, 0x7f, 0x08, 0xdf, 0x07, 0x7f, 0x62, 0x42, 0xa9, 0x14, 0x7a, 0x91, 0x4e, 0x85, 0x4e, 0x6e, 0x32, 0xd3, 0x25, 0xfd, 0x23, 0xcc, 0xc4, 0x29, 0x21, 0xdc, 0x4a, 0x7e, 0x4c, 0x2e, 0xb7, 0x1d, 0xef, 0xd3, 0x63, 0x1e, 0x69, 0x07, 0x9b, 0xa9, 0x82, 0xe7, 0xa1, 0xca, 0xd0, 0xa3, 0x9e, 0xff, 0x47, 0xfc, 0x6d, 0x6e, 0x3a, 0x28, 0x0d, 0x08, 0x12, 0x86, 0xb6, 0x24, 0x88, 0x6b, 0xa1, 0xf3, 0x06, 0x96, 0x71, 0xec, 0x1a, 0x29, 0x98, 0x6d, 0x84, 0xfb, 0x79, 0x73, 0x6d, 0x27, 0x99, 0xe6, 0xfc, 0x21, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1846_msg[] = { 0x39, 0x36, 0x35, 0x37, 0x30, 0x31, 0x38, 0x31, 0x37, 0x35, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1846_sig[] = { 0x4f, 0x69, 0x18, 0x0f, 0xb6, 0x60, 0x59, 0x7f, 0x8e, 0x70, 0x33, 0x4b, 0x7b, 0x6f, 0xa9, 0x7e, 0x59, 0x28, 0xa6, 0xc1, 0x75, 0xde, 0x91, 0x29, 0x05, 0x26, 0x1f, 0x3e, 0x1f, 0x4d, 0xf1, 0x75, 0x2d, 0x34, 0x15, 0x37, 0x0e, 0x62, 0x72, 0x71, 0x0c, 0x7b, 0xd4, 0xbd, 0x42, 0xed, 0xad, 0xec, 0x44, 0x5b, 0x0b, 0x78, 0x09, 0x9b, 0xd9, 0x9f, 0xa7, 0x8a, 0x99, 0x45, 0xd7, 0xbd, 0x20, 0x58, 0xa9, 0x00, 0xb9, 0x41, 0x38, 0xd6, 0x7a, 0xbd, 0x37, 0xfd, 0xfc, 0xf2, 0xe9, 0xfa, 0xb6, 0x64, 0x4c, 0xb1, 0xa8, 0xc3, 0x76, 0x16, 0x3e, 0xcb, 0x69, 0x95, 0x5e, 0x95, 0x4c, 0xe8, 0xc3, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1846 = { .name = "ecdsa_brainpoolp384r1_sha384_1846", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1846_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1846_msg, .msglen = 10, .sig = ecdsa_brainpoolp384r1_sha384_1846_sig, .siglen = 96, .result = 1, .comment = "special case hash, tcId is 316 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1847 for ECDSA, tcId is 317 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1847_pubkey[] = { 0x8a, 0x94, 0x16, 0x4d, 0xc7, 0x65, 0x4f, 0xda, 0x3c, 0xd4, 0x30, 0x1d, 0x3e, 0x97, 0x20, 0x24, 0xc2, 0xda, 0xba, 0x71, 0xd4, 0x42, 0x12, 0x8c, 0x7f, 0x3f, 0xae, 0xcd, 0xb9, 0xe3, 0x75, 0xa8, 0x5a, 0xa8, 0x0c, 0x4a, 0xc2, 0x88, 0x89, 0xf2, 0x58, 0xe6, 0xcb, 0xa8, 0x86, 0xd4, 0x76, 0x36, 0x54, 0x8b, 0x3b, 0xf1, 0xb6, 0x75, 0xf2, 0x31, 0x8c, 0x3d, 0x8a, 0xb7, 0xa1, 0xc2, 0x81, 0xa3, 0x32, 0x41, 0xc1, 0x21, 0xb3, 0x59, 0x0b, 0xfd, 0xf7, 0x03, 0xc7, 0xcd, 0x4b, 0xae, 0x8f, 0x45, 0x18, 0x86, 0xd9, 0x89, 0x23, 0x4c, 0x1b, 0x8c, 0x58, 0x96, 0x14, 0x55, 0x4d, 0x42, 0x93, 0x92, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1847_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1847_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xf3, 0x9b, 0x6b, 0xac, 0xd3, 0xb2, 0xeb, 0x7b, 0xdd, 0x98, 0xf0, 0x7a, 0x24, 0x9d, 0x57, 0x61, 0x4b, 0xbe, 0xce, 0x10, 0x48, 0x03, 0x86, 0xe8, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1847 = { .name = "ecdsa_brainpoolp384r1_sha384_1847", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1847_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1847_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1847_sig, .siglen = 96, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 317 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1848 for ECDSA, tcId is 318 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1848_pubkey[] = { 0x8a, 0x94, 0x16, 0x4d, 0xc7, 0x65, 0x4f, 0xda, 0x3c, 0xd4, 0x30, 0x1d, 0x3e, 0x97, 0x20, 0x24, 0xc2, 0xda, 0xba, 0x71, 0xd4, 0x42, 0x12, 0x8c, 0x7f, 0x3f, 0xae, 0xcd, 0xb9, 0xe3, 0x75, 0xa8, 0x5a, 0xa8, 0x0c, 0x4a, 0xc2, 0x88, 0x89, 0xf2, 0x58, 0xe6, 0xcb, 0xa8, 0x86, 0xd4, 0x76, 0x36, 0x54, 0x8b, 0x3b, 0xf1, 0xb6, 0x75, 0xf2, 0x31, 0x8c, 0x3d, 0x8a, 0xb7, 0xa1, 0xc2, 0x81, 0xa3, 0x32, 0x41, 0xc1, 0x21, 0xb3, 0x59, 0x0b, 0xfd, 0xf7, 0x03, 0xc7, 0xcd, 0x4b, 0xae, 0x8f, 0x45, 0x18, 0x86, 0xd9, 0x89, 0x23, 0x4c, 0x1b, 0x8c, 0x58, 0x96, 0x14, 0x55, 0x4d, 0x42, 0x93, 0x92, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1848_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1848_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x4d, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1848 = { .name = "ecdsa_brainpoolp384r1_sha384_1848", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1848_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1848_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1848_sig, .siglen = 96, .result = -1, .comment = "r too large, tcId is 318 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1849 for ECDSA, tcId is 319 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1849_pubkey[] = { 0x73, 0xf8, 0x4a, 0xb6, 0x37, 0x89, 0x30, 0x1e, 0x88, 0xb4, 0xcb, 0x82, 0xcb, 0x93, 0x5d, 0xec, 0xff, 0xb8, 0xf4, 0x2b, 0x2c, 0x97, 0x84, 0xc7, 0x54, 0x46, 0x15, 0xb9, 0x07, 0x6e, 0xc7, 0xa7, 0xab, 0x94, 0x70, 0x2c, 0xa7, 0xf1, 0xd9, 0xaa, 0xcf, 0xb9, 0x05, 0x37, 0xb5, 0xd3, 0x68, 0xdc, 0x50, 0x2c, 0xb7, 0xc8, 0xc1, 0x82, 0x85, 0x99, 0x4c, 0x7b, 0x19, 0xfa, 0x3e, 0x24, 0x01, 0xfd, 0xc2, 0x6d, 0xe5, 0x4f, 0xfe, 0x00, 0x6b, 0xb7, 0x9b, 0xdd, 0x78, 0x52, 0xc6, 0x66, 0xd7, 0x30, 0xbd, 0xf7, 0x6a, 0x16, 0xc0, 0x79, 0x2a, 0x6c, 0x66, 0x81, 0xed, 0x6b, 0x64, 0x7f, 0xc8, 0x1b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1849_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1849_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x64, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x63, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1849 = { .name = "ecdsa_brainpoolp384r1_sha384_1849", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1849_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1849_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1849_sig, .siglen = 96, .result = 1, .comment = "r,s are large, tcId is 319 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1850 for ECDSA, tcId is 320 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1850_pubkey[] = { 0x89, 0x5e, 0x84, 0x61, 0xed, 0xdb, 0xe2, 0x13, 0x67, 0xa9, 0x5b, 0x25, 0xcd, 0x85, 0xcd, 0x31, 0xe8, 0x0e, 0xcf, 0x1f, 0x95, 0x53, 0x90, 0x56, 0xfb, 0x7e, 0x10, 0xb4, 0xaa, 0x49, 0x90, 0x0b, 0x21, 0x94, 0xd9, 0x19, 0xb2, 0x9c, 0xd9, 0xbf, 0x37, 0x3a, 0x1d, 0x53, 0xef, 0x57, 0x11, 0x74, 0x76, 0x7c, 0x02, 0xe3, 0x6b, 0x93, 0x5a, 0x65, 0xe5, 0xa9, 0xcb, 0xb3, 0x55, 0x89, 0xa2, 0xa0, 0x18, 0x48, 0x20, 0x65, 0xc5, 0xe3, 0x3d, 0xa8, 0xce, 0x48, 0x3d, 0xc7, 0xf7, 0xfe, 0x44, 0x15, 0x74, 0xf9, 0xe7, 0xab, 0x06, 0x14, 0xbd, 0xcf, 0xc6, 0x10, 0x22, 0xc7, 0x80, 0xa3, 0x00, 0x09, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1850_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1850_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0x48, 0x0e, 0xca, 0x28, 0x74, 0xaa, 0x6b, 0xa7, 0x1e, 0x7f, 0xb5, 0x71, 0x13, 0x39, 0xac, 0x0a, 0x7b, 0xf8, 0x40, 0x65, 0xb3, 0xc7, 0xd5, 0x9c, 0x64, 0xa2, 0xc6, 0x01, 0x5e, 0x6f, 0x79, 0x4e, 0x7d, 0xfa, 0x2b, 0x1f, 0xec, 0x73, 0xa7, 0x2a, 0xdb, 0x32, 0xbd, 0xb7, 0xdd, 0x55, 0xcd, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1850 = { .name = "ecdsa_brainpoolp384r1_sha384_1850", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1850_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1850_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1850_sig, .siglen = 96, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 320 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1851 for ECDSA, tcId is 321 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1851_pubkey[] = { 0x61, 0x8a, 0xd8, 0x19, 0x12, 0xe4, 0xc3, 0x1f, 0x23, 0xea, 0xb2, 0xf0, 0xc6, 0x93, 0xb3, 0xef, 0x84, 0x04, 0x07, 0x4a, 0xb1, 0xdc, 0xe0, 0x1d, 0xc8, 0x2a, 0x76, 0x81, 0x51, 0xc9, 0xfa, 0x03, 0x93, 0xb4, 0xd6, 0xae, 0xae, 0xec, 0x68, 0x58, 0xd3, 0xf4, 0x19, 0x95, 0x7a, 0x5b, 0x99, 0x7f, 0x31, 0xfa, 0x80, 0x9b, 0x1b, 0x44, 0x67, 0x7c, 0xc5, 0xae, 0xf1, 0x89, 0x48, 0x46, 0x14, 0x2c, 0x3e, 0x44, 0xbb, 0xa6, 0xc4, 0x71, 0x12, 0x3f, 0xa1, 0x4f, 0xeb, 0x8f, 0x3a, 0xa9, 0xe9, 0x2f, 0x76, 0x9b, 0xe5, 0x49, 0xce, 0xf9, 0xc1, 0xd5, 0x5b, 0xc6, 0xf1, 0xf4, 0xf8, 0x41, 0x81, 0x3d, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1851_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1851_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0x16, 0x29, 0xef, 0x2d, 0x71, 0x82, 0xd6, 0x7b, 0x6b, 0xd9, 0xcf, 0x68, 0x42, 0x25, 0x1f, 0xe0, 0x9c, 0x96, 0xbf, 0xe0, 0x22, 0xb8, 0xad, 0x9a, 0x0e, 0x54, 0x6f, 0xdc, 0x8e, 0xcf, 0x5d, 0xc8, 0x63, 0x6f, 0xa1, 0x30, 0x59, 0xd7, 0xe9, 0xd8, 0x3f, 0xde, 0x50, 0xe0, 0xd2, 0xb3, 0x92, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1851 = { .name = "ecdsa_brainpoolp384r1_sha384_1851", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1851_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1851_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1851_sig, .siglen = 96, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 321 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1852 for ECDSA, tcId is 322 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1852_pubkey[] = { 0x79, 0x58, 0x3b, 0x49, 0x68, 0xb5, 0x76, 0x81, 0x1b, 0x56, 0x7e, 0x16, 0x20, 0xe0, 0x0b, 0x0a, 0xab, 0x8a, 0xa2, 0x23, 0xc5, 0xe6, 0x55, 0xb2, 0x7b, 0x1e, 0xbe, 0xaf, 0x83, 0xbc, 0xd3, 0x5f, 0x42, 0x05, 0xa5, 0xa0, 0xe5, 0x1a, 0x20, 0x52, 0xff, 0xfe, 0x9f, 0xd2, 0x37, 0x85, 0xc9, 0x8f, 0x77, 0x35, 0x7c, 0x8a, 0x10, 0x08, 0xfc, 0xb7, 0xa3, 0x57, 0x96, 0x14, 0xc2, 0xff, 0x47, 0x98, 0x0f, 0xa9, 0xe4, 0x4b, 0x6b, 0x5e, 0xa3, 0xf8, 0xa3, 0x3c, 0x91, 0x9d, 0xd2, 0xae, 0xa5, 0xda, 0xd0, 0xca, 0x1a, 0x01, 0xa9, 0xe2, 0x10, 0x65, 0x18, 0xb1, 0x64, 0x29, 0x06, 0xe4, 0xf2, 0x75, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1852_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1852_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1852 = { .name = "ecdsa_brainpoolp384r1_sha384_1852", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1852_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1852_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1852_sig, .siglen = 96, .result = 1, .comment = "small r and s, tcId is 322 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1853 for ECDSA, tcId is 323 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1853_pubkey[] = { 0x89, 0x65, 0x7b, 0xac, 0x21, 0x6c, 0x3a, 0xc4, 0xa3, 0xa2, 0xd5, 0xaf, 0xd3, 0x42, 0xad, 0x24, 0xa4, 0xeb, 0x10, 0x3d, 0x4d, 0xbe, 0x2e, 0x44, 0x61, 0xe0, 0x3c, 0x70, 0x11, 0x82, 0x65, 0x13, 0xfe, 0x82, 0xbd, 0x06, 0xe1, 0x7e, 0x3a, 0xe8, 0xeb, 0x58, 0x11, 0xda, 0x0b, 0xec, 0x88, 0xbb, 0x33, 0xee, 0x1e, 0xdd, 0xd5, 0xd4, 0x9d, 0xd8, 0x6e, 0x78, 0x5f, 0xbf, 0xeb, 0xb9, 0x28, 0x86, 0x61, 0x96, 0x4e, 0x6f, 0xbe, 0x0c, 0x07, 0xaf, 0x9a, 0x4b, 0xa3, 0x14, 0x5f, 0xc4, 0xbe, 0x11, 0xe5, 0x48, 0x4b, 0x65, 0x0c, 0x97, 0x09, 0x6d, 0xb8, 0x2e, 0xbb, 0x0c, 0xa2, 0xbb, 0x84, 0xed, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1853_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1853_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1853 = { .name = "ecdsa_brainpoolp384r1_sha384_1853", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1853_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1853_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1853_sig, .siglen = 96, .result = 1, .comment = "small r and s, tcId is 323 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1854 for ECDSA, tcId is 324 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1854_pubkey[] = { 0x58, 0x76, 0xf4, 0x14, 0xfa, 0x38, 0x5b, 0x40, 0x3a, 0x2d, 0x10, 0xda, 0x5d, 0x89, 0xb1, 0x10, 0x34, 0x4a, 0xd0, 0x05, 0xbf, 0xaf, 0x8c, 0x75, 0x9a, 0xb1, 0xe3, 0x56, 0x1a, 0x39, 0xff, 0x0d, 0xb9, 0xff, 0x91, 0xec, 0x60, 0x40, 0x31, 0x6e, 0x2f, 0xca, 0x36, 0x54, 0xa4, 0x8c, 0x0e, 0x89, 0x0d, 0xcb, 0x77, 0xf8, 0x96, 0xea, 0x47, 0x5c, 0xb9, 0x76, 0x72, 0xa8, 0x40, 0x03, 0x29, 0x55, 0x4c, 0x94, 0x1b, 0x61, 0xb4, 0xa8, 0x4b, 0xde, 0x1f, 0x8c, 0x8f, 0xc5, 0x25, 0x0c, 0x29, 0x16, 0x1f, 0xc3, 0xca, 0x50, 0x45, 0x8a, 0x41, 0xc7, 0x7a, 0x48, 0xbb, 0x33, 0x68, 0x82, 0xf2, 0xea, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1854_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1854_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1854 = { .name = "ecdsa_brainpoolp384r1_sha384_1854", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1854_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1854_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1854_sig, .siglen = 96, .result = 1, .comment = "small r and s, tcId is 324 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1855 for ECDSA, tcId is 325 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1855_pubkey[] = { 0x58, 0x76, 0xf4, 0x14, 0xfa, 0x38, 0x5b, 0x40, 0x3a, 0x2d, 0x10, 0xda, 0x5d, 0x89, 0xb1, 0x10, 0x34, 0x4a, 0xd0, 0x05, 0xbf, 0xaf, 0x8c, 0x75, 0x9a, 0xb1, 0xe3, 0x56, 0x1a, 0x39, 0xff, 0x0d, 0xb9, 0xff, 0x91, 0xec, 0x60, 0x40, 0x31, 0x6e, 0x2f, 0xca, 0x36, 0x54, 0xa4, 0x8c, 0x0e, 0x89, 0x0d, 0xcb, 0x77, 0xf8, 0x96, 0xea, 0x47, 0x5c, 0xb9, 0x76, 0x72, 0xa8, 0x40, 0x03, 0x29, 0x55, 0x4c, 0x94, 0x1b, 0x61, 0xb4, 0xa8, 0x4b, 0xde, 0x1f, 0x8c, 0x8f, 0xc5, 0x25, 0x0c, 0x29, 0x16, 0x1f, 0xc3, 0xca, 0x50, 0x45, 0x8a, 0x41, 0xc7, 0x7a, 0x48, 0xbb, 0x33, 0x68, 0x82, 0xf2, 0xea, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1855_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1855_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x66, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1855 = { .name = "ecdsa_brainpoolp384r1_sha384_1855", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1855_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1855_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1855_sig, .siglen = 96, .result = -1, .comment = "r is larger than n, tcId is 325 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1856 for ECDSA, tcId is 326 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1856_pubkey[] = { 0x1b, 0xee, 0x74, 0x1f, 0xa1, 0x92, 0xa9, 0xbd, 0x05, 0x35, 0xd0, 0x06, 0x27, 0x73, 0x70, 0x79, 0xe9, 0x8f, 0x00, 0x07, 0x63, 0x94, 0xc9, 0x78, 0xa9, 0x6a, 0x0f, 0x9f, 0xba, 0x64, 0xe9, 0xe2, 0x1d, 0xec, 0xff, 0x6b, 0x4b, 0x8f, 0xe1, 0x1f, 0x60, 0xb1, 0x8d, 0x5d, 0x75, 0x86, 0x84, 0xde, 0x06, 0xd1, 0x93, 0x21, 0xea, 0xb7, 0xe8, 0x60, 0x1f, 0x8f, 0x46, 0x06, 0xfe, 0x93, 0xfd, 0x3b, 0x2f, 0x02, 0x98, 0x6a, 0x58, 0xca, 0x56, 0x41, 0x32, 0x82, 0xc6, 0x6d, 0xd3, 0x6b, 0xa6, 0x72, 0x4a, 0x3c, 0xbc, 0xee, 0xe7, 0x99, 0x48, 0xba, 0x2d, 0x55, 0xc7, 0x56, 0x58, 0x6b, 0x58, 0xe2, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1856_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1856_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x17, 0x3b, 0xec, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1856 = { .name = "ecdsa_brainpoolp384r1_sha384_1856", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1856_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1856_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1856_sig, .siglen = 96, .result = -1, .comment = "s is larger than n, tcId is 326 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1857 for ECDSA, tcId is 327 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1857_pubkey[] = { 0x6b, 0x25, 0xf8, 0xc1, 0x62, 0x9f, 0x75, 0x79, 0xe3, 0xc7, 0xee, 0x4b, 0x02, 0x9c, 0xc0, 0x29, 0xb4, 0xbd, 0xbe, 0xd8, 0x8b, 0x9b, 0x39, 0x93, 0x03, 0xe4, 0xa1, 0x43, 0x52, 0xd1, 0xf3, 0xf6, 0x04, 0x8e, 0xcd, 0xd0, 0x62, 0xd3, 0x7c, 0xba, 0x7b, 0x70, 0xbc, 0xbd, 0x58, 0x72, 0x31, 0xe7, 0x62, 0x13, 0x13, 0xf9, 0x3d, 0x31, 0x0f, 0x14, 0x4b, 0xd3, 0x32, 0x25, 0x82, 0x80, 0x46, 0x39, 0xdd, 0x29, 0x60, 0x96, 0x9a, 0x99, 0x3a, 0x9f, 0x2a, 0x36, 0x09, 0xf8, 0x56, 0xe1, 0x41, 0x5a, 0x0a, 0x4d, 0xcf, 0x58, 0xa7, 0x86, 0x4e, 0x41, 0xe2, 0xa8, 0xc8, 0x0d, 0xfc, 0x15, 0x8a, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1857_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1857_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x89, 0x66, 0x21, 0xd2, 0x32, 0x83, 0xb1, 0x21, 0x11, 0x04, 0x8d, 0x1c, 0x97, 0x8e, 0x2c, 0x28, 0x6d, 0x60, 0xb6, 0xef, 0x7c, 0xe3, 0x7a, 0xf3, 0x6c, 0xf7, 0xaa, 0x4d, 0xe2, 0x68, 0xd6, 0x26, 0xde, 0x7d, 0xdc, 0xb3, 0x56, 0xd1, 0x67, 0xc7, 0x48, 0x3c, 0x69, 0x45, 0x5c, 0x75, 0x2c, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1857 = { .name = "ecdsa_brainpoolp384r1_sha384_1857", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1857_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1857_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1857_sig, .siglen = 96, .result = 1, .comment = "small r and s^-1, tcId is 327 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1858 for ECDSA, tcId is 328 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1858_pubkey[] = { 0x5d, 0x08, 0x2c, 0xde, 0x60, 0x86, 0xf8, 0xea, 0x69, 0x94, 0xf4, 0x6e, 0x9d, 0xc0, 0x6c, 0x1c, 0x1d, 0x2c, 0x3a, 0x3c, 0x2d, 0xc5, 0xc9, 0x7b, 0xf1, 0x37, 0x65, 0x3d, 0x9b, 0x2e, 0xd2, 0x11, 0x01, 0xba, 0xd8, 0x43, 0xd4, 0x6e, 0x4b, 0x79, 0x25, 0xb9, 0xaf, 0x70, 0x34, 0xc6, 0xd0, 0x21, 0x12, 0xc7, 0xf5, 0x6e, 0x65, 0xd2, 0x33, 0x10, 0x40, 0x63, 0x39, 0x1f, 0xb3, 0x82, 0x8b, 0x39, 0x90, 0xe6, 0x89, 0x3d, 0x77, 0x74, 0x6e, 0x42, 0x30, 0x5e, 0x6a, 0x5b, 0xa1, 0x11, 0xd9, 0x76, 0xd6, 0x93, 0xf5, 0x95, 0xaf, 0x85, 0x8f, 0x19, 0xfa, 0xc7, 0x23, 0x4f, 0x74, 0x84, 0xc4, 0x89, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1858_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1858_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x38, 0xe8, 0xda, 0xe2, 0x16, 0xc6, 0x3f, 0x06, 0xb3, 0xed, 0xbd, 0x0f, 0x9b, 0xa7, 0xa5, 0xe4, 0xa3, 0x32, 0xec, 0x18, 0x72, 0x51, 0xe3, 0xd6, 0x27, 0x83, 0x9d, 0x1b, 0xaa, 0xc6, 0x67, 0xd7, 0xca, 0xad, 0x2a, 0xb0, 0xa1, 0xea, 0x9f, 0xbb, 0x12, 0xdc, 0x5a, 0x71, 0xe3, 0xb4, 0x9b, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1858 = { .name = "ecdsa_brainpoolp384r1_sha384_1858", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1858_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1858_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1858_sig, .siglen = 96, .result = 1, .comment = "smallish r and s^-1, tcId is 328 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1859 for ECDSA, tcId is 329 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1859_pubkey[] = { 0x74, 0x07, 0xca, 0x6c, 0x2a, 0x18, 0x3f, 0x9c, 0xa1, 0x37, 0x66, 0x09, 0xe9, 0xc7, 0x8a, 0x8d, 0x08, 0x0e, 0xff, 0xad, 0x15, 0xa4, 0xf6, 0x3c, 0xbb, 0x7a, 0x16, 0x8e, 0x3c, 0x78, 0x9b, 0x8b, 0x59, 0xce, 0x4d, 0x31, 0x22, 0xca, 0x08, 0xa8, 0x69, 0x07, 0xba, 0x48, 0x7f, 0x71, 0x7f, 0xbc, 0x3e, 0x2c, 0x56, 0xa9, 0xb3, 0x46, 0x0a, 0x51, 0x36, 0xb2, 0x13, 0xbe, 0x8d, 0x48, 0xcb, 0x3d, 0xc9, 0xc7, 0xad, 0x94, 0x5b, 0x1d, 0xce, 0xcb, 0xf9, 0x3f, 0xa6, 0xcf, 0xaa, 0xf8, 0xdb, 0xd7, 0x0f, 0x10, 0x40, 0xb9, 0x7a, 0xd8, 0xe3, 0xac, 0x30, 0xf2, 0xe6, 0x4f, 0xd7, 0xcc, 0x76, 0xd6, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1859_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1859_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfc, 0x0d, 0x24, 0x36, 0xa5, 0x99, 0xb3, 0x96, 0xa5, 0x1c, 0x54, 0x6e, 0x05, 0xd1, 0xc3, 0xd2, 0x5a, 0x8f, 0x6d, 0x05, 0x93, 0x5a, 0xe5, 0x03, 0x1d, 0xad, 0x3c, 0xdd, 0x7c, 0xb3, 0x6c, 0xf6, 0x91, 0x2a, 0x43, 0x3d, 0xe2, 0x8f, 0x84, 0x75, 0xd3, 0xb1, 0xe2, 0xe1, 0xce, 0x77, 0x61, 0x08, 0x79, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1859 = { .name = "ecdsa_brainpoolp384r1_sha384_1859", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1859_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1859_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1859_sig, .siglen = 96, .result = 1, .comment = "100-bit r and small s^-1, tcId is 329 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1860 for ECDSA, tcId is 330 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1860_pubkey[] = { 0x4f, 0xc3, 0x2a, 0x52, 0x26, 0x82, 0x0e, 0xc9, 0xc3, 0xff, 0xf2, 0xc7, 0x4e, 0x0b, 0x36, 0xd7, 0xde, 0x02, 0x8e, 0x59, 0xfc, 0x00, 0x5f, 0x38, 0x07, 0xa3, 0xbd, 0x59, 0x89, 0x2c, 0x9a, 0xd2, 0x0d, 0xba, 0x71, 0x68, 0xef, 0x9e, 0xd9, 0xbf, 0x99, 0xb2, 0x5e, 0xd0, 0x1b, 0xcf, 0xc6, 0xca, 0x6a, 0x13, 0xda, 0x2e, 0x85, 0x27, 0x77, 0xa6, 0xf9, 0x9d, 0x04, 0x32, 0x2a, 0x1b, 0x9f, 0xb4, 0x22, 0x76, 0x84, 0xbf, 0x7c, 0x40, 0xd4, 0xd3, 0xef, 0x92, 0x79, 0x80, 0x03, 0xa3, 0xbf, 0x2d, 0xa1, 0x58, 0xd5, 0x68, 0x64, 0x57, 0xc3, 0x3d, 0x0e, 0x24, 0xbe, 0x5c, 0x26, 0x5f, 0xc4, 0x73, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1860_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1860_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x4a, 0x28, 0x9a, 0xda, 0xd7, 0xce, 0xec, 0x67, 0xae, 0x99, 0xef, 0x5d, 0xa7, 0x97, 0xb6, 0xbb, 0x17, 0xd9, 0xc1, 0x68, 0x42, 0x8a, 0xb3, 0x0e, 0xa9, 0xa6, 0x8b, 0x89, 0x65, 0x2c, 0x4b, 0x9e, 0x9b, 0xae, 0x87, 0x6a, 0xb3, 0xd7, 0xfb, 0xdf, 0x1e, 0xb9, 0x2e, 0xd4, 0x22, 0xbd, 0x3b, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1860 = { .name = "ecdsa_brainpoolp384r1_sha384_1860", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1860_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1860_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1860_sig, .siglen = 96, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 330 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1861 for ECDSA, tcId is 331 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1861_pubkey[] = { 0x73, 0x50, 0xa7, 0xd0, 0x0d, 0x77, 0x19, 0xa3, 0x18, 0x52, 0x2e, 0xf4, 0xc5, 0xe6, 0xbe, 0x24, 0xb3, 0xb2, 0xcb, 0x30, 0x0c, 0x59, 0x6f, 0x79, 0xe8, 0xdd, 0x31, 0xa4, 0x68, 0x8f, 0xe6, 0x5a, 0x54, 0xb2, 0xd7, 0x49, 0x7a, 0x06, 0x82, 0x1e, 0xec, 0xba, 0xf3, 0x1b, 0x2f, 0xa7, 0xcd, 0xcb, 0x4b, 0xd7, 0x2f, 0xc7, 0xf0, 0x5e, 0x32, 0x45, 0x7f, 0xda, 0x0c, 0xc3, 0xf3, 0x21, 0x15, 0x77, 0x44, 0xf1, 0x84, 0x1c, 0x30, 0xbd, 0x08, 0x6e, 0x6d, 0xdd, 0x5b, 0xf4, 0x15, 0xeb, 0x71, 0xec, 0xbe, 0x36, 0xf0, 0xf3, 0xfd, 0x23, 0xd3, 0xc4, 0x14, 0x87, 0xfb, 0x28, 0x3e, 0x0e, 0x97, 0x94, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1861_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1861_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0x4a, 0x28, 0x9a, 0xda, 0xd7, 0xce, 0xec, 0x67, 0xae, 0x99, 0xef, 0x5d, 0xa7, 0x97, 0xb6, 0xbb, 0x17, 0xd9, 0xc1, 0x68, 0x42, 0x8a, 0xb3, 0x0e, 0xa9, 0xa6, 0x8b, 0x89, 0x65, 0x2c, 0x4b, 0x9e, 0x9b, 0xae, 0x87, 0x6a, 0xb3, 0xd7, 0xfb, 0xdf, 0x1e, 0xb9, 0x2e, 0xd4, 0x22, 0xbd, 0x3b, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1861 = { .name = "ecdsa_brainpoolp384r1_sha384_1861", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1861_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1861_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1861_sig, .siglen = 96, .result = 1, .comment = "100-bit r and s^-1, tcId is 331 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1862 for ECDSA, tcId is 332 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1862_pubkey[] = { 0x61, 0x49, 0x8a, 0xd3, 0x1a, 0x84, 0xee, 0xd1, 0x02, 0xba, 0x27, 0x12, 0xeb, 0x8a, 0x7b, 0xd9, 0x23, 0x20, 0xbd, 0xa4, 0xac, 0x6d, 0x07, 0xb4, 0x32, 0x6a, 0x30, 0x86, 0x9d, 0x19, 0xeb, 0x1b, 0x96, 0x22, 0x9d, 0x21, 0xef, 0xd7, 0x11, 0xdc, 0xf7, 0x30, 0x48, 0xbf, 0x16, 0x68, 0x00, 0xe3, 0x0c, 0xfc, 0xc1, 0x3a, 0x09, 0x14, 0x13, 0x22, 0x84, 0xdb, 0xea, 0xb6, 0xfc, 0xf5, 0xd7, 0x0b, 0x34, 0xca, 0x86, 0xa6, 0x81, 0x15, 0x7e, 0x48, 0x74, 0xab, 0xff, 0xae, 0xeb, 0xb6, 0x9b, 0x8b, 0x71, 0xf6, 0x9d, 0x33, 0x23, 0x06, 0x56, 0x78, 0x23, 0xdd, 0xe5, 0x40, 0x7c, 0xe7, 0x39, 0xe8, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1862_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1862_sig[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x64, 0xe5, 0x5d, 0xd0, 0xbf, 0x01, 0xc2, 0x25, 0x9e, 0x1a, 0xb4, 0xe8, 0xf4, 0xfe, 0xe0, 0x99, 0x81, 0x3f, 0x63, 0x74, 0xf6, 0x06, 0x9e, 0x38, 0x39, 0xcc, 0xbf, 0x64, 0x49, 0x9d, 0xc8, 0x02, 0xc3, 0xc5, 0x34, 0xd1, 0xcf, 0x1f, 0x9c, 0xff, 0xd7, 0x60, 0x27, 0xb0, 0x21, 0x57, 0x46, 0x02, 0xee, 0x43, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1862 = { .name = "ecdsa_brainpoolp384r1_sha384_1862", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1862_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1862_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1862_sig, .siglen = 96, .result = 1, .comment = "r and s^-1 are close to n, tcId is 332 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1863 for ECDSA, tcId is 333 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1863_pubkey[] = { 0x05, 0x05, 0x92, 0xf3, 0x4d, 0xb0, 0x26, 0x3d, 0xf4, 0xc6, 0x69, 0xb8, 0x99, 0x19, 0x41, 0xbe, 0x18, 0x23, 0x7a, 0x10, 0x45, 0xbf, 0xd1, 0x65, 0xea, 0x4a, 0xf3, 0x85, 0x37, 0x65, 0x64, 0xed, 0xf6, 0x65, 0x4a, 0x0d, 0xff, 0x7b, 0x5d, 0x84, 0x47, 0x40, 0x90, 0xf2, 0x65, 0xc4, 0x6b, 0x51, 0x15, 0x45, 0x91, 0x8c, 0xd8, 0xf2, 0x22, 0x60, 0xce, 0x21, 0xa5, 0x84, 0xed, 0xfa, 0x0b, 0x16, 0x44, 0x48, 0x8c, 0x99, 0x7d, 0x95, 0x65, 0x29, 0x26, 0x2a, 0xef, 0x40, 0x0c, 0xc0, 0x32, 0x0e, 0xd2, 0x7d, 0xdc, 0xec, 0x3b, 0xde, 0x6b, 0x9f, 0xd7, 0x9b, 0x37, 0x4a, 0xf6, 0x88, 0xfa, 0x9f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1863_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1863_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1863 = { .name = "ecdsa_brainpoolp384r1_sha384_1863", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1863_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1863_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1863_sig, .siglen = 96, .result = 1, .comment = "s == 1, tcId is 333 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1864 for ECDSA, tcId is 334 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1864_pubkey[] = { 0x05, 0x05, 0x92, 0xf3, 0x4d, 0xb0, 0x26, 0x3d, 0xf4, 0xc6, 0x69, 0xb8, 0x99, 0x19, 0x41, 0xbe, 0x18, 0x23, 0x7a, 0x10, 0x45, 0xbf, 0xd1, 0x65, 0xea, 0x4a, 0xf3, 0x85, 0x37, 0x65, 0x64, 0xed, 0xf6, 0x65, 0x4a, 0x0d, 0xff, 0x7b, 0x5d, 0x84, 0x47, 0x40, 0x90, 0xf2, 0x65, 0xc4, 0x6b, 0x51, 0x15, 0x45, 0x91, 0x8c, 0xd8, 0xf2, 0x22, 0x60, 0xce, 0x21, 0xa5, 0x84, 0xed, 0xfa, 0x0b, 0x16, 0x44, 0x48, 0x8c, 0x99, 0x7d, 0x95, 0x65, 0x29, 0x26, 0x2a, 0xef, 0x40, 0x0c, 0xc0, 0x32, 0x0e, 0xd2, 0x7d, 0xdc, 0xec, 0x3b, 0xde, 0x6b, 0x9f, 0xd7, 0x9b, 0x37, 0x4a, 0xf6, 0x88, 0xfa, 0x9f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1864_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1864_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1864 = { .name = "ecdsa_brainpoolp384r1_sha384_1864", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1864_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1864_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1864_sig, .siglen = 96, .result = -1, .comment = "s == 0, tcId is 334 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1865 for ECDSA, tcId is 335 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1865_pubkey[] = { 0x4d, 0xf8, 0x98, 0x54, 0x4c, 0x2b, 0x10, 0xdc, 0x3c, 0x4d, 0x32, 0x49, 0xfc, 0xa5, 0x13, 0x0e, 0x75, 0x3d, 0x26, 0xe0, 0x83, 0x20, 0xbd, 0x82, 0x39, 0x26, 0xac, 0xb0, 0x50, 0xd8, 0xb6, 0xa4, 0xfe, 0xad, 0xf2, 0x9b, 0xef, 0x07, 0xec, 0xdb, 0x00, 0xe8, 0x5b, 0x34, 0x1f, 0x22, 0x06, 0x9a, 0x00, 0x33, 0x43, 0x69, 0x5d, 0x1e, 0x0a, 0xc0, 0xa7, 0x8b, 0x38, 0x49, 0x0d, 0x97, 0xc1, 0xe9, 0x0e, 0x4f, 0xf4, 0xca, 0x0d, 0x21, 0x40, 0xb9, 0x10, 0x1f, 0x1b, 0x63, 0xf2, 0x9c, 0xa4, 0xf2, 0xbf, 0x91, 0x76, 0xe1, 0x60, 0x04, 0x83, 0x91, 0x62, 0x16, 0xbd, 0x35, 0xab, 0xce, 0x67, 0x41, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1865_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1865_sig[] = { 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb2, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1865 = { .name = "ecdsa_brainpoolp384r1_sha384_1865", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1865_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1865_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1865_sig, .siglen = 96, .result = -1, .comment = "point at infinity during verify, tcId is 335 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1866 for ECDSA, tcId is 336 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1866_pubkey[] = { 0x3e, 0x95, 0x5d, 0x28, 0x45, 0x89, 0x77, 0x58, 0x37, 0xc9, 0xb8, 0x3d, 0xbc, 0xb4, 0x91, 0x86, 0xd6, 0x95, 0xd6, 0xb5, 0x3f, 0x57, 0x71, 0x68, 0x9f, 0x64, 0x58, 0xe4, 0x0a, 0x2b, 0x6d, 0xad, 0x62, 0x54, 0xcb, 0xb2, 0x27, 0xde, 0x46, 0x75, 0x84, 0x9d, 0x11, 0xe0, 0xfd, 0xf3, 0x21, 0x14, 0x3c, 0x4f, 0x0a, 0xe8, 0x80, 0x33, 0x67, 0x71, 0x61, 0x86, 0x17, 0x4f, 0x91, 0xb7, 0x03, 0x5b, 0x35, 0xbf, 0x84, 0x90, 0xe4, 0x9f, 0x9c, 0x46, 0x14, 0x7b, 0x6d, 0x3b, 0x71, 0xd9, 0x6f, 0x74, 0xab, 0xfa, 0x5e, 0x40, 0xf3, 0x3c, 0x10, 0x0f, 0x79, 0xd4, 0x59, 0x62, 0x41, 0x91, 0xce, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1866_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1866_sig[] = { 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb7, 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1866 = { .name = "ecdsa_brainpoolp384r1_sha384_1866", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1866_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1866_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1866_sig, .siglen = 96, .result = 1, .comment = "edge case for signature malleability, tcId is 336 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1867 for ECDSA, tcId is 337 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1867_pubkey[] = { 0x39, 0xc4, 0x48, 0x73, 0xcc, 0xab, 0x02, 0x3c, 0x4b, 0x36, 0x6a, 0x64, 0x6d, 0xec, 0xb4, 0xbe, 0xb5, 0x67, 0x2b, 0x6d, 0x21, 0x40, 0xfa, 0x0f, 0xd2, 0x00, 0x37, 0x4a, 0xa0, 0x13, 0x01, 0x00, 0x8c, 0x04, 0x19, 0xc3, 0x39, 0x2c, 0x58, 0x90, 0x00, 0x81, 0x6e, 0x1f, 0x18, 0x05, 0x9a, 0x4c, 0x2b, 0x61, 0x04, 0xbe, 0x5e, 0x26, 0xc6, 0x57, 0xaa, 0x1f, 0x6f, 0xa4, 0xad, 0xdf, 0x3f, 0xf5, 0x2a, 0x45, 0x67, 0x98, 0x00, 0xdd, 0x28, 0xcd, 0x62, 0x87, 0x11, 0xf2, 0xd1, 0xc1, 0x11, 0x53, 0xa3, 0x6c, 0x6c, 0x42, 0xfb, 0xa6, 0x95, 0x4c, 0xd3, 0x7f, 0xd2, 0x52, 0x11, 0x2d, 0xe1, 0xa4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1867_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1867_sig[] = { 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb7, 0x46, 0x5c, 0x8f, 0x41, 0x51, 0x9c, 0x36, 0x94, 0x07, 0xae, 0xb7, 0xbf, 0x28, 0x73, 0x20, 0xef, 0x8a, 0x97, 0xb8, 0x84, 0xf6, 0xaa, 0x2b, 0x59, 0x8f, 0x8b, 0x37, 0x36, 0x56, 0x02, 0x12, 0xd3, 0xe7, 0x9d, 0x5b, 0x57, 0xb5, 0xbf, 0xe1, 0x88, 0x1d, 0xc4, 0x19, 0x01, 0x74, 0x82, 0x32, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1867 = { .name = "ecdsa_brainpoolp384r1_sha384_1867", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1867_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1867_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1867_sig, .siglen = 96, .result = 1, .comment = "edge case for signature malleability, tcId is 337 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1868 for ECDSA, tcId is 338 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1868_pubkey[] = { 0x5d, 0x77, 0x13, 0x4e, 0x89, 0x0a, 0xc7, 0x2f, 0x9c, 0x69, 0xfc, 0xc3, 0xf1, 0x81, 0xae, 0x74, 0x6f, 0xef, 0xff, 0xda, 0xfc, 0x1d, 0xfc, 0x79, 0x1c, 0xf3, 0x3a, 0x22, 0xfb, 0x0f, 0x8e, 0x58, 0x61, 0x88, 0xcf, 0x2d, 0x5d, 0x06, 0x0d, 0xdb, 0x04, 0x00, 0x4b, 0xaf, 0x56, 0x19, 0x1c, 0x9f, 0x0e, 0x74, 0x01, 0xdd, 0xcc, 0x47, 0xa0, 0x9b, 0x5e, 0xcf, 0x27, 0x19, 0xcc, 0x93, 0x60, 0x10, 0xa9, 0x37, 0x1a, 0x7f, 0x76, 0x24, 0xe6, 0x3e, 0x7a, 0x00, 0x55, 0x0a, 0x13, 0xd0, 0x35, 0xcf, 0x58, 0x6d, 0x3b, 0x52, 0x2c, 0x7f, 0xd0, 0x62, 0x51, 0xad, 0xbb, 0x0f, 0x0a, 0xad, 0x3d, 0xd7, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1868_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1868_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x2d, 0xfa, 0xfd, 0xff, 0xfc, 0x8d, 0xea, 0xce, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1868 = { .name = "ecdsa_brainpoolp384r1_sha384_1868", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1868_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1868_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1868_sig, .siglen = 96, .result = -1, .comment = "u1 == 1, tcId is 338 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1869 for ECDSA, tcId is 339 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1869_pubkey[] = { 0x60, 0x7c, 0xd9, 0x4c, 0x42, 0xf5, 0xbb, 0xfc, 0xf8, 0x57, 0xa7, 0x08, 0xac, 0x16, 0x3f, 0x0a, 0xfc, 0x0a, 0x65, 0xc8, 0xd8, 0x87, 0x25, 0xf1, 0x8c, 0x4b, 0xf7, 0xeb, 0x7c, 0xf5, 0xd3, 0x4a, 0xca, 0x60, 0x08, 0xa2, 0x7b, 0x4e, 0x5f, 0xd9, 0x47, 0x61, 0x34, 0xed, 0x85, 0xfc, 0xd3, 0x2c, 0x89, 0xf2, 0x48, 0x29, 0x0c, 0x59, 0xb8, 0xfb, 0x96, 0x3e, 0x90, 0xba, 0xb9, 0xb0, 0xb3, 0xe3, 0x13, 0xd3, 0xb8, 0xe0, 0xa6, 0xc8, 0x90, 0x14, 0x55, 0xa2, 0x2b, 0x7b, 0x74, 0xa1, 0x08, 0x15, 0x2c, 0x5b, 0x81, 0x4b, 0xa5, 0x75, 0xde, 0x8d, 0xe0, 0x7c, 0xdb, 0x8d, 0x67, 0xba, 0x2b, 0x50, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1869_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1869_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x1f, 0xc1, 0x15, 0x14, 0x6e, 0x52, 0x1d, 0x7e, 0xa3, 0x3f, 0x3e, 0x12, 0x8e, 0xb0, 0x1d, 0xb0, 0xf6, 0x53, 0xdc, 0x45, 0x85, 0x2c, 0x2b, 0x50, 0x30, 0x1d, 0x63, 0x9b, 0x77, 0x8b, 0x13, 0x38, 0x0e, 0x51, 0xd9, 0x36, 0x65, 0x52, 0xcf, 0x20, 0x49, 0x15, 0x66, 0x05, 0xd5, 0x7a, 0xdf, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1869 = { .name = "ecdsa_brainpoolp384r1_sha384_1869", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1869_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1869_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1869_sig, .siglen = 96, .result = 1, .comment = "u1 == n - 1, tcId is 339 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1870 for ECDSA, tcId is 340 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1870_pubkey[] = { 0x4b, 0x4a, 0xfb, 0xd9, 0x17, 0x46, 0xb1, 0xa4, 0xdf, 0x6d, 0x0d, 0x71, 0x7a, 0xfc, 0x75, 0x28, 0xfa, 0x4a, 0x9d, 0xda, 0x9a, 0x62, 0xaf, 0xee, 0x19, 0xa7, 0x2f, 0xc0, 0x01, 0x9a, 0xa2, 0xea, 0x89, 0xa1, 0x25, 0xbe, 0xa7, 0x67, 0x55, 0x06, 0x23, 0x06, 0x56, 0xca, 0xaf, 0xf5, 0x2c, 0x73, 0x5f, 0x5c, 0x35, 0x75, 0xbf, 0x66, 0x96, 0x37, 0xef, 0xdb, 0x67, 0x24, 0x77, 0x50, 0x0f, 0x1f, 0xe3, 0x7b, 0x45, 0xdc, 0xf8, 0x79, 0x48, 0x7a, 0xd6, 0xca, 0x36, 0xc4, 0x14, 0x73, 0x29, 0xfb, 0x74, 0x17, 0x06, 0xce, 0x9b, 0x92, 0x8c, 0xe4, 0x7b, 0xf6, 0xdc, 0x0f, 0x9e, 0x44, 0x01, 0x7f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1870_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1870_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1870 = { .name = "ecdsa_brainpoolp384r1_sha384_1870", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1870_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1870_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1870_sig, .siglen = 96, .result = 1, .comment = "u2 == 1, tcId is 340 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1871 for ECDSA, tcId is 341 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1871_pubkey[] = { 0x0d, 0x8b, 0x24, 0x6c, 0x62, 0x31, 0x88, 0xb7, 0x45, 0x57, 0x16, 0xac, 0x18, 0x9b, 0x9a, 0xf4, 0x41, 0x67, 0x6a, 0x1c, 0x41, 0xcd, 0x57, 0x57, 0x54, 0xbd, 0x02, 0xae, 0x4d, 0x68, 0x25, 0x30, 0x4b, 0x96, 0x1d, 0xdf, 0x08, 0x26, 0xbb, 0x16, 0x1e, 0x3d, 0x63, 0xe9, 0xbc, 0x71, 0xf1, 0xd4, 0x6e, 0xdb, 0xed, 0xdc, 0x2d, 0x40, 0xda, 0xfd, 0xcc, 0xac, 0x90, 0xae, 0x85, 0xcd, 0x61, 0x6a, 0x0e, 0xa1, 0xe4, 0xa0, 0x8a, 0xe8, 0xfc, 0x33, 0x58, 0xce, 0x7d, 0x51, 0x42, 0xee, 0xe8, 0xf3, 0xbe, 0xbd, 0xc1, 0x45, 0x91, 0xc4, 0xc9, 0xb1, 0x5b, 0xff, 0x12, 0xb8, 0xcf, 0x08, 0x33, 0x4a, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1871_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1871_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x5d, 0xd0, 0xbf, 0x01, 0xc2, 0x25, 0x9e, 0x1a, 0xb4, 0xe8, 0xf4, 0xfe, 0xe0, 0x99, 0x81, 0x3f, 0x63, 0x74, 0xf6, 0x06, 0x9e, 0x38, 0x39, 0xcc, 0xbf, 0x64, 0x49, 0x9d, 0xc8, 0x02, 0xc3, 0xc5, 0x34, 0xd1, 0xcf, 0x1f, 0x9c, 0xff, 0xd7, 0x60, 0x27, 0xb0, 0x21, 0x57, 0x46, 0x02, 0xee, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1871 = { .name = "ecdsa_brainpoolp384r1_sha384_1871", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1871_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1871_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1871_sig, .siglen = 96, .result = 1, .comment = "u2 == n - 1, tcId is 341 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1872 for ECDSA, tcId is 342 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1872_pubkey[] = { 0x04, 0xd9, 0xd4, 0xa6, 0x2d, 0x6e, 0xb0, 0x20, 0x73, 0xe7, 0x38, 0xb1, 0xe4, 0x39, 0xce, 0xcd, 0x54, 0x40, 0x03, 0x19, 0x11, 0xf4, 0x51, 0x90, 0xeb, 0x60, 0x62, 0xa3, 0x35, 0x35, 0xfc, 0x52, 0x69, 0xbc, 0xfc, 0x25, 0xd4, 0xaf, 0xc1, 0xda, 0xe0, 0xeb, 0xad, 0x94, 0x8d, 0x77, 0x32, 0xd8, 0x02, 0x9a, 0xf3, 0x7e, 0x89, 0xa3, 0xce, 0xa7, 0xdf, 0x38, 0xb0, 0x20, 0xf6, 0x24, 0x90, 0x6f, 0xca, 0x6d, 0x94, 0x4e, 0x14, 0x86, 0x85, 0x3f, 0xe8, 0xe5, 0xba, 0x9c, 0xfb, 0xa2, 0xd7, 0x4a, 0x85, 0x2e, 0xc5, 0x87, 0xd4, 0x6f, 0xe4, 0x99, 0x17, 0xc3, 0x64, 0x41, 0x8e, 0xf7, 0xec, 0xa5, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1872_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1872_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x53, 0x3b, 0x0d, 0x50, 0x48, 0x0a, 0x3e, 0xf0, 0x7e, 0x7e, 0x8a, 0xf8, 0xb1, 0x09, 0x77, 0x59, 0xbc, 0x03, 0xac, 0x9a, 0x1c, 0x7e, 0xd6, 0x07, 0x5a, 0x05, 0x28, 0x69, 0xf5, 0x7f, 0x12, 0xb2, 0x85, 0x61, 0x31, 0x62, 0xd0, 0x8e, 0xe7, 0xaa, 0xb9, 0xfe, 0x54, 0xaa, 0xa9, 0x84, 0xa3, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1872 = { .name = "ecdsa_brainpoolp384r1_sha384_1872", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1872_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1872_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1872_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 342 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1873 for ECDSA, tcId is 343 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1873_pubkey[] = { 0x1a, 0x4a, 0x55, 0xc9, 0xb0, 0xce, 0x43, 0xd7, 0xed, 0x78, 0xa9, 0x8d, 0x9b, 0xf6, 0x45, 0x9c, 0xcf, 0x34, 0x94, 0x66, 0xfc, 0xcc, 0x45, 0x75, 0x98, 0xfc, 0x15, 0xa1, 0xd6, 0x95, 0x6d, 0x8c, 0xe8, 0x34, 0x8b, 0x23, 0x32, 0xff, 0xfb, 0x3d, 0x51, 0x6b, 0x07, 0x8d, 0x28, 0xd3, 0x29, 0xdd, 0x73, 0xf4, 0x5a, 0x4c, 0xe1, 0xf5, 0xdc, 0x77, 0x2f, 0x3c, 0x32, 0x83, 0xaf, 0x65, 0x64, 0xe6, 0xe4, 0x10, 0xf9, 0xd5, 0x06, 0x4b, 0x64, 0x84, 0x06, 0x59, 0x66, 0x93, 0x66, 0x93, 0xf6, 0x2a, 0xc9, 0x94, 0x0e, 0xb2, 0x89, 0x14, 0xa0, 0x91, 0xd2, 0x96, 0x4c, 0xd8, 0x43, 0xb4, 0x10, 0x28, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1873_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1873_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x70, 0xa8, 0xe8, 0x17, 0xf4, 0xea, 0x82, 0xb8, 0x31, 0xba, 0x5e, 0x67, 0x18, 0x30, 0xb4, 0x31, 0x28, 0x46, 0xb2, 0x3d, 0xa1, 0x4f, 0xf7, 0xd4, 0x3b, 0xaf, 0x3a, 0x7e, 0xe7, 0xaa, 0x06, 0x1c, 0x86, 0x42, 0x2a, 0xaf, 0x27, 0xff, 0xc5, 0xc6, 0x55, 0x40, 0x68, 0x68, 0xb5, 0xbf, 0x19, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1873 = { .name = "ecdsa_brainpoolp384r1_sha384_1873", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1873_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1873_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1873_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 343 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1874 for ECDSA, tcId is 344 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1874_pubkey[] = { 0x37, 0x3a, 0xc9, 0x8f, 0x08, 0x82, 0x68, 0xa8, 0x6d, 0x13, 0x6d, 0xe4, 0xfa, 0x0c, 0xe2, 0xc4, 0x10, 0x42, 0xcd, 0x33, 0xed, 0x2d, 0x07, 0x25, 0x0f, 0x53, 0xcd, 0x4e, 0xd4, 0x3f, 0xa1, 0xda, 0x42, 0x5d, 0xa5, 0x97, 0xbd, 0x5b, 0x41, 0x3d, 0x56, 0xcf, 0xff, 0x95, 0x42, 0x67, 0x10, 0x4f, 0x06, 0x9e, 0x04, 0x53, 0xbb, 0xbd, 0x79, 0x28, 0x03, 0x16, 0xf8, 0xc1, 0xc1, 0x61, 0xa8, 0x46, 0xaf, 0x37, 0x9a, 0x94, 0x1e, 0xd2, 0x86, 0xe5, 0x93, 0xe7, 0xf2, 0x89, 0xba, 0x4f, 0xff, 0x42, 0x45, 0x8b, 0x27, 0x3a, 0x3b, 0xa4, 0x99, 0x57, 0x4e, 0x13, 0x4e, 0x7f, 0xb4, 0xa7, 0xdc, 0x19, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1874_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1874_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x32, 0x6c, 0x08, 0x72, 0xa7, 0x22, 0x4e, 0x7a, 0x10, 0x40, 0x87, 0xac, 0xf4, 0xc4, 0xb4, 0xe3, 0xe5, 0xab, 0xa4, 0xff, 0xe4, 0x62, 0x5f, 0xc3, 0x95, 0x5c, 0xe9, 0x64, 0x7b, 0xf7, 0x1f, 0xb5, 0x96, 0xb8, 0x39, 0x71, 0xad, 0x2b, 0x52, 0x47, 0x3a, 0x28, 0x21, 0x99, 0x1c, 0x80, 0x89, 0x05, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1874 = { .name = "ecdsa_brainpoolp384r1_sha384_1874", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1874_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1874_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1874_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 344 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1875 for ECDSA, tcId is 345 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1875_pubkey[] = { 0x7e, 0x6a, 0xb4, 0x29, 0xb9, 0xe3, 0x3a, 0x97, 0x4f, 0x6a, 0xb9, 0xa4, 0x9e, 0xb1, 0x52, 0xc4, 0x84, 0x57, 0x5f, 0xad, 0x5d, 0x9b, 0xcd, 0xdc, 0xb8, 0x7e, 0xdc, 0xe1, 0x6e, 0x79, 0x33, 0x3a, 0x93, 0x72, 0x76, 0xf3, 0x6a, 0xec, 0x91, 0x21, 0xde, 0x45, 0x03, 0x84, 0xcb, 0x20, 0xbb, 0x2e, 0x85, 0x95, 0xf6, 0xc2, 0x88, 0x0d, 0x89, 0x19, 0x8e, 0x1b, 0x62, 0x5e, 0x65, 0x05, 0x6d, 0x0a, 0x19, 0xa5, 0x8d, 0x1d, 0x1c, 0x55, 0x1b, 0xcc, 0x5d, 0xd3, 0x9d, 0x28, 0x1d, 0x72, 0x6d, 0xad, 0x41, 0x08, 0x48, 0x8c, 0x8f, 0x94, 0x1a, 0xc9, 0x83, 0x16, 0x9c, 0xac, 0xe3, 0xec, 0xc7, 0x1b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1875_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1875_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x65, 0xcf, 0x0a, 0x5b, 0xce, 0x70, 0xaf, 0x07, 0x8a, 0xf6, 0xd5, 0xa1, 0x45, 0x45, 0xca, 0x61, 0x9e, 0x47, 0xd6, 0xeb, 0x0f, 0xd0, 0x53, 0x1e, 0xcc, 0x74, 0x3a, 0x76, 0x85, 0x53, 0x02, 0x84, 0xa8, 0x32, 0x89, 0xc2, 0xd0, 0x9e, 0x02, 0x43, 0x84, 0xae, 0x5e, 0x77, 0x87, 0x99, 0xe4, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1875 = { .name = "ecdsa_brainpoolp384r1_sha384_1875", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1875_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1875_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1875_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 345 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1876 for ECDSA, tcId is 346 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1876_pubkey[] = { 0x1f, 0xbb, 0x37, 0xf7, 0x51, 0x95, 0xc3, 0xf2, 0xde, 0x3a, 0xfc, 0xc8, 0x8a, 0xd7, 0xeb, 0x32, 0x10, 0x81, 0x44, 0x60, 0x89, 0x43, 0xfa, 0xce, 0x3a, 0x89, 0x00, 0x05, 0xff, 0x2a, 0x3e, 0x0b, 0x55, 0x80, 0x79, 0xc5, 0x84, 0x26, 0x20, 0xf4, 0x4a, 0xdc, 0x0c, 0x38, 0xdd, 0x88, 0xaa, 0xc5, 0x51, 0x73, 0x4f, 0x8e, 0xb8, 0x27, 0xdf, 0x92, 0x9d, 0x73, 0x17, 0x71, 0x4a, 0x29, 0xcf, 0x8b, 0xa4, 0x32, 0xca, 0xf6, 0x89, 0x09, 0x4d, 0x00, 0xeb, 0x9d, 0x63, 0xcb, 0xc9, 0x08, 0xba, 0x76, 0xca, 0x5b, 0x1f, 0x93, 0xd2, 0x29, 0x47, 0x7c, 0x96, 0x08, 0x42, 0x94, 0x0f, 0x42, 0x24, 0xd3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1876_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1876_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x2e, 0x09, 0x9a, 0xdf, 0xe4, 0xd9, 0x12, 0x05, 0x96, 0xe8, 0xa1, 0x52, 0x03, 0x99, 0xb0, 0xe2, 0x49, 0x55, 0x5b, 0x17, 0x1e, 0x0a, 0x71, 0x96, 0x73, 0x07, 0x54, 0x8a, 0x3c, 0x28, 0x75, 0x3f, 0xa4, 0x0b, 0xbc, 0xb0, 0xa8, 0x65, 0x83, 0x69, 0xdc, 0x8c, 0xa0, 0xca, 0xa0, 0x5f, 0xb0, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1876 = { .name = "ecdsa_brainpoolp384r1_sha384_1876", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1876_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1876_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1876_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 346 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1877 for ECDSA, tcId is 347 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1877_pubkey[] = { 0x07, 0xfa, 0x30, 0xc8, 0x37, 0xc8, 0xad, 0x02, 0x93, 0x26, 0xa1, 0xd4, 0x48, 0xbd, 0x27, 0x52, 0x1b, 0x5d, 0x26, 0xaa, 0xd4, 0xd8, 0x24, 0x4b, 0x72, 0x42, 0x49, 0x3d, 0xf7, 0x01, 0x72, 0xe6, 0xdd, 0x1d, 0xaf, 0x5c, 0x7e, 0x07, 0xf4, 0xfa, 0x10, 0x2f, 0x5c, 0x41, 0x5a, 0x4e, 0xc6, 0x1f, 0x09, 0x04, 0x52, 0x7d, 0xf8, 0x77, 0x52, 0x7f, 0x7d, 0x0f, 0x5a, 0x7f, 0x71, 0xb6, 0xd9, 0xc0, 0x3f, 0x2d, 0xe1, 0xdf, 0x88, 0x04, 0x86, 0x8e, 0x73, 0x37, 0xda, 0x35, 0xc9, 0xb1, 0xff, 0xc9, 0xbf, 0x2e, 0x27, 0x9c, 0x3a, 0xf8, 0xa0, 0x78, 0x6e, 0x6f, 0x39, 0x83, 0x2c, 0xc6, 0xed, 0x1b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1877_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1877_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5c, 0x13, 0x35, 0xbf, 0xc9, 0xb2, 0x24, 0x0b, 0x2d, 0xd1, 0x42, 0xa4, 0x07, 0x33, 0x61, 0xc4, 0x92, 0xaa, 0xb6, 0x2e, 0x3c, 0x14, 0xe3, 0x2c, 0xe6, 0x0e, 0xa9, 0x14, 0x78, 0x50, 0xea, 0x7f, 0x48, 0x17, 0x79, 0x61, 0x50, 0xcb, 0x06, 0xd3, 0xb9, 0x19, 0x41, 0x95, 0x40, 0xbf, 0x60, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1877 = { .name = "ecdsa_brainpoolp384r1_sha384_1877", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1877_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1877_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1877_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 347 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1878 for ECDSA, tcId is 348 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1878_pubkey[] = { 0x61, 0x39, 0x7a, 0xe7, 0xfe, 0x8e, 0x7e, 0x89, 0x4b, 0xfa, 0x68, 0x9e, 0x58, 0x13, 0x51, 0x42, 0x93, 0xa0, 0xf1, 0xb9, 0xf1, 0x09, 0x0c, 0x0d, 0x96, 0x96, 0x37, 0x9b, 0x61, 0x28, 0x7a, 0x75, 0x2a, 0x3f, 0x7d, 0x1d, 0x24, 0x80, 0xfe, 0x41, 0x27, 0x49, 0x8d, 0x0e, 0xed, 0xa8, 0x4c, 0x63, 0x0c, 0x2f, 0xad, 0xd3, 0x7e, 0xa3, 0x6b, 0xfe, 0x53, 0x2b, 0x5d, 0x3a, 0x0f, 0x10, 0x1d, 0xdd, 0x3a, 0xc5, 0x94, 0x58, 0x39, 0x96, 0x48, 0xf3, 0xef, 0xaf, 0x58, 0x33, 0xde, 0xc1, 0xc8, 0xc8, 0xec, 0xe0, 0x55, 0x15, 0x89, 0x35, 0x53, 0xef, 0x4d, 0x58, 0x12, 0x0d, 0x37, 0xce, 0x2e, 0xcd, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1878_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1878_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x25, 0x91, 0x60, 0xb3, 0x21, 0xc3, 0x50, 0xf4, 0xf2, 0x29, 0x9a, 0xa7, 0x7c, 0x72, 0xa0, 0x92, 0x48, 0x92, 0x79, 0x57, 0xb6, 0x41, 0x43, 0x08, 0xbf, 0x8c, 0x7f, 0xb4, 0xf2, 0xdb, 0xba, 0x5c, 0xa7, 0x91, 0x98, 0xf8, 0x0a, 0x15, 0x0e, 0x1c, 0xeb, 0x5a, 0x98, 0x45, 0x14, 0x4e, 0xee, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1878 = { .name = "ecdsa_brainpoolp384r1_sha384_1878", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1878_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1878_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1878_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 348 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1879 for ECDSA, tcId is 349 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1879_pubkey[] = { 0x7f, 0x16, 0x6e, 0xfa, 0x8d, 0x84, 0x16, 0xd9, 0x22, 0xf5, 0x76, 0x73, 0xa2, 0x18, 0x0c, 0xfb, 0xb4, 0x9e, 0x8d, 0x16, 0x0d, 0x60, 0xba, 0x5e, 0xc9, 0x0b, 0xa5, 0x47, 0xf3, 0xec, 0xcd, 0x22, 0xce, 0x6a, 0xfd, 0x99, 0xa0, 0xfb, 0x29, 0x2c, 0xfd, 0x16, 0xb0, 0x69, 0x2b, 0x9c, 0xab, 0x03, 0x41, 0x85, 0x79, 0xe6, 0x7c, 0x87, 0xb3, 0x59, 0x91, 0x2f, 0x6c, 0xb4, 0x15, 0x8b, 0xdd, 0x7e, 0xa1, 0x30, 0xb5, 0x00, 0x77, 0x26, 0xdf, 0x2f, 0xce, 0x31, 0x99, 0x15, 0xde, 0xed, 0xc4, 0xf7, 0xe8, 0x9e, 0xe2, 0x3f, 0x78, 0x6e, 0x25, 0x37, 0x3c, 0x99, 0x37, 0x49, 0x8b, 0xab, 0x81, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1879_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1879_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x88, 0x19, 0x64, 0xe1, 0xbb, 0xa9, 0xa2, 0x8c, 0x7a, 0x1d, 0x84, 0x37, 0x9c, 0x65, 0xbb, 0x3d, 0xa7, 0x2f, 0x3c, 0xc8, 0x79, 0xf7, 0xf5, 0x79, 0xd2, 0xf9, 0xb3, 0x4a, 0x57, 0x44, 0x32, 0xd6, 0xc7, 0xd1, 0xc2, 0x29, 0xee, 0x22, 0x7d, 0x4d, 0xdb, 0xdd, 0x9f, 0x15, 0xdf, 0x99, 0x78, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1879 = { .name = "ecdsa_brainpoolp384r1_sha384_1879", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1879_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1879_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1879_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 349 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1880 for ECDSA, tcId is 350 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1880_pubkey[] = { 0x77, 0xc9, 0xc2, 0xe6, 0x58, 0xb0, 0x04, 0xab, 0x68, 0x40, 0xd7, 0xc3, 0x3a, 0x5e, 0x7e, 0xb5, 0xf9, 0x3b, 0xa3, 0xa7, 0xc5, 0xb3, 0x2f, 0x72, 0x75, 0xfd, 0x75, 0xb0, 0x7c, 0x1c, 0x92, 0xf5, 0xae, 0x31, 0x57, 0x6b, 0x9c, 0xbc, 0xa0, 0x46, 0x33, 0x7e, 0x6d, 0x6e, 0xa7, 0x6c, 0x14, 0x5e, 0x67, 0xc5, 0x60, 0x10, 0xdd, 0x97, 0x49, 0xe2, 0xd9, 0x0b, 0x3e, 0xb5, 0x7e, 0xf1, 0xc4, 0xc7, 0x37, 0x41, 0x23, 0x3a, 0x32, 0xa6, 0xa4, 0x35, 0x5b, 0x8c, 0x4e, 0x3a, 0x24, 0xbc, 0xf5, 0x98, 0x66, 0x27, 0xc7, 0x48, 0x07, 0x83, 0x16, 0x1d, 0xb1, 0xd2, 0xa5, 0x33, 0x2b, 0xd7, 0x5f, 0xef, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1880_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1880_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0e, 0x3c, 0x83, 0xbb, 0x59, 0xab, 0xc5, 0x72, 0x20, 0x17, 0x01, 0x52, 0x25, 0x1c, 0xf0, 0x10, 0xb0, 0x08, 0x1f, 0xec, 0xca, 0x2c, 0x95, 0x7c, 0xa7, 0xec, 0x1a, 0x33, 0xda, 0xe3, 0xca, 0x1d, 0x70, 0x94, 0xb1, 0xc0, 0xf7, 0x1b, 0x03, 0xe0, 0x08, 0xbb, 0xe6, 0x46, 0x59, 0x11, 0x9f, 0x09, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1880 = { .name = "ecdsa_brainpoolp384r1_sha384_1880", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1880_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1880_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1880_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 350 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1881 for ECDSA, tcId is 351 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1881_pubkey[] = { 0x64, 0xd9, 0xa3, 0x17, 0xd5, 0xb4, 0x1a, 0xf3, 0x0f, 0xdf, 0xc7, 0x38, 0x94, 0x60, 0xf3, 0x57, 0xfa, 0x99, 0x78, 0x30, 0x4d, 0x02, 0x6b, 0x31, 0x2a, 0xa5, 0xca, 0x04, 0xa1, 0x9b, 0xdc, 0x0c, 0x56, 0x44, 0x0c, 0xfd, 0x14, 0xa0, 0xb0, 0x60, 0xc3, 0xb8, 0xf4, 0xee, 0x8d, 0x4a, 0x5a, 0x37, 0x77, 0x29, 0x9b, 0x22, 0x80, 0xab, 0x4c, 0x85, 0x7e, 0xd2, 0x53, 0x1e, 0x8d, 0xb0, 0x27, 0xf8, 0xc7, 0x23, 0x80, 0x28, 0xbd, 0x7f, 0x7b, 0xa5, 0x9b, 0xc8, 0x05, 0x47, 0xd4, 0xf1, 0x0d, 0xa6, 0xf2, 0xe6, 0x13, 0x58, 0x05, 0x53, 0x40, 0x6f, 0x04, 0x27, 0xec, 0xbd, 0x7b, 0x75, 0x91, 0x6e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1881_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1881_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x63, 0x1b, 0x97, 0xda, 0x7f, 0x33, 0x4d, 0xaf, 0xd0, 0x1e, 0x2a, 0x01, 0xf8, 0x61, 0x86, 0x32, 0x37, 0x2d, 0x9a, 0xbc, 0xdf, 0x14, 0xeb, 0xaf, 0x72, 0x13, 0xda, 0x37, 0xb1, 0x44, 0x9c, 0x4e, 0x8c, 0x8a, 0x1d, 0xfe, 0x03, 0x38, 0x4f, 0x3a, 0xde, 0x89, 0x07, 0xad, 0x94, 0x42, 0x13, 0x98, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1881 = { .name = "ecdsa_brainpoolp384r1_sha384_1881", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1881_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1881_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1881_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 351 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1882 for ECDSA, tcId is 352 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1882_pubkey[] = { 0x26, 0x4b, 0xa4, 0x47, 0xf8, 0x0d, 0x72, 0x1b, 0xf1, 0xe7, 0x98, 0x77, 0xf2, 0x7a, 0x23, 0xee, 0x58, 0x56, 0x5e, 0x88, 0xc4, 0x9f, 0x6b, 0x9c, 0xd6, 0x44, 0x8c, 0x02, 0x4b, 0x6f, 0xf5, 0x3a, 0xeb, 0xb2, 0xb0, 0x8c, 0xec, 0x22, 0xeb, 0x2e, 0xb3, 0x8e, 0x30, 0xfd, 0x54, 0x72, 0x7f, 0x01, 0x80, 0x18, 0x87, 0xf9, 0xf9, 0x4d, 0xce, 0x62, 0x5e, 0xd1, 0xd5, 0x63, 0x50, 0xa4, 0xb2, 0x52, 0xe0, 0xdc, 0xfc, 0x09, 0x84, 0x92, 0x8f, 0x25, 0xad, 0x22, 0xa1, 0x31, 0x35, 0xba, 0xf9, 0x96, 0xbf, 0xa8, 0x28, 0x09, 0xfb, 0xe7, 0x9c, 0x09, 0x79, 0x67, 0x0f, 0xdd, 0xc9, 0xfb, 0xa9, 0xe6, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1882_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1882_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x39, 0x7e, 0x11, 0x32, 0x5b, 0x2e, 0x2e, 0x37, 0x90, 0xde, 0xe4, 0x85, 0x9f, 0xdc, 0xca, 0x85, 0x59, 0x2b, 0xc4, 0x6f, 0xd0, 0xd5, 0x80, 0xab, 0xc5, 0x11, 0x46, 0x02, 0xb6, 0x85, 0x12, 0xf5, 0x49, 0xd9, 0x85, 0x4c, 0x9a, 0xf0, 0xdb, 0x65, 0x81, 0x89, 0xdd, 0x58, 0x3f, 0x7f, 0xc1, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1882 = { .name = "ecdsa_brainpoolp384r1_sha384_1882", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1882_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1882_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1882_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 352 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1883 for ECDSA, tcId is 353 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1883_pubkey[] = { 0x04, 0x91, 0x80, 0x40, 0xa5, 0x8d, 0xc4, 0x77, 0xa7, 0x24, 0x55, 0x61, 0x27, 0x3d, 0xf2, 0xd8, 0xbd, 0x97, 0x7e, 0x5f, 0xd3, 0x9c, 0x40, 0xd3, 0x01, 0x15, 0x36, 0xcb, 0x2b, 0x9c, 0xfe, 0xe8, 0x2e, 0x2a, 0xb5, 0xf5, 0x39, 0xe5, 0x90, 0x8d, 0xcb, 0xf3, 0xff, 0x24, 0xc6, 0x45, 0xdb, 0x4e, 0x59, 0x69, 0xa9, 0xd8, 0xdf, 0x5c, 0xda, 0xaf, 0xe3, 0x49, 0x0c, 0xaa, 0x49, 0x46, 0xac, 0xf5, 0xeb, 0xe3, 0xe9, 0x3a, 0xab, 0x28, 0xa8, 0xd4, 0xa6, 0xf6, 0x1e, 0x2c, 0x8e, 0x5c, 0x02, 0xdc, 0x60, 0x5c, 0x75, 0x80, 0x6d, 0xdd, 0xdd, 0xeb, 0xe2, 0x39, 0x15, 0x63, 0x11, 0x59, 0xc1, 0xf7, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1883_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1883_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0f, 0xe0, 0x8a, 0x8a, 0x37, 0x29, 0x0e, 0xbf, 0x51, 0x9f, 0x9f, 0x09, 0x47, 0x58, 0x0e, 0xd8, 0x7b, 0x29, 0xee, 0x22, 0xc2, 0x96, 0x15, 0xa8, 0x18, 0x0e, 0xb1, 0xcd, 0xbb, 0xc5, 0x89, 0x9c, 0x07, 0x28, 0xec, 0x9b, 0x32, 0xa9, 0x67, 0x90, 0x24, 0x8a, 0xb3, 0x02, 0xea, 0xbd, 0x6f, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1883 = { .name = "ecdsa_brainpoolp384r1_sha384_1883", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1883_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1883_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1883_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 353 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1884 for ECDSA, tcId is 354 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1884_pubkey[] = { 0x22, 0xe4, 0x4e, 0xbe, 0x0a, 0x35, 0x1e, 0x4c, 0x91, 0xf7, 0xbd, 0xfc, 0x0c, 0x0c, 0x3c, 0x6e, 0x1c, 0x67, 0x9d, 0xa8, 0x4a, 0x32, 0x53, 0x9c, 0x2d, 0xbb, 0x41, 0xea, 0x31, 0x06, 0x1b, 0x08, 0x25, 0xe3, 0xf3, 0x4d, 0x7b, 0x0a, 0xd5, 0x25, 0x26, 0x1e, 0xb9, 0xe4, 0x57, 0xc4, 0x08, 0x19, 0x60, 0x89, 0xe3, 0x30, 0x34, 0x73, 0x1b, 0xa8, 0xe9, 0xf9, 0x5f, 0x5a, 0x23, 0x4b, 0xf8, 0xd3, 0x53, 0x9c, 0x83, 0x81, 0xf4, 0xd9, 0x55, 0x10, 0xd5, 0xe0, 0xf1, 0x45, 0xfd, 0x48, 0x20, 0x5e, 0x5c, 0x60, 0x21, 0x8c, 0x3f, 0x84, 0xb1, 0x89, 0xc8, 0xe4, 0xfd, 0x56, 0x08, 0xb4, 0x97, 0x78, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1884_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1884_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5f, 0x92, 0x93, 0x7a, 0xa5, 0x2d, 0x5d, 0xd1, 0x0f, 0xce, 0xfb, 0x95, 0xa2, 0xd5, 0x7b, 0x61, 0x7d, 0x6d, 0x8b, 0x04, 0xe8, 0xdb, 0x5b, 0x3b, 0x5a, 0x39, 0xab, 0xe8, 0x93, 0xfd, 0xa2, 0xae, 0xb2, 0xf9, 0x78, 0x10, 0x8c, 0x55, 0x8a, 0xab, 0xba, 0xd8, 0x29, 0xce, 0x02, 0xc2, 0x77, 0x35, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1884 = { .name = "ecdsa_brainpoolp384r1_sha384_1884", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1884_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1884_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1884_sig, .siglen = 96, .result = 1, .comment = "edge case for u1, tcId is 354 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1885 for ECDSA, tcId is 355 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1885_pubkey[] = { 0x66, 0xed, 0x49, 0x77, 0x9e, 0xd6, 0xa7, 0xb1, 0x0c, 0x81, 0x2b, 0xc7, 0xee, 0x7b, 0x47, 0xa5, 0xd1, 0x1c, 0x5e, 0xa5, 0x02, 0x77, 0x27, 0x3d, 0xa1, 0x40, 0xbc, 0x1b, 0x0c, 0xf5, 0xb8, 0x21, 0x0a, 0x6a, 0x73, 0x7f, 0x7e, 0x9d, 0x92, 0xee, 0xe6, 0xd8, 0x45, 0x13, 0x7e, 0x5c, 0x44, 0xa2, 0x8a, 0xcc, 0xb8, 0xf6, 0x37, 0x38, 0x5c, 0xf6, 0x51, 0x9b, 0xfa, 0xe3, 0xed, 0x3a, 0xe4, 0xd0, 0xac, 0xaa, 0x19, 0xa2, 0x60, 0xa0, 0x1b, 0xd8, 0xcb, 0x53, 0xad, 0x24, 0xda, 0xca, 0xb1, 0x95, 0x4b, 0x20, 0xd1, 0x47, 0x2c, 0xf3, 0x97, 0x5e, 0x87, 0xcc, 0x73, 0x3f, 0x32, 0x9a, 0xb6, 0xbd, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1885_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1885_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x59, 0x93, 0x0a, 0x2b, 0x8b, 0xbd, 0x79, 0xb8, 0x05, 0x1f, 0x25, 0x2a, 0x1a, 0xf7, 0x6b, 0x4a, 0x5c, 0x65, 0x25, 0xad, 0xf9, 0xc6, 0xc7, 0x91, 0x0a, 0x5c, 0xcf, 0x79, 0x8e, 0xac, 0x0c, 0x8d, 0x45, 0x13, 0x92, 0x3a, 0x79, 0x2a, 0x96, 0x5a, 0xbe, 0x82, 0xbb, 0x56, 0x4d, 0xac, 0x21, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1885 = { .name = "ecdsa_brainpoolp384r1_sha384_1885", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1885_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1885_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1885_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 355 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1886 for ECDSA, tcId is 356 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1886_pubkey[] = { 0x30, 0x24, 0x91, 0x20, 0x41, 0xbc, 0x98, 0x9a, 0x93, 0x6f, 0xb4, 0xdc, 0xdd, 0x17, 0x8b, 0x15, 0xe0, 0x3a, 0x0a, 0xa9, 0x4a, 0xba, 0xfb, 0x44, 0x65, 0xb4, 0xa8, 0x9d, 0x44, 0x16, 0xb7, 0xa8, 0xb0, 0x29, 0xd4, 0x7c, 0x17, 0xe6, 0x9a, 0x25, 0x96, 0x2f, 0xf3, 0xae, 0xfe, 0x86, 0x2d, 0xcb, 0x24, 0x9e, 0xe9, 0x25, 0x2b, 0x57, 0x13, 0xe7, 0x47, 0xa2, 0xda, 0x8a, 0xac, 0x2b, 0x96, 0x1e, 0xe2, 0xb6, 0xac, 0xa1, 0x57, 0xa4, 0x48, 0x88, 0x74, 0x86, 0x48, 0xfb, 0xcd, 0xc5, 0x66, 0x1c, 0xd4, 0xa1, 0x69, 0xbb, 0x92, 0xc9, 0xc1, 0xce, 0x50, 0xa7, 0x9a, 0x63, 0x73, 0x50, 0x02, 0xa1, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1886_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1886_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x14, 0x49, 0x90, 0x1c, 0xe4, 0xb0, 0x0f, 0x0e, 0x3a, 0x5f, 0xf8, 0x4c, 0xff, 0x8c, 0x13, 0x48, 0x54, 0xb8, 0x08, 0xe5, 0x04, 0xd1, 0xb8, 0xf0, 0x27, 0xac, 0xe9, 0x59, 0x12, 0x34, 0xe3, 0xf6, 0x2c, 0xe7, 0x0c, 0x35, 0xa8, 0xaa, 0x8e, 0x60, 0xca, 0xfe, 0x1e, 0x0d, 0xf3, 0xed, 0x80, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1886 = { .name = "ecdsa_brainpoolp384r1_sha384_1886", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1886_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1886_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1886_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 356 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1887 for ECDSA, tcId is 357 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1887_pubkey[] = { 0x6c, 0x93, 0x93, 0xb0, 0x0e, 0x9a, 0x62, 0xce, 0x0b, 0x83, 0x67, 0x4c, 0xdc, 0xca, 0x59, 0xb1, 0x8d, 0x5b, 0x34, 0x24, 0x63, 0x48, 0xe3, 0x7c, 0x1d, 0x78, 0x89, 0x8a, 0x52, 0x2d, 0x81, 0x3c, 0x49, 0xd0, 0x8e, 0xfc, 0x5f, 0x3f, 0x7e, 0xf3, 0x3f, 0x3d, 0xc9, 0xdd, 0x1b, 0xc2, 0xe5, 0xc2, 0x00, 0x0b, 0x94, 0x10, 0xce, 0x04, 0xa6, 0x4c, 0xd0, 0x95, 0xae, 0x11, 0x94, 0xbc, 0x1f, 0x51, 0x4c, 0x70, 0x09, 0xa4, 0xe0, 0x68, 0x71, 0xb5, 0x57, 0x15, 0x4c, 0xf4, 0x92, 0xe7, 0xc5, 0x77, 0x49, 0x48, 0x7e, 0xcf, 0xcd, 0x04, 0xcb, 0x31, 0x42, 0x6a, 0xb7, 0x85, 0xff, 0xa9, 0x5e, 0x2f, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1887_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1887_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x89, 0xae, 0x6f, 0x8e, 0x21, 0x5b, 0xcf, 0x35, 0xc7, 0xe2, 0xaf, 0xed, 0x1a, 0x6b, 0x98, 0x55, 0x17, 0x16, 0x87, 0xd9, 0xed, 0xbe, 0xa8, 0xaf, 0x5b, 0xf8, 0xe9, 0xdd, 0xc6, 0x67, 0xaa, 0xc4, 0xe1, 0x66, 0xf0, 0x50, 0x97, 0x38, 0x5f, 0xa9, 0xea, 0x3a, 0x62, 0x45, 0xfc, 0x07, 0xb4, 0xad, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1887 = { .name = "ecdsa_brainpoolp384r1_sha384_1887", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1887_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1887_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1887_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 357 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1888 for ECDSA, tcId is 358 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1888_pubkey[] = { 0x2c, 0x58, 0x27, 0x7a, 0xaa, 0x61, 0xc4, 0x00, 0xd7, 0x03, 0x61, 0x83, 0xaf, 0x49, 0xc9, 0x9a, 0x97, 0xfe, 0xa5, 0xa8, 0xd5, 0xf8, 0x60, 0x8c, 0x4c, 0x6a, 0xc7, 0xa2, 0x82, 0x75, 0x7e, 0x4d, 0xc4, 0xb6, 0xf9, 0x2d, 0x82, 0xa1, 0x02, 0x72, 0xf2, 0xa1, 0x96, 0x96, 0xa4, 0x8f, 0xa7, 0x9f, 0x5a, 0x8a, 0xdb, 0x77, 0x07, 0x40, 0x66, 0x9d, 0x60, 0x10, 0xe5, 0x5f, 0x66, 0x25, 0xb1, 0x41, 0xbe, 0x46, 0x9f, 0xe1, 0x77, 0x9f, 0x4a, 0xdf, 0xe6, 0x4e, 0xab, 0x2e, 0x4a, 0x9a, 0xc5, 0xbf, 0x1c, 0x25, 0xb3, 0xde, 0x0b, 0x74, 0xb8, 0xf9, 0x64, 0x4f, 0xc2, 0x16, 0x01, 0x0d, 0x96, 0x59, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1888_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1888_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3f, 0xc1, 0x62, 0x56, 0xa0, 0x91, 0x4c, 0xe2, 0x66, 0x1a, 0x54, 0x68, 0x8a, 0xf4, 0xb2, 0x54, 0x6b, 0x1b, 0x59, 0xb0, 0x43, 0x66, 0x7d, 0xa6, 0xab, 0xb5, 0xb1, 0xa1, 0xe0, 0xe2, 0xe6, 0xab, 0x86, 0x2f, 0xe8, 0xbb, 0x74, 0x9f, 0x72, 0x51, 0x57, 0x2b, 0xc1, 0x60, 0x56, 0x75, 0x30, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1888 = { .name = "ecdsa_brainpoolp384r1_sha384_1888", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1888_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1888_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1888_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 358 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1889 for ECDSA, tcId is 359 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1889_pubkey[] = { 0x6e, 0x5f, 0x82, 0x7e, 0x1a, 0xa2, 0x25, 0xc4, 0xb9, 0x5d, 0xb5, 0x26, 0x55, 0xf6, 0x7d, 0x65, 0x4b, 0xdc, 0x69, 0xa4, 0xbf, 0x8f, 0x49, 0xc1, 0x9d, 0x1e, 0x65, 0xdc, 0xf1, 0x2c, 0xa5, 0x11, 0x50, 0x5a, 0xa1, 0x72, 0x6c, 0xa2, 0xf5, 0xcd, 0xf8, 0xab, 0x37, 0x6f, 0x94, 0xa0, 0xc5, 0xbd, 0x5d, 0xae, 0xc6, 0xf3, 0x5f, 0x1d, 0xfb, 0xc6, 0x8f, 0xba, 0x02, 0x4c, 0xc8, 0xc5, 0xf7, 0x9c, 0xe9, 0xba, 0xa8, 0x6a, 0xdf, 0xd8, 0xd2, 0xba, 0x53, 0xa7, 0x98, 0xcd, 0xcc, 0x90, 0x25, 0xeb, 0x97, 0x97, 0xd3, 0xbe, 0x20, 0x7b, 0xc6, 0x94, 0xab, 0xb3, 0x38, 0xe4, 0x37, 0x78, 0xff, 0xdd, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1889_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1889_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x64, 0xc1, 0x55, 0x6c, 0x5e, 0xef, 0x31, 0x1a, 0x4f, 0x3b, 0xa4, 0x63, 0x16, 0xad, 0xf7, 0x37, 0x32, 0xd6, 0xed, 0x47, 0xb1, 0xba, 0x2e, 0xcd, 0x17, 0x8f, 0xf8, 0x9b, 0xbc, 0x5d, 0xdd, 0x6c, 0x64, 0x19, 0xf6, 0x2e, 0x04, 0x5e, 0xa2, 0xd3, 0x5c, 0x33, 0xa2, 0x50, 0xdc, 0x2f, 0xb9, 0x25, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1889 = { .name = "ecdsa_brainpoolp384r1_sha384_1889", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1889_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1889_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1889_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 359 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1890 for ECDSA, tcId is 360 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1890_pubkey[] = { 0x7f, 0xe8, 0x52, 0xa7, 0x61, 0x2a, 0x67, 0x3d, 0xf3, 0x51, 0xf0, 0x5a, 0xfe, 0xaf, 0xcb, 0xb1, 0x6c, 0xe4, 0xca, 0xdf, 0x85, 0x68, 0x1b, 0x2b, 0x5f, 0x46, 0xcc, 0x31, 0xef, 0x33, 0xd6, 0xb6, 0x95, 0x37, 0x8e, 0x73, 0x25, 0xe9, 0xcb, 0x31, 0x85, 0xd7, 0x13, 0x7b, 0x2b, 0x17, 0x00, 0x46, 0x5c, 0xbd, 0x4c, 0x81, 0x00, 0x76, 0xd1, 0x35, 0x31, 0x68, 0x87, 0xe9, 0x4b, 0x14, 0xb4, 0xb0, 0x10, 0x8d, 0xb1, 0xc9, 0x44, 0x79, 0x4c, 0x39, 0x89, 0x38, 0xd4, 0x21, 0x76, 0xc3, 0x25, 0x75, 0xb6, 0x42, 0x8b, 0x3e, 0x37, 0xb6, 0x02, 0x21, 0x1c, 0x57, 0x4a, 0xca, 0xfe, 0xf0, 0x91, 0x1e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1890_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1890_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3c, 0xc9, 0x8c, 0x56, 0x1a, 0xa5, 0xf5, 0x0c, 0x8f, 0x19, 0xd9, 0x47, 0xdc, 0x75, 0xac, 0x8f, 0x50, 0x7e, 0x69, 0x85, 0x76, 0x20, 0x06, 0xe7, 0x10, 0x09, 0x82, 0xca, 0xcc, 0xb7, 0x95, 0x30, 0xf8, 0xf9, 0x35, 0xac, 0x9d, 0x3d, 0x82, 0x96, 0x7c, 0xdf, 0x12, 0x9e, 0xcf, 0x5b, 0x0c, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1890 = { .name = "ecdsa_brainpoolp384r1_sha384_1890", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1890_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1890_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1890_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 360 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1891 for ECDSA, tcId is 361 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1891_pubkey[] = { 0x0a, 0x49, 0xdc, 0x35, 0x9e, 0xd4, 0xfe, 0xf6, 0x83, 0xe4, 0x62, 0xdf, 0xe6, 0x85, 0x44, 0x2c, 0xea, 0x77, 0xb7, 0x33, 0xfd, 0x95, 0x63, 0x32, 0x16, 0x79, 0x4d, 0x9a, 0x61, 0xf7, 0xe1, 0x02, 0x2d, 0x94, 0x2a, 0x36, 0xe7, 0x81, 0xa4, 0x84, 0xa2, 0xb4, 0x79, 0xa6, 0x43, 0x46, 0x9a, 0xf4, 0x51, 0x2e, 0xbd, 0x09, 0x66, 0xb6, 0x8b, 0xfe, 0xcf, 0x7a, 0x47, 0x02, 0x1b, 0xcd, 0x9e, 0x6a, 0xa2, 0x70, 0x3d, 0xcc, 0x55, 0x6a, 0x9a, 0x44, 0x3d, 0x16, 0x19, 0x5a, 0xa1, 0x45, 0x73, 0x8f, 0xa3, 0x6a, 0x4d, 0xff, 0x3d, 0x09, 0x48, 0x1f, 0x4a, 0x86, 0x55, 0x0a, 0x8d, 0x1f, 0x35, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1891_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1891_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3f, 0x20, 0x95, 0x53, 0x0f, 0x36, 0x14, 0x4e, 0x00, 0x90, 0x19, 0xee, 0xe1, 0x02, 0xb2, 0x86, 0x7d, 0x83, 0xc9, 0xeb, 0x4f, 0x28, 0xbc, 0xb3, 0x1b, 0x38, 0x3e, 0x00, 0xc8, 0xc3, 0x74, 0x6b, 0x20, 0xcc, 0x90, 0xe8, 0xef, 0xc8, 0x13, 0xae, 0xfb, 0x5b, 0x6a, 0x49, 0x65, 0x20, 0x4c, 0x53, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1891 = { .name = "ecdsa_brainpoolp384r1_sha384_1891", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1891_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1891_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1891_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 361 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1892 for ECDSA, tcId is 362 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1892_pubkey[] = { 0x27, 0x67, 0x15, 0x08, 0x74, 0x95, 0xd5, 0x2c, 0x41, 0x60, 0xd1, 0x54, 0x46, 0xeb, 0xb4, 0xd7, 0x58, 0x29, 0x1b, 0xf5, 0xbc, 0x9c, 0xa8, 0x7b, 0x56, 0xc3, 0xf0, 0x0a, 0xdc, 0x41, 0xfa, 0x45, 0x2d, 0x66, 0x68, 0x41, 0x52, 0xd3, 0xe1, 0x9d, 0x2f, 0xc3, 0xad, 0x5d, 0x28, 0x97, 0x87, 0xad, 0x36, 0x73, 0x85, 0xd3, 0xc3, 0xf5, 0xc3, 0xc2, 0xc6, 0xc3, 0x16, 0x6a, 0xdc, 0xfa, 0xfc, 0x3d, 0x20, 0x44, 0x53, 0xca, 0xb8, 0x79, 0x7d, 0x56, 0xe9, 0x55, 0xfb, 0xf1, 0xcf, 0x42, 0x17, 0x63, 0xa6, 0x65, 0x3e, 0x40, 0xef, 0xd9, 0x03, 0x5d, 0xf8, 0x12, 0x81, 0x35, 0x54, 0x6b, 0x62, 0x61, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1892_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1892_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x70, 0x4a, 0xfc, 0x6a, 0x72, 0x08, 0x0d, 0x17, 0x28, 0xf6, 0xcc, 0x9f, 0xd0, 0x23, 0xe9, 0xd2, 0x37, 0x30, 0x23, 0x37, 0x7f, 0x02, 0x59, 0x9b, 0x6e, 0xa9, 0xfb, 0x29, 0x23, 0xdd, 0x74, 0x03, 0xfe, 0x2f, 0xd7, 0x39, 0x99, 0xf6, 0x53, 0x16, 0xb5, 0x3f, 0x91, 0x0b, 0xda, 0x4f, 0x6f, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1892 = { .name = "ecdsa_brainpoolp384r1_sha384_1892", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1892_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1892_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1892_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 362 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1893 for ECDSA, tcId is 363 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1893_pubkey[] = { 0x59, 0x43, 0xdb, 0xd6, 0x6c, 0x79, 0xfc, 0xb8, 0x82, 0x93, 0x6e, 0xcc, 0xdd, 0x6d, 0x86, 0x0c, 0x42, 0xe2, 0x07, 0x27, 0xa2, 0xcd, 0xb2, 0x91, 0x65, 0xc8, 0x42, 0x6c, 0x9d, 0x19, 0x29, 0x90, 0xb7, 0x1d, 0x9a, 0x3c, 0x7f, 0x24, 0x0e, 0x46, 0xac, 0xab, 0x27, 0x41, 0xb7, 0xee, 0x9c, 0x7a, 0x46, 0x1e, 0x5a, 0xb1, 0xdb, 0x3e, 0xb9, 0xb5, 0x1b, 0x32, 0x38, 0xd3, 0xad, 0xa3, 0x35, 0x67, 0xd2, 0x51, 0xd8, 0xfd, 0x0f, 0xba, 0xf5, 0x9a, 0xa1, 0xcf, 0xb4, 0x0f, 0xe7, 0xb2, 0x2e, 0x02, 0x77, 0xf1, 0x66, 0xa3, 0x2e, 0xdb, 0x81, 0xab, 0x6a, 0x85, 0x80, 0xf9, 0xb1, 0xfb, 0x3e, 0x39, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1893_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1893_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x46, 0xf0, 0x9c, 0x47, 0x41, 0xc1, 0xaf, 0xe7, 0x4e, 0x32, 0xf6, 0xff, 0x14, 0xda, 0xaf, 0x90, 0xf4, 0x48, 0x6c, 0x33, 0xf5, 0xd0, 0xe9, 0x78, 0xf9, 0xaf, 0x24, 0xf5, 0x75, 0x19, 0x88, 0xe7, 0x2b, 0x37, 0x4c, 0x5f, 0xae, 0xff, 0xde, 0xc3, 0x09, 0x33, 0x04, 0x01, 0x96, 0x5f, 0x7d, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1893 = { .name = "ecdsa_brainpoolp384r1_sha384_1893", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1893_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1893_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1893_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 363 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1894 for ECDSA, tcId is 364 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1894_pubkey[] = { 0x52, 0x85, 0xd7, 0x29, 0x25, 0xc8, 0x7c, 0x75, 0xb6, 0xad, 0x99, 0x55, 0x06, 0x41, 0x82, 0xbf, 0x2d, 0xeb, 0xcb, 0x25, 0xc8, 0x8d, 0x06, 0x06, 0xf6, 0x67, 0x28, 0x63, 0xde, 0x41, 0x3e, 0x54, 0x96, 0x88, 0xa4, 0xfc, 0xfb, 0xe6, 0x68, 0x9b, 0xb2, 0x3d, 0xba, 0x2b, 0x75, 0x7b, 0xcd, 0xa6, 0x4e, 0xf6, 0xb0, 0x17, 0x66, 0xc9, 0x5b, 0x66, 0xff, 0x10, 0x49, 0x6d, 0x5d, 0xee, 0xba, 0xc4, 0xb4, 0xbf, 0x8c, 0x3b, 0xb4, 0x23, 0x2c, 0x01, 0x9f, 0x80, 0xb6, 0x9d, 0x8a, 0xb0, 0x21, 0x4c, 0xea, 0xf5, 0x81, 0x30, 0x27, 0xec, 0xec, 0x13, 0x3a, 0x5a, 0x5b, 0x97, 0x19, 0x48, 0x82, 0x2e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1894_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1894_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x19, 0x93, 0x0a, 0x2b, 0x8b, 0xbd, 0x79, 0xb8, 0x05, 0x1f, 0x25, 0x2a, 0x1a, 0xf7, 0x6b, 0x4a, 0x5c, 0x65, 0x25, 0xad, 0xf9, 0xc6, 0xc7, 0x91, 0x0a, 0x5c, 0xcf, 0x79, 0x8e, 0xac, 0x0c, 0x8d, 0x45, 0x13, 0x92, 0x3a, 0x79, 0x2a, 0x96, 0x5a, 0xbe, 0x82, 0xbb, 0x56, 0x4d, 0xac, 0x21, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1894 = { .name = "ecdsa_brainpoolp384r1_sha384_1894", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1894_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1894_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1894_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 364 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1895 for ECDSA, tcId is 365 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1895_pubkey[] = { 0x07, 0x86, 0xaf, 0xb0, 0x3d, 0xd7, 0x91, 0xdb, 0xfc, 0x37, 0x1a, 0xb5, 0x1f, 0xfa, 0x28, 0x8b, 0x7c, 0xed, 0xd9, 0x0d, 0x6a, 0x35, 0xa3, 0xc3, 0xa9, 0x25, 0x66, 0xf8, 0x95, 0xf3, 0x8c, 0xb1, 0x85, 0x36, 0x13, 0x7e, 0x01, 0x0f, 0x1c, 0xfb, 0xa2, 0xfb, 0xed, 0x70, 0x56, 0x8d, 0x77, 0xb8, 0x4e, 0xec, 0x84, 0x0c, 0xca, 0x8b, 0x6f, 0x3f, 0x61, 0x23, 0x04, 0xb6, 0x02, 0xff, 0xad, 0x8d, 0xcb, 0xae, 0x17, 0x86, 0xb2, 0xc2, 0x21, 0x6e, 0x9a, 0x1e, 0x59, 0xa6, 0xb6, 0x96, 0x28, 0xb5, 0x2a, 0x40, 0x8b, 0x6a, 0x08, 0x3d, 0x72, 0x7f, 0x3c, 0xcd, 0x0e, 0x70, 0x6f, 0x9a, 0xee, 0xf8, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1895_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1895_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x33, 0x26, 0x14, 0x57, 0x17, 0x7a, 0xf3, 0x70, 0x0a, 0x3e, 0x4a, 0x54, 0x35, 0xee, 0xd6, 0x94, 0xb8, 0xca, 0x4b, 0x5b, 0xf3, 0x8d, 0x8f, 0x22, 0x14, 0xb9, 0x9e, 0xf3, 0x1d, 0x58, 0x19, 0x1a, 0x8a, 0x27, 0x24, 0x74, 0xf2, 0x55, 0x2c, 0xb5, 0x7d, 0x05, 0x76, 0xac, 0x9b, 0x58, 0x43, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1895 = { .name = "ecdsa_brainpoolp384r1_sha384_1895", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1895_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1895_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1895_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 365 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1896 for ECDSA, tcId is 366 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1896_pubkey[] = { 0x46, 0x69, 0x0d, 0xb4, 0x03, 0x90, 0x42, 0x28, 0xe4, 0xf7, 0x36, 0xb1, 0x34, 0x47, 0x91, 0x59, 0x66, 0x28, 0xe8, 0x56, 0x69, 0xd4, 0xdd, 0x01, 0x37, 0x4b, 0x21, 0x27, 0x42, 0x80, 0xb4, 0x21, 0xe4, 0x2f, 0x5b, 0xa3, 0xf3, 0xf2, 0xfa, 0xda, 0xd2, 0x7d, 0x44, 0x69, 0xbe, 0x7d, 0x9b, 0xdb, 0x7e, 0x88, 0x3b, 0x43, 0xc2, 0x72, 0x17, 0xf6, 0x06, 0xe0, 0xa5, 0xba, 0x6c, 0x9d, 0xf7, 0x81, 0xc1, 0x45, 0x77, 0x6c, 0x0e, 0x5a, 0x89, 0x93, 0xf0, 0xed, 0x65, 0xc6, 0xde, 0xd6, 0x5a, 0x43, 0xbd, 0xdd, 0x0f, 0xe7, 0x61, 0x14, 0x85, 0xe8, 0xe8, 0xd9, 0xe7, 0xde, 0xcd, 0xf2, 0xd8, 0xb5, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1896_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1896_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x4c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1896 = { .name = "ecdsa_brainpoolp384r1_sha384_1896", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1896_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1896_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1896_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 366 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1897 for ECDSA, tcId is 367 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1897_pubkey[] = { 0x8b, 0xe6, 0x92, 0x8a, 0xca, 0xd4, 0x4c, 0x95, 0x71, 0xb5, 0xc4, 0x01, 0x5f, 0xa3, 0xff, 0xae, 0x5e, 0x63, 0x9e, 0x41, 0x30, 0xa1, 0xa6, 0x6b, 0x47, 0x3e, 0x5d, 0xfd, 0xfe, 0x93, 0xb6, 0x8a, 0x8d, 0xe8, 0x95, 0x83, 0x66, 0x6d, 0x4d, 0x69, 0x9e, 0x88, 0x85, 0x46, 0x9f, 0x9b, 0x1a, 0x4d, 0x83, 0xb1, 0xd5, 0x31, 0x23, 0x10, 0xe4, 0x45, 0xae, 0x57, 0xc8, 0x5a, 0xb1, 0xa3, 0xdf, 0x8d, 0xbb, 0xb7, 0x06, 0xa5, 0x98, 0xfb, 0xc0, 0x07, 0xef, 0xb6, 0x02, 0xa1, 0x4a, 0x59, 0x52, 0xfd, 0x7e, 0x7d, 0xf0, 0x46, 0x4d, 0x53, 0x3e, 0x06, 0x2e, 0xa2, 0x11, 0x28, 0x5c, 0x2f, 0x5c, 0x27, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1897_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1897_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x8b, 0x33, 0xc7, 0x08, 0x62, 0x4a, 0x1e, 0x2e, 0xeb, 0xa0, 0x0f, 0xb5, 0xb5, 0xa8, 0xed, 0x1a, 0x16, 0x22, 0xfc, 0x71, 0xed, 0x89, 0x7f, 0xb1, 0x3d, 0x87, 0xac, 0x25, 0x39, 0x35, 0xe8, 0x36, 0x58, 0x50, 0xd3, 0x80, 0x01, 0x5c, 0x11, 0x5d, 0x12, 0xe1, 0x4a, 0x24, 0x72, 0x86, 0x0d, 0x09, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1897 = { .name = "ecdsa_brainpoolp384r1_sha384_1897", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1897_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1897_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1897_sig, .siglen = 96, .result = 1, .comment = "edge case for u2, tcId is 367 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1898 for ECDSA, tcId is 368 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1898_pubkey[] = { 0x18, 0x86, 0xdd, 0xd2, 0x82, 0xb0, 0x23, 0x08, 0x49, 0x53, 0xef, 0x7d, 0x9e, 0x85, 0x3a, 0x6a, 0xdc, 0x13, 0x60, 0xce, 0xf7, 0xf5, 0x6d, 0xf7, 0xda, 0x0c, 0xa7, 0xbd, 0xcf, 0x4f, 0x3a, 0x5d, 0x22, 0x7a, 0x73, 0x0f, 0x9f, 0x20, 0xf9, 0x43, 0x4b, 0x56, 0x5d, 0xc4, 0xfa, 0x81, 0x9e, 0x85, 0x6a, 0x0f, 0x0e, 0xd8, 0xd7, 0xf2, 0x8f, 0x91, 0x6a, 0x4e, 0x72, 0x7e, 0x55, 0xbf, 0x08, 0x18, 0xdc, 0xc8, 0x4e, 0xd1, 0x13, 0x2b, 0xd7, 0xda, 0x9f, 0x98, 0xff, 0x95, 0xfb, 0x2a, 0xec, 0x23, 0x8f, 0x4d, 0xf9, 0x18, 0x5b, 0x09, 0x82, 0xa6, 0x68, 0x2c, 0x06, 0xc8, 0x5e, 0x6a, 0x89, 0x5e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1898_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1898_sig[] = { 0x87, 0x29, 0xcb, 0xb9, 0x06, 0xf6, 0x9d, 0x8d, 0x43, 0xf9, 0x4c, 0xb8, 0xc4, 0xb9, 0x57, 0x2c, 0x95, 0x82, 0x72, 0xf5, 0xc6, 0xff, 0x75, 0x9b, 0xa9, 0x11, 0x3f, 0x34, 0x0b, 0x9f, 0x9a, 0xa5, 0x98, 0x83, 0x7a, 0xa3, 0x7a, 0x43, 0x11, 0x71, 0x7f, 0xaf, 0x4c, 0xf6, 0x67, 0x47, 0xa5, 0xb4, 0x28, 0xa9, 0xb8, 0xc5, 0x5e, 0xb6, 0xf5, 0xf1, 0xcf, 0x5c, 0x23, 0x3a, 0xff, 0x64, 0x0f, 0x48, 0x21, 0x1c, 0xd2, 0xb9, 0xcf, 0x05, 0x93, 0xe8, 0xb9, 0xff, 0xff, 0x67, 0xc7, 0xe6, 0x97, 0x03, 0xf8, 0xa6, 0xc5, 0x38, 0x2a, 0x36, 0x76, 0x9d, 0x3c, 0xca, 0x57, 0x71, 0x1a, 0xb6, 0x3c, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1898 = { .name = "ecdsa_brainpoolp384r1_sha384_1898", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1898_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1898_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1898_sig, .siglen = 96, .result = 1, .comment = "point duplication during verification, tcId is 368 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1899 for ECDSA, tcId is 369 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1899_pubkey[] = { 0x18, 0x86, 0xdd, 0xd2, 0x82, 0xb0, 0x23, 0x08, 0x49, 0x53, 0xef, 0x7d, 0x9e, 0x85, 0x3a, 0x6a, 0xdc, 0x13, 0x60, 0xce, 0xf7, 0xf5, 0x6d, 0xf7, 0xda, 0x0c, 0xa7, 0xbd, 0xcf, 0x4f, 0x3a, 0x5d, 0x22, 0x7a, 0x73, 0x0f, 0x9f, 0x20, 0xf9, 0x43, 0x4b, 0x56, 0x5d, 0xc4, 0xfa, 0x81, 0x9e, 0x85, 0x22, 0xaa, 0x0f, 0xa9, 0xcb, 0x45, 0xdd, 0x96, 0xa5, 0x0e, 0xfc, 0xff, 0xfb, 0x27, 0x39, 0xc6, 0x38, 0x67, 0x22, 0x38, 0xda, 0x28, 0x7e, 0xd9, 0x73, 0x18, 0xda, 0x83, 0x84, 0x8c, 0x25, 0x00, 0x1d, 0x85, 0xae, 0x11, 0x35, 0x13, 0x97, 0xcb, 0x1f, 0x1a, 0xf9, 0x4a, 0xd2, 0x9d, 0x62, 0xf5, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1899_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1899_sig[] = { 0x87, 0x29, 0xcb, 0xb9, 0x06, 0xf6, 0x9d, 0x8d, 0x43, 0xf9, 0x4c, 0xb8, 0xc4, 0xb9, 0x57, 0x2c, 0x95, 0x82, 0x72, 0xf5, 0xc6, 0xff, 0x75, 0x9b, 0xa9, 0x11, 0x3f, 0x34, 0x0b, 0x9f, 0x9a, 0xa5, 0x98, 0x83, 0x7a, 0xa3, 0x7a, 0x43, 0x11, 0x71, 0x7f, 0xaf, 0x4c, 0xf6, 0x67, 0x47, 0xa5, 0xb4, 0x28, 0xa9, 0xb8, 0xc5, 0x5e, 0xb6, 0xf5, 0xf1, 0xcf, 0x5c, 0x23, 0x3a, 0xff, 0x64, 0x0f, 0x48, 0x21, 0x1c, 0xd2, 0xb9, 0xcf, 0x05, 0x93, 0xe8, 0xb9, 0xff, 0xff, 0x67, 0xc7, 0xe6, 0x97, 0x03, 0xf8, 0xa6, 0xc5, 0x38, 0x2a, 0x36, 0x76, 0x9d, 0x3c, 0xca, 0x57, 0x71, 0x1a, 0xb6, 0x3c, 0x65, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1899 = { .name = "ecdsa_brainpoolp384r1_sha384_1899", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1899_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1899_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1899_sig, .siglen = 96, .result = -1, .comment = "duplication bug, tcId is 369 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1900 for ECDSA, tcId is 370 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1900_pubkey[] = { 0x89, 0xdd, 0x73, 0x8e, 0xfc, 0xb0, 0xf7, 0x98, 0x11, 0xdf, 0x6b, 0xec, 0x87, 0x34, 0x85, 0x16, 0x94, 0x50, 0xad, 0xa1, 0x8e, 0x60, 0x27, 0x21, 0xe6, 0x17, 0x68, 0xbe, 0x0d, 0x81, 0xe5, 0xd4, 0x13, 0x81, 0xf2, 0x46, 0x68, 0x27, 0x6f, 0x32, 0xbf, 0xe3, 0x1f, 0xf1, 0xc1, 0x6b, 0xcb, 0x6b, 0x1f, 0x7a, 0x4d, 0x28, 0x23, 0xbc, 0xd7, 0x3f, 0x23, 0x6d, 0x90, 0xb6, 0xea, 0x61, 0xd8, 0x92, 0x02, 0x61, 0x90, 0xe1, 0x43, 0x17, 0xb5, 0xd1, 0x10, 0x52, 0x6e, 0x9e, 0x26, 0x75, 0xf0, 0x3d, 0x5e, 0xf3, 0xfc, 0xe8, 0x7b, 0x58, 0x27, 0xa3, 0x7e, 0x0c, 0xf1, 0x9b, 0x4d, 0x39, 0x88, 0xc0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1900_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1900_sig[] = { 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, 0x1c, 0x25, 0x06, 0x1a, 0x20, 0xa4, 0xe2, 0xa1, 0x9c, 0xac, 0x49, 0x7f, 0xa9, 0xc7, 0xa6, 0xc6, 0x37, 0x6f, 0xe3, 0x68, 0x62, 0xaa, 0x77, 0xbd, 0x6c, 0x9e, 0x16, 0x15, 0xbc, 0x00, 0xd4, 0x54, 0xc3, 0x0b, 0xbe, 0x23, 0x15, 0x7f, 0xf3, 0xd0, 0x0b, 0xe8, 0x0a, 0x00, 0x95, 0x00, 0xe1, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1900 = { .name = "ecdsa_brainpoolp384r1_sha384_1900", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1900_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1900_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1900_sig, .siglen = 96, .result = -1, .comment = "comparison with point at infinity , tcId is 370 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1901 for ECDSA, tcId is 371 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1901_pubkey[] = { 0x79, 0x55, 0x92, 0xa6, 0x73, 0xe8, 0x2d, 0xff, 0x3d, 0x77, 0x45, 0x01, 0x94, 0xe5, 0x30, 0x8d, 0x64, 0xf4, 0x5f, 0x11, 0xf7, 0x59, 0xf3, 0x4f, 0x7c, 0x7b, 0x5b, 0x7c, 0xc6, 0xad, 0x73, 0xf9, 0xbf, 0xf8, 0xf6, 0x63, 0x3c, 0xc2, 0x03, 0x78, 0xcf, 0xf2, 0xe5, 0x3f, 0xb7, 0xa5, 0x30, 0x30, 0x85, 0xb5, 0xcd, 0x46, 0x21, 0x66, 0x5a, 0xac, 0x84, 0x35, 0xd8, 0xce, 0x85, 0xb2, 0x6d, 0x44, 0x45, 0x08, 0xb7, 0x7b, 0x28, 0x2e, 0x91, 0xcd, 0x53, 0x15, 0xc7, 0x01, 0xd2, 0xe5, 0xb6, 0x6b, 0xa4, 0xc0, 0x0b, 0xf7, 0xe1, 0xeb, 0x08, 0x59, 0xa1, 0x3c, 0xc3, 0x51, 0xd0, 0x00, 0x41, 0xa1, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1901_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1901_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1901 = { .name = "ecdsa_brainpoolp384r1_sha384_1901", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1901_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1901_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1901_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 371 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1902 for ECDSA, tcId is 372 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1902_pubkey[] = { 0x39, 0xd9, 0x4f, 0xf8, 0x75, 0x7d, 0xcd, 0xb6, 0x74, 0x80, 0xcb, 0xc4, 0x8e, 0x96, 0x79, 0x42, 0x3e, 0x57, 0xde, 0x5a, 0x23, 0x23, 0x2d, 0xf0, 0xdb, 0x1e, 0x0f, 0xf7, 0xe9, 0x08, 0x61, 0x44, 0x01, 0xe6, 0xcd, 0x8d, 0x61, 0x50, 0x08, 0xea, 0x8b, 0xe5, 0x12, 0x99, 0xd9, 0xe2, 0x2d, 0xe9, 0x43, 0x81, 0x26, 0xd7, 0x0d, 0x14, 0xe7, 0x5c, 0xe4, 0x1e, 0xa2, 0xf4, 0x09, 0xbe, 0x88, 0xe2, 0x80, 0x6f, 0x7f, 0x73, 0xbd, 0x51, 0x37, 0x31, 0x69, 0x6b, 0xc5, 0x9e, 0x7a, 0x2c, 0x1d, 0x44, 0xd5, 0x68, 0x3d, 0x3b, 0xdc, 0x92, 0xba, 0xba, 0x1c, 0x2a, 0xda, 0x58, 0x80, 0x9f, 0x8b, 0xef, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1902_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1902_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1902 = { .name = "ecdsa_brainpoolp384r1_sha384_1902", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1902_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1902_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1902_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 372 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1903 for ECDSA, tcId is 373 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1903_pubkey[] = { 0x20, 0xb1, 0xfc, 0x8e, 0x24, 0x80, 0xa9, 0x73, 0xe0, 0x97, 0x33, 0x73, 0x43, 0x49, 0x0b, 0x12, 0xae, 0x40, 0x65, 0x2e, 0x41, 0x80, 0xdd, 0x4a, 0xe5, 0x6d, 0xf5, 0x21, 0xda, 0xa9, 0xe3, 0x91, 0x77, 0x7c, 0x0d, 0x46, 0x6f, 0x01, 0x8a, 0xf5, 0x55, 0x19, 0x03, 0x8d, 0xea, 0xd3, 0x55, 0x01, 0x72, 0x32, 0x88, 0x2b, 0xca, 0x3c, 0xcd, 0x6b, 0x37, 0x55, 0x91, 0xf5, 0xb5, 0x09, 0x65, 0x38, 0xca, 0x57, 0x78, 0x35, 0x53, 0x07, 0xe6, 0x03, 0x14, 0x8f, 0xde, 0x31, 0xf5, 0xac, 0xff, 0xeb, 0x4c, 0x68, 0x63, 0x54, 0x1a, 0xd2, 0x33, 0xde, 0x3f, 0x28, 0x1e, 0xa0, 0xd2, 0x35, 0xb6, 0xf3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1903_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1903_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x1c, 0x25, 0x06, 0x1a, 0x20, 0xa4, 0xe2, 0xa1, 0x9c, 0xac, 0x49, 0x7f, 0xa9, 0xc7, 0xa6, 0xc6, 0x37, 0x6f, 0xe3, 0x68, 0x62, 0xaa, 0x77, 0xbd, 0x6c, 0x9e, 0x16, 0x15, 0xbc, 0x00, 0xd4, 0x54, 0xc3, 0x0b, 0xbe, 0x23, 0x15, 0x7f, 0xf3, 0xd0, 0x0b, 0xe8, 0x0a, 0x00, 0x95, 0x00, 0xe1, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1903 = { .name = "ecdsa_brainpoolp384r1_sha384_1903", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1903_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1903_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1903_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 373 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1904 for ECDSA, tcId is 374 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1904_pubkey[] = { 0x4a, 0x39, 0x1d, 0x79, 0xcf, 0xa8, 0x2b, 0x94, 0x31, 0x23, 0xd6, 0x9e, 0xe2, 0xd1, 0xbc, 0x0e, 0x0b, 0x7e, 0x1e, 0x6f, 0x93, 0xc6, 0x91, 0x23, 0xbf, 0xce, 0x0b, 0xd4, 0xf3, 0x1a, 0x5e, 0x34, 0x34, 0x06, 0x2d, 0xd0, 0xe1, 0xaa, 0x8b, 0x88, 0x6c, 0xeb, 0xa3, 0x62, 0xc4, 0xd6, 0x72, 0x0c, 0x7a, 0x2b, 0x05, 0x43, 0xa1, 0x56, 0xf1, 0x93, 0x4e, 0x02, 0xd3, 0x1e, 0x81, 0xd5, 0xd2, 0x78, 0x5a, 0x71, 0xd5, 0x41, 0xcc, 0x7e, 0x1e, 0x6e, 0x61, 0x32, 0xeb, 0xee, 0x42, 0x11, 0x1f, 0x52, 0xa8, 0x44, 0x93, 0x72, 0x60, 0x71, 0x90, 0x56, 0xae, 0x7b, 0x10, 0xf7, 0x51, 0x60, 0x6c, 0x41, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1904_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1904_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x70, 0x94, 0x18, 0x68, 0x82, 0x93, 0x8a, 0x86, 0x72, 0xb1, 0x25, 0xfe, 0xa7, 0x1e, 0x9b, 0x18, 0xdd, 0xbf, 0x8d, 0xa1, 0x8a, 0xa9, 0xde, 0xf5, 0xb2, 0x78, 0x58, 0x56, 0xf0, 0x03, 0x51, 0x53, 0x0c, 0x2e, 0xf8, 0x8c, 0x55, 0xff, 0xcf, 0x40, 0x2f, 0xa0, 0x28, 0x02, 0x54, 0x03, 0x84, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1904 = { .name = "ecdsa_brainpoolp384r1_sha384_1904", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1904_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1904_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1904_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 374 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1905 for ECDSA, tcId is 375 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1905_pubkey[] = { 0x36, 0x85, 0x4a, 0xda, 0xcf, 0x83, 0xce, 0x5f, 0x0e, 0x44, 0x22, 0x40, 0x6d, 0x7b, 0x6f, 0x7d, 0xb6, 0x3d, 0x73, 0xd4, 0xc8, 0x92, 0xa0, 0x1e, 0x97, 0x5e, 0xf6, 0xee, 0x6b, 0x71, 0xa9, 0x33, 0x4c, 0x9d, 0x57, 0xce, 0x6f, 0xfc, 0xdb, 0x1a, 0x2e, 0x41, 0x74, 0xdd, 0xba, 0x79, 0x9e, 0x12, 0x7d, 0x61, 0x96, 0x72, 0x03, 0x5d, 0xb4, 0xfd, 0x73, 0xe5, 0xe4, 0xb4, 0xea, 0x92, 0x0b, 0x74, 0xf2, 0xe7, 0x0f, 0xd2, 0x4e, 0xbc, 0xa4, 0x9d, 0x22, 0xfd, 0xb1, 0x1e, 0x96, 0xb7, 0x86, 0x7f, 0xa1, 0x83, 0x8c, 0xa5, 0xba, 0xbc, 0xd9, 0xdd, 0x09, 0x6a, 0xb8, 0x5e, 0x2f, 0x97, 0xb5, 0xae, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1905_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1905_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x78, 0x9e, 0xac, 0x6f, 0xf9, 0x9e, 0x14, 0x6b, 0x7a, 0xe2, 0x5f, 0x90, 0xd7, 0xa0, 0xca, 0xbf, 0x36, 0xba, 0xf3, 0x2d, 0x14, 0x91, 0x6e, 0xe2, 0xac, 0xee, 0xa7, 0xca, 0xdc, 0x95, 0xd7, 0x22, 0x1f, 0x56, 0xe5, 0xba, 0xee, 0x6d, 0x82, 0xa0, 0x33, 0x07, 0x06, 0x4b, 0xa3, 0x28, 0x56, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1905 = { .name = "ecdsa_brainpoolp384r1_sha384_1905", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1905_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1905_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1905_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 375 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1906 for ECDSA, tcId is 376 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1906_pubkey[] = { 0x80, 0x4e, 0x6c, 0x71, 0xe4, 0x93, 0xb7, 0x83, 0xec, 0xd3, 0x75, 0xa4, 0xed, 0xcf, 0x86, 0xc7, 0x7b, 0x1c, 0x2d, 0xf5, 0x51, 0xbb, 0xc7, 0x3b, 0xed, 0x85, 0x16, 0xe4, 0xd1, 0x1c, 0xe5, 0x1a, 0x1d, 0xd0, 0x81, 0xe1, 0x9a, 0xa6, 0xf5, 0x1c, 0x65, 0x68, 0x18, 0xb8, 0x53, 0x96, 0x21, 0x78, 0x58, 0x0b, 0xd6, 0xb2, 0xc4, 0xea, 0xbc, 0xf5, 0xb3, 0x74, 0x1e, 0x6b, 0x7d, 0x59, 0xb0, 0xe7, 0xf2, 0xbd, 0xdb, 0x24, 0x7f, 0x5f, 0x9d, 0x67, 0x51, 0xcf, 0x09, 0xe3, 0xc6, 0xc9, 0xd1, 0xf7, 0xc2, 0x7c, 0x0b, 0xb8, 0xd2, 0x1e, 0x77, 0xa8, 0x0e, 0xba, 0xda, 0xf9, 0x0a, 0xf8, 0xb0, 0xd0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1906_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1906_sig[] = { 0x22, 0x82, 0xbc, 0x38, 0x2a, 0x2f, 0x4d, 0xfc, 0xb9, 0x5c, 0x34, 0x95, 0xd7, 0xb4, 0xfd, 0x59, 0x0a, 0xd5, 0x20, 0xb3, 0xeb, 0x6b, 0xe4, 0xd6, 0xec, 0x2f, 0x80, 0xc4, 0xe0, 0xf7, 0x0d, 0xf8, 0x7c, 0x4b, 0xa7, 0x4a, 0x09, 0xb5, 0x53, 0xeb, 0xb4, 0x27, 0xb5, 0x8d, 0xf9, 0xd5, 0x9f, 0xca, 0x64, 0xdc, 0x78, 0xd1, 0x12, 0xcd, 0x6e, 0xd6, 0x7d, 0x43, 0x23, 0xb3, 0x02, 0x65, 0x0a, 0x60, 0x6e, 0xd4, 0x14, 0x15, 0xbd, 0x8c, 0xfc, 0x40, 0xec, 0x74, 0x38, 0xa7, 0x0e, 0xe3, 0xd8, 0x68, 0x04, 0x20, 0xe5, 0xf6, 0x02, 0xae, 0xd5, 0x91, 0xa3, 0x24, 0x76, 0x0c, 0x58, 0x14, 0x06, 0x42, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1906 = { .name = "ecdsa_brainpoolp384r1_sha384_1906", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1906_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1906_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1906_sig, .siglen = 96, .result = 1, .comment = "extreme value for k, tcId is 376 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1907 for ECDSA, tcId is 377 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1907_pubkey[] = { 0x2c, 0x11, 0x57, 0x72, 0xdd, 0x29, 0x86, 0x12, 0x19, 0x7a, 0x1c, 0x59, 0xdf, 0x9c, 0x25, 0xa8, 0x6a, 0xc1, 0x6f, 0xa4, 0xf2, 0x7a, 0xdf, 0x74, 0xbc, 0xc6, 0x73, 0xbb, 0x4a, 0x6a, 0x4b, 0xb5, 0xd0, 0xb5, 0xb6, 0x44, 0x70, 0xd5, 0xd2, 0x6e, 0x03, 0x00, 0x92, 0x2a, 0xb7, 0x23, 0x73, 0x24, 0x42, 0xf6, 0xec, 0x20, 0x9e, 0x27, 0xce, 0x0b, 0x12, 0x7d, 0x33, 0x47, 0x45, 0x27, 0x26, 0x43, 0xd3, 0x66, 0x6b, 0xff, 0x54, 0x92, 0x74, 0x19, 0x76, 0x4d, 0xe5, 0x23, 0x22, 0xee, 0x16, 0x96, 0xe6, 0x20, 0xd1, 0x5e, 0x0e, 0xea, 0x62, 0xfe, 0xd0, 0xf2, 0x0e, 0xfe, 0x6c, 0x91, 0xe1, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1907_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1907_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x2e, 0xe8, 0x5f, 0x80, 0xe1, 0x12, 0xcf, 0x0d, 0x5a, 0x74, 0x7a, 0x7f, 0x70, 0x4c, 0xc0, 0x9f, 0xb1, 0xba, 0x7b, 0x03, 0x4f, 0x1c, 0x1c, 0xe6, 0x5f, 0xb2, 0x24, 0xce, 0xe4, 0x01, 0x61, 0xe2, 0x9a, 0x68, 0xe7, 0x8f, 0xce, 0x7f, 0xeb, 0xb0, 0x13, 0xd8, 0x10, 0xab, 0xa3, 0x01, 0x77, 0x21, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1907 = { .name = "ecdsa_brainpoolp384r1_sha384_1907", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1907_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1907_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1907_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 377 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1908 for ECDSA, tcId is 378 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1908_pubkey[] = { 0x29, 0x57, 0x78, 0xc9, 0xa3, 0xbe, 0x2b, 0x37, 0x34, 0x50, 0xf5, 0x7d, 0xaf, 0x10, 0xde, 0x66, 0xd3, 0x24, 0x41, 0x75, 0x0a, 0xc4, 0x28, 0x9f, 0x67, 0x51, 0xff, 0x61, 0x40, 0x5c, 0xe0, 0x23, 0x7f, 0x64, 0xe2, 0x8a, 0xc5, 0x28, 0x1a, 0x81, 0xd1, 0x3f, 0xba, 0x81, 0xa8, 0x45, 0x4e, 0x58, 0x4c, 0x9f, 0x39, 0x91, 0xd6, 0x15, 0x51, 0x2f, 0xaf, 0x0d, 0xc9, 0x10, 0x71, 0x93, 0xb1, 0xb6, 0xf5, 0xcd, 0x68, 0x43, 0x56, 0xca, 0x51, 0x50, 0x4d, 0x15, 0xc1, 0xca, 0x4b, 0xa0, 0x0b, 0x21, 0xc7, 0xc6, 0x8e, 0xb4, 0x68, 0x32, 0x22, 0xa8, 0x21, 0x1e, 0x4f, 0xfd, 0x56, 0xda, 0x0e, 0x06, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1908_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1908_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1908 = { .name = "ecdsa_brainpoolp384r1_sha384_1908", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1908_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1908_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1908_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 378 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1909 for ECDSA, tcId is 379 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1909_pubkey[] = { 0x65, 0xa3, 0x40, 0xbc, 0x68, 0xf3, 0xfc, 0xea, 0xd4, 0xf0, 0x42, 0x77, 0xee, 0x86, 0x75, 0xf9, 0xc1, 0x7b, 0xc8, 0xc8, 0x84, 0x26, 0xc5, 0xba, 0x03, 0x13, 0xb8, 0xce, 0x7d, 0xa5, 0x8d, 0x92, 0xca, 0x9a, 0x0f, 0xfa, 0x32, 0xc7, 0xee, 0xe1, 0x95, 0x85, 0x7d, 0x86, 0x0b, 0xa1, 0xee, 0xbe, 0x4d, 0xcd, 0x5b, 0xe3, 0xa6, 0x77, 0x80, 0x08, 0xb3, 0x6e, 0xa1, 0x9d, 0x90, 0x2d, 0x93, 0xdd, 0x48, 0x8f, 0x6f, 0xb6, 0x5d, 0xc0, 0x71, 0x95, 0x21, 0x55, 0x3b, 0x39, 0xcb, 0x3c, 0x52, 0x4b, 0x12, 0x68, 0x1d, 0x2e, 0x07, 0xa8, 0xef, 0x72, 0x0c, 0xdc, 0x15, 0x01, 0x1c, 0x23, 0xba, 0x9d, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1909_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1909_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x1c, 0x25, 0x06, 0x1a, 0x20, 0xa4, 0xe2, 0xa1, 0x9c, 0xac, 0x49, 0x7f, 0xa9, 0xc7, 0xa6, 0xc6, 0x37, 0x6f, 0xe3, 0x68, 0x62, 0xaa, 0x77, 0xbd, 0x6c, 0x9e, 0x16, 0x15, 0xbc, 0x00, 0xd4, 0x54, 0xc3, 0x0b, 0xbe, 0x23, 0x15, 0x7f, 0xf3, 0xd0, 0x0b, 0xe8, 0x0a, 0x00, 0x95, 0x00, 0xe1, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1909 = { .name = "ecdsa_brainpoolp384r1_sha384_1909", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1909_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1909_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1909_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 379 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1910 for ECDSA, tcId is 380 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1910_pubkey[] = { 0x54, 0xa0, 0x39, 0x02, 0x65, 0x6b, 0xfa, 0xf4, 0xd6, 0xa5, 0x4f, 0xf3, 0x42, 0x9d, 0x9f, 0x97, 0x19, 0xbb, 0x61, 0xe6, 0xca, 0xf0, 0x00, 0xe1, 0x00, 0x99, 0x2b, 0x31, 0x70, 0x0e, 0x78, 0x0e, 0x0f, 0x73, 0xf5, 0x16, 0x14, 0x95, 0x4a, 0xcd, 0xdd, 0xca, 0xaa, 0x8b, 0x23, 0x11, 0x19, 0x5b, 0x04, 0xad, 0x3b, 0x19, 0xb0, 0x1e, 0x15, 0x0a, 0x39, 0xdc, 0x0c, 0xfa, 0xec, 0xc6, 0x49, 0x8b, 0x18, 0x13, 0x8c, 0xe6, 0x12, 0xc4, 0x92, 0x79, 0x56, 0x87, 0xa4, 0x88, 0x52, 0x26, 0x44, 0xb3, 0xdd, 0xf7, 0x46, 0x2c, 0x3c, 0x35, 0x9b, 0xd0, 0x91, 0xb7, 0xd3, 0x94, 0x69, 0x57, 0x18, 0x79, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1910_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1910_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x70, 0x94, 0x18, 0x68, 0x82, 0x93, 0x8a, 0x86, 0x72, 0xb1, 0x25, 0xfe, 0xa7, 0x1e, 0x9b, 0x18, 0xdd, 0xbf, 0x8d, 0xa1, 0x8a, 0xa9, 0xde, 0xf5, 0xb2, 0x78, 0x58, 0x56, 0xf0, 0x03, 0x51, 0x53, 0x0c, 0x2e, 0xf8, 0x8c, 0x55, 0xff, 0xcf, 0x40, 0x2f, 0xa0, 0x28, 0x02, 0x54, 0x03, 0x84, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1910 = { .name = "ecdsa_brainpoolp384r1_sha384_1910", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1910_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1910_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1910_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 380 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1911 for ECDSA, tcId is 381 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1911_pubkey[] = { 0x46, 0xd1, 0x0d, 0x74, 0x9a, 0x47, 0xa4, 0xd3, 0xf2, 0x5b, 0x6f, 0x28, 0x95, 0x1a, 0x11, 0xf0, 0x1a, 0x54, 0xc2, 0x41, 0x39, 0x57, 0xa4, 0x77, 0x16, 0x2d, 0xab, 0xe0, 0xd0, 0x8d, 0x8a, 0xe9, 0xb6, 0xa9, 0xf4, 0x4b, 0x68, 0xef, 0x34, 0x1f, 0xb8, 0x20, 0xb0, 0xc2, 0x4c, 0x7a, 0x1c, 0x0e, 0x67, 0x1f, 0xf1, 0x66, 0xcd, 0x35, 0xd2, 0xf3, 0xcc, 0x82, 0x1d, 0x58, 0xfa, 0x18, 0xe3, 0x5d, 0x25, 0xe6, 0x03, 0x3b, 0x9e, 0x79, 0x0f, 0xce, 0x48, 0x18, 0xf9, 0xe5, 0x70, 0x92, 0x1c, 0x00, 0x34, 0xb3, 0x81, 0xcc, 0x9a, 0xd2, 0x54, 0xee, 0xaf, 0x1b, 0x38, 0x6e, 0x51, 0x1b, 0x7c, 0x89, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1911_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1911_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x78, 0x9e, 0xac, 0x6f, 0xf9, 0x9e, 0x14, 0x6b, 0x7a, 0xe2, 0x5f, 0x90, 0xd7, 0xa0, 0xca, 0xbf, 0x36, 0xba, 0xf3, 0x2d, 0x14, 0x91, 0x6e, 0xe2, 0xac, 0xee, 0xa7, 0xca, 0xdc, 0x95, 0xd7, 0x22, 0x1f, 0x56, 0xe5, 0xba, 0xee, 0x6d, 0x82, 0xa0, 0x33, 0x07, 0x06, 0x4b, 0xa3, 0x28, 0x56, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1911 = { .name = "ecdsa_brainpoolp384r1_sha384_1911", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1911_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1911_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1911_sig, .siglen = 96, .result = 1, .comment = "extreme value for k and s^-1, tcId is 381 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1912 for ECDSA, tcId is 382 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1912_pubkey[] = { 0x8a, 0xe9, 0x2d, 0xe1, 0x0b, 0x24, 0x4a, 0xc7, 0xf0, 0xde, 0xb6, 0xb1, 0x02, 0xd0, 0x75, 0x95, 0x1d, 0x8c, 0x13, 0xb2, 0x96, 0x0c, 0x2e, 0x98, 0xd7, 0xfb, 0x42, 0xb8, 0xab, 0xe9, 0x0f, 0xd0, 0x7a, 0x4a, 0x21, 0xb8, 0x6e, 0xb4, 0xc7, 0x7e, 0xfe, 0x9a, 0xdb, 0x67, 0x25, 0x67, 0x6d, 0x17, 0x36, 0x06, 0x3f, 0x34, 0x07, 0xc7, 0x16, 0x27, 0xac, 0xaa, 0x83, 0xbe, 0x90, 0x29, 0xc7, 0xa4, 0x0e, 0x8a, 0xa8, 0x96, 0xcb, 0x68, 0xa9, 0xc2, 0xfa, 0x2a, 0xaa, 0x10, 0x79, 0x03, 0x5a, 0x28, 0x31, 0x81, 0xcd, 0x3f, 0x27, 0x23, 0xb2, 0x21, 0xd5, 0xa8, 0x74, 0x7a, 0xd3, 0x92, 0xa0, 0xf9, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1912_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1912_sig[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x64, 0xdc, 0x78, 0xd1, 0x12, 0xcd, 0x6e, 0xd6, 0x7d, 0x43, 0x23, 0xb3, 0x02, 0x65, 0x0a, 0x60, 0x6e, 0xd4, 0x14, 0x15, 0xbd, 0x8c, 0xfc, 0x40, 0xec, 0x74, 0x38, 0xa7, 0x0e, 0xe3, 0xd8, 0x68, 0x04, 0x20, 0xe5, 0xf6, 0x02, 0xae, 0xd5, 0x91, 0xa3, 0x24, 0x76, 0x0c, 0x58, 0x14, 0x06, 0x42, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1912 = { .name = "ecdsa_brainpoolp384r1_sha384_1912", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1912_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1912_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1912_sig, .siglen = 96, .result = 1, .comment = "extreme value for k, tcId is 382 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1913 for ECDSA, tcId is 383 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1913_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52, 0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28, 0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1913_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1913_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x2d, 0xfa, 0xfd, 0xff, 0xfc, 0x8d, 0xea, 0xce, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1913 = { .name = "ecdsa_brainpoolp384r1_sha384_1913", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1913_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1913_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1913_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 383 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1914 for ECDSA, tcId is 384 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1914_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52, 0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28, 0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1914_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1914_sig[] = { 0x1f, 0xc1, 0x15, 0x14, 0x6e, 0x52, 0x1d, 0x7e, 0xa3, 0x3f, 0x3e, 0x12, 0x8e, 0xb0, 0x1d, 0xb0, 0xf6, 0x53, 0xdc, 0x45, 0x85, 0x2c, 0x2b, 0x50, 0x30, 0x1d, 0x63, 0x9b, 0x77, 0x8b, 0x13, 0x38, 0x0e, 0x51, 0xd9, 0x36, 0x65, 0x52, 0xcf, 0x20, 0x49, 0x15, 0x66, 0x05, 0xd5, 0x7a, 0xdf, 0xfc, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1914 = { .name = "ecdsa_brainpoolp384r1_sha384_1914", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1914_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1914_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1914_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 384 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1915 for ECDSA, tcId is 385 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1915_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x01, 0xfb, 0x01, 0x0d, 0x82, 0x3e, 0xaa, 0x83, 0xb2, 0xab, 0x83, 0xef, 0xbb, 0x16, 0x6c, 0x8c, 0xb2, 0x78, 0x65, 0xdf, 0xee, 0x67, 0xfe, 0x4f, 0x31, 0x15, 0xd4, 0xc9, 0x86, 0x25, 0xe7, 0xfb, 0x9e, 0x8d, 0x61, 0x08, 0x18, 0x8b, 0x99, 0x60, 0x44, 0xc4, 0xfc, 0xd2, 0x0a, 0xcb, 0x99, 0x3e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1915_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1915_sig[] = { 0xf9, 0xb1, 0x27, 0xf0, 0xd8, 0x1e, 0xbc, 0xd1, 0x7b, 0x7b, 0xa0, 0xea, 0x13, 0x1c, 0x66, 0x0d, 0x34, 0x0b, 0x05, 0xce, 0x55, 0x7c, 0x82, 0x16, 0x0e, 0x0f, 0x79, 0x3d, 0xe0, 0x7d, 0x38, 0x17, 0x90, 0x23, 0x94, 0x28, 0x71, 0xac, 0xb7, 0x00, 0x2d, 0xfa, 0xfd, 0xff, 0xfc, 0x8d, 0xea, 0xce, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1915 = { .name = "ecdsa_brainpoolp384r1_sha384_1915", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1915_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1915_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1915_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 385 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1916 for ECDSA, tcId is 386 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1916_pubkey[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e, 0x01, 0xfb, 0x01, 0x0d, 0x82, 0x3e, 0xaa, 0x83, 0xb2, 0xab, 0x83, 0xef, 0xbb, 0x16, 0x6c, 0x8c, 0xb2, 0x78, 0x65, 0xdf, 0xee, 0x67, 0xfe, 0x4f, 0x31, 0x15, 0xd4, 0xc9, 0x86, 0x25, 0xe7, 0xfb, 0x9e, 0x8d, 0x61, 0x08, 0x18, 0x8b, 0x99, 0x60, 0x44, 0xc4, 0xfc, 0xd2, 0x0a, 0xcb, 0x99, 0x3e, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1916_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1916_sig[] = { 0x1f, 0xc1, 0x15, 0x14, 0x6e, 0x52, 0x1d, 0x7e, 0xa3, 0x3f, 0x3e, 0x12, 0x8e, 0xb0, 0x1d, 0xb0, 0xf6, 0x53, 0xdc, 0x45, 0x85, 0x2c, 0x2b, 0x50, 0x30, 0x1d, 0x63, 0x9b, 0x77, 0x8b, 0x13, 0x38, 0x0e, 0x51, 0xd9, 0x36, 0x65, 0x52, 0xcf, 0x20, 0x49, 0x15, 0x66, 0x05, 0xd5, 0x7a, 0xdf, 0xfc, 0x14, 0x1a, 0x72, 0x12, 0xa9, 0x9a, 0x58, 0xbc, 0x94, 0x7b, 0x0f, 0xed, 0x79, 0x45, 0x77, 0x1f, 0xde, 0x74, 0x7d, 0xdc, 0xd8, 0xc2, 0xe7, 0xd0, 0x72, 0x27, 0xc6, 0xa1, 0xcf, 0x6e, 0x4e, 0x85, 0xaf, 0xe3, 0xd0, 0xf4, 0x7d, 0x12, 0x40, 0x70, 0x08, 0x81, 0x2b, 0xb7, 0x45, 0xdc, 0x0e, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1916 = { .name = "ecdsa_brainpoolp384r1_sha384_1916", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1916_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1916_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1916_sig, .siglen = 96, .result = -1, .comment = "testing point duplication, tcId is 386 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1917 for ECDSA, tcId is 387 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1917_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1917_sig[] = { 0x65, 0xfd, 0x45, 0x68, 0x14, 0x37, 0x1d, 0x60, 0x88, 0x3f, 0xfd, 0xa5, 0xf7, 0x4f, 0x36, 0xdc, 0x2d, 0x45, 0x88, 0x61, 0x21, 0x77, 0x0e, 0x29, 0xed, 0x31, 0x63, 0x75, 0x47, 0x16, 0xd1, 0x2c, 0x1c, 0xab, 0x03, 0xa2, 0xcb, 0x6a, 0x6e, 0x33, 0x76, 0xfc, 0x96, 0xd8, 0x72, 0x7b, 0xd1, 0xbf, 0x1a, 0xa6, 0x5e, 0x57, 0x93, 0x2d, 0x05, 0x78, 0x84, 0x13, 0x21, 0x9b, 0x7a, 0xb2, 0x3e, 0x53, 0x37, 0xf6, 0x3f, 0xb2, 0xdc, 0xb0, 0xf8, 0x9b, 0x42, 0x27, 0xd2, 0x84, 0xa3, 0xfc, 0xbd, 0xf3, 0xc5, 0x4c, 0x02, 0x1a, 0x6c, 0x0c, 0xa4, 0x24, 0x45, 0xbf, 0x80, 0x22, 0x13, 0x12, 0x16, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1917 = { .name = "ecdsa_brainpoolp384r1_sha384_1917", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1917_pubkey, .pubkeylen = 96, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp384r1_sha384_1917_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 387 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1918 for ECDSA, tcId is 388 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1918_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1918_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1918_sig[] = { 0x01, 0x05, 0x7e, 0x36, 0xad, 0x00, 0xf7, 0x9e, 0x7c, 0x1c, 0xfc, 0xf4, 0xde, 0xa3, 0x01, 0xe4, 0xe2, 0x35, 0x06, 0x44, 0xd5, 0xef, 0xf4, 0xd4, 0xc7, 0xf2, 0x3c, 0xdd, 0x2f, 0x4f, 0x23, 0x60, 0x93, 0xff, 0x27, 0xe3, 0x3e, 0xb4, 0x4f, 0xd8, 0x04, 0xb2, 0xf0, 0xda, 0xf5, 0xc3, 0x27, 0xa4, 0x2a, 0x9b, 0x2b, 0x91, 0x0d, 0xd2, 0x3b, 0x99, 0x4c, 0xac, 0x12, 0xf3, 0x22, 0x82, 0x84, 0x61, 0x09, 0x4c, 0x87, 0x90, 0x48, 0x1b, 0x39, 0x25, 0x69, 0xc6, 0x67, 0x4a, 0xc2, 0xec, 0xa7, 0x4d, 0xd7, 0x49, 0x57, 0xd9, 0x44, 0x56, 0x54, 0x85, 0x46, 0xb6, 0x5b, 0xd5, 0x05, 0x58, 0xf4, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1918 = { .name = "ecdsa_brainpoolp384r1_sha384_1918", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1918_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1918_msg, .msglen = 3, .sig = ecdsa_brainpoolp384r1_sha384_1918_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 388 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1919 for ECDSA, tcId is 389 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1919_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1919_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1919_sig[] = { 0x6d, 0xd9, 0xd4, 0xe9, 0x8c, 0x9c, 0x38, 0x82, 0x40, 0xe9, 0x5c, 0x49, 0xb2, 0x10, 0x0a, 0xfb, 0xe0, 0xd7, 0x22, 0xf8, 0xa1, 0x52, 0x65, 0x1c, 0x61, 0xd7, 0xef, 0x9b, 0xf4, 0x61, 0x50, 0xe3, 0xcd, 0xf9, 0xbf, 0x63, 0x30, 0xe7, 0x5e, 0x4b, 0xf2, 0xc2, 0x94, 0xcd, 0x66, 0xe4, 0x8d, 0x06, 0x12, 0x82, 0xd3, 0x3b, 0x5b, 0x79, 0xd4, 0xea, 0xaf, 0xa0, 0x3a, 0x77, 0xbb, 0x8b, 0xa2, 0xc3, 0x18, 0x29, 0x1f, 0x6e, 0xa0, 0x9d, 0x54, 0x8b, 0x77, 0x04, 0xbb, 0x00, 0x91, 0x08, 0x56, 0xdd, 0x36, 0x05, 0x57, 0xe6, 0x09, 0xad, 0xd8, 0x91, 0xc6, 0x43, 0x5d, 0x7a, 0x80, 0xaf, 0xdd, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1919 = { .name = "ecdsa_brainpoolp384r1_sha384_1919", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1919_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1919_msg, .msglen = 6, .sig = ecdsa_brainpoolp384r1_sha384_1919_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 389 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1920 for ECDSA, tcId is 390 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1920_pubkey[] = { 0x6c, 0x9a, 0xab, 0xa3, 0x43, 0xcb, 0x2f, 0xaf, 0x09, 0x83, 0x19, 0xcc, 0x4d, 0x15, 0xea, 0x21, 0x87, 0x86, 0xf5, 0x5c, 0x8c, 0xf0, 0xa8, 0xb6, 0x68, 0x09, 0x11, 0x70, 0xa6, 0x42, 0x2f, 0x6c, 0x24, 0x98, 0x94, 0x5a, 0x81, 0x64, 0xa4, 0xb6, 0xf2, 0x7c, 0xdd, 0x11, 0xe8, 0x00, 0xda, 0x50, 0x1b, 0xe9, 0x61, 0xb3, 0x7b, 0x09, 0x80, 0x46, 0x10, 0xce, 0x0d, 0xf4, 0x0d, 0xd8, 0x23, 0x6c, 0x75, 0xa1, 0x2d, 0x0c, 0x80, 0x14, 0xb1, 0x63, 0x46, 0x4a, 0x4a, 0xeb, 0xa7, 0xcb, 0x18, 0xd2, 0x0d, 0x32, 0x22, 0x08, 0x3e, 0xc4, 0xa9, 0x41, 0x85, 0x2f, 0x24, 0xaa, 0x3d, 0x5d, 0x84, 0xe3, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1920_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1920_sig[] = { 0x46, 0xcb, 0x43, 0x79, 0x8b, 0xc0, 0x6d, 0xbe, 0x78, 0x8a, 0x4f, 0x4b, 0x2b, 0x98, 0x13, 0x0e, 0x3a, 0xae, 0x91, 0x7f, 0x1d, 0x2a, 0x00, 0x56, 0x56, 0xbd, 0x70, 0xa3, 0x28, 0x8c, 0xaf, 0x7c, 0x37, 0xd1, 0xde, 0xe0, 0xc9, 0x10, 0x88, 0x28, 0xa6, 0x9d, 0x2a, 0x1e, 0xea, 0xe1, 0x13, 0xc6, 0x81, 0x80, 0xd0, 0xc5, 0xba, 0x1b, 0xed, 0x4f, 0x2b, 0x0d, 0x4d, 0x8e, 0xd7, 0xea, 0x17, 0x91, 0x6b, 0x63, 0x40, 0x03, 0x97, 0xe7, 0xb6, 0xd7, 0x0e, 0x73, 0x12, 0xc5, 0xff, 0x0f, 0x45, 0x24, 0xa4, 0x9a, 0xbf, 0x70, 0x71, 0xc8, 0xba, 0x47, 0x0d, 0xe6, 0x4f, 0xb6, 0x68, 0x57, 0x03, 0x80, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1920 = { .name = "ecdsa_brainpoolp384r1_sha384_1920", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1920_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1920_msg, .msglen = 20, .sig = ecdsa_brainpoolp384r1_sha384_1920_sig, .siglen = 96, .result = 1, .comment = "pseudorandom signature, tcId is 390 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1921 for ECDSA, tcId is 391 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1921_pubkey[] = { 0x46, 0x21, 0x17, 0xd2, 0xe3, 0x3a, 0x7d, 0xb1, 0xb9, 0x5c, 0x8a, 0x6a, 0x3c, 0x79, 0x82, 0xf8, 0x3d, 0xa9, 0x68, 0x17, 0xe7, 0x49, 0x71, 0x8c, 0xae, 0xe7, 0xb6, 0xaa, 0x9c, 0x9d, 0xa4, 0xe8, 0xf2, 0xff, 0x79, 0x51, 0x67, 0x4e, 0xed, 0x2b, 0x56, 0x9a, 0xb8, 0x46, 0xf5, 0x90, 0x02, 0xa8, 0x50, 0xe6, 0x60, 0x6a, 0x97, 0x26, 0xa9, 0x20, 0x9c, 0x9e, 0x94, 0x5f, 0xbf, 0x6c, 0xbb, 0xc9, 0xa4, 0x87, 0xc4, 0xa4, 0xd8, 0x1c, 0x52, 0xac, 0x36, 0x84, 0xc2, 0x6c, 0x33, 0x92, 0xb9, 0xbd, 0x24, 0xf7, 0x18, 0x48, 0x21, 0xbe, 0x06, 0xf6, 0x44, 0x8b, 0x24, 0xa8, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1921_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1921_sig[] = { 0x43, 0xa3, 0xac, 0x2f, 0x3d, 0x2b, 0x4d, 0x37, 0x23, 0xa9, 0x79, 0x30, 0xb0, 0x23, 0xee, 0x73, 0x01, 0x0a, 0x7c, 0xf8, 0xd2, 0xa9, 0x93, 0x72, 0xf3, 0x13, 0x2b, 0xd7, 0xd9, 0xc8, 0x35, 0x74, 0xde, 0x3a, 0xb8, 0x65, 0x25, 0xef, 0xc4, 0xee, 0x2c, 0x59, 0x79, 0x9d, 0x5f, 0xf7, 0xef, 0xb4, 0x34, 0xf5, 0x9a, 0x3e, 0xa9, 0xf5, 0x26, 0x7f, 0x84, 0x58, 0xaf, 0xda, 0xa3, 0x87, 0x3e, 0x23, 0x36, 0xe0, 0xab, 0x8a, 0x40, 0xca, 0x1b, 0x79, 0x7c, 0xbd, 0x97, 0x7d, 0x19, 0x2f, 0x20, 0x24, 0xf9, 0xeb, 0x8d, 0x39, 0xb3, 0x7b, 0x9a, 0x23, 0x8f, 0x20, 0x8d, 0x66, 0xba, 0xcd, 0x27, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1921 = { .name = "ecdsa_brainpoolp384r1_sha384_1921", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1921_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1921_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1921_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 391 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1922 for ECDSA, tcId is 392 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1922_pubkey[] = { 0x46, 0x21, 0x17, 0xd2, 0xe3, 0x3a, 0x7d, 0xb1, 0xb9, 0x5c, 0x8a, 0x6a, 0x3c, 0x79, 0x82, 0xf8, 0x3d, 0xa9, 0x68, 0x17, 0xe7, 0x49, 0x71, 0x8c, 0xae, 0xe7, 0xb6, 0xaa, 0x9c, 0x9d, 0xa4, 0xe8, 0xf2, 0xff, 0x79, 0x51, 0x67, 0x4e, 0xed, 0x2b, 0x56, 0x9a, 0xb8, 0x46, 0xf5, 0x90, 0x02, 0xa8, 0x50, 0xe6, 0x60, 0x6a, 0x97, 0x26, 0xa9, 0x20, 0x9c, 0x9e, 0x94, 0x5f, 0xbf, 0x6c, 0xbb, 0xc9, 0xa4, 0x87, 0xc4, 0xa4, 0xd8, 0x1c, 0x52, 0xac, 0x36, 0x84, 0xc2, 0x6c, 0x33, 0x92, 0xb9, 0xbd, 0x24, 0xf7, 0x18, 0x48, 0x21, 0xbe, 0x06, 0xf6, 0x44, 0x8b, 0x24, 0xa8, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1922_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1922_sig[] = { 0x35, 0x31, 0xad, 0xa2, 0x5b, 0x8d, 0x9a, 0xf9, 0xb8, 0x7e, 0x52, 0x24, 0xcd, 0x6a, 0x6d, 0x95, 0x6c, 0x17, 0xdc, 0x32, 0x3e, 0xf8, 0x98, 0x0f, 0x49, 0x7a, 0x6e, 0x7e, 0x44, 0xc8, 0x3d, 0x69, 0xb7, 0x4d, 0xe7, 0x91, 0xd6, 0x2b, 0xce, 0xac, 0xaf, 0xf7, 0x37, 0x88, 0x63, 0xdd, 0x72, 0x5b, 0x45, 0x9d, 0x15, 0x53, 0x93, 0x99, 0x40, 0x93, 0x80, 0xaf, 0x99, 0xd5, 0x60, 0xc5, 0x61, 0x21, 0x7d, 0xaa, 0x5c, 0x53, 0x97, 0x29, 0x45, 0x30, 0x67, 0xdd, 0x1a, 0xa4, 0xbd, 0x9d, 0xf2, 0xb5, 0x34, 0x92, 0x0f, 0x0d, 0x62, 0x13, 0x26, 0x1e, 0xce, 0xa1, 0x6f, 0x0e, 0xd6, 0x85, 0x36, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1922 = { .name = "ecdsa_brainpoolp384r1_sha384_1922", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1922_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1922_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1922_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 392 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1923 for ECDSA, tcId is 393 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1923_pubkey[] = { 0x46, 0x21, 0x17, 0xd2, 0xe3, 0x3a, 0x7d, 0xb1, 0xb9, 0x5c, 0x8a, 0x6a, 0x3c, 0x79, 0x82, 0xf8, 0x3d, 0xa9, 0x68, 0x17, 0xe7, 0x49, 0x71, 0x8c, 0xae, 0xe7, 0xb6, 0xaa, 0x9c, 0x9d, 0xa4, 0xe8, 0xf2, 0xff, 0x79, 0x51, 0x67, 0x4e, 0xed, 0x2b, 0x56, 0x9a, 0xb8, 0x46, 0xf5, 0x90, 0x02, 0xa8, 0x50, 0xe6, 0x60, 0x6a, 0x97, 0x26, 0xa9, 0x20, 0x9c, 0x9e, 0x94, 0x5f, 0xbf, 0x6c, 0xbb, 0xc9, 0xa4, 0x87, 0xc4, 0xa4, 0xd8, 0x1c, 0x52, 0xac, 0x36, 0x84, 0xc2, 0x6c, 0x33, 0x92, 0xb9, 0xbd, 0x24, 0xf7, 0x18, 0x48, 0x21, 0xbe, 0x06, 0xf6, 0x44, 0x8b, 0x24, 0xa8, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1923_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1923_sig[] = { 0x43, 0x8a, 0x0c, 0xff, 0x9f, 0xcf, 0xcf, 0x58, 0x7f, 0x8c, 0x40, 0x77, 0x5a, 0xd4, 0x4e, 0xa4, 0xb0, 0xed, 0x69, 0xf2, 0xd5, 0x47, 0xbe, 0xfe, 0x29, 0x5d, 0x1f, 0xb9, 0xc2, 0x4d, 0xdc, 0xb9, 0x7f, 0x22, 0x80, 0x27, 0xdf, 0x55, 0x2a, 0x06, 0xbf, 0x65, 0x7b, 0x4c, 0x20, 0x27, 0x26, 0x15, 0x5e, 0x15, 0x76, 0x30, 0xbb, 0x74, 0x4f, 0xc8, 0xe7, 0xf7, 0x59, 0x01, 0xde, 0x49, 0x8e, 0x5a, 0xf0, 0xb5, 0x51, 0x1d, 0xfe, 0xee, 0x0c, 0x4c, 0x1f, 0x2e, 0x5c, 0x4a, 0xa0, 0x12, 0x9d, 0xe5, 0x7b, 0x87, 0xa2, 0xa1, 0x3e, 0xa5, 0x9d, 0x18, 0x7d, 0x51, 0xcb, 0xeb, 0x6e, 0xf2, 0x24, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1923 = { .name = "ecdsa_brainpoolp384r1_sha384_1923", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1923_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1923_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1923_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 393 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1924 for ECDSA, tcId is 394 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1924_pubkey[] = { 0x8c, 0xb9, 0x1e, 0x81, 0xee, 0x59, 0x01, 0xb7, 0x1a, 0x59, 0xa4, 0xf7, 0xc8, 0x17, 0x4a, 0xe0, 0x5f, 0xe3, 0xba, 0x00, 0xf6, 0x99, 0xdc, 0xbc, 0x3c, 0x92, 0x33, 0x26, 0x5c, 0x64, 0x05, 0x87, 0xb3, 0xc1, 0x65, 0x59, 0x3c, 0x2d, 0x76, 0xb5, 0xff, 0xc4, 0xb8, 0xdc, 0xbc, 0xb0, 0xe6, 0x55, 0x3a, 0x0e, 0x5d, 0x14, 0xf2, 0xd0, 0xe8, 0xef, 0xe2, 0xbd, 0x8a, 0xa2, 0x60, 0xd8, 0xac, 0xe0, 0x6b, 0xf9, 0x64, 0xc5, 0x1b, 0xab, 0x82, 0x07, 0x07, 0x0a, 0x2d, 0x30, 0x41, 0x0b, 0xb6, 0xb8, 0x7a, 0xee, 0xcb, 0x7f, 0xff, 0x80, 0x2f, 0x2d, 0x4e, 0xa3, 0xca, 0xf6, 0xe0, 0xe7, 0xe7, 0x26, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1924_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1924_sig[] = { 0x16, 0x49, 0x6c, 0x08, 0xc3, 0x07, 0x67, 0x73, 0xfc, 0xd8, 0x41, 0xa5, 0xe2, 0x5e, 0x1a, 0x87, 0x10, 0x8e, 0x0b, 0xa9, 0x0f, 0x97, 0x27, 0xf5, 0x39, 0x03, 0x4b, 0xd2, 0xcf, 0x68, 0x8e, 0x01, 0xa9, 0x55, 0x68, 0x6a, 0x15, 0x11, 0x2e, 0x05, 0x90, 0xfc, 0x91, 0xe3, 0x99, 0x5f, 0xf5, 0xf8, 0x31, 0xb1, 0xb7, 0x33, 0x8f, 0x74, 0xad, 0xba, 0x33, 0x71, 0x2a, 0x83, 0xa7, 0xc6, 0x85, 0xe7, 0xcd, 0x5f, 0x3b, 0xe8, 0x4e, 0xf9, 0x51, 0xec, 0xad, 0x50, 0xfa, 0xcb, 0x7c, 0x6e, 0xc3, 0x93, 0xa3, 0xba, 0xc5, 0x2e, 0xa7, 0xb1, 0x21, 0x2b, 0xd9, 0x2f, 0x4f, 0x45, 0xa9, 0xf8, 0x51, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1924 = { .name = "ecdsa_brainpoolp384r1_sha384_1924", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1924_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1924_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1924_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 394 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1925 for ECDSA, tcId is 395 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1925_pubkey[] = { 0x8c, 0xb9, 0x1e, 0x81, 0xee, 0x59, 0x01, 0xb7, 0x1a, 0x59, 0xa4, 0xf7, 0xc8, 0x17, 0x4a, 0xe0, 0x5f, 0xe3, 0xba, 0x00, 0xf6, 0x99, 0xdc, 0xbc, 0x3c, 0x92, 0x33, 0x26, 0x5c, 0x64, 0x05, 0x87, 0xb3, 0xc1, 0x65, 0x59, 0x3c, 0x2d, 0x76, 0xb5, 0xff, 0xc4, 0xb8, 0xdc, 0xbc, 0xb0, 0xe6, 0x55, 0x3a, 0x0e, 0x5d, 0x14, 0xf2, 0xd0, 0xe8, 0xef, 0xe2, 0xbd, 0x8a, 0xa2, 0x60, 0xd8, 0xac, 0xe0, 0x6b, 0xf9, 0x64, 0xc5, 0x1b, 0xab, 0x82, 0x07, 0x07, 0x0a, 0x2d, 0x30, 0x41, 0x0b, 0xb6, 0xb8, 0x7a, 0xee, 0xcb, 0x7f, 0xff, 0x80, 0x2f, 0x2d, 0x4e, 0xa3, 0xca, 0xf6, 0xe0, 0xe7, 0xe7, 0x26, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1925_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1925_sig[] = { 0x87, 0xf3, 0x09, 0x02, 0x92, 0xe7, 0x9b, 0x72, 0x2c, 0xde, 0x5a, 0xed, 0xaf, 0xa4, 0x24, 0x4f, 0x6e, 0xb4, 0x60, 0xa2, 0x80, 0xe2, 0xe0, 0x50, 0x39, 0x9b, 0x9d, 0x80, 0x23, 0x91, 0xad, 0x50, 0x21, 0x08, 0x70, 0x4a, 0x3c, 0x0b, 0xb9, 0xf9, 0xae, 0x57, 0x1c, 0x3f, 0x7d, 0xec, 0x6c, 0x0b, 0x89, 0xae, 0x00, 0x43, 0xde, 0x38, 0xa5, 0x85, 0xa1, 0x63, 0x2c, 0x72, 0x11, 0xb7, 0x83, 0x03, 0xaf, 0xa3, 0xf8, 0x93, 0x61, 0x54, 0xa6, 0xe6, 0x5a, 0x6f, 0x72, 0x9c, 0x3b, 0x1e, 0xc6, 0x6a, 0x17, 0x75, 0xaa, 0x46, 0x5a, 0xf8, 0xee, 0xd6, 0xdf, 0xea, 0xa5, 0xba, 0x98, 0xce, 0xdb, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1925 = { .name = "ecdsa_brainpoolp384r1_sha384_1925", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1925_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1925_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1925_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 395 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1926 for ECDSA, tcId is 396 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1926_pubkey[] = { 0x8c, 0xb9, 0x1e, 0x81, 0xee, 0x59, 0x01, 0xb7, 0x1a, 0x59, 0xa4, 0xf7, 0xc8, 0x17, 0x4a, 0xe0, 0x5f, 0xe3, 0xba, 0x00, 0xf6, 0x99, 0xdc, 0xbc, 0x3c, 0x92, 0x33, 0x26, 0x5c, 0x64, 0x05, 0x87, 0xb3, 0xc1, 0x65, 0x59, 0x3c, 0x2d, 0x76, 0xb5, 0xff, 0xc4, 0xb8, 0xdc, 0xbc, 0xb0, 0xe6, 0x55, 0x3a, 0x0e, 0x5d, 0x14, 0xf2, 0xd0, 0xe8, 0xef, 0xe2, 0xbd, 0x8a, 0xa2, 0x60, 0xd8, 0xac, 0xe0, 0x6b, 0xf9, 0x64, 0xc5, 0x1b, 0xab, 0x82, 0x07, 0x07, 0x0a, 0x2d, 0x30, 0x41, 0x0b, 0xb6, 0xb8, 0x7a, 0xee, 0xcb, 0x7f, 0xff, 0x80, 0x2f, 0x2d, 0x4e, 0xa3, 0xca, 0xf6, 0xe0, 0xe7, 0xe7, 0x26, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1926_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1926_sig[] = { 0x72, 0x08, 0x22, 0xab, 0xef, 0xa9, 0x12, 0x65, 0xa7, 0xb8, 0xd4, 0x46, 0xec, 0x3b, 0xc4, 0x05, 0xfd, 0x19, 0x21, 0x78, 0xaa, 0x1b, 0x85, 0xdd, 0x66, 0x33, 0x96, 0xa8, 0x96, 0xa3, 0x2c, 0x11, 0x9e, 0x64, 0xb1, 0xa2, 0x08, 0x43, 0xf8, 0x1e, 0xdd, 0x43, 0xc0, 0x37, 0x09, 0xb8, 0xdb, 0xc6, 0x20, 0x6a, 0xe9, 0x5b, 0xb1, 0x8d, 0x2d, 0x38, 0x44, 0xa3, 0x93, 0x40, 0x87, 0x2e, 0xdb, 0xa1, 0x61, 0x1e, 0x3e, 0xa0, 0xe8, 0x4c, 0xea, 0x7c, 0xb6, 0xcf, 0xf2, 0x82, 0xaf, 0x41, 0x4d, 0x8b, 0x5a, 0xa0, 0xbe, 0x8a, 0xab, 0xc1, 0xb5, 0x1b, 0x71, 0x21, 0xd4, 0x26, 0x91, 0x6b, 0x01, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1926 = { .name = "ecdsa_brainpoolp384r1_sha384_1926", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1926_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1926_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1926_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 396 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1927 for ECDSA, tcId is 397 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1927_pubkey[] = { 0x69, 0xeb, 0xf3, 0x32, 0xe1, 0xeb, 0x24, 0x55, 0x32, 0x4a, 0x75, 0x72, 0xa1, 0x79, 0x77, 0xa4, 0xe2, 0x95, 0x51, 0x08, 0xee, 0x8b, 0xd8, 0x1b, 0xd6, 0xd1, 0xf5, 0x55, 0xd6, 0x08, 0x68, 0x7f, 0x5b, 0xbb, 0x39, 0x85, 0x8e, 0xbe, 0xe3, 0x04, 0x98, 0x5b, 0xaa, 0x7d, 0x09, 0xc8, 0x30, 0xbb, 0x67, 0x2b, 0x9c, 0x96, 0x68, 0x4d, 0xfc, 0x00, 0x7f, 0x01, 0x5e, 0x39, 0xcd, 0xad, 0xa9, 0xfe, 0x16, 0xdb, 0x50, 0x22, 0xbf, 0xd1, 0x73, 0x34, 0x8c, 0xaa, 0xfc, 0x52, 0x86, 0x84, 0x62, 0x1f, 0x97, 0xfb, 0xa2, 0x4f, 0x2c, 0x30, 0xe3, 0xdc, 0x72, 0x87, 0x72, 0xe8, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1927_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1927_sig[] = { 0x1e, 0x50, 0x27, 0xfc, 0xc6, 0x30, 0xaa, 0x08, 0x75, 0x0a, 0x47, 0x25, 0x91, 0x9d, 0xd9, 0x07, 0x24, 0x22, 0xa2, 0x1a, 0xca, 0x9d, 0x33, 0x26, 0xbe, 0xc3, 0xe6, 0xac, 0x04, 0x0b, 0xa9, 0x78, 0x49, 0x51, 0xb1, 0xfd, 0xa6, 0xf5, 0x88, 0xe6, 0x0d, 0xcb, 0x55, 0x0b, 0x75, 0x79, 0x3a, 0x4e, 0x0d, 0xf3, 0x22, 0x46, 0x41, 0xf6, 0x80, 0x4f, 0x4d, 0x1b, 0xf9, 0x51, 0x05, 0x1e, 0x08, 0x7c, 0xe1, 0xfa, 0x73, 0x65, 0xc4, 0x3b, 0xd2, 0x78, 0x78, 0x62, 0x68, 0x33, 0xf0, 0x91, 0x90, 0xcc, 0x0a, 0x7f, 0xa2, 0x9b, 0x16, 0xbc, 0x2c, 0xa0, 0xd3, 0x4f, 0xd0, 0x66, 0x0d, 0x24, 0x71, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1927 = { .name = "ecdsa_brainpoolp384r1_sha384_1927", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1927_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1927_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1927_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 397 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1928 for ECDSA, tcId is 398 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1928_pubkey[] = { 0x69, 0xeb, 0xf3, 0x32, 0xe1, 0xeb, 0x24, 0x55, 0x32, 0x4a, 0x75, 0x72, 0xa1, 0x79, 0x77, 0xa4, 0xe2, 0x95, 0x51, 0x08, 0xee, 0x8b, 0xd8, 0x1b, 0xd6, 0xd1, 0xf5, 0x55, 0xd6, 0x08, 0x68, 0x7f, 0x5b, 0xbb, 0x39, 0x85, 0x8e, 0xbe, 0xe3, 0x04, 0x98, 0x5b, 0xaa, 0x7d, 0x09, 0xc8, 0x30, 0xbb, 0x67, 0x2b, 0x9c, 0x96, 0x68, 0x4d, 0xfc, 0x00, 0x7f, 0x01, 0x5e, 0x39, 0xcd, 0xad, 0xa9, 0xfe, 0x16, 0xdb, 0x50, 0x22, 0xbf, 0xd1, 0x73, 0x34, 0x8c, 0xaa, 0xfc, 0x52, 0x86, 0x84, 0x62, 0x1f, 0x97, 0xfb, 0xa2, 0x4f, 0x2c, 0x30, 0xe3, 0xdc, 0x72, 0x87, 0x72, 0xe8, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1928_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1928_sig[] = { 0x4e, 0x61, 0xe3, 0x47, 0x40, 0xa9, 0xf6, 0xdb, 0x08, 0x54, 0xfa, 0xf2, 0x05, 0x71, 0x9a, 0x3d, 0x98, 0xef, 0x64, 0x4b, 0x86, 0x24, 0x1b, 0x85, 0x8f, 0xa2, 0x29, 0x59, 0xc0, 0x43, 0x95, 0x57, 0x8b, 0xef, 0x7b, 0xe3, 0x50, 0x36, 0xae, 0x7a, 0x9f, 0xfe, 0xb9, 0xa2, 0x17, 0x33, 0x11, 0xf4, 0x1e, 0x96, 0x7c, 0x3b, 0x60, 0x71, 0xd3, 0x75, 0x60, 0xfd, 0x64, 0xa4, 0xfe, 0x09, 0x21, 0xb1, 0xd6, 0x00, 0xf6, 0x0d, 0x88, 0x3f, 0xde, 0xc8, 0x16, 0x83, 0x61, 0x76, 0xc5, 0xe6, 0x7a, 0xd0, 0x51, 0x82, 0xaa, 0x08, 0x0c, 0x7e, 0x21, 0x84, 0xc0, 0x71, 0x00, 0x50, 0xd5, 0x23, 0xf0, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1928 = { .name = "ecdsa_brainpoolp384r1_sha384_1928", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1928_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1928_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1928_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 398 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1929 for ECDSA, tcId is 399 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1929_pubkey[] = { 0x69, 0xeb, 0xf3, 0x32, 0xe1, 0xeb, 0x24, 0x55, 0x32, 0x4a, 0x75, 0x72, 0xa1, 0x79, 0x77, 0xa4, 0xe2, 0x95, 0x51, 0x08, 0xee, 0x8b, 0xd8, 0x1b, 0xd6, 0xd1, 0xf5, 0x55, 0xd6, 0x08, 0x68, 0x7f, 0x5b, 0xbb, 0x39, 0x85, 0x8e, 0xbe, 0xe3, 0x04, 0x98, 0x5b, 0xaa, 0x7d, 0x09, 0xc8, 0x30, 0xbb, 0x67, 0x2b, 0x9c, 0x96, 0x68, 0x4d, 0xfc, 0x00, 0x7f, 0x01, 0x5e, 0x39, 0xcd, 0xad, 0xa9, 0xfe, 0x16, 0xdb, 0x50, 0x22, 0xbf, 0xd1, 0x73, 0x34, 0x8c, 0xaa, 0xfc, 0x52, 0x86, 0x84, 0x62, 0x1f, 0x97, 0xfb, 0xa2, 0x4f, 0x2c, 0x30, 0xe3, 0xdc, 0x72, 0x87, 0x72, 0xe8, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1929_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1929_sig[] = { 0x2c, 0x30, 0x90, 0xc5, 0x81, 0xe5, 0x75, 0xda, 0x58, 0xa8, 0xf6, 0x59, 0xf7, 0x4c, 0x5e, 0xee, 0x56, 0x64, 0x00, 0xeb, 0x1d, 0x91, 0xde, 0x0a, 0x95, 0x0e, 0x78, 0x75, 0x42, 0xe6, 0x57, 0x2f, 0x73, 0xb9, 0xf6, 0xd4, 0xf8, 0x1f, 0x1c, 0x8e, 0x42, 0xf9, 0xe4, 0x60, 0xda, 0xc3, 0xc1, 0xdc, 0x75, 0x6b, 0x1b, 0x69, 0x3e, 0x7f, 0xe0, 0x66, 0x86, 0x70, 0x8c, 0x2a, 0x60, 0x98, 0x54, 0xac, 0xcd, 0x21, 0xe3, 0x19, 0x5d, 0x84, 0xb7, 0x2c, 0x11, 0xc8, 0x73, 0x90, 0x8d, 0x17, 0x5d, 0xfc, 0x00, 0xc0, 0x0e, 0xbb, 0xdf, 0x8e, 0x2b, 0xb6, 0x97, 0x0f, 0x2f, 0x19, 0x78, 0x53, 0x03, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1929 = { .name = "ecdsa_brainpoolp384r1_sha384_1929", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1929_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1929_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1929_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 399 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1930 for ECDSA, tcId is 400 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1930_pubkey[] = { 0x4f, 0xb5, 0x68, 0x86, 0x66, 0x67, 0x3f, 0x10, 0x42, 0x87, 0x42, 0x8b, 0x5b, 0xae, 0x6b, 0xd8, 0x2a, 0x5c, 0x69, 0xb5, 0x23, 0x76, 0x2a, 0xa7, 0x39, 0xb2, 0x45, 0x94, 0xa9, 0xa8, 0x12, 0x97, 0x31, 0x8d, 0xf6, 0x13, 0xf6, 0xb7, 0x37, 0x9a, 0xf4, 0x79, 0x79, 0xae, 0x7f, 0xff, 0xff, 0xff, 0x7e, 0x2d, 0x32, 0x5b, 0x41, 0xfe, 0x83, 0x1a, 0x23, 0xcb, 0x69, 0x4c, 0xb8, 0x0a, 0x30, 0x11, 0x9c, 0x19, 0x61, 0x43, 0x53, 0x6e, 0xe3, 0x34, 0x41, 0x6b, 0xa4, 0x37, 0xa4, 0x19, 0x05, 0x4c, 0x18, 0x0a, 0x94, 0x51, 0x54, 0x59, 0x6b, 0x83, 0xd7, 0xf7, 0xc3, 0xa6, 0xb6, 0x05, 0x96, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1930_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1930_sig[] = { 0x09, 0x2f, 0x0e, 0xe1, 0xfe, 0xeb, 0x79, 0xc0, 0x54, 0xae, 0x36, 0x23, 0x5f, 0x87, 0x17, 0xe9, 0xee, 0x72, 0xb4, 0x66, 0xb1, 0x70, 0x4d, 0x4f, 0xa7, 0x8a, 0xdd, 0xfc, 0xd1, 0x35, 0x18, 0xa6, 0x4d, 0xb2, 0xb2, 0xfd, 0xb0, 0x64, 0x39, 0xac, 0xbc, 0x4c, 0x04, 0x5f, 0xb2, 0xc2, 0x3c, 0x3a, 0x23, 0x71, 0xca, 0x6d, 0x36, 0xf4, 0x26, 0x61, 0x62, 0xee, 0x5c, 0x65, 0x7c, 0x71, 0xce, 0xa3, 0x5d, 0xce, 0xc3, 0x63, 0x2c, 0x5b, 0x22, 0x0a, 0x6f, 0x23, 0xac, 0xe1, 0xba, 0x65, 0x62, 0xa8, 0x41, 0xae, 0xee, 0xef, 0xe8, 0x7a, 0x79, 0x98, 0xad, 0xfa, 0xf1, 0x85, 0xb8, 0x55, 0x8e, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1930 = { .name = "ecdsa_brainpoolp384r1_sha384_1930", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1930_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1930_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1930_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 400 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1931 for ECDSA, tcId is 401 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1931_pubkey[] = { 0x4f, 0xb5, 0x68, 0x86, 0x66, 0x67, 0x3f, 0x10, 0x42, 0x87, 0x42, 0x8b, 0x5b, 0xae, 0x6b, 0xd8, 0x2a, 0x5c, 0x69, 0xb5, 0x23, 0x76, 0x2a, 0xa7, 0x39, 0xb2, 0x45, 0x94, 0xa9, 0xa8, 0x12, 0x97, 0x31, 0x8d, 0xf6, 0x13, 0xf6, 0xb7, 0x37, 0x9a, 0xf4, 0x79, 0x79, 0xae, 0x7f, 0xff, 0xff, 0xff, 0x7e, 0x2d, 0x32, 0x5b, 0x41, 0xfe, 0x83, 0x1a, 0x23, 0xcb, 0x69, 0x4c, 0xb8, 0x0a, 0x30, 0x11, 0x9c, 0x19, 0x61, 0x43, 0x53, 0x6e, 0xe3, 0x34, 0x41, 0x6b, 0xa4, 0x37, 0xa4, 0x19, 0x05, 0x4c, 0x18, 0x0a, 0x94, 0x51, 0x54, 0x59, 0x6b, 0x83, 0xd7, 0xf7, 0xc3, 0xa6, 0xb6, 0x05, 0x96, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1931_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1931_sig[] = { 0x6c, 0x8f, 0x4b, 0xe6, 0x41, 0xaf, 0xaf, 0x5b, 0xf9, 0x1c, 0xe0, 0x89, 0x74, 0xd2, 0x84, 0xec, 0xe6, 0xae, 0xc7, 0x47, 0x92, 0x24, 0x72, 0x29, 0xfa, 0x86, 0xc6, 0x59, 0x7e, 0xed, 0x3f, 0xb5, 0x07, 0xb7, 0x12, 0xbb, 0x77, 0xaf, 0x02, 0x26, 0xe1, 0xbb, 0xb3, 0xba, 0xd6, 0x32, 0xb0, 0xd8, 0x77, 0x59, 0x54, 0xfe, 0x8b, 0xf9, 0x36, 0x15, 0x7b, 0x7a, 0xb7, 0xa6, 0x83, 0xf6, 0xdc, 0x18, 0x38, 0xa8, 0x71, 0x82, 0x00, 0x62, 0x1b, 0xc8, 0xbf, 0x2f, 0x32, 0xb7, 0x78, 0xf6, 0xc8, 0xe8, 0xc6, 0x56, 0x53, 0x2b, 0x50, 0xde, 0x39, 0xac, 0x22, 0xd2, 0x2b, 0x37, 0xdc, 0xcf, 0xd1, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1931 = { .name = "ecdsa_brainpoolp384r1_sha384_1931", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1931_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1931_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1931_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 401 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1932 for ECDSA, tcId is 402 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1932_pubkey[] = { 0x4f, 0xb5, 0x68, 0x86, 0x66, 0x67, 0x3f, 0x10, 0x42, 0x87, 0x42, 0x8b, 0x5b, 0xae, 0x6b, 0xd8, 0x2a, 0x5c, 0x69, 0xb5, 0x23, 0x76, 0x2a, 0xa7, 0x39, 0xb2, 0x45, 0x94, 0xa9, 0xa8, 0x12, 0x97, 0x31, 0x8d, 0xf6, 0x13, 0xf6, 0xb7, 0x37, 0x9a, 0xf4, 0x79, 0x79, 0xae, 0x7f, 0xff, 0xff, 0xff, 0x7e, 0x2d, 0x32, 0x5b, 0x41, 0xfe, 0x83, 0x1a, 0x23, 0xcb, 0x69, 0x4c, 0xb8, 0x0a, 0x30, 0x11, 0x9c, 0x19, 0x61, 0x43, 0x53, 0x6e, 0xe3, 0x34, 0x41, 0x6b, 0xa4, 0x37, 0xa4, 0x19, 0x05, 0x4c, 0x18, 0x0a, 0x94, 0x51, 0x54, 0x59, 0x6b, 0x83, 0xd7, 0xf7, 0xc3, 0xa6, 0xb6, 0x05, 0x96, 0x45, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1932_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1932_sig[] = { 0x76, 0xe5, 0xc0, 0x75, 0x82, 0x17, 0x74, 0x00, 0xdf, 0x45, 0x31, 0x14, 0xfe, 0xd7, 0x46, 0xf4, 0x07, 0x04, 0x19, 0x78, 0x97, 0xb4, 0xca, 0x21, 0xb7, 0x2e, 0x5b, 0x44, 0xd4, 0xca, 0x40, 0xcf, 0xca, 0xa5, 0x5e, 0x44, 0x46, 0x35, 0x5c, 0x91, 0xea, 0x97, 0x67, 0xf3, 0x8c, 0x81, 0x72, 0xdf, 0x0c, 0x6d, 0xd7, 0x3e, 0xef, 0xbb, 0x4c, 0x06, 0xe8, 0x23, 0x22, 0x4d, 0x8e, 0xfa, 0xa3, 0xee, 0x93, 0x4e, 0x4a, 0x97, 0xee, 0xd2, 0x83, 0x35, 0x13, 0xb4, 0xd7, 0x35, 0xed, 0x06, 0xeb, 0x55, 0x0b, 0x2a, 0x5f, 0xa7, 0xf8, 0x66, 0x13, 0xd6, 0x27, 0xd9, 0xdb, 0x46, 0x6a, 0xfa, 0x66, 0x46, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1932 = { .name = "ecdsa_brainpoolp384r1_sha384_1932", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1932_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1932_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1932_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 402 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1933 for ECDSA, tcId is 403 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1933_pubkey[] = { 0x34, 0x77, 0x0c, 0x73, 0xa7, 0xe4, 0x2c, 0xe7, 0xa5, 0x7d, 0x1d, 0xe6, 0xe5, 0x4f, 0x35, 0xf1, 0x75, 0x20, 0x47, 0xf6, 0x51, 0x35, 0x84, 0xc7, 0xb1, 0x4b, 0xca, 0x17, 0xd7, 0xab, 0xc4, 0x99, 0xf8, 0xab, 0x03, 0x7c, 0x70, 0xfd, 0x2e, 0x13, 0xa8, 0xb9, 0x7b, 0x2a, 0xe2, 0x63, 0x68, 0x86, 0x22, 0x42, 0x16, 0x15, 0xba, 0x36, 0x3f, 0x1f, 0xfe, 0x9a, 0x8f, 0x2f, 0xe0, 0xf6, 0xe2, 0x46, 0xfd, 0xa1, 0x14, 0x62, 0xa3, 0xec, 0x00, 0x0c, 0x68, 0x5e, 0x09, 0xa9, 0x0d, 0xbc, 0xdc, 0x2a, 0xf6, 0x46, 0x7f, 0x9e, 0xe6, 0x9b, 0x5e, 0x7b, 0xea, 0xd9, 0xb8, 0x46, 0x1f, 0x4a, 0x4b, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1933_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1933_sig[] = { 0x0e, 0x44, 0xfd, 0xc3, 0x3a, 0xed, 0x0c, 0x32, 0x0e, 0x37, 0x1e, 0x2a, 0x78, 0xe9, 0xf1, 0x8f, 0xde, 0x83, 0x43, 0x4e, 0x68, 0x1a, 0xfb, 0x05, 0xa5, 0xbd, 0xb0, 0xf4, 0x3c, 0xac, 0x70, 0xe8, 0x3e, 0xde, 0x56, 0xbf, 0x8c, 0x56, 0xac, 0xf7, 0x0e, 0x05, 0x4e, 0x2f, 0xfe, 0xf5, 0x49, 0xcf, 0x13, 0x24, 0xb4, 0xcf, 0xe6, 0x84, 0xd4, 0x01, 0xea, 0xc1, 0x5b, 0x09, 0x40, 0xf5, 0x83, 0x54, 0x36, 0xd3, 0xa1, 0x02, 0x8e, 0x27, 0xc1, 0x96, 0x6d, 0xbf, 0x69, 0xfe, 0xfe, 0xf8, 0x27, 0x48, 0xa0, 0x5b, 0x44, 0x43, 0xc7, 0x7c, 0x87, 0x07, 0x89, 0x13, 0x57, 0x55, 0xd0, 0xd1, 0x84, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1933 = { .name = "ecdsa_brainpoolp384r1_sha384_1933", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1933_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1933_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1933_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP384t1, tcId is 403 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1934 for ECDSA, tcId is 404 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1934_pubkey[] = { 0x34, 0x77, 0x0c, 0x73, 0xa7, 0xe4, 0x2c, 0xe7, 0xa5, 0x7d, 0x1d, 0xe6, 0xe5, 0x4f, 0x35, 0xf1, 0x75, 0x20, 0x47, 0xf6, 0x51, 0x35, 0x84, 0xc7, 0xb1, 0x4b, 0xca, 0x17, 0xd7, 0xab, 0xc4, 0x99, 0xf8, 0xab, 0x03, 0x7c, 0x70, 0xfd, 0x2e, 0x13, 0xa8, 0xb9, 0x7b, 0x2a, 0xe2, 0x63, 0x68, 0x86, 0x22, 0x42, 0x16, 0x15, 0xba, 0x36, 0x3f, 0x1f, 0xfe, 0x9a, 0x8f, 0x2f, 0xe0, 0xf6, 0xe2, 0x46, 0xfd, 0xa1, 0x14, 0x62, 0xa3, 0xec, 0x00, 0x0c, 0x68, 0x5e, 0x09, 0xa9, 0x0d, 0xbc, 0xdc, 0x2a, 0xf6, 0x46, 0x7f, 0x9e, 0xe6, 0x9b, 0x5e, 0x7b, 0xea, 0xd9, 0xb8, 0x46, 0x1f, 0x4a, 0x4b, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1934_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1934_sig[] = { 0x59, 0x66, 0xac, 0xd8, 0xa7, 0x71, 0x4f, 0x20, 0x15, 0xe3, 0x6f, 0xd4, 0xfd, 0xb3, 0x45, 0x22, 0x58, 0xce, 0x0a, 0xae, 0xfb, 0x39, 0x72, 0x09, 0x1b, 0x49, 0x6b, 0xd5, 0x30, 0xbb, 0xaf, 0x1e, 0xc6, 0x7d, 0x7e, 0x37, 0xe5, 0x00, 0x31, 0xb3, 0xee, 0xa4, 0x4a, 0x8b, 0xb8, 0xf6, 0x2c, 0x20, 0x2a, 0x5f, 0x30, 0x9d, 0x2f, 0xad, 0x55, 0xb9, 0x3a, 0x7a, 0x30, 0x12, 0xcb, 0xda, 0x28, 0x45, 0xef, 0xaa, 0x4e, 0xa0, 0xd1, 0x87, 0xd3, 0x82, 0x4f, 0x4a, 0x6a, 0x92, 0x27, 0x73, 0x0d, 0x3a, 0xb1, 0x52, 0x46, 0xd8, 0xd0, 0x95, 0x2c, 0x7e, 0xe8, 0xc0, 0xb9, 0xeb, 0x83, 0xd1, 0xc2, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1934 = { .name = "ecdsa_brainpoolp384r1_sha384_1934", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1934_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1934_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1934_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP384t1, tcId is 404 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1935 for ECDSA, tcId is 405 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1935_pubkey[] = { 0x34, 0x77, 0x0c, 0x73, 0xa7, 0xe4, 0x2c, 0xe7, 0xa5, 0x7d, 0x1d, 0xe6, 0xe5, 0x4f, 0x35, 0xf1, 0x75, 0x20, 0x47, 0xf6, 0x51, 0x35, 0x84, 0xc7, 0xb1, 0x4b, 0xca, 0x17, 0xd7, 0xab, 0xc4, 0x99, 0xf8, 0xab, 0x03, 0x7c, 0x70, 0xfd, 0x2e, 0x13, 0xa8, 0xb9, 0x7b, 0x2a, 0xe2, 0x63, 0x68, 0x86, 0x22, 0x42, 0x16, 0x15, 0xba, 0x36, 0x3f, 0x1f, 0xfe, 0x9a, 0x8f, 0x2f, 0xe0, 0xf6, 0xe2, 0x46, 0xfd, 0xa1, 0x14, 0x62, 0xa3, 0xec, 0x00, 0x0c, 0x68, 0x5e, 0x09, 0xa9, 0x0d, 0xbc, 0xdc, 0x2a, 0xf6, 0x46, 0x7f, 0x9e, 0xe6, 0x9b, 0x5e, 0x7b, 0xea, 0xd9, 0xb8, 0x46, 0x1f, 0x4a, 0x4b, 0xe0, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1935_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1935_sig[] = { 0x26, 0x6e, 0xac, 0xe6, 0x57, 0xe1, 0xec, 0x88, 0xa2, 0xad, 0xbb, 0x38, 0xa5, 0xaf, 0xb4, 0xf7, 0x50, 0x27, 0x4c, 0xa6, 0x14, 0xd1, 0xfd, 0xe9, 0xea, 0x39, 0xdf, 0xf6, 0xf2, 0xa2, 0xaa, 0x69, 0x92, 0x3e, 0x9a, 0x74, 0x89, 0xf0, 0x6b, 0xf9, 0xd8, 0x4c, 0x51, 0x8c, 0xee, 0x57, 0xe5, 0x5b, 0x3d, 0x19, 0x02, 0x76, 0x84, 0xef, 0x22, 0x12, 0x16, 0xf6, 0x3a, 0x59, 0x1d, 0x8e, 0x79, 0x35, 0x24, 0xe4, 0xc1, 0x23, 0x4a, 0x56, 0xce, 0x41, 0x5b, 0xb9, 0xad, 0x9e, 0x2e, 0xbf, 0x25, 0xac, 0x94, 0xa9, 0x92, 0x61, 0xb9, 0x15, 0x7d, 0x19, 0xda, 0xa5, 0xaa, 0x87, 0x62, 0x91, 0xf3, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1935 = { .name = "ecdsa_brainpoolp384r1_sha384_1935", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1935_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1935_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1935_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is large on brainpoolP384t1, tcId is 405 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1936 for ECDSA, tcId is 406 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1936_pubkey[] = { 0x86, 0xf0, 0xfc, 0x89, 0xb7, 0x86, 0x1e, 0xc3, 0xbd, 0x58, 0x21, 0x61, 0xae, 0xcf, 0xc9, 0x57, 0x89, 0xae, 0x40, 0x24, 0x59, 0xeb, 0x7f, 0x30, 0x15, 0xb7, 0xdd, 0x24, 0xe2, 0x0f, 0xc9, 0xb0, 0x05, 0xc6, 0x35, 0xfc, 0x29, 0x0a, 0x0e, 0x2a, 0x9f, 0xf3, 0x58, 0x63, 0xb7, 0xb8, 0x2e, 0x3e, 0x01, 0xeb, 0xba, 0x48, 0x9e, 0x92, 0x3d, 0xad, 0x88, 0x14, 0x60, 0x77, 0x91, 0x4e, 0x3a, 0xe5, 0xc5, 0x75, 0xe1, 0xbe, 0xce, 0xce, 0xc7, 0x10, 0x96, 0x2a, 0x18, 0xff, 0xd9, 0x10, 0x05, 0x77, 0x6c, 0x4d, 0x9e, 0x4b, 0xd9, 0x52, 0xc7, 0x93, 0x58, 0x7a, 0x70, 0x29, 0x1c, 0xe4, 0x78, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1936_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1936_sig[] = { 0x13, 0xde, 0x6e, 0xb5, 0x32, 0x32, 0x1c, 0x02, 0x30, 0x92, 0xaa, 0x78, 0xc1, 0x99, 0xf9, 0xee, 0x4d, 0xce, 0x7a, 0x18, 0xdf, 0x15, 0x8c, 0x3e, 0x79, 0x94, 0x61, 0xaf, 0x9d, 0x96, 0xc2, 0xd3, 0x87, 0x65, 0xa7, 0x8f, 0xdb, 0x14, 0x40, 0x4d, 0x19, 0x93, 0x65, 0xde, 0x05, 0xbd, 0x44, 0xc5, 0x25, 0x14, 0xa0, 0x35, 0x9b, 0xcb, 0x66, 0x12, 0x2b, 0xf4, 0x8c, 0x18, 0x6a, 0x4b, 0xb2, 0xed, 0xcc, 0xf3, 0x05, 0xb0, 0x64, 0x14, 0xb1, 0x1f, 0x47, 0x0d, 0x25, 0x12, 0xca, 0xdd, 0xa1, 0x29, 0x36, 0x6f, 0x60, 0x72, 0xde, 0x71, 0x5b, 0xc2, 0xba, 0xbb, 0x8a, 0x3a, 0x5f, 0x26, 0x0d, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1936 = { .name = "ecdsa_brainpoolp384r1_sha384_1936", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1936_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1936_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1936_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP384t1, tcId is 406 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1937 for ECDSA, tcId is 407 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1937_pubkey[] = { 0x86, 0xf0, 0xfc, 0x89, 0xb7, 0x86, 0x1e, 0xc3, 0xbd, 0x58, 0x21, 0x61, 0xae, 0xcf, 0xc9, 0x57, 0x89, 0xae, 0x40, 0x24, 0x59, 0xeb, 0x7f, 0x30, 0x15, 0xb7, 0xdd, 0x24, 0xe2, 0x0f, 0xc9, 0xb0, 0x05, 0xc6, 0x35, 0xfc, 0x29, 0x0a, 0x0e, 0x2a, 0x9f, 0xf3, 0x58, 0x63, 0xb7, 0xb8, 0x2e, 0x3e, 0x01, 0xeb, 0xba, 0x48, 0x9e, 0x92, 0x3d, 0xad, 0x88, 0x14, 0x60, 0x77, 0x91, 0x4e, 0x3a, 0xe5, 0xc5, 0x75, 0xe1, 0xbe, 0xce, 0xce, 0xc7, 0x10, 0x96, 0x2a, 0x18, 0xff, 0xd9, 0x10, 0x05, 0x77, 0x6c, 0x4d, 0x9e, 0x4b, 0xd9, 0x52, 0xc7, 0x93, 0x58, 0x7a, 0x70, 0x29, 0x1c, 0xe4, 0x78, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1937_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1937_sig[] = { 0x13, 0x08, 0xd3, 0xd9, 0xed, 0xfe, 0x3a, 0xd0, 0x7e, 0x21, 0x5a, 0x97, 0x5b, 0x2b, 0x06, 0x7e, 0x9f, 0x0b, 0x80, 0x33, 0x71, 0xb3, 0x02, 0x9f, 0x43, 0x88, 0xa3, 0x47, 0x1f, 0x4d, 0xb2, 0x3f, 0x35, 0x8a, 0xea, 0x5c, 0x03, 0xdb, 0x62, 0xd7, 0x71, 0x15, 0xc5, 0x6c, 0x49, 0x62, 0x63, 0x3b, 0x4b, 0x8b, 0x1f, 0xe4, 0x4b, 0x32, 0xcc, 0x66, 0x91, 0x14, 0xa1, 0xce, 0x0b, 0xa0, 0x55, 0x54, 0x46, 0xd0, 0xc9, 0x6a, 0x32, 0xcb, 0x60, 0x21, 0x85, 0xe8, 0xfb, 0xa4, 0x14, 0xd3, 0xa8, 0x31, 0xcb, 0xf5, 0xb5, 0x19, 0xb0, 0xf9, 0x06, 0x47, 0xdc, 0x45, 0xe3, 0x0a, 0x1f, 0x23, 0xef, 0x90, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1937 = { .name = "ecdsa_brainpoolp384r1_sha384_1937", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1937_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1937_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1937_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP384t1, tcId is 407 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1938 for ECDSA, tcId is 408 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1938_pubkey[] = { 0x86, 0xf0, 0xfc, 0x89, 0xb7, 0x86, 0x1e, 0xc3, 0xbd, 0x58, 0x21, 0x61, 0xae, 0xcf, 0xc9, 0x57, 0x89, 0xae, 0x40, 0x24, 0x59, 0xeb, 0x7f, 0x30, 0x15, 0xb7, 0xdd, 0x24, 0xe2, 0x0f, 0xc9, 0xb0, 0x05, 0xc6, 0x35, 0xfc, 0x29, 0x0a, 0x0e, 0x2a, 0x9f, 0xf3, 0x58, 0x63, 0xb7, 0xb8, 0x2e, 0x3e, 0x01, 0xeb, 0xba, 0x48, 0x9e, 0x92, 0x3d, 0xad, 0x88, 0x14, 0x60, 0x77, 0x91, 0x4e, 0x3a, 0xe5, 0xc5, 0x75, 0xe1, 0xbe, 0xce, 0xce, 0xc7, 0x10, 0x96, 0x2a, 0x18, 0xff, 0xd9, 0x10, 0x05, 0x77, 0x6c, 0x4d, 0x9e, 0x4b, 0xd9, 0x52, 0xc7, 0x93, 0x58, 0x7a, 0x70, 0x29, 0x1c, 0xe4, 0x78, 0xb4, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1938_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1938_sig[] = { 0x5d, 0xa3, 0xdf, 0x09, 0x41, 0x55, 0xb8, 0xf8, 0x81, 0x2d, 0x0c, 0x63, 0x45, 0x34, 0x4e, 0x41, 0xc3, 0xb5, 0x91, 0xb6, 0x5b, 0x95, 0xfe, 0xdb, 0xbc, 0xbd, 0x3c, 0x3a, 0x3b, 0xb1, 0xc1, 0xdb, 0xfc, 0x4d, 0x4c, 0x5b, 0x84, 0x1b, 0x8f, 0x88, 0x74, 0xd5, 0x9b, 0x07, 0xcf, 0x22, 0x88, 0xfc, 0x4a, 0x1e, 0x4a, 0x83, 0x99, 0xab, 0xbd, 0xf2, 0x46, 0x92, 0x9b, 0x25, 0x59, 0xbb, 0x0f, 0xa4, 0x04, 0x77, 0x27, 0x55, 0xfc, 0x74, 0x52, 0x36, 0x26, 0xae, 0xef, 0x43, 0x2f, 0xe4, 0x76, 0x4d, 0xf1, 0xe1, 0xf5, 0xc9, 0xb0, 0xf8, 0x97, 0xed, 0x8f, 0x1f, 0xfd, 0x7a, 0x88, 0x16, 0x7f, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1938 = { .name = "ecdsa_brainpoolp384r1_sha384_1938", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1938_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1938_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1938_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key is small on brainpoolP384t1, tcId is 408 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1939 for ECDSA, tcId is 409 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1939_pubkey[] = { 0x08, 0x2f, 0x7d, 0xce, 0xb5, 0x85, 0xc5, 0xba, 0x48, 0x94, 0xb0, 0xfa, 0xf6, 0x60, 0x4d, 0xa8, 0x88, 0xa3, 0x11, 0xad, 0x9f, 0x41, 0x73, 0x1a, 0x1d, 0x39, 0x37, 0x16, 0x8a, 0x10, 0xb0, 0x79, 0x5a, 0x1f, 0xae, 0x49, 0x6c, 0xb9, 0xa9, 0x07, 0x39, 0xe1, 0xc0, 0xa6, 0xe5, 0x31, 0xe8, 0x07, 0x2c, 0x3b, 0x85, 0x68, 0xea, 0xa1, 0xc6, 0xf5, 0x41, 0xa6, 0x65, 0xce, 0x7a, 0x66, 0xf7, 0x8e, 0xa2, 0xd5, 0x89, 0x31, 0x03, 0xe6, 0x02, 0x8a, 0xdd, 0x62, 0x35, 0x64, 0x92, 0xd8, 0xb5, 0xac, 0x6a, 0xb8, 0x90, 0x1d, 0x59, 0x62, 0x1c, 0x33, 0x41, 0x6c, 0x33, 0x98, 0x1b, 0xd5, 0x94, 0xec, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1939_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1939_sig[] = { 0x0b, 0xf6, 0xfe, 0xc0, 0xa5, 0xbe, 0x27, 0xcd, 0xdb, 0x0e, 0x76, 0x69, 0xae, 0x06, 0xd1, 0x5d, 0xfa, 0x75, 0x83, 0x7f, 0x8e, 0xe7, 0x2b, 0x47, 0x44, 0x3a, 0xc8, 0x45, 0xff, 0xcd, 0x42, 0x7b, 0x08, 0x93, 0xe1, 0x0c, 0x85, 0xc2, 0x0c, 0x7a, 0xa5, 0x76, 0xfb, 0x70, 0xe8, 0x77, 0x61, 0xab, 0x74, 0x18, 0xb6, 0xf3, 0x74, 0x93, 0x6a, 0xdc, 0xa8, 0xb0, 0x7d, 0xc5, 0x15, 0x45, 0xee, 0x34, 0xed, 0x2e, 0x9f, 0x56, 0xf3, 0x26, 0x70, 0x33, 0xe3, 0x0e, 0xa0, 0x9a, 0x0a, 0xcd, 0x31, 0xb6, 0xce, 0x83, 0x50, 0x3e, 0xe7, 0xe0, 0x98, 0x62, 0x7f, 0x8b, 0xa8, 0xb4, 0xc5, 0x84, 0x34, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1939 = { .name = "ecdsa_brainpoolp384r1_sha384_1939", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1939_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1939_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1939_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 409 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1940 for ECDSA, tcId is 410 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1940_pubkey[] = { 0x08, 0x2f, 0x7d, 0xce, 0xb5, 0x85, 0xc5, 0xba, 0x48, 0x94, 0xb0, 0xfa, 0xf6, 0x60, 0x4d, 0xa8, 0x88, 0xa3, 0x11, 0xad, 0x9f, 0x41, 0x73, 0x1a, 0x1d, 0x39, 0x37, 0x16, 0x8a, 0x10, 0xb0, 0x79, 0x5a, 0x1f, 0xae, 0x49, 0x6c, 0xb9, 0xa9, 0x07, 0x39, 0xe1, 0xc0, 0xa6, 0xe5, 0x31, 0xe8, 0x07, 0x2c, 0x3b, 0x85, 0x68, 0xea, 0xa1, 0xc6, 0xf5, 0x41, 0xa6, 0x65, 0xce, 0x7a, 0x66, 0xf7, 0x8e, 0xa2, 0xd5, 0x89, 0x31, 0x03, 0xe6, 0x02, 0x8a, 0xdd, 0x62, 0x35, 0x64, 0x92, 0xd8, 0xb5, 0xac, 0x6a, 0xb8, 0x90, 0x1d, 0x59, 0x62, 0x1c, 0x33, 0x41, 0x6c, 0x33, 0x98, 0x1b, 0xd5, 0x94, 0xec, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1940_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1940_sig[] = { 0x03, 0xe3, 0x06, 0xa8, 0x6f, 0x6b, 0x2c, 0xb2, 0x48, 0xfc, 0xb6, 0x8d, 0x1d, 0x31, 0x7a, 0x60, 0x42, 0xb7, 0x08, 0x9e, 0x96, 0xd7, 0x4c, 0x2f, 0x5b, 0x93, 0x4e, 0x2e, 0x12, 0x28, 0x31, 0x26, 0x8a, 0x45, 0xe2, 0x18, 0x5b, 0x7c, 0x21, 0x27, 0x0e, 0x8b, 0x90, 0x6c, 0xd3, 0x72, 0xe6, 0xd7, 0x4c, 0x82, 0xab, 0x6d, 0xe6, 0xbc, 0x01, 0x94, 0xac, 0x1a, 0x2e, 0x34, 0x80, 0xa0, 0xc8, 0x04, 0x66, 0xaf, 0x7d, 0x2a, 0x32, 0x9d, 0x20, 0xb0, 0x31, 0x51, 0xd1, 0x80, 0x6a, 0x0b, 0xc0, 0x72, 0x0f, 0x55, 0xd3, 0x78, 0x1a, 0x7d, 0xb9, 0xfe, 0xbe, 0x7d, 0x8b, 0xbd, 0x0a, 0x71, 0x9b, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1940 = { .name = "ecdsa_brainpoolp384r1_sha384_1940", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1940_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1940_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1940_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 410 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1941 for ECDSA, tcId is 411 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1941_pubkey[] = { 0x08, 0x2f, 0x7d, 0xce, 0xb5, 0x85, 0xc5, 0xba, 0x48, 0x94, 0xb0, 0xfa, 0xf6, 0x60, 0x4d, 0xa8, 0x88, 0xa3, 0x11, 0xad, 0x9f, 0x41, 0x73, 0x1a, 0x1d, 0x39, 0x37, 0x16, 0x8a, 0x10, 0xb0, 0x79, 0x5a, 0x1f, 0xae, 0x49, 0x6c, 0xb9, 0xa9, 0x07, 0x39, 0xe1, 0xc0, 0xa6, 0xe5, 0x31, 0xe8, 0x07, 0x2c, 0x3b, 0x85, 0x68, 0xea, 0xa1, 0xc6, 0xf5, 0x41, 0xa6, 0x65, 0xce, 0x7a, 0x66, 0xf7, 0x8e, 0xa2, 0xd5, 0x89, 0x31, 0x03, 0xe6, 0x02, 0x8a, 0xdd, 0x62, 0x35, 0x64, 0x92, 0xd8, 0xb5, 0xac, 0x6a, 0xb8, 0x90, 0x1d, 0x59, 0x62, 0x1c, 0x33, 0x41, 0x6c, 0x33, 0x98, 0x1b, 0xd5, 0x94, 0xec, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1941_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1941_sig[] = { 0x14, 0xd1, 0xdf, 0x9b, 0x3d, 0xb5, 0x5e, 0xcc, 0x8d, 0x1e, 0x12, 0x66, 0x25, 0xbd, 0xf5, 0xb6, 0x31, 0x6b, 0xba, 0x1e, 0x7f, 0x4e, 0xa5, 0xec, 0x77, 0x41, 0x8c, 0x75, 0x4a, 0x59, 0x75, 0x63, 0xdc, 0x5d, 0xc2, 0x91, 0xb7, 0xdd, 0x04, 0x77, 0x82, 0xd5, 0x18, 0xfe, 0x74, 0xe0, 0xbe, 0x83, 0x33, 0xef, 0x70, 0x1c, 0x44, 0x0f, 0x28, 0x0e, 0xdf, 0x81, 0xa9, 0x63, 0x2d, 0xde, 0x9d, 0xc1, 0x7d, 0xe5, 0xf4, 0x38, 0xdc, 0xc1, 0x9e, 0x9c, 0xa5, 0x91, 0x9b, 0x4b, 0x73, 0xe6, 0x29, 0x05, 0xe5, 0xf7, 0xe0, 0xbc, 0x9d, 0xb0, 0xb1, 0x4b, 0xc5, 0x33, 0x27, 0xf7, 0x9f, 0x70, 0xc6, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1941 = { .name = "ecdsa_brainpoolp384r1_sha384_1941", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1941_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1941_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1941_sig, .siglen = 96, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 411 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1942 for ECDSA, tcId is 412 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1942_pubkey[] = { 0x6a, 0xfe, 0x4e, 0xa7, 0x70, 0x54, 0x92, 0xbd, 0xa3, 0x08, 0xb7, 0x89, 0xd7, 0x0d, 0xa4, 0x94, 0x57, 0xdd, 0xe8, 0x25, 0xd5, 0x25, 0x89, 0x60, 0xa7, 0xa3, 0x66, 0xe4, 0x66, 0x5a, 0xf9, 0xd3, 0x26, 0x39, 0x2c, 0x26, 0x72, 0x16, 0x5e, 0xa4, 0xbb, 0xdc, 0x33, 0x37, 0x4d, 0x88, 0xe7, 0x49, 0x84, 0x75, 0xe6, 0x93, 0x7a, 0x10, 0xa6, 0xf6, 0xa5, 0x0f, 0x23, 0xde, 0x91, 0x26, 0xba, 0x04, 0xe5, 0x65, 0x0a, 0x1c, 0xd0, 0x6a, 0x80, 0x66, 0xca, 0x42, 0x33, 0x39, 0xfc, 0x2c, 0xe5, 0x3d, 0x91, 0x48, 0x27, 0x44, 0xa4, 0xcd, 0xf2, 0xf9, 0x37, 0xf7, 0x6f, 0x12, 0xaa, 0xe3, 0xf6, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1942_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1942_sig[] = { 0x6a, 0x3a, 0x18, 0x40, 0x06, 0x86, 0x63, 0x5a, 0xe2, 0x79, 0xc3, 0x85, 0xb6, 0x40, 0xd4, 0xfa, 0x08, 0x0d, 0x9c, 0x44, 0xa5, 0xd4, 0x21, 0xfe, 0x4b, 0xe5, 0xa5, 0xec, 0x7a, 0x8a, 0xe3, 0x1b, 0x00, 0xbf, 0xa4, 0x06, 0xe9, 0x19, 0xe5, 0x7e, 0x39, 0xc1, 0x13, 0x60, 0xe6, 0x70, 0xd8, 0x69, 0x72, 0x9c, 0x0b, 0x9f, 0xf7, 0x7f, 0x88, 0xf8, 0x10, 0x54, 0x8d, 0x6d, 0xb1, 0x83, 0x53, 0x12, 0xa4, 0x48, 0x11, 0x4a, 0x3b, 0xd9, 0x3c, 0xf5, 0x94, 0x22, 0xfa, 0xa2, 0xea, 0x02, 0x6f, 0x5d, 0x47, 0x62, 0x7f, 0x0c, 0x11, 0xfb, 0x85, 0x91, 0x12, 0x24, 0x6d, 0x87, 0x9c, 0x85, 0x95, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1942 = { .name = "ecdsa_brainpoolp384r1_sha384_1942", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1942_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1942_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1942_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP384t1, tcId is 412 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1943 for ECDSA, tcId is 413 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1943_pubkey[] = { 0x6a, 0xfe, 0x4e, 0xa7, 0x70, 0x54, 0x92, 0xbd, 0xa3, 0x08, 0xb7, 0x89, 0xd7, 0x0d, 0xa4, 0x94, 0x57, 0xdd, 0xe8, 0x25, 0xd5, 0x25, 0x89, 0x60, 0xa7, 0xa3, 0x66, 0xe4, 0x66, 0x5a, 0xf9, 0xd3, 0x26, 0x39, 0x2c, 0x26, 0x72, 0x16, 0x5e, 0xa4, 0xbb, 0xdc, 0x33, 0x37, 0x4d, 0x88, 0xe7, 0x49, 0x84, 0x75, 0xe6, 0x93, 0x7a, 0x10, 0xa6, 0xf6, 0xa5, 0x0f, 0x23, 0xde, 0x91, 0x26, 0xba, 0x04, 0xe5, 0x65, 0x0a, 0x1c, 0xd0, 0x6a, 0x80, 0x66, 0xca, 0x42, 0x33, 0x39, 0xfc, 0x2c, 0xe5, 0x3d, 0x91, 0x48, 0x27, 0x44, 0xa4, 0xcd, 0xf2, 0xf9, 0x37, 0xf7, 0x6f, 0x12, 0xaa, 0xe3, 0xf6, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1943_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1943_sig[] = { 0x1a, 0xb8, 0xd6, 0xc3, 0x1d, 0x45, 0x77, 0xf5, 0x9c, 0xa5, 0x71, 0x4c, 0x9e, 0xad, 0xa9, 0x79, 0xfd, 0xb9, 0xec, 0x0c, 0xad, 0x32, 0xd8, 0xcb, 0x91, 0x5d, 0xbd, 0x70, 0x49, 0x29, 0x47, 0x18, 0x7f, 0x5a, 0x52, 0x71, 0x8e, 0x19, 0x98, 0x2f, 0x7a, 0x2d, 0x4c, 0xb4, 0x8b, 0x22, 0x77, 0x23, 0x87, 0x2e, 0x3c, 0xe7, 0xd1, 0xfd, 0x5a, 0xe1, 0x80, 0xfa, 0xf1, 0x99, 0x0b, 0x11, 0x93, 0x75, 0x58, 0xaa, 0x44, 0xcc, 0xda, 0xb6, 0x31, 0x49, 0x2b, 0x89, 0x25, 0xbe, 0x84, 0xfb, 0xcb, 0x45, 0x21, 0x48, 0xed, 0xad, 0x5b, 0xbf, 0xe4, 0x8c, 0x06, 0xb8, 0xc9, 0x90, 0x8c, 0xa2, 0x52, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1943 = { .name = "ecdsa_brainpoolp384r1_sha384_1943", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1943_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1943_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1943_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP384t1, tcId is 413 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1944 for ECDSA, tcId is 414 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1944_pubkey[] = { 0x6a, 0xfe, 0x4e, 0xa7, 0x70, 0x54, 0x92, 0xbd, 0xa3, 0x08, 0xb7, 0x89, 0xd7, 0x0d, 0xa4, 0x94, 0x57, 0xdd, 0xe8, 0x25, 0xd5, 0x25, 0x89, 0x60, 0xa7, 0xa3, 0x66, 0xe4, 0x66, 0x5a, 0xf9, 0xd3, 0x26, 0x39, 0x2c, 0x26, 0x72, 0x16, 0x5e, 0xa4, 0xbb, 0xdc, 0x33, 0x37, 0x4d, 0x88, 0xe7, 0x49, 0x84, 0x75, 0xe6, 0x93, 0x7a, 0x10, 0xa6, 0xf6, 0xa5, 0x0f, 0x23, 0xde, 0x91, 0x26, 0xba, 0x04, 0xe5, 0x65, 0x0a, 0x1c, 0xd0, 0x6a, 0x80, 0x66, 0xca, 0x42, 0x33, 0x39, 0xfc, 0x2c, 0xe5, 0x3d, 0x91, 0x48, 0x27, 0x44, 0xa4, 0xcd, 0xf2, 0xf9, 0x37, 0xf7, 0x6f, 0x12, 0xaa, 0xe3, 0xf6, 0x30, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1944_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1944_sig[] = { 0x80, 0x3f, 0xfc, 0x58, 0xf8, 0x15, 0x0a, 0x9c, 0x4c, 0x22, 0x9a, 0x7b, 0x52, 0x23, 0x57, 0xf4, 0x9f, 0x9a, 0x5f, 0x48, 0xf8, 0x2d, 0x8b, 0xb9, 0x82, 0x95, 0x43, 0x95, 0x83, 0x6e, 0x09, 0xeb, 0x5f, 0x8c, 0xf1, 0xf3, 0x45, 0xce, 0x28, 0x46, 0x74, 0xbc, 0x36, 0x9d, 0x04, 0x6d, 0x5c, 0x8a, 0x8a, 0x9f, 0xeb, 0x64, 0xc4, 0x10, 0xcf, 0x3a, 0xe6, 0x26, 0x1a, 0xd3, 0x5f, 0x7e, 0x3e, 0x8d, 0xa1, 0x31, 0x29, 0xda, 0xf9, 0x49, 0x44, 0xf8, 0xe0, 0x8e, 0x96, 0x49, 0xcd, 0x00, 0x66, 0x22, 0xc3, 0xd5, 0xc9, 0x1e, 0xc5, 0xb9, 0x79, 0x8a, 0x1b, 0xe3, 0xa3, 0x15, 0x33, 0xa0, 0xa8, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1944 = { .name = "ecdsa_brainpoolp384r1_sha384_1944", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1944_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1944_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1944_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP384t1, tcId is 414 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1945 for ECDSA, tcId is 415 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1945_pubkey[] = { 0x4b, 0xc6, 0x52, 0x62, 0xc2, 0x2d, 0x32, 0x2e, 0xa8, 0x91, 0x46, 0xcc, 0xb5, 0xc6, 0x0c, 0x42, 0x87, 0xb6, 0x5a, 0x35, 0x22, 0x87, 0x43, 0xa5, 0xb9, 0xdc, 0xd1, 0x54, 0x93, 0xbd, 0x86, 0x42, 0x47, 0x89, 0x87, 0xc4, 0x21, 0x63, 0x7d, 0xd0, 0x71, 0x50, 0x79, 0xec, 0x90, 0xfb, 0x8c, 0xd4, 0x7a, 0x45, 0x55, 0x7e, 0xf6, 0x53, 0xd0, 0x77, 0x3d, 0xbe, 0x26, 0x30, 0xf8, 0xe0, 0x00, 0x62, 0x9e, 0xd8, 0x29, 0x3e, 0x1a, 0xa4, 0xa9, 0x6f, 0x3b, 0x15, 0x9a, 0x24, 0x5a, 0xa3, 0x5a, 0xd9, 0x2a, 0x10, 0x19, 0xc7, 0xe0, 0x9a, 0x9a, 0xb7, 0x5b, 0xa4, 0x3c, 0x07, 0x86, 0x92, 0x82, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1945_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1945_sig[] = { 0x2e, 0xd5, 0x69, 0xf1, 0x2d, 0xbe, 0x30, 0xa2, 0xab, 0xf0, 0x21, 0x90, 0xbb, 0x9e, 0x4d, 0xe7, 0xe2, 0x18, 0xe9, 0xfd, 0x70, 0x5d, 0xc7, 0x1c, 0xbe, 0x14, 0x80, 0x02, 0x27, 0x81, 0xb2, 0xa2, 0x21, 0x3c, 0x3e, 0xf2, 0xf9, 0x10, 0x52, 0xe9, 0x08, 0x40, 0xa1, 0x8f, 0x74, 0xe3, 0x75, 0xae, 0x88, 0x72, 0xb5, 0x66, 0xf3, 0x87, 0xc2, 0xbc, 0xb6, 0x39, 0xdf, 0x9c, 0x2d, 0x86, 0x6f, 0x76, 0x31, 0xdf, 0x29, 0x0c, 0x5f, 0x66, 0xc2, 0x64, 0xd4, 0x94, 0x9e, 0x25, 0x63, 0x83, 0xb1, 0xb4, 0xb2, 0x09, 0x8c, 0x12, 0x0f, 0x13, 0x44, 0x9d, 0x9d, 0x7b, 0xff, 0x68, 0x91, 0x91, 0x9c, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1945 = { .name = "ecdsa_brainpoolp384r1_sha384_1945", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1945_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1945_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1945_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 415 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1946 for ECDSA, tcId is 416 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1946_pubkey[] = { 0x4b, 0xc6, 0x52, 0x62, 0xc2, 0x2d, 0x32, 0x2e, 0xa8, 0x91, 0x46, 0xcc, 0xb5, 0xc6, 0x0c, 0x42, 0x87, 0xb6, 0x5a, 0x35, 0x22, 0x87, 0x43, 0xa5, 0xb9, 0xdc, 0xd1, 0x54, 0x93, 0xbd, 0x86, 0x42, 0x47, 0x89, 0x87, 0xc4, 0x21, 0x63, 0x7d, 0xd0, 0x71, 0x50, 0x79, 0xec, 0x90, 0xfb, 0x8c, 0xd4, 0x7a, 0x45, 0x55, 0x7e, 0xf6, 0x53, 0xd0, 0x77, 0x3d, 0xbe, 0x26, 0x30, 0xf8, 0xe0, 0x00, 0x62, 0x9e, 0xd8, 0x29, 0x3e, 0x1a, 0xa4, 0xa9, 0x6f, 0x3b, 0x15, 0x9a, 0x24, 0x5a, 0xa3, 0x5a, 0xd9, 0x2a, 0x10, 0x19, 0xc7, 0xe0, 0x9a, 0x9a, 0xb7, 0x5b, 0xa4, 0x3c, 0x07, 0x86, 0x92, 0x82, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1946_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1946_sig[] = { 0x4b, 0x7e, 0x56, 0x51, 0xb0, 0x35, 0x95, 0x92, 0x95, 0x09, 0x2e, 0x2e, 0xfe, 0x54, 0x8d, 0xa5, 0x22, 0x06, 0xc8, 0xd0, 0xe4, 0x8b, 0xa4, 0x3e, 0x2b, 0x8e, 0xcd, 0x98, 0xec, 0xe2, 0x5d, 0xc0, 0x89, 0x55, 0xb6, 0xe7, 0xb0, 0x5e, 0x38, 0xc4, 0xe2, 0x28, 0x29, 0xd1, 0x65, 0x87, 0x11, 0xb5, 0x44, 0xa9, 0x73, 0xb7, 0x55, 0x28, 0x40, 0x0c, 0xef, 0x3f, 0x63, 0xf5, 0x5f, 0x21, 0x54, 0xd4, 0x8b, 0xb0, 0xb8, 0x26, 0x21, 0x42, 0x00, 0xd3, 0xf3, 0x3c, 0x7b, 0xc3, 0x11, 0x55, 0x24, 0x2d, 0x4e, 0x24, 0xf0, 0x7e, 0xd1, 0x96, 0x06, 0xfd, 0xb2, 0xc8, 0xec, 0xae, 0xb6, 0x98, 0x1e, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1946 = { .name = "ecdsa_brainpoolp384r1_sha384_1946", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1946_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1946_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1946_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 416 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1947 for ECDSA, tcId is 417 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1947_pubkey[] = { 0x4b, 0xc6, 0x52, 0x62, 0xc2, 0x2d, 0x32, 0x2e, 0xa8, 0x91, 0x46, 0xcc, 0xb5, 0xc6, 0x0c, 0x42, 0x87, 0xb6, 0x5a, 0x35, 0x22, 0x87, 0x43, 0xa5, 0xb9, 0xdc, 0xd1, 0x54, 0x93, 0xbd, 0x86, 0x42, 0x47, 0x89, 0x87, 0xc4, 0x21, 0x63, 0x7d, 0xd0, 0x71, 0x50, 0x79, 0xec, 0x90, 0xfb, 0x8c, 0xd4, 0x7a, 0x45, 0x55, 0x7e, 0xf6, 0x53, 0xd0, 0x77, 0x3d, 0xbe, 0x26, 0x30, 0xf8, 0xe0, 0x00, 0x62, 0x9e, 0xd8, 0x29, 0x3e, 0x1a, 0xa4, 0xa9, 0x6f, 0x3b, 0x15, 0x9a, 0x24, 0x5a, 0xa3, 0x5a, 0xd9, 0x2a, 0x10, 0x19, 0xc7, 0xe0, 0x9a, 0x9a, 0xb7, 0x5b, 0xa4, 0x3c, 0x07, 0x86, 0x92, 0x82, 0x37, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1947_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1947_sig[] = { 0x1e, 0xca, 0xda, 0xce, 0xaa, 0x47, 0x9f, 0xa4, 0xe9, 0xaa, 0xba, 0xc4, 0x21, 0x0b, 0x1a, 0xb7, 0x7f, 0xc1, 0xd1, 0x3a, 0x9c, 0x4c, 0xb0, 0x22, 0x82, 0x6b, 0xb1, 0x80, 0x65, 0x75, 0x11, 0x58, 0x34, 0xa6, 0xec, 0xb9, 0xde, 0xc3, 0xe6, 0x68, 0xb8, 0xc9, 0x1d, 0x4a, 0xca, 0x28, 0x3d, 0xc9, 0x2d, 0xe8, 0x96, 0x5a, 0x66, 0xd5, 0x65, 0x45, 0xad, 0x84, 0xfd, 0xae, 0xe1, 0x6f, 0xff, 0xa0, 0xeb, 0x31, 0x02, 0x21, 0x86, 0xa5, 0xb6, 0xbe, 0x2a, 0x24, 0x75, 0x95, 0x8b, 0x9a, 0xd7, 0x2f, 0x48, 0x3e, 0xbd, 0x4b, 0x25, 0x57, 0x48, 0xa8, 0x11, 0x80, 0x6b, 0xcd, 0x42, 0x8a, 0xcf, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1947 = { .name = "ecdsa_brainpoolp384r1_sha384_1947", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1947_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1947_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1947_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 417 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1948 for ECDSA, tcId is 418 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1948_pubkey[] = { 0x2a, 0xc3, 0x93, 0xf2, 0x0c, 0x11, 0x0e, 0x3f, 0x97, 0x06, 0x53, 0x04, 0x39, 0x7e, 0xae, 0x0e, 0x23, 0x18, 0x7b, 0x2b, 0x61, 0x63, 0xdc, 0x66, 0x08, 0x3e, 0x82, 0xaf, 0xf5, 0x68, 0x42, 0x68, 0x43, 0x05, 0x6a, 0xff, 0x8d, 0xc2, 0x3e, 0xeb, 0xce, 0x29, 0x7f, 0x74, 0x78, 0x30, 0xe2, 0x17, 0x34, 0xc9, 0x35, 0x67, 0x13, 0x91, 0xc6, 0xef, 0xa8, 0xb4, 0x6c, 0x5c, 0x37, 0xb3, 0xf8, 0x4a, 0x82, 0xe4, 0x29, 0xa7, 0x58, 0x0f, 0xeb, 0x9a, 0x13, 0x83, 0xb5, 0x5c, 0x83, 0xa9, 0x39, 0x8e, 0x8e, 0xcc, 0x7b, 0x15, 0xd6, 0x99, 0xe6, 0x39, 0x62, 0x32, 0x91, 0x02, 0xa1, 0x57, 0x6f, 0x2b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1948_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1948_sig[] = { 0x37, 0xe2, 0x56, 0x87, 0x23, 0x40, 0xda, 0x9d, 0xc8, 0x84, 0xfd, 0x00, 0xda, 0xa1, 0x46, 0x28, 0x37, 0x2b, 0x4b, 0xed, 0xc0, 0xa8, 0xa0, 0x9f, 0x9d, 0x75, 0x13, 0x52, 0x1d, 0x3b, 0x80, 0x3a, 0x78, 0xdc, 0x0e, 0xdb, 0xab, 0x3c, 0x7d, 0xc2, 0xb2, 0x01, 0x4b, 0xaf, 0x7a, 0x9d, 0x21, 0x0e, 0x1b, 0xa4, 0xb4, 0x08, 0x79, 0x73, 0x07, 0x0c, 0xca, 0x9b, 0x95, 0x76, 0x50, 0x17, 0x7e, 0xeb, 0x41, 0xc5, 0x57, 0x73, 0x15, 0x96, 0xa9, 0x66, 0xb0, 0xb7, 0xf6, 0x87, 0x17, 0xd8, 0xe7, 0xb5, 0x54, 0xaf, 0xd0, 0x7c, 0x29, 0x37, 0xc9, 0x54, 0x03, 0xa9, 0x0c, 0x3a, 0x05, 0xfa, 0x96, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1948 = { .name = "ecdsa_brainpoolp384r1_sha384_1948", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1948_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1948_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1948_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 418 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1949 for ECDSA, tcId is 419 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1949_pubkey[] = { 0x2a, 0xc3, 0x93, 0xf2, 0x0c, 0x11, 0x0e, 0x3f, 0x97, 0x06, 0x53, 0x04, 0x39, 0x7e, 0xae, 0x0e, 0x23, 0x18, 0x7b, 0x2b, 0x61, 0x63, 0xdc, 0x66, 0x08, 0x3e, 0x82, 0xaf, 0xf5, 0x68, 0x42, 0x68, 0x43, 0x05, 0x6a, 0xff, 0x8d, 0xc2, 0x3e, 0xeb, 0xce, 0x29, 0x7f, 0x74, 0x78, 0x30, 0xe2, 0x17, 0x34, 0xc9, 0x35, 0x67, 0x13, 0x91, 0xc6, 0xef, 0xa8, 0xb4, 0x6c, 0x5c, 0x37, 0xb3, 0xf8, 0x4a, 0x82, 0xe4, 0x29, 0xa7, 0x58, 0x0f, 0xeb, 0x9a, 0x13, 0x83, 0xb5, 0x5c, 0x83, 0xa9, 0x39, 0x8e, 0x8e, 0xcc, 0x7b, 0x15, 0xd6, 0x99, 0xe6, 0x39, 0x62, 0x32, 0x91, 0x02, 0xa1, 0x57, 0x6f, 0x2b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1949_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1949_sig[] = { 0x00, 0x12, 0x8c, 0x19, 0x9d, 0xc2, 0x76, 0x77, 0xf2, 0x3f, 0xea, 0xe2, 0x8a, 0x9b, 0x28, 0x81, 0x3c, 0xbc, 0x3b, 0x02, 0xfc, 0xa4, 0x93, 0x00, 0x5a, 0x67, 0xc3, 0x12, 0x6a, 0x70, 0x5c, 0x49, 0xb9, 0x82, 0xcb, 0x58, 0x17, 0xee, 0x2c, 0x81, 0x16, 0x1e, 0x80, 0xb7, 0x38, 0xbb, 0xb5, 0x12, 0x73, 0xcb, 0x6d, 0x45, 0x47, 0x77, 0x1d, 0x25, 0x4b, 0xe7, 0x43, 0x48, 0x95, 0x5b, 0xee, 0x97, 0x90, 0x71, 0x35, 0x8a, 0xa3, 0xaf, 0xd6, 0x2a, 0x58, 0x38, 0x17, 0x9a, 0x09, 0x65, 0x46, 0x5a, 0xec, 0x79, 0xbd, 0x6c, 0xbd, 0x9b, 0x8b, 0x2a, 0xa2, 0xc7, 0x9b, 0xb8, 0x8a, 0xb2, 0x15, 0x92, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1949 = { .name = "ecdsa_brainpoolp384r1_sha384_1949", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1949_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1949_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1949_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 419 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1950 for ECDSA, tcId is 420 in file ecdsa_brainpoolP384r1_sha384_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) static const unsigned char ecdsa_brainpoolp384r1_sha384_1950_pubkey[] = { 0x2a, 0xc3, 0x93, 0xf2, 0x0c, 0x11, 0x0e, 0x3f, 0x97, 0x06, 0x53, 0x04, 0x39, 0x7e, 0xae, 0x0e, 0x23, 0x18, 0x7b, 0x2b, 0x61, 0x63, 0xdc, 0x66, 0x08, 0x3e, 0x82, 0xaf, 0xf5, 0x68, 0x42, 0x68, 0x43, 0x05, 0x6a, 0xff, 0x8d, 0xc2, 0x3e, 0xeb, 0xce, 0x29, 0x7f, 0x74, 0x78, 0x30, 0xe2, 0x17, 0x34, 0xc9, 0x35, 0x67, 0x13, 0x91, 0xc6, 0xef, 0xa8, 0xb4, 0x6c, 0x5c, 0x37, 0xb3, 0xf8, 0x4a, 0x82, 0xe4, 0x29, 0xa7, 0x58, 0x0f, 0xeb, 0x9a, 0x13, 0x83, 0xb5, 0x5c, 0x83, 0xa9, 0x39, 0x8e, 0x8e, 0xcc, 0x7b, 0x15, 0xd6, 0x99, 0xe6, 0x39, 0x62, 0x32, 0x91, 0x02, 0xa1, 0x57, 0x6f, 0x2b, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1950_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp384r1_sha384_1950_sig[] = { 0x81, 0x8b, 0x0f, 0xd6, 0xca, 0x09, 0x78, 0xa5, 0x9c, 0xad, 0x3f, 0xa1, 0x5e, 0x84, 0xdb, 0x28, 0x96, 0xf3, 0x9b, 0x2a, 0xa4, 0x62, 0xf0, 0x58, 0x38, 0x34, 0xfa, 0x44, 0x44, 0xd1, 0x53, 0xfe, 0x61, 0xe0, 0xc9, 0x30, 0x71, 0xba, 0x96, 0xc5, 0xff, 0xa7, 0x19, 0x3f, 0x77, 0xb8, 0x06, 0xf3, 0x1d, 0x2d, 0x61, 0x44, 0x17, 0x23, 0x85, 0xf8, 0x57, 0xdb, 0x4b, 0x7e, 0x7e, 0x86, 0x39, 0x62, 0xea, 0xca, 0xcd, 0xec, 0x03, 0x4b, 0x4b, 0x4a, 0x9d, 0xd1, 0xaf, 0x27, 0x26, 0x04, 0x40, 0x3f, 0x39, 0xf4, 0x5a, 0x21, 0x94, 0x8b, 0x30, 0x97, 0x6e, 0x73, 0x8e, 0x9e, 0x98, 0xfd, 0x9c, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp384r1_sha384_1950 = { .name = "ecdsa_brainpoolp384r1_sha384_1950", .sig_alg = ECDSA, .hash = SHA384, .curve = &brainpoolp384r1_str_params, .pubkey = ecdsa_brainpoolp384r1_sha384_1950_pubkey, .pubkeylen = 96, .msg = ecdsa_brainpoolp384r1_sha384_1950_msg, .msglen = 7, .sig = ecdsa_brainpoolp384r1_sha384_1950_sig, .siglen = 96, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP384t1, tcId is 420 in file ecdsa_brainpoolP384r1_sha384_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP384R1) && defined(WITH_HASH_SHA384) */ /* Test 1951 for ECDSA, tcId is 1 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1951_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1951_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1951_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x44, 0xb4, 0x23, 0x04, 0xe6, 0x93, 0x79, 0x66, 0x18, 0xd0, 0x90, 0xdb, 0xcb, 0x2a, 0x25, 0x51, 0xc3, 0xcb, 0x78, 0x53, 0x46, 0x11, 0xe6, 0x1f, 0xd9, 0xd1, 0xa5, 0xc0, 0x93, 0x8b, 0x5b, 0x8e, 0xc6, 0xed, 0x53, 0xd2, 0xd2, 0x89, 0x99, 0xea, 0xbb, 0xd8, 0xe7, 0x79, 0x2d, 0x16, 0x7f, 0xcf, 0x58, 0x24, 0x92, 0x40, 0x3a, 0x6a, 0x0f, 0x7c, 0xc9, 0x4c, 0x73, 0xa2, 0x8f, 0xb7, 0x6b, 0x71, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1951 = { .name = "ecdsa_brainpoolp512r1_sha512_1951", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1951_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1951_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1951_sig, .siglen = 128, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1952 for ECDSA, tcId is 2 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1952_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1952_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1952_sig[] = { 0xb6, 0xaf, 0xf6, 0xed, 0x23, 0xb6, 0x30, 0x8e, 0x0a, 0xce, 0x84, 0x0e, 0x75, 0x57, 0xd0, 0x36, 0x65, 0x49, 0xda, 0x44, 0xc2, 0x31, 0x27, 0xfb, 0xe2, 0xd3, 0xf6, 0x77, 0x1c, 0x98, 0x73, 0x75, 0x22, 0x3c, 0x7a, 0xc4, 0x94, 0xef, 0x54, 0xfd, 0x71, 0xec, 0xe3, 0x54, 0x6d, 0xdb, 0xfd, 0xc3, 0xbd, 0xc4, 0xbd, 0x0a, 0x16, 0x59, 0x44, 0x64, 0x23, 0x02, 0x7f, 0x0e, 0x01, 0xaf, 0xfa, 0x30, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1952 = { .name = "ecdsa_brainpoolp512r1_sha512_1952", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1952_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1952_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1952_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1953 for ECDSA, tcId is 3 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1953_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1953_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1953_sig[] = { 0x9f, 0x0b, 0x44, 0x84, 0x94, 0x1d, 0x58, 0x88, 0x74, 0xdb, 0x49, 0x4d, 0xf2, 0x3c, 0x27, 0xd9, 0x31, 0x17, 0x41, 0x22, 0xa5, 0x62, 0x7c, 0x21, 0xc9, 0xf3, 0x43, 0x1d, 0xc3, 0xcd, 0x9d, 0x6b, 0x88, 0x40, 0x3d, 0xbe, 0x04, 0x62, 0xf7, 0x35, 0x11, 0x1f, 0xde, 0xde, 0x91, 0x7c, 0x22, 0xca, 0x7d, 0x9e, 0xe9, 0xf7, 0xfa, 0x62, 0x71, 0x57, 0x48, 0x0c, 0xad, 0xf7, 0x37, 0xa2, 0x06, 0xa2, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1953 = { .name = "ecdsa_brainpoolp512r1_sha512_1953", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1953_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1953_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1953_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1954 for ECDSA, tcId is 4 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1954_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1954_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1954_sig[] = { 0x01, 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x00, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1954 = { .name = "ecdsa_brainpoolp512r1_sha512_1954", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1954_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1954_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1954_sig, .siglen = 130, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1955 for ECDSA, tcId is 5 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1955_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1955_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1955_sig[] = { 0xf4, 0x2d, 0xa6, 0xcb, 0xb8, 0x33, 0x93, 0xfd, 0x35, 0x06, 0x62, 0x9f, 0xbe, 0x72, 0x2b, 0xd1, 0x65, 0xe6, 0xb3, 0x6e, 0xf1, 0x98, 0xaa, 0x12, 0xf3, 0x8f, 0xa6, 0x53, 0x53, 0x9a, 0x94, 0xfb, 0x33, 0x01, 0xe1, 0x7c, 0xb7, 0xb9, 0xd1, 0x1b, 0xcf, 0x99, 0x7d, 0xc5, 0x11, 0xd0, 0x12, 0x83, 0x5f, 0xed, 0x16, 0x76, 0xf2, 0x04, 0x96, 0x79, 0x92, 0x85, 0x17, 0x74, 0x9a, 0xf9, 0x06, 0x39, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1955 = { .name = "ecdsa_brainpoolp512r1_sha512_1955", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1955_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1955_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1955_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1956 for ECDSA, tcId is 6 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1956_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1956_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1956_sig[] = { 0x00, 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x01, 0x11, 0x07, 0x18, 0x6c, 0xd1, 0x40, 0x0f, 0xb0, 0x66, 0xd9, 0x3c, 0x80, 0x9c, 0x69, 0xd2, 0xbd, 0xd2, 0x95, 0xa3, 0x14, 0x21, 0x81, 0xbd, 0xfd, 0xd2, 0xf5, 0x93, 0xd4, 0x4c, 0xda, 0xb5, 0x51, 0xe3, 0x8f, 0x64, 0xaf, 0xc6, 0xc8, 0xb2, 0x47, 0xc7, 0x33, 0xda, 0xb9, 0xd2, 0x41, 0xa0, 0xbe, 0xe3, 0x3f, 0x14, 0xc1, 0xd6, 0x51, 0xa6, 0x3e, 0xa1, 0xc2, 0xb9, 0x62, 0xa9, 0x9a, 0x95, 0x61, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1956 = { .name = "ecdsa_brainpoolp512r1_sha512_1956", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1956_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1956_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1956_sig, .siglen = 130, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1957 for ECDSA, tcId is 7 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1957_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1957_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1957_sig[] = { 0x00, 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x01, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1957 = { .name = "ecdsa_brainpoolp512r1_sha512_1957", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1957_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1957_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1957_sig, .siglen = 130, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1958 for ECDSA, tcId is 8 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1958_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1958_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1958_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x99, 0xd6, 0x85, 0x4c, 0x0a, 0xa9, 0xb4, 0xda, 0xd8, 0xfb, 0xaa, 0x2d, 0x97, 0x60, 0x29, 0x49, 0xf8, 0x9a, 0xea, 0x9f, 0x92, 0x48, 0x14, 0x11, 0x03, 0x6e, 0x08, 0xf6, 0x23, 0x58, 0x53, 0x1e, 0x71, 0xae, 0xf7, 0x91, 0x85, 0xe0, 0x73, 0xd1, 0x7a, 0x52, 0x86, 0x5f, 0xad, 0x6a, 0x6f, 0x88, 0x3a, 0x72, 0xbe, 0xbf, 0x32, 0x0c, 0x34, 0x9f, 0x13, 0xc4, 0xdd, 0x1f, 0xf3, 0x0e, 0x6b, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1958 = { .name = "ecdsa_brainpoolp512r1_sha512_1958", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1958_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1958_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1958_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1959 for ECDSA, tcId is 9 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1959_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1959_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1959_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1959 = { .name = "ecdsa_brainpoolp512r1_sha512_1959", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1959_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1959_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1959_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1960 for ECDSA, tcId is 10 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1960_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1960_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1960_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1960 = { .name = "ecdsa_brainpoolp512r1_sha512_1960", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1960_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1960_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1960_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1961 for ECDSA, tcId is 11 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1961_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1961_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1961_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1961 = { .name = "ecdsa_brainpoolp512r1_sha512_1961", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1961_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1961_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1961_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1962 for ECDSA, tcId is 12 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1962_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1962_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1962_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1962 = { .name = "ecdsa_brainpoolp512r1_sha512_1962", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1962_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1962_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1962_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1963 for ECDSA, tcId is 13 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1963_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1963_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1963_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1963 = { .name = "ecdsa_brainpoolp512r1_sha512_1963", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1963_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1963_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1963_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1964 for ECDSA, tcId is 14 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1964_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1964_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1964_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1964 = { .name = "ecdsa_brainpoolp512r1_sha512_1964", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1964_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1964_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1964_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1965 for ECDSA, tcId is 15 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1965_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1965_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1965_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1965 = { .name = "ecdsa_brainpoolp512r1_sha512_1965", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1965_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1965_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1965_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1966 for ECDSA, tcId is 16 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1966_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1966_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1966_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1966 = { .name = "ecdsa_brainpoolp512r1_sha512_1966", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1966_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1966_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1966_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1967 for ECDSA, tcId is 17 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1967_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1967_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1967_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1967 = { .name = "ecdsa_brainpoolp512r1_sha512_1967", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1967_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1967_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1967_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1968 for ECDSA, tcId is 18 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1968_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1968_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1968_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1968 = { .name = "ecdsa_brainpoolp512r1_sha512_1968", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1968_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1968_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1968_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1969 for ECDSA, tcId is 19 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1969_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1969_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1969_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1969 = { .name = "ecdsa_brainpoolp512r1_sha512_1969", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1969_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1969_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1969_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1970 for ECDSA, tcId is 20 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1970_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1970_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1970_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1970 = { .name = "ecdsa_brainpoolp512r1_sha512_1970", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1970_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1970_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1970_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1971 for ECDSA, tcId is 21 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1971_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1971_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1971_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1971 = { .name = "ecdsa_brainpoolp512r1_sha512_1971", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1971_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1971_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1971_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1972 for ECDSA, tcId is 22 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1972_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1972_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1972_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1972 = { .name = "ecdsa_brainpoolp512r1_sha512_1972", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1972_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1972_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1972_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1973 for ECDSA, tcId is 23 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1973_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1973_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1973_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1973 = { .name = "ecdsa_brainpoolp512r1_sha512_1973", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1973_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1973_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1973_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1974 for ECDSA, tcId is 24 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1974_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1974_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1974_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1974 = { .name = "ecdsa_brainpoolp512r1_sha512_1974", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1974_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1974_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1974_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1975 for ECDSA, tcId is 25 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1975_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1975_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1975_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1975 = { .name = "ecdsa_brainpoolp512r1_sha512_1975", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1975_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1975_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1975_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1976 for ECDSA, tcId is 26 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1976_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1976_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1976_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1976 = { .name = "ecdsa_brainpoolp512r1_sha512_1976", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1976_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1976_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1976_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1977 for ECDSA, tcId is 27 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1977_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1977_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1977_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1977 = { .name = "ecdsa_brainpoolp512r1_sha512_1977", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1977_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1977_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1977_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1978 for ECDSA, tcId is 28 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1978_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1978_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1978_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1978 = { .name = "ecdsa_brainpoolp512r1_sha512_1978", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1978_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1978_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1978_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1979 for ECDSA, tcId is 29 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1979_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1979_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1979_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1979 = { .name = "ecdsa_brainpoolp512r1_sha512_1979", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1979_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1979_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1979_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1980 for ECDSA, tcId is 30 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1980_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1980_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1980_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1980 = { .name = "ecdsa_brainpoolp512r1_sha512_1980", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1980_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1980_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1980_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1981 for ECDSA, tcId is 31 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1981_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1981_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1981_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1981 = { .name = "ecdsa_brainpoolp512r1_sha512_1981", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1981_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1981_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1981_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1982 for ECDSA, tcId is 32 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1982_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1982_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1982_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1982 = { .name = "ecdsa_brainpoolp512r1_sha512_1982", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1982_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1982_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1982_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1983 for ECDSA, tcId is 33 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1983_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1983_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1983_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1983 = { .name = "ecdsa_brainpoolp512r1_sha512_1983", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1983_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1983_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1983_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1984 for ECDSA, tcId is 34 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1984_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1984_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1984_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1984 = { .name = "ecdsa_brainpoolp512r1_sha512_1984", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1984_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1984_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1984_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1985 for ECDSA, tcId is 35 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1985_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1985_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1985_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1985 = { .name = "ecdsa_brainpoolp512r1_sha512_1985", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1985_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1985_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1985_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1986 for ECDSA, tcId is 36 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1986_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1986_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1986_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1986 = { .name = "ecdsa_brainpoolp512r1_sha512_1986", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1986_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1986_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1986_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1987 for ECDSA, tcId is 37 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1987_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1987_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1987_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1987 = { .name = "ecdsa_brainpoolp512r1_sha512_1987", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1987_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1987_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1987_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1988 for ECDSA, tcId is 38 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1988_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1988_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1988_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1988 = { .name = "ecdsa_brainpoolp512r1_sha512_1988", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1988_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1988_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1988_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1989 for ECDSA, tcId is 39 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1989_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1989_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1989_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1989 = { .name = "ecdsa_brainpoolp512r1_sha512_1989", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1989_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1989_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1989_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1990 for ECDSA, tcId is 40 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1990_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1990_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1990_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1990 = { .name = "ecdsa_brainpoolp512r1_sha512_1990", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1990_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1990_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1990_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1991 for ECDSA, tcId is 41 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1991_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1991_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1991_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1991 = { .name = "ecdsa_brainpoolp512r1_sha512_1991", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1991_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1991_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1991_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1992 for ECDSA, tcId is 42 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1992_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1992_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1992_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1992 = { .name = "ecdsa_brainpoolp512r1_sha512_1992", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1992_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1992_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1992_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1993 for ECDSA, tcId is 43 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1993_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1993_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1993_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1993 = { .name = "ecdsa_brainpoolp512r1_sha512_1993", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1993_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1993_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1993_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1994 for ECDSA, tcId is 44 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1994_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1994_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1994_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1994 = { .name = "ecdsa_brainpoolp512r1_sha512_1994", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1994_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1994_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1994_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1995 for ECDSA, tcId is 45 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1995_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1995_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1995_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1995 = { .name = "ecdsa_brainpoolp512r1_sha512_1995", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1995_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1995_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1995_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1996 for ECDSA, tcId is 46 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1996_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1996_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1996_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1996 = { .name = "ecdsa_brainpoolp512r1_sha512_1996", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1996_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1996_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1996_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1997 for ECDSA, tcId is 47 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1997_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1997_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1997_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1997 = { .name = "ecdsa_brainpoolp512r1_sha512_1997", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1997_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1997_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1997_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1998 for ECDSA, tcId is 48 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1998_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1998_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1998_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1998 = { .name = "ecdsa_brainpoolp512r1_sha512_1998", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1998_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1998_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1998_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 1999 for ECDSA, tcId is 49 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_1999_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1999_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_1999_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_1999 = { .name = "ecdsa_brainpoolp512r1_sha512_1999", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_1999_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_1999_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_1999_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2000 for ECDSA, tcId is 50 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2000_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2000_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2000_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2000 = { .name = "ecdsa_brainpoolp512r1_sha512_2000", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2000_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2000_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2000_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2001 for ECDSA, tcId is 51 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2001_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2001_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2001_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2001 = { .name = "ecdsa_brainpoolp512r1_sha512_2001", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2001_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2001_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2001_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2002 for ECDSA, tcId is 52 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2002_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2002_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2002_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2002 = { .name = "ecdsa_brainpoolp512r1_sha512_2002", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2002_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2002_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2002_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2003 for ECDSA, tcId is 53 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2003_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2003_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2003_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2003 = { .name = "ecdsa_brainpoolp512r1_sha512_2003", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2003_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2003_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2003_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2004 for ECDSA, tcId is 54 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2004_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2004_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2004_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2004 = { .name = "ecdsa_brainpoolp512r1_sha512_2004", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2004_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2004_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2004_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2005 for ECDSA, tcId is 55 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2005_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2005_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2005_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2005 = { .name = "ecdsa_brainpoolp512r1_sha512_2005", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2005_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2005_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2005_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2006 for ECDSA, tcId is 56 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2006_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2006_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2006_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2006 = { .name = "ecdsa_brainpoolp512r1_sha512_2006", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2006_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2006_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2006_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2007 for ECDSA, tcId is 57 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2007_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2007_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2007_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2007 = { .name = "ecdsa_brainpoolp512r1_sha512_2007", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2007_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2007_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2007_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2008 for ECDSA, tcId is 58 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2008_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2008_msg[] = { 0x31, 0x31, 0x31, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2008_sig[] = { 0x7d, 0xa1, 0x1e, 0x5b, 0x4b, 0xb7, 0x93, 0x21, 0x35, 0xcd, 0x91, 0xac, 0xce, 0xf8, 0x89, 0x2c, 0x42, 0x86, 0x65, 0x4a, 0x7b, 0xe7, 0xc9, 0xd3, 0x84, 0xb6, 0x00, 0xd9, 0x79, 0x00, 0xee, 0x12, 0xa2, 0x3f, 0xf1, 0xf9, 0xae, 0x9a, 0x4f, 0xe7, 0x4c, 0xca, 0x18, 0x5d, 0x0d, 0xc9, 0xf5, 0x9d, 0xc2, 0x4b, 0xe0, 0x3d, 0x02, 0x23, 0xd8, 0xfe, 0xb5, 0x5b, 0x6d, 0xde, 0x17, 0x77, 0x47, 0x5f, 0x06, 0x86, 0xbc, 0x31, 0x3a, 0xa5, 0xc1, 0x92, 0x3a, 0xb0, 0x54, 0x33, 0x31, 0x39, 0x81, 0x90, 0xca, 0x5f, 0x22, 0xa3, 0xa9, 0x7e, 0x96, 0x3a, 0x13, 0xce, 0xdf, 0x68, 0x8d, 0xa1, 0xdf, 0xe4, 0xa3, 0x48, 0x94, 0x54, 0x97, 0xb2, 0x1c, 0x01, 0xc8, 0xa1, 0x7c, 0x23, 0x25, 0x2b, 0x3e, 0x8e, 0xac, 0x1f, 0x9a, 0x92, 0xd6, 0x32, 0x0e, 0xaa, 0x32, 0x4b, 0x44, 0x80, 0x7c, 0x32, 0x61, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2008 = { .name = "ecdsa_brainpoolp512r1_sha512_2008", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2008_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2008_msg, .msglen = 4, .sig = ecdsa_brainpoolp512r1_sha512_2008_sig, .siglen = 128, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2009 for ECDSA, tcId is 59 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2009_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2009_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x31, 0x39, 0x34, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2009_sig[] = { 0x6d, 0x87, 0xbe, 0x05, 0x95, 0x8c, 0xa5, 0xc7, 0x0c, 0x5d, 0x29, 0x62, 0x91, 0x60, 0x50, 0x21, 0x40, 0x2d, 0xeb, 0xa1, 0x77, 0x2f, 0x31, 0xbb, 0xba, 0x09, 0xdc, 0x65, 0xa8, 0x37, 0xb0, 0x9a, 0x78, 0xd3, 0x32, 0xb6, 0x16, 0x2a, 0x32, 0x01, 0xca, 0x1a, 0x30, 0xd4, 0x16, 0x2d, 0x8f, 0x18, 0x6b, 0x2b, 0xff, 0xca, 0x53, 0x02, 0x33, 0x3a, 0xca, 0x14, 0x89, 0x4d, 0x5f, 0x09, 0x3f, 0xe7, 0x10, 0xb8, 0xb3, 0xc9, 0x0b, 0x46, 0x09, 0xcc, 0xbd, 0xdd, 0xed, 0x27, 0x5d, 0x42, 0x49, 0x85, 0x7d, 0x88, 0x27, 0x49, 0xe4, 0xb8, 0x36, 0xd0, 0x17, 0xdb, 0xaa, 0xe0, 0x5e, 0x3a, 0x19, 0xcf, 0x78, 0x10, 0x63, 0x23, 0x29, 0xa0, 0x25, 0x80, 0xda, 0xe4, 0x41, 0x36, 0xca, 0xdc, 0xf0, 0x6c, 0xa5, 0x7d, 0xfe, 0x56, 0x0e, 0x1c, 0x11, 0x22, 0xe2, 0xec, 0x00, 0xff, 0x04, 0xd7, 0x88, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2009 = { .name = "ecdsa_brainpoolp512r1_sha512_2009", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2009_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2009_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2009_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2010 for ECDSA, tcId is 60 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2010_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2010_msg[] = { 0x35, 0x33, 0x36, 0x37, 0x36, 0x34, 0x31, 0x38, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2010_sig[] = { 0x23, 0xe9, 0xba, 0xc3, 0xf1, 0x4d, 0x56, 0x67, 0x9b, 0xda, 0x0b, 0xb2, 0xf4, 0xf1, 0x9e, 0xec, 0xaf, 0x6d, 0xd5, 0x03, 0x64, 0x9c, 0x81, 0x14, 0x92, 0x27, 0x88, 0x0f, 0x14, 0x37, 0x6d, 0x02, 0x24, 0x19, 0x3d, 0x2b, 0x1b, 0xda, 0x4b, 0x08, 0xf8, 0x7e, 0x46, 0x68, 0x7d, 0xd9, 0x14, 0x12, 0x78, 0xa3, 0x99, 0xf0, 0xa3, 0xcd, 0x0d, 0x00, 0x2f, 0x23, 0x6d, 0x0e, 0x7d, 0x73, 0x82, 0xb7, 0x9c, 0x24, 0xfb, 0x21, 0x28, 0xd6, 0x2e, 0x5d, 0xdf, 0x59, 0xbb, 0x86, 0xb3, 0xa6, 0xb7, 0x87, 0xb1, 0x0c, 0xc7, 0x58, 0x65, 0xe5, 0xae, 0xab, 0x41, 0xa8, 0x4f, 0x87, 0x8a, 0xb3, 0xa9, 0x47, 0xa2, 0xf6, 0xb4, 0xb0, 0x87, 0x1a, 0xf4, 0x94, 0xc1, 0x30, 0xf5, 0x8b, 0xb3, 0x95, 0x7c, 0xe0, 0x3d, 0x61, 0x37, 0x3f, 0x3f, 0xb5, 0xcb, 0xe9, 0x7e, 0xbe, 0xdc, 0x1b, 0x3a, 0xca, 0x17, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2010 = { .name = "ecdsa_brainpoolp512r1_sha512_2010", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2010_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2010_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2010_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2011 for ECDSA, tcId is 61 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2011_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2011_msg[] = { 0x35, 0x36, 0x37, 0x31, 0x34, 0x38, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2011_sig[] = { 0x2d, 0x07, 0xd8, 0xbb, 0x62, 0x77, 0xb7, 0x8f, 0xa4, 0x48, 0xd5, 0x2e, 0x3e, 0x1d, 0x90, 0x1c, 0xcb, 0xdd, 0x68, 0x29, 0x30, 0xfc, 0xa9, 0xd8, 0x69, 0x59, 0xa6, 0x3b, 0x5a, 0x79, 0x2a, 0x8a, 0xa8, 0x2f, 0xf9, 0xbd, 0x7d, 0xa3, 0xe4, 0x05, 0x7f, 0x40, 0x2a, 0x76, 0xe8, 0x28, 0x36, 0xaa, 0x3d, 0xa3, 0x4b, 0x6f, 0xf6, 0xbb, 0x8b, 0x21, 0x89, 0xac, 0x24, 0x2b, 0xae, 0xa2, 0xb0, 0xee, 0x58, 0xeb, 0xef, 0x50, 0xea, 0x30, 0xd1, 0x5a, 0xc2, 0x6f, 0xa0, 0x3e, 0x2b, 0x06, 0x5c, 0x7b, 0xa5, 0x0f, 0x33, 0x1a, 0x5c, 0xf2, 0x40, 0x17, 0x5f, 0xf3, 0xa6, 0xa1, 0xd8, 0xdb, 0x40, 0x0e, 0x15, 0x97, 0xce, 0x67, 0x5e, 0xb3, 0x2f, 0x26, 0x9b, 0x43, 0x67, 0x01, 0x1a, 0xcf, 0x32, 0x76, 0x58, 0x06, 0x02, 0xee, 0xd7, 0xc2, 0x93, 0x84, 0x39, 0x77, 0x2e, 0x1b, 0xe1, 0xb9, 0x38, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2011 = { .name = "ecdsa_brainpoolp512r1_sha512_2011", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2011_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2011_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2011_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2012 for ECDSA, tcId is 62 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2012_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2012_msg[] = { 0x31, 0x31, 0x32, 0x30, 0x37, 0x31, 0x37, 0x32, 0x39, 0x30, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2012_sig[] = { 0x0d, 0x67, 0x43, 0xa7, 0xbc, 0x90, 0x4a, 0x21, 0xd7, 0x31, 0x20, 0x5f, 0xca, 0xa7, 0xfc, 0xd0, 0x01, 0x8e, 0xad, 0x44, 0x6e, 0xcc, 0x9b, 0xaf, 0xc4, 0x53, 0x2b, 0xd0, 0xce, 0x6b, 0xfa, 0x69, 0x60, 0x15, 0x9f, 0x59, 0xb5, 0xeb, 0x37, 0xc7, 0x50, 0xd4, 0x23, 0xc4, 0xfb, 0xcf, 0xb2, 0x0a, 0x71, 0x8e, 0x56, 0x55, 0xd5, 0x17, 0xb7, 0x4f, 0xff, 0x89, 0x86, 0xc9, 0x63, 0x8f, 0x4f, 0x29, 0x03, 0x99, 0xd7, 0x94, 0x1f, 0xe5, 0xf3, 0xf3, 0x08, 0xaf, 0xb8, 0xa8, 0xa4, 0xff, 0x8f, 0x2b, 0xec, 0x1b, 0xfe, 0x6b, 0x91, 0x0c, 0x83, 0x99, 0xd8, 0x31, 0xeb, 0x62, 0x21, 0x68, 0x48, 0x75, 0xf6, 0x7f, 0xe6, 0xa2, 0x57, 0x6c, 0x86, 0xfe, 0xad, 0xf3, 0xcd, 0x2a, 0xf1, 0x47, 0x29, 0x78, 0x30, 0x11, 0x36, 0x11, 0xfc, 0xff, 0xfa, 0xcd, 0x8a, 0x8c, 0x8c, 0x52, 0xcf, 0x95, 0x7f, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2012 = { .name = "ecdsa_brainpoolp512r1_sha512_2012", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2012_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2012_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2012_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2013 for ECDSA, tcId is 63 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2013_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2013_msg[] = { 0x31, 0x31, 0x32, 0x39, 0x38, 0x30, 0x33, 0x34, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2013_sig[] = { 0xaa, 0xbc, 0x4b, 0xdc, 0xc4, 0x4c, 0xea, 0xcf, 0xe0, 0x3a, 0x96, 0xa7, 0x93, 0x9b, 0xf0, 0x8c, 0x40, 0x7d, 0x30, 0x0d, 0xe4, 0x46, 0x51, 0x4f, 0xc9, 0x64, 0xde, 0x4d, 0xab, 0xf2, 0x9e, 0xbd, 0xa0, 0x60, 0x8c, 0x17, 0x09, 0xc7, 0x22, 0x44, 0xf8, 0xd8, 0x88, 0xcb, 0x0e, 0x55, 0x6d, 0x75, 0x82, 0x87, 0x56, 0xd1, 0x1c, 0x11, 0xbe, 0x77, 0x87, 0x60, 0x3b, 0xff, 0xc6, 0x71, 0x8a, 0xc5, 0x81, 0xeb, 0x84, 0xc8, 0x74, 0x3a, 0xd6, 0xab, 0x78, 0xa0, 0x21, 0xa6, 0xf5, 0x5b, 0x3a, 0xe0, 0x84, 0x5f, 0x18, 0x30, 0x7e, 0xa1, 0x8e, 0x77, 0x1e, 0x3c, 0x4e, 0x11, 0xb3, 0x12, 0xeb, 0x8e, 0x53, 0x00, 0x02, 0xc9, 0x5c, 0xdb, 0x51, 0x78, 0x55, 0xb1, 0x7e, 0xa9, 0x72, 0x6e, 0xc9, 0x60, 0x2f, 0x34, 0x7e, 0x78, 0x9f, 0xab, 0x42, 0x05, 0x5e, 0x68, 0x8a, 0x55, 0x8e, 0x3f, 0xc9, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2013 = { .name = "ecdsa_brainpoolp512r1_sha512_2013", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2013_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2013_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2013_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2014 for ECDSA, tcId is 64 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2014_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2014_msg[] = { 0x39, 0x38, 0x37, 0x36, 0x30, 0x32, 0x39, 0x36, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2014_sig[] = { 0x4e, 0x7f, 0x75, 0x68, 0x1d, 0xd7, 0xcb, 0x2e, 0xea, 0x02, 0x2e, 0x5b, 0x86, 0x32, 0x9b, 0x25, 0x30, 0x7c, 0x21, 0xb8, 0x28, 0xc7, 0x41, 0x69, 0x16, 0xcf, 0x1f, 0x59, 0x38, 0x07, 0x15, 0x19, 0xcb, 0x7d, 0xa6, 0x68, 0xec, 0x6b, 0xc2, 0x19, 0xe7, 0x2d, 0x35, 0x87, 0x32, 0xf1, 0xc7, 0x7a, 0xbf, 0xcc, 0x61, 0x06, 0x5a, 0xa3, 0x23, 0x94, 0x19, 0x08, 0x9f, 0xab, 0xef, 0xe3, 0x96, 0xdf, 0x4f, 0x9e, 0xc1, 0x96, 0xa7, 0x1c, 0x5c, 0x8e, 0xd8, 0x8d, 0x7f, 0xe1, 0xd0, 0x03, 0x8f, 0x37, 0x2a, 0xc6, 0x0b, 0xfa, 0x18, 0x0c, 0xee, 0x24, 0x98, 0xaa, 0x9c, 0x02, 0x48, 0x16, 0x6f, 0x17, 0x38, 0x23, 0x68, 0xfa, 0x2b, 0x3b, 0x8c, 0xe2, 0x9d, 0x50, 0xd7, 0xa2, 0x1e, 0x91, 0xa8, 0x3c, 0xa8, 0x8d, 0xb5, 0xd4, 0xef, 0xd0, 0x73, 0xf8, 0x21, 0xa8, 0xc5, 0xaa, 0x4d, 0x26, 0x67, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2014 = { .name = "ecdsa_brainpoolp512r1_sha512_2014", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2014_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2014_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2014_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2015 for ECDSA, tcId is 65 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2015_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2015_msg[] = { 0x32, 0x30, 0x32, 0x30, 0x34, 0x32, 0x39, 0x36, 0x35, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2015_sig[] = { 0xa0, 0xe1, 0xc2, 0xbb, 0x33, 0x20, 0x02, 0x54, 0xbe, 0xab, 0x5e, 0x73, 0x5c, 0x1a, 0x2c, 0x59, 0x0f, 0xc1, 0x18, 0x54, 0x03, 0x01, 0xad, 0xd7, 0xe5, 0x49, 0x17, 0x01, 0xd2, 0x2c, 0x71, 0x29, 0x3a, 0xdf, 0xed, 0xdf, 0x43, 0x08, 0x94, 0x0f, 0xd8, 0xa0, 0x66, 0x22, 0x2c, 0xcf, 0xb3, 0x80, 0x2e, 0xaf, 0xff, 0xe0, 0x3b, 0x21, 0x56, 0xc8, 0xe7, 0x9c, 0x32, 0x60, 0xd1, 0x80, 0xb3, 0xb8, 0x9d, 0x84, 0x82, 0x12, 0x7f, 0x22, 0xec, 0xa1, 0x0b, 0x27, 0x92, 0x74, 0x7d, 0x60, 0x16, 0xba, 0x71, 0x99, 0x65, 0x60, 0x3e, 0xe8, 0xe7, 0x1f, 0x2a, 0x39, 0x50, 0x0a, 0x2f, 0x21, 0x1d, 0xcb, 0x2d, 0xa5, 0x82, 0xd5, 0xdb, 0xd0, 0xc6, 0xa4, 0x07, 0x15, 0x5e, 0x1b, 0x01, 0x08, 0x5b, 0x75, 0x9c, 0x80, 0x97, 0x1c, 0xf1, 0x85, 0xfd, 0x0a, 0x26, 0xe3, 0x88, 0x92, 0x63, 0xa7, 0xf2, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2015 = { .name = "ecdsa_brainpoolp512r1_sha512_2015", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2015_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2015_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2015_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2016 for ECDSA, tcId is 66 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2016_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2016_msg[] = { 0x31, 0x34, 0x35, 0x31, 0x36, 0x36, 0x39, 0x31, 0x38, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2016_sig[] = { 0x2e, 0xe9, 0xca, 0x54, 0xe2, 0xdf, 0x79, 0xd6, 0xe0, 0x6f, 0x13, 0x01, 0x89, 0xfa, 0xca, 0x80, 0x1c, 0xcb, 0x08, 0x1c, 0x43, 0x47, 0x2d, 0x4f, 0x88, 0x8a, 0xed, 0x89, 0x2d, 0xf8, 0x78, 0xd1, 0x2c, 0xa1, 0x4c, 0x8e, 0x80, 0x0f, 0xb7, 0xa7, 0x5c, 0x22, 0x90, 0xa0, 0x28, 0xfb, 0x7d, 0x12, 0x93, 0x64, 0x99, 0xc3, 0x01, 0x0b, 0xc5, 0xc7, 0xc0, 0x7b, 0x2f, 0x73, 0x89, 0x24, 0x76, 0x6e, 0x55, 0x8c, 0x02, 0xbc, 0xd1, 0x32, 0x90, 0xff, 0x34, 0xe0, 0x39, 0xa1, 0x99, 0x38, 0x43, 0x85, 0xa4, 0x4f, 0x97, 0xef, 0x9a, 0x7d, 0xcd, 0xaa, 0x0f, 0xac, 0xa6, 0x63, 0x57, 0xec, 0x7b, 0x9c, 0x1b, 0x40, 0xea, 0x7a, 0x35, 0x29, 0xf4, 0xbb, 0x79, 0x6f, 0xbd, 0xda, 0xdf, 0xbe, 0x64, 0xd3, 0xe6, 0xab, 0xfc, 0x54, 0xc2, 0x94, 0x6f, 0x5b, 0x1f, 0x54, 0x8f, 0xa0, 0x87, 0x7f, 0x3a, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2016 = { .name = "ecdsa_brainpoolp512r1_sha512_2016", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2016_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2016_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2016_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2017 for ECDSA, tcId is 67 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2017_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2017_msg[] = { 0x31, 0x30, 0x39, 0x33, 0x36, 0x38, 0x35, 0x39, 0x35, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2017_sig[] = { 0x54, 0xf4, 0x5f, 0x0b, 0xc3, 0x0a, 0x88, 0x9a, 0x4f, 0xae, 0x7e, 0xaa, 0x04, 0x7e, 0xa0, 0x2c, 0xa0, 0xb9, 0xe3, 0x87, 0xd6, 0x36, 0x78, 0x01, 0xf8, 0xbc, 0xce, 0xc2, 0xec, 0x7c, 0x0f, 0xf8, 0x9d, 0x66, 0x03, 0xd7, 0x0f, 0x7c, 0x8e, 0x05, 0x5e, 0x59, 0xfa, 0x69, 0x90, 0x5b, 0x18, 0x5f, 0xaa, 0xb4, 0x37, 0x77, 0x9d, 0x62, 0xc4, 0xd2, 0xee, 0xf4, 0xb1, 0x2a, 0x90, 0xc2, 0x0a, 0xb4, 0x43, 0xc2, 0xca, 0x32, 0x05, 0xa7, 0xf8, 0xb6, 0x1f, 0x64, 0x66, 0x1d, 0x0f, 0xe7, 0x46, 0xbd, 0x23, 0xfd, 0x0f, 0x26, 0x49, 0x99, 0x31, 0x0a, 0x56, 0xb3, 0x98, 0x04, 0x8a, 0xd4, 0x6f, 0xba, 0xb8, 0xa5, 0xe3, 0xb3, 0xe2, 0xe1, 0x6c, 0x4b, 0x2f, 0x03, 0xf1, 0x01, 0x57, 0x3e, 0x2f, 0x65, 0x93, 0xb6, 0x4a, 0xcc, 0xf3, 0x19, 0xdc, 0x9e, 0x2e, 0x2e, 0x84, 0x7b, 0x06, 0xfc, 0xdd, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2017 = { .name = "ecdsa_brainpoolp512r1_sha512_2017", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2017_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2017_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2017_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2018 for ECDSA, tcId is 68 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2018_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2018_msg[] = { 0x36, 0x32, 0x31, 0x39, 0x35, 0x36, 0x30, 0x32, 0x30, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2018_sig[] = { 0x8a, 0x03, 0x0f, 0xd4, 0xba, 0x48, 0xd3, 0xf5, 0x99, 0x80, 0x10, 0xc7, 0x64, 0xe8, 0x69, 0x21, 0x1a, 0x4c, 0xe3, 0x31, 0x22, 0xa7, 0xfd, 0xc7, 0xb8, 0xdf, 0x26, 0x76, 0x3b, 0xe1, 0x80, 0xf2, 0x5e, 0x06, 0x8d, 0xb6, 0xc9, 0x28, 0x20, 0xbe, 0x64, 0x1b, 0x8a, 0xfd, 0x17, 0x8a, 0x80, 0x33, 0x60, 0xbd, 0x19, 0x7a, 0x86, 0xcc, 0x8e, 0xf7, 0x6c, 0xa0, 0x08, 0x44, 0x3e, 0xc4, 0xad, 0x63, 0x80, 0x37, 0xc3, 0xa2, 0xc1, 0xca, 0xc2, 0x6e, 0x6f, 0xf8, 0x98, 0x94, 0xa0, 0x7b, 0x3e, 0x25, 0xf5, 0x13, 0x68, 0x0f, 0xc2, 0xe4, 0x6e, 0xd6, 0x93, 0xdf, 0x96, 0xd0, 0xee, 0x85, 0xb9, 0x40, 0x0c, 0xd6, 0x2d, 0x72, 0x3f, 0xc9, 0x8a, 0xdc, 0xa2, 0xa6, 0x79, 0xfa, 0xfe, 0xc9, 0xdb, 0x5f, 0xe0, 0x78, 0xf2, 0x5f, 0x98, 0x04, 0xe0, 0xd0, 0xce, 0x16, 0xd1, 0xa4, 0x32, 0xd1, 0x94, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2018 = { .name = "ecdsa_brainpoolp512r1_sha512_2018", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2018_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2018_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2018_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2019 for ECDSA, tcId is 69 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2019_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2019_msg[] = { 0x35, 0x36, 0x38, 0x32, 0x34, 0x37, 0x34, 0x33, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2019_sig[] = { 0x3b, 0xbd, 0x19, 0x97, 0x80, 0x2b, 0x5f, 0xc5, 0xd4, 0xf2, 0xb8, 0x7b, 0x6c, 0xdd, 0xb9, 0x75, 0x29, 0xca, 0xc1, 0xba, 0x29, 0xdd, 0x29, 0xcf, 0xff, 0x73, 0x15, 0xb7, 0x87, 0x11, 0x6d, 0x9d, 0x3d, 0xab, 0xdd, 0xd1, 0xb4, 0x41, 0x49, 0x95, 0xc2, 0x26, 0x99, 0x06, 0xa7, 0xbc, 0x19, 0x59, 0xa0, 0x6d, 0xe5, 0xbc, 0xd4, 0xd5, 0x63, 0x04, 0x2e, 0x17, 0x41, 0xaf, 0x00, 0x9c, 0xba, 0x9f, 0x51, 0xb3, 0xd4, 0x35, 0xef, 0xe7, 0x95, 0x73, 0xac, 0xa8, 0xef, 0xd3, 0xcc, 0x1c, 0x8a, 0x22, 0x7e, 0xcd, 0x94, 0xeb, 0x40, 0x79, 0x67, 0x54, 0x59, 0xb6, 0xf4, 0xf1, 0x68, 0xb6, 0x11, 0x1c, 0x07, 0xc6, 0x33, 0xe6, 0x4e, 0x60, 0xd4, 0x3a, 0x5f, 0x3b, 0x0d, 0x0b, 0x2f, 0x43, 0x71, 0xf6, 0x8c, 0x7c, 0xde, 0xb6, 0xbd, 0x8f, 0xbb, 0xf3, 0xbe, 0xd2, 0xef, 0xfa, 0x25, 0x42, 0xb0, 0xae, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2019 = { .name = "ecdsa_brainpoolp512r1_sha512_2019", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2019_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2019_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2019_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2020 for ECDSA, tcId is 70 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2020_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2020_msg[] = { 0x33, 0x37, 0x33, 0x36, 0x35, 0x33, 0x31, 0x37, 0x38, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2020_sig[] = { 0x82, 0x93, 0xa5, 0x45, 0x97, 0x44, 0x30, 0xb3, 0xd7, 0xf7, 0xe3, 0x14, 0xab, 0x0e, 0xf4, 0x87, 0x31, 0x71, 0x5a, 0x5f, 0x79, 0xc2, 0xf3, 0x4b, 0x94, 0xf1, 0x20, 0xfc, 0x01, 0x70, 0x39, 0x71, 0x30, 0x29, 0x88, 0x03, 0x77, 0x8b, 0x53, 0x2f, 0xf1, 0x00, 0x20, 0xdb, 0x06, 0x0d, 0x19, 0xd9, 0x31, 0xd7, 0x48, 0x56, 0xfb, 0xf3, 0x30, 0xa7, 0x5b, 0x28, 0x41, 0x6d, 0x45, 0xaf, 0x54, 0xb6, 0x2b, 0x8d, 0xb4, 0x83, 0x08, 0xc0, 0xb1, 0xf6, 0x21, 0xe2, 0x2c, 0x7d, 0xc1, 0xe7, 0x62, 0xb0, 0x85, 0x08, 0xbe, 0x1a, 0x8e, 0xb4, 0x35, 0x5f, 0x6f, 0x9c, 0xcb, 0x84, 0x20, 0x85, 0xa1, 0xf6, 0x64, 0xd7, 0xb6, 0x8b, 0x1a, 0x24, 0xbd, 0x88, 0xf1, 0x7b, 0x16, 0xd1, 0x41, 0xb0, 0xc1, 0xc3, 0xa5, 0xd7, 0xf1, 0xa7, 0xef, 0x4d, 0x53, 0x3b, 0x90, 0x0d, 0x18, 0x53, 0xbc, 0x5a, 0x6f, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2020 = { .name = "ecdsa_brainpoolp512r1_sha512_2020", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2020_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2020_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2020_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2021 for ECDSA, tcId is 71 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2021_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2021_msg[] = { 0x34, 0x37, 0x39, 0x35, 0x39, 0x30, 0x33, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2021_sig[] = { 0x52, 0x59, 0x40, 0xc2, 0x17, 0x98, 0x6b, 0x7e, 0xf0, 0xe1, 0x8c, 0x81, 0xfe, 0x10, 0x06, 0x3d, 0x65, 0xdb, 0xe1, 0x80, 0x9d, 0x72, 0x6c, 0x8a, 0x1a, 0xa0, 0xb6, 0x17, 0xf3, 0x34, 0x89, 0x1e, 0x94, 0xc5, 0xdf, 0x14, 0xf7, 0xb9, 0x44, 0xa1, 0x63, 0x99, 0x50, 0xa4, 0x3e, 0x98, 0xeb, 0x6f, 0x1c, 0x34, 0x91, 0x21, 0xd1, 0x07, 0xf9, 0x1c, 0xa7, 0x14, 0x2b, 0x7f, 0xf6, 0x2e, 0xc7, 0x76, 0x6b, 0x35, 0x67, 0xe4, 0x96, 0x5f, 0x2d, 0x76, 0x6f, 0xd0, 0x72, 0x80, 0xf3, 0x1f, 0x8c, 0x77, 0x92, 0x12, 0x65, 0xf0, 0x0e, 0x71, 0x9c, 0x7c, 0x00, 0x55, 0xe5, 0x1c, 0x85, 0xe1, 0xf3, 0xd4, 0x6a, 0xc9, 0x39, 0x67, 0x81, 0x61, 0x30, 0xa6, 0x53, 0x2c, 0x90, 0x25, 0x43, 0xa5, 0x30, 0xe2, 0x7b, 0x41, 0x97, 0xcf, 0xd1, 0x47, 0x8c, 0x90, 0xce, 0x1f, 0xc7, 0x41, 0x24, 0x63, 0x6b, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2021 = { .name = "ecdsa_brainpoolp512r1_sha512_2021", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2021_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2021_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2021_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2022 for ECDSA, tcId is 72 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2022_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2022_msg[] = { 0x39, 0x33, 0x39, 0x39, 0x36, 0x31, 0x31, 0x30, 0x30, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2022_sig[] = { 0x20, 0x5c, 0xae, 0xf7, 0x8b, 0x7f, 0x03, 0x00, 0x26, 0x61, 0x08, 0xdd, 0xf4, 0xe2, 0x8b, 0x6e, 0xc1, 0xa2, 0x19, 0x8b, 0x85, 0x7f, 0x92, 0xb2, 0xdf, 0x58, 0xa6, 0xd9, 0x68, 0xd3, 0xdb, 0x3e, 0xf6, 0x46, 0x9f, 0x7a, 0xfc, 0x20, 0xc6, 0x32, 0x21, 0x9a, 0xc4, 0x31, 0x39, 0xea, 0x08, 0x47, 0x6e, 0x16, 0x58, 0xad, 0x14, 0x5c, 0xe8, 0xe3, 0x97, 0x3c, 0x67, 0x4b, 0xa8, 0x17, 0x3e, 0xfc, 0x4a, 0x7a, 0x53, 0x20, 0xe5, 0xe2, 0x49, 0xc3, 0xff, 0x54, 0xcf, 0x90, 0x3b, 0xac, 0xe8, 0x6f, 0x39, 0xb6, 0x20, 0xac, 0xc1, 0x90, 0x07, 0x41, 0x3c, 0xd1, 0x3a, 0x2d, 0xf0, 0xa1, 0xf5, 0x98, 0x4e, 0x7a, 0x4d, 0x18, 0xcd, 0x8d, 0x12, 0x97, 0x56, 0x02, 0x95, 0xd4, 0x18, 0x3a, 0xf1, 0x85, 0x7b, 0xd8, 0xe6, 0xe3, 0x38, 0xaa, 0x37, 0x99, 0xca, 0x15, 0x50, 0x63, 0x5e, 0x4a, 0xe0, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2022 = { .name = "ecdsa_brainpoolp512r1_sha512_2022", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2022_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2022_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2022_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2023 for ECDSA, tcId is 73 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2023_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2023_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x34, 0x39, 0x31, 0x31, 0x38, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2023_sig[] = { 0x89, 0xf6, 0xe2, 0xf3, 0x42, 0xb4, 0xbc, 0x2f, 0x00, 0x4f, 0xdc, 0x1d, 0x0e, 0x24, 0xa7, 0xd1, 0xd4, 0xcb, 0x6b, 0x00, 0x32, 0xb8, 0xfa, 0x2f, 0x50, 0xe3, 0xf9, 0x0f, 0x38, 0x80, 0x91, 0x8f, 0x31, 0xaa, 0xfd, 0x50, 0x22, 0xff, 0x74, 0xbb, 0xe1, 0xcc, 0x64, 0xfe, 0xba, 0xbb, 0x3b, 0xf3, 0x3a, 0x8e, 0x71, 0x4f, 0x59, 0x7d, 0xdb, 0x0b, 0xe8, 0x06, 0x7d, 0x8a, 0x09, 0x64, 0xdf, 0xe1, 0x3a, 0xd6, 0x7d, 0xd5, 0x53, 0x64, 0xc2, 0x9d, 0x4a, 0x5b, 0x44, 0x6c, 0x64, 0x6f, 0x30, 0xbc, 0x5e, 0x64, 0x8a, 0x88, 0x9a, 0xc7, 0xb1, 0xbe, 0xe4, 0x9b, 0x71, 0x91, 0x8c, 0x32, 0x55, 0x4d, 0x0d, 0x95, 0xd5, 0xa5, 0x7e, 0xf5, 0xe7, 0xf4, 0xb2, 0x67, 0x04, 0x2f, 0xa3, 0x02, 0x5f, 0x13, 0x23, 0xbd, 0x7d, 0xbd, 0x1d, 0x60, 0xc4, 0x4e, 0x32, 0x5d, 0x4f, 0x78, 0xc6, 0x5a, 0x4a, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2023 = { .name = "ecdsa_brainpoolp512r1_sha512_2023", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2023_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2023_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2023_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2024 for ECDSA, tcId is 74 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2024_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2024_msg[] = { 0x33, 0x32, 0x33, 0x36, 0x36, 0x37, 0x38, 0x35, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2024_sig[] = { 0x2f, 0x30, 0x52, 0x55, 0x0c, 0x59, 0x5e, 0xd8, 0x92, 0x0a, 0x79, 0x94, 0xb4, 0xad, 0xb7, 0x8b, 0x8f, 0x75, 0x02, 0xfc, 0x06, 0x6a, 0xc4, 0x7a, 0xb4, 0xff, 0xbe, 0x01, 0x0d, 0x4a, 0x5e, 0x3e, 0x54, 0x54, 0x52, 0x79, 0xa7, 0x47, 0xd2, 0x9c, 0x61, 0xc7, 0xd2, 0x85, 0x6b, 0x8e, 0x47, 0xd0, 0x04, 0x0e, 0x07, 0x13, 0xbd, 0xe5, 0x0e, 0x42, 0xe0, 0x38, 0xdf, 0xd5, 0xaf, 0x61, 0xe8, 0x91, 0x54, 0xf8, 0xc5, 0x88, 0x93, 0xf1, 0x9f, 0xbc, 0xf0, 0x10, 0xd2, 0x27, 0x01, 0x7b, 0x88, 0xa4, 0x9c, 0xb6, 0xfd, 0x1e, 0xe6, 0xab, 0x88, 0x3d, 0x21, 0xcb, 0x58, 0xfc, 0x08, 0x69, 0xc3, 0x7e, 0xd7, 0x3c, 0x73, 0x12, 0xc6, 0x7f, 0x5a, 0xc1, 0x9b, 0xf5, 0xbf, 0x0a, 0xbe, 0x4b, 0xc8, 0x36, 0xee, 0x35, 0xb2, 0xa2, 0xc8, 0x05, 0xc3, 0x95, 0x3c, 0x48, 0xe7, 0x9a, 0xb8, 0x66, 0x5a, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2024 = { .name = "ecdsa_brainpoolp512r1_sha512_2024", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2024_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2024_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2024_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2025 for ECDSA, tcId is 75 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2025_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2025_msg[] = { 0x31, 0x34, 0x34, 0x38, 0x39, 0x39, 0x37, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2025_sig[] = { 0x8e, 0x36, 0x69, 0x55, 0xff, 0xb2, 0xa7, 0xfb, 0xc8, 0x36, 0x44, 0x14, 0x92, 0xf7, 0x4c, 0xae, 0x45, 0x52, 0xfb, 0x0d, 0x24, 0x96, 0xcf, 0xe7, 0xd8, 0xc4, 0x4b, 0x94, 0x20, 0x29, 0x09, 0x47, 0xe2, 0x9b, 0xf8, 0xa8, 0x82, 0x65, 0xe2, 0xc6, 0xcf, 0xc3, 0x7d, 0x29, 0xd2, 0xbb, 0xbd, 0x3d, 0x10, 0x51, 0x3e, 0x08, 0x95, 0xe7, 0x35, 0x51, 0xe2, 0xd7, 0xfa, 0x80, 0xd0, 0x69, 0x71, 0x06, 0x63, 0x11, 0x52, 0x81, 0x52, 0xbc, 0xf6, 0x12, 0x17, 0x33, 0x86, 0x7b, 0x61, 0xfc, 0x52, 0x3e, 0x7f, 0x01, 0xbd, 0x15, 0x00, 0x99, 0x84, 0xea, 0x30, 0xb1, 0x7e, 0xc1, 0x5b, 0x82, 0x40, 0xc1, 0x3f, 0x1a, 0xd1, 0x37, 0xdf, 0x37, 0xde, 0x4a, 0x32, 0xf6, 0xe3, 0xb9, 0x3b, 0xc1, 0x90, 0x95, 0x9d, 0xe1, 0x7a, 0x1b, 0xa3, 0xfe, 0x71, 0xb0, 0x3e, 0x97, 0x54, 0x1c, 0x90, 0xa8, 0x49, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2025 = { .name = "ecdsa_brainpoolp512r1_sha512_2025", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2025_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2025_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2025_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2026 for ECDSA, tcId is 76 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2026_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2026_msg[] = { 0x35, 0x37, 0x31, 0x34, 0x36, 0x33, 0x32, 0x38, 0x30, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2026_sig[] = { 0x38, 0xa4, 0x9f, 0x5f, 0x88, 0xf9, 0x9e, 0x64, 0x07, 0x4f, 0x02, 0x81, 0xec, 0xfa, 0xb9, 0xb8, 0xbf, 0x02, 0x09, 0x2d, 0xbc, 0x11, 0xb8, 0x70, 0x41, 0xbf, 0xb5, 0x61, 0xb4, 0xb3, 0xcf, 0x29, 0x94, 0x5a, 0xb5, 0xd9, 0xdc, 0x45, 0xf1, 0xed, 0xf4, 0x16, 0x06, 0xef, 0x6d, 0x22, 0x04, 0xba, 0xdb, 0x67, 0x61, 0x15, 0x84, 0xb8, 0x92, 0x99, 0x3d, 0xe2, 0x7e, 0x8f, 0x64, 0x02, 0xcd, 0x9a, 0x97, 0xe2, 0xda, 0x75, 0x8a, 0x8e, 0x37, 0x7a, 0x7d, 0x68, 0x2f, 0x50, 0xb0, 0xe3, 0x0f, 0x69, 0x5a, 0x6f, 0x6c, 0x53, 0xe6, 0x71, 0x42, 0x43, 0xaa, 0x9d, 0x53, 0x3b, 0x4a, 0x9b, 0x98, 0x77, 0xd5, 0xd5, 0x0a, 0xf3, 0xe7, 0xa4, 0xf1, 0xfe, 0x60, 0x77, 0xc7, 0xea, 0x70, 0x4b, 0x91, 0x8c, 0x59, 0x95, 0x00, 0xaf, 0xb8, 0x4d, 0x0b, 0xa0, 0x16, 0x82, 0x8a, 0xa2, 0xe6, 0xfd, 0x13, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2026 = { .name = "ecdsa_brainpoolp512r1_sha512_2026", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2026_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2026_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2026_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2027 for ECDSA, tcId is 77 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2027_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2027_msg[] = { 0x32, 0x32, 0x36, 0x34, 0x38, 0x37, 0x34, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2027_sig[] = { 0x6d, 0xe2, 0x9d, 0x0b, 0x50, 0x95, 0x0a, 0x64, 0x09, 0xd2, 0x9d, 0x25, 0x83, 0xe6, 0xc2, 0xd7, 0x73, 0x89, 0x74, 0x0e, 0xd0, 0xbe, 0x4e, 0xbb, 0xd4, 0x57, 0x1e, 0x82, 0xb5, 0x30, 0x3c, 0xa2, 0x70, 0x87, 0xce, 0x13, 0x27, 0x83, 0x2e, 0x99, 0x91, 0xcb, 0xf7, 0x33, 0x08, 0xa1, 0xba, 0xed, 0xf9, 0x7d, 0x1f, 0x3a, 0xf9, 0xed, 0xf3, 0x5e, 0x27, 0xc1, 0x5a, 0x0c, 0xc0, 0x03, 0xd6, 0xaa, 0x9a, 0x19, 0xf3, 0x3f, 0xf3, 0xa8, 0x8e, 0xd3, 0x03, 0xff, 0xf9, 0x05, 0x35, 0xaa, 0x16, 0x05, 0xbb, 0xdc, 0x00, 0x6b, 0x80, 0x3a, 0x80, 0x4e, 0xb1, 0xdf, 0x09, 0x2b, 0x5a, 0xeb, 0x9d, 0xb1, 0xbe, 0x0c, 0xb9, 0xb6, 0x76, 0x69, 0x45, 0x03, 0xe3, 0x6d, 0x2c, 0xd3, 0x86, 0x8d, 0xb0, 0xc3, 0x48, 0x96, 0xc9, 0x4c, 0xdd, 0xab, 0xd5, 0x4e, 0xc9, 0x5f, 0xfe, 0xb6, 0x98, 0x8a, 0x7f, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2027 = { .name = "ecdsa_brainpoolp512r1_sha512_2027", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2027_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2027_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2027_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2028 for ECDSA, tcId is 78 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2028_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2028_msg[] = { 0x35, 0x33, 0x35, 0x33, 0x34, 0x34, 0x39, 0x34, 0x37, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2028_sig[] = { 0x17, 0x0f, 0x01, 0xe9, 0x2b, 0x69, 0xcb, 0xf0, 0xd3, 0xd9, 0xe4, 0xa5, 0x74, 0x01, 0x63, 0xd7, 0xeb, 0xaf, 0xa7, 0xbb, 0x8d, 0x38, 0x35, 0x03, 0x9f, 0x14, 0x0d, 0x07, 0x5e, 0x95, 0x0d, 0xd5, 0x7d, 0xfd, 0xf1, 0xb7, 0xb8, 0xd1, 0x67, 0x85, 0x48, 0x44, 0x64, 0x10, 0x46, 0x8c, 0xf2, 0x89, 0x8e, 0x13, 0x0c, 0x74, 0x5e, 0x07, 0xdd, 0xff, 0x92, 0x1c, 0x55, 0x42, 0x19, 0x1c, 0xae, 0xfa, 0xa7, 0xb5, 0xd9, 0x28, 0xbe, 0x42, 0x79, 0x9a, 0x55, 0xb0, 0x5e, 0x15, 0x75, 0x8a, 0x1a, 0xff, 0x02, 0x77, 0x5a, 0xf9, 0xed, 0xc2, 0x14, 0x21, 0x4c, 0xa8, 0x9f, 0x73, 0xad, 0x12, 0x01, 0x7d, 0x67, 0x2e, 0x59, 0xcd, 0x6a, 0xa5, 0x4f, 0x18, 0xf2, 0x70, 0xe0, 0x1a, 0xb4, 0xdb, 0xbb, 0x2f, 0x74, 0x8c, 0x87, 0xcb, 0xc2, 0xac, 0x90, 0x81, 0xdf, 0x2e, 0x76, 0x52, 0x4d, 0xa1, 0x77, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2028 = { .name = "ecdsa_brainpoolp512r1_sha512_2028", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2028_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2028_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2028_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2029 for ECDSA, tcId is 79 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2029_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2029_msg[] = { 0x34, 0x37, 0x38, 0x37, 0x33, 0x30, 0x33, 0x38, 0x38, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2029_sig[] = { 0x8b, 0xc0, 0x89, 0xbc, 0xcd, 0xd8, 0x84, 0x3c, 0x06, 0xd5, 0xa7, 0x9e, 0x38, 0x6c, 0x51, 0x3a, 0xf5, 0x19, 0x31, 0x66, 0x0d, 0xb8, 0xb8, 0x88, 0xbc, 0xe5, 0xb5, 0xbd, 0xdb, 0xbe, 0x4c, 0x73, 0x95, 0x6a, 0x9a, 0xcb, 0xc3, 0x2e, 0x1c, 0xea, 0xa5, 0x05, 0x3f, 0xc3, 0x93, 0x08, 0xdd, 0x64, 0x51, 0xe6, 0xe4, 0x03, 0xca, 0x57, 0x43, 0x10, 0x66, 0x70, 0x93, 0xc6, 0xd7, 0x89, 0xb9, 0x80, 0x41, 0x7c, 0x96, 0x6d, 0xc3, 0x6d, 0xba, 0x5c, 0x13, 0xd9, 0x67, 0x01, 0x94, 0x6c, 0x86, 0xa0, 0x68, 0x38, 0x05, 0x69, 0x2f, 0x24, 0xc0, 0x12, 0xb1, 0xa7, 0xd5, 0x71, 0x40, 0x5e, 0xfd, 0x85, 0x0a, 0x99, 0x70, 0x65, 0xb1, 0x9d, 0x35, 0x62, 0x1b, 0xb4, 0xb3, 0x9c, 0x76, 0x49, 0x33, 0x84, 0x9f, 0xf7, 0xd8, 0xb8, 0xf7, 0xdf, 0x9f, 0xc5, 0x04, 0x8b, 0x59, 0x8e, 0xc1, 0xfa, 0xee, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2029 = { .name = "ecdsa_brainpoolp512r1_sha512_2029", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2029_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2029_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2029_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2030 for ECDSA, tcId is 80 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2030_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2030_msg[] = { 0x32, 0x32, 0x33, 0x32, 0x31, 0x39, 0x35, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2030_sig[] = { 0x8f, 0xab, 0xc9, 0x39, 0xe7, 0xa6, 0xc1, 0x3a, 0xc6, 0x9c, 0xdd, 0x47, 0xf9, 0x96, 0x24, 0x8b, 0xfe, 0xbe, 0x3f, 0x8e, 0x80, 0xde, 0xaf, 0x9c, 0x35, 0xe5, 0xa5, 0xcd, 0xca, 0x08, 0x6f, 0x9f, 0x81, 0x66, 0x1a, 0x1a, 0x41, 0xf6, 0x9e, 0x35, 0x95, 0xb0, 0x55, 0xa5, 0x14, 0xd5, 0x7e, 0xfb, 0x2e, 0xaf, 0x5c, 0x15, 0x25, 0xdc, 0xcf, 0x21, 0x73, 0x6d, 0x2b, 0xbe, 0x89, 0xa5, 0x66, 0x8c, 0xa8, 0xf9, 0xb1, 0x71, 0xb3, 0xd3, 0x38, 0x98, 0xcf, 0x7e, 0xac, 0xe3, 0x5d, 0xad, 0x6c, 0x3f, 0xdb, 0x99, 0x8f, 0xc4, 0x09, 0xfd, 0xb7, 0x08, 0x33, 0x8f, 0x20, 0xc9, 0xe4, 0xb8, 0x29, 0x7b, 0x37, 0x54, 0x85, 0xa5, 0xe8, 0x7e, 0xae, 0x6f, 0xe6, 0x8b, 0x11, 0x39, 0xb1, 0xfb, 0x4a, 0x3b, 0xfa, 0x25, 0x0f, 0x47, 0x04, 0x5f, 0x12, 0xa5, 0xfa, 0xe9, 0x45, 0xa2, 0xab, 0xe7, 0x0c, 0x50, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2030 = { .name = "ecdsa_brainpoolp512r1_sha512_2030", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2030_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2030_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2030_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2031 for ECDSA, tcId is 81 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2031_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2031_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x39, 0x33, 0x39, 0x31, 0x39, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2031_sig[] = { 0x26, 0xf4, 0x05, 0xc9, 0xcf, 0x5a, 0xfb, 0x29, 0xe3, 0xf6, 0x0d, 0xe6, 0x72, 0xe2, 0x50, 0x16, 0xd3, 0x96, 0x66, 0xf6, 0xb3, 0x4a, 0xf5, 0x4b, 0x74, 0x56, 0x2d, 0x4c, 0xa9, 0xe0, 0x3d, 0xd8, 0x7e, 0x2b, 0xf0, 0x20, 0x18, 0x9e, 0x5d, 0x2f, 0xae, 0xa5, 0xbf, 0xba, 0xe2, 0x1a, 0xde, 0xce, 0x9f, 0x21, 0x0b, 0xcb, 0x02, 0xa7, 0x55, 0x8d, 0xad, 0x1b, 0x73, 0xd7, 0x8b, 0x05, 0x32, 0xf8, 0x2b, 0x4b, 0x0c, 0x35, 0x05, 0x7b, 0x95, 0x24, 0xe8, 0x66, 0x62, 0x5e, 0x7d, 0xf8, 0x20, 0xe1, 0x5c, 0x86, 0xc2, 0xef, 0xdc, 0x1c, 0xd6, 0xc4, 0xc3, 0xcd, 0x4e, 0x6e, 0xff, 0x5d, 0x57, 0x58, 0xbd, 0x7f, 0x95, 0xb8, 0xf7, 0x7e, 0x10, 0x16, 0x3f, 0xf6, 0x5b, 0x38, 0x0e, 0xff, 0x97, 0x0c, 0xaa, 0xa7, 0xed, 0x3b, 0xd0, 0xa1, 0x21, 0xd3, 0xbb, 0xff, 0x3b, 0x6e, 0x7a, 0x26, 0x1b, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2031 = { .name = "ecdsa_brainpoolp512r1_sha512_2031", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2031_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2031_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2031_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2032 for ECDSA, tcId is 82 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2032_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2032_msg[] = { 0x31, 0x38, 0x38, 0x31, 0x30, 0x32, 0x37, 0x33, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2032_sig[] = { 0x36, 0xc5, 0xc4, 0x72, 0x0d, 0x10, 0xa4, 0x55, 0xf4, 0x95, 0x2a, 0x95, 0x87, 0x2c, 0xc6, 0x9e, 0x5c, 0x48, 0xe9, 0x68, 0x9a, 0x6e, 0xa6, 0xe3, 0xe2, 0x82, 0xc9, 0xcb, 0xa5, 0x8b, 0x01, 0xfa, 0x3c, 0xf6, 0x4c, 0x9c, 0x99, 0xa6, 0x00, 0x3d, 0x42, 0x48, 0x95, 0xb9, 0x96, 0xe2, 0x60, 0x72, 0xab, 0x6e, 0x76, 0xb2, 0x9d, 0x1c, 0xf1, 0xda, 0xbc, 0x2b, 0x27, 0x68, 0x02, 0x35, 0x8a, 0xd6, 0x81, 0xa9, 0xe6, 0xb7, 0x9f, 0x80, 0x55, 0xe2, 0xbd, 0xe4, 0x36, 0x5e, 0xac, 0x15, 0x3d, 0xf4, 0x00, 0x3d, 0x48, 0x7b, 0x58, 0x9a, 0xd3, 0x30, 0x6d, 0x4a, 0x49, 0x38, 0x7d, 0x24, 0x4a, 0xbc, 0xda, 0xa0, 0x9c, 0x1b, 0x63, 0xf0, 0x87, 0x7b, 0x15, 0x46, 0x8f, 0xe3, 0xe1, 0x4d, 0xcf, 0x4c, 0xb6, 0x34, 0x00, 0xa9, 0x9f, 0xae, 0x7d, 0xce, 0x5f, 0xe9, 0x46, 0x54, 0x8e, 0x64, 0xab, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2032 = { .name = "ecdsa_brainpoolp512r1_sha512_2032", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2032_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2032_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2032_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2033 for ECDSA, tcId is 83 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2033_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2033_msg[] = { 0x36, 0x30, 0x36, 0x31, 0x36, 0x39, 0x33, 0x39, 0x30, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2033_sig[] = { 0x6e, 0x68, 0x46, 0x11, 0x32, 0x7c, 0xfc, 0xd9, 0xd4, 0x0e, 0x52, 0x52, 0xab, 0xd3, 0xd4, 0x8f, 0xb7, 0x35, 0x88, 0x59, 0x70, 0xe9, 0xb3, 0xba, 0x3f, 0x55, 0xa1, 0x0b, 0x38, 0x78, 0x98, 0x5c, 0x54, 0x8f, 0x0c, 0x52, 0x44, 0x61, 0x96, 0x76, 0xa0, 0xe5, 0xc4, 0x4b, 0x4c, 0x9b, 0x1c, 0xcc, 0x1a, 0x20, 0xac, 0xce, 0x42, 0xe5, 0x0d, 0x4d, 0x1a, 0xee, 0xcb, 0x4a, 0xa6, 0xd8, 0x7a, 0xe5, 0x77, 0x49, 0xfd, 0x22, 0x82, 0x93, 0xae, 0x52, 0x7e, 0x3d, 0x30, 0xde, 0x8f, 0x6f, 0xae, 0x99, 0x15, 0x1e, 0x38, 0x32, 0x9a, 0x10, 0x94, 0xc9, 0x2b, 0x34, 0x72, 0x09, 0xa4, 0xf7, 0xb6, 0x94, 0x74, 0xac, 0x90, 0xf2, 0x1d, 0x56, 0xc6, 0x25, 0xf1, 0xc7, 0x6a, 0xb9, 0x1b, 0x4c, 0x3d, 0x12, 0xa2, 0xbf, 0x4b, 0xa2, 0x82, 0x6c, 0xf0, 0x0a, 0xdf, 0xba, 0x75, 0x36, 0x8e, 0xf5, 0x0c, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2033 = { .name = "ecdsa_brainpoolp512r1_sha512_2033", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2033_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2033_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2033_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2034 for ECDSA, tcId is 84 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2034_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2034_msg[] = { 0x38, 0x38, 0x39, 0x35, 0x32, 0x32, 0x37, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2034_sig[] = { 0x88, 0x7f, 0xe5, 0x33, 0x94, 0x54, 0x5f, 0x10, 0x7a, 0x27, 0x86, 0x7d, 0xf0, 0x2f, 0xbc, 0x1f, 0x59, 0x86, 0x58, 0x5a, 0x42, 0xb5, 0x21, 0x95, 0x24, 0x3a, 0x0f, 0xb7, 0xd1, 0xe7, 0x00, 0xbc, 0xab, 0xed, 0x30, 0x1c, 0xaf, 0xf3, 0xad, 0x8c, 0x2a, 0xf2, 0x34, 0x97, 0xb2, 0xac, 0x02, 0x7f, 0xc1, 0x86, 0xb8, 0xaa, 0xf4, 0xe6, 0x51, 0x2b, 0xf5, 0xbe, 0xa5, 0xa3, 0x57, 0xad, 0x83, 0xfa, 0xa9, 0x23, 0xa3, 0xb4, 0xaf, 0xe3, 0x0e, 0xae, 0x49, 0xb0, 0x18, 0x76, 0x6d, 0xa2, 0x91, 0x3c, 0x66, 0x47, 0xd7, 0x38, 0x41, 0x78, 0xf6, 0x56, 0xd4, 0x0d, 0x01, 0x0f, 0xe1, 0x14, 0x7d, 0x78, 0x6e, 0xe5, 0x09, 0x32, 0x28, 0x6c, 0x81, 0x3e, 0xa4, 0x0e, 0x5c, 0x11, 0x55, 0x5f, 0x6b, 0x8d, 0x8a, 0x6f, 0x82, 0x75, 0x14, 0x5c, 0xb9, 0x4c, 0xc0, 0x41, 0xf1, 0xcd, 0xfc, 0xdf, 0xdd, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2034 = { .name = "ecdsa_brainpoolp512r1_sha512_2034", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2034_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2034_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2034_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2035 for ECDSA, tcId is 85 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2035_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2035_msg[] = { 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, 0x34, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2035_sig[] = { 0x68, 0xd9, 0xfb, 0x18, 0x1a, 0x84, 0x50, 0xae, 0x37, 0x7d, 0xc7, 0x50, 0xf3, 0xbf, 0xbf, 0x82, 0xcb, 0xc3, 0x93, 0x47, 0xcf, 0x5d, 0x25, 0x26, 0xbc, 0xb6, 0xc3, 0xf6, 0x34, 0x3a, 0x74, 0x51, 0x06, 0x5c, 0xb4, 0xa7, 0xb2, 0xc0, 0xed, 0x3d, 0x68, 0xce, 0x32, 0x0d, 0x9a, 0x9c, 0x35, 0xc9, 0x66, 0xc0, 0x5b, 0xbf, 0x45, 0xb1, 0xac, 0xd2, 0xcf, 0xea, 0xb3, 0x3b, 0x7b, 0xbf, 0x17, 0x6d, 0x85, 0x38, 0x46, 0x9e, 0x63, 0x19, 0x60, 0xf5, 0xe1, 0x3f, 0x6a, 0x3c, 0xdb, 0xd5, 0xcf, 0x6e, 0x89, 0x3d, 0x0b, 0x15, 0x4f, 0x43, 0x03, 0x2b, 0x1b, 0xdc, 0xdb, 0xe2, 0xc5, 0xff, 0x53, 0x38, 0xcf, 0xf5, 0x22, 0x3a, 0x1f, 0x0e, 0xae, 0x7c, 0xa3, 0xed, 0x39, 0x23, 0x22, 0x19, 0xc8, 0x48, 0xfa, 0x75, 0xb0, 0xaa, 0x18, 0xe3, 0x18, 0xc0, 0x6a, 0xbe, 0x47, 0x47, 0x30, 0xe2, 0x6e, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2035 = { .name = "ecdsa_brainpoolp512r1_sha512_2035", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2035_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2035_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2035_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2036 for ECDSA, tcId is 86 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2036_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2036_msg[] = { 0x33, 0x39, 0x36, 0x35, 0x39, 0x39, 0x31, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2036_sig[] = { 0x0d, 0x0d, 0x1e, 0xb2, 0x12, 0x5e, 0xaf, 0xaa, 0xa4, 0x7d, 0x2e, 0x30, 0xe0, 0x65, 0x0b, 0xc7, 0xe5, 0xc9, 0x9f, 0x4f, 0xb5, 0xbe, 0x14, 0x73, 0x70, 0x8d, 0x19, 0xa9, 0x91, 0xf4, 0xcf, 0xd1, 0xfe, 0x31, 0x9c, 0xa7, 0x3e, 0xd1, 0xa8, 0xb5, 0x9d, 0x4c, 0x00, 0xb2, 0x2e, 0xe0, 0xcd, 0xa9, 0xbb, 0x2f, 0x00, 0xe7, 0x8f, 0x13, 0xbc, 0xbf, 0x37, 0x2e, 0xfc, 0x0a, 0x00, 0x3d, 0x2d, 0x1e, 0x87, 0x8e, 0x71, 0xc2, 0xf5, 0xd5, 0x3a, 0xc0, 0x7b, 0x2e, 0xa1, 0x34, 0x91, 0x10, 0xff, 0xac, 0x6d, 0xfd, 0xfa, 0x21, 0x52, 0xd3, 0xb9, 0xfb, 0x66, 0x2f, 0x6f, 0x9e, 0xf4, 0xe7, 0x60, 0xdf, 0xab, 0xdf, 0x81, 0xed, 0x69, 0x0e, 0x85, 0xd8, 0x0d, 0xb3, 0x21, 0x34, 0x81, 0xda, 0xbe, 0xf6, 0xda, 0xe1, 0x4b, 0x20, 0xc2, 0x5f, 0x6f, 0x56, 0xa3, 0x60, 0xec, 0x97, 0x62, 0x11, 0x4b, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2036 = { .name = "ecdsa_brainpoolp512r1_sha512_2036", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2036_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2036_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2036_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2037 for ECDSA, tcId is 87 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2037_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2037_msg[] = { 0x32, 0x32, 0x38, 0x38, 0x37, 0x33, 0x32, 0x31, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2037_sig[] = { 0x1c, 0x75, 0xcf, 0xcc, 0xa1, 0x16, 0x61, 0xbc, 0x91, 0x28, 0x9b, 0x25, 0x99, 0x0a, 0x2c, 0x83, 0x68, 0x69, 0xa2, 0xfb, 0x5b, 0xb6, 0x1a, 0x55, 0x30, 0xcf, 0x24, 0x89, 0x18, 0xdb, 0x45, 0x88, 0x32, 0x73, 0xd8, 0xd9, 0xd2, 0x4a, 0x49, 0x2d, 0xcc, 0xc4, 0x29, 0x48, 0x0e, 0xb9, 0xd8, 0x43, 0x54, 0x4d, 0xfb, 0x8b, 0xf9, 0x6e, 0xa7, 0x5f, 0x06, 0xe4, 0xca, 0xee, 0x91, 0xfc, 0x3c, 0x5e, 0x45, 0x7a, 0x98, 0xf6, 0x87, 0x0b, 0x4d, 0x13, 0x1f, 0x9f, 0x76, 0x92, 0x29, 0xcb, 0xe9, 0x3e, 0x97, 0x61, 0x43, 0x2c, 0xf4, 0xe2, 0x2a, 0xe0, 0xf4, 0xb3, 0x5c, 0x55, 0x12, 0x37, 0x70, 0x33, 0x67, 0x84, 0x06, 0x0b, 0x74, 0x7c, 0x34, 0xbc, 0xd3, 0xba, 0xd3, 0xf8, 0x97, 0x07, 0x18, 0xfa, 0x88, 0x77, 0x7b, 0x2b, 0x56, 0x5d, 0xa3, 0xf3, 0x24, 0x98, 0x28, 0x6a, 0xd0, 0x01, 0x53, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2037 = { .name = "ecdsa_brainpoolp512r1_sha512_2037", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2037_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2037_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2037_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2038 for ECDSA, tcId is 88 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2038_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2038_msg[] = { 0x32, 0x32, 0x33, 0x30, 0x38, 0x38, 0x37, 0x33, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2038_sig[] = { 0x96, 0xbc, 0x97, 0x87, 0xcc, 0x6d, 0x51, 0x2a, 0x2f, 0xda, 0x9b, 0x34, 0x98, 0xb0, 0x4b, 0x53, 0xf9, 0xc0, 0x3f, 0x40, 0x60, 0xab, 0x03, 0x82, 0xbe, 0x7c, 0xb7, 0x07, 0x78, 0x55, 0x19, 0x6e, 0x60, 0xe0, 0xd1, 0x50, 0xea, 0xaa, 0xe6, 0x09, 0x9a, 0xcb, 0x93, 0x41, 0xa1, 0x5d, 0x06, 0xc9, 0x47, 0x8a, 0xfc, 0x44, 0x50, 0x21, 0xa5, 0xef, 0x29, 0x8f, 0x14, 0x98, 0xbf, 0xfe, 0xbd, 0x9c, 0x8d, 0xb2, 0x6e, 0x51, 0xfb, 0xf0, 0xd7, 0xa5, 0xea, 0xbc, 0x67, 0xa7, 0xf7, 0xdd, 0x69, 0x8d, 0x16, 0xa9, 0x76, 0x43, 0x78, 0x4d, 0x49, 0xc7, 0xf2, 0x92, 0x48, 0x11, 0x14, 0xa0, 0x1c, 0x58, 0x1f, 0xdf, 0xc6, 0xf7, 0x79, 0xb1, 0xcb, 0xcc, 0xf5, 0xe8, 0xea, 0x59, 0x5c, 0x98, 0xb7, 0x60, 0xc3, 0xc5, 0xa1, 0x0f, 0xfe, 0x1e, 0x6e, 0x2c, 0xb1, 0x01, 0xe1, 0xa5, 0xc8, 0xa1, 0x4a, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2038 = { .name = "ecdsa_brainpoolp512r1_sha512_2038", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2038_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2038_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2038_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2039 for ECDSA, tcId is 89 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2039_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2039_msg[] = { 0x31, 0x32, 0x39, 0x30, 0x35, 0x36, 0x39, 0x33, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2039_sig[] = { 0x06, 0xe2, 0x0f, 0x46, 0x8d, 0x6f, 0xce, 0x4b, 0x55, 0x71, 0xd6, 0xe1, 0x88, 0xf1, 0x0c, 0xea, 0x05, 0x54, 0x1d, 0x82, 0xc9, 0xf8, 0x17, 0x91, 0xd7, 0xe7, 0xb2, 0x71, 0x6d, 0x92, 0xdc, 0x57, 0x49, 0x40, 0x53, 0x71, 0x2b, 0x0b, 0x01, 0xb3, 0x46, 0xe5, 0x79, 0x72, 0x43, 0x32, 0x6d, 0xb9, 0x20, 0x28, 0xe8, 0x0f, 0x1d, 0x8e, 0x03, 0x82, 0xb1, 0xe6, 0x3c, 0x4d, 0x96, 0xda, 0xa9, 0xd9, 0x21, 0x55, 0xeb, 0x23, 0x64, 0x92, 0x6f, 0xc3, 0x47, 0x97, 0x92, 0x31, 0x25, 0x50, 0x3c, 0xda, 0xda, 0x99, 0x83, 0xe6, 0x25, 0x12, 0x73, 0xe5, 0xfe, 0x1e, 0x02, 0x98, 0xe6, 0x1e, 0x26, 0x85, 0x7d, 0xc4, 0x12, 0x19, 0x0c, 0x7e, 0x67, 0x77, 0x60, 0x56, 0x95, 0x00, 0xf8, 0x5a, 0xb2, 0x66, 0x5b, 0x6e, 0x88, 0x90, 0x1b, 0xe8, 0x61, 0xcf, 0xce, 0x3f, 0xa4, 0xe2, 0xbd, 0xa5, 0x54, 0x29, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2039 = { .name = "ecdsa_brainpoolp512r1_sha512_2039", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2039_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2039_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2039_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2040 for ECDSA, tcId is 90 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2040_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2040_msg[] = { 0x32, 0x37, 0x34, 0x38, 0x36, 0x35, 0x36, 0x34, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2040_sig[] = { 0x1e, 0x24, 0x80, 0xc5, 0x6b, 0xe7, 0x2a, 0x52, 0xfe, 0x00, 0x94, 0x5f, 0xd7, 0xc2, 0xfe, 0xef, 0xdd, 0x03, 0xbd, 0x71, 0x3b, 0xc3, 0xe3, 0xd6, 0xe6, 0xd4, 0x34, 0xd5, 0xa2, 0xa7, 0xa2, 0xc8, 0xe1, 0xb4, 0x7c, 0xb1, 0x42, 0x8b, 0x96, 0xf4, 0xd8, 0x58, 0x9d, 0x6e, 0xe5, 0xfb, 0x32, 0xdd, 0x7d, 0x0a, 0x76, 0x77, 0x90, 0xf8, 0x20, 0x9b, 0x5f, 0xd3, 0x41, 0x2c, 0x0d, 0x56, 0x25, 0x79, 0x3c, 0x05, 0x00, 0xf7, 0x53, 0x1d, 0xc5, 0xf0, 0x04, 0x0f, 0x0b, 0xb0, 0xf5, 0x33, 0xbc, 0x5b, 0xf3, 0x44, 0xfd, 0x1f, 0x32, 0x5a, 0x80, 0xc4, 0x20, 0x43, 0x5f, 0x93, 0xd3, 0xca, 0x7e, 0xee, 0xb1, 0x5b, 0x1a, 0x4f, 0x43, 0x91, 0x40, 0x8f, 0x16, 0x69, 0x71, 0xc9, 0xdd, 0xb7, 0x9b, 0xfb, 0x68, 0xf2, 0x3c, 0x69, 0x97, 0xc2, 0xae, 0x40, 0xd6, 0x6c, 0xd0, 0xf4, 0xfa, 0x71, 0x12, 0x17, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2040 = { .name = "ecdsa_brainpoolp512r1_sha512_2040", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2040_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2040_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2040_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2041 for ECDSA, tcId is 91 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2041_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2041_msg[] = { 0x37, 0x35, 0x38, 0x33, 0x35, 0x30, 0x32, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2041_sig[] = { 0x77, 0x4d, 0x85, 0x2a, 0x1d, 0xf9, 0xf3, 0xb5, 0x30, 0xdb, 0x4d, 0x03, 0x45, 0xc3, 0xf7, 0xc4, 0x13, 0xc8, 0xdc, 0x4d, 0xf1, 0xc1, 0x8f, 0x42, 0x89, 0xcb, 0xdf, 0x39, 0xde, 0x2d, 0x9e, 0xb8, 0xbd, 0x90, 0xca, 0x78, 0x03, 0xc2, 0xb3, 0xfe, 0x8a, 0x8e, 0xb9, 0xd8, 0x04, 0xdf, 0xcf, 0x0d, 0x0b, 0xc7, 0x92, 0x11, 0xac, 0x19, 0x9d, 0xa1, 0xc0, 0x9a, 0xbd, 0x80, 0xb0, 0xf2, 0x20, 0xf4, 0x70, 0xfd, 0x03, 0xa6, 0xfb, 0x63, 0x58, 0x2b, 0xc6, 0x41, 0x28, 0x75, 0x8c, 0xc8, 0xbf, 0xfc, 0xf5, 0xba, 0x0b, 0xf1, 0x54, 0xed, 0x42, 0x1b, 0x37, 0xe9, 0x59, 0x87, 0xd4, 0x64, 0x7e, 0xd7, 0xa3, 0xed, 0xe5, 0x15, 0x9a, 0xc1, 0x75, 0xf7, 0x37, 0x0a, 0x2e, 0x23, 0xff, 0xf6, 0x45, 0x10, 0x5c, 0x4e, 0x0d, 0x99, 0xdd, 0xd1, 0x48, 0x6a, 0xd6, 0xac, 0x5a, 0x83, 0x29, 0x03, 0xd5, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2041 = { .name = "ecdsa_brainpoolp512r1_sha512_2041", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2041_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2041_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2041_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2042 for ECDSA, tcId is 92 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2042_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2042_msg[] = { 0x32, 0x33, 0x32, 0x37, 0x37, 0x35, 0x34, 0x32, 0x37, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2042_sig[] = { 0x2e, 0x7f, 0x63, 0xda, 0x65, 0x7a, 0x65, 0x10, 0x52, 0x87, 0xc6, 0x44, 0xcb, 0xa0, 0x7b, 0x0f, 0x98, 0x6b, 0x4b, 0x2f, 0x3a, 0x18, 0xc0, 0x80, 0x9d, 0xcf, 0x8d, 0x8a, 0xc2, 0x16, 0x94, 0x50, 0xb2, 0x06, 0x7c, 0xc5, 0xe0, 0xac, 0x3d, 0x65, 0xe1, 0xea, 0xc6, 0x7f, 0x3c, 0xea, 0x3a, 0x62, 0xc7, 0x23, 0xee, 0xe0, 0x62, 0xd3, 0x07, 0x57, 0xdc, 0xaa, 0x9e, 0x92, 0x6e, 0xbf, 0xbd, 0x00, 0x61, 0xb2, 0x62, 0xa4, 0xaa, 0x85, 0x0b, 0xa1, 0x2e, 0x31, 0x76, 0x1d, 0xcb, 0xde, 0x8c, 0xc7, 0xc9, 0xab, 0xd4, 0x88, 0x52, 0xa7, 0x34, 0xb3, 0x8b, 0x26, 0xcb, 0xb1, 0x53, 0xa8, 0x02, 0x89, 0xc4, 0x78, 0x83, 0x89, 0xb1, 0x6b, 0xaf, 0x10, 0x1f, 0x6c, 0x5d, 0xa8, 0xee, 0xc6, 0xd5, 0x84, 0xd0, 0xba, 0x88, 0x3e, 0x53, 0xb6, 0xd7, 0xd2, 0xaf, 0xe3, 0x6d, 0xb8, 0x3e, 0xa9, 0x51, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2042 = { .name = "ecdsa_brainpoolp512r1_sha512_2042", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2042_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2042_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2042_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2043 for ECDSA, tcId is 93 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2043_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2043_msg[] = { 0x37, 0x37, 0x35, 0x35, 0x30, 0x38, 0x35, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2043_sig[] = { 0x9b, 0x0b, 0xe1, 0xef, 0xf1, 0x1d, 0x16, 0xb6, 0xc4, 0x80, 0xa0, 0xe1, 0x7c, 0x5f, 0x34, 0x71, 0xea, 0xe4, 0xfc, 0xae, 0xff, 0x92, 0x48, 0x72, 0x09, 0xf0, 0xf2, 0x3c, 0x57, 0xa7, 0xdf, 0xab, 0xed, 0xe9, 0x75, 0x66, 0x98, 0xef, 0xc6, 0x25, 0xc7, 0x79, 0x35, 0x66, 0x7a, 0x51, 0x9e, 0x42, 0x06, 0x2e, 0x9d, 0x08, 0x78, 0x42, 0xc8, 0x3e, 0x08, 0xb9, 0x76, 0xd3, 0xb9, 0x6e, 0xa6, 0xdc, 0x9c, 0x9e, 0xf5, 0xe7, 0x76, 0x0a, 0x03, 0x6b, 0xc4, 0x0e, 0xc7, 0x10, 0xba, 0x88, 0xe9, 0xad, 0x6f, 0x8e, 0x06, 0x94, 0x8d, 0xfa, 0x77, 0xa2, 0x6c, 0xb8, 0xfd, 0x6c, 0x3b, 0x87, 0x11, 0x2d, 0xc0, 0xd0, 0xf6, 0xcc, 0xaf, 0xe0, 0x8f, 0xa5, 0xb6, 0x36, 0xf4, 0x29, 0xa0, 0x97, 0xaf, 0x39, 0xd5, 0x69, 0x43, 0x3c, 0x93, 0x3f, 0x90, 0x25, 0x16, 0xe8, 0x58, 0x71, 0xbe, 0xc3, 0x01, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2043 = { .name = "ecdsa_brainpoolp512r1_sha512_2043", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2043_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2043_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2043_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2044 for ECDSA, tcId is 94 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2044_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2044_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x36, 0x34, 0x38, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2044_sig[] = { 0x73, 0x96, 0xb4, 0x96, 0x96, 0x31, 0x1d, 0x10, 0xda, 0x5c, 0x85, 0xa3, 0x32, 0x4b, 0xc0, 0x7b, 0x85, 0x5a, 0xde, 0xd9, 0xf5, 0x56, 0xfc, 0xef, 0x6b, 0x3a, 0x15, 0x7c, 0xcd, 0xee, 0xce, 0xdf, 0xaf, 0xeb, 0xfe, 0xc2, 0x7e, 0x9b, 0x76, 0x4a, 0xcc, 0x84, 0xf0, 0xab, 0x13, 0x7e, 0xe3, 0x01, 0x6d, 0xba, 0x85, 0xf4, 0x56, 0x4e, 0xb9, 0xb2, 0x20, 0x64, 0x1e, 0x73, 0x67, 0x1f, 0x85, 0x09, 0x34, 0xd8, 0x5e, 0xae, 0x9b, 0xfd, 0x43, 0x89, 0x0f, 0xcd, 0x2b, 0x05, 0x11, 0xae, 0xaa, 0x75, 0x34, 0xa4, 0x70, 0xd4, 0xa6, 0x10, 0xfd, 0x59, 0x2a, 0xcd, 0x0e, 0x01, 0x78, 0x4d, 0xc6, 0xbe, 0x4a, 0xb0, 0xfa, 0xe5, 0xea, 0x6f, 0xae, 0xb6, 0xc1, 0x7a, 0x5c, 0x2a, 0x84, 0xdc, 0x75, 0xb9, 0x1a, 0x05, 0x17, 0x35, 0x94, 0xf6, 0x21, 0x2f, 0x2a, 0xa2, 0x16, 0x0f, 0x22, 0x9b, 0xd0, 0x96, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2044 = { .name = "ecdsa_brainpoolp512r1_sha512_2044", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2044_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2044_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2044_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2045 for ECDSA, tcId is 95 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2045_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2045_msg[] = { 0x32, 0x33, 0x39, 0x36, 0x37, 0x37, 0x37, 0x33, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2045_sig[] = { 0x24, 0xdc, 0x7d, 0x0a, 0xa8, 0x9c, 0xa2, 0x2d, 0xce, 0xc2, 0x02, 0x48, 0xf6, 0x70, 0x6b, 0x62, 0x09, 0x58, 0x32, 0x36, 0xdb, 0xa3, 0xbc, 0x32, 0x6f, 0x29, 0x32, 0x1c, 0x5b, 0xef, 0x77, 0xdd, 0xf4, 0x96, 0x8e, 0x27, 0xab, 0x2d, 0xbf, 0x18, 0x82, 0xde, 0x29, 0x85, 0xe4, 0x90, 0x1c, 0x03, 0xdc, 0xe5, 0x39, 0xd0, 0xdf, 0x17, 0x16, 0x09, 0x7e, 0xa2, 0x07, 0xfa, 0xe6, 0xb6, 0x11, 0x40, 0x61, 0x68, 0xc1, 0x27, 0x7b, 0x7c, 0x88, 0x17, 0x66, 0xb7, 0x67, 0x08, 0x3d, 0xe4, 0xf4, 0xdf, 0x82, 0xaf, 0x8a, 0xc4, 0x07, 0x12, 0x22, 0x95, 0xec, 0xe5, 0x8f, 0xa4, 0x9c, 0xc0, 0x51, 0x30, 0x88, 0x48, 0xdc, 0x38, 0x06, 0x75, 0x80, 0x0a, 0x4a, 0x4d, 0xfd, 0x6b, 0x81, 0x32, 0x07, 0xd8, 0xd0, 0xe4, 0x22, 0xc2, 0x32, 0xf3, 0x0b, 0xdf, 0xf7, 0xdf, 0x7d, 0x89, 0xf4, 0x27, 0xc1, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2045 = { .name = "ecdsa_brainpoolp512r1_sha512_2045", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2045_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2045_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2045_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2046 for ECDSA, tcId is 96 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2046_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2046_msg[] = { 0x35, 0x39, 0x39, 0x38, 0x31, 0x30, 0x35, 0x38, 0x30, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2046_sig[] = { 0x2d, 0x47, 0xca, 0x2c, 0x03, 0xad, 0xbf, 0xf2, 0x84, 0x03, 0x1e, 0x2c, 0x63, 0x15, 0x83, 0x63, 0x97, 0xba, 0x34, 0xb7, 0x60, 0x50, 0x57, 0x52, 0x6b, 0x15, 0x9e, 0x69, 0x75, 0xee, 0x66, 0x0e, 0xc8, 0x09, 0xea, 0x15, 0xf5, 0x52, 0x08, 0x7b, 0x2a, 0xb5, 0xbd, 0x3f, 0x71, 0x8f, 0x8f, 0x82, 0xf9, 0xe9, 0xee, 0x47, 0xf1, 0x0c, 0x7e, 0x96, 0xcb, 0x06, 0xa5, 0xa7, 0xb4, 0xb0, 0x24, 0x7a, 0x3c, 0xb1, 0xf5, 0x68, 0x1e, 0x4b, 0xa1, 0xb0, 0x5b, 0x5c, 0x9a, 0x2c, 0x03, 0xf0, 0xd6, 0xbd, 0x83, 0x9a, 0xd5, 0xbc, 0xcf, 0x4b, 0xe2, 0xea, 0x08, 0x5b, 0x6d, 0xb5, 0x51, 0x60, 0x37, 0xcc, 0x5d, 0x36, 0xfa, 0xa8, 0x3c, 0x67, 0xa1, 0x7c, 0xf7, 0x3f, 0x8f, 0x75, 0xe5, 0x0c, 0xa3, 0x3f, 0xb7, 0x59, 0x1c, 0xf2, 0x4f, 0x95, 0x08, 0xa7, 0xee, 0xd6, 0x13, 0x14, 0xa4, 0x7d, 0x9e, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2046 = { .name = "ecdsa_brainpoolp512r1_sha512_2046", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2046_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2046_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2046_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2047 for ECDSA, tcId is 97 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2047_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2047_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x37, 0x38, 0x32, 0x37, 0x30, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2047_sig[] = { 0x0a, 0xf3, 0x27, 0x3b, 0x41, 0x19, 0x62, 0x49, 0x79, 0xea, 0xb3, 0x05, 0xa0, 0xf8, 0x3e, 0x51, 0x36, 0xef, 0x6a, 0x56, 0x59, 0x7c, 0x53, 0x53, 0xd8, 0xd7, 0x67, 0x23, 0x52, 0x94, 0x03, 0x99, 0x5c, 0x45, 0xf3, 0xa2, 0x4b, 0xb1, 0x3a, 0xe8, 0x5d, 0x38, 0x72, 0xdc, 0x81, 0x1e, 0x00, 0x8e, 0xaa, 0x2c, 0x58, 0x42, 0xf4, 0x9a, 0x7c, 0x2e, 0xc6, 0x8d, 0xc7, 0xcb, 0x4f, 0x33, 0xcc, 0xc3, 0x61, 0xf5, 0xb2, 0x36, 0x33, 0x49, 0x64, 0xeb, 0x3e, 0xe2, 0xc6, 0xc6, 0xbc, 0xeb, 0x9f, 0x2f, 0x8e, 0xcf, 0x06, 0x44, 0xce, 0x9c, 0xa7, 0x23, 0xd5, 0x98, 0xe3, 0x94, 0x72, 0xe3, 0xd3, 0x9a, 0x99, 0x34, 0x81, 0xd2, 0x7c, 0x8d, 0xf5, 0xdf, 0x2b, 0x78, 0x1d, 0x6a, 0x02, 0x2a, 0xc4, 0x89, 0xa9, 0x19, 0x94, 0x75, 0x62, 0x0d, 0x4b, 0xab, 0x39, 0x0a, 0x3f, 0xcb, 0x6b, 0xf4, 0x49, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2047 = { .name = "ecdsa_brainpoolp512r1_sha512_2047", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2047_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2047_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2047_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2048 for ECDSA, tcId is 98 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2048_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2048_msg[] = { 0x32, 0x30, 0x36, 0x32, 0x31, 0x34, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2048_sig[] = { 0x9d, 0x54, 0xcc, 0xdc, 0xdd, 0xe1, 0xb7, 0xb1, 0x1f, 0xa6, 0xa7, 0x0f, 0xd7, 0x5d, 0xa9, 0xa2, 0x38, 0x7a, 0xee, 0xf9, 0x48, 0x82, 0x50, 0x6e, 0xb8, 0x98, 0xd7, 0x25, 0x6d, 0xa4, 0xd0, 0xae, 0x2e, 0xa0, 0xcf, 0x54, 0xf9, 0x66, 0xed, 0x35, 0x0c, 0xe4, 0x74, 0xc7, 0x4f, 0x00, 0xae, 0xff, 0x42, 0xcc, 0x16, 0x06, 0x4b, 0x06, 0x9b, 0x8a, 0x68, 0x82, 0x0b, 0xa5, 0x57, 0xb5, 0x34, 0xd0, 0x99, 0x12, 0xc6, 0x02, 0x99, 0x47, 0x81, 0x60, 0x6f, 0x98, 0x72, 0x13, 0xb4, 0xe1, 0xe0, 0x56, 0xf3, 0xae, 0x17, 0x93, 0x5d, 0xa0, 0x59, 0x34, 0x1b, 0xba, 0x17, 0x48, 0x4a, 0xc6, 0x2e, 0x32, 0xf2, 0xd0, 0x4b, 0x39, 0x73, 0x27, 0x5e, 0x73, 0x88, 0x76, 0xeb, 0xb1, 0x6f, 0xa1, 0x46, 0x5f, 0x8e, 0x6b, 0xd2, 0x60, 0x19, 0xd9, 0x6a, 0xaa, 0x28, 0xcc, 0xfe, 0x94, 0xab, 0x7e, 0xa9, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2048 = { .name = "ecdsa_brainpoolp512r1_sha512_2048", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2048_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2048_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2048_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2049 for ECDSA, tcId is 99 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2049_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2049_msg[] = { 0x36, 0x38, 0x34, 0x32, 0x34, 0x39, 0x36, 0x30, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2049_sig[] = { 0x7f, 0x7b, 0x14, 0xc2, 0x50, 0x2a, 0x2b, 0xbf, 0x3f, 0x7d, 0x18, 0x29, 0x01, 0x26, 0x37, 0xa1, 0xe4, 0x63, 0x11, 0xef, 0xb1, 0xb8, 0x7d, 0xb4, 0x13, 0x04, 0x31, 0x82, 0x50, 0xd0, 0xd1, 0xb2, 0x55, 0x2d, 0x24, 0x25, 0x37, 0x8d, 0xad, 0x4b, 0xfd, 0xa6, 0xef, 0x11, 0x97, 0xd7, 0xb9, 0x84, 0x63, 0x84, 0xac, 0xfd, 0xbf, 0xae, 0x03, 0x6a, 0x5f, 0x73, 0x2e, 0x94, 0x97, 0xc8, 0x58, 0x4a, 0x50, 0x69, 0x3e, 0xee, 0x71, 0xae, 0x5d, 0x70, 0x61, 0x05, 0xd8, 0x19, 0x08, 0x9a, 0xc9, 0x48, 0xb3, 0xd7, 0xb4, 0x15, 0x1b, 0x0a, 0xf5, 0x54, 0x36, 0x89, 0x98, 0x54, 0xd9, 0xcc, 0x8b, 0x75, 0x26, 0xae, 0xd8, 0x96, 0xae, 0x1f, 0x3d, 0xdd, 0xfe, 0x30, 0x19, 0x62, 0x04, 0x3f, 0x4f, 0x3b, 0xa1, 0x40, 0x86, 0x4e, 0xf8, 0xd1, 0xbb, 0x6d, 0x45, 0xd5, 0xad, 0xd1, 0x32, 0x5d, 0x84, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2049 = { .name = "ecdsa_brainpoolp512r1_sha512_2049", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2049_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2049_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2049_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2050 for ECDSA, tcId is 100 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2050_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2050_msg[] = { 0x33, 0x32, 0x36, 0x39, 0x38, 0x39, 0x37, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2050_sig[] = { 0x8c, 0x33, 0xb1, 0x62, 0x3e, 0x10, 0xe2, 0xf5, 0x1e, 0xdc, 0x0b, 0x96, 0x86, 0x2c, 0xd2, 0xea, 0xf5, 0xfa, 0xee, 0x8e, 0xa6, 0xcc, 0xc9, 0x85, 0xcc, 0xdb, 0x94, 0xbf, 0xb1, 0x41, 0xd6, 0x3d, 0xb2, 0x51, 0xfa, 0xf1, 0xe7, 0xd6, 0x9e, 0xd3, 0x90, 0xa2, 0xbe, 0xb7, 0x11, 0x85, 0xdb, 0x40, 0x29, 0xf0, 0x7f, 0x03, 0xaf, 0x4a, 0xc4, 0xaa, 0xea, 0xf4, 0x8a, 0xf0, 0x1e, 0x6f, 0x24, 0x20, 0x55, 0xb0, 0x36, 0x5b, 0x12, 0xf7, 0xd6, 0x40, 0xf7, 0x58, 0xe5, 0xaf, 0x6e, 0x2d, 0x6a, 0x41, 0xfc, 0x5c, 0x56, 0xc8, 0x05, 0x98, 0xf7, 0xbb, 0xa0, 0x99, 0x0b, 0x0d, 0x89, 0x9f, 0x22, 0xcb, 0x63, 0x4c, 0x22, 0xf6, 0x4d, 0x7a, 0x1e, 0x97, 0x08, 0x56, 0xb3, 0xb3, 0x1b, 0xb0, 0x13, 0xd3, 0x9f, 0x76, 0x1d, 0x58, 0x8b, 0xa1, 0x4a, 0x95, 0x83, 0xf8, 0x38, 0x7d, 0x91, 0xd0, 0x58, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2050 = { .name = "ecdsa_brainpoolp512r1_sha512_2050", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2050_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2050_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2050_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2051 for ECDSA, tcId is 101 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2051_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2051_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x33, 0x32, 0x34, 0x36, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2051_sig[] = { 0xa3, 0x4a, 0xc9, 0xc0, 0x77, 0x53, 0x8c, 0x21, 0xf9, 0x2a, 0xb4, 0xbf, 0x0d, 0xd4, 0x0d, 0x9f, 0xab, 0xee, 0x1f, 0x40, 0x9e, 0x81, 0xcc, 0xe7, 0x1b, 0xed, 0x23, 0xd0, 0x6b, 0xa7, 0x2e, 0xb1, 0x5b, 0x7b, 0x7a, 0x96, 0xfb, 0xe2, 0x56, 0xbd, 0x0c, 0x41, 0xa0, 0xd5, 0xe3, 0xf0, 0x74, 0x89, 0x96, 0xc1, 0x6d, 0x74, 0x27, 0x05, 0xd9, 0xa0, 0x6c, 0x54, 0x4a, 0x4e, 0x57, 0x3c, 0x35, 0x97, 0x45, 0x00, 0xed, 0x99, 0x5c, 0x26, 0x08, 0xdc, 0x62, 0xec, 0xc9, 0x20, 0xee, 0x56, 0x05, 0x90, 0x64, 0x81, 0x00, 0xe5, 0xb8, 0x9e, 0x7f, 0x10, 0x9a, 0x2c, 0x15, 0xa8, 0x51, 0x70, 0x89, 0x53, 0xe6, 0x99, 0x49, 0x9c, 0x98, 0x7c, 0x1e, 0x95, 0x23, 0xf9, 0xd8, 0x98, 0x5e, 0x60, 0x61, 0xcb, 0x9a, 0x84, 0xe5, 0x8e, 0x2c, 0x26, 0x57, 0x9b, 0xbb, 0x08, 0x4b, 0x9d, 0x5d, 0x71, 0xf3, 0xaa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2051 = { .name = "ecdsa_brainpoolp512r1_sha512_2051", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2051_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2051_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2051_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2052 for ECDSA, tcId is 102 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2052_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2052_msg[] = { 0x34, 0x31, 0x31, 0x38, 0x38, 0x38, 0x37, 0x35, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2052_sig[] = { 0x63, 0x9a, 0x6c, 0xc0, 0xc3, 0xe5, 0x0f, 0x24, 0x57, 0xf8, 0x43, 0xc4, 0x0f, 0x17, 0x14, 0x09, 0x6e, 0x61, 0x63, 0x7c, 0x78, 0xba, 0x9d, 0x84, 0x7a, 0xdf, 0x0f, 0x6b, 0x2e, 0xce, 0x78, 0xad, 0xea, 0x98, 0xdd, 0x15, 0x6a, 0x91, 0x63, 0x8e, 0xea, 0xc7, 0x43, 0x97, 0x1f, 0x5d, 0x46, 0x95, 0x06, 0xfd, 0x19, 0xe1, 0x15, 0x55, 0xfc, 0x55, 0xfe, 0xe3, 0xf8, 0x2a, 0xe7, 0xb0, 0x5b, 0x8f, 0x24, 0x27, 0xb3, 0xfa, 0x23, 0x84, 0x30, 0xe0, 0xcd, 0x79, 0x4f, 0x28, 0xb4, 0xe0, 0xf2, 0xc1, 0xd3, 0xc8, 0x3a, 0xb6, 0xfd, 0x00, 0xd4, 0x7a, 0x4c, 0x63, 0x0f, 0x5f, 0x07, 0x2f, 0x96, 0x15, 0x23, 0xcd, 0x53, 0x16, 0xb0, 0xf8, 0xe7, 0xa1, 0x38, 0x77, 0x27, 0xe3, 0x30, 0xfe, 0xf6, 0x92, 0x89, 0x0a, 0x47, 0x24, 0x95, 0xc6, 0x9c, 0xf2, 0x16, 0x72, 0x7f, 0xba, 0x37, 0x71, 0xad, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2052 = { .name = "ecdsa_brainpoolp512r1_sha512_2052", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2052_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2052_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2052_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2053 for ECDSA, tcId is 103 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2053_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2053_msg[] = { 0x39, 0x38, 0x38, 0x36, 0x30, 0x36, 0x35, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2053_sig[] = { 0x61, 0x94, 0x92, 0x20, 0xd6, 0x68, 0xcd, 0x59, 0x00, 0x9b, 0x00, 0x69, 0x60, 0x7a, 0xfa, 0xc3, 0xa3, 0xbe, 0x38, 0x66, 0xf5, 0x0b, 0x0c, 0x3b, 0xdb, 0xd9, 0x8e, 0x9e, 0xb3, 0x06, 0x08, 0x2b, 0x23, 0x13, 0x6f, 0xbe, 0x61, 0x73, 0xdc, 0xb6, 0xb8, 0xd3, 0x4e, 0x81, 0xa9, 0xe0, 0x38, 0xe8, 0xa7, 0x80, 0x71, 0x63, 0x5b, 0x7b, 0xc4, 0xc7, 0x87, 0xef, 0xb7, 0xbf, 0x8a, 0x8b, 0xa1, 0x2a, 0x84, 0x26, 0xf6, 0x8e, 0x8c, 0x7f, 0xc3, 0xe8, 0xbe, 0xa8, 0x4d, 0x7b, 0x56, 0xaa, 0x2e, 0x6b, 0xbb, 0x2b, 0x06, 0x3e, 0x32, 0x0e, 0xcd, 0x52, 0x0d, 0x36, 0x5a, 0x06, 0x6d, 0x92, 0x40, 0xf5, 0xda, 0xa5, 0x33, 0xda, 0xea, 0x28, 0xd9, 0x9c, 0xa1, 0xff, 0xae, 0x9c, 0x3b, 0x9b, 0x0e, 0x7c, 0xd2, 0x8d, 0x74, 0x21, 0xba, 0x35, 0xc3, 0x05, 0xc8, 0x91, 0x03, 0x48, 0x67, 0x76, 0x8b, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2053 = { .name = "ecdsa_brainpoolp512r1_sha512_2053", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2053_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2053_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2053_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2054 for ECDSA, tcId is 104 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2054_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2054_msg[] = { 0x32, 0x34, 0x37, 0x39, 0x31, 0x31, 0x35, 0x38, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2054_sig[] = { 0x47, 0xff, 0xc9, 0xcd, 0xf4, 0x0e, 0x55, 0x80, 0xa4, 0xa9, 0x38, 0xc3, 0x72, 0x7a, 0xcf, 0x8c, 0x37, 0xad, 0x63, 0x8b, 0x11, 0xc2, 0x35, 0xd0, 0x5e, 0x44, 0xbf, 0xb0, 0xa6, 0x80, 0xa3, 0xc6, 0xef, 0xf5, 0x79, 0x01, 0x54, 0x1b, 0xe0, 0xc6, 0x02, 0x46, 0x74, 0x9f, 0x1f, 0x00, 0x71, 0xa8, 0x59, 0x4e, 0xd6, 0xeb, 0xa4, 0x3e, 0xa1, 0xf9, 0x26, 0x68, 0xd5, 0x4d, 0x93, 0x8c, 0x98, 0xd3, 0x15, 0x21, 0xec, 0xb3, 0xeb, 0x40, 0x8c, 0x98, 0x60, 0xb8, 0x3b, 0xb7, 0x48, 0xaf, 0xe3, 0x06, 0xc3, 0x5b, 0x93, 0xee, 0x6b, 0x9e, 0x1e, 0x58, 0x4c, 0x98, 0xd7, 0x88, 0xd0, 0x4d, 0x01, 0x3d, 0xe6, 0x91, 0xca, 0xfc, 0xd0, 0xf5, 0xd7, 0x1f, 0xe3, 0xdc, 0x6c, 0x8c, 0x77, 0xed, 0x03, 0x48, 0x8d, 0x8b, 0x92, 0xab, 0x2c, 0x2e, 0x00, 0x7e, 0xe3, 0x5a, 0xd0, 0x2c, 0x4d, 0xdd, 0x05, 0x63, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2054 = { .name = "ecdsa_brainpoolp512r1_sha512_2054", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2054_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2054_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2054_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2055 for ECDSA, tcId is 105 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2055_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2055_msg[] = { 0x35, 0x30, 0x37, 0x36, 0x38, 0x38, 0x37, 0x33, 0x36, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2055_sig[] = { 0x64, 0x63, 0x8c, 0x51, 0xaf, 0x92, 0x69, 0xfb, 0x24, 0xd8, 0xe0, 0x97, 0x41, 0x02, 0xbe, 0x6e, 0x94, 0xbc, 0xea, 0xdf, 0xe9, 0xce, 0xa1, 0xa9, 0xc8, 0x9f, 0xd7, 0x78, 0x01, 0x08, 0x91, 0x84, 0x5d, 0x26, 0xe5, 0xdc, 0x7a, 0x0f, 0xe7, 0xf0, 0xa6, 0xea, 0x9e, 0xa0, 0xc1, 0xdd, 0x7c, 0x90, 0x5e, 0x8c, 0xe4, 0x3b, 0xe6, 0x48, 0x60, 0x9e, 0xaf, 0x84, 0x94, 0xf0, 0x60, 0x50, 0xb5, 0x50, 0x9f, 0xf2, 0xab, 0xd8, 0x31, 0x91, 0x59, 0xbf, 0x51, 0xc6, 0xf3, 0x30, 0x71, 0x98, 0xd3, 0xc0, 0x50, 0x0a, 0xd8, 0x67, 0x4f, 0x42, 0xa9, 0x16, 0x78, 0x31, 0x73, 0x42, 0xe8, 0x2e, 0xc0, 0x78, 0x1d, 0x43, 0x10, 0xd6, 0x18, 0x69, 0x4b, 0xd8, 0xd0, 0x74, 0x65, 0x0a, 0xe6, 0x49, 0x10, 0xa2, 0x4a, 0x03, 0x59, 0x8f, 0x00, 0x16, 0x81, 0x20, 0xe5, 0x30, 0xaa, 0x60, 0x31, 0x7a, 0xd4, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2055 = { .name = "ecdsa_brainpoolp512r1_sha512_2055", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2055_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2055_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2055_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2056 for ECDSA, tcId is 106 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2056_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2056_msg[] = { 0x39, 0x38, 0x38, 0x35, 0x30, 0x36, 0x39, 0x36, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2056_sig[] = { 0x25, 0x3d, 0x7a, 0xff, 0x81, 0x71, 0x37, 0x21, 0x96, 0xdd, 0x15, 0x2c, 0xe3, 0x53, 0x6e, 0x65, 0xff, 0x00, 0xac, 0x3f, 0xee, 0xfc, 0x32, 0xd7, 0x90, 0xb6, 0xdd, 0xc8, 0x5b, 0x0c, 0xef, 0x07, 0x4a, 0x17, 0x36, 0xbb, 0x47, 0x33, 0x31, 0xb3, 0x81, 0x4b, 0x2f, 0x69, 0xd2, 0x0e, 0x90, 0x05, 0x0e, 0xd2, 0xd3, 0xca, 0x12, 0x57, 0x35, 0x33, 0x6d, 0x15, 0xf9, 0xc0, 0x12, 0xe2, 0x89, 0xcb, 0x38, 0x50, 0x57, 0x3a, 0x85, 0x9b, 0x7f, 0x9b, 0x15, 0x3f, 0xe0, 0xd9, 0x5f, 0x48, 0xed, 0x30, 0x87, 0x7e, 0xeb, 0x34, 0xff, 0xd3, 0x0e, 0x99, 0x80, 0xf4, 0xc4, 0x2c, 0x26, 0xe9, 0x53, 0x8f, 0x7e, 0xdf, 0xe5, 0x0d, 0x52, 0xf8, 0xe4, 0x53, 0xaf, 0x03, 0xd4, 0x55, 0x4b, 0xca, 0x7a, 0xb2, 0xb3, 0xb9, 0x8d, 0x79, 0x4a, 0x31, 0x7d, 0xda, 0x12, 0x3f, 0xd3, 0x1e, 0x4e, 0xa7, 0x06, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2056 = { .name = "ecdsa_brainpoolp512r1_sha512_2056", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2056_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2056_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2056_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2057 for ECDSA, tcId is 107 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2057_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2057_msg[] = { 0x32, 0x37, 0x32, 0x31, 0x33, 0x30, 0x36, 0x31, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2057_sig[] = { 0x74, 0x82, 0xb5, 0xe6, 0xbc, 0x84, 0xf2, 0x89, 0xbe, 0x96, 0xff, 0x9c, 0x01, 0xea, 0x2d, 0xf6, 0x32, 0xcc, 0x1d, 0x23, 0xb9, 0x88, 0xf9, 0x53, 0x26, 0x41, 0x00, 0xe8, 0xa2, 0x12, 0xe7, 0x7c, 0x83, 0x6f, 0xc3, 0xf6, 0x60, 0x71, 0xd9, 0xec, 0x62, 0x54, 0x34, 0x1c, 0xec, 0xfc, 0xd8, 0xaa, 0xa9, 0x40, 0xcc, 0x0c, 0xc1, 0xe2, 0x60, 0x77, 0xf3, 0xc0, 0xa1, 0xa8, 0x55, 0xe3, 0x0c, 0x51, 0x32, 0x8e, 0x8a, 0x1f, 0xc1, 0x40, 0xc8, 0x79, 0x1b, 0x9d, 0x17, 0xe1, 0xe2, 0xdf, 0xdc, 0xeb, 0x96, 0x9a, 0x21, 0xd2, 0xb0, 0x24, 0x5b, 0x1c, 0xc2, 0x07, 0x66, 0xb6, 0xb4, 0x1a, 0x2d, 0x6c, 0xdf, 0x96, 0x09, 0xdd, 0xa1, 0xb1, 0xd2, 0xc2, 0xc6, 0xc3, 0x85, 0x98, 0x6e, 0x6c, 0x6f, 0xac, 0xbf, 0xd6, 0x8a, 0x67, 0x48, 0x60, 0xf4, 0x8f, 0xb8, 0xd1, 0x13, 0xf5, 0x77, 0xef, 0x23, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2057 = { .name = "ecdsa_brainpoolp512r1_sha512_2057", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2057_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2057_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2057_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2058 for ECDSA, tcId is 108 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2058_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2058_msg[] = { 0x33, 0x32, 0x30, 0x34, 0x31, 0x30, 0x31, 0x36, 0x35, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2058_sig[] = { 0x65, 0x99, 0x44, 0x1c, 0x0e, 0xd9, 0xe2, 0xa8, 0x2f, 0x5f, 0x09, 0xcf, 0xa9, 0x62, 0x7b, 0x25, 0xd5, 0x01, 0x95, 0x75, 0x07, 0x23, 0xac, 0x18, 0x90, 0x7e, 0xde, 0xa3, 0xb5, 0x88, 0xb7, 0x36, 0xde, 0xed, 0xcd, 0xcd, 0x0a, 0xee, 0x44, 0xdf, 0x73, 0xf5, 0xf3, 0x64, 0xe4, 0x84, 0xb9, 0x94, 0x9b, 0x7d, 0x7b, 0x69, 0x8f, 0xde, 0x04, 0x3e, 0x61, 0x02, 0xcf, 0xee, 0xd6, 0x9d, 0xb4, 0x69, 0x40, 0x04, 0x9f, 0x8d, 0xd6, 0xee, 0x0b, 0xbb, 0x4b, 0x9a, 0x29, 0xf2, 0xed, 0xed, 0x3c, 0x8b, 0xf0, 0xb1, 0x0c, 0x8b, 0xd3, 0xbe, 0x6b, 0xf5, 0xe4, 0xf9, 0x7f, 0x07, 0x4d, 0x71, 0x68, 0x65, 0xfa, 0x82, 0x4f, 0x51, 0xfa, 0x79, 0xcc, 0xfe, 0x79, 0x1d, 0x5d, 0xf6, 0xad, 0x7f, 0xee, 0x6b, 0xad, 0x96, 0xac, 0x5b, 0xff, 0x21, 0xa5, 0x02, 0xf9, 0x0a, 0xb8, 0x0e, 0x21, 0x12, 0x53, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2058 = { .name = "ecdsa_brainpoolp512r1_sha512_2058", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2058_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2058_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2058_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2059 for ECDSA, tcId is 109 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2059_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2059_msg[] = { 0x33, 0x31, 0x35, 0x30, 0x36, 0x38, 0x30, 0x39, 0x35, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2059_sig[] = { 0x74, 0xe1, 0x1c, 0x74, 0xd4, 0x13, 0x9e, 0xb9, 0xe5, 0x32, 0xe5, 0x83, 0xcf, 0x3e, 0xdd, 0x0b, 0x9e, 0x0e, 0x7b, 0x6e, 0x82, 0xa3, 0xb7, 0x9d, 0x82, 0x00, 0xe8, 0xe5, 0x81, 0xde, 0xb7, 0x1b, 0x15, 0x3b, 0x96, 0x16, 0x46, 0xa7, 0x63, 0x20, 0x33, 0x9f, 0x4c, 0x1a, 0x5f, 0x75, 0xa6, 0x38, 0xba, 0x2b, 0x0c, 0x3f, 0x06, 0x5e, 0xd8, 0x56, 0xad, 0x0a, 0x15, 0x8e, 0x32, 0x35, 0xc7, 0x0e, 0x6f, 0xf9, 0x40, 0x33, 0x9c, 0x04, 0x49, 0xd6, 0xe2, 0x40, 0x37, 0x30, 0xb5, 0x8d, 0x0d, 0xfc, 0x8d, 0xe7, 0x9b, 0xca, 0x0d, 0xf0, 0x6c, 0x5a, 0x6d, 0x43, 0x7c, 0xc2, 0xc1, 0x26, 0x6a, 0x46, 0x8a, 0x8a, 0xca, 0x2a, 0x29, 0x03, 0xc2, 0x99, 0x79, 0xd7, 0xf4, 0xd4, 0xf7, 0x87, 0x1a, 0x10, 0x6b, 0x31, 0xec, 0x48, 0x5c, 0x28, 0xca, 0xb6, 0x2e, 0xb2, 0x10, 0x01, 0x98, 0x87, 0x1b, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2059 = { .name = "ecdsa_brainpoolp512r1_sha512_2059", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2059_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2059_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2059_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2060 for ECDSA, tcId is 110 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2060_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2060_msg[] = { 0x31, 0x37, 0x32, 0x37, 0x34, 0x36, 0x30, 0x31, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2060_sig[] = { 0x55, 0x48, 0x02, 0x0c, 0x2a, 0x07, 0x64, 0x52, 0x4c, 0xa5, 0x43, 0xd0, 0x8e, 0x15, 0x26, 0xce, 0x14, 0x76, 0xba, 0x97, 0x6a, 0xf8, 0xd6, 0x15, 0x0d, 0x8d, 0x2a, 0xe4, 0x74, 0x95, 0xe5, 0xfe, 0x68, 0xcc, 0xe9, 0x84, 0x93, 0xb5, 0x03, 0x04, 0x13, 0x1d, 0xf7, 0x1c, 0x1a, 0x3d, 0x47, 0x76, 0xa7, 0x7d, 0x5c, 0xeb, 0x74, 0xe4, 0x7b, 0x2a, 0x8e, 0x65, 0x01, 0x08, 0xeb, 0xab, 0x14, 0x28, 0x62, 0x0e, 0x2d, 0xbf, 0x67, 0x21, 0x5f, 0x95, 0xfb, 0xbc, 0x92, 0xa9, 0x92, 0xf2, 0x0a, 0x4e, 0x7f, 0x30, 0x1a, 0x2c, 0x3c, 0x38, 0x80, 0xb7, 0xe8, 0x91, 0xad, 0x48, 0x46, 0x47, 0xa9, 0x7a, 0xa0, 0x0a, 0xec, 0xde, 0xfd, 0x03, 0x15, 0x52, 0x07, 0xa9, 0xe4, 0x59, 0xef, 0x74, 0x5a, 0x9d, 0x29, 0xa5, 0x4b, 0x08, 0xf4, 0x7b, 0x81, 0xca, 0xdb, 0xe4, 0xbe, 0xa4, 0x57, 0xea, 0xc6, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2060 = { .name = "ecdsa_brainpoolp512r1_sha512_2060", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2060_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2060_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2060_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2061 for ECDSA, tcId is 111 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2061_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2061_msg[] = { 0x31, 0x34, 0x35, 0x37, 0x31, 0x34, 0x36, 0x31, 0x32, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2061_sig[] = { 0x83, 0xde, 0x91, 0x22, 0xab, 0x46, 0x27, 0x22, 0x93, 0x9d, 0x85, 0x1d, 0x45, 0x6b, 0x9b, 0x02, 0x29, 0x37, 0xbe, 0x85, 0xb1, 0x5e, 0xb6, 0x5d, 0x2e, 0xc1, 0xa4, 0x84, 0x10, 0xa2, 0xf2, 0x34, 0xe9, 0x81, 0x40, 0xf2, 0x08, 0xed, 0x59, 0x5d, 0xe2, 0xfb, 0x50, 0x73, 0xb2, 0xea, 0x49, 0x4a, 0xca, 0xde, 0x8d, 0xc5, 0xa4, 0x4e, 0xd7, 0x16, 0x2c, 0xfe, 0x7a, 0x70, 0x18, 0x24, 0x79, 0xdd, 0x2e, 0x0c, 0x93, 0x8f, 0x56, 0x53, 0x38, 0x57, 0x95, 0x6e, 0x56, 0xd7, 0x9c, 0x78, 0xfd, 0x10, 0x1d, 0xde, 0xcb, 0x1a, 0x96, 0x95, 0xa5, 0x6f, 0x18, 0xf6, 0xa8, 0x9b, 0x94, 0xc0, 0xd3, 0xdb, 0x47, 0x42, 0x9a, 0xfd, 0xde, 0x6b, 0x68, 0x28, 0x32, 0xbf, 0x4c, 0x0f, 0xb8, 0x49, 0xec, 0x7f, 0xaf, 0x72, 0x9c, 0xb5, 0x9d, 0x8e, 0x21, 0x9d, 0xad, 0x70, 0xb7, 0xc8, 0xe2, 0x57, 0xff, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2061 = { .name = "ecdsa_brainpoolp512r1_sha512_2061", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2061_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2061_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2061_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2062 for ECDSA, tcId is 112 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2062_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2062_msg[] = { 0x34, 0x31, 0x37, 0x39, 0x35, 0x31, 0x36, 0x30, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2062_sig[] = { 0x8d, 0x42, 0xb3, 0xbe, 0xd0, 0x20, 0x25, 0x93, 0xad, 0x44, 0xa9, 0x3b, 0x43, 0xeb, 0xac, 0x7e, 0xe0, 0xd9, 0xec, 0x1d, 0xbc, 0x5c, 0x54, 0x66, 0x19, 0xd5, 0xa9, 0xbf, 0xb5, 0xc9, 0xce, 0xe7, 0x44, 0xa4, 0x45, 0x87, 0x3f, 0x10, 0x53, 0x9b, 0x51, 0x54, 0x5e, 0xa7, 0x87, 0x64, 0x8d, 0xbc, 0x44, 0xba, 0x2d, 0x27, 0xf9, 0x1e, 0xee, 0xc5, 0x9d, 0xe9, 0x2f, 0x2d, 0x71, 0x60, 0x15, 0x53, 0x98, 0x5a, 0xc4, 0x97, 0x2c, 0x7b, 0x12, 0x23, 0x65, 0x6d, 0xfe, 0xc7, 0x96, 0xcd, 0x33, 0x52, 0xd9, 0x1d, 0x6c, 0x83, 0xce, 0x33, 0x0e, 0x1d, 0xcb, 0x1e, 0xc9, 0x81, 0x73, 0x99, 0x34, 0x0d, 0x7c, 0xa9, 0x74, 0x57, 0xaf, 0x51, 0xc1, 0x9c, 0x6f, 0xd0, 0x78, 0x7e, 0x69, 0x65, 0xd4, 0xf8, 0x5e, 0xde, 0x5c, 0x7f, 0x50, 0x75, 0x98, 0xb8, 0xbd, 0xd5, 0xc8, 0x08, 0xdb, 0x45, 0x9e, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2062 = { .name = "ecdsa_brainpoolp512r1_sha512_2062", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2062_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2062_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2062_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2063 for ECDSA, tcId is 113 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2063_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2063_msg[] = { 0x35, 0x38, 0x39, 0x32, 0x37, 0x31, 0x33, 0x30, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2063_sig[] = { 0x5b, 0x82, 0x6d, 0x16, 0x04, 0x0e, 0x44, 0x8d, 0xfb, 0x70, 0x19, 0x5d, 0xe1, 0x6e, 0x97, 0x45, 0x4b, 0x13, 0x3a, 0xeb, 0x10, 0x51, 0x37, 0x3d, 0x51, 0x11, 0xf1, 0x08, 0x14, 0xb7, 0xf4, 0xad, 0x17, 0x14, 0xb2, 0x5c, 0x0c, 0x56, 0x61, 0xef, 0xee, 0x43, 0xfa, 0x93, 0x29, 0xa4, 0xaf, 0x09, 0x60, 0x7e, 0xb6, 0x6c, 0x72, 0xb2, 0xbe, 0x2e, 0x21, 0xbb, 0x4d, 0x02, 0x29, 0xe3, 0xa1, 0xaf, 0x07, 0xf0, 0x0f, 0x39, 0x35, 0x56, 0x6f, 0x4c, 0xa1, 0x6e, 0x34, 0x6e, 0xf5, 0xac, 0x47, 0xb2, 0x95, 0x3f, 0xc8, 0xb5, 0xcc, 0x88, 0x70, 0xae, 0x63, 0x8c, 0x55, 0xfa, 0xde, 0x1b, 0x58, 0x6b, 0x37, 0xa1, 0x19, 0x01, 0x5f, 0xd7, 0xbe, 0x3a, 0x33, 0xfd, 0x39, 0x16, 0x55, 0x64, 0xf6, 0x11, 0x74, 0x35, 0xbc, 0x1a, 0x20, 0xbf, 0xd5, 0x74, 0x06, 0x60, 0x8b, 0x3b, 0x27, 0xa9, 0x1b, 0xe3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2063 = { .name = "ecdsa_brainpoolp512r1_sha512_2063", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2063_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2063_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2063_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 113 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2064 for ECDSA, tcId is 114 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2064_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2064_msg[] = { 0x33, 0x38, 0x39, 0x36, 0x31, 0x38, 0x32, 0x32, 0x39, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2064_sig[] = { 0x8f, 0x89, 0xdb, 0x5a, 0x6d, 0x6d, 0xc6, 0xfe, 0x96, 0xec, 0x5f, 0x95, 0x96, 0x0c, 0x2f, 0x03, 0xa6, 0xa0, 0x72, 0xe6, 0x44, 0xd1, 0x58, 0x24, 0x7d, 0x5b, 0x8b, 0x66, 0xe2, 0x34, 0x68, 0x34, 0xee, 0x11, 0xe5, 0xed, 0xe6, 0xbf, 0x9e, 0x8e, 0x02, 0x34, 0xa7, 0xf7, 0x5c, 0xe8, 0x64, 0x49, 0x14, 0xc5, 0x85, 0xe0, 0x95, 0x3d, 0x37, 0x1c, 0x36, 0x3e, 0x2f, 0x21, 0xfe, 0xaa, 0x27, 0x63, 0x66, 0x01, 0xd2, 0x28, 0xf4, 0xb5, 0x3d, 0xab, 0x15, 0x46, 0xeb, 0xf7, 0x67, 0x33, 0x60, 0xdb, 0xa5, 0xdc, 0x3d, 0x59, 0xc9, 0x53, 0xbf, 0x86, 0x7c, 0x75, 0x43, 0x25, 0xc0, 0xcf, 0xde, 0x85, 0xb6, 0x45, 0x05, 0xfc, 0x99, 0x59, 0x41, 0x92, 0x9b, 0x53, 0xc5, 0x56, 0x6b, 0x42, 0xf0, 0x34, 0xba, 0x1a, 0x09, 0xed, 0x96, 0xe1, 0x13, 0x96, 0x1a, 0x1a, 0x73, 0x57, 0xa2, 0x27, 0x93, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2064 = { .name = "ecdsa_brainpoolp512r1_sha512_2064", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2064_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2064_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2064_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 114 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2065 for ECDSA, tcId is 115 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2065_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2065_msg[] = { 0x38, 0x32, 0x38, 0x33, 0x33, 0x34, 0x36, 0x37, 0x33, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2065_sig[] = { 0x7e, 0x61, 0x07, 0xbc, 0x6e, 0x5f, 0x0d, 0x09, 0x58, 0x78, 0x9e, 0x4b, 0x91, 0x20, 0x1c, 0xa1, 0x9d, 0x93, 0xc1, 0x2b, 0xc4, 0x19, 0x4c, 0x83, 0x16, 0xc2, 0x22, 0x44, 0x51, 0xf5, 0x74, 0x8b, 0xb6, 0xfb, 0x46, 0x49, 0x71, 0x06, 0xc6, 0x13, 0xb0, 0x7e, 0xfa, 0xac, 0x95, 0x4e, 0x2c, 0xcb, 0x21, 0x06, 0x20, 0x05, 0xb9, 0xef, 0x4e, 0xa7, 0x2c, 0xe4, 0x47, 0x1d, 0xaa, 0x5a, 0x3e, 0xa3, 0x7f, 0x18, 0x37, 0x82, 0x77, 0x27, 0x68, 0x5d, 0xe8, 0xc8, 0x86, 0x8d, 0x94, 0x25, 0xdb, 0x06, 0xe3, 0x3f, 0x67, 0x78, 0xb3, 0xb4, 0xd1, 0xe0, 0x8e, 0x5f, 0x73, 0xe2, 0x68, 0x04, 0xa1, 0x42, 0x72, 0x3a, 0x3d, 0x68, 0xa7, 0xd7, 0x5f, 0xdf, 0x82, 0x6e, 0x79, 0xf7, 0x91, 0xf7, 0xa6, 0xb0, 0xf8, 0x9a, 0x36, 0xe5, 0x79, 0xcd, 0xa9, 0x19, 0x6f, 0xdd, 0x9f, 0x64, 0x19, 0xf7, 0x1c, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2065 = { .name = "ecdsa_brainpoolp512r1_sha512_2065", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2065_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2065_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2065_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 115 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2066 for ECDSA, tcId is 116 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2066_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2066_msg[] = { 0x33, 0x33, 0x36, 0x36, 0x39, 0x37, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2066_sig[] = { 0x35, 0x39, 0x94, 0x4e, 0x52, 0xd0, 0xdb, 0x1f, 0xe5, 0xe9, 0xca, 0x3d, 0x4c, 0x8d, 0x93, 0x13, 0x9a, 0x2d, 0x5c, 0x85, 0xe5, 0x19, 0x60, 0xed, 0x68, 0xe8, 0xfb, 0x5f, 0x29, 0xcb, 0x10, 0x8f, 0xa1, 0x84, 0xfd, 0x66, 0x86, 0x4f, 0xed, 0x2b, 0xd9, 0x0e, 0x00, 0x17, 0x92, 0x5c, 0x5d, 0x54, 0x3d, 0x61, 0x8e, 0x28, 0x7d, 0xe4, 0x3d, 0x22, 0xf7, 0xa9, 0x4f, 0x17, 0x51, 0x4f, 0x85, 0xaa, 0x06, 0x0a, 0x37, 0xda, 0x27, 0x53, 0x92, 0x5c, 0x18, 0xba, 0x4b, 0x97, 0xc9, 0x5d, 0x16, 0xce, 0x57, 0x4c, 0xe9, 0x54, 0x2e, 0x91, 0x8b, 0x4e, 0xa2, 0xe7, 0xf3, 0x89, 0x0e, 0x72, 0x3a, 0x37, 0x5b, 0x0c, 0x7c, 0xcd, 0x49, 0x7c, 0xda, 0x6c, 0x24, 0x11, 0x15, 0x03, 0xff, 0x94, 0x8e, 0xe1, 0xb0, 0x97, 0x5b, 0x90, 0xb2, 0x1c, 0x07, 0x47, 0xf0, 0xb4, 0xbf, 0xd3, 0x54, 0xe2, 0xea, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2066 = { .name = "ecdsa_brainpoolp512r1_sha512_2066", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2066_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2066_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2066_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 116 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2067 for ECDSA, tcId is 117 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2067_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2067_msg[] = { 0x32, 0x31, 0x39, 0x39, 0x31, 0x35, 0x33, 0x32, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2067_sig[] = { 0x13, 0x39, 0xcc, 0x85, 0xb9, 0x10, 0xc8, 0x2c, 0x7d, 0x5a, 0x06, 0x04, 0x42, 0x71, 0x50, 0xe3, 0x25, 0xc4, 0x58, 0xcb, 0x2d, 0xe1, 0xcf, 0x27, 0x19, 0x45, 0x46, 0xdb, 0x13, 0xca, 0xb0, 0x56, 0xc0, 0x21, 0xf6, 0xa7, 0x8f, 0x55, 0x05, 0xe8, 0xbf, 0x68, 0x65, 0xf2, 0x9b, 0x36, 0xbf, 0x67, 0xa3, 0xc2, 0x30, 0x00, 0x61, 0x7e, 0x35, 0xf9, 0x2c, 0x87, 0x36, 0x85, 0x4c, 0x5d, 0x72, 0xa1, 0x80, 0x18, 0x93, 0x6e, 0x27, 0x84, 0x7e, 0xe6, 0x81, 0x9b, 0x10, 0x45, 0x85, 0x22, 0xd7, 0x89, 0x91, 0xcd, 0xe9, 0xd0, 0x8b, 0x5e, 0x85, 0xf2, 0xe3, 0x39, 0xba, 0xc6, 0xba, 0x9a, 0xfd, 0xba, 0x19, 0xa5, 0xc9, 0x9e, 0x21, 0x17, 0x75, 0x23, 0x45, 0xbd, 0xaa, 0x7a, 0x71, 0xbe, 0x57, 0xf0, 0x0e, 0x4a, 0x2d, 0x8d, 0xb0, 0x88, 0xf3, 0x50, 0x72, 0x18, 0x53, 0xf6, 0xea, 0x14, 0x40, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2067 = { .name = "ecdsa_brainpoolp512r1_sha512_2067", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2067_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2067_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2067_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 117 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2068 for ECDSA, tcId is 118 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2068_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2068_msg[] = { 0x35, 0x36, 0x30, 0x30, 0x33, 0x31, 0x36, 0x38, 0x32, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2068_sig[] = { 0x0b, 0x62, 0xb7, 0x68, 0x86, 0x41, 0x2a, 0x3e, 0x92, 0x18, 0x0a, 0xda, 0x31, 0xe8, 0x6c, 0x28, 0xe2, 0x88, 0x65, 0x9e, 0xe7, 0x12, 0x51, 0xb5, 0xfc, 0xab, 0x69, 0xfb, 0xe3, 0xa3, 0xea, 0x7a, 0x9e, 0xcb, 0xe5, 0x13, 0xef, 0x2f, 0x7e, 0x09, 0x00, 0x73, 0x82, 0x50, 0xd2, 0x81, 0x8d, 0x25, 0x5b, 0x83, 0x8d, 0xc0, 0x92, 0xf0, 0x45, 0xfe, 0x5f, 0x90, 0xe9, 0x9a, 0x6f, 0xc4, 0x8c, 0x20, 0x75, 0x25, 0x5d, 0xeb, 0xf5, 0x53, 0x18, 0xa2, 0x65, 0x51, 0x1e, 0x3f, 0x7b, 0xdf, 0x64, 0x7c, 0x88, 0xdb, 0xce, 0x18, 0x5a, 0xe1, 0x39, 0x05, 0x0c, 0x43, 0x71, 0x54, 0xfc, 0x4d, 0xee, 0x27, 0x86, 0xc4, 0x40, 0xb4, 0xf6, 0x75, 0x28, 0xa1, 0xa3, 0x43, 0xc8, 0xf4, 0x20, 0x57, 0xe9, 0xbd, 0x22, 0x3d, 0xf6, 0x4c, 0xe7, 0x57, 0x08, 0x1d, 0xff, 0x7f, 0x16, 0xa7, 0x84, 0xef, 0x58, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2068 = { .name = "ecdsa_brainpoolp512r1_sha512_2068", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2068_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2068_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2068_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 118 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2069 for ECDSA, tcId is 119 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2069_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2069_msg[] = { 0x38, 0x36, 0x39, 0x36, 0x35, 0x31, 0x36, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2069_sig[] = { 0x02, 0x51, 0x7c, 0xfd, 0xd2, 0x2c, 0x2b, 0xe4, 0xc6, 0x2f, 0xf7, 0x2f, 0x02, 0x42, 0xf8, 0x44, 0xcf, 0x13, 0x7f, 0x23, 0x0b, 0x41, 0xbd, 0x1b, 0x96, 0x84, 0x26, 0xd7, 0x5f, 0xd0, 0x1f, 0x2b, 0x46, 0x7a, 0x3d, 0x3d, 0xba, 0xe1, 0x56, 0xd1, 0x9e, 0xe3, 0x34, 0x98, 0x07, 0x0a, 0x67, 0x27, 0x94, 0x12, 0x99, 0x65, 0x06, 0x45, 0x14, 0x33, 0x75, 0x96, 0xd1, 0xbc, 0x66, 0x48, 0x1a, 0x1a, 0x1e, 0x40, 0x50, 0x9a, 0x67, 0x1f, 0xbf, 0x96, 0x38, 0xd1, 0xd2, 0xb2, 0x42, 0xf3, 0x04, 0x10, 0x96, 0xd6, 0xb5, 0x9d, 0x1e, 0xb7, 0x10, 0x72, 0x06, 0x86, 0x20, 0xfd, 0xf3, 0x19, 0x53, 0xb2, 0x0a, 0x4b, 0xde, 0xbf, 0xb0, 0x8d, 0x24, 0x8f, 0x0d, 0x7e, 0x34, 0xf0, 0x53, 0xe6, 0x34, 0xf4, 0x3a, 0xa4, 0x2a, 0x38, 0x63, 0xd7, 0x53, 0x14, 0x7d, 0xe7, 0x36, 0x8b, 0x28, 0xa7, 0x4d, 0x84, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2069 = { .name = "ecdsa_brainpoolp512r1_sha512_2069", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2069_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2069_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2069_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 119 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2070 for ECDSA, tcId is 120 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2070_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2070_msg[] = { 0x36, 0x35, 0x38, 0x33, 0x39, 0x32, 0x36, 0x33, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2070_sig[] = { 0x8f, 0xef, 0x6b, 0x52, 0xc4, 0xd6, 0x43, 0xfd, 0x9d, 0x5f, 0x28, 0xfd, 0x52, 0x04, 0xfc, 0x5b, 0x5b, 0x6a, 0x3e, 0x57, 0xe6, 0xdb, 0x9c, 0x8e, 0xef, 0x75, 0x14, 0x06, 0x89, 0x33, 0x37, 0x7a, 0x7f, 0x16, 0xa0, 0x69, 0xa9, 0x5b, 0xb6, 0xf6, 0x49, 0xdd, 0x33, 0x10, 0x92, 0x2a, 0x98, 0x22, 0x11, 0xf2, 0x42, 0x09, 0x3a, 0x23, 0xab, 0x44, 0xdf, 0x81, 0x0e, 0xb4, 0xd7, 0x44, 0xb0, 0x54, 0x5e, 0x38, 0x62, 0xa4, 0x2f, 0xe8, 0xa5, 0x60, 0x43, 0x2d, 0x5d, 0xe0, 0x42, 0xf9, 0x80, 0x61, 0x3e, 0x68, 0xf6, 0xb3, 0x44, 0x4d, 0x7d, 0x53, 0x52, 0x66, 0x00, 0xa5, 0x05, 0x99, 0x23, 0x71, 0xf6, 0xf7, 0x2d, 0xd1, 0xaa, 0x77, 0x5e, 0x58, 0xe2, 0x42, 0x12, 0xa0, 0xc2, 0x64, 0x39, 0xd2, 0xeb, 0x71, 0x73, 0x40, 0xfd, 0x53, 0x6d, 0x38, 0xf9, 0x14, 0x8d, 0x21, 0x36, 0x85, 0x0a, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2070 = { .name = "ecdsa_brainpoolp512r1_sha512_2070", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2070_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2070_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2070_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 120 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2071 for ECDSA, tcId is 121 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2071_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2071_msg[] = { 0x31, 0x33, 0x32, 0x30, 0x35, 0x30, 0x31, 0x35, 0x37, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2071_sig[] = { 0x14, 0xbe, 0x63, 0x6d, 0x9a, 0xa0, 0xaa, 0xcb, 0x84, 0xf1, 0xd7, 0xd0, 0xb8, 0x83, 0x72, 0xc0, 0x32, 0x26, 0x87, 0x76, 0x7d, 0x45, 0x23, 0x9d, 0x7b, 0x88, 0x37, 0xd7, 0x47, 0xd6, 0x0f, 0xc6, 0xcb, 0x0f, 0xa7, 0xe8, 0x97, 0xbb, 0xdb, 0x19, 0x19, 0x4c, 0x82, 0xde, 0xbd, 0xdb, 0x46, 0xdd, 0xd0, 0x94, 0xcb, 0x00, 0x1d, 0xdb, 0x7e, 0x02, 0x59, 0x23, 0x83, 0x5d, 0x7e, 0x0e, 0xed, 0xa4, 0x09, 0x0d, 0x62, 0x99, 0x7f, 0xb4, 0xff, 0x82, 0x89, 0x6d, 0x2e, 0x8a, 0x0a, 0xe2, 0x2c, 0xef, 0x6d, 0xac, 0xf1, 0x88, 0x9b, 0xef, 0x71, 0x80, 0x5d, 0xba, 0x0f, 0x70, 0x1d, 0x41, 0xac, 0x21, 0x98, 0x20, 0xe1, 0x5e, 0x91, 0x5e, 0x10, 0x51, 0x3d, 0x49, 0x1b, 0x6a, 0xa3, 0x08, 0xb3, 0x59, 0x06, 0xdc, 0x5d, 0x45, 0x19, 0x19, 0x28, 0xf5, 0x02, 0x56, 0x83, 0xbe, 0x8a, 0x3a, 0x9f, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2071 = { .name = "ecdsa_brainpoolp512r1_sha512_2071", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2071_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2071_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2071_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 121 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2072 for ECDSA, tcId is 122 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2072_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2072_msg[] = { 0x35, 0x30, 0x38, 0x35, 0x33, 0x33, 0x30, 0x37, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2072_sig[] = { 0x9a, 0xf9, 0x8b, 0xee, 0x99, 0x11, 0x64, 0x0f, 0xb5, 0xd5, 0x8f, 0xa0, 0x80, 0x3e, 0x53, 0x93, 0xb7, 0x72, 0xfb, 0x0c, 0x86, 0x2e, 0xe9, 0xf8, 0x54, 0x5d, 0x9d, 0xad, 0xba, 0xfb, 0x1a, 0x6c, 0x73, 0xc8, 0x5b, 0x79, 0xf3, 0x9d, 0x11, 0x85, 0xf4, 0xb2, 0xc4, 0xbb, 0x54, 0xe5, 0x13, 0x17, 0xe2, 0x63, 0x3d, 0x50, 0xfc, 0x8f, 0x75, 0x88, 0x85, 0x04, 0x26, 0x8b, 0x84, 0xf4, 0x0e, 0x24, 0x87, 0xfb, 0x7c, 0x8a, 0x2d, 0x81, 0xf7, 0x22, 0x6d, 0xeb, 0xff, 0x31, 0xb4, 0xf0, 0xa2, 0x9a, 0x08, 0xf1, 0xf9, 0xa4, 0xc5, 0x0e, 0x56, 0x15, 0xb5, 0x70, 0x55, 0x5e, 0xf2, 0xcc, 0xa1, 0xdf, 0x2b, 0x70, 0x4e, 0x92, 0xe9, 0xb8, 0xad, 0xb4, 0x41, 0x89, 0xe6, 0x95, 0x53, 0xed, 0x79, 0xef, 0xfe, 0x31, 0x5b, 0xd4, 0x01, 0xd0, 0xb2, 0x32, 0x8c, 0xb0, 0x65, 0xcf, 0x10, 0xe1, 0x30, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2072 = { .name = "ecdsa_brainpoolp512r1_sha512_2072", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2072_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2072_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2072_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 122 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2073 for ECDSA, tcId is 123 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2073_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2073_msg[] = { 0x37, 0x38, 0x36, 0x36, 0x38, 0x31, 0x33, 0x31, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2073_sig[] = { 0xa6, 0x4a, 0x9d, 0xad, 0xf5, 0xb6, 0xa5, 0x70, 0x28, 0x04, 0x4e, 0x08, 0xd7, 0x88, 0x78, 0x4e, 0x07, 0xac, 0x98, 0xdf, 0xa1, 0xed, 0x23, 0x83, 0x48, 0xe4, 0x5e, 0x95, 0xd4, 0x4f, 0x63, 0x1d, 0x9f, 0x14, 0xab, 0xb9, 0x46, 0x43, 0xf8, 0x7d, 0x1c, 0xf3, 0xf9, 0xfe, 0xc5, 0xdc, 0x27, 0x20, 0xe4, 0x29, 0x64, 0x6c, 0x0e, 0xc7, 0x15, 0x1f, 0xb8, 0x99, 0x24, 0xcd, 0x43, 0x1c, 0x30, 0x73, 0x11, 0x5f, 0x65, 0x3a, 0x3d, 0x32, 0x7d, 0x93, 0x11, 0x8c, 0xdd, 0x24, 0xff, 0xff, 0x03, 0x9d, 0xa5, 0x16, 0xaf, 0xa2, 0x7f, 0x37, 0xc7, 0x87, 0x35, 0xc9, 0x85, 0x97, 0x3c, 0xfe, 0x55, 0x27, 0x5b, 0x61, 0x0d, 0x7b, 0xe2, 0x49, 0x69, 0xeb, 0x53, 0x17, 0x21, 0xa0, 0xa4, 0x86, 0x19, 0x4b, 0x6b, 0x88, 0x23, 0xd0, 0xd7, 0x0b, 0x0d, 0xc1, 0xfd, 0x4c, 0x76, 0x11, 0xc3, 0x28, 0x61, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2073 = { .name = "ecdsa_brainpoolp512r1_sha512_2073", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2073_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2073_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2073_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 123 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2074 for ECDSA, tcId is 124 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2074_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2074_msg[] = { 0x32, 0x30, 0x38, 0x32, 0x35, 0x33, 0x39, 0x34, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2074_sig[] = { 0x95, 0xd0, 0x81, 0xc0, 0x72, 0x8f, 0xee, 0x3f, 0x5b, 0x11, 0xa5, 0x93, 0x39, 0x58, 0x69, 0xaa, 0x34, 0x2c, 0x26, 0x0d, 0xfa, 0x05, 0xe5, 0x57, 0x53, 0x17, 0x15, 0x02, 0x36, 0x48, 0x2d, 0x00, 0xee, 0x80, 0xa6, 0xf0, 0xa3, 0xa2, 0x5c, 0x0c, 0x8e, 0x3a, 0x67, 0x90, 0x01, 0x4c, 0x67, 0x47, 0xd8, 0xb5, 0xdd, 0xb0, 0x81, 0x32, 0x8b, 0xd5, 0x3e, 0x4c, 0x64, 0x22, 0xc6, 0x23, 0xd7, 0x95, 0x98, 0x33, 0x4d, 0xdc, 0x2a, 0x1e, 0xd8, 0x87, 0xb2, 0x6f, 0xa2, 0x35, 0x99, 0x01, 0x2b, 0x31, 0xfb, 0xd5, 0xfa, 0x38, 0x4d, 0xb5, 0xc0, 0x90, 0x22, 0x33, 0xc1, 0xef, 0xe6, 0x1f, 0x85, 0xfc, 0xce, 0x09, 0xa9, 0xe7, 0xfc, 0x13, 0xfb, 0x02, 0x53, 0xc8, 0xcf, 0xce, 0xb8, 0x76, 0x23, 0x60, 0xee, 0x5d, 0x20, 0xe1, 0x7d, 0xeb, 0xbe, 0x84, 0xa1, 0xc8, 0xeb, 0x68, 0xdb, 0x7f, 0xfd, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2074 = { .name = "ecdsa_brainpoolp512r1_sha512_2074", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2074_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2074_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2074_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 124 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2075 for ECDSA, tcId is 125 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2075_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2075_msg[] = { 0x31, 0x30, 0x30, 0x36, 0x35, 0x39, 0x35, 0x36, 0x36, 0x39, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2075_sig[] = { 0x9d, 0xdd, 0x4a, 0xc3, 0x92, 0xe9, 0xb8, 0x39, 0x1d, 0x76, 0x6b, 0x6f, 0x5d, 0x26, 0xf1, 0x64, 0xef, 0x6f, 0x45, 0x52, 0xd7, 0x3f, 0x1e, 0xe9, 0xd0, 0x96, 0xb7, 0x7e, 0x3d, 0xcc, 0x3a, 0x42, 0x02, 0x35, 0x73, 0x15, 0x6c, 0x59, 0x54, 0x18, 0x7e, 0xbe, 0xcb, 0x2f, 0x60, 0xed, 0x7a, 0x01, 0x43, 0x98, 0x09, 0xdd, 0x8e, 0xba, 0x28, 0x6e, 0x53, 0x40, 0xee, 0xb7, 0xe1, 0x84, 0x59, 0x3d, 0x16, 0x6a, 0x4a, 0x2b, 0x9e, 0x0c, 0xee, 0xab, 0x82, 0x78, 0x3c, 0x1a, 0x7d, 0x62, 0x2d, 0xcf, 0x7b, 0xff, 0xc6, 0x9b, 0x85, 0xae, 0x41, 0xe5, 0xad, 0x9b, 0x55, 0x2b, 0xf3, 0xb6, 0x87, 0xa2, 0x28, 0xcf, 0xf6, 0x44, 0xd5, 0x49, 0x7b, 0xa0, 0xa1, 0x64, 0x4c, 0x03, 0x91, 0x62, 0xec, 0xdf, 0xb0, 0x95, 0xd2, 0x3d, 0xda, 0x25, 0xef, 0xe1, 0x4f, 0x48, 0x03, 0x2c, 0x6d, 0x09, 0xca, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2075 = { .name = "ecdsa_brainpoolp512r1_sha512_2075", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2075_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2075_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2075_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 125 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2076 for ECDSA, tcId is 126 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2076_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2076_msg[] = { 0x33, 0x30, 0x32, 0x34, 0x31, 0x38, 0x31, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2076_sig[] = { 0x7d, 0xb0, 0xfb, 0xdd, 0xcf, 0x43, 0x7e, 0x25, 0x80, 0x4b, 0xfa, 0x6d, 0x47, 0x60, 0x07, 0xbb, 0x2e, 0x49, 0x13, 0x85, 0x27, 0xff, 0x27, 0xd7, 0x59, 0xd0, 0x5c, 0x0b, 0x1a, 0x3d, 0xad, 0xa2, 0x32, 0x7c, 0x49, 0x81, 0x32, 0x00, 0xcc, 0x24, 0xfd, 0x81, 0xf0, 0xde, 0xef, 0xb6, 0x06, 0x13, 0x14, 0xd0, 0x68, 0x29, 0x02, 0x4f, 0x44, 0x64, 0x59, 0x1f, 0x52, 0x0d, 0x5c, 0xbd, 0x9d, 0xae, 0x17, 0x53, 0xcb, 0xe7, 0xf6, 0xd1, 0x8e, 0x8f, 0xc2, 0x26, 0xa9, 0x50, 0x38, 0x5a, 0x43, 0x85, 0x8d, 0xdd, 0xdf, 0xba, 0x4b, 0x57, 0xc5, 0xc0, 0x7d, 0x58, 0x1f, 0x51, 0xcb, 0xf5, 0xc8, 0xf9, 0x37, 0x81, 0xb4, 0x8c, 0xcc, 0x88, 0x7c, 0x03, 0x9f, 0xcd, 0xec, 0xd6, 0xe6, 0x5e, 0x3e, 0x59, 0x48, 0x94, 0xc6, 0x78, 0x75, 0xed, 0x89, 0xe8, 0x6c, 0x44, 0xe5, 0x2d, 0x65, 0x6c, 0x34, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2076 = { .name = "ecdsa_brainpoolp512r1_sha512_2076", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2076_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2076_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2076_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 126 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2077 for ECDSA, tcId is 127 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2077_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2077_msg[] = { 0x37, 0x37, 0x36, 0x37, 0x38, 0x35, 0x32, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2077_sig[] = { 0x89, 0x86, 0xb0, 0xea, 0x9c, 0x57, 0xe0, 0x37, 0x96, 0x0e, 0x76, 0xd8, 0xb5, 0x39, 0xaf, 0xc7, 0x14, 0xcc, 0x3a, 0xdc, 0x90, 0x39, 0x4b, 0x96, 0xbc, 0xfa, 0x3f, 0x7f, 0xbe, 0xad, 0x4f, 0xc5, 0x85, 0x13, 0x3e, 0x4f, 0x61, 0xb7, 0xce, 0x3e, 0xdf, 0xf0, 0x93, 0xb9, 0x8c, 0x25, 0x7d, 0xbb, 0xb4, 0x97, 0xf8, 0x6d, 0xbf, 0x46, 0x7f, 0x1a, 0xed, 0x8d, 0x7a, 0x7d, 0xbf, 0xb4, 0x46, 0x32, 0x9e, 0x7d, 0x1f, 0xa0, 0x9c, 0xcb, 0x4b, 0x4d, 0x49, 0xa2, 0x46, 0x3f, 0x12, 0xa9, 0xf7, 0x60, 0xd3, 0xcc, 0x0b, 0xe3, 0x8e, 0x40, 0x9a, 0x35, 0x21, 0x72, 0x3e, 0x6f, 0x48, 0x39, 0x80, 0x01, 0x90, 0x11, 0x53, 0xe1, 0x41, 0xc1, 0x21, 0x50, 0x0c, 0x8b, 0xa6, 0x89, 0x89, 0x6e, 0x2c, 0x3c, 0x88, 0x37, 0x67, 0x37, 0x89, 0x20, 0x37, 0x5c, 0xb5, 0x2f, 0x0c, 0xbe, 0x5a, 0xe9, 0x81, 0x61, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2077 = { .name = "ecdsa_brainpoolp512r1_sha512_2077", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2077_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2077_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2077_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 127 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2078 for ECDSA, tcId is 128 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2078_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2078_msg[] = { 0x35, 0x34, 0x34, 0x31, 0x39, 0x39, 0x39, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2078_sig[] = { 0x75, 0xdf, 0xf0, 0xfc, 0x67, 0x96, 0x4d, 0x57, 0xff, 0x01, 0x3e, 0x4e, 0xb8, 0xa7, 0xd3, 0x56, 0xb9, 0xf4, 0x08, 0xbe, 0x6f, 0x5a, 0xed, 0x81, 0x85, 0x46, 0xb0, 0x64, 0x10, 0x22, 0x70, 0xa8, 0x14, 0x7f, 0x3a, 0xb7, 0x8b, 0x94, 0x32, 0x7b, 0x60, 0x23, 0x2f, 0xe0, 0x86, 0x22, 0x2f, 0x7e, 0xe7, 0xc0, 0x27, 0xc6, 0xa2, 0xf8, 0x56, 0x46, 0x79, 0x22, 0x15, 0x6c, 0xd0, 0x0c, 0x52, 0x46, 0x59, 0x72, 0x54, 0x41, 0x17, 0x56, 0x72, 0x21, 0xcd, 0x67, 0x57, 0x54, 0x28, 0xc5, 0xc6, 0x1e, 0xdf, 0xb2, 0x28, 0xb1, 0x31, 0x46, 0x49, 0x27, 0x65, 0x7e, 0x45, 0xae, 0x8e, 0x55, 0x62, 0x5c, 0x87, 0x4c, 0x46, 0x97, 0x8c, 0x7d, 0xd4, 0x81, 0xd2, 0xdb, 0x8e, 0xe9, 0xca, 0xbd, 0x1a, 0x61, 0xbc, 0x24, 0x47, 0xce, 0xd2, 0xff, 0x9a, 0x72, 0xed, 0xe1, 0x22, 0xda, 0xbc, 0x6d, 0x9c, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2078 = { .name = "ecdsa_brainpoolp512r1_sha512_2078", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2078_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2078_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2078_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 128 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2079 for ECDSA, tcId is 129 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2079_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2079_msg[] = { 0x35, 0x38, 0x34, 0x33, 0x34, 0x38, 0x30, 0x33, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2079_sig[] = { 0xa2, 0xce, 0x4a, 0x96, 0x61, 0xc7, 0x1f, 0x7e, 0xde, 0x80, 0xc1, 0x67, 0xc6, 0x75, 0x86, 0x0c, 0xf6, 0x8d, 0x7e, 0xf5, 0x40, 0x03, 0x12, 0xf2, 0xae, 0x05, 0x0c, 0x41, 0x2d, 0xdd, 0xdd, 0x88, 0x69, 0xce, 0x09, 0x3b, 0x2e, 0x11, 0xe3, 0x84, 0x95, 0x24, 0x5d, 0x04, 0x25, 0x2e, 0x44, 0x12, 0x9e, 0x99, 0x45, 0x36, 0x43, 0x52, 0x10, 0xe3, 0xb7, 0xd1, 0xeb, 0xb0, 0xc0, 0x15, 0xba, 0xc5, 0x69, 0x32, 0x85, 0x5e, 0xfe, 0xcc, 0x41, 0x21, 0x5d, 0x2c, 0xaf, 0x8b, 0xbe, 0xd6, 0xf0, 0xa2, 0xd8, 0x06, 0xd2, 0xbe, 0x34, 0x85, 0x76, 0x0d, 0xfa, 0x8c, 0x88, 0x17, 0x95, 0x81, 0x47, 0xe2, 0x6f, 0x6f, 0x6b, 0xfd, 0x91, 0xf0, 0x87, 0x4e, 0x14, 0x49, 0xc9, 0x74, 0x56, 0x53, 0x48, 0x8c, 0x06, 0x8a, 0xb8, 0x0f, 0xd9, 0x92, 0x27, 0xb5, 0xa7, 0x9c, 0x17, 0xfd, 0x26, 0x6b, 0x7b, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2079 = { .name = "ecdsa_brainpoolp512r1_sha512_2079", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2079_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2079_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2079_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 129 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2080 for ECDSA, tcId is 130 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2080_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2080_msg[] = { 0x37, 0x31, 0x38, 0x38, 0x39, 0x32, 0x36, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2080_sig[] = { 0x1b, 0x60, 0x26, 0x3f, 0x05, 0xe2, 0xe8, 0x18, 0xf6, 0x79, 0x41, 0xb1, 0xb5, 0xf5, 0xe8, 0x66, 0x8d, 0xbb, 0xa5, 0x1a, 0xaf, 0xc4, 0xdf, 0xdf, 0x9b, 0x49, 0x97, 0x9a, 0x80, 0xae, 0x0c, 0x51, 0xf2, 0xb1, 0xb2, 0x88, 0x24, 0xfd, 0x9d, 0x4b, 0x0a, 0x2d, 0x32, 0xb7, 0xe6, 0xf6, 0xe3, 0xea, 0xc5, 0x80, 0x59, 0x07, 0x52, 0xe1, 0x71, 0xbf, 0x1d, 0xed, 0x04, 0xda, 0x54, 0x17, 0xae, 0x29, 0x7a, 0xaf, 0xf6, 0x36, 0x85, 0xf5, 0x0e, 0x01, 0xfb, 0xb2, 0xd7, 0x27, 0xac, 0xa6, 0x63, 0x55, 0xc7, 0xf5, 0x24, 0xb3, 0xb0, 0xb7, 0xc5, 0x23, 0x01, 0xcb, 0x9b, 0x5a, 0xea, 0xa2, 0xb6, 0x23, 0x85, 0x42, 0x7c, 0xc6, 0xaa, 0xc1, 0x26, 0xe1, 0x65, 0x2f, 0xe0, 0xe6, 0x2c, 0xcb, 0x14, 0x79, 0xb1, 0xa4, 0x8a, 0xc7, 0xdd, 0x81, 0x73, 0xd7, 0x54, 0xd0, 0x6f, 0x50, 0x5d, 0xd4, 0x43, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2080 = { .name = "ecdsa_brainpoolp512r1_sha512_2080", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2080_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2080_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2080_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 130 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2081 for ECDSA, tcId is 131 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2081_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2081_msg[] = { 0x31, 0x37, 0x34, 0x33, 0x32, 0x32, 0x33, 0x34, 0x34, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2081_sig[] = { 0x86, 0x03, 0x9c, 0x7f, 0x13, 0x94, 0x31, 0xe6, 0x64, 0x8b, 0xeb, 0xeb, 0x5e, 0xac, 0xa3, 0xda, 0xc0, 0x7c, 0xe8, 0x07, 0xb5, 0x1c, 0x68, 0xe7, 0x59, 0x01, 0x20, 0xfa, 0xae, 0xe7, 0xfa, 0xe4, 0x28, 0x0b, 0x33, 0xb1, 0xa4, 0xdc, 0x97, 0x92, 0x01, 0x82, 0x3b, 0x31, 0xf1, 0x50, 0xef, 0x2d, 0x02, 0x85, 0xa4, 0x58, 0x86, 0x62, 0xb7, 0xc8, 0x7e, 0x50, 0x15, 0x5d, 0x40, 0x62, 0x74, 0xa7, 0x5e, 0xd7, 0xcb, 0xcb, 0x6b, 0xa0, 0x8d, 0x0a, 0x20, 0x51, 0x4f, 0x80, 0x15, 0x03, 0xca, 0x84, 0xb4, 0xa4, 0x09, 0xce, 0x8f, 0x55, 0x65, 0x16, 0x43, 0x01, 0x39, 0x99, 0xf8, 0xd3, 0xff, 0x65, 0xa9, 0xb0, 0xbf, 0x2a, 0x7c, 0x52, 0xf8, 0x4d, 0xd2, 0x94, 0x5d, 0x22, 0x67, 0x7f, 0xa4, 0x62, 0x27, 0xa6, 0x4c, 0x73, 0x59, 0x18, 0x0f, 0xbb, 0x4b, 0x15, 0x03, 0x3e, 0xe8, 0xa8, 0xab, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2081 = { .name = "ecdsa_brainpoolp512r1_sha512_2081", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2081_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2081_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2081_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 131 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2082 for ECDSA, tcId is 132 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2082_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2082_msg[] = { 0x32, 0x34, 0x30, 0x36, 0x30, 0x30, 0x35, 0x39, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2082_sig[] = { 0x70, 0x16, 0x46, 0x8a, 0x36, 0xf8, 0x55, 0xab, 0xbb, 0xb4, 0xd4, 0xd8, 0x59, 0x93, 0x7f, 0x5f, 0xae, 0x56, 0xa4, 0xda, 0x2c, 0x4d, 0x27, 0x19, 0xfa, 0x77, 0xe1, 0x11, 0xa5, 0x6c, 0xd3, 0xa2, 0x1e, 0x92, 0x67, 0x12, 0x01, 0x27, 0xdb, 0x5a, 0x67, 0xaf, 0xe2, 0xb3, 0x2c, 0x7b, 0x4c, 0x3b, 0xfe, 0x15, 0xd0, 0xad, 0x44, 0xc6, 0x0c, 0x40, 0x89, 0xa4, 0xfe, 0x4f, 0xa5, 0x3c, 0xdc, 0xa9, 0x7f, 0xcb, 0x61, 0xda, 0x56, 0x1c, 0xb7, 0xcb, 0x8a, 0xba, 0x8c, 0x07, 0xe7, 0x41, 0x74, 0x23, 0xbe, 0xd2, 0xe9, 0x97, 0x84, 0xb5, 0xf6, 0x46, 0x99, 0x00, 0x14, 0xe6, 0x87, 0x25, 0x52, 0xa0, 0x7e, 0x10, 0x34, 0xd8, 0x0e, 0x69, 0xb3, 0x19, 0xb7, 0xcd, 0x2c, 0x7b, 0x15, 0x75, 0x46, 0x32, 0x3d, 0xf4, 0xa2, 0xab, 0x84, 0x33, 0xc6, 0x23, 0xeb, 0x0c, 0x77, 0xd4, 0x15, 0x9f, 0x01, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2082 = { .name = "ecdsa_brainpoolp512r1_sha512_2082", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2082_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2082_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2082_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 132 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2083 for ECDSA, tcId is 133 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2083_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2083_msg[] = { 0x31, 0x36, 0x31, 0x34, 0x30, 0x33, 0x36, 0x39, 0x38, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2083_sig[] = { 0x43, 0xac, 0xf8, 0x4a, 0x07, 0x6d, 0x74, 0x0e, 0x99, 0x7b, 0xca, 0xa3, 0x5d, 0xec, 0x9e, 0x75, 0xdf, 0x3c, 0x0c, 0x4f, 0x25, 0xb2, 0x07, 0x5d, 0xaf, 0x07, 0x7d, 0xe6, 0x0b, 0x5b, 0x9f, 0xb7, 0xf7, 0x84, 0xa6, 0x02, 0x76, 0x99, 0xa2, 0x16, 0xa0, 0x47, 0xa2, 0x13, 0x5a, 0x3b, 0x53, 0x0f, 0xd8, 0xfa, 0x00, 0x77, 0x33, 0x8d, 0x4d, 0xc8, 0x5f, 0xbb, 0xaa, 0xce, 0xb6, 0x64, 0x10, 0x22, 0x80, 0x7a, 0x3c, 0xdf, 0xc0, 0xf3, 0x3b, 0xbe, 0x7a, 0x5a, 0x52, 0xf7, 0xe4, 0x78, 0x7c, 0x67, 0x34, 0x0d, 0x95, 0x8b, 0xaf, 0x0d, 0x95, 0x7d, 0x01, 0x5c, 0x73, 0xc9, 0xc8, 0xd0, 0xb6, 0x0f, 0x87, 0xa4, 0x26, 0xbf, 0xd2, 0xc9, 0x20, 0x9f, 0xa7, 0xf5, 0xfa, 0xb1, 0xb0, 0x5a, 0x88, 0x60, 0x85, 0x71, 0x71, 0x40, 0x07, 0x14, 0x08, 0x1b, 0x6f, 0x6e, 0x73, 0x3f, 0x38, 0x0c, 0x39, 0x63, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2083 = { .name = "ecdsa_brainpoolp512r1_sha512_2083", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2083_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2083_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2083_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 133 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2084 for ECDSA, tcId is 134 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2084_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2084_msg[] = { 0x32, 0x30, 0x39, 0x35, 0x34, 0x32, 0x35, 0x36, 0x38, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2084_sig[] = { 0x85, 0x1f, 0xa8, 0x85, 0x95, 0x49, 0x8d, 0xd5, 0xa5, 0xfb, 0x5a, 0x07, 0x10, 0xe0, 0x2f, 0xee, 0x1a, 0x02, 0x3e, 0x4b, 0x4a, 0xac, 0xfe, 0xba, 0x03, 0xf7, 0xc4, 0xc1, 0x4a, 0x8f, 0xb4, 0x33, 0x93, 0x4e, 0xa2, 0x33, 0xe5, 0xd2, 0x7d, 0xe1, 0x55, 0xda, 0xca, 0x4d, 0x4e, 0x38, 0x43, 0xf0, 0xf2, 0xcd, 0x58, 0x61, 0x70, 0x72, 0x8a, 0x2d, 0x4c, 0xe6, 0x52, 0x23, 0x58, 0x0c, 0xec, 0x66, 0x17, 0x31, 0xb6, 0xc0, 0x02, 0x00, 0xf4, 0x47, 0x4d, 0x4e, 0xa2, 0x04, 0x67, 0x75, 0xd9, 0x35, 0x0e, 0x45, 0xf2, 0xab, 0xd4, 0x5b, 0xbc, 0xc1, 0x16, 0x3c, 0x77, 0xde, 0xae, 0xaf, 0xc9, 0x42, 0x10, 0x98, 0x5b, 0x74, 0x66, 0xcf, 0x61, 0xbc, 0x78, 0xd5, 0x9b, 0xdd, 0x24, 0x39, 0xaa, 0x1c, 0x7d, 0xda, 0xc7, 0x1e, 0x00, 0x72, 0xd7, 0x3d, 0x87, 0x6a, 0x14, 0xf3, 0x26, 0x1a, 0xf7, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2084 = { .name = "ecdsa_brainpoolp512r1_sha512_2084", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2084_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2084_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2084_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 134 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2085 for ECDSA, tcId is 135 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2085_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2085_msg[] = { 0x31, 0x30, 0x30, 0x38, 0x30, 0x39, 0x38, 0x39, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2085_sig[] = { 0x78, 0x45, 0x6d, 0x35, 0x83, 0xb9, 0x3f, 0xba, 0x20, 0x9d, 0x6f, 0xaf, 0x73, 0x63, 0xf8, 0xe8, 0x78, 0x66, 0xcc, 0xe8, 0xf1, 0xa8, 0xf7, 0x56, 0x52, 0x0d, 0x5f, 0xc7, 0xd2, 0x2d, 0x36, 0x94, 0x08, 0x75, 0x33, 0x73, 0xa9, 0x99, 0xc8, 0xe5, 0xba, 0x58, 0x17, 0xc6, 0x1f, 0xf9, 0xa3, 0xa0, 0xa9, 0x80, 0x41, 0x21, 0xa0, 0x01, 0x04, 0xc7, 0xc1, 0x5d, 0xda, 0x9b, 0x60, 0xbd, 0x74, 0x4d, 0x67, 0xe1, 0x49, 0xae, 0x6a, 0x20, 0x6d, 0x3d, 0xee, 0xee, 0xaf, 0x78, 0xf9, 0x0f, 0xc5, 0xfc, 0x69, 0xc0, 0xc1, 0x01, 0x27, 0x35, 0x12, 0xad, 0x42, 0xd5, 0xfd, 0x39, 0x93, 0xba, 0xbc, 0x67, 0x1d, 0xe9, 0xc4, 0xaa, 0xc0, 0x15, 0x31, 0x0b, 0xe8, 0xeb, 0x6d, 0x83, 0x12, 0x1b, 0x97, 0x09, 0xb9, 0x3c, 0xd4, 0x37, 0x63, 0xbf, 0xba, 0x9d, 0xd8, 0x39, 0x76, 0xa9, 0x1a, 0x75, 0xf5, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2085 = { .name = "ecdsa_brainpoolp512r1_sha512_2085", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2085_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2085_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2085_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 135 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2086 for ECDSA, tcId is 136 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2086_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2086_msg[] = { 0x31, 0x35, 0x37, 0x34, 0x31, 0x34, 0x37, 0x39, 0x32, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2086_sig[] = { 0x5f, 0xfc, 0x31, 0xa2, 0xe8, 0x16, 0x87, 0x48, 0xc6, 0x29, 0xe0, 0x69, 0x01, 0x61, 0xcc, 0x62, 0x49, 0x68, 0x0c, 0x03, 0xde, 0x5c, 0xba, 0xd4, 0x4b, 0x12, 0x1a, 0xa8, 0x56, 0xf5, 0x57, 0xcf, 0x9a, 0x84, 0x98, 0x3e, 0x49, 0x3f, 0x40, 0xe2, 0xc0, 0xf5, 0x98, 0x73, 0x8b, 0x0f, 0x6e, 0xc8, 0x57, 0x5b, 0x66, 0xe4, 0xc4, 0xe5, 0x9b, 0x6b, 0x63, 0x99, 0x60, 0x58, 0xe4, 0xac, 0xa2, 0xaa, 0x41, 0xe0, 0x85, 0x7e, 0x6e, 0x95, 0x9c, 0x55, 0xbd, 0x80, 0x76, 0x29, 0x36, 0x1a, 0xc4, 0x1d, 0xde, 0x64, 0x0f, 0xea, 0xcd, 0xc2, 0x12, 0xd7, 0xcd, 0x2e, 0x1d, 0xcb, 0x9a, 0x3a, 0x9a, 0x4e, 0x93, 0x3c, 0xf8, 0xe9, 0x1f, 0xc7, 0xb1, 0x25, 0x7b, 0x7a, 0x4f, 0x96, 0x96, 0x28, 0x3e, 0x06, 0xe3, 0x2f, 0x97, 0x69, 0x87, 0xdf, 0x86, 0xda, 0x2c, 0x87, 0x97, 0x8b, 0x34, 0xcc, 0x5e, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2086 = { .name = "ecdsa_brainpoolp512r1_sha512_2086", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2086_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2086_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2086_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 136 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2087 for ECDSA, tcId is 137 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2087_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2087_msg[] = { 0x32, 0x38, 0x36, 0x36, 0x37, 0x37, 0x31, 0x35, 0x32, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2087_sig[] = { 0x31, 0x49, 0x2b, 0x08, 0x88, 0xf6, 0xff, 0xf5, 0x2d, 0x24, 0x7b, 0xee, 0x17, 0x34, 0xc8, 0x42, 0x5c, 0x35, 0x60, 0x6c, 0x9d, 0x8c, 0xc6, 0x3d, 0xf3, 0x82, 0xdc, 0xe5, 0x22, 0x4c, 0x8d, 0x55, 0xff, 0x2b, 0xa6, 0xcf, 0xa2, 0x9d, 0x09, 0x50, 0x01, 0x24, 0xe8, 0x57, 0x6a, 0xbb, 0xd0, 0xd7, 0x10, 0xba, 0xeb, 0x09, 0x9e, 0xfe, 0xf0, 0x2f, 0xe8, 0x10, 0xd4, 0xa1, 0x9d, 0xc2, 0xca, 0x44, 0x24, 0xd3, 0xb3, 0x20, 0xde, 0xf3, 0x94, 0x3a, 0xc8, 0x56, 0x68, 0x0e, 0x00, 0x89, 0x1c, 0x28, 0xda, 0x01, 0x18, 0x40, 0xaf, 0x29, 0xf4, 0xf2, 0xc8, 0x88, 0x4a, 0x02, 0x24, 0x63, 0xa1, 0xda, 0x9d, 0xbc, 0xcb, 0x11, 0xbd, 0x4b, 0x72, 0x0e, 0x72, 0xb9, 0xaf, 0xa8, 0xb6, 0xb8, 0x71, 0xa8, 0x6f, 0x12, 0xf8, 0x75, 0xcc, 0x1c, 0x09, 0x07, 0x7f, 0xcc, 0x15, 0xa9, 0x0f, 0x40, 0x2a, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2087 = { .name = "ecdsa_brainpoolp512r1_sha512_2087", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2087_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2087_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2087_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 137 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2088 for ECDSA, tcId is 138 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2088_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2088_msg[] = { 0x31, 0x36, 0x39, 0x34, 0x32, 0x38, 0x30, 0x37, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2088_sig[] = { 0x8e, 0xe3, 0xad, 0x5b, 0x61, 0xde, 0x2a, 0x1e, 0x3a, 0x10, 0xaa, 0xa2, 0xb5, 0xb7, 0xc1, 0xf9, 0xf7, 0x90, 0xeb, 0xcd, 0x11, 0x0a, 0xfd, 0xcc, 0x08, 0xac, 0x9b, 0x70, 0xfe, 0x75, 0x30, 0xfd, 0xa9, 0xce, 0x94, 0xe4, 0x40, 0x58, 0x74, 0x0e, 0x17, 0xb7, 0x30, 0x83, 0x31, 0xdd, 0xb0, 0xce, 0xb0, 0xbc, 0x69, 0xb9, 0x49, 0x44, 0x21, 0x22, 0x71, 0x35, 0x82, 0xe4, 0x94, 0x1a, 0xec, 0xd3, 0x32, 0x5d, 0xfe, 0xfb, 0x8f, 0x46, 0x2d, 0x5e, 0x7d, 0xc4, 0x12, 0x4e, 0xf0, 0x71, 0x9f, 0xef, 0x76, 0x49, 0xd4, 0x70, 0xf3, 0xf1, 0x55, 0x51, 0x72, 0x48, 0x4b, 0x03, 0x04, 0xe7, 0x5b, 0xa1, 0x22, 0x80, 0x2d, 0x1a, 0x85, 0x97, 0xb4, 0x62, 0xb3, 0x45, 0xf3, 0x4e, 0x17, 0xdf, 0x4a, 0x3c, 0x25, 0xea, 0xea, 0x26, 0x9e, 0xa1, 0x1e, 0xf5, 0xb0, 0x42, 0x44, 0x0b, 0x5c, 0xab, 0xb7, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2088 = { .name = "ecdsa_brainpoolp512r1_sha512_2088", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2088_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2088_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2088_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 138 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2089 for ECDSA, tcId is 139 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2089_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2089_msg[] = { 0x39, 0x39, 0x32, 0x31, 0x36, 0x39, 0x32, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2089_sig[] = { 0x55, 0x6b, 0x51, 0x39, 0x02, 0x29, 0x14, 0x50, 0xe9, 0xa2, 0xb1, 0x26, 0xb8, 0x58, 0xe1, 0xe2, 0xbb, 0x0a, 0x23, 0xe2, 0xee, 0x90, 0x46, 0x77, 0xd9, 0xe5, 0xea, 0xc8, 0x8a, 0x25, 0xf0, 0x14, 0x08, 0xb8, 0xf5, 0x12, 0xd9, 0x13, 0x52, 0xc4, 0x3c, 0x51, 0x9d, 0x9d, 0x74, 0x57, 0x0b, 0x3d, 0x78, 0x36, 0x6d, 0xf4, 0x37, 0xa4, 0x29, 0x8b, 0x31, 0x1a, 0x39, 0xa6, 0x3c, 0x44, 0x2a, 0xbd, 0x7b, 0x84, 0x26, 0x25, 0x87, 0x89, 0x97, 0x1c, 0x56, 0xc5, 0x3d, 0x99, 0x7d, 0xcf, 0xa1, 0x27, 0x05, 0x43, 0xbc, 0x9f, 0x7c, 0x42, 0xca, 0x2e, 0xa2, 0xfa, 0xc0, 0x88, 0x52, 0xc4, 0x72, 0xbb, 0x2b, 0x28, 0x4a, 0xab, 0x59, 0xa4, 0xba, 0xaf, 0x0f, 0x2c, 0x98, 0x6a, 0x2c, 0x68, 0xfd, 0x3e, 0x6f, 0xc9, 0x1f, 0x1d, 0x28, 0xbe, 0x9b, 0x75, 0x77, 0xf7, 0x78, 0x4c, 0x58, 0x7f, 0x37, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2089 = { .name = "ecdsa_brainpoolp512r1_sha512_2089", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2089_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2089_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2089_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 139 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2090 for ECDSA, tcId is 140 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2090_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2090_msg[] = { 0x31, 0x31, 0x36, 0x30, 0x39, 0x34, 0x33, 0x39, 0x37, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2090_sig[] = { 0x60, 0x55, 0x7b, 0x79, 0x3e, 0xfc, 0x6f, 0xd8, 0xe2, 0x2f, 0x6f, 0xb8, 0x80, 0xb9, 0xb2, 0x4f, 0x4c, 0xe9, 0x5b, 0x09, 0x0f, 0x69, 0x4f, 0xab, 0x28, 0x66, 0xbc, 0x18, 0xdd, 0x85, 0xed, 0x5f, 0x47, 0x9f, 0xa8, 0x96, 0xd8, 0x40, 0x92, 0xda, 0xdc, 0xb4, 0xb9, 0x68, 0x6a, 0xd8, 0x07, 0x4d, 0x69, 0xbe, 0x84, 0x29, 0xea, 0xad, 0x63, 0xd0, 0x3c, 0x63, 0xc6, 0x21, 0x7f, 0xd7, 0xcc, 0x71, 0x78, 0x19, 0x87, 0x9f, 0x51, 0x05, 0xf3, 0x0c, 0xe8, 0xef, 0xd8, 0x7c, 0x04, 0x42, 0x79, 0xae, 0x9e, 0xac, 0x32, 0x55, 0x32, 0x7d, 0x9a, 0x8b, 0x08, 0x3e, 0x9d, 0xcd, 0xbb, 0xda, 0x1e, 0x01, 0xec, 0xbc, 0x9e, 0xa6, 0x90, 0xbf, 0xab, 0x77, 0x1b, 0x63, 0x31, 0x8a, 0x96, 0x49, 0x42, 0xf4, 0x57, 0x78, 0x47, 0xf5, 0x71, 0xb6, 0x79, 0x36, 0x33, 0x11, 0xce, 0x1b, 0xd2, 0x0a, 0x2a, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2090 = { .name = "ecdsa_brainpoolp512r1_sha512_2090", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2090_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2090_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2090_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 140 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2091 for ECDSA, tcId is 141 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2091_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2091_msg[] = { 0x37, 0x31, 0x38, 0x36, 0x31, 0x36, 0x32, 0x31, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2091_sig[] = { 0x96, 0xa8, 0xb7, 0x36, 0xb4, 0xd1, 0xc2, 0xe4, 0x01, 0x32, 0xb0, 0xc1, 0xdc, 0x35, 0x1c, 0x70, 0x0b, 0x62, 0xdb, 0x81, 0xe8, 0xbb, 0x39, 0xaa, 0x71, 0x7a, 0x1e, 0xc0, 0x25, 0x8e, 0xb9, 0x2d, 0xa8, 0x19, 0xdf, 0x01, 0x17, 0xa7, 0x04, 0x7e, 0x6c, 0x33, 0x54, 0x9d, 0x38, 0x48, 0xd6, 0xee, 0xa3, 0xf7, 0x25, 0xaa, 0x39, 0xb0, 0x32, 0x22, 0x46, 0x3f, 0xf2, 0x46, 0xe8, 0x96, 0x64, 0x21, 0x6b, 0xb7, 0xc1, 0xe5, 0xfd, 0xe9, 0x8b, 0x5e, 0xab, 0x97, 0x61, 0x93, 0x68, 0x2c, 0xea, 0x86, 0x48, 0xdf, 0x80, 0xa6, 0x49, 0xc2, 0xad, 0x68, 0xe0, 0xb2, 0xed, 0xa5, 0xe2, 0xbe, 0xe9, 0xaa, 0x9b, 0x77, 0x3f, 0x4d, 0x62, 0x48, 0x6e, 0xdb, 0xb0, 0x9e, 0xcf, 0x43, 0x4c, 0x1a, 0xe0, 0xdb, 0xa2, 0x73, 0xf6, 0x8b, 0xfa, 0x0f, 0x98, 0x5c, 0xed, 0x5d, 0x7b, 0x01, 0x20, 0xed, 0x88, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2091 = { .name = "ecdsa_brainpoolp512r1_sha512_2091", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2091_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2091_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2091_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 141 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2092 for ECDSA, tcId is 142 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2092_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2092_msg[] = { 0x33, 0x32, 0x39, 0x34, 0x33, 0x34, 0x37, 0x31, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2092_sig[] = { 0x4d, 0x9d, 0x07, 0xd3, 0xa4, 0x5f, 0x1c, 0x91, 0x36, 0x34, 0x71, 0x3d, 0x7b, 0xa7, 0x4f, 0xfb, 0xd3, 0xcd, 0x11, 0x4a, 0xe7, 0x5f, 0x17, 0x8f, 0xe7, 0xac, 0x7d, 0xef, 0xce, 0x73, 0x14, 0x81, 0x8b, 0x61, 0x67, 0x76, 0x0c, 0xb6, 0xe7, 0xd0, 0xa2, 0x4f, 0x42, 0x7d, 0x8e, 0xee, 0x60, 0x12, 0xb5, 0x2c, 0x68, 0x38, 0x83, 0xbd, 0x97, 0xe3, 0x51, 0x40, 0x5c, 0x93, 0x7e, 0x4f, 0x6e, 0xda, 0x27, 0xbc, 0xb6, 0x29, 0xe3, 0x10, 0x66, 0xdd, 0x6a, 0x4c, 0x65, 0x43, 0x2d, 0x39, 0xc2, 0x5a, 0xdd, 0x00, 0xbf, 0xa3, 0x69, 0xd4, 0x8b, 0x0e, 0x48, 0x20, 0xa1, 0x9f, 0x08, 0x1e, 0x9e, 0xda, 0x97, 0x78, 0x75, 0x63, 0x6a, 0x8c, 0xf9, 0x84, 0x01, 0x22, 0xd5, 0xe1, 0xbb, 0x3c, 0xea, 0x5f, 0xef, 0xe0, 0x20, 0x3f, 0x60, 0x16, 0x16, 0xd6, 0xae, 0xc8, 0x20, 0xa1, 0x58, 0x05, 0x90, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2092 = { .name = "ecdsa_brainpoolp512r1_sha512_2092", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2092_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2092_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2092_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 142 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2093 for ECDSA, tcId is 143 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2093_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2093_msg[] = { 0x31, 0x38, 0x35, 0x31, 0x34, 0x34, 0x35, 0x35, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2093_sig[] = { 0x91, 0x51, 0xeb, 0x10, 0x14, 0x55, 0x7b, 0x00, 0xc8, 0xf2, 0x88, 0x92, 0xa2, 0x91, 0x1f, 0x5d, 0x67, 0xd5, 0x93, 0x96, 0xa9, 0x3d, 0xa4, 0x32, 0x7d, 0x00, 0x59, 0xfb, 0xa7, 0x67, 0xb9, 0x7d, 0xed, 0xd5, 0x2e, 0x0c, 0xc8, 0x5e, 0x0b, 0xf8, 0x98, 0x8c, 0x7e, 0xec, 0x23, 0x10, 0x08, 0xa0, 0xf9, 0x72, 0xd5, 0x11, 0x39, 0xa2, 0xfe, 0x12, 0xb7, 0x55, 0x91, 0xc0, 0x71, 0xfc, 0xe9, 0xec, 0xaa, 0x89, 0xb5, 0x92, 0xfd, 0x30, 0x93, 0x27, 0xe6, 0xc9, 0x11, 0xe2, 0xdf, 0x0d, 0x95, 0xfe, 0x99, 0xbf, 0x01, 0xde, 0x32, 0x6a, 0x9f, 0xf0, 0x66, 0x48, 0xa3, 0x21, 0xa3, 0x63, 0xa7, 0x9e, 0x7b, 0xd5, 0xb0, 0x51, 0xe0, 0x16, 0x0f, 0xef, 0x18, 0xab, 0x81, 0x40, 0x31, 0xa0, 0x76, 0x01, 0xa6, 0x78, 0x3c, 0xc4, 0xef, 0xc6, 0x8c, 0x68, 0x1d, 0x2d, 0xf6, 0x48, 0xfb, 0xc5, 0x47, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2093 = { .name = "ecdsa_brainpoolp512r1_sha512_2093", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2093_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2093_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2093_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 143 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2094 for ECDSA, tcId is 144 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2094_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2094_msg[] = { 0x34, 0x37, 0x36, 0x30, 0x34, 0x33, 0x39, 0x33, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2094_sig[] = { 0x37, 0x4e, 0x3d, 0x3b, 0xff, 0x57, 0xb2, 0xa0, 0xf9, 0x24, 0xaa, 0x19, 0xed, 0x2c, 0x8d, 0x44, 0x42, 0x9f, 0x8f, 0x8a, 0x62, 0x93, 0x4a, 0xda, 0x5c, 0x0b, 0xd8, 0x3c, 0x2c, 0xa9, 0xef, 0x25, 0x38, 0xf1, 0x86, 0xf2, 0x86, 0x36, 0x80, 0x18, 0x3c, 0x51, 0x32, 0x4e, 0xf4, 0xca, 0xc5, 0xa9, 0x45, 0xdc, 0xb9, 0x08, 0xac, 0x40, 0xf4, 0xdb, 0xcb, 0x1d, 0x20, 0x45, 0xca, 0xc6, 0x58, 0x54, 0x2b, 0xa1, 0xc3, 0x96, 0x03, 0x86, 0x17, 0x77, 0x23, 0x80, 0x9d, 0xdd, 0xab, 0x3f, 0x80, 0x6a, 0x10, 0xda, 0x5e, 0x74, 0xc6, 0x7c, 0x9c, 0x46, 0x0b, 0x6c, 0x41, 0x63, 0xf3, 0x72, 0x30, 0xc3, 0x55, 0xcd, 0x4b, 0x09, 0x8a, 0xad, 0x23, 0xda, 0x52, 0x4e, 0x1e, 0x70, 0x40, 0x36, 0x3f, 0x4d, 0x72, 0x8f, 0xaf, 0xe4, 0xd9, 0x52, 0xad, 0x5f, 0xf1, 0x37, 0x0c, 0x10, 0x10, 0xef, 0xbf, 0x09, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2094 = { .name = "ecdsa_brainpoolp512r1_sha512_2094", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2094_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2094_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2094_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 144 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2095 for ECDSA, tcId is 145 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2095_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2095_msg[] = { 0x32, 0x35, 0x36, 0x37, 0x33, 0x37, 0x38, 0x37, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2095_sig[] = { 0x60, 0xf1, 0xa5, 0xbc, 0x4a, 0x35, 0xf0, 0x01, 0x11, 0x4e, 0x5d, 0x71, 0x05, 0xc2, 0x1d, 0x6e, 0x51, 0x61, 0xad, 0xeb, 0x5d, 0x1d, 0x88, 0x25, 0x17, 0x91, 0xfd, 0x08, 0xe0, 0x19, 0x2a, 0x6f, 0xc9, 0x4e, 0xde, 0x21, 0x09, 0x28, 0x83, 0x89, 0xb3, 0xea, 0x9d, 0x00, 0x57, 0x5b, 0x66, 0xec, 0x0c, 0xee, 0x5f, 0x1e, 0x53, 0x1c, 0x05, 0xc0, 0x88, 0x54, 0x27, 0xa3, 0xbd, 0x65, 0xd6, 0x47, 0x5f, 0x62, 0xc3, 0x5c, 0xfb, 0xaa, 0x2a, 0xef, 0xde, 0xc1, 0x13, 0x33, 0x5f, 0xc5, 0xf5, 0x64, 0x6e, 0xd8, 0x58, 0xda, 0x0b, 0xe4, 0x85, 0x21, 0x77, 0x13, 0x5d, 0x7e, 0xe6, 0x2c, 0x12, 0x20, 0xce, 0x44, 0x7c, 0xb6, 0xab, 0x26, 0xcb, 0xf5, 0x43, 0x21, 0x5b, 0x2c, 0x15, 0xaf, 0x42, 0xd9, 0x5a, 0x51, 0x5b, 0x72, 0x50, 0xfb, 0x5e, 0xd7, 0x92, 0x04, 0xa5, 0x7c, 0xb0, 0x4f, 0x65, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2095 = { .name = "ecdsa_brainpoolp512r1_sha512_2095", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2095_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2095_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2095_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 145 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2096 for ECDSA, tcId is 146 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2096_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2096_msg[] = { 0x35, 0x37, 0x33, 0x39, 0x39, 0x33, 0x34, 0x39, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2096_sig[] = { 0x4b, 0xec, 0xd6, 0x57, 0xfd, 0x4c, 0x98, 0x66, 0xfb, 0xdd, 0xa4, 0xcc, 0x07, 0xc4, 0xcd, 0x52, 0x89, 0x64, 0xb1, 0x20, 0xb4, 0x13, 0x7a, 0xfe, 0x1c, 0x14, 0x27, 0x58, 0xd0, 0x48, 0x03, 0x98, 0xa1, 0xfe, 0x6e, 0x20, 0x3b, 0x56, 0x46, 0x57, 0xc9, 0x9e, 0xf0, 0x3a, 0x04, 0x4f, 0x89, 0xc4, 0xa5, 0xbc, 0xfb, 0x3c, 0xfa, 0x66, 0x59, 0x67, 0x1f, 0xcf, 0xa1, 0xd8, 0x38, 0x4b, 0x82, 0xd9, 0xa1, 0x64, 0x92, 0x56, 0xd0, 0xc4, 0x3f, 0x7f, 0x6c, 0x19, 0x26, 0x77, 0x41, 0x73, 0x89, 0x03, 0xd8, 0x29, 0x76, 0xcc, 0x3a, 0x67, 0x8b, 0x48, 0x0c, 0x50, 0xb5, 0x2a, 0xea, 0x3d, 0x49, 0x3a, 0x80, 0xc2, 0x0f, 0xfd, 0xe7, 0xb5, 0x7f, 0x92, 0x91, 0xb2, 0x2b, 0xe5, 0xb4, 0x13, 0x0d, 0xce, 0xfc, 0x82, 0xfe, 0xe7, 0x0b, 0xc3, 0xf1, 0xf3, 0x08, 0xab, 0x0a, 0x84, 0x03, 0x82, 0x8e, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2096 = { .name = "ecdsa_brainpoolp512r1_sha512_2096", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2096_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2096_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2096_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 146 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2097 for ECDSA, tcId is 147 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2097_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2097_msg[] = { 0x33, 0x34, 0x37, 0x38, 0x33, 0x36, 0x36, 0x31, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2097_sig[] = { 0x6b, 0x3f, 0x15, 0x33, 0xf5, 0x3f, 0xda, 0x74, 0x48, 0xa7, 0x10, 0xa4, 0xd0, 0xe3, 0xd8, 0x27, 0x8c, 0x96, 0xd6, 0x56, 0x63, 0x5a, 0x8e, 0xc9, 0xc8, 0x60, 0x85, 0xed, 0x23, 0x37, 0xb7, 0x33, 0x68, 0xf5, 0xc5, 0x93, 0x4a, 0x46, 0xd5, 0x9d, 0xc7, 0x9e, 0xe6, 0xc3, 0x34, 0x9f, 0xc7, 0x88, 0x74, 0xc0, 0x5f, 0x5e, 0x5e, 0xf8, 0x59, 0xea, 0xb0, 0x3d, 0xd8, 0x58, 0xd2, 0xc2, 0x8e, 0x85, 0x25, 0xcf, 0x5a, 0x2f, 0x26, 0x38, 0xeb, 0xf2, 0xe7, 0x62, 0x38, 0xbb, 0x54, 0xda, 0xb1, 0xe9, 0x6e, 0x9d, 0xe0, 0xd6, 0x7d, 0x55, 0x79, 0x15, 0x1e, 0x22, 0x56, 0xc9, 0x52, 0x7e, 0xbd, 0x4d, 0x38, 0x57, 0x73, 0x1f, 0xae, 0x84, 0xab, 0x3b, 0x56, 0xb7, 0x4b, 0xc8, 0x9c, 0x4a, 0x99, 0x63, 0x9b, 0x0c, 0x68, 0x7b, 0x2a, 0x13, 0x3b, 0xf7, 0x70, 0x29, 0xd5, 0xab, 0xe4, 0xa5, 0xfd, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2097 = { .name = "ecdsa_brainpoolp512r1_sha512_2097", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2097_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2097_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2097_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 147 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2098 for ECDSA, tcId is 148 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2098_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2098_msg[] = { 0x36, 0x34, 0x39, 0x30, 0x35, 0x32, 0x36, 0x30, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2098_sig[] = { 0x6f, 0xf4, 0xbe, 0x5d, 0xf3, 0xf1, 0x2c, 0xf2, 0xcb, 0x78, 0x16, 0x98, 0x5e, 0x9b, 0xa0, 0x09, 0x9c, 0xf5, 0x89, 0xa2, 0xa2, 0x23, 0x67, 0xab, 0xe0, 0x19, 0x32, 0x87, 0x89, 0xad, 0x50, 0x92, 0x10, 0x7d, 0x12, 0xdf, 0xed, 0x83, 0x52, 0xa1, 0xdd, 0x4a, 0xd9, 0x75, 0xe8, 0x61, 0xab, 0x9f, 0x9c, 0x64, 0xcb, 0x6b, 0x5b, 0xc9, 0x8c, 0x57, 0x86, 0x24, 0x7b, 0xdb, 0x4e, 0xa4, 0x82, 0x9d, 0x5e, 0xff, 0x29, 0xe6, 0xe2, 0x0e, 0x9e, 0xbf, 0x1a, 0xc6, 0x02, 0x58, 0x9c, 0x5b, 0xa6, 0x4b, 0x20, 0x20, 0xd1, 0xf2, 0xfe, 0xe8, 0x3e, 0x6d, 0x0c, 0x9c, 0xdd, 0xa1, 0xaf, 0x8d, 0x7c, 0x0a, 0xb8, 0xe5, 0xff, 0x05, 0x9e, 0xa4, 0x57, 0xb9, 0x03, 0xd2, 0xfd, 0xd4, 0x8f, 0xf8, 0x4a, 0x32, 0xe3, 0x38, 0xf0, 0x27, 0x05, 0x15, 0xfb, 0x0b, 0xa4, 0x4c, 0x00, 0x95, 0x24, 0xab, 0x78, 0x80, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2098 = { .name = "ecdsa_brainpoolp512r1_sha512_2098", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2098_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2098_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2098_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 148 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2099 for ECDSA, tcId is 149 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2099_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2099_msg[] = { 0x34, 0x37, 0x36, 0x33, 0x38, 0x38, 0x37, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2099_sig[] = { 0x56, 0xb9, 0x1c, 0xe3, 0x7f, 0x56, 0x0c, 0x1c, 0x65, 0x57, 0xf7, 0xfe, 0x00, 0x29, 0x75, 0x4f, 0x87, 0xc8, 0xf1, 0x0d, 0x92, 0xdc, 0x52, 0x5d, 0xfc, 0xb4, 0xcd, 0x5a, 0x96, 0x6b, 0xe0, 0xe8, 0xd9, 0x9f, 0xc0, 0x08, 0x51, 0xe8, 0x5b, 0x85, 0x82, 0x7d, 0x31, 0xc8, 0x61, 0x03, 0x4c, 0x20, 0xd2, 0xac, 0xb4, 0x9e, 0x4f, 0x1e, 0xeb, 0xd8, 0xe0, 0xd0, 0x21, 0x5d, 0x54, 0xdb, 0x2b, 0x11, 0x7c, 0xec, 0x29, 0x70, 0xfe, 0x9f, 0x29, 0x3c, 0x9d, 0x3a, 0x67, 0x2d, 0x37, 0x77, 0xff, 0x0e, 0xdf, 0x72, 0x85, 0x45, 0xbc, 0xbe, 0x00, 0x5c, 0x17, 0x8e, 0x0b, 0x40, 0x5f, 0xe4, 0x22, 0x3a, 0xab, 0x60, 0xdd, 0x44, 0x52, 0x1b, 0xe3, 0x21, 0x67, 0x2e, 0x81, 0x44, 0x58, 0x92, 0x91, 0x11, 0x30, 0xe6, 0x02, 0xa4, 0xb8, 0x35, 0x9b, 0xb3, 0x63, 0x2f, 0x90, 0x99, 0x18, 0xe0, 0x2a, 0x58, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2099 = { .name = "ecdsa_brainpoolp512r1_sha512_2099", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2099_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2099_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2099_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 149 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2100 for ECDSA, tcId is 150 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2100_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2100_msg[] = { 0x35, 0x37, 0x39, 0x30, 0x32, 0x30, 0x30, 0x38, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2100_sig[] = { 0x49, 0xcd, 0x57, 0xe2, 0x5c, 0xfb, 0x68, 0x04, 0x37, 0x05, 0x18, 0x49, 0x69, 0xe3, 0x09, 0x06, 0x69, 0x86, 0x05, 0x7d, 0x9c, 0x0b, 0x7a, 0x2f, 0x87, 0x76, 0x6a, 0xad, 0xcf, 0x76, 0xed, 0xa8, 0x02, 0x8d, 0x4e, 0xce, 0xac, 0xec, 0xed, 0x91, 0x53, 0xac, 0x97, 0x60, 0xf4, 0x75, 0x14, 0xdd, 0xdd, 0x33, 0x47, 0x3a, 0xf0, 0x9f, 0xf0, 0xdf, 0xc0, 0x00, 0xd5, 0x31, 0x30, 0xa2, 0x01, 0x0e, 0x73, 0xd5, 0x34, 0xbd, 0x76, 0x52, 0x26, 0x81, 0xe7, 0x11, 0x09, 0xc0, 0x7c, 0xb1, 0x7b, 0x09, 0xe6, 0x61, 0xc1, 0x1c, 0x51, 0x9b, 0x20, 0xfe, 0x6d, 0xb8, 0x0d, 0x47, 0x75, 0x6f, 0x84, 0x48, 0x40, 0xb7, 0xbe, 0x6b, 0x95, 0xc5, 0xdb, 0x49, 0x7e, 0x70, 0x6c, 0x5f, 0x58, 0xc7, 0x8a, 0x35, 0x0a, 0x8e, 0x80, 0x2e, 0xff, 0xbd, 0x55, 0xb5, 0x96, 0x7b, 0xdf, 0x87, 0xce, 0x75, 0xf0, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2100 = { .name = "ecdsa_brainpoolp512r1_sha512_2100", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2100_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2100_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2100_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 150 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2101 for ECDSA, tcId is 151 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2101_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2101_msg[] = { 0x35, 0x33, 0x34, 0x34, 0x37, 0x38, 0x37, 0x38, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2101_sig[] = { 0x68, 0x0d, 0x7c, 0x82, 0xbb, 0xff, 0x29, 0x1b, 0xb7, 0x1f, 0x2d, 0xa5, 0x32, 0xf1, 0xa9, 0x31, 0xeb, 0x39, 0xa2, 0x22, 0x33, 0x6d, 0x5e, 0x40, 0x65, 0x7c, 0xc2, 0xfb, 0x12, 0x6b, 0x22, 0x47, 0xcf, 0x2d, 0xae, 0x23, 0x35, 0x55, 0x56, 0x4e, 0xa4, 0x42, 0x4e, 0xc3, 0x79, 0x12, 0xb3, 0x7e, 0x88, 0x66, 0xd4, 0x5c, 0x39, 0x3c, 0x6a, 0x91, 0xce, 0x13, 0x2d, 0xbc, 0x9f, 0x46, 0x63, 0x5d, 0x1f, 0x0c, 0x51, 0x58, 0x56, 0xa6, 0x2a, 0xf6, 0x8f, 0x0f, 0x23, 0x14, 0x5a, 0xad, 0x92, 0xa7, 0x7d, 0x71, 0x07, 0xd8, 0xd8, 0xaa, 0x46, 0xca, 0xbc, 0xc7, 0x2b, 0x2c, 0x08, 0x21, 0x85, 0xdb, 0x1d, 0x75, 0xd1, 0x54, 0x6a, 0x4e, 0x6c, 0xf5, 0x27, 0xc6, 0x9f, 0xe5, 0x2c, 0xb7, 0x6e, 0xe1, 0x5e, 0xaa, 0x62, 0x04, 0x44, 0xb6, 0xf2, 0x72, 0xb4, 0x02, 0x76, 0x35, 0xeb, 0xe8, 0x36, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2101 = { .name = "ecdsa_brainpoolp512r1_sha512_2101", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2101_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2101_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2101_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 151 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2102 for ECDSA, tcId is 152 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2102_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2102_msg[] = { 0x31, 0x39, 0x32, 0x36, 0x36, 0x34, 0x31, 0x30, 0x39, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2102_sig[] = { 0x59, 0xff, 0xf5, 0xae, 0x97, 0x29, 0xb2, 0x1c, 0x38, 0x9a, 0x12, 0x70, 0x23, 0x60, 0xac, 0xa2, 0x57, 0x5e, 0xd4, 0xa4, 0x49, 0x22, 0xe1, 0x7d, 0xe5, 0x7c, 0xe9, 0x39, 0x79, 0xf1, 0x95, 0x56, 0xde, 0x0e, 0x25, 0x58, 0x1c, 0xfc, 0x98, 0xc1, 0xa6, 0x8e, 0xf0, 0x01, 0xa7, 0xf8, 0xd1, 0x57, 0xe7, 0x59, 0x1b, 0xae, 0xa4, 0x4e, 0x00, 0x3c, 0x45, 0x4e, 0x94, 0x1b, 0xbf, 0x9e, 0x5f, 0x7e, 0x10, 0x91, 0x96, 0xa8, 0x0b, 0x32, 0xa0, 0xa5, 0x7a, 0x7b, 0xcd, 0x3a, 0x6c, 0xe7, 0xf9, 0x25, 0xd1, 0x4f, 0x51, 0xc6, 0x15, 0x2a, 0xd8, 0x66, 0xd3, 0x37, 0x30, 0x08, 0xd6, 0x50, 0xb5, 0xaf, 0x7a, 0x25, 0xe2, 0xbf, 0xbd, 0x59, 0xb6, 0x37, 0x1f, 0xff, 0xec, 0xfd, 0xe1, 0x16, 0xd2, 0xa3, 0x6a, 0x8d, 0x1f, 0xe9, 0x17, 0x8b, 0xa3, 0xb3, 0xf3, 0x7c, 0x09, 0xb2, 0x71, 0xa5, 0xb0, 0x50, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2102 = { .name = "ecdsa_brainpoolp512r1_sha512_2102", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2102_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2102_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2102_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 152 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2103 for ECDSA, tcId is 153 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2103_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2103_msg[] = { 0x33, 0x37, 0x30, 0x33, 0x39, 0x31, 0x35, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2103_sig[] = { 0x66, 0xef, 0x24, 0x6c, 0x7b, 0x80, 0xb5, 0x6e, 0x0e, 0xa7, 0x83, 0xac, 0x73, 0x71, 0x51, 0xc7, 0x36, 0x10, 0x21, 0x8d, 0x00, 0xc9, 0x36, 0xf4, 0xc1, 0x8d, 0x5a, 0x6c, 0x44, 0xf3, 0x5e, 0xe1, 0x9d, 0x8a, 0xa1, 0x57, 0x65, 0xdf, 0xfd, 0xfe, 0x51, 0xaa, 0xa3, 0x31, 0x12, 0x3e, 0xe4, 0xc5, 0xc8, 0xd6, 0x72, 0x63, 0xf6, 0x95, 0x56, 0x1e, 0x7c, 0xf7, 0xe6, 0x48, 0xef, 0xb7, 0xa4, 0xf7, 0x2a, 0x0a, 0xc4, 0x9a, 0x98, 0x4c, 0xbd, 0xf6, 0x6c, 0x59, 0xc6, 0x5d, 0xee, 0x9a, 0x3c, 0xc5, 0x81, 0x6b, 0x78, 0x82, 0xaf, 0x45, 0x34, 0x1e, 0x9d, 0xc5, 0x14, 0xae, 0xfa, 0xec, 0xd2, 0x46, 0x8c, 0xd5, 0xb9, 0x67, 0xa5, 0x36, 0x54, 0x88, 0x00, 0x46, 0xe1, 0x8e, 0x1a, 0xdc, 0x99, 0x1f, 0xe1, 0xb7, 0xbc, 0x0e, 0x53, 0x79, 0x17, 0x9b, 0xa3, 0xdc, 0x84, 0xbc, 0xee, 0x12, 0xc6, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2103 = { .name = "ecdsa_brainpoolp512r1_sha512_2103", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2103_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2103_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2103_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 153 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2104 for ECDSA, tcId is 154 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2104_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2104_msg[] = { 0x38, 0x31, 0x35, 0x34, 0x35, 0x37, 0x37, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2104_sig[] = { 0x74, 0x69, 0x76, 0x7e, 0x75, 0x12, 0xc7, 0xd2, 0x94, 0xd8, 0x32, 0x90, 0x87, 0x1b, 0x5c, 0xb7, 0xec, 0x5d, 0x6e, 0xbf, 0x05, 0xb2, 0xd7, 0x65, 0x18, 0x39, 0x72, 0x9b, 0x87, 0x27, 0x81, 0x8e, 0x9e, 0x53, 0x08, 0x75, 0xe9, 0x01, 0xb7, 0x59, 0xe9, 0x2c, 0x79, 0x86, 0x10, 0xd4, 0x47, 0x35, 0x91, 0xb2, 0xcf, 0xb8, 0x74, 0x28, 0xa2, 0xf0, 0xb1, 0xaf, 0xb2, 0x5d, 0x25, 0xf9, 0x86, 0x8c, 0x13, 0xaa, 0x65, 0xad, 0x34, 0x38, 0x8e, 0xe1, 0x02, 0xce, 0x4f, 0xe0, 0xf3, 0x80, 0x1d, 0xb5, 0xf1, 0xbe, 0x38, 0xb8, 0xf5, 0x91, 0x94, 0x6a, 0xe5, 0x5b, 0xe7, 0x15, 0x9a, 0x2e, 0x04, 0x7d, 0x03, 0x76, 0x18, 0xce, 0x45, 0xa0, 0x98, 0x0c, 0x9f, 0x68, 0x6a, 0x7b, 0xee, 0x7f, 0xe8, 0xc7, 0x88, 0x22, 0x62, 0xc4, 0xf7, 0xc6, 0x60, 0x85, 0x96, 0xe1, 0x29, 0x00, 0xce, 0xa6, 0x20, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2104 = { .name = "ecdsa_brainpoolp512r1_sha512_2104", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2104_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2104_msg, .msglen = 8, .sig = ecdsa_brainpoolp512r1_sha512_2104_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 154 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2105 for ECDSA, tcId is 155 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2105_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2105_msg[] = { 0x31, 0x39, 0x35, 0x35, 0x33, 0x30, 0x33, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2105_sig[] = { 0x2d, 0xde, 0x8d, 0xae, 0x88, 0x3b, 0x5f, 0x5b, 0x82, 0x22, 0xb2, 0x61, 0xff, 0x19, 0x8b, 0x0d, 0x46, 0x15, 0xb2, 0x23, 0x73, 0x53, 0x80, 0x03, 0x1e, 0x37, 0x60, 0x3d, 0x97, 0x66, 0xc3, 0xa6, 0x60, 0xcc, 0xba, 0xe3, 0x50, 0xd4, 0x09, 0x94, 0xeb, 0xb4, 0x9a, 0x09, 0xd8, 0xc9, 0x02, 0xbe, 0xac, 0xf8, 0xf0, 0xde, 0x1c, 0xa2, 0xb0, 0xa4, 0xa3, 0x1d, 0x00, 0xb5, 0x6b, 0xd8, 0x45, 0xa4, 0x66, 0x04, 0xfd, 0xe7, 0x0a, 0xc7, 0x61, 0x42, 0x01, 0x33, 0x62, 0x4d, 0xef, 0x5c, 0x44, 0xb5, 0xd5, 0xa5, 0x79, 0x5d, 0x44, 0x12, 0xdd, 0x73, 0x98, 0x3a, 0xef, 0x62, 0x90, 0x80, 0xae, 0x47, 0x63, 0x64, 0x97, 0x01, 0x8c, 0xd5, 0xd3, 0x1c, 0x8b, 0x85, 0xb2, 0xb0, 0x3d, 0x72, 0x17, 0x14, 0x88, 0x42, 0x9e, 0xaf, 0x4b, 0x82, 0x47, 0xaa, 0x6b, 0x01, 0x04, 0x4c, 0x0a, 0xe4, 0x61, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2105 = { .name = "ecdsa_brainpoolp512r1_sha512_2105", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2105_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2105_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2105_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 155 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2106 for ECDSA, tcId is 156 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2106_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2106_msg[] = { 0x31, 0x32, 0x36, 0x37, 0x38, 0x31, 0x30, 0x39, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2106_sig[] = { 0x24, 0x5d, 0xbf, 0x6c, 0x53, 0xa2, 0xd7, 0x88, 0x1b, 0x8d, 0x15, 0x7a, 0x62, 0x00, 0xd9, 0xba, 0x32, 0x43, 0xe4, 0xd9, 0xc1, 0x2d, 0x3e, 0xde, 0xbd, 0x8f, 0xf9, 0xe1, 0x03, 0xc6, 0x15, 0x8f, 0x89, 0x6e, 0xd5, 0xbc, 0xab, 0x43, 0x38, 0x3c, 0xf6, 0xbe, 0xcd, 0xbc, 0xf0, 0x81, 0x60, 0x4a, 0x59, 0x55, 0x08, 0x17, 0x2b, 0xbf, 0x43, 0xf1, 0x52, 0xb6, 0x69, 0xc4, 0xf4, 0x1d, 0x21, 0xe5, 0xa1, 0xdf, 0xaf, 0x17, 0xa6, 0xe5, 0x51, 0xfe, 0x0b, 0xc0, 0xcc, 0x24, 0xca, 0xc5, 0xa8, 0x21, 0x4d, 0xbd, 0x75, 0x08, 0x60, 0xa6, 0x03, 0x00, 0x21, 0x0a, 0xe9, 0xdc, 0x4a, 0xa1, 0x60, 0xf7, 0x88, 0xdd, 0x58, 0xb8, 0x2f, 0x96, 0x88, 0x40, 0x75, 0x51, 0xb0, 0xa2, 0x0e, 0x36, 0x70, 0x83, 0xa1, 0xa0, 0xf9, 0x9c, 0x35, 0x71, 0x52, 0x28, 0xc2, 0x25, 0x2f, 0x0f, 0x0d, 0xdb, 0x25, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2106 = { .name = "ecdsa_brainpoolp512r1_sha512_2106", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2106_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2106_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2106_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 156 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2107 for ECDSA, tcId is 157 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2107_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2107_msg[] = { 0x31, 0x31, 0x31, 0x38, 0x30, 0x37, 0x32, 0x30, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2107_sig[] = { 0x45, 0x50, 0xb9, 0x86, 0xfb, 0x04, 0xcc, 0x7f, 0xde, 0x0d, 0xc8, 0x5a, 0x95, 0xa1, 0x58, 0x17, 0x94, 0xb2, 0x52, 0x10, 0x20, 0x53, 0x2d, 0xc0, 0x0f, 0xb5, 0xed, 0x4b, 0x0e, 0xbd, 0x68, 0x34, 0xf1, 0x83, 0xf3, 0xc6, 0x2a, 0x57, 0x56, 0xbf, 0x5b, 0xd0, 0xb9, 0xa5, 0x16, 0xbc, 0x3d, 0x6c, 0x7e, 0x81, 0xef, 0xe5, 0x51, 0x16, 0x4b, 0x9d, 0xe0, 0xc1, 0x52, 0x93, 0x82, 0x95, 0xe2, 0xfb, 0x48, 0x59, 0x76, 0x25, 0x3d, 0x58, 0x03, 0x2d, 0x27, 0xed, 0x61, 0x56, 0xec, 0x15, 0xcf, 0x85, 0x34, 0x40, 0xdd, 0xec, 0xdf, 0x63, 0xbd, 0xb3, 0x04, 0xe1, 0xe7, 0x4d, 0x13, 0x9c, 0x13, 0x19, 0x67, 0x46, 0x64, 0xc5, 0xaa, 0xed, 0x9b, 0xb3, 0x04, 0x3a, 0x6e, 0x8a, 0xab, 0x1c, 0xa2, 0xe1, 0x5a, 0xfd, 0xb4, 0x5d, 0x33, 0x20, 0x04, 0x27, 0x50, 0xf9, 0xea, 0x82, 0x96, 0xfc, 0xd5, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2107 = { .name = "ecdsa_brainpoolp512r1_sha512_2107", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2107_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2107_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2107_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 157 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2108 for ECDSA, tcId is 158 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2108_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2108_msg[] = { 0x38, 0x33, 0x38, 0x31, 0x38, 0x36, 0x39, 0x32, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2108_sig[] = { 0x53, 0x91, 0x83, 0xda, 0xde, 0xa6, 0x63, 0x0b, 0xd4, 0x41, 0x6a, 0x49, 0xa8, 0xd6, 0xe7, 0x79, 0x23, 0x03, 0xe1, 0xe4, 0x4d, 0x20, 0x28, 0x72, 0x6f, 0x84, 0x69, 0x7c, 0x49, 0x6c, 0x26, 0xda, 0xcc, 0xac, 0x5f, 0xc4, 0xa4, 0xad, 0x34, 0x86, 0x6e, 0x71, 0x8e, 0x90, 0x67, 0xc4, 0xaf, 0x1b, 0xc9, 0xe2, 0x2c, 0x70, 0xb9, 0x4e, 0x74, 0xf2, 0x82, 0x2f, 0xef, 0x92, 0x9e, 0x7b, 0xad, 0x56, 0x4a, 0xbb, 0x75, 0x51, 0x92, 0xa1, 0x8e, 0xfb, 0x2e, 0x72, 0xa2, 0xfb, 0x4e, 0xe5, 0x1e, 0x47, 0xdb, 0x6d, 0x3b, 0xb2, 0x1b, 0xe2, 0xdd, 0xef, 0xb8, 0xfc, 0xff, 0x5e, 0x08, 0x4a, 0x2d, 0x8c, 0x8c, 0x7a, 0x1f, 0x44, 0xd0, 0x4c, 0x54, 0xb6, 0xbc, 0xbb, 0x95, 0x7c, 0x14, 0xa6, 0x2d, 0x75, 0x47, 0xfe, 0xcc, 0xb5, 0xd3, 0xf2, 0x0e, 0xd2, 0x00, 0x93, 0x13, 0x6d, 0x97, 0xdc, 0xb6, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2108 = { .name = "ecdsa_brainpoolp512r1_sha512_2108", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2108_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2108_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2108_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 158 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2109 for ECDSA, tcId is 159 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2109_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2109_msg[] = { 0x33, 0x31, 0x33, 0x31, 0x32, 0x38, 0x37, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2109_sig[] = { 0x20, 0x82, 0x50, 0xa2, 0xa6, 0x62, 0xf8, 0x53, 0x6b, 0x5c, 0xdc, 0xff, 0xa1, 0x37, 0xb8, 0x3c, 0x52, 0x55, 0x12, 0xd9, 0xe3, 0xcd, 0xfe, 0xd0, 0x20, 0x76, 0x0c, 0x1b, 0x05, 0xb5, 0x5f, 0xc9, 0xf6, 0x6c, 0x6d, 0x7a, 0x8c, 0x25, 0xbf, 0xa4, 0x75, 0xb1, 0x07, 0x83, 0x11, 0x53, 0x73, 0x8d, 0x55, 0xa4, 0xdd, 0x07, 0xa7, 0x81, 0x92, 0xd0, 0x41, 0x69, 0x2b, 0xf5, 0x35, 0xe1, 0xac, 0x04, 0x3d, 0x85, 0x7d, 0xdd, 0x8c, 0xb2, 0x46, 0xac, 0x6e, 0xd2, 0x1e, 0x1d, 0xc5, 0x36, 0x81, 0x90, 0xda, 0xa9, 0x9b, 0xf8, 0xc3, 0x64, 0x49, 0xed, 0xd3, 0x18, 0xb2, 0x78, 0x27, 0xa2, 0x4c, 0x9a, 0xb0, 0x31, 0x4c, 0x59, 0x26, 0x17, 0x24, 0x9a, 0x1d, 0xa9, 0xfd, 0xe1, 0x35, 0xbc, 0x85, 0xe4, 0xc4, 0x80, 0x5d, 0x05, 0x17, 0x9b, 0x40, 0xc8, 0xcf, 0x4e, 0xdb, 0xc0, 0xad, 0xf1, 0x9f, 0x46, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2109 = { .name = "ecdsa_brainpoolp512r1_sha512_2109", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2109_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2109_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2109_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 159 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2110 for ECDSA, tcId is 160 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2110_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2110_msg[] = { 0x31, 0x34, 0x33, 0x33, 0x31, 0x39, 0x32, 0x36, 0x35, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2110_sig[] = { 0x65, 0xc6, 0x39, 0xaa, 0x06, 0x86, 0x81, 0x53, 0xb7, 0x76, 0x3f, 0xf6, 0x8b, 0xce, 0x97, 0xc7, 0xd9, 0xfe, 0x2f, 0x02, 0x8d, 0x9b, 0xea, 0x62, 0x32, 0x85, 0x21, 0x4e, 0xc5, 0x57, 0x2f, 0x64, 0x12, 0x74, 0xe4, 0x19, 0xa8, 0x33, 0x5d, 0xec, 0x43, 0xff, 0xf2, 0x23, 0x4d, 0xed, 0x00, 0xbb, 0x01, 0x23, 0x41, 0x1d, 0xea, 0x84, 0x3e, 0x97, 0x0b, 0xfb, 0x8f, 0xed, 0x4a, 0x51, 0x4e, 0xe4, 0x3f, 0xd4, 0xea, 0xb5, 0x37, 0x13, 0x23, 0x1e, 0x91, 0x91, 0x90, 0x6e, 0xf0, 0xcb, 0xa9, 0xc4, 0xcb, 0x50, 0xfc, 0x24, 0x62, 0x8c, 0x8f, 0x2d, 0xb1, 0x91, 0x4d, 0x6c, 0xce, 0xc4, 0x91, 0xc7, 0x80, 0xc9, 0x6c, 0xdb, 0x1b, 0x9b, 0xe6, 0xa6, 0x3c, 0xd3, 0x79, 0xa8, 0x46, 0x39, 0x39, 0xaa, 0x8a, 0x6e, 0xca, 0x63, 0x57, 0x23, 0x7f, 0xa8, 0xe8, 0x29, 0xfa, 0x4a, 0x38, 0x44, 0x8f, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2110 = { .name = "ecdsa_brainpoolp512r1_sha512_2110", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2110_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2110_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2110_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 160 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2111 for ECDSA, tcId is 161 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2111_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2111_msg[] = { 0x33, 0x34, 0x34, 0x39, 0x30, 0x38, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2111_sig[] = { 0x4a, 0x11, 0x0c, 0xc6, 0xab, 0xa1, 0x29, 0x60, 0x3a, 0x61, 0x7f, 0x0f, 0x83, 0xc8, 0xd7, 0xe9, 0xa6, 0x61, 0xdf, 0x8b, 0x57, 0x1f, 0xed, 0x84, 0x98, 0x32, 0x2d, 0x5e, 0x44, 0x8b, 0x46, 0x6f, 0x79, 0x42, 0xe3, 0x9a, 0x56, 0xa0, 0x85, 0x30, 0x3d, 0xdb, 0x92, 0x2d, 0xb5, 0x9c, 0x7d, 0xca, 0xee, 0x44, 0xde, 0x09, 0x4a, 0x78, 0x53, 0xe7, 0x17, 0xa3, 0xe9, 0x28, 0x17, 0x9f, 0xbc, 0x76, 0x2e, 0x54, 0x84, 0x86, 0x7e, 0x70, 0xcf, 0x9e, 0x3b, 0xfc, 0xff, 0x30, 0x9e, 0x89, 0xee, 0x1d, 0x90, 0x99, 0x04, 0xf4, 0xb9, 0x40, 0x22, 0xae, 0x91, 0x17, 0x75, 0x54, 0x70, 0x61, 0x22, 0xe5, 0xc4, 0x5f, 0x9a, 0x72, 0xae, 0xe7, 0x64, 0x10, 0xbb, 0x84, 0x4f, 0x09, 0xf8, 0xe6, 0x6e, 0x0e, 0xed, 0xe2, 0x87, 0xd6, 0xc3, 0x65, 0x24, 0x4e, 0x76, 0x32, 0xf4, 0x78, 0xa7, 0x53, 0x0a, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2111 = { .name = "ecdsa_brainpoolp512r1_sha512_2111", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2111_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2111_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2111_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 161 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2112 for ECDSA, tcId is 162 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2112_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2112_msg[] = { 0x36, 0x38, 0x32, 0x39, 0x38, 0x33, 0x35, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2112_sig[] = { 0x39, 0xc8, 0x96, 0xc0, 0x40, 0x99, 0x67, 0xf9, 0xbe, 0x11, 0xfd, 0xff, 0xf9, 0xe8, 0xf7, 0xb0, 0x8b, 0x7f, 0x2c, 0xf4, 0x4b, 0xe4, 0x71, 0xd4, 0xea, 0x1e, 0x25, 0x69, 0x32, 0x34, 0x44, 0x36, 0x66, 0x3a, 0x4d, 0xa8, 0xfe, 0x28, 0xff, 0xe7, 0x9d, 0x27, 0x74, 0x58, 0xe9, 0xea, 0x2f, 0x59, 0x7a, 0x7d, 0xb8, 0x47, 0x41, 0x4b, 0xb2, 0xad, 0x24, 0x38, 0x03, 0x7c, 0xb6, 0xc4, 0xa6, 0xcd, 0x91, 0x0d, 0x53, 0xab, 0x2c, 0x5c, 0x56, 0xbf, 0x05, 0x83, 0x74, 0x29, 0xe5, 0xe3, 0xd0, 0x8a, 0x02, 0xd0, 0xe6, 0x02, 0x27, 0x28, 0x30, 0x29, 0x79, 0x22, 0xbc, 0x91, 0xe2, 0x9f, 0x4f, 0x98, 0x82, 0x71, 0xfd, 0xd6, 0x0f, 0x07, 0x0e, 0xb0, 0xaa, 0x1e, 0x57, 0xd7, 0x42, 0xca, 0x75, 0x96, 0x56, 0x38, 0x27, 0x4f, 0x3c, 0xfb, 0x2b, 0x7b, 0x28, 0xd1, 0xa1, 0x46, 0x2a, 0x38, 0x4f, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2112 = { .name = "ecdsa_brainpoolp512r1_sha512_2112", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2112_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2112_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2112_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 162 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2113 for ECDSA, tcId is 163 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2113_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2113_msg[] = { 0x33, 0x34, 0x34, 0x35, 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2113_sig[] = { 0x43, 0x17, 0x01, 0xfe, 0x9a, 0x41, 0xc1, 0xcd, 0xa0, 0xa2, 0x3b, 0x6c, 0x4f, 0xff, 0xb7, 0x12, 0x8b, 0x53, 0x6b, 0xc9, 0xc0, 0xfa, 0x14, 0x55, 0xd7, 0x26, 0x3a, 0xf0, 0x4a, 0x1a, 0x1d, 0x40, 0x9a, 0x96, 0xa2, 0xe0, 0x4a, 0x56, 0xe1, 0x91, 0x28, 0x38, 0xd4, 0xad, 0x45, 0xae, 0x9d, 0x66, 0xdb, 0x7d, 0x93, 0x47, 0xe1, 0x60, 0x49, 0x5b, 0x4b, 0xe7, 0x71, 0x22, 0x85, 0x2a, 0x28, 0x1d, 0x82, 0x4c, 0xb1, 0x38, 0xa2, 0x9f, 0x22, 0x43, 0x5d, 0x40, 0x18, 0x80, 0x55, 0x6e, 0x16, 0xc5, 0x85, 0x93, 0x49, 0xbd, 0x19, 0xf5, 0x3c, 0x5c, 0x20, 0x51, 0x6a, 0xce, 0x4d, 0x84, 0xc5, 0xc6, 0x00, 0xbf, 0x61, 0x11, 0x4e, 0x05, 0x69, 0x7c, 0xde, 0x12, 0x16, 0x86, 0x92, 0x1b, 0x97, 0x74, 0xb8, 0x3b, 0x84, 0xd0, 0x0c, 0x2c, 0xd6, 0xb7, 0x8c, 0xc5, 0x92, 0x0c, 0x63, 0x21, 0x87, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2113 = { .name = "ecdsa_brainpoolp512r1_sha512_2113", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2113_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2113_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2113_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 163 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2114 for ECDSA, tcId is 164 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2114_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2114_msg[] = { 0x31, 0x32, 0x36, 0x39, 0x37, 0x39, 0x38, 0x37, 0x36, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2114_sig[] = { 0x68, 0x4e, 0x6e, 0x41, 0xe2, 0x58, 0x85, 0x06, 0xb6, 0xec, 0x29, 0xb4, 0x58, 0x30, 0x1a, 0x79, 0x81, 0xc1, 0x09, 0x33, 0x00, 0x67, 0x5a, 0x9c, 0xfe, 0xc0, 0xf1, 0x95, 0x69, 0x6d, 0x35, 0xa1, 0x60, 0x68, 0xc4, 0xe2, 0x54, 0x24, 0xfc, 0x9b, 0x27, 0x6d, 0x84, 0xf7, 0xaf, 0xeb, 0x39, 0xaf, 0x09, 0x6e, 0xff, 0xec, 0xff, 0x09, 0xa6, 0xac, 0x67, 0x32, 0x70, 0x95, 0xe2, 0xe2, 0x5c, 0x2a, 0x1c, 0x30, 0x80, 0xb7, 0xf7, 0x0c, 0xeb, 0xd1, 0x93, 0x0a, 0x2b, 0x8b, 0xf6, 0x07, 0x31, 0xe8, 0x38, 0x0f, 0xae, 0x8a, 0x08, 0xf0, 0x31, 0x1a, 0x27, 0xab, 0xc1, 0x5d, 0x11, 0x05, 0xe4, 0xaa, 0x62, 0x62, 0x60, 0xce, 0xe8, 0x65, 0xd2, 0xcf, 0x22, 0x4a, 0xc7, 0xa9, 0x25, 0xc4, 0xeb, 0x5b, 0xab, 0xce, 0x2f, 0xec, 0xb5, 0xe2, 0x0d, 0x61, 0xf7, 0xa5, 0xdb, 0xbb, 0xe3, 0x3a, 0x01, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2114 = { .name = "ecdsa_brainpoolp512r1_sha512_2114", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2114_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2114_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2114_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 164 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2115 for ECDSA, tcId is 165 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2115_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2115_msg[] = { 0x33, 0x39, 0x39, 0x32, 0x34, 0x32, 0x35, 0x35, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2115_sig[] = { 0x4c, 0x56, 0xb1, 0x3a, 0x81, 0xa3, 0x9c, 0xb7, 0xf2, 0x76, 0x7b, 0x11, 0x5f, 0xb4, 0x09, 0xb9, 0xcb, 0x99, 0x88, 0xaa, 0xc5, 0x88, 0x5b, 0x63, 0x27, 0x12, 0xb1, 0x33, 0xf2, 0x3b, 0xec, 0x54, 0xc6, 0xfd, 0x53, 0x31, 0x8e, 0x26, 0x5f, 0xbc, 0xb1, 0x84, 0x76, 0x71, 0x73, 0x39, 0xea, 0x90, 0x12, 0x59, 0xfe, 0x62, 0x9a, 0x39, 0x62, 0x67, 0x74, 0x1e, 0xf4, 0x4e, 0x44, 0x75, 0xa7, 0xbb, 0x24, 0xfc, 0xa6, 0x80, 0x64, 0xbb, 0xf8, 0xbe, 0xe1, 0x55, 0x1c, 0x2d, 0x00, 0xb5, 0x4a, 0x16, 0xb5, 0x0b, 0x48, 0x21, 0xc2, 0x99, 0xe2, 0xaa, 0x1a, 0x73, 0xdf, 0xe2, 0xf8, 0x1c, 0x73, 0xc4, 0x09, 0x93, 0x16, 0x6a, 0xb8, 0xed, 0x9b, 0xd8, 0x48, 0x9c, 0xfe, 0x52, 0x3e, 0x41, 0xcf, 0x6e, 0x35, 0xef, 0x7a, 0x7a, 0x33, 0x1b, 0xd8, 0xd2, 0xa4, 0xdb, 0x77, 0xdf, 0xf4, 0x0d, 0x11, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2115 = { .name = "ecdsa_brainpoolp512r1_sha512_2115", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2115_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2115_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2115_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 165 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2116 for ECDSA, tcId is 166 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2116_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2116_msg[] = { 0x31, 0x36, 0x30, 0x31, 0x39, 0x37, 0x37, 0x39, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2116_sig[] = { 0x68, 0x2a, 0xfc, 0x3b, 0x92, 0x59, 0xdb, 0xc9, 0x16, 0x01, 0x19, 0x01, 0x46, 0x19, 0x37, 0x5a, 0x7d, 0x49, 0x16, 0xbd, 0x08, 0xa9, 0x31, 0xcf, 0x78, 0x77, 0x87, 0x5f, 0xc7, 0x77, 0xd1, 0x8a, 0x3c, 0xaa, 0xf2, 0x53, 0xc6, 0x05, 0xc1, 0x19, 0x73, 0x99, 0xef, 0x93, 0x72, 0xb9, 0xf5, 0x85, 0xa5, 0x84, 0x14, 0x98, 0x56, 0x5f, 0xb5, 0x77, 0x01, 0x81, 0x60, 0xf6, 0x2f, 0x9f, 0x3b, 0x6b, 0x56, 0xa7, 0xe2, 0xdc, 0x08, 0xf6, 0xfb, 0x56, 0x1b, 0x62, 0x0f, 0x09, 0xe8, 0x30, 0xce, 0x6f, 0xd5, 0x2b, 0x49, 0xda, 0x81, 0x5f, 0x9c, 0x3e, 0x89, 0x95, 0x9b, 0x0d, 0x2f, 0xcc, 0x79, 0xad, 0xfb, 0x6d, 0xd9, 0xf9, 0xdd, 0xf0, 0xed, 0x9e, 0x29, 0x5b, 0x72, 0x8c, 0x30, 0x5e, 0xff, 0xcb, 0x4d, 0x97, 0xef, 0xde, 0x40, 0xd9, 0x3d, 0xc2, 0xb6, 0x37, 0x7e, 0x9d, 0x4f, 0x72, 0xbe, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2116 = { .name = "ecdsa_brainpoolp512r1_sha512_2116", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2116_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2116_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2116_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 166 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2117 for ECDSA, tcId is 167 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2117_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2117_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x35, 0x35, 0x31, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2117_sig[] = { 0x8a, 0x68, 0x54, 0xac, 0xf4, 0xc8, 0x03, 0x27, 0xde, 0xf8, 0xe3, 0xec, 0x10, 0x46, 0xde, 0x4f, 0x35, 0x49, 0x8d, 0xf7, 0x98, 0xa9, 0x16, 0xed, 0xc8, 0x44, 0x31, 0x67, 0x4d, 0x4e, 0xb4, 0x5d, 0x20, 0x55, 0x9c, 0xcd, 0xb8, 0xc1, 0xa1, 0x47, 0x54, 0xde, 0x6e, 0xf4, 0x04, 0xb5, 0xe8, 0xa6, 0x6c, 0x36, 0x28, 0xab, 0xac, 0xd0, 0x7e, 0x8c, 0xa4, 0x06, 0xdd, 0xc0, 0xd9, 0x75, 0x60, 0xe6, 0x1e, 0x5a, 0x07, 0xf8, 0x2b, 0xf3, 0x20, 0xb7, 0x74, 0xa4, 0x60, 0xf3, 0xeb, 0xf5, 0x34, 0x96, 0xef, 0x63, 0x2f, 0x7a, 0x33, 0xd5, 0x1f, 0xa2, 0x84, 0x7f, 0x63, 0x93, 0x1f, 0xef, 0x13, 0x11, 0xb5, 0x3c, 0x21, 0x38, 0x40, 0xea, 0x3c, 0x6e, 0x70, 0xd2, 0x84, 0x6a, 0x57, 0x65, 0x99, 0x02, 0x6a, 0xc1, 0x66, 0x90, 0x25, 0x8e, 0x4f, 0xc8, 0xed, 0xbb, 0x12, 0x11, 0x81, 0x6f, 0xc1, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2117 = { .name = "ecdsa_brainpoolp512r1_sha512_2117", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2117_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2117_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2117_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 167 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2118 for ECDSA, tcId is 168 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2118_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2118_msg[] = { 0x37, 0x30, 0x30, 0x34, 0x32, 0x35, 0x32, 0x39, 0x39, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2118_sig[] = { 0x1b, 0x06, 0x05, 0xbe, 0x20, 0xe4, 0x37, 0x4b, 0x17, 0xe4, 0xea, 0xc2, 0x6b, 0xd2, 0xbb, 0x95, 0x70, 0x20, 0xe1, 0xe0, 0x51, 0x08, 0x27, 0x9b, 0xd2, 0x69, 0x60, 0xde, 0x64, 0xd3, 0x9e, 0xf2, 0xd1, 0x9c, 0xc8, 0xcc, 0xbe, 0x8f, 0xd7, 0x2e, 0x12, 0x24, 0x12, 0xc2, 0xc6, 0x20, 0xcd, 0x2c, 0x46, 0x40, 0x26, 0x8b, 0x38, 0xdf, 0x93, 0x19, 0x3b, 0x8a, 0xc7, 0xe0, 0xd8, 0x38, 0x2c, 0xa5, 0x28, 0x99, 0x27, 0xed, 0x08, 0xef, 0x4e, 0x0e, 0x5a, 0x41, 0x72, 0x87, 0x75, 0xa1, 0x0d, 0xde, 0x8c, 0x6c, 0xc6, 0xe0, 0x8f, 0x9e, 0xab, 0xa5, 0x10, 0x77, 0xc8, 0x80, 0xc5, 0xaa, 0xd6, 0x47, 0xbc, 0x2f, 0x35, 0xde, 0xf5, 0x92, 0xd0, 0xdd, 0xd1, 0xd3, 0xe1, 0x40, 0xb6, 0xe7, 0x56, 0xc4, 0x6b, 0xe3, 0x60, 0x13, 0xcc, 0x5a, 0x6e, 0x5b, 0xb9, 0x87, 0x0b, 0x5c, 0x4d, 0xca, 0xf2, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2118 = { .name = "ecdsa_brainpoolp512r1_sha512_2118", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2118_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2118_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2118_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 168 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2119 for ECDSA, tcId is 169 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2119_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2119_msg[] = { 0x31, 0x35, 0x36, 0x35, 0x33, 0x32, 0x35, 0x32, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2119_sig[] = { 0x37, 0x38, 0x44, 0x06, 0x33, 0x23, 0xbe, 0xb4, 0xe6, 0xa4, 0xd2, 0x82, 0x19, 0x35, 0x92, 0xdf, 0x39, 0xdc, 0x57, 0x67, 0x51, 0x9a, 0x80, 0x31, 0xb6, 0x2d, 0x8a, 0xab, 0xd5, 0xde, 0xd6, 0x95, 0x40, 0x7b, 0xc4, 0x68, 0x7a, 0xc0, 0x9d, 0xe9, 0x3f, 0xa3, 0x8a, 0x89, 0x41, 0x2c, 0xfe, 0x6a, 0xcb, 0x5c, 0x09, 0x97, 0x57, 0x79, 0xa9, 0xe4, 0x17, 0x02, 0xe1, 0x81, 0x57, 0xb8, 0x44, 0x57, 0x92, 0x62, 0x01, 0x4c, 0xca, 0xcb, 0x90, 0xa4, 0xb8, 0x33, 0x3b, 0x97, 0x43, 0xf2, 0x5b, 0x89, 0x82, 0x5f, 0x3f, 0x7d, 0x21, 0x71, 0xe6, 0xf3, 0xaf, 0xd8, 0x2c, 0x04, 0x8a, 0x98, 0x05, 0x74, 0x5b, 0x78, 0x12, 0xb4, 0x6c, 0x2c, 0x54, 0x47, 0xfe, 0x10, 0x0e, 0x3b, 0xee, 0xa0, 0xec, 0x3b, 0xb4, 0xfd, 0xed, 0x37, 0x44, 0x53, 0x1e, 0xb0, 0x0c, 0x4d, 0xf1, 0xe0, 0x5d, 0x39, 0xc5, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2119 = { .name = "ecdsa_brainpoolp512r1_sha512_2119", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2119_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2119_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2119_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 169 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2120 for ECDSA, tcId is 170 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2120_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2120_msg[] = { 0x32, 0x33, 0x38, 0x32, 0x36, 0x33, 0x34, 0x32, 0x33, 0x35, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2120_sig[] = { 0x79, 0x8f, 0x30, 0x08, 0xa6, 0x28, 0xad, 0x65, 0xc7, 0xf8, 0x3a, 0xb5, 0x1f, 0x2e, 0x7b, 0x9e, 0x1d, 0x1b, 0x74, 0xca, 0xd8, 0x64, 0x33, 0x4c, 0xde, 0x33, 0x9b, 0xa3, 0xd2, 0xd7, 0x3f, 0x13, 0x54, 0x9a, 0x18, 0xc6, 0xbc, 0x8f, 0x82, 0x72, 0xd5, 0xa0, 0x36, 0x57, 0x0f, 0x45, 0xa1, 0xcf, 0xf2, 0x05, 0x1c, 0xbc, 0x48, 0xe8, 0xa9, 0x90, 0xc3, 0x30, 0x3b, 0xd6, 0xdf, 0x88, 0x7e, 0xd9, 0x60, 0xa1, 0xa0, 0xef, 0x92, 0xd5, 0xc2, 0x8b, 0x6d, 0x6a, 0xfe, 0xb2, 0x71, 0x8d, 0xec, 0xb5, 0x76, 0x61, 0x25, 0x3a, 0xc5, 0xfd, 0x2e, 0x13, 0x63, 0x9b, 0x04, 0xfe, 0x6d, 0x41, 0x7e, 0xeb, 0x40, 0xd7, 0x53, 0x14, 0x6f, 0xdb, 0x80, 0x49, 0x37, 0xac, 0x6b, 0xa9, 0x2c, 0x8f, 0x8b, 0xf9, 0x6a, 0x9e, 0x0c, 0x81, 0x53, 0x2e, 0xf0, 0x39, 0x10, 0xbf, 0x4c, 0xe0, 0x48, 0x3b, 0xf3, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2120 = { .name = "ecdsa_brainpoolp512r1_sha512_2120", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2120_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2120_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2120_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 170 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2121 for ECDSA, tcId is 171 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2121_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2121_msg[] = { 0x31, 0x34, 0x34, 0x37, 0x38, 0x34, 0x37, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2121_sig[] = { 0x95, 0x82, 0xbf, 0xa8, 0xa2, 0x12, 0xba, 0x8d, 0x08, 0x52, 0xa4, 0x69, 0x0b, 0xff, 0x7c, 0x93, 0x7b, 0xaf, 0xdd, 0xd2, 0xf8, 0x44, 0x7d, 0x85, 0x0a, 0xe5, 0x18, 0x38, 0x9f, 0x20, 0x18, 0x2b, 0xf8, 0x3b, 0x00, 0x05, 0x2c, 0x3b, 0x3d, 0xc6, 0x5b, 0x1a, 0x70, 0xcf, 0x21, 0x6c, 0xdf, 0xa6, 0x2d, 0xcd, 0x17, 0xa5, 0xad, 0xf3, 0x31, 0xa2, 0xa7, 0x32, 0xba, 0xae, 0xee, 0xc0, 0xad, 0x9d, 0xa4, 0xa1, 0xe4, 0x1f, 0x5f, 0xdb, 0xb9, 0x00, 0x0d, 0x0f, 0x3b, 0xbe, 0x31, 0x19, 0x95, 0xa2, 0x8a, 0xf8, 0x6b, 0x9b, 0x03, 0x34, 0xde, 0x54, 0x98, 0x82, 0x96, 0x4c, 0x53, 0x11, 0xaa, 0x52, 0xd8, 0x7d, 0xe9, 0x62, 0x67, 0x06, 0xbb, 0x25, 0x14, 0xc1, 0xcf, 0x40, 0x9e, 0x99, 0x07, 0xf4, 0xe9, 0x1e, 0x9a, 0x49, 0xd6, 0x55, 0x24, 0xb4, 0xdf, 0xcb, 0xa5, 0x20, 0x92, 0x02, 0x55, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2121 = { .name = "ecdsa_brainpoolp512r1_sha512_2121", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2121_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2121_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2121_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 171 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2122 for ECDSA, tcId is 172 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2122_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2122_msg[] = { 0x31, 0x34, 0x32, 0x36, 0x30, 0x32, 0x30, 0x35, 0x35, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2122_sig[] = { 0x4d, 0x67, 0x90, 0xc4, 0x9c, 0x82, 0xa7, 0xac, 0x06, 0xce, 0x84, 0x21, 0x53, 0x94, 0xc8, 0x6c, 0x70, 0x11, 0xb1, 0xb5, 0xf7, 0x14, 0x73, 0x8b, 0x1a, 0xd4, 0xd7, 0xb0, 0x10, 0xd8, 0x54, 0x67, 0x63, 0xf6, 0x02, 0xc9, 0xaf, 0x1e, 0x67, 0x48, 0xa2, 0x7d, 0x29, 0x7b, 0xed, 0x04, 0xeb, 0xea, 0xd4, 0xbf, 0x62, 0x90, 0x43, 0xe4, 0xde, 0xb3, 0x98, 0xa2, 0x7d, 0x4f, 0x86, 0xf3, 0xd7, 0x95, 0x6a, 0x6d, 0xcf, 0x9c, 0x89, 0x8c, 0x07, 0xd2, 0x4f, 0x13, 0xe7, 0x63, 0x66, 0xfd, 0xfb, 0x76, 0xed, 0xdd, 0x41, 0x57, 0xef, 0x2b, 0xef, 0xa9, 0x10, 0x52, 0x49, 0x34, 0xa8, 0xd4, 0x10, 0x9c, 0x12, 0xe0, 0x1e, 0xc4, 0x5d, 0x9f, 0xd4, 0x97, 0x8f, 0xb2, 0x91, 0x06, 0x81, 0xe5, 0x46, 0x03, 0x71, 0xbb, 0xfc, 0x76, 0x52, 0x87, 0x03, 0xe8, 0xb8, 0xa8, 0xbc, 0xbe, 0x8a, 0x6c, 0x8a, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2122 = { .name = "ecdsa_brainpoolp512r1_sha512_2122", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2122_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2122_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2122_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 172 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2123 for ECDSA, tcId is 173 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2123_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2123_msg[] = { 0x31, 0x39, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x38, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2123_sig[] = { 0x65, 0xb4, 0x9e, 0xbf, 0x51, 0x98, 0xda, 0x39, 0x5a, 0xa1, 0x82, 0xba, 0x31, 0xd4, 0x73, 0x12, 0x9a, 0xcc, 0x2f, 0xd6, 0x5f, 0xdc, 0x0d, 0xf2, 0xcd, 0x59, 0xa1, 0xc6, 0x8a, 0x52, 0x78, 0x82, 0xc9, 0x22, 0xf7, 0x39, 0x93, 0x39, 0x63, 0x55, 0xbd, 0x6c, 0xdf, 0x4e, 0x4f, 0xe9, 0xc4, 0x2e, 0x17, 0x16, 0xf6, 0x6e, 0xaf, 0x3e, 0x0e, 0x73, 0x25, 0x3d, 0x5f, 0x61, 0x8c, 0x30, 0x06, 0x39, 0x8d, 0xeb, 0x03, 0xcc, 0x46, 0x40, 0x19, 0x4c, 0xe2, 0x30, 0xda, 0x1d, 0x77, 0xaa, 0xcb, 0x00, 0x74, 0x27, 0x55, 0x7f, 0x70, 0xd4, 0xa0, 0xee, 0x81, 0x48, 0x12, 0xc5, 0x60, 0x86, 0x5f, 0x14, 0xf2, 0x4a, 0x8f, 0x79, 0x39, 0x3c, 0xef, 0x1a, 0x15, 0x9d, 0x28, 0x34, 0xd9, 0xfd, 0xee, 0x0a, 0x16, 0xa8, 0x5b, 0xcd, 0x5c, 0xd5, 0x0e, 0x0f, 0x7c, 0x26, 0x32, 0x30, 0x36, 0x33, 0x5f, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2123 = { .name = "ecdsa_brainpoolp512r1_sha512_2123", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2123_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2123_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2123_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 173 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2124 for ECDSA, tcId is 174 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2124_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2124_msg[] = { 0x34, 0x32, 0x39, 0x32, 0x31, 0x35, 0x33, 0x35, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2124_sig[] = { 0x87, 0x3e, 0x39, 0xe7, 0xf6, 0xb7, 0xdd, 0xe5, 0xe4, 0x0c, 0xa7, 0xfd, 0x4b, 0x8e, 0x85, 0xf3, 0xcd, 0xee, 0xae, 0x46, 0x71, 0xd6, 0x32, 0x18, 0xb9, 0xf7, 0x19, 0x54, 0x45, 0x66, 0x1d, 0xa0, 0xd1, 0xf5, 0x46, 0x07, 0x59, 0x9a, 0xe7, 0x53, 0x12, 0x02, 0xeb, 0xba, 0xe9, 0xb5, 0xa1, 0xa5, 0x8d, 0x37, 0xc4, 0xa1, 0xfd, 0x3f, 0xff, 0x8e, 0x96, 0x54, 0x7f, 0xdd, 0x3f, 0x76, 0xf8, 0x83, 0x74, 0xbf, 0x6d, 0xb0, 0x93, 0x26, 0x0e, 0xff, 0x6c, 0xac, 0x9f, 0x06, 0xdb, 0x16, 0x46, 0xc0, 0x83, 0xe4, 0xbc, 0x09, 0xc8, 0xf1, 0x75, 0x5a, 0xa3, 0x02, 0xec, 0xf7, 0x91, 0x69, 0x79, 0x01, 0x9c, 0xad, 0x8b, 0xed, 0x73, 0x90, 0x07, 0x97, 0x0c, 0x2c, 0xee, 0x87, 0xd0, 0x25, 0x2c, 0xc6, 0x8f, 0x05, 0x6f, 0x71, 0x03, 0x30, 0xc6, 0x5f, 0xc5, 0x65, 0x51, 0x29, 0x73, 0x12, 0xb2, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2124 = { .name = "ecdsa_brainpoolp512r1_sha512_2124", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2124_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2124_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2124_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 174 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2125 for ECDSA, tcId is 175 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2125_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2125_msg[] = { 0x34, 0x34, 0x35, 0x39, 0x39, 0x30, 0x31, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2125_sig[] = { 0x01, 0x27, 0xad, 0xa3, 0x3f, 0xf4, 0xc6, 0x44, 0x1e, 0x79, 0xf6, 0x01, 0x46, 0x51, 0xdf, 0x82, 0xd4, 0xd1, 0x0c, 0xf4, 0x60, 0x1a, 0xc5, 0x67, 0xd4, 0x41, 0x42, 0xb0, 0xdc, 0xfc, 0x93, 0x3f, 0x7c, 0x8a, 0x2e, 0x23, 0x1d, 0x0d, 0x29, 0x0c, 0xbf, 0x04, 0x2d, 0xf6, 0x11, 0x2d, 0x6f, 0xe1, 0x6d, 0xdd, 0x2c, 0x1e, 0x96, 0xf7, 0x98, 0x20, 0x5c, 0xbf, 0x59, 0x52, 0x68, 0xa9, 0x41, 0x57, 0x22, 0x35, 0x41, 0x1c, 0x90, 0xcc, 0x9a, 0xc1, 0x87, 0x2d, 0x23, 0x8e, 0x7c, 0x7d, 0x8d, 0xeb, 0x07, 0x55, 0xb3, 0x66, 0x2c, 0xd9, 0xf2, 0x49, 0xbf, 0x3c, 0x84, 0x4e, 0x75, 0x0c, 0xf5, 0x8f, 0x90, 0xfe, 0x90, 0x8f, 0x28, 0xb1, 0x38, 0x67, 0x6e, 0xf9, 0xcb, 0x24, 0xef, 0xbb, 0xaf, 0xab, 0x8d, 0x3b, 0xeb, 0xc1, 0x77, 0xa5, 0xb3, 0x2a, 0x32, 0xd1, 0x7b, 0x91, 0xfc, 0x49, 0xb0, 0xdd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2125 = { .name = "ecdsa_brainpoolp512r1_sha512_2125", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2125_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2125_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2125_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 175 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2126 for ECDSA, tcId is 176 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2126_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2126_msg[] = { 0x31, 0x33, 0x39, 0x33, 0x39, 0x37, 0x31, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2126_sig[] = { 0x82, 0x44, 0xc7, 0x33, 0x17, 0xb5, 0x3e, 0x37, 0x47, 0x3d, 0x7b, 0xee, 0xf9, 0xf8, 0xe5, 0xbd, 0x31, 0xed, 0x80, 0x1f, 0x9b, 0xbd, 0xb9, 0x63, 0x9b, 0x7f, 0x0f, 0x24, 0xe0, 0x32, 0x9c, 0x79, 0x14, 0x95, 0x9b, 0xf0, 0xcd, 0x20, 0x06, 0x98, 0x6f, 0xa8, 0x1f, 0x7f, 0x4b, 0x40, 0x02, 0x50, 0x33, 0x43, 0xae, 0xc0, 0x46, 0x5d, 0x8f, 0x1e, 0xd1, 0x7c, 0x97, 0x74, 0x6e, 0xd6, 0xca, 0xed, 0x14, 0xbc, 0x6c, 0xc4, 0xd1, 0x55, 0x37, 0x71, 0x75, 0xea, 0x95, 0xc3, 0x59, 0xc6, 0x96, 0x24, 0xaf, 0xe1, 0x85, 0x79, 0x01, 0x44, 0x21, 0xb6, 0x6a, 0x14, 0x0e, 0x87, 0xc1, 0x43, 0x9f, 0x7d, 0x78, 0xf5, 0x64, 0x5d, 0x4b, 0xd8, 0xc0, 0x27, 0x54, 0x95, 0x26, 0x86, 0x58, 0x55, 0xff, 0xf0, 0xfc, 0x52, 0x7f, 0x49, 0x36, 0x23, 0xc3, 0x64, 0x7b, 0x5c, 0x90, 0x1d, 0x8d, 0xe4, 0xb8, 0x29, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2126 = { .name = "ecdsa_brainpoolp512r1_sha512_2126", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2126_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2126_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2126_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 176 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2127 for ECDSA, tcId is 177 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2127_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2127_msg[] = { 0x32, 0x33, 0x39, 0x30, 0x36, 0x39, 0x36, 0x34, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2127_sig[] = { 0x00, 0x11, 0xdd, 0xcc, 0x69, 0xdd, 0xa5, 0x67, 0x64, 0xaf, 0xdb, 0xea, 0xcd, 0x61, 0x5b, 0x3c, 0x29, 0x50, 0x58, 0x79, 0x43, 0x71, 0x6e, 0xd6, 0xda, 0xc7, 0x65, 0x86, 0x79, 0xa2, 0x1b, 0x2b, 0x4c, 0xdb, 0xe8, 0x5a, 0x5e, 0x40, 0x94, 0xde, 0xf2, 0x53, 0xed, 0xe5, 0x7f, 0x31, 0xef, 0x75, 0x88, 0xee, 0x31, 0x24, 0xd8, 0x05, 0xab, 0xc1, 0x2e, 0xcb, 0xf7, 0xf5, 0x5a, 0x7c, 0xb5, 0x5d, 0x11, 0x9d, 0x72, 0x2b, 0xc3, 0x72, 0xa4, 0xe6, 0xc5, 0xb4, 0xe3, 0x9f, 0xdf, 0x25, 0x81, 0x6f, 0x23, 0x87, 0xd0, 0x0e, 0xf0, 0x40, 0xd0, 0xad, 0x75, 0xbd, 0xa2, 0x79, 0x70, 0x00, 0x1c, 0xe5, 0xcd, 0xf5, 0xa2, 0xd4, 0xdd, 0x8b, 0xc8, 0x04, 0x21, 0x9f, 0xe8, 0xe9, 0x71, 0x52, 0x96, 0xad, 0xb5, 0x33, 0x03, 0xb9, 0x0f, 0x2c, 0x5c, 0x1f, 0x3f, 0x94, 0xb3, 0xf5, 0xf2, 0xfd, 0xa8, 0xc2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2127 = { .name = "ecdsa_brainpoolp512r1_sha512_2127", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2127_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2127_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2127_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 177 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2128 for ECDSA, tcId is 178 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2128_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2128_msg[] = { 0x31, 0x31, 0x34, 0x34, 0x36, 0x30, 0x35, 0x36, 0x32, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2128_sig[] = { 0x12, 0xe5, 0x9c, 0xd4, 0x84, 0xad, 0xba, 0x7d, 0x0f, 0xc2, 0xe4, 0x02, 0xd6, 0xca, 0xf0, 0xe4, 0x4a, 0x0e, 0xd2, 0x52, 0xa8, 0x91, 0x62, 0x3d, 0x26, 0x87, 0x90, 0x2b, 0x51, 0x83, 0x76, 0xef, 0xd7, 0x34, 0xa7, 0xb7, 0x53, 0x3d, 0x79, 0x7c, 0xe8, 0xf1, 0x45, 0x02, 0x8b, 0x42, 0x8c, 0x18, 0xf5, 0xf2, 0x04, 0x43, 0xc5, 0x3f, 0x04, 0xe6, 0x04, 0xaa, 0x31, 0x13, 0x15, 0xe9, 0x26, 0x6d, 0x47, 0x73, 0x6e, 0x60, 0x34, 0x5f, 0x1c, 0xb9, 0xbf, 0x7b, 0xd1, 0x17, 0xd8, 0xcb, 0x82, 0xc9, 0x41, 0x17, 0x9f, 0x08, 0x93, 0xa4, 0xb7, 0xd8, 0x76, 0x2f, 0x7b, 0xc9, 0x32, 0x20, 0x25, 0xa5, 0x64, 0xac, 0xbd, 0x7b, 0x3b, 0xb4, 0x7d, 0xe3, 0x84, 0xa4, 0x58, 0x2f, 0x33, 0x7b, 0x80, 0x9e, 0x84, 0xc4, 0x8b, 0x08, 0x61, 0x0a, 0x3d, 0xfd, 0x0c, 0x87, 0x5d, 0xfe, 0x9b, 0x88, 0x85, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2128 = { .name = "ecdsa_brainpoolp512r1_sha512_2128", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2128_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2128_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2128_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 178 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2129 for ECDSA, tcId is 179 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2129_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2129_msg[] = { 0x36, 0x38, 0x35, 0x30, 0x30, 0x34, 0x37, 0x35, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2129_sig[] = { 0x00, 0x9a, 0x5f, 0x64, 0x0c, 0xda, 0xaf, 0x26, 0xf1, 0xc1, 0x5c, 0xfc, 0x5c, 0x27, 0x49, 0x8a, 0x82, 0x31, 0x57, 0x1f, 0x22, 0x05, 0x31, 0x54, 0xcc, 0x2f, 0x52, 0x87, 0x7c, 0xbe, 0x5c, 0xf2, 0x89, 0xc5, 0x53, 0xd7, 0xbd, 0xf8, 0x6b, 0x19, 0x73, 0x26, 0x36, 0x04, 0xd5, 0x94, 0xe5, 0x29, 0xab, 0x2d, 0x1d, 0xf1, 0x06, 0x6d, 0x88, 0x5f, 0xd5, 0xa0, 0x61, 0xf6, 0x38, 0xe7, 0xa3, 0x46, 0x91, 0xfe, 0x33, 0xe0, 0x50, 0x74, 0x8b, 0xd7, 0xd7, 0x68, 0x83, 0xa0, 0x3d, 0x5f, 0x29, 0x76, 0x48, 0x7a, 0x03, 0x26, 0xa3, 0xa3, 0xc5, 0xef, 0x27, 0x6c, 0x38, 0xa9, 0xca, 0x09, 0x96, 0x25, 0x70, 0xec, 0xc8, 0xb8, 0x9f, 0x93, 0x1a, 0x14, 0x54, 0x97, 0xb7, 0x7a, 0x48, 0x2a, 0x73, 0x12, 0x89, 0xc2, 0xf7, 0x9c, 0x4a, 0x7b, 0x87, 0x19, 0x28, 0xb3, 0x9e, 0x94, 0xa1, 0x48, 0x8c, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2129 = { .name = "ecdsa_brainpoolp512r1_sha512_2129", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2129_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2129_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2129_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 179 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2130 for ECDSA, tcId is 180 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2130_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2130_msg[] = { 0x32, 0x32, 0x32, 0x30, 0x35, 0x33, 0x36, 0x30, 0x36, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2130_sig[] = { 0x68, 0xc0, 0x01, 0xac, 0x8c, 0x88, 0x04, 0xc0, 0xa9, 0xc3, 0x8f, 0x18, 0x10, 0x9e, 0x26, 0xb4, 0xe8, 0xa1, 0xba, 0x18, 0xd0, 0xfb, 0xa8, 0x54, 0x7f, 0x70, 0xe3, 0x98, 0x9f, 0x3c, 0x51, 0x08, 0x71, 0xe8, 0x0f, 0x8a, 0x7b, 0x31, 0x4f, 0xc5, 0x21, 0xb7, 0xc7, 0x9c, 0x3b, 0xb3, 0xb6, 0x91, 0x56, 0x0a, 0xb9, 0xd6, 0x99, 0xa2, 0x49, 0x15, 0xfc, 0x68, 0x2f, 0xda, 0xc1, 0xf0, 0x1c, 0x6f, 0x8c, 0x2f, 0xa0, 0xa4, 0xd9, 0x60, 0xd2, 0x68, 0x84, 0x42, 0xdb, 0xd6, 0x63, 0xe8, 0x5f, 0x46, 0xd8, 0x58, 0xfa, 0xaa, 0xff, 0x91, 0xb7, 0xba, 0x9a, 0xe9, 0x6b, 0xa6, 0x61, 0x96, 0x63, 0x78, 0x0f, 0x05, 0x95, 0x0d, 0x0a, 0xd8, 0x9b, 0x79, 0xcd, 0x69, 0x5d, 0x14, 0xde, 0xe5, 0x7f, 0x27, 0xbc, 0xa9, 0x9f, 0x01, 0x65, 0xf1, 0xd4, 0xbb, 0x12, 0x3d, 0x17, 0xb1, 0xa4, 0x6b, 0xda, 0x32, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2130 = { .name = "ecdsa_brainpoolp512r1_sha512_2130", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2130_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2130_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2130_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 180 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2131 for ECDSA, tcId is 181 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2131_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2131_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x36, 0x36, 0x35, 0x31, 0x32, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2131_sig[] = { 0x4b, 0x1e, 0x61, 0x39, 0x4e, 0x6c, 0x26, 0x2b, 0x1e, 0x4a, 0x63, 0xea, 0x7c, 0xf4, 0x1e, 0x66, 0x00, 0x20, 0xb2, 0x47, 0x35, 0x8d, 0x1b, 0x15, 0xaa, 0xec, 0x95, 0x33, 0xd5, 0x87, 0xd8, 0x24, 0x25, 0xa8, 0x60, 0xdc, 0x9f, 0x7a, 0x8e, 0x2b, 0x17, 0x61, 0x39, 0x3d, 0x3f, 0xc2, 0xa9, 0xd1, 0xac, 0x43, 0x3a, 0x06, 0x62, 0xa1, 0xe2, 0xee, 0x25, 0x55, 0xfc, 0x9c, 0x38, 0x49, 0xad, 0x4b, 0x86, 0xda, 0xeb, 0x19, 0x61, 0xef, 0x42, 0x2a, 0x09, 0xf5, 0x3b, 0xfa, 0x0e, 0x5f, 0xfc, 0x7f, 0x52, 0xa3, 0xb5, 0x5e, 0x76, 0xf0, 0xc2, 0xeb, 0xb7, 0xf8, 0xb0, 0x34, 0xb3, 0xcf, 0xaf, 0xf0, 0x8c, 0x52, 0x7a, 0x15, 0xa9, 0xf9, 0x7e, 0x8d, 0x09, 0xda, 0x81, 0x2e, 0x39, 0x5d, 0x5c, 0x61, 0x16, 0x80, 0xb7, 0xf6, 0x51, 0xd4, 0x16, 0x94, 0xf0, 0xb5, 0x8f, 0xe9, 0xeb, 0x31, 0x0b, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2131 = { .name = "ecdsa_brainpoolp512r1_sha512_2131", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2131_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2131_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2131_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 181 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2132 for ECDSA, tcId is 182 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2132_pubkey[] = { 0x6b, 0x67, 0x63, 0xa1, 0x86, 0xaa, 0x51, 0x59, 0x04, 0x9f, 0x2e, 0xa5, 0xc8, 0xa2, 0x32, 0xdc, 0xbe, 0x63, 0x37, 0xb0, 0xd9, 0x2e, 0x96, 0x9d, 0xa5, 0x2a, 0xf3, 0x25, 0x24, 0xf6, 0x1d, 0xa3, 0x09, 0x7f, 0xa3, 0x14, 0xac, 0x79, 0x22, 0x34, 0xe5, 0x98, 0x67, 0xaf, 0x32, 0x04, 0x78, 0x77, 0x4b, 0xd4, 0xc7, 0x85, 0xa0, 0x33, 0x06, 0x24, 0xc0, 0xb4, 0xba, 0xbe, 0x25, 0x7f, 0x65, 0x97, 0x2e, 0x40, 0x63, 0xe4, 0x5e, 0x13, 0xd5, 0x05, 0xe1, 0x4d, 0xb6, 0xf5, 0xfe, 0xf3, 0x53, 0x8d, 0xb1, 0x81, 0xcc, 0x1a, 0x6e, 0x0a, 0x93, 0x81, 0xfa, 0x3f, 0x03, 0x21, 0xbe, 0x47, 0xf4, 0x0d, 0xc0, 0x5a, 0xb8, 0x0e, 0x9c, 0xaa, 0x3b, 0x75, 0x59, 0xc6, 0x75, 0x35, 0xe8, 0x3d, 0x98, 0x4f, 0x3b, 0x95, 0x57, 0x11, 0x8d, 0xde, 0x29, 0xc5, 0xe7, 0xa5, 0xa4, 0xa1, 0x8d, 0x0c, 0x9d, 0x43, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2132_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2132_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x28, 0x0f, 0x3e, 0xbf, 0x4f, 0x1d, 0x42, 0x29, 0x6d, 0x47, 0x40, 0x11, 0x66, 0xf7, 0x70, 0x9f, 0x0a, 0xd0, 0x2b, 0xae, 0x25, 0x24, 0xeb, 0xa7, 0x73, 0x22, 0xc9, 0xd3, 0xbb, 0x91, 0x48, 0x89, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2132 = { .name = "ecdsa_brainpoolp512r1_sha512_2132", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2132_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2132_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2132_sig, .siglen = 128, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 182 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2133 for ECDSA, tcId is 183 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2133_pubkey[] = { 0x6b, 0x67, 0x63, 0xa1, 0x86, 0xaa, 0x51, 0x59, 0x04, 0x9f, 0x2e, 0xa5, 0xc8, 0xa2, 0x32, 0xdc, 0xbe, 0x63, 0x37, 0xb0, 0xd9, 0x2e, 0x96, 0x9d, 0xa5, 0x2a, 0xf3, 0x25, 0x24, 0xf6, 0x1d, 0xa3, 0x09, 0x7f, 0xa3, 0x14, 0xac, 0x79, 0x22, 0x34, 0xe5, 0x98, 0x67, 0xaf, 0x32, 0x04, 0x78, 0x77, 0x4b, 0xd4, 0xc7, 0x85, 0xa0, 0x33, 0x06, 0x24, 0xc0, 0xb4, 0xba, 0xbe, 0x25, 0x7f, 0x65, 0x97, 0x2e, 0x40, 0x63, 0xe4, 0x5e, 0x13, 0xd5, 0x05, 0xe1, 0x4d, 0xb6, 0xf5, 0xfe, 0xf3, 0x53, 0x8d, 0xb1, 0x81, 0xcc, 0x1a, 0x6e, 0x0a, 0x93, 0x81, 0xfa, 0x3f, 0x03, 0x21, 0xbe, 0x47, 0xf4, 0x0d, 0xc0, 0x5a, 0xb8, 0x0e, 0x9c, 0xaa, 0x3b, 0x75, 0x59, 0xc6, 0x75, 0x35, 0xe8, 0x3d, 0x98, 0x4f, 0x3b, 0x95, 0x57, 0x11, 0x8d, 0xde, 0x29, 0xc5, 0xe7, 0xa5, 0xa4, 0xa1, 0x8d, 0x0c, 0x9d, 0x43, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2133_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2133_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf2, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2133 = { .name = "ecdsa_brainpoolp512r1_sha512_2133", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2133_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2133_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2133_sig, .siglen = 128, .result = -1, .comment = "r too large, tcId is 183 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2134 for ECDSA, tcId is 184 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2134_pubkey[] = { 0x8f, 0x67, 0x69, 0x59, 0xbf, 0xda, 0x02, 0xd3, 0x73, 0x97, 0x7a, 0x80, 0x52, 0x8b, 0x61, 0xd4, 0x14, 0x8f, 0x8e, 0xab, 0xc2, 0x02, 0x7f, 0xb5, 0xb5, 0xdb, 0x58, 0x27, 0x67, 0x7d, 0x14, 0x7a, 0x72, 0x86, 0x61, 0xfd, 0x5c, 0x54, 0x6b, 0x6a, 0xd5, 0xf0, 0xa8, 0x9a, 0x34, 0x74, 0x49, 0xaa, 0x2f, 0x32, 0x11, 0x2e, 0x3b, 0xbd, 0xa8, 0x03, 0x50, 0x89, 0x54, 0x79, 0x29, 0xb5, 0x6a, 0x55, 0x78, 0xc4, 0x5c, 0xe0, 0xa6, 0x88, 0xae, 0xa3, 0x90, 0xd4, 0xe4, 0xdb, 0x4d, 0x48, 0xd2, 0xcd, 0xb2, 0x18, 0x65, 0xbc, 0x8c, 0xef, 0xd1, 0x5f, 0x2b, 0xba, 0xe4, 0x27, 0x0a, 0xb7, 0x65, 0xa7, 0x6f, 0x04, 0x94, 0x49, 0xf1, 0x7c, 0xe1, 0xac, 0x7f, 0x51, 0x39, 0x77, 0xce, 0x0a, 0x52, 0x37, 0xe5, 0xbd, 0x63, 0xb4, 0xaf, 0x92, 0xa6, 0xcf, 0x49, 0x18, 0xd9, 0x1b, 0xcc, 0xd0, 0xf2, 0x79, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2134_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2134_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x65, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2134 = { .name = "ecdsa_brainpoolp512r1_sha512_2134", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2134_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2134_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2134_sig, .siglen = 128, .result = 1, .comment = "r,s are large, tcId is 184 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2135 for ECDSA, tcId is 185 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2135_pubkey[] = { 0x14, 0xf3, 0x8a, 0xfb, 0xc8, 0xd6, 0xbe, 0x59, 0xee, 0x70, 0x75, 0xbd, 0xfd, 0x26, 0x16, 0xa4, 0x4b, 0x86, 0x53, 0x56, 0x87, 0xd0, 0x5c, 0x23, 0x47, 0x55, 0x31, 0x73, 0xcd, 0x14, 0xdf, 0x8a, 0xbd, 0x0a, 0x4c, 0x10, 0x2c, 0x62, 0xe8, 0x14, 0x11, 0x27, 0xdc, 0x66, 0xd2, 0xdc, 0xaa, 0xe3, 0x8c, 0x93, 0x24, 0x98, 0x0e, 0xde, 0x20, 0x46, 0x88, 0xbb, 0x9f, 0x91, 0x6b, 0xa9, 0xf1, 0xa8, 0x23, 0xf3, 0x58, 0x13, 0x93, 0x16, 0xca, 0x27, 0xb8, 0x87, 0x4e, 0x68, 0xb9, 0x33, 0x88, 0xf9, 0x78, 0x0d, 0x9b, 0xa7, 0xe2, 0x3b, 0x84, 0x21, 0xbf, 0xad, 0x38, 0xa1, 0x9e, 0xd1, 0x61, 0x47, 0x7e, 0x0a, 0x05, 0x38, 0x0b, 0xeb, 0xd7, 0xa1, 0x15, 0x6d, 0xc3, 0x2f, 0x69, 0x04, 0x76, 0x79, 0xfa, 0x2b, 0x97, 0x7f, 0xad, 0xc0, 0xc2, 0x9e, 0xbc, 0x1e, 0xbc, 0xea, 0x6c, 0xc1, 0x89, 0x4c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2135_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2135_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x43, 0x38, 0xed, 0x95, 0xac, 0x0d, 0x09, 0xc5, 0x1d, 0x70, 0x44, 0xd5, 0x9f, 0x1b, 0xc2, 0x6f, 0x8f, 0x3f, 0x11, 0xfc, 0x7b, 0xf2, 0xf8, 0x1b, 0xdf, 0x0b, 0x21, 0xb5, 0xc0, 0xb9, 0xc8, 0x9b, 0xea, 0x3c, 0xc6, 0xdd, 0x8b, 0x36, 0x92, 0xc8, 0x31, 0x0b, 0x98, 0x11, 0x7b, 0x50, 0x8d, 0x13, 0x00, 0x73, 0xe7, 0x4b, 0x02, 0xb3, 0xba, 0x48, 0x2f, 0xb0, 0xa5, 0xef, 0x10, 0x36, 0xa3, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2135 = { .name = "ecdsa_brainpoolp512r1_sha512_2135", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2135_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2135_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2135_sig, .siglen = 128, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 185 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2136 for ECDSA, tcId is 186 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2136_pubkey[] = { 0x3d, 0xf9, 0xe5, 0x86, 0x41, 0x0b, 0xa6, 0x33, 0xb9, 0xf1, 0x65, 0xd2, 0x9b, 0x07, 0x3b, 0x67, 0xa1, 0x67, 0x29, 0x7c, 0xb4, 0x08, 0x68, 0x89, 0xe5, 0x2b, 0x92, 0x5a, 0x9c, 0xb2, 0x5a, 0xcc, 0x4c, 0x85, 0xe5, 0xb8, 0x11, 0x22, 0x21, 0xba, 0x49, 0xec, 0xc9, 0x9a, 0x0c, 0xb7, 0xfb, 0x33, 0x85, 0x35, 0x2a, 0x71, 0x40, 0x07, 0x2f, 0x79, 0xc2, 0xf4, 0x43, 0x96, 0xee, 0x8b, 0x67, 0x86, 0x22, 0xc7, 0xb6, 0x18, 0x5e, 0x4b, 0x66, 0x7a, 0x5c, 0xc4, 0x27, 0xc9, 0x9c, 0xa5, 0x3f, 0xe5, 0x4f, 0x03, 0xdf, 0xee, 0xca, 0x92, 0xba, 0x2c, 0x1a, 0xe1, 0xf2, 0xb3, 0xfe, 0xeb, 0xed, 0xea, 0xba, 0x62, 0xee, 0x3b, 0xa0, 0x65, 0xac, 0x53, 0x03, 0xc2, 0xd5, 0x69, 0x69, 0xf0, 0xb3, 0x41, 0x48, 0x6f, 0x29, 0xf3, 0xb2, 0xa0, 0x6d, 0xf3, 0x28, 0x30, 0xf2, 0x59, 0x99, 0xc4, 0x2f, 0x88, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2136_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2136_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x39, 0xc9, 0x82, 0xe2, 0xa4, 0xf5, 0x60, 0xc5, 0x09, 0x05, 0x58, 0x88, 0xf6, 0x03, 0x17, 0xe6, 0xb5, 0xbb, 0x61, 0xd5, 0x94, 0xd7, 0xbd, 0x4f, 0x58, 0x97, 0x39, 0x6b, 0xf3, 0xe8, 0x1a, 0x09, 0xcf, 0x70, 0x3d, 0x31, 0x9f, 0x9b, 0x4a, 0x09, 0x2d, 0x46, 0xd5, 0xf2, 0x02, 0xff, 0x5d, 0xdb, 0x77, 0x6c, 0x57, 0xe8, 0xed, 0xe8, 0x45, 0x4d, 0xef, 0x70, 0x37, 0xb5, 0x41, 0xc9, 0x74, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2136 = { .name = "ecdsa_brainpoolp512r1_sha512_2136", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2136_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2136_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2136_sig, .siglen = 128, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 186 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2137 for ECDSA, tcId is 187 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2137_pubkey[] = { 0x0a, 0xd6, 0x6a, 0xbd, 0xba, 0x9f, 0xbe, 0xe1, 0xfd, 0xd1, 0xb9, 0xe0, 0xdb, 0x9a, 0x74, 0x60, 0xf4, 0x60, 0xde, 0x39, 0x16, 0xef, 0xd1, 0x6d, 0x7d, 0x9c, 0x6c, 0xc7, 0xa6, 0xcc, 0x9f, 0xa5, 0xcc, 0x03, 0x02, 0x0d, 0x9f, 0x8c, 0x90, 0x94, 0xc0, 0xcb, 0x52, 0xfe, 0x1b, 0xab, 0xd6, 0x3c, 0x69, 0xab, 0x20, 0xf0, 0x4a, 0x11, 0x6e, 0xce, 0xe3, 0xa0, 0x09, 0xd5, 0xac, 0xb5, 0x72, 0x9d, 0x5b, 0x47, 0x65, 0x85, 0x8f, 0x69, 0x6b, 0x61, 0xbf, 0x6b, 0x3a, 0x18, 0x12, 0xd0, 0x57, 0xbe, 0xe9, 0x3b, 0x14, 0x38, 0x36, 0xa7, 0x64, 0x92, 0x79, 0x71, 0xfb, 0x74, 0x61, 0x41, 0xb5, 0x42, 0x2f, 0xc0, 0x77, 0xf7, 0x3c, 0xaa, 0x00, 0x0f, 0x62, 0xce, 0x00, 0x10, 0x35, 0x02, 0xd1, 0xec, 0xb0, 0x95, 0x4f, 0x2c, 0xad, 0x60, 0xb2, 0x24, 0xec, 0x6f, 0xe1, 0x03, 0x30, 0x09, 0xd6, 0x4c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2137_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2137_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2137 = { .name = "ecdsa_brainpoolp512r1_sha512_2137", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2137_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2137_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2137_sig, .siglen = 128, .result = 1, .comment = "small r and s, tcId is 187 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2138 for ECDSA, tcId is 188 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2138_pubkey[] = { 0x0a, 0xd6, 0x6a, 0xbd, 0xba, 0x9f, 0xbe, 0xe1, 0xfd, 0xd1, 0xb9, 0xe0, 0xdb, 0x9a, 0x74, 0x60, 0xf4, 0x60, 0xde, 0x39, 0x16, 0xef, 0xd1, 0x6d, 0x7d, 0x9c, 0x6c, 0xc7, 0xa6, 0xcc, 0x9f, 0xa5, 0xcc, 0x03, 0x02, 0x0d, 0x9f, 0x8c, 0x90, 0x94, 0xc0, 0xcb, 0x52, 0xfe, 0x1b, 0xab, 0xd6, 0x3c, 0x69, 0xab, 0x20, 0xf0, 0x4a, 0x11, 0x6e, 0xce, 0xe3, 0xa0, 0x09, 0xd5, 0xac, 0xb5, 0x72, 0x9d, 0x5b, 0x47, 0x65, 0x85, 0x8f, 0x69, 0x6b, 0x61, 0xbf, 0x6b, 0x3a, 0x18, 0x12, 0xd0, 0x57, 0xbe, 0xe9, 0x3b, 0x14, 0x38, 0x36, 0xa7, 0x64, 0x92, 0x79, 0x71, 0xfb, 0x74, 0x61, 0x41, 0xb5, 0x42, 0x2f, 0xc0, 0x77, 0xf7, 0x3c, 0xaa, 0x00, 0x0f, 0x62, 0xce, 0x00, 0x10, 0x35, 0x02, 0xd1, 0xec, 0xb0, 0x95, 0x4f, 0x2c, 0xad, 0x60, 0xb2, 0x24, 0xec, 0x6f, 0xe1, 0x03, 0x30, 0x09, 0xd6, 0x4c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2138_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2138_sig[] = { 0x03, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2138 = { .name = "ecdsa_brainpoolp512r1_sha512_2138", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2138_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2138_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2138_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 188 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2139 for ECDSA, tcId is 189 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2139_pubkey[] = { 0x97, 0x41, 0xc2, 0x63, 0x4e, 0x42, 0xf1, 0x86, 0x56, 0x25, 0xa9, 0xd9, 0x7e, 0xbc, 0x54, 0x9a, 0xc8, 0xc6, 0x7e, 0xb6, 0xd0, 0x3c, 0xd2, 0xa7, 0xc5, 0x98, 0x7f, 0x0f, 0x51, 0x64, 0xc9, 0xbe, 0x97, 0x75, 0xe3, 0x2c, 0x5d, 0x59, 0xd3, 0x17, 0x5d, 0xe4, 0x68, 0xe2, 0x43, 0x59, 0x10, 0x21, 0xab, 0x62, 0x3f, 0x6b, 0x09, 0xb3, 0x1a, 0x40, 0x28, 0x63, 0x9b, 0x04, 0x16, 0x84, 0xf3, 0x59, 0x47, 0x0d, 0xdf, 0xf1, 0x73, 0xc6, 0x7c, 0x71, 0x05, 0x5f, 0x5f, 0x71, 0x5b, 0x7b, 0x74, 0x99, 0x38, 0x00, 0x30, 0x59, 0x38, 0xbb, 0xda, 0x89, 0xd2, 0x4b, 0x18, 0x7f, 0x48, 0x19, 0xc3, 0x05, 0x75, 0xd5, 0xe2, 0x27, 0x5f, 0x08, 0xcb, 0xf3, 0xba, 0x86, 0xb1, 0xa1, 0x1f, 0x12, 0x67, 0x1d, 0x2e, 0xb0, 0x09, 0xd0, 0x25, 0x16, 0xf3, 0xd1, 0xda, 0x0a, 0xaf, 0xcd, 0x1d, 0x81, 0xa0, 0xc1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2139_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2139_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2139 = { .name = "ecdsa_brainpoolp512r1_sha512_2139", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2139_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2139_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2139_sig, .siglen = 128, .result = 1, .comment = "small r and s, tcId is 189 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2140 for ECDSA, tcId is 190 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2140_pubkey[] = { 0x97, 0x41, 0xc2, 0x63, 0x4e, 0x42, 0xf1, 0x86, 0x56, 0x25, 0xa9, 0xd9, 0x7e, 0xbc, 0x54, 0x9a, 0xc8, 0xc6, 0x7e, 0xb6, 0xd0, 0x3c, 0xd2, 0xa7, 0xc5, 0x98, 0x7f, 0x0f, 0x51, 0x64, 0xc9, 0xbe, 0x97, 0x75, 0xe3, 0x2c, 0x5d, 0x59, 0xd3, 0x17, 0x5d, 0xe4, 0x68, 0xe2, 0x43, 0x59, 0x10, 0x21, 0xab, 0x62, 0x3f, 0x6b, 0x09, 0xb3, 0x1a, 0x40, 0x28, 0x63, 0x9b, 0x04, 0x16, 0x84, 0xf3, 0x59, 0x47, 0x0d, 0xdf, 0xf1, 0x73, 0xc6, 0x7c, 0x71, 0x05, 0x5f, 0x5f, 0x71, 0x5b, 0x7b, 0x74, 0x99, 0x38, 0x00, 0x30, 0x59, 0x38, 0xbb, 0xda, 0x89, 0xd2, 0x4b, 0x18, 0x7f, 0x48, 0x19, 0xc3, 0x05, 0x75, 0xd5, 0xe2, 0x27, 0x5f, 0x08, 0xcb, 0xf3, 0xba, 0x86, 0xb1, 0xa1, 0x1f, 0x12, 0x67, 0x1d, 0x2e, 0xb0, 0x09, 0xd0, 0x25, 0x16, 0xf3, 0xd1, 0xda, 0x0a, 0xaf, 0xcd, 0x1d, 0x81, 0xa0, 0xc1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2140_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2140_sig[] = { 0x03, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2140 = { .name = "ecdsa_brainpoolp512r1_sha512_2140", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2140_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2140_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2140_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 190 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2141 for ECDSA, tcId is 191 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2141_pubkey[] = { 0x8b, 0x06, 0xa7, 0x76, 0x16, 0xea, 0x21, 0xf1, 0x40, 0x93, 0xd3, 0xa3, 0x73, 0xa8, 0xf5, 0x71, 0x06, 0xa7, 0x19, 0x39, 0xf2, 0x54, 0x15, 0xf6, 0xa9, 0xaa, 0x00, 0x16, 0x40, 0xb5, 0xed, 0x0a, 0xdf, 0x39, 0xfc, 0x2f, 0x5e, 0x58, 0xd4, 0x23, 0x3c, 0x2e, 0xef, 0xe4, 0xf1, 0x70, 0x49, 0x9d, 0xa5, 0x7e, 0x9d, 0xce, 0xb7, 0xf8, 0xcd, 0x5f, 0x38, 0xc4, 0x18, 0x1f, 0xa7, 0xd2, 0xf7, 0x68, 0x07, 0x4a, 0x91, 0xe9, 0x9e, 0xab, 0xce, 0xd1, 0xbd, 0xa3, 0x58, 0x65, 0x3e, 0x09, 0xb5, 0x1e, 0xb8, 0xb1, 0xa9, 0x52, 0x6f, 0x5a, 0x1b, 0x32, 0xc7, 0xed, 0xd3, 0xb7, 0x01, 0xf5, 0xaf, 0x41, 0x03, 0x31, 0x49, 0x71, 0xd5, 0xc0, 0x82, 0xc5, 0xf2, 0x00, 0x53, 0xc3, 0xb6, 0x6d, 0x39, 0xa1, 0xcb, 0x6c, 0x4d, 0x31, 0x0d, 0xbe, 0x89, 0x55, 0x46, 0x89, 0x2d, 0x42, 0x96, 0xd9, 0x6e, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2141_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2141_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2141 = { .name = "ecdsa_brainpoolp512r1_sha512_2141", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2141_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2141_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2141_sig, .siglen = 128, .result = 1, .comment = "small r and s, tcId is 191 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2142 for ECDSA, tcId is 192 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2142_pubkey[] = { 0x8b, 0x06, 0xa7, 0x76, 0x16, 0xea, 0x21, 0xf1, 0x40, 0x93, 0xd3, 0xa3, 0x73, 0xa8, 0xf5, 0x71, 0x06, 0xa7, 0x19, 0x39, 0xf2, 0x54, 0x15, 0xf6, 0xa9, 0xaa, 0x00, 0x16, 0x40, 0xb5, 0xed, 0x0a, 0xdf, 0x39, 0xfc, 0x2f, 0x5e, 0x58, 0xd4, 0x23, 0x3c, 0x2e, 0xef, 0xe4, 0xf1, 0x70, 0x49, 0x9d, 0xa5, 0x7e, 0x9d, 0xce, 0xb7, 0xf8, 0xcd, 0x5f, 0x38, 0xc4, 0x18, 0x1f, 0xa7, 0xd2, 0xf7, 0x68, 0x07, 0x4a, 0x91, 0xe9, 0x9e, 0xab, 0xce, 0xd1, 0xbd, 0xa3, 0x58, 0x65, 0x3e, 0x09, 0xb5, 0x1e, 0xb8, 0xb1, 0xa9, 0x52, 0x6f, 0x5a, 0x1b, 0x32, 0xc7, 0xed, 0xd3, 0xb7, 0x01, 0xf5, 0xaf, 0x41, 0x03, 0x31, 0x49, 0x71, 0xd5, 0xc0, 0x82, 0xc5, 0xf2, 0x00, 0x53, 0xc3, 0xb6, 0x6d, 0x39, 0xa1, 0xcb, 0x6c, 0x4d, 0x31, 0x0d, 0xbe, 0x89, 0x55, 0x46, 0x89, 0x2d, 0x42, 0x96, 0xd9, 0x6e, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2142_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2142_sig[] = { 0x03, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2142 = { .name = "ecdsa_brainpoolp512r1_sha512_2142", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2142_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2142_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2142_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 192 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2143 for ECDSA, tcId is 193 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2143_pubkey[] = { 0x8b, 0x06, 0xa7, 0x76, 0x16, 0xea, 0x21, 0xf1, 0x40, 0x93, 0xd3, 0xa3, 0x73, 0xa8, 0xf5, 0x71, 0x06, 0xa7, 0x19, 0x39, 0xf2, 0x54, 0x15, 0xf6, 0xa9, 0xaa, 0x00, 0x16, 0x40, 0xb5, 0xed, 0x0a, 0xdf, 0x39, 0xfc, 0x2f, 0x5e, 0x58, 0xd4, 0x23, 0x3c, 0x2e, 0xef, 0xe4, 0xf1, 0x70, 0x49, 0x9d, 0xa5, 0x7e, 0x9d, 0xce, 0xb7, 0xf8, 0xcd, 0x5f, 0x38, 0xc4, 0x18, 0x1f, 0xa7, 0xd2, 0xf7, 0x68, 0x07, 0x4a, 0x91, 0xe9, 0x9e, 0xab, 0xce, 0xd1, 0xbd, 0xa3, 0x58, 0x65, 0x3e, 0x09, 0xb5, 0x1e, 0xb8, 0xb1, 0xa9, 0x52, 0x6f, 0x5a, 0x1b, 0x32, 0xc7, 0xed, 0xd3, 0xb7, 0x01, 0xf5, 0xaf, 0x41, 0x03, 0x31, 0x49, 0x71, 0xd5, 0xc0, 0x82, 0xc5, 0xf2, 0x00, 0x53, 0xc3, 0xb6, 0x6d, 0x39, 0xa1, 0xcb, 0x6c, 0x4d, 0x31, 0x0d, 0xbe, 0x89, 0x55, 0x46, 0x89, 0x2d, 0x42, 0x96, 0xd9, 0x6e, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2143_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2143_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2143 = { .name = "ecdsa_brainpoolp512r1_sha512_2143", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2143_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2143_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2143_sig, .siglen = 128, .result = -1, .comment = "r is larger than n, tcId is 193 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2144 for ECDSA, tcId is 194 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2144_pubkey[] = { 0x79, 0x2f, 0xec, 0xee, 0xb3, 0x16, 0x63, 0x56, 0xd1, 0x0a, 0xeb, 0x09, 0x40, 0x12, 0x42, 0x94, 0x34, 0x18, 0x02, 0x92, 0x4c, 0x79, 0xf2, 0x39, 0x1b, 0x77, 0x87, 0x56, 0x57, 0xc1, 0x7f, 0x55, 0x95, 0x5b, 0x28, 0x68, 0x5c, 0xc2, 0x20, 0x3f, 0x18, 0xc2, 0x20, 0x04, 0xba, 0xb1, 0xda, 0x51, 0x68, 0x96, 0xf0, 0x1b, 0x05, 0x29, 0xc8, 0x04, 0x24, 0x5b, 0xaa, 0x3a, 0x69, 0x30, 0xb3, 0x55, 0x26, 0xde, 0xb7, 0x3e, 0x37, 0x21, 0x76, 0xcc, 0x73, 0x58, 0xc0, 0x42, 0x47, 0x92, 0x3a, 0x79, 0x11, 0x81, 0xce, 0x72, 0xc1, 0x83, 0x50, 0x60, 0x46, 0xe6, 0x9d, 0xe4, 0x97, 0x6d, 0x4f, 0x26, 0x37, 0xf1, 0x1e, 0x70, 0x5f, 0x1f, 0x9a, 0x5a, 0x0f, 0x99, 0xee, 0xa1, 0x84, 0x1e, 0x54, 0x0c, 0x6a, 0xa4, 0x3d, 0x4f, 0xb2, 0x00, 0x30, 0xd7, 0x0d, 0x4a, 0x54, 0xfb, 0x6a, 0x6e, 0x85, 0x59, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2144_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2144_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xbb, 0xd6, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2144 = { .name = "ecdsa_brainpoolp512r1_sha512_2144", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2144_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2144_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2144_sig, .siglen = 128, .result = -1, .comment = "s is larger than n, tcId is 194 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2145 for ECDSA, tcId is 195 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2145_pubkey[] = { 0x81, 0xb4, 0x2a, 0xda, 0xac, 0x02, 0xa5, 0xfd, 0x87, 0xa0, 0x4a, 0x16, 0xdd, 0xc2, 0x33, 0x30, 0x75, 0x77, 0x8f, 0x13, 0x3e, 0xa0, 0xaf, 0x66, 0x04, 0x9c, 0x72, 0xa0, 0x67, 0x21, 0xe3, 0x92, 0x49, 0x79, 0x24, 0x9e, 0x04, 0x29, 0x1e, 0x4b, 0x99, 0xd4, 0xec, 0xf4, 0x48, 0xb3, 0xfd, 0xc5, 0xe5, 0x6e, 0xa2, 0x33, 0x81, 0xd6, 0xd0, 0x6e, 0x23, 0x01, 0x19, 0x65, 0xd1, 0x65, 0x38, 0x16, 0x24, 0x43, 0x27, 0xf9, 0xd5, 0x9c, 0xa6, 0x78, 0x75, 0x75, 0xbb, 0x77, 0x07, 0xef, 0x26, 0x72, 0xf1, 0x13, 0xba, 0x7a, 0x30, 0x2d, 0x69, 0xc2, 0x9f, 0xea, 0x6f, 0xf6, 0x6f, 0x44, 0x9d, 0xcd, 0x3b, 0x27, 0x3b, 0x33, 0x98, 0x48, 0x17, 0x76, 0xc2, 0xf2, 0xa6, 0x85, 0xcb, 0x6d, 0xde, 0x31, 0xe1, 0x76, 0xbe, 0x8f, 0x2b, 0x78, 0x5f, 0xed, 0x31, 0x3b, 0xe5, 0x73, 0x0c, 0x66, 0x24, 0xed, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2145_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2145_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x12, 0xd5, 0xe9, 0x12, 0x5c, 0xc7, 0x1f, 0xbe, 0xb8, 0x6c, 0x21, 0x7e, 0x09, 0xbd, 0x92, 0xb6, 0x46, 0xc6, 0xdd, 0x3a, 0x1b, 0xe1, 0xd6, 0xa6, 0xed, 0x4d, 0x80, 0x26, 0x71, 0x27, 0xe4, 0xb5, 0xb4, 0xbc, 0x4a, 0xac, 0x7d, 0x5d, 0x3a, 0xa0, 0x03, 0x31, 0x14, 0xc8, 0x5a, 0xac, 0x2a, 0x1b, 0xff, 0x3d, 0xef, 0x00, 0x1d, 0x24, 0x8d, 0x0a, 0x54, 0x83, 0xdc, 0x2e, 0xa6, 0x6f, 0x5a, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2145 = { .name = "ecdsa_brainpoolp512r1_sha512_2145", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2145_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2145_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2145_sig, .siglen = 128, .result = 1, .comment = "small r and s^-1, tcId is 195 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2146 for ECDSA, tcId is 196 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2146_pubkey[] = { 0x01, 0xa0, 0xe0, 0x0b, 0xb4, 0xa6, 0x69, 0xf1, 0x0f, 0x59, 0x44, 0x89, 0xa4, 0x2f, 0x1b, 0xab, 0xd3, 0xa0, 0x28, 0xb5, 0xea, 0x75, 0x75, 0x7a, 0x98, 0x6c, 0x55, 0xf6, 0x15, 0x94, 0x69, 0x75, 0x2b, 0x88, 0xbb, 0xe9, 0xf5, 0x2f, 0x24, 0x22, 0xd5, 0x03, 0xa4, 0xd9, 0xa8, 0x49, 0xc3, 0xda, 0xd4, 0x10, 0xa6, 0xdc, 0x4e, 0x4e, 0x32, 0xb9, 0x54, 0x69, 0xe0, 0x93, 0x86, 0x06, 0x34, 0x01, 0x57, 0x4c, 0x50, 0x11, 0x28, 0x90, 0x64, 0x59, 0xa2, 0x3a, 0xf9, 0x3b, 0x98, 0x30, 0xe2, 0x97, 0xf3, 0xe7, 0x3d, 0x31, 0x73, 0xdf, 0x78, 0x07, 0x67, 0x9b, 0x71, 0x3c, 0xe6, 0xb3, 0x4f, 0x64, 0xb1, 0xee, 0x75, 0x47, 0xb9, 0x27, 0xe4, 0x31, 0x05, 0x11, 0x8c, 0x49, 0x6b, 0x9a, 0x3c, 0x1e, 0x02, 0x64, 0xe8, 0x4b, 0x5b, 0x0f, 0xb4, 0x59, 0x58, 0x2a, 0xf9, 0x8e, 0xdf, 0x0c, 0x11, 0x7f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2146_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2146_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x76, 0x75, 0x2c, 0xe2, 0x89, 0xc3, 0x8f, 0x22, 0xde, 0x7f, 0x75, 0xd0, 0xfa, 0x6d, 0xa0, 0x56, 0xf4, 0x73, 0xc7, 0x71, 0x94, 0xde, 0x93, 0x1d, 0x97, 0xef, 0xd6, 0x54, 0x21, 0xff, 0x3e, 0xc8, 0x2c, 0x57, 0xa6, 0x39, 0x3a, 0x42, 0x70, 0x2e, 0x14, 0xa2, 0xd8, 0x31, 0x76, 0x88, 0x65, 0xab, 0x93, 0x32, 0x81, 0xab, 0xf1, 0xbc, 0xf5, 0x2a, 0x7e, 0xf6, 0xb7, 0x3f, 0x23, 0x73, 0xc9, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2146 = { .name = "ecdsa_brainpoolp512r1_sha512_2146", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2146_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2146_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2146_sig, .siglen = 128, .result = 1, .comment = "smallish r and s^-1, tcId is 196 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2147 for ECDSA, tcId is 197 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2147_pubkey[] = { 0x0d, 0xc4, 0xc5, 0x63, 0x9b, 0x76, 0x90, 0x15, 0x7c, 0x21, 0x0b, 0x75, 0xe7, 0xa0, 0x06, 0xd9, 0xcf, 0xdf, 0x80, 0xf9, 0xd0, 0xb2, 0xbb, 0xd6, 0x43, 0x03, 0x68, 0x90, 0xa8, 0x16, 0x8a, 0x88, 0x94, 0x7b, 0x19, 0x7a, 0xa9, 0xa6, 0x00, 0x47, 0xcd, 0x8f, 0x6e, 0x77, 0xc0, 0x77, 0x7b, 0xb9, 0xe0, 0x9d, 0xa7, 0x37, 0xdb, 0xbe, 0x57, 0xa9, 0x77, 0xa6, 0xae, 0x07, 0x07, 0x98, 0x35, 0x64, 0x60, 0xb0, 0xa4, 0x9d, 0x4f, 0x95, 0x78, 0x27, 0x3f, 0x6e, 0x5a, 0xb3, 0x87, 0x31, 0x94, 0x29, 0x2e, 0x89, 0x3e, 0x06, 0xc5, 0xa3, 0x9b, 0xb1, 0xf8, 0xa0, 0x55, 0x1f, 0x4e, 0x01, 0xca, 0x46, 0x0a, 0x03, 0xa7, 0x7c, 0x35, 0xcf, 0xf8, 0xd7, 0xd6, 0xe0, 0xf3, 0x3b, 0x8a, 0x88, 0xac, 0xdc, 0x36, 0xea, 0xe5, 0xa8, 0x3a, 0x12, 0x9b, 0xfe, 0xec, 0xc2, 0xa6, 0x89, 0x36, 0x88, 0x3d, 0x91, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2147_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2147_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfd, 0x9c, 0xe7, 0x66, 0x00, 0x6a, 0x51, 0x30, 0x00, 0x5e, 0x79, 0xca, 0xdd, 0xba, 0x04, 0x30, 0x27, 0x08, 0x48, 0x7a, 0x27, 0x82, 0x3b, 0xd1, 0xd3, 0xd9, 0xca, 0x0a, 0x80, 0x1f, 0x4f, 0xbc, 0x0b, 0x83, 0x12, 0x6a, 0xa1, 0x91, 0x1a, 0xd4, 0x4a, 0xfd, 0x6a, 0x77, 0x0c, 0x75, 0x3d, 0x61, 0x9f, 0xef, 0x70, 0x7e, 0x7c, 0x77, 0x3f, 0x46, 0x7d, 0xe5, 0x73, 0x8b, 0x35, 0x33, 0x38, 0x93, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2147 = { .name = "ecdsa_brainpoolp512r1_sha512_2147", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2147_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2147_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2147_sig, .siglen = 128, .result = 1, .comment = "100-bit r and small s^-1, tcId is 197 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2148 for ECDSA, tcId is 198 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2148_pubkey[] = { 0x86, 0x7d, 0xfd, 0xd7, 0x26, 0xce, 0xe9, 0x31, 0x25, 0x6d, 0xd9, 0xaa, 0xe0, 0xc1, 0xa6, 0x60, 0xa1, 0x2b, 0x1d, 0xfd, 0x6b, 0xaf, 0x18, 0x0b, 0x35, 0xe3, 0x9c, 0x0f, 0x93, 0xcb, 0xf9, 0x80, 0x0c, 0x5c, 0xf1, 0x1b, 0x29, 0xf1, 0x86, 0x78, 0xd3, 0x25, 0x12, 0x1f, 0xb2, 0x86, 0x54, 0x5a, 0x51, 0x2d, 0xd8, 0xf6, 0xc2, 0xcb, 0x81, 0xe5, 0x98, 0xd0, 0x5f, 0xc4, 0x0c, 0xfc, 0xf9, 0xdc, 0x91, 0xd4, 0xd2, 0x15, 0x3f, 0x66, 0x75, 0x93, 0xe2, 0x5f, 0xee, 0x42, 0xe3, 0x9d, 0xaf, 0xd1, 0x81, 0x19, 0x74, 0x94, 0x3e, 0x87, 0x5d, 0xfc, 0xc6, 0xba, 0xdc, 0x0e, 0xa2, 0x2d, 0xb4, 0x21, 0x26, 0x37, 0xbe, 0x71, 0xc6, 0xb7, 0x43, 0x75, 0xc4, 0x3c, 0xfb, 0xf7, 0x19, 0x08, 0x86, 0x91, 0xae, 0xc7, 0x0e, 0x69, 0x1e, 0x46, 0xed, 0xfe, 0x8c, 0xcd, 0xb4, 0xce, 0xfc, 0xb1, 0x35, 0x1e, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2148_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2148_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x02, 0x9c, 0x0d, 0xe2, 0x21, 0x6b, 0xab, 0x72, 0xaf, 0x9e, 0xc8, 0x23, 0x41, 0x1e, 0x7e, 0xe4, 0x44, 0x48, 0x2b, 0xc2, 0x68, 0xae, 0x1b, 0xa9, 0x06, 0x4e, 0x04, 0x01, 0x96, 0x09, 0x75, 0x7d, 0x95, 0xb2, 0xe0, 0xc5, 0xa3, 0xfd, 0xe3, 0x77, 0xa8, 0x7f, 0xcd, 0x38, 0xb3, 0x2f, 0x80, 0x61, 0xbd, 0x3d, 0xc8, 0x1c, 0xbb, 0xdb, 0x96, 0xca, 0x62, 0x6e, 0x65, 0x82, 0xba, 0x61, 0xdc, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2148 = { .name = "ecdsa_brainpoolp512r1_sha512_2148", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2148_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2148_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2148_sig, .siglen = 128, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 198 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2149 for ECDSA, tcId is 199 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2149_pubkey[] = { 0x34, 0x30, 0x8c, 0x7d, 0x6e, 0xaa, 0x1b, 0xd7, 0xd8, 0xed, 0xc0, 0x2f, 0xc6, 0x27, 0x7c, 0x52, 0x71, 0xca, 0x84, 0x74, 0x28, 0xff, 0x21, 0x0d, 0x60, 0x78, 0xec, 0x96, 0x8d, 0xf4, 0xe8, 0x73, 0x0e, 0x21, 0xbc, 0x77, 0x15, 0xa7, 0xee, 0x85, 0xa7, 0x35, 0x28, 0x02, 0x46, 0x6c, 0x0a, 0xb2, 0x35, 0x60, 0x92, 0x9b, 0xab, 0x49, 0x29, 0x65, 0x09, 0x93, 0x7f, 0xe7, 0xcd, 0x6e, 0xdc, 0x02, 0x36, 0x49, 0x1a, 0x29, 0xb8, 0x6e, 0xa0, 0xe6, 0x12, 0x4f, 0x4b, 0x72, 0x10, 0x1f, 0x48, 0x23, 0x0b, 0xdc, 0x1f, 0x5b, 0x36, 0xd2, 0xe6, 0x50, 0x0c, 0x3f, 0xfd, 0x4b, 0xa9, 0x81, 0x8b, 0x43, 0x50, 0x46, 0x33, 0x5a, 0x2d, 0xa1, 0x5a, 0x89, 0xbc, 0x51, 0x11, 0x72, 0x04, 0xd3, 0x30, 0x83, 0x2a, 0xbc, 0x0f, 0x7b, 0x09, 0xa5, 0x9d, 0x82, 0xbb, 0xb0, 0x1d, 0x71, 0x76, 0x2d, 0x8d, 0xf5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2149_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2149_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x25, 0x02, 0x9c, 0x0d, 0xe2, 0x21, 0x6b, 0xab, 0x72, 0xaf, 0x9e, 0xc8, 0x23, 0x41, 0x1e, 0x7e, 0xe4, 0x44, 0x48, 0x2b, 0xc2, 0x68, 0xae, 0x1b, 0xa9, 0x06, 0x4e, 0x04, 0x01, 0x96, 0x09, 0x75, 0x7d, 0x95, 0xb2, 0xe0, 0xc5, 0xa3, 0xfd, 0xe3, 0x77, 0xa8, 0x7f, 0xcd, 0x38, 0xb3, 0x2f, 0x80, 0x61, 0xbd, 0x3d, 0xc8, 0x1c, 0xbb, 0xdb, 0x96, 0xca, 0x62, 0x6e, 0x65, 0x82, 0xba, 0x61, 0xdc, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2149 = { .name = "ecdsa_brainpoolp512r1_sha512_2149", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2149_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2149_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2149_sig, .siglen = 128, .result = 1, .comment = "100-bit r and s^-1, tcId is 199 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2150 for ECDSA, tcId is 200 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2150_pubkey[] = { 0x78, 0xd3, 0x5a, 0x1c, 0x8a, 0x83, 0x99, 0x73, 0x00, 0xa0, 0x2e, 0xb4, 0x77, 0x91, 0x6e, 0x70, 0x95, 0xb0, 0x01, 0xbf, 0xc4, 0x73, 0x41, 0x52, 0x8f, 0x75, 0xc6, 0xce, 0xbe, 0xfd, 0x2d, 0x59, 0xc5, 0xd5, 0xef, 0xae, 0xae, 0x9c, 0x5b, 0xd8, 0xad, 0x4b, 0xdb, 0xad, 0x76, 0xda, 0x1c, 0xbc, 0xd3, 0x54, 0x7a, 0x95, 0xd3, 0x92, 0xdf, 0xf5, 0x3c, 0xe8, 0x5b, 0xc4, 0xe4, 0xb2, 0x3f, 0xf9, 0x4b, 0xb3, 0x42, 0x7e, 0x60, 0x74, 0x13, 0x8f, 0xc0, 0xe4, 0x38, 0x32, 0x0a, 0x31, 0x4e, 0x20, 0x36, 0x71, 0x37, 0x13, 0x3b, 0x4f, 0xee, 0x63, 0xd8, 0x0e, 0xcf, 0xb5, 0x93, 0x16, 0x66, 0xb0, 0x87, 0x3d, 0xcd, 0x45, 0x6a, 0x36, 0x99, 0x4e, 0xdf, 0xda, 0x75, 0xb0, 0xf3, 0xea, 0x81, 0x73, 0x22, 0x77, 0xe7, 0x7a, 0xdc, 0x43, 0xa4, 0x81, 0xff, 0x0f, 0x0e, 0xd4, 0xd2, 0xf3, 0x7f, 0xf0, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2150_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2150_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa8, 0xff, 0xe9, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2150 = { .name = "ecdsa_brainpoolp512r1_sha512_2150", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2150_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2150_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2150_sig, .siglen = 128, .result = 1, .comment = "r and s^-1 are close to n, tcId is 200 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2151 for ECDSA, tcId is 201 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2151_pubkey[] = { 0x90, 0x19, 0xbe, 0x20, 0xf6, 0x40, 0xec, 0xb2, 0xb7, 0xc3, 0x31, 0x1b, 0xcd, 0xa8, 0x70, 0x95, 0x49, 0x38, 0xa7, 0x80, 0x68, 0x6c, 0x06, 0x3f, 0xe0, 0xab, 0x26, 0xf5, 0x7b, 0xa6, 0x05, 0x11, 0xff, 0x3c, 0xee, 0x32, 0x86, 0xd8, 0xd9, 0x04, 0x87, 0xeb, 0x80, 0x14, 0x78, 0x8a, 0x1f, 0x13, 0x4e, 0xd5, 0x9a, 0x77, 0x4f, 0xdb, 0x8b, 0x0d, 0x24, 0x77, 0x0b, 0xf2, 0x30, 0x1b, 0x2d, 0x18, 0x08, 0xfe, 0x93, 0x4d, 0xc9, 0x11, 0xd1, 0x5c, 0x44, 0xe5, 0x9b, 0x90, 0x26, 0x81, 0x1e, 0x7c, 0xd8, 0xfd, 0xd8, 0x74, 0x41, 0x0d, 0x51, 0xa5, 0x6f, 0x5a, 0xea, 0x13, 0x7b, 0xfc, 0x4a, 0x8e, 0x85, 0xb7, 0xeb, 0xa7, 0x52, 0x89, 0x49, 0xcd, 0xab, 0xc4, 0xd3, 0x3a, 0xef, 0x16, 0x15, 0x7d, 0x14, 0xe3, 0xf5, 0xf6, 0x8b, 0xde, 0x5d, 0xe1, 0xc5, 0x19, 0x69, 0x17, 0xa5, 0x6d, 0xab, 0x29, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2151_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2151_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2151 = { .name = "ecdsa_brainpoolp512r1_sha512_2151", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2151_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2151_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2151_sig, .siglen = 128, .result = 1, .comment = "s == 1, tcId is 201 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2152 for ECDSA, tcId is 202 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2152_pubkey[] = { 0x90, 0x19, 0xbe, 0x20, 0xf6, 0x40, 0xec, 0xb2, 0xb7, 0xc3, 0x31, 0x1b, 0xcd, 0xa8, 0x70, 0x95, 0x49, 0x38, 0xa7, 0x80, 0x68, 0x6c, 0x06, 0x3f, 0xe0, 0xab, 0x26, 0xf5, 0x7b, 0xa6, 0x05, 0x11, 0xff, 0x3c, 0xee, 0x32, 0x86, 0xd8, 0xd9, 0x04, 0x87, 0xeb, 0x80, 0x14, 0x78, 0x8a, 0x1f, 0x13, 0x4e, 0xd5, 0x9a, 0x77, 0x4f, 0xdb, 0x8b, 0x0d, 0x24, 0x77, 0x0b, 0xf2, 0x30, 0x1b, 0x2d, 0x18, 0x08, 0xfe, 0x93, 0x4d, 0xc9, 0x11, 0xd1, 0x5c, 0x44, 0xe5, 0x9b, 0x90, 0x26, 0x81, 0x1e, 0x7c, 0xd8, 0xfd, 0xd8, 0x74, 0x41, 0x0d, 0x51, 0xa5, 0x6f, 0x5a, 0xea, 0x13, 0x7b, 0xfc, 0x4a, 0x8e, 0x85, 0xb7, 0xeb, 0xa7, 0x52, 0x89, 0x49, 0xcd, 0xab, 0xc4, 0xd3, 0x3a, 0xef, 0x16, 0x15, 0x7d, 0x14, 0xe3, 0xf5, 0xf6, 0x8b, 0xde, 0x5d, 0xe1, 0xc5, 0x19, 0x69, 0x17, 0xa5, 0x6d, 0xab, 0x29, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2152_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2152_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2152 = { .name = "ecdsa_brainpoolp512r1_sha512_2152", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2152_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2152_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2152_sig, .siglen = 128, .result = -1, .comment = "s == 0, tcId is 202 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2153 for ECDSA, tcId is 203 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2153_pubkey[] = { 0x41, 0x7d, 0xb8, 0xe9, 0x5f, 0x89, 0x13, 0x14, 0x57, 0x98, 0x3e, 0x75, 0x37, 0x90, 0x09, 0x90, 0x5d, 0x2d, 0x80, 0x08, 0xb7, 0x90, 0x51, 0x9d, 0x65, 0xe6, 0x50, 0xd3, 0xb6, 0x0a, 0x32, 0x56, 0x3c, 0x18, 0xc5, 0xaf, 0xd0, 0x6c, 0xa3, 0x14, 0xbc, 0x3a, 0x17, 0x74, 0x60, 0x87, 0xa5, 0x78, 0xce, 0x78, 0xcb, 0xb6, 0x0c, 0xb5, 0x99, 0xcf, 0x0d, 0xd9, 0xcf, 0xf2, 0x2a, 0xcb, 0x84, 0xcf, 0x0b, 0x86, 0xf2, 0xe5, 0x7c, 0xe2, 0x98, 0xc8, 0x5b, 0xc2, 0x8f, 0x3d, 0x02, 0x74, 0xcf, 0x31, 0x40, 0xea, 0x5f, 0xc6, 0x01, 0x5f, 0x4b, 0x63, 0x6f, 0xb2, 0x71, 0xda, 0x09, 0x44, 0x5e, 0x15, 0xad, 0xcb, 0x60, 0xae, 0x1f, 0x6d, 0x00, 0x1a, 0xd4, 0xe2, 0x5e, 0x6d, 0x69, 0x76, 0x72, 0x36, 0xcc, 0x16, 0xe7, 0x25, 0xf5, 0xd7, 0xb2, 0xaf, 0x44, 0x99, 0x39, 0x01, 0x7a, 0x8c, 0x8c, 0x85, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2153_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2153_sig[] = { 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2153 = { .name = "ecdsa_brainpoolp512r1_sha512_2153", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2153_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2153_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2153_sig, .siglen = 128, .result = -1, .comment = "point at infinity during verify, tcId is 203 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2154 for ECDSA, tcId is 204 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2154_pubkey[] = { 0x9a, 0x8e, 0x0c, 0x2a, 0xa4, 0x95, 0x52, 0x03, 0xdf, 0x86, 0x6d, 0x44, 0xea, 0x32, 0x0d, 0x62, 0xfa, 0x43, 0xf1, 0xba, 0xea, 0xbc, 0xcd, 0x34, 0xec, 0x08, 0x49, 0xb3, 0xfa, 0x19, 0xbe, 0x29, 0x00, 0xca, 0x10, 0x67, 0x7c, 0x03, 0x6d, 0xa9, 0xdb, 0xb5, 0x1c, 0xa6, 0x03, 0x81, 0xcd, 0x58, 0xdf, 0xab, 0x9b, 0x2a, 0x1f, 0x6f, 0x77, 0x6b, 0x71, 0x2a, 0x22, 0xd6, 0x57, 0x57, 0x85, 0xd5, 0x1b, 0xed, 0x65, 0x2c, 0xf7, 0x75, 0xd9, 0x1b, 0xff, 0x11, 0xf9, 0x88, 0x65, 0x4a, 0xde, 0x8d, 0xd2, 0x84, 0x15, 0xb7, 0xc0, 0xde, 0x7d, 0x2c, 0x74, 0x24, 0x25, 0x6c, 0x3f, 0xd7, 0x1e, 0x9c, 0x4f, 0xab, 0xf1, 0xef, 0xf3, 0x80, 0xfd, 0xe6, 0xf8, 0xa8, 0xfe, 0x0d, 0x15, 0x60, 0xd1, 0x21, 0xba, 0x65, 0x61, 0x84, 0x51, 0xef, 0x60, 0xf9, 0x35, 0xd2, 0x92, 0xac, 0x2a, 0x26, 0x72, 0x9c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2154_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2154_sig[] = { 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2154 = { .name = "ecdsa_brainpoolp512r1_sha512_2154", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2154_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2154_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2154_sig, .siglen = 128, .result = 1, .comment = "edge case for signature malleability, tcId is 204 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2155 for ECDSA, tcId is 205 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2155_pubkey[] = { 0x23, 0xfa, 0xce, 0x62, 0x06, 0x2c, 0xed, 0x95, 0xc7, 0x88, 0x8f, 0xcf, 0x7d, 0x4c, 0x5a, 0xf3, 0xd2, 0xa2, 0xa1, 0xcb, 0xf0, 0x86, 0x93, 0x26, 0x49, 0x69, 0x62, 0x18, 0x82, 0x73, 0x8a, 0xd7, 0x98, 0x47, 0x6f, 0xac, 0x70, 0x36, 0x1b, 0xbf, 0x2c, 0xc7, 0x9c, 0x24, 0x9f, 0xc5, 0x02, 0x71, 0xc1, 0xbf, 0xdc, 0x3f, 0x5b, 0xca, 0x20, 0xeb, 0xcc, 0xea, 0x8c, 0x36, 0x58, 0xf8, 0xd4, 0xe3, 0x07, 0x3c, 0x1a, 0x74, 0xb3, 0xc4, 0x6a, 0x20, 0x5d, 0x97, 0x07, 0x78, 0x33, 0xdc, 0xa1, 0xf3, 0x63, 0xf7, 0x6f, 0x67, 0xb6, 0x8e, 0xe1, 0x76, 0x43, 0x85, 0x28, 0xaa, 0x76, 0xab, 0xbc, 0x36, 0xb6, 0xf0, 0xa9, 0x88, 0xfb, 0x22, 0x5f, 0xe7, 0xa3, 0x3e, 0xe8, 0x85, 0x1f, 0xf2, 0x4e, 0x37, 0x13, 0x82, 0x43, 0xe2, 0xb2, 0x1d, 0xa8, 0x52, 0xa3, 0x34, 0xdb, 0xd0, 0x36, 0xcf, 0x10, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2155_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2155_sig[] = { 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x35, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2155 = { .name = "ecdsa_brainpoolp512r1_sha512_2155", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2155_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2155_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2155_sig, .siglen = 128, .result = 1, .comment = "edge case for signature malleability, tcId is 205 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2156 for ECDSA, tcId is 206 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2156_pubkey[] = { 0x38, 0x59, 0x7c, 0x68, 0xea, 0xbf, 0xbe, 0x64, 0x8b, 0xca, 0x0b, 0x3e, 0x8d, 0x23, 0x5f, 0x90, 0x82, 0xcf, 0x15, 0xd6, 0x94, 0xe1, 0x4e, 0x68, 0x6b, 0x1e, 0x0a, 0x89, 0xb7, 0x3e, 0x3d, 0xbc, 0x34, 0x6e, 0xbb, 0xde, 0x38, 0xda, 0x2c, 0x60, 0x2f, 0xe9, 0x75, 0xc2, 0x1a, 0x1f, 0xbc, 0x8f, 0x36, 0x3b, 0x59, 0x29, 0x03, 0xd0, 0x2d, 0x44, 0x34, 0xfa, 0xe5, 0x2e, 0xe8, 0xcc, 0x3b, 0x3a, 0x57, 0x2b, 0x82, 0x08, 0x47, 0x47, 0xea, 0x5a, 0xf0, 0x63, 0x39, 0x36, 0xb5, 0x70, 0x35, 0x43, 0x65, 0xee, 0x2d, 0x7f, 0xba, 0x4c, 0x40, 0x4b, 0xd6, 0x94, 0x58, 0xeb, 0x82, 0x50, 0x07, 0xed, 0x89, 0x06, 0x7e, 0xff, 0xec, 0x6b, 0x2e, 0x67, 0xc3, 0x2d, 0x19, 0x7e, 0x8c, 0x28, 0xec, 0xfe, 0xfa, 0x7e, 0xe7, 0x9c, 0xea, 0x09, 0xd7, 0xeb, 0x24, 0x89, 0x25, 0xc5, 0x43, 0xc3, 0x0b, 0xa5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2156_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2156_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x23, 0x21, 0x02, 0x81, 0x75, 0x7b, 0x30, 0xe1, 0x92, 0x18, 0xa3, 0x7c, 0xbd, 0x61, 0x20, 0x86, 0xfb, 0xc1, 0x58, 0xca, 0xa8, 0xb4, 0xe1, 0xac, 0xb2, 0xec, 0x00, 0x83, 0x7e, 0x5d, 0x94, 0x1f, 0x34, 0x2f, 0xb3, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2156 = { .name = "ecdsa_brainpoolp512r1_sha512_2156", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2156_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2156_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2156_sig, .siglen = 128, .result = 1, .comment = "u1 == 1, tcId is 206 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2157 for ECDSA, tcId is 207 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2157_pubkey[] = { 0x9d, 0x60, 0xec, 0x91, 0x97, 0x6a, 0x8f, 0xc7, 0xf8, 0x42, 0x28, 0x76, 0xcc, 0xb2, 0x28, 0x70, 0xec, 0xa8, 0xd3, 0x9b, 0x8c, 0xdf, 0xc3, 0x01, 0x93, 0xe3, 0xbb, 0x22, 0xa1, 0x0e, 0x37, 0xc5, 0x37, 0xa0, 0x92, 0xdb, 0xb0, 0x12, 0x4c, 0x8c, 0x4b, 0x26, 0x65, 0x5a, 0xd9, 0x61, 0x27, 0xd3, 0x14, 0x0b, 0xc1, 0xf9, 0x55, 0x6e, 0xba, 0xbf, 0x47, 0x7f, 0xd9, 0x59, 0x51, 0xb4, 0xb0, 0xdd, 0x2b, 0xc1, 0xfc, 0xd7, 0xd6, 0x84, 0x0f, 0xd8, 0x3a, 0x5e, 0x98, 0x23, 0x61, 0xc3, 0x04, 0xa3, 0x4e, 0xd1, 0x0e, 0x87, 0x3a, 0xa4, 0x63, 0x7e, 0xca, 0xc2, 0x9f, 0x55, 0x5c, 0x05, 0x26, 0xb5, 0x19, 0xc2, 0x38, 0xce, 0x0b, 0x00, 0x2d, 0x7e, 0x2f, 0x98, 0x22, 0x5d, 0xec, 0x88, 0x4c, 0x95, 0xd7, 0x42, 0xe8, 0x6f, 0xa6, 0x8c, 0xe6, 0xe8, 0x1f, 0x65, 0x42, 0xfe, 0x81, 0x73, 0x0c, 0xfb, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2157_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2157_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x66, 0xe5, 0x9c, 0xbc, 0xf0, 0xf0, 0xa0, 0xfe, 0xe7, 0x25, 0x6d, 0x52, 0x66, 0x1c, 0xf7, 0x4b, 0x81, 0x63, 0x08, 0xa7, 0x7a, 0x7c, 0x9e, 0x8c, 0x41, 0x30, 0x46, 0x1a, 0x4d, 0x12, 0x05, 0xee, 0xdf, 0xc3, 0x2b, 0x5f, 0xba, 0x90, 0x82, 0x9c, 0x84, 0x25, 0x40, 0x92, 0x83, 0xea, 0xb7, 0x7c, 0x74, 0xfc, 0xf1, 0xd4, 0x55, 0x71, 0xda, 0x5a, 0x37, 0x2a, 0x02, 0x63, 0x68, 0x79, 0x4c, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2157 = { .name = "ecdsa_brainpoolp512r1_sha512_2157", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2157_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2157_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2157_sig, .siglen = 128, .result = 1, .comment = "u1 == n - 1, tcId is 207 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2158 for ECDSA, tcId is 208 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2158_pubkey[] = { 0xa9, 0x11, 0xdf, 0x35, 0x0e, 0x95, 0xc0, 0xda, 0x4d, 0x56, 0xc3, 0xc4, 0x4a, 0x84, 0xaa, 0xd8, 0x8e, 0xe8, 0x5e, 0x62, 0x8c, 0xcc, 0x44, 0xc5, 0xe1, 0x31, 0xdf, 0xad, 0x8a, 0x3f, 0xc6, 0x9e, 0xed, 0x9c, 0x62, 0x0e, 0xd8, 0xc8, 0x21, 0xc8, 0x4d, 0xe2, 0xc2, 0x11, 0x3c, 0x1d, 0x6c, 0x10, 0xaa, 0xea, 0x55, 0x44, 0x90, 0x3b, 0x1d, 0x59, 0x67, 0x8d, 0x39, 0xb0, 0x52, 0xe0, 0xf1, 0xb3, 0xa2, 0xc1, 0x6d, 0x1e, 0x74, 0xae, 0x6f, 0xd9, 0x93, 0xb9, 0x86, 0x23, 0x46, 0x65, 0xed, 0xa1, 0x4f, 0xf6, 0x78, 0xe5, 0x8c, 0x41, 0x4a, 0xe5, 0x5d, 0xe8, 0xaa, 0x1e, 0xda, 0x26, 0x24, 0x2d, 0x61, 0x6b, 0x26, 0x7e, 0x6f, 0xdb, 0x74, 0x91, 0xef, 0xb5, 0xa3, 0xc1, 0x79, 0xb8, 0x49, 0x03, 0x12, 0x70, 0x70, 0xe5, 0xe2, 0x59, 0x7d, 0x2f, 0x0b, 0x2a, 0xf3, 0x33, 0xb6, 0x34, 0x98, 0x57, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2158_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2158_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2158 = { .name = "ecdsa_brainpoolp512r1_sha512_2158", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2158_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2158_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2158_sig, .siglen = 128, .result = 1, .comment = "u2 == 1, tcId is 208 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2159 for ECDSA, tcId is 209 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2159_pubkey[] = { 0x01, 0x82, 0x3d, 0xb8, 0xfd, 0x2b, 0xa4, 0xa3, 0x4b, 0xac, 0xc4, 0xf6, 0x42, 0x83, 0x90, 0x9f, 0x4d, 0x01, 0xd0, 0x2b, 0x8d, 0xb6, 0x6f, 0x9c, 0xb9, 0xbd, 0x77, 0x80, 0x6b, 0x89, 0x0b, 0xa3, 0x1a, 0x69, 0x15, 0xb9, 0x3d, 0xcb, 0xdd, 0x72, 0xc8, 0x33, 0x38, 0xeb, 0x60, 0x29, 0xf2, 0x2c, 0x31, 0x79, 0x57, 0x12, 0xb1, 0xac, 0x7a, 0x1f, 0xb8, 0x1a, 0x30, 0x4e, 0x3c, 0x58, 0xd8, 0xd5, 0x4e, 0xc2, 0x67, 0xba, 0xd3, 0x98, 0x4a, 0x3e, 0x2f, 0xd8, 0x7d, 0xef, 0xbe, 0x86, 0x3d, 0x73, 0x88, 0x58, 0x72, 0x48, 0x8b, 0xdd, 0xa9, 0xd6, 0xe3, 0xda, 0x8e, 0xcf, 0x8e, 0xab, 0xfd, 0x46, 0x74, 0xd2, 0x01, 0x27, 0x8f, 0xfc, 0x63, 0xcb, 0xc1, 0xff, 0xa0, 0xf9, 0x9e, 0xb5, 0xe8, 0x5c, 0x9b, 0x20, 0xae, 0x10, 0xa2, 0x26, 0xe1, 0xe5, 0x59, 0x4c, 0xa7, 0x8f, 0xc0, 0xd5, 0x31, 0xd8, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2159_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2159_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x71, 0xe9, 0x13, 0xd0, 0x92, 0x9b, 0xd8, 0x5c, 0xd5, 0x38, 0x99, 0xc9, 0x77, 0xdb, 0xfd, 0x5a, 0x87, 0x75, 0xb3, 0xcd, 0x22, 0x86, 0x8c, 0x09, 0xe4, 0x42, 0x68, 0x86, 0xf5, 0x77, 0x5a, 0xf5, 0x8e, 0x29, 0x92, 0xd6, 0x33, 0x1b, 0x6e, 0xbb, 0x81, 0x04, 0x40, 0xbb, 0xaa, 0x72, 0xb5, 0x84, 0xbe, 0x76, 0x8d, 0x00, 0xb0, 0x3e, 0x91, 0xe9, 0x23, 0xaf, 0xb9, 0xac, 0x68, 0x70, 0xaa, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2159 = { .name = "ecdsa_brainpoolp512r1_sha512_2159", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2159_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2159_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2159_sig, .siglen = 128, .result = 1, .comment = "u2 == n - 1, tcId is 209 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2160 for ECDSA, tcId is 210 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2160_pubkey[] = { 0x9f, 0xa4, 0x44, 0x01, 0xdb, 0x09, 0x8e, 0x9f, 0x28, 0x57, 0x9a, 0xaf, 0x02, 0xad, 0xff, 0x61, 0xfa, 0xf1, 0xe6, 0xf7, 0x03, 0x9c, 0xf1, 0xb3, 0x13, 0x4b, 0x83, 0xdf, 0xba, 0x96, 0x2b, 0x13, 0xa4, 0x39, 0x7d, 0xcd, 0xd6, 0xfe, 0xef, 0x4b, 0x64, 0xfc, 0x32, 0xeb, 0x3d, 0xfb, 0xa3, 0xf5, 0x96, 0xf5, 0xf7, 0x5b, 0xea, 0xbd, 0x3d, 0xad, 0xe4, 0x84, 0x08, 0x93, 0x10, 0xb6, 0x58, 0x22, 0x8b, 0xb1, 0x89, 0x7c, 0x75, 0xda, 0x51, 0xe5, 0x6d, 0xb1, 0x9d, 0x8d, 0xf1, 0x36, 0x23, 0x75, 0x4a, 0x0d, 0xb9, 0xd6, 0xda, 0x50, 0x02, 0xff, 0xc8, 0xa7, 0x3b, 0xe2, 0x1b, 0x80, 0xee, 0xec, 0xca, 0x35, 0xec, 0x54, 0x1e, 0x81, 0x83, 0x1b, 0x3f, 0xec, 0x4c, 0xc3, 0x19, 0x3d, 0xc5, 0x92, 0x9f, 0x12, 0xc4, 0xc4, 0x63, 0xa4, 0x10, 0x79, 0x11, 0xbb, 0xb0, 0xf1, 0x5a, 0xe3, 0x90, 0xef, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2160_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2160_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x4f, 0x9c, 0x8a, 0x3c, 0x42, 0x4b, 0xa2, 0xb2, 0x88, 0x2c, 0x20, 0x03, 0x55, 0xd2, 0x55, 0x96, 0xb1, 0xaa, 0x06, 0x3f, 0xf9, 0xb2, 0x57, 0x30, 0x79, 0x32, 0x51, 0x28, 0xdb, 0xc6, 0xae, 0x50, 0x98, 0xe8, 0x84, 0x60, 0xf4, 0xeb, 0x43, 0x31, 0xff, 0xa2, 0x80, 0x8a, 0xd3, 0xcf, 0x23, 0x05, 0xec, 0xcc, 0xe7, 0x0f, 0x3e, 0x6d, 0xf3, 0xcb, 0x11, 0x4c, 0x63, 0x8b, 0x45, 0x9d, 0x91, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2160 = { .name = "ecdsa_brainpoolp512r1_sha512_2160", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2160_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2160_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2160_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 210 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2161 for ECDSA, tcId is 211 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2161_pubkey[] = { 0x0f, 0xe7, 0xf7, 0xca, 0x44, 0x45, 0x35, 0x60, 0xe1, 0xba, 0x38, 0xb3, 0x4e, 0xc8, 0xdf, 0xbc, 0x74, 0x5e, 0xde, 0xfc, 0x58, 0x87, 0x82, 0x55, 0x45, 0x2f, 0x61, 0x4f, 0xee, 0x56, 0x1a, 0x8a, 0x62, 0x0b, 0x4d, 0x86, 0x24, 0xe1, 0x59, 0xbd, 0x48, 0x3d, 0xb0, 0x8c, 0x9a, 0x62, 0x10, 0x0f, 0xd2, 0xea, 0x69, 0xef, 0x73, 0x81, 0xf5, 0x20, 0xab, 0xe6, 0x51, 0xb2, 0xea, 0x22, 0x6e, 0xea, 0x15, 0x6e, 0x75, 0xaf, 0x46, 0x5b, 0x22, 0xd2, 0x26, 0x40, 0x83, 0x14, 0x53, 0x6d, 0x42, 0x38, 0xa7, 0x39, 0xfd, 0x2f, 0x40, 0x03, 0xba, 0xc5, 0x52, 0xae, 0x34, 0xbf, 0xa2, 0x7e, 0x9b, 0xe4, 0x60, 0xfe, 0x40, 0xa5, 0x46, 0x8c, 0xed, 0xd3, 0x22, 0x10, 0x48, 0xcd, 0x1b, 0x8d, 0x79, 0x6b, 0xc2, 0x74, 0x94, 0x56, 0x5f, 0x88, 0xaa, 0xf7, 0xfc, 0xcc, 0x4c, 0x0f, 0xc3, 0x6b, 0x78, 0xb1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2161_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2161_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x28, 0x20, 0xc6, 0x03, 0x53, 0x4f, 0x43, 0x0d, 0xb8, 0xe4, 0x97, 0x27, 0x24, 0x4a, 0x31, 0x6a, 0xcd, 0x6e, 0xa3, 0x07, 0x33, 0x07, 0x0d, 0xc4, 0xfd, 0xd2, 0x4e, 0x22, 0x11, 0xdd, 0xed, 0x80, 0x59, 0x7a, 0x9c, 0xb6, 0xbd, 0x86, 0x6f, 0x37, 0xb2, 0x55, 0x05, 0x7a, 0xb7, 0x71, 0x92, 0x5e, 0xb4, 0x39, 0x29, 0x33, 0x19, 0xa9, 0xa2, 0xc1, 0x2d, 0xc0, 0xb7, 0xcb, 0x1d, 0xbf, 0x4f, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2161 = { .name = "ecdsa_brainpoolp512r1_sha512_2161", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2161_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2161_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2161_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 211 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2162 for ECDSA, tcId is 212 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2162_pubkey[] = { 0x99, 0xe5, 0xc3, 0xad, 0x1e, 0xf5, 0x3a, 0xd7, 0x80, 0xc3, 0xc4, 0xd9, 0x0c, 0x27, 0xcc, 0x19, 0x86, 0x49, 0x6a, 0x21, 0x5b, 0x25, 0x82, 0x9a, 0x88, 0xde, 0x20, 0x0a, 0x9c, 0x21, 0x46, 0xae, 0xc8, 0xf1, 0x82, 0xdc, 0x6d, 0xec, 0x66, 0x11, 0xc7, 0xff, 0xda, 0x1a, 0x55, 0xb0, 0xcc, 0xb2, 0x04, 0x5b, 0x1e, 0xd5, 0xc9, 0x23, 0x1b, 0x9e, 0xb3, 0xcb, 0x23, 0x24, 0x17, 0xe2, 0xfc, 0xfa, 0x35, 0xe8, 0xb3, 0xf6, 0x04, 0xf5, 0xd7, 0x93, 0xd1, 0x35, 0xce, 0x06, 0xe2, 0x3f, 0xc6, 0xac, 0x82, 0xc0, 0x99, 0x7d, 0xe9, 0xe3, 0xf4, 0xd2, 0xdc, 0x36, 0x36, 0xba, 0x0b, 0x52, 0x1c, 0x78, 0x57, 0x76, 0xdb, 0xc8, 0xd4, 0x8d, 0xa5, 0xd5, 0x9a, 0x86, 0xfb, 0x3e, 0x90, 0xfb, 0x00, 0xbc, 0xcb, 0x01, 0x7d, 0x25, 0x10, 0x0b, 0xe8, 0xe3, 0x5d, 0xb1, 0xdf, 0xb5, 0xb4, 0x49, 0x67, 0xef, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2162_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2162_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x6e, 0x5d, 0x2d, 0xd1, 0xe3, 0xd2, 0x78, 0xeb, 0xc6, 0xf7, 0x34, 0x09, 0x65, 0x1e, 0xbc, 0x46, 0xb6, 0x5c, 0x6c, 0x3e, 0xfe, 0x11, 0x65, 0xb7, 0x4b, 0x51, 0x64, 0x35, 0x67, 0x83, 0x25, 0x1e, 0x3b, 0xb6, 0x66, 0x80, 0x4f, 0xaa, 0x7b, 0xf3, 0x89, 0xb5, 0xff, 0x28, 0x5b, 0x66, 0xb9, 0x12, 0xc5, 0x1c, 0x47, 0x8c, 0x58, 0xcd, 0x2d, 0xbe, 0x52, 0x93, 0xd9, 0x57, 0x35, 0xab, 0x94, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2162 = { .name = "ecdsa_brainpoolp512r1_sha512_2162", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2162_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2162_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2162_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 212 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2163 for ECDSA, tcId is 213 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2163_pubkey[] = { 0x42, 0x3f, 0xc7, 0xaa, 0x8d, 0x6d, 0x77, 0xfa, 0xe6, 0x0b, 0xeb, 0xce, 0x77, 0x57, 0xe1, 0x56, 0x89, 0x42, 0x6c, 0xba, 0xbd, 0x2c, 0x3f, 0xa6, 0xff, 0x71, 0xda, 0x77, 0x65, 0xab, 0x88, 0x7a, 0x93, 0xc9, 0x3c, 0xb8, 0xe1, 0x00, 0x88, 0x92, 0xc0, 0xd8, 0xf1, 0xe0, 0x3e, 0x48, 0x55, 0x5c, 0x81, 0xdf, 0xc4, 0x33, 0xd4, 0x2f, 0x48, 0x90, 0xb7, 0x11, 0x77, 0xb8, 0x48, 0xaa, 0xb9, 0xcc, 0x1f, 0xf6, 0xab, 0xd7, 0xc7, 0xf9, 0x53, 0xde, 0x79, 0x74, 0x80, 0xe2, 0x92, 0xb9, 0x87, 0xdd, 0xf4, 0x75, 0x70, 0xd8, 0x8d, 0xc5, 0xe5, 0x1c, 0x7a, 0x47, 0xc3, 0x57, 0xd7, 0x19, 0x78, 0x19, 0x09, 0x31, 0x97, 0x6f, 0x55, 0xcc, 0x84, 0xc3, 0xa4, 0xcd, 0x46, 0x35, 0xed, 0x5b, 0xa4, 0x92, 0x0e, 0xfa, 0x82, 0x19, 0xc7, 0xaa, 0x16, 0x85, 0xbf, 0x1a, 0x9b, 0xc7, 0x12, 0x9f, 0xa2, 0xcb, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2163_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2163_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2b, 0xd0, 0xea, 0x22, 0xdf, 0x17, 0xe2, 0xf0, 0x85, 0x40, 0x94, 0x00, 0x2d, 0xf5, 0x6a, 0x63, 0xda, 0x80, 0x71, 0x32, 0x74, 0xb5, 0x19, 0x23, 0x27, 0xb1, 0xd8, 0x6c, 0x25, 0x64, 0x37, 0xbd, 0x10, 0xf7, 0xa2, 0x1e, 0x1c, 0x74, 0x80, 0x83, 0x6d, 0xea, 0x40, 0xf5, 0x6e, 0xe9, 0xb5, 0x81, 0x0c, 0x68, 0xf2, 0xa0, 0x6e, 0x72, 0x8a, 0x80, 0x2d, 0x01, 0xb5, 0xa5, 0x14, 0xdb, 0x69, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2163 = { .name = "ecdsa_brainpoolp512r1_sha512_2163", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2163_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2163_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2163_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 213 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2164 for ECDSA, tcId is 214 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2164_pubkey[] = { 0x41, 0x5e, 0x9d, 0x50, 0xaf, 0x5d, 0xa7, 0x11, 0x89, 0x60, 0x78, 0x11, 0x68, 0x0d, 0xc1, 0x6d, 0x3d, 0xa9, 0xa0, 0xe3, 0x39, 0xa5, 0x3d, 0x16, 0x6b, 0x9b, 0x22, 0x68, 0x06, 0xa6, 0xff, 0xda, 0xe0, 0x1e, 0xb4, 0x02, 0x95, 0xcf, 0x5e, 0x00, 0xf4, 0x7d, 0xdf, 0x0b, 0x4a, 0xfa, 0x67, 0x29, 0xa8, 0xf7, 0xd1, 0x8a, 0x43, 0x7d, 0x15, 0x7d, 0xf4, 0xd9, 0x9c, 0x19, 0x18, 0x1e, 0xf5, 0x24, 0x90, 0x7e, 0xfd, 0xc1, 0x5b, 0x33, 0x86, 0x64, 0xe9, 0x11, 0xb6, 0x2f, 0x9a, 0xc0, 0x15, 0xd9, 0xe3, 0x6b, 0xb7, 0xbe, 0x0c, 0xcc, 0xdf, 0x33, 0x05, 0x17, 0xd5, 0x29, 0x70, 0xda, 0xb1, 0x88, 0x48, 0xbc, 0xe0, 0xbf, 0xdf, 0xc0, 0xbd, 0x39, 0xc6, 0x75, 0x75, 0x36, 0x66, 0x03, 0x6e, 0x4c, 0x4c, 0x5e, 0xb0, 0xc6, 0x23, 0x21, 0xb2, 0x2b, 0xd1, 0xcb, 0x1f, 0xa3, 0x52, 0x67, 0x0f, 0xbc, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2164_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2164_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x3d, 0xa9, 0x45, 0xbb, 0x81, 0x5e, 0xe5, 0x30, 0x3a, 0x05, 0xdc, 0x5e, 0xec, 0x32, 0x85, 0xb0, 0xa1, 0xed, 0xf4, 0x3b, 0xe7, 0xca, 0xa1, 0x9f, 0xc8, 0xf5, 0xac, 0x06, 0x12, 0x2b, 0x34, 0x51, 0xd8, 0x5b, 0x7d, 0xf2, 0xda, 0x41, 0xf3, 0x47, 0xe2, 0xe5, 0x14, 0x58, 0xf3, 0x9d, 0x4d, 0x16, 0xc3, 0xcc, 0x87, 0xaa, 0xd7, 0xb4, 0x51, 0x75, 0x8d, 0x3a, 0xfd, 0x97, 0x29, 0x65, 0x91, 0x56, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2164 = { .name = "ecdsa_brainpoolp512r1_sha512_2164", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2164_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2164_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2164_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 214 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2165 for ECDSA, tcId is 215 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2165_pubkey[] = { 0x2c, 0x65, 0xb6, 0x1f, 0xa1, 0xf4, 0xd3, 0xc8, 0x6c, 0x82, 0x9d, 0x15, 0xd4, 0xde, 0x5b, 0x47, 0xc5, 0xb7, 0x89, 0xf5, 0x3a, 0x43, 0x55, 0x66, 0x1f, 0x09, 0xee, 0xf3, 0xb9, 0x7b, 0x21, 0xa3, 0xb9, 0x3f, 0xae, 0x0f, 0x03, 0x5b, 0xf3, 0x47, 0xa3, 0x15, 0x59, 0x47, 0x85, 0x05, 0x9b, 0x37, 0xcc, 0xf8, 0x06, 0x2a, 0x39, 0x1a, 0xce, 0x30, 0xe6, 0x9a, 0x98, 0x4d, 0x84, 0x17, 0xca, 0x2c, 0x34, 0x1a, 0x80, 0x19, 0x65, 0x3a, 0xd6, 0x17, 0xda, 0x57, 0xc9, 0x99, 0x7c, 0x2d, 0xeb, 0xfa, 0xf3, 0x40, 0xa6, 0x78, 0x0b, 0xd8, 0x37, 0x1a, 0xee, 0x2c, 0x66, 0x8b, 0x7d, 0xcc, 0x70, 0xfe, 0x06, 0x78, 0x9b, 0x8f, 0x36, 0xf8, 0xf1, 0x3f, 0x40, 0x82, 0x2f, 0x04, 0x01, 0x10, 0x2e, 0x03, 0x74, 0x2c, 0x8f, 0xfa, 0xa1, 0xdc, 0xf0, 0xba, 0xf9, 0x81, 0xc7, 0xec, 0xc1, 0xa7, 0xe2, 0x78, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2165_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2165_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x7b, 0x52, 0x8b, 0x77, 0x02, 0xbd, 0xca, 0x60, 0x74, 0x0b, 0xb8, 0xbd, 0xd8, 0x65, 0x0b, 0x61, 0x43, 0xdb, 0xe8, 0x77, 0xcf, 0x95, 0x43, 0x3f, 0x91, 0xeb, 0x58, 0x0c, 0x24, 0x56, 0x68, 0xa3, 0xb0, 0xb6, 0xfb, 0xe5, 0xb4, 0x83, 0xe6, 0x8f, 0xc5, 0xca, 0x28, 0xb1, 0xe7, 0x3a, 0x9a, 0x2d, 0x87, 0x99, 0x0f, 0x55, 0xaf, 0x68, 0xa2, 0xeb, 0x1a, 0x75, 0xfb, 0x2e, 0x52, 0xcb, 0x22, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2165 = { .name = "ecdsa_brainpoolp512r1_sha512_2165", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2165_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2165_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2165_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 215 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2166 for ECDSA, tcId is 216 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2166_pubkey[] = { 0x6a, 0x82, 0x22, 0xda, 0x63, 0x25, 0x50, 0xf8, 0x5a, 0x0d, 0x59, 0xfa, 0x8e, 0x8f, 0x32, 0x7e, 0x16, 0x27, 0x4b, 0x63, 0x97, 0xd5, 0xa4, 0x2a, 0xa1, 0xbf, 0x6f, 0x1a, 0x1b, 0x5c, 0xed, 0xd3, 0xa1, 0x18, 0x2d, 0xd0, 0xf2, 0x2f, 0xca, 0x69, 0x0c, 0x5e, 0xf5, 0xa2, 0x61, 0xe6, 0xe5, 0xd8, 0xba, 0xe3, 0x4f, 0x2e, 0x1a, 0xe2, 0x94, 0xb5, 0x0a, 0x28, 0x7c, 0x88, 0x25, 0x74, 0xee, 0x7c, 0x82, 0xd8, 0x62, 0x18, 0x78, 0x23, 0x38, 0x75, 0x7b, 0x9b, 0xab, 0x35, 0x9e, 0x63, 0x51, 0x6c, 0xe3, 0xdb, 0xf5, 0xe7, 0xfd, 0xbd, 0x5b, 0xaa, 0x4a, 0xe9, 0x97, 0x13, 0xfe, 0x5d, 0xd8, 0x5b, 0xb6, 0x1e, 0xa1, 0x2a, 0x17, 0x8c, 0xfb, 0x50, 0xa2, 0x5e, 0xef, 0x41, 0xa0, 0x85, 0xdc, 0xd5, 0xe5, 0xb8, 0x8f, 0x14, 0x8b, 0xad, 0xf4, 0xc8, 0xf4, 0x03, 0x1e, 0x03, 0xd4, 0x9a, 0xec, 0x6b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2166_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2166_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2d, 0x17, 0x04, 0x8e, 0xe5, 0x7e, 0x45, 0xb6, 0x60, 0x57, 0xac, 0xfa, 0xb9, 0xc3, 0xb2, 0xa4, 0x93, 0x9e, 0x81, 0xb1, 0xeb, 0x0f, 0x89, 0x72, 0xa8, 0xc2, 0xb5, 0xaa, 0x6b, 0x04, 0xc1, 0x55, 0x84, 0x89, 0x4e, 0x16, 0x8e, 0x15, 0xdc, 0x5c, 0xf8, 0x89, 0xfa, 0x09, 0xf7, 0x93, 0x4d, 0x10, 0x84, 0xde, 0xf3, 0x51, 0x04, 0x2c, 0x2b, 0x97, 0xcd, 0xe3, 0xc1, 0x00, 0xb8, 0x94, 0xba, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2166 = { .name = "ecdsa_brainpoolp512r1_sha512_2166", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2166_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2166_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2166_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 216 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2167 for ECDSA, tcId is 217 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2167_pubkey[] = { 0xaa, 0x17, 0xb5, 0xbd, 0x2b, 0xbf, 0xce, 0x1a, 0xe1, 0x33, 0xe2, 0x47, 0x9f, 0xe1, 0xf8, 0x7e, 0x64, 0xe6, 0x16, 0x58, 0x97, 0xee, 0x45, 0x73, 0x91, 0xbc, 0x2d, 0xae, 0xe9, 0xfd, 0x76, 0x86, 0xb8, 0xd4, 0xbe, 0xc8, 0xec, 0xfa, 0x8a, 0x56, 0x93, 0xf3, 0x9b, 0x4e, 0xf9, 0xb4, 0x16, 0x3c, 0xdb, 0xc5, 0xc4, 0x54, 0x6f, 0xad, 0xba, 0x0c, 0xfe, 0x3e, 0x15, 0x32, 0xea, 0x2a, 0xad, 0xd4, 0x73, 0xfa, 0x93, 0x03, 0x97, 0x17, 0xf9, 0xdf, 0xd4, 0x9a, 0x9c, 0x28, 0x84, 0xdc, 0x2d, 0x10, 0x12, 0xd7, 0x1d, 0x60, 0x54, 0xea, 0x0f, 0x39, 0x16, 0x85, 0xbd, 0xe5, 0xe8, 0xc0, 0xd5, 0xd6, 0x11, 0xb4, 0x0b, 0xd1, 0xfb, 0xe3, 0x5d, 0xc5, 0xbd, 0x7e, 0x91, 0x6d, 0xdc, 0x9a, 0x66, 0xba, 0x54, 0xae, 0x89, 0x49, 0x77, 0x6f, 0x2f, 0x21, 0xd4, 0xcf, 0x54, 0xb2, 0xf6, 0xc7, 0x57, 0xc5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2167_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2167_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2b, 0x18, 0x98, 0x6d, 0x87, 0xbd, 0x21, 0xcd, 0xcb, 0xf0, 0xf1, 0x31, 0x03, 0x79, 0x47, 0x35, 0x97, 0x93, 0x54, 0x29, 0x0c, 0x43, 0xaa, 0x8c, 0x29, 0x8d, 0xbd, 0x47, 0x3d, 0xe5, 0xa3, 0x89, 0xcb, 0x55, 0xf0, 0x0c, 0x21, 0x84, 0xa2, 0x35, 0xf6, 0xb7, 0x34, 0x73, 0x05, 0x92, 0x6c, 0x0e, 0x25, 0x78, 0x5e, 0xca, 0x6d, 0x98, 0xeb, 0x2b, 0xd9, 0x21, 0x56, 0x21, 0x64, 0xf3, 0x65, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2167 = { .name = "ecdsa_brainpoolp512r1_sha512_2167", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2167_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2167_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2167_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 217 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2168 for ECDSA, tcId is 218 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2168_pubkey[] = { 0xa7, 0x2d, 0xe8, 0xd4, 0xd2, 0x89, 0x6f, 0x9b, 0xc6, 0xd7, 0x2a, 0x68, 0xf8, 0xb2, 0x58, 0x8f, 0xa2, 0xec, 0xb4, 0x99, 0x2e, 0x8e, 0x36, 0x16, 0xfd, 0x58, 0xa1, 0xa1, 0x2f, 0x03, 0x27, 0xdb, 0x1f, 0xc3, 0x74, 0x0e, 0xd3, 0x84, 0x02, 0x20, 0x78, 0x15, 0x6f, 0xe6, 0x67, 0x12, 0xbf, 0x09, 0x2c, 0xab, 0xbc, 0x43, 0x65, 0x9c, 0xdd, 0xc9, 0xcf, 0x3d, 0xbf, 0x80, 0x7b, 0xcf, 0x36, 0x35, 0x88, 0x19, 0x31, 0x9a, 0xef, 0x0e, 0x23, 0xb1, 0x42, 0xe7, 0x5d, 0x9c, 0x4c, 0x13, 0x98, 0x12, 0xe5, 0x5e, 0x1c, 0x41, 0x9d, 0x96, 0x08, 0x4a, 0x68, 0xb9, 0x50, 0x35, 0x6c, 0x46, 0xeb, 0x23, 0x57, 0x51, 0x2f, 0x20, 0x8b, 0xb1, 0xdb, 0xe9, 0x70, 0xd1, 0x90, 0x0c, 0x8d, 0xfd, 0xa7, 0x7d, 0x2f, 0x47, 0x77, 0x60, 0xdb, 0x63, 0xd2, 0x28, 0xdb, 0xf8, 0xb3, 0x42, 0x26, 0x5b, 0xcb, 0xde, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2168_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2168_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x44, 0x5f, 0x8c, 0xaa, 0xf2, 0x09, 0x3f, 0x68, 0x82, 0xbc, 0x6c, 0x7a, 0xf5, 0x37, 0xeb, 0xac, 0xbf, 0x86, 0x20, 0xf0, 0xb6, 0xac, 0x68, 0xa1, 0x9a, 0x5d, 0xe1, 0x93, 0x52, 0x25, 0xcc, 0x94, 0x9c, 0x24, 0x36, 0x55, 0x04, 0x22, 0x29, 0x38, 0xc5, 0x69, 0x82, 0xb8, 0x24, 0xbb, 0xee, 0x59, 0x25, 0x3f, 0x4a, 0x86, 0x64, 0x85, 0x14, 0x9e, 0xc4, 0xc5, 0xb5, 0xec, 0x9a, 0xd7, 0x4e, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2168 = { .name = "ecdsa_brainpoolp512r1_sha512_2168", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2168_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2168_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2168_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 218 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2169 for ECDSA, tcId is 219 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2169_pubkey[] = { 0x37, 0xd8, 0x51, 0x9f, 0x0c, 0x74, 0x92, 0xff, 0x44, 0x3b, 0xad, 0x34, 0xcb, 0xd5, 0x4e, 0xee, 0x9b, 0xa1, 0x20, 0xe4, 0x1f, 0xbb, 0x9f, 0xd6, 0x04, 0xcd, 0xd6, 0xd4, 0x1b, 0x76, 0x2b, 0xf2, 0xbb, 0xa3, 0x92, 0xd4, 0xf4, 0x64, 0x69, 0x78, 0x73, 0x0f, 0x65, 0x56, 0x66, 0x2b, 0x99, 0x76, 0x8d, 0xcb, 0x27, 0x54, 0xc1, 0x80, 0xc0, 0xfb, 0xd8, 0xad, 0x70, 0x76, 0x36, 0xd8, 0xf8, 0xb1, 0x43, 0xb1, 0x7d, 0x72, 0x8f, 0xfe, 0xac, 0x45, 0x40, 0x19, 0x53, 0x0d, 0x2b, 0xb0, 0xf6, 0x9a, 0x58, 0x53, 0x5a, 0x2e, 0x8e, 0x60, 0x9f, 0xf6, 0x95, 0x96, 0xd5, 0x3d, 0x11, 0xa0, 0x0e, 0x6f, 0x65, 0x0d, 0x49, 0xd9, 0xa5, 0xf2, 0x11, 0x20, 0x4b, 0x4e, 0x5a, 0x42, 0x1c, 0x75, 0x7f, 0x8e, 0x17, 0x38, 0x95, 0x5d, 0xf9, 0x6b, 0xad, 0x5b, 0xfd, 0xd7, 0x1e, 0x15, 0x5a, 0x93, 0x2d, 0x1f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2169_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2169_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2d, 0xa0, 0x89, 0xbe, 0x4c, 0xcf, 0x10, 0xec, 0x5b, 0xd4, 0x63, 0x55, 0x6e, 0xfb, 0xd3, 0x38, 0x8c, 0xc3, 0x43, 0xb9, 0xdd, 0x0b, 0xbd, 0x6f, 0x2e, 0x98, 0xa5, 0xd0, 0xca, 0x36, 0x2d, 0x0f, 0xde, 0x2a, 0xeb, 0xf0, 0x2b, 0xde, 0xf1, 0x73, 0xa0, 0xf1, 0xf0, 0x47, 0x55, 0xee, 0x76, 0xa0, 0x98, 0x72, 0x76, 0x38, 0xe4, 0xf7, 0xf3, 0x89, 0x52, 0x1d, 0x99, 0x7b, 0xab, 0x85, 0xb7, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2169 = { .name = "ecdsa_brainpoolp512r1_sha512_2169", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2169_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2169_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2169_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 219 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2170 for ECDSA, tcId is 220 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2170_pubkey[] = { 0x2a, 0xfb, 0x78, 0x6d, 0x24, 0x6b, 0x43, 0xa5, 0x3d, 0xf6, 0x84, 0x1d, 0x04, 0xd4, 0xc7, 0x70, 0x53, 0x57, 0x93, 0x96, 0x97, 0x71, 0x4e, 0xd4, 0x68, 0x1d, 0xc5, 0x95, 0x18, 0x81, 0x91, 0x87, 0x7a, 0x46, 0xf3, 0xc6, 0xbb, 0xc6, 0x31, 0x70, 0x40, 0x6e, 0x0c, 0x6d, 0xb7, 0xdd, 0x67, 0x89, 0xa6, 0x44, 0x73, 0x8f, 0x7d, 0x0a, 0xcb, 0x7c, 0x9e, 0x59, 0x59, 0xc0, 0x1e, 0x39, 0xe9, 0x75, 0x20, 0x32, 0x7e, 0x6e, 0x5c, 0x92, 0x51, 0x98, 0xb7, 0x4a, 0xf0, 0xbe, 0xb5, 0x1a, 0x83, 0xea, 0x66, 0x2e, 0xfb, 0xc3, 0xf8, 0x5b, 0xba, 0x89, 0x24, 0x04, 0x6b, 0x97, 0xda, 0xcb, 0x07, 0x17, 0xd6, 0xb7, 0xf4, 0x22, 0xd8, 0x42, 0x66, 0x25, 0xea, 0x7f, 0x6b, 0x4c, 0xe8, 0x65, 0xdf, 0xab, 0x26, 0x4b, 0xa5, 0x24, 0x7b, 0x4d, 0xad, 0x3e, 0x2c, 0xa5, 0x61, 0x4b, 0xff, 0x4c, 0x0d, 0x5f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2170_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2170_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x5b, 0x41, 0x13, 0x7c, 0x99, 0x9e, 0x21, 0xd8, 0xb7, 0xa8, 0xc6, 0xaa, 0xdd, 0xf7, 0xa6, 0x71, 0x19, 0x86, 0x87, 0x73, 0xba, 0x17, 0x7a, 0xde, 0x5d, 0x31, 0x4b, 0xa1, 0x94, 0x6c, 0x5a, 0x1f, 0xbc, 0x55, 0xd7, 0xe0, 0x57, 0xbd, 0xe2, 0xe7, 0x41, 0xe3, 0xe0, 0x8e, 0xab, 0xdc, 0xed, 0x41, 0x30, 0xe4, 0xec, 0x71, 0xc9, 0xef, 0xe7, 0x12, 0xa4, 0x3b, 0x32, 0xf7, 0x57, 0x0b, 0x6f, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2170 = { .name = "ecdsa_brainpoolp512r1_sha512_2170", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2170_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2170_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2170_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 220 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2171 for ECDSA, tcId is 221 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2171_pubkey[] = { 0x1b, 0x41, 0x9a, 0xa3, 0x9d, 0x3e, 0x31, 0x25, 0xae, 0x70, 0x5f, 0x77, 0x88, 0x5c, 0x3b, 0x11, 0x38, 0x7b, 0xc4, 0x22, 0xfa, 0xdb, 0xba, 0x7e, 0xb0, 0xa6, 0x6a, 0xc1, 0x4a, 0xe2, 0x6c, 0x0f, 0x97, 0x83, 0x33, 0xdc, 0xe6, 0x4e, 0x4f, 0xe0, 0xd3, 0xbd, 0xbc, 0x6d, 0x52, 0xad, 0xce, 0xe3, 0xb5, 0x14, 0x93, 0xa2, 0x6d, 0x21, 0x37, 0x6b, 0xef, 0x76, 0x4e, 0x06, 0x28, 0xdf, 0xbb, 0x12, 0x73, 0xee, 0x3e, 0xf2, 0xea, 0xe0, 0x4a, 0x27, 0xe7, 0x98, 0x32, 0x3d, 0x50, 0xe0, 0xf4, 0xfe, 0xfb, 0xc4, 0x3f, 0xc4, 0x61, 0x36, 0x77, 0x31, 0x1d, 0xa8, 0x58, 0xf8, 0x3e, 0x5d, 0x9b, 0x3b, 0x9e, 0x41, 0xaf, 0x6c, 0x55, 0x82, 0x90, 0x8a, 0x3e, 0xf2, 0x94, 0x8e, 0x4b, 0x5d, 0xc8, 0xc5, 0xb8, 0xa5, 0x90, 0xb3, 0xce, 0xda, 0x18, 0xe4, 0xc4, 0xcc, 0x05, 0xdd, 0xc2, 0x68, 0xdc, 0xfe, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2171_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2171_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x88, 0xe1, 0x9d, 0x3a, 0xe6, 0x6d, 0x32, 0xc5, 0x13, 0x7d, 0x2a, 0x00, 0x4c, 0xf3, 0x79, 0xa9, 0xa6, 0x49, 0xcb, 0x2d, 0x97, 0x23, 0x38, 0x4d, 0x8b, 0xc9, 0xf1, 0x72, 0x5e, 0xa2, 0x87, 0x2f, 0x9a, 0x80, 0xc3, 0xd0, 0x83, 0x9c, 0xd4, 0x5a, 0xe2, 0xd5, 0xd0, 0xd6, 0x01, 0xcb, 0x63, 0xe1, 0xc9, 0x57, 0x62, 0xaa, 0xae, 0xe7, 0xda, 0x9b, 0xf6, 0x58, 0xcc, 0x73, 0x02, 0x91, 0x26, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2171 = { .name = "ecdsa_brainpoolp512r1_sha512_2171", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2171_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2171_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2171_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 221 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2172 for ECDSA, tcId is 222 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2172_pubkey[] = { 0x32, 0x7a, 0x6e, 0x5e, 0x4e, 0xf2, 0xbe, 0xc0, 0x63, 0x1e, 0x13, 0x35, 0x40, 0x94, 0xcc, 0xa4, 0xdf, 0x5b, 0xc4, 0x01, 0x8a, 0x05, 0x72, 0xc0, 0x08, 0x73, 0x54, 0x3d, 0x98, 0x10, 0x0a, 0xc0, 0x9d, 0x76, 0xd2, 0x7b, 0xd6, 0xe0, 0xbc, 0x2d, 0xc9, 0x6b, 0xd8, 0xcb, 0xbe, 0x19, 0xae, 0xc0, 0xc1, 0x41, 0x32, 0x0f, 0xfd, 0x64, 0xae, 0xdb, 0xa5, 0xc1, 0x7a, 0x1b, 0xe4, 0xbd, 0x29, 0x60, 0x78, 0xdc, 0xcc, 0x45, 0x3c, 0x2a, 0xa7, 0xe9, 0x2a, 0x77, 0x34, 0x82, 0x33, 0x06, 0xc6, 0xc1, 0xae, 0x3e, 0x52, 0x13, 0x1e, 0xdb, 0xfa, 0x5f, 0xdd, 0xb7, 0x19, 0xc8, 0xd5, 0xd0, 0x0b, 0xa3, 0xd3, 0x8b, 0xaa, 0x8f, 0xb7, 0x27, 0xbb, 0x94, 0x1e, 0x21, 0xba, 0xff, 0x37, 0x55, 0x03, 0xc2, 0x7e, 0xed, 0x70, 0x46, 0xfa, 0x6d, 0x00, 0xc7, 0x0e, 0xf1, 0x36, 0xe0, 0x1d, 0x36, 0xef, 0xd5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2172_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2172_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x37, 0x2e, 0x96, 0xe8, 0xf1, 0xe9, 0x3c, 0x75, 0xe3, 0x7b, 0x9a, 0x04, 0xb2, 0x8f, 0x5e, 0x23, 0x5b, 0x2e, 0x36, 0x1f, 0x7f, 0x08, 0xb2, 0xdb, 0xa5, 0xa8, 0xb2, 0x1a, 0xb3, 0xc1, 0x92, 0x8f, 0x1d, 0xdb, 0x33, 0x40, 0x27, 0xd5, 0x3d, 0xf9, 0xc4, 0xda, 0xff, 0x94, 0x2d, 0xb3, 0x5c, 0x89, 0x62, 0x8e, 0x23, 0xc6, 0x2c, 0x66, 0x96, 0xdf, 0x29, 0x49, 0xec, 0xab, 0x9a, 0xd5, 0xca, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2172 = { .name = "ecdsa_brainpoolp512r1_sha512_2172", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2172_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2172_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2172_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 222 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2173 for ECDSA, tcId is 223 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2173_pubkey[] = { 0x9a, 0xa1, 0x89, 0xb5, 0xb1, 0xe5, 0xb6, 0x66, 0x41, 0xc7, 0xec, 0x3f, 0xa7, 0xd0, 0xdb, 0xb6, 0xa7, 0x2d, 0x87, 0x4d, 0x18, 0xc7, 0x92, 0x7c, 0xac, 0x84, 0x70, 0xa7, 0x09, 0x69, 0xf3, 0x57, 0x05, 0xbc, 0x73, 0x18, 0x2a, 0xbc, 0x10, 0xb5, 0xa1, 0x69, 0x55, 0x88, 0x96, 0x19, 0xbc, 0xba, 0x6f, 0xf3, 0x10, 0x20, 0x94, 0x73, 0xc3, 0x12, 0x0e, 0x44, 0xa2, 0xe1, 0xbf, 0x9f, 0xc9, 0xc7, 0x2e, 0x5d, 0xe7, 0x47, 0x49, 0xa0, 0x52, 0x27, 0x50, 0x9a, 0x2b, 0x3d, 0x03, 0x22, 0xa8, 0xf9, 0x02, 0x07, 0x09, 0xcb, 0x8e, 0x5d, 0xa6, 0x7d, 0xfe, 0xe2, 0x8e, 0x96, 0xe0, 0xab, 0x8a, 0x1c, 0x32, 0x08, 0x05, 0x5d, 0x1f, 0x08, 0xf3, 0x8f, 0xa1, 0xcc, 0x79, 0xc1, 0x19, 0xff, 0x70, 0x45, 0x92, 0xa8, 0xee, 0xf5, 0x8b, 0xf6, 0x62, 0x04, 0xb8, 0x1a, 0xd0, 0xb0, 0xab, 0xdd, 0x03, 0x90, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2173_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2173_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2a, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2173 = { .name = "ecdsa_brainpoolp512r1_sha512_2173", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2173_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2173_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2173_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 223 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2174 for ECDSA, tcId is 224 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2174_pubkey[] = { 0x43, 0x9a, 0x85, 0x9d, 0x7a, 0xaf, 0x99, 0xf5, 0x72, 0x05, 0xf2, 0x10, 0xc9, 0x3a, 0xb8, 0x9c, 0x31, 0x7b, 0xd2, 0xfa, 0x21, 0x5e, 0x79, 0x03, 0xa6, 0x79, 0x76, 0xd3, 0x36, 0xd8, 0x3b, 0x1b, 0xf9, 0x71, 0x90, 0x67, 0x07, 0x74, 0x20, 0x07, 0x8f, 0x83, 0x75, 0x14, 0xd6, 0x07, 0xae, 0x39, 0x81, 0x18, 0x5d, 0xc7, 0xb0, 0x26, 0x27, 0xb0, 0x5a, 0xc6, 0x6e, 0x49, 0x1a, 0x2b, 0x94, 0xc5, 0x4c, 0x3f, 0xa4, 0x7a, 0x92, 0x6d, 0xbd, 0x69, 0x45, 0xac, 0xa6, 0xd4, 0x04, 0xf8, 0x5f, 0x46, 0xe0, 0x70, 0xd0, 0x4e, 0x7d, 0xab, 0xf6, 0xfa, 0x9c, 0xb8, 0x8c, 0x34, 0x28, 0xdd, 0x02, 0xfd, 0x01, 0xa9, 0xb1, 0x90, 0xbb, 0x61, 0xdf, 0xb7, 0xb2, 0x43, 0x9e, 0x42, 0xd0, 0xb6, 0x89, 0xae, 0xf9, 0x68, 0x35, 0x6b, 0x01, 0x1c, 0xf3, 0x05, 0x4a, 0xb9, 0x29, 0xc8, 0x57, 0x77, 0xe6, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2174_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2174_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x48, 0xd7, 0x85, 0x1b, 0x07, 0x9f, 0x62, 0x02, 0x09, 0xe8, 0xba, 0x05, 0xeb, 0x24, 0xee, 0x51, 0x59, 0x64, 0xd3, 0x75, 0x77, 0xc7, 0xc3, 0xae, 0x30, 0x9a, 0xb2, 0xbd, 0xdd, 0x7e, 0xee, 0x71, 0x01, 0x89, 0x9d, 0x0c, 0x6c, 0x78, 0x01, 0x11, 0xbe, 0xde, 0x61, 0xed, 0x12, 0x15, 0xec, 0x42, 0x39, 0x94, 0x09, 0xd6, 0x05, 0xec, 0xcc, 0x9a, 0xac, 0x4c, 0x95, 0x48, 0xf8, 0x77, 0x70, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2174 = { .name = "ecdsa_brainpoolp512r1_sha512_2174", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2174_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2174_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2174_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 224 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2175 for ECDSA, tcId is 225 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2175_pubkey[] = { 0x66, 0xfa, 0x15, 0x8c, 0x51, 0xd3, 0xa9, 0x42, 0x1c, 0xbb, 0x13, 0x37, 0x99, 0xab, 0x90, 0xa1, 0x23, 0x87, 0xec, 0x78, 0x75, 0xa2, 0xb3, 0x54, 0xb8, 0x48, 0x76, 0x73, 0x49, 0x5b, 0xb1, 0x87, 0x9e, 0xf1, 0x67, 0x2f, 0x49, 0x28, 0xa2, 0x03, 0x40, 0x95, 0xa0, 0x2c, 0x7d, 0x08, 0x3f, 0x27, 0xe0, 0xea, 0xc0, 0xa4, 0x0b, 0x87, 0xd8, 0x37, 0xf5, 0x2e, 0x76, 0x48, 0x20, 0x0c, 0x56, 0x66, 0x27, 0x80, 0x37, 0xcd, 0x7e, 0x5e, 0x8b, 0xc6, 0x82, 0x10, 0x27, 0xb2, 0x1a, 0x2c, 0xa7, 0xae, 0x9c, 0x69, 0x4a, 0xe8, 0x09, 0x96, 0x6b, 0x79, 0xd4, 0x41, 0xdc, 0xdc, 0x9d, 0x3b, 0x44, 0x4f, 0x87, 0x93, 0x12, 0x2f, 0x30, 0x95, 0x6a, 0xe0, 0xa7, 0xaa, 0xdf, 0xbe, 0x43, 0x1a, 0x34, 0x2d, 0xcd, 0x85, 0x70, 0x95, 0xbd, 0x05, 0x8a, 0x74, 0x2b, 0xa5, 0x8a, 0xf1, 0x8b, 0x1a, 0x51, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2175_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2175_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x0e, 0x6c, 0xf6, 0x8d, 0x5b, 0xe5, 0x13, 0x82, 0x53, 0xde, 0x29, 0x0e, 0xc4, 0x1b, 0xde, 0x7d, 0xcf, 0x96, 0x06, 0x5c, 0x28, 0x0d, 0x0a, 0x09, 0xd9, 0xa4, 0x88, 0x8d, 0x5d, 0xe0, 0x4d, 0xbe, 0xa7, 0x50, 0x38, 0xfc, 0x06, 0x1b, 0x65, 0x33, 0x40, 0x69, 0x6c, 0x62, 0xba, 0xae, 0xa9, 0x2d, 0x57, 0x47, 0xe5, 0x02, 0x49, 0x03, 0x4c, 0x42, 0x7f, 0x2f, 0x81, 0x3e, 0x2b, 0x98, 0xc2, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2175 = { .name = "ecdsa_brainpoolp512r1_sha512_2175", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2175_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2175_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2175_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 225 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2176 for ECDSA, tcId is 226 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2176_pubkey[] = { 0x29, 0xbd, 0xf2, 0xfe, 0xb7, 0x67, 0x40, 0x76, 0x3f, 0x50, 0x98, 0xcf, 0xd5, 0xef, 0xac, 0xa5, 0xfa, 0x2b, 0x19, 0x65, 0x4b, 0xd4, 0xe8, 0xd5, 0xd7, 0x59, 0x78, 0xb9, 0x05, 0x20, 0xe7, 0x48, 0x38, 0x75, 0xbf, 0xbe, 0x2a, 0xc0, 0xe5, 0x7a, 0xdf, 0x90, 0xcc, 0x14, 0x0a, 0xf5, 0x98, 0x21, 0x78, 0x67, 0x24, 0xe5, 0xea, 0xb9, 0x11, 0x14, 0x45, 0xa2, 0xde, 0x4b, 0x37, 0x68, 0x77, 0x4c, 0x32, 0xae, 0x39, 0x79, 0xb3, 0x52, 0xdc, 0xfb, 0x0c, 0x72, 0xe8, 0xf6, 0x79, 0x9a, 0xb7, 0x64, 0x15, 0x42, 0x8a, 0x99, 0x56, 0xca, 0x5d, 0x2b, 0x14, 0xd7, 0x4b, 0x9a, 0x1b, 0xe1, 0x89, 0xbc, 0xd3, 0x03, 0x2f, 0x74, 0x2e, 0xc9, 0x47, 0x44, 0xc3, 0x3a, 0x3c, 0xdc, 0xa1, 0x0d, 0xff, 0x4d, 0x5b, 0x07, 0x92, 0x96, 0x60, 0xd6, 0xe7, 0x87, 0x29, 0xad, 0xa6, 0xe5, 0xbe, 0x9a, 0xe1, 0x01, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2176_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2176_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x41, 0xb2, 0xaf, 0x78, 0x29, 0x41, 0x65, 0xd8, 0x6f, 0x75, 0x1c, 0xb8, 0x2a, 0x80, 0x32, 0x7a, 0x0e, 0xb4, 0xc0, 0x54, 0x4a, 0x06, 0xd4, 0xa5, 0x71, 0x9a, 0xea, 0x4a, 0x09, 0x8f, 0x11, 0x59, 0x73, 0xaf, 0xf4, 0xc1, 0xa8, 0xce, 0xc2, 0xdc, 0xf0, 0xf5, 0xf0, 0xfa, 0x24, 0x19, 0x0b, 0x47, 0x4a, 0x25, 0xb9, 0xab, 0x3b, 0xae, 0xf7, 0x77, 0x0f, 0x68, 0xba, 0x9c, 0x7e, 0xf7, 0xf7, 0xca, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2176 = { .name = "ecdsa_brainpoolp512r1_sha512_2176", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2176_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2176_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2176_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 226 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2177 for ECDSA, tcId is 227 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2177_pubkey[] = { 0x80, 0xaf, 0x1b, 0xb9, 0xdf, 0xce, 0x00, 0x96, 0x37, 0x99, 0xe0, 0x1a, 0xec, 0xbf, 0x8b, 0xf5, 0xa6, 0x59, 0xb6, 0xbb, 0xfa, 0x46, 0x89, 0xf0, 0x67, 0x4a, 0x61, 0x15, 0xbc, 0xdf, 0x99, 0x6d, 0x15, 0x5d, 0x9a, 0x75, 0xc5, 0x29, 0x51, 0x41, 0xe2, 0xcc, 0x3e, 0x61, 0x1b, 0x32, 0xc5, 0x89, 0xe6, 0xae, 0x76, 0xae, 0xf1, 0x90, 0xdc, 0x8a, 0x36, 0x3b, 0xa9, 0xf9, 0xc3, 0xcc, 0x57, 0x27, 0x03, 0x8c, 0xd9, 0x5b, 0xcd, 0x34, 0x42, 0x0e, 0x63, 0xae, 0x43, 0x5a, 0xfe, 0xd0, 0x9f, 0x70, 0xe4, 0xeb, 0xc3, 0x50, 0x1b, 0x42, 0xf3, 0x5e, 0xbb, 0xec, 0xd8, 0xb0, 0xa1, 0x65, 0xc6, 0x16, 0x16, 0x09, 0x0b, 0x11, 0x8e, 0xf0, 0x5a, 0x43, 0xc3, 0x1f, 0x3b, 0x71, 0x09, 0x07, 0xc7, 0x45, 0x26, 0x4b, 0x1f, 0x53, 0x7c, 0x28, 0x59, 0x6a, 0x40, 0x3c, 0x25, 0x19, 0x5e, 0x87, 0x54, 0x5e, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2177_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2177_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x9c, 0x5f, 0xc3, 0xfb, 0xf7, 0x0f, 0x16, 0xcc, 0xda, 0xc9, 0x2f, 0x95, 0x97, 0x44, 0x08, 0xff, 0xff, 0x7e, 0x05, 0xbd, 0x02, 0x68, 0xcf, 0xdf, 0x86, 0x2e, 0x9b, 0xeb, 0x17, 0x4f, 0xb4, 0x8e, 0xe1, 0xe0, 0xe1, 0x0f, 0x94, 0x2d, 0x8f, 0xc6, 0x7e, 0xd6, 0x9f, 0x7a, 0x94, 0xc8, 0x5f, 0x61, 0xc8, 0x40, 0x48, 0x61, 0x7e, 0x67, 0xc1, 0xcc, 0x6c, 0x02, 0x60, 0xe0, 0x48, 0x64, 0x1a, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2177 = { .name = "ecdsa_brainpoolp512r1_sha512_2177", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2177_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2177_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2177_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 227 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2178 for ECDSA, tcId is 228 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2178_pubkey[] = { 0x6e, 0xeb, 0x47, 0x35, 0x28, 0x6c, 0x2c, 0x09, 0x4d, 0xda, 0x29, 0x71, 0x0a, 0x77, 0x4e, 0xcc, 0xdb, 0x6c, 0xa5, 0xfa, 0x89, 0x91, 0xf9, 0xad, 0xbc, 0x76, 0x9b, 0x44, 0x8d, 0x38, 0x99, 0x94, 0x3c, 0x86, 0x0e, 0x3f, 0xb5, 0x0c, 0xff, 0x34, 0x82, 0x5a, 0xda, 0xee, 0x82, 0xaa, 0xb5, 0xa5, 0x33, 0xad, 0xaf, 0x74, 0xfb, 0xfe, 0x7e, 0x8b, 0x03, 0x2e, 0x26, 0x42, 0xfa, 0x5f, 0xc8, 0x6f, 0x5e, 0xf7, 0x4a, 0xa6, 0x1a, 0x26, 0x82, 0x3b, 0xc2, 0xed, 0x70, 0xf0, 0x8b, 0x64, 0xa6, 0x90, 0x6d, 0xb9, 0x81, 0x56, 0x4d, 0x5e, 0x0c, 0x15, 0xa0, 0x76, 0xa5, 0x82, 0xda, 0x8f, 0xee, 0x20, 0xb7, 0x73, 0xef, 0x59, 0x1f, 0x90, 0x54, 0xda, 0x34, 0xd9, 0x0a, 0x1f, 0x13, 0x17, 0x29, 0x46, 0x10, 0xa8, 0x1d, 0x3e, 0x0f, 0x1a, 0xdc, 0xe4, 0xf6, 0xd2, 0xfd, 0x6b, 0xa4, 0xb9, 0x35, 0x01, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2178_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2178_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x8d, 0xe1, 0xea, 0x3f, 0x12, 0x34, 0x69, 0x0e, 0x75, 0xbd, 0x78, 0x7c, 0xfa, 0xbe, 0x15, 0xf8, 0x33, 0xcb, 0x7d, 0xc6, 0x51, 0x07, 0xcd, 0xb0, 0x35, 0xf9, 0x9b, 0x0b, 0xbe, 0x6c, 0x60, 0xad, 0x6e, 0x83, 0x65, 0xdd, 0xdb, 0xb1, 0xf9, 0x73, 0xbc, 0x26, 0xdd, 0xdb, 0xa9, 0xe4, 0xae, 0x7c, 0x72, 0xce, 0xbd, 0x41, 0xf4, 0x71, 0xa8, 0xbb, 0x22, 0x7d, 0x2b, 0x3d, 0xf4, 0x1f, 0x34, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2178 = { .name = "ecdsa_brainpoolp512r1_sha512_2178", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2178_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2178_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2178_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 228 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2179 for ECDSA, tcId is 229 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2179_pubkey[] = { 0x93, 0x88, 0x41, 0x93, 0x75, 0x50, 0x13, 0x4c, 0x5a, 0x4b, 0xad, 0xe1, 0x9a, 0x50, 0x21, 0xc7, 0x3c, 0xff, 0xc7, 0x74, 0xfd, 0xca, 0x87, 0x54, 0x13, 0xa7, 0xd5, 0x41, 0xe6, 0x51, 0x45, 0xfb, 0x77, 0xda, 0xd4, 0xa7, 0xc7, 0xeb, 0x3a, 0x96, 0x6c, 0x18, 0x4d, 0x73, 0xcd, 0xcf, 0x3f, 0x1b, 0xea, 0x98, 0x4a, 0xd2, 0x5d, 0xd4, 0xfb, 0x7f, 0x47, 0x23, 0x9f, 0xaa, 0x5b, 0x53, 0x9f, 0x6d, 0x32, 0x75, 0xcd, 0xe5, 0x3c, 0x18, 0xf3, 0xbb, 0x53, 0x7a, 0x7f, 0x06, 0xc7, 0xea, 0x1b, 0x4f, 0x35, 0x50, 0x25, 0x91, 0x90, 0x02, 0xba, 0xe9, 0xa3, 0xa3, 0xc1, 0xdc, 0xf1, 0x50, 0xc1, 0xb5, 0x3b, 0xc8, 0xdf, 0xe5, 0x3f, 0x60, 0xcc, 0x78, 0x5e, 0x44, 0x05, 0x1c, 0x95, 0xb7, 0x35, 0x55, 0x2b, 0xa6, 0x22, 0x89, 0x7d, 0x5b, 0xf7, 0x55, 0x6f, 0xd7, 0xb9, 0xe3, 0x8b, 0x65, 0x31, 0xbe, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2179_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2179_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x32, 0x6a, 0x7e, 0x59, 0xc4, 0xbc, 0xf9, 0xba, 0x52, 0x23, 0x5a, 0x8e, 0x06, 0xd2, 0x44, 0x55, 0x7a, 0xcf, 0x66, 0x88, 0x5b, 0x64, 0xf9, 0x23, 0x8c, 0xdd, 0xb3, 0xbe, 0x32, 0x7b, 0x62, 0x05, 0x75, 0x8b, 0x60, 0xf3, 0x20, 0x34, 0x18, 0xcb, 0xe5, 0xb3, 0x30, 0xe2, 0x8a, 0x9d, 0x7a, 0x36, 0x0e, 0xdf, 0xb8, 0xdd, 0xf3, 0x9d, 0x46, 0x34, 0x0d, 0x5c, 0x27, 0x92, 0x82, 0x4b, 0x7c, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2179 = { .name = "ecdsa_brainpoolp512r1_sha512_2179", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2179_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2179_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2179_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 229 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2180 for ECDSA, tcId is 230 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2180_pubkey[] = { 0x78, 0xfb, 0xd1, 0xe7, 0x62, 0x01, 0x96, 0x02, 0xff, 0x71, 0x87, 0xcf, 0x06, 0xa8, 0x86, 0xd2, 0xed, 0x2c, 0xb5, 0xd0, 0x64, 0x81, 0xb0, 0x6c, 0x3c, 0x4b, 0xe4, 0xf7, 0xf3, 0x74, 0x6c, 0xd0, 0x15, 0x1d, 0x57, 0xf4, 0xd6, 0xae, 0xbd, 0x60, 0x48, 0x89, 0x5c, 0xab, 0xfe, 0x95, 0x00, 0xad, 0xf3, 0xda, 0xec, 0x59, 0xff, 0xa6, 0xee, 0x96, 0x21, 0xc8, 0xb5, 0x84, 0xed, 0x6d, 0xad, 0x1a, 0x6f, 0x3c, 0x20, 0x70, 0xe0, 0x14, 0x21, 0xa1, 0xeb, 0xb9, 0x69, 0x60, 0x7d, 0x44, 0xf7, 0x67, 0x78, 0x74, 0x8b, 0xcb, 0x55, 0x9a, 0x8b, 0x5e, 0xed, 0x83, 0xb0, 0x47, 0x60, 0xab, 0x53, 0x55, 0x6b, 0x00, 0x39, 0xe8, 0x76, 0x5a, 0xb8, 0x5a, 0x92, 0x95, 0x0c, 0x10, 0xca, 0x6b, 0xbd, 0xcc, 0x9d, 0x6e, 0x2f, 0x03, 0xd8, 0x8b, 0x6d, 0x7b, 0xbd, 0xcd, 0x53, 0xc8, 0xb1, 0xff, 0x86, 0xcc, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2180_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2180_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x3c, 0x5d, 0x08, 0x33, 0x9f, 0x2f, 0x6f, 0x97, 0xa2, 0xb8, 0x6b, 0x83, 0x29, 0x66, 0x78, 0xf7, 0xbf, 0xf6, 0x1e, 0x1b, 0x74, 0x87, 0xcd, 0xa1, 0x4f, 0x3b, 0x12, 0xfc, 0xe6, 0xae, 0xaf, 0xa3, 0xf2, 0xfb, 0x38, 0x5a, 0xea, 0x3e, 0x82, 0xf3, 0x12, 0xa6, 0x88, 0x0e, 0xfd, 0x18, 0xa1, 0xd7, 0x7f, 0xd7, 0xfa, 0xaf, 0xaf, 0x9d, 0x1e, 0xcc, 0x5e, 0xe9, 0xc2, 0xc0, 0xf7, 0x1d, 0x10, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2180 = { .name = "ecdsa_brainpoolp512r1_sha512_2180", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2180_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2180_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2180_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 230 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2181 for ECDSA, tcId is 231 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2181_pubkey[] = { 0x4c, 0x9a, 0xda, 0x2f, 0xa2, 0xac, 0xf8, 0xd0, 0x1f, 0xba, 0x2b, 0x01, 0x5f, 0x7b, 0xad, 0xc3, 0x22, 0x78, 0x5c, 0x85, 0xf2, 0x19, 0x9b, 0x6c, 0x4a, 0xc4, 0x90, 0xda, 0x8e, 0x1e, 0xc9, 0x73, 0x38, 0x7f, 0x4a, 0xbe, 0x26, 0xd5, 0x26, 0xa0, 0x56, 0xdc, 0x71, 0x95, 0xfb, 0x1c, 0x9c, 0x0c, 0xa7, 0x61, 0x2c, 0xb6, 0x5f, 0x15, 0xf1, 0x06, 0x38, 0x0d, 0x8c, 0x5d, 0xec, 0xe5, 0x29, 0xf3, 0x21, 0x72, 0xc8, 0xb9, 0xb3, 0xb6, 0xfb, 0x0b, 0xbe, 0x9f, 0x22, 0x73, 0xd9, 0xa2, 0x18, 0xbd, 0x51, 0x24, 0x79, 0xdd, 0x27, 0x60, 0x5b, 0x2a, 0x6e, 0x8b, 0x44, 0xf5, 0x8d, 0x17, 0x61, 0x78, 0x39, 0x0c, 0x2b, 0xdd, 0x1c, 0xcf, 0x60, 0xc1, 0xe8, 0x23, 0xa2, 0x3e, 0x8b, 0x0f, 0xce, 0x7d, 0xab, 0x2f, 0x19, 0x79, 0x13, 0xb1, 0xfe, 0x30, 0xf6, 0x99, 0xe3, 0xbf, 0x36, 0x6b, 0xf1, 0xbf, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2181_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2181_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x95, 0x84, 0xa4, 0xbd, 0xf0, 0xc6, 0xc8, 0xca, 0x72, 0x21, 0x1f, 0x58, 0x9d, 0xcd, 0xd7, 0xbe, 0x18, 0x1a, 0xcc, 0xb9, 0x26, 0xf2, 0x43, 0x0d, 0xc7, 0x13, 0x5a, 0xbb, 0xfa, 0x78, 0x87, 0xd6, 0x06, 0x03, 0x0c, 0x85, 0xc7, 0x2f, 0x5a, 0x3c, 0x05, 0xfc, 0xc7, 0xe0, 0xd1, 0xfb, 0x33, 0xaf, 0xc0, 0x25, 0x1f, 0xd3, 0x3e, 0xa0, 0x4b, 0x3b, 0x96, 0x47, 0x0b, 0xc2, 0x6c, 0xe6, 0x12, 0xab, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2181 = { .name = "ecdsa_brainpoolp512r1_sha512_2181", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2181_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2181_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2181_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 231 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2182 for ECDSA, tcId is 232 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2182_pubkey[] = { 0x85, 0x4c, 0xf9, 0x60, 0x10, 0x10, 0xbe, 0x20, 0x63, 0x3f, 0x5d, 0x17, 0x21, 0x4c, 0xab, 0x68, 0x7d, 0xab, 0x3a, 0xa5, 0x4a, 0x38, 0xa0, 0x2c, 0x55, 0xed, 0x00, 0x36, 0x15, 0xec, 0x8e, 0xfa, 0xda, 0x2a, 0xc0, 0xd6, 0x2d, 0x92, 0x3d, 0x0e, 0x1d, 0xf9, 0xaa, 0x38, 0x2d, 0x51, 0x27, 0x06, 0xca, 0xdf, 0x55, 0x39, 0x85, 0x8a, 0x62, 0xa5, 0xec, 0x62, 0xfd, 0x82, 0x48, 0xe6, 0x32, 0x77, 0x6a, 0x78, 0x33, 0x03, 0x28, 0x52, 0x06, 0x01, 0x8c, 0xbb, 0x9f, 0xc1, 0xe9, 0x8c, 0xdf, 0x94, 0xac, 0x6f, 0x2f, 0xec, 0xbd, 0xc7, 0xd8, 0x42, 0x8f, 0xf4, 0x85, 0xe5, 0x9b, 0x00, 0xb2, 0xbf, 0xa4, 0x5a, 0x06, 0xaa, 0xa9, 0x3e, 0x6b, 0x51, 0xb7, 0xad, 0x1b, 0x8a, 0xc0, 0xdb, 0xe1, 0x35, 0x45, 0x5d, 0x8d, 0x28, 0x75, 0x23, 0x13, 0x57, 0x06, 0x09, 0x90, 0xab, 0xcd, 0xe5, 0x63, 0xde, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2182_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2182_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x40, 0x19, 0x79, 0x87, 0x18, 0x9f, 0x8c, 0xf0, 0x4a, 0x95, 0x1e, 0x01, 0xc4, 0x8f, 0xa8, 0xae, 0x90, 0x42, 0xf1, 0x84, 0x84, 0x8f, 0x93, 0xb2, 0x15, 0xdc, 0x79, 0x0f, 0xe2, 0xc4, 0x2e, 0xe2, 0xd5, 0x49, 0xd8, 0xcb, 0x50, 0xff, 0x3d, 0xb7, 0x4b, 0x6d, 0xdb, 0x37, 0x6a, 0x80, 0xb2, 0xce, 0x39, 0x83, 0x94, 0x6b, 0x2e, 0xd9, 0x98, 0x19, 0x85, 0x6e, 0x75, 0xeb, 0xf8, 0xff, 0x2a, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2182 = { .name = "ecdsa_brainpoolp512r1_sha512_2182", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2182_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2182_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2182_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 232 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2183 for ECDSA, tcId is 233 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2183_pubkey[] = { 0x5e, 0x3d, 0xe5, 0x09, 0xf7, 0x58, 0x5c, 0x0f, 0x6d, 0x05, 0xc3, 0x87, 0xa6, 0xd0, 0x7a, 0x06, 0x1c, 0x9f, 0x98, 0xc6, 0xad, 0xc8, 0xb3, 0xc3, 0x6e, 0xfb, 0xde, 0xfc, 0xbf, 0xf2, 0xe6, 0xad, 0x46, 0x78, 0x96, 0x05, 0x24, 0xd1, 0x16, 0x15, 0x4f, 0x5b, 0x17, 0x33, 0x22, 0x04, 0xe3, 0xa1, 0x86, 0x70, 0x82, 0xd2, 0xe5, 0x18, 0x50, 0x4f, 0x43, 0x3e, 0x27, 0x26, 0xad, 0x58, 0xe9, 0xd7, 0xa0, 0xb3, 0x2e, 0x9d, 0x3c, 0x52, 0x3b, 0xac, 0x3c, 0x1c, 0xcd, 0xd7, 0x5f, 0x82, 0xb9, 0x09, 0xa8, 0x30, 0x6c, 0x74, 0xbe, 0x89, 0x9f, 0x13, 0x22, 0x8a, 0xbf, 0x87, 0xdb, 0x76, 0xb9, 0x11, 0x5c, 0x0b, 0x29, 0x3d, 0x7d, 0x30, 0xf3, 0xc8, 0x62, 0x30, 0x46, 0x1b, 0x28, 0xa4, 0x5a, 0x6c, 0xc8, 0x8b, 0x8f, 0xe0, 0x79, 0x14, 0x31, 0x03, 0xc5, 0xb0, 0x10, 0x16, 0xba, 0x95, 0xbc, 0xd5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2183_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2183_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x80, 0x32, 0xf3, 0x0e, 0x31, 0x3f, 0x19, 0xe0, 0x95, 0x2a, 0x3c, 0x03, 0x89, 0x1f, 0x51, 0x5d, 0x20, 0x85, 0xe3, 0x09, 0x09, 0x1f, 0x27, 0x64, 0x2b, 0xb8, 0xf2, 0x1f, 0xc5, 0x88, 0x5d, 0xc5, 0xaa, 0x93, 0xb1, 0x96, 0xa1, 0xfe, 0x7b, 0x6e, 0x96, 0xdb, 0xb6, 0x6e, 0xd5, 0x01, 0x65, 0x9c, 0x73, 0x07, 0x28, 0xd6, 0x5d, 0xb3, 0x30, 0x33, 0x0a, 0xdc, 0xeb, 0xd7, 0xf1, 0xfe, 0x55, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2183 = { .name = "ecdsa_brainpoolp512r1_sha512_2183", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2183_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2183_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2183_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 233 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2184 for ECDSA, tcId is 234 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2184_pubkey[] = { 0x15, 0xd2, 0xff, 0xcd, 0x46, 0x17, 0xeb, 0x1b, 0x40, 0x06, 0x10, 0xcb, 0xa8, 0xd7, 0x38, 0xc7, 0x6c, 0x8e, 0x15, 0xad, 0x72, 0xb3, 0x4e, 0x57, 0x67, 0x72, 0xae, 0x19, 0xcd, 0x83, 0x45, 0x29, 0x46, 0x44, 0xd1, 0x3a, 0xc6, 0x2a, 0x29, 0x37, 0x88, 0xde, 0x2a, 0x92, 0xdd, 0x54, 0x7c, 0x2a, 0xc3, 0xa9, 0x8a, 0xba, 0x72, 0x95, 0x2d, 0x3e, 0xa2, 0xd4, 0x91, 0xd7, 0xee, 0xa5, 0xb9, 0xcb, 0xa3, 0xec, 0x2c, 0x79, 0xa2, 0xcf, 0x7b, 0xa0, 0x08, 0x39, 0x33, 0xb2, 0xc5, 0x34, 0xfd, 0x4b, 0x51, 0x58, 0x7c, 0x4e, 0xbc, 0x3c, 0xba, 0xaa, 0x28, 0xd9, 0x2b, 0x95, 0xe3, 0xc8, 0xe9, 0x01, 0x42, 0xef, 0xfa, 0xc2, 0x7b, 0xba, 0xb2, 0x15, 0xac, 0x0b, 0x39, 0xd1, 0xc5, 0xf3, 0x32, 0xfe, 0xb7, 0x79, 0x35, 0x1a, 0x66, 0xc2, 0x94, 0xe4, 0xed, 0x62, 0xf5, 0xcd, 0x32, 0x29, 0xa9, 0x23, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2184_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2184_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x15, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2184 = { .name = "ecdsa_brainpoolp512r1_sha512_2184", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2184_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2184_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2184_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 234 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2185 for ECDSA, tcId is 235 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2185_pubkey[] = { 0x97, 0x4d, 0xf3, 0xe7, 0xa6, 0x12, 0x83, 0x83, 0x0e, 0x54, 0x4b, 0xa9, 0x02, 0x34, 0x79, 0xcb, 0x8d, 0x75, 0x59, 0x52, 0x4d, 0xf7, 0x6f, 0xb3, 0x8d, 0x23, 0xc5, 0x5d, 0x29, 0x92, 0x3e, 0x72, 0xec, 0x5c, 0xb4, 0x87, 0x17, 0xfa, 0xb8, 0x59, 0xf2, 0xf3, 0x11, 0x15, 0x85, 0xbb, 0xee, 0x00, 0x45, 0x95, 0xc5, 0xfe, 0xd6, 0x44, 0x11, 0xfb, 0xbf, 0x9f, 0x63, 0x51, 0xbf, 0x5f, 0x69, 0xe8, 0x4e, 0x1f, 0xdd, 0x69, 0x1b, 0x30, 0xb0, 0xb4, 0xc2, 0x59, 0x0a, 0x88, 0x1c, 0xe4, 0x58, 0x05, 0x33, 0x49, 0x35, 0x6d, 0xa7, 0x47, 0xcd, 0x93, 0xba, 0x93, 0x1e, 0xee, 0x6a, 0xe8, 0x8c, 0xae, 0x82, 0x70, 0x07, 0x10, 0x5c, 0x3b, 0x16, 0x33, 0xa4, 0x8e, 0x1c, 0x9d, 0xb5, 0x27, 0x2a, 0xc0, 0x11, 0x45, 0xae, 0xe6, 0x13, 0x2b, 0xa7, 0x3a, 0xf8, 0x3d, 0x6e, 0x6c, 0x41, 0x06, 0xb2, 0x90, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2185_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2185_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x5c, 0xa5, 0x4a, 0x23, 0x1b, 0xe7, 0x6c, 0x06, 0xc9, 0xd9, 0x87, 0xde, 0x7b, 0xf2, 0xed, 0x42, 0xcd, 0x63, 0x4a, 0x07, 0xed, 0xeb, 0x6e, 0x0c, 0x58, 0x04, 0x12, 0xab, 0xe7, 0x09, 0xab, 0x17, 0x7e, 0x47, 0x4a, 0x9e, 0xa9, 0x62, 0x45, 0xa6, 0x40, 0xf7, 0xe6, 0xbe, 0x1d, 0x2d, 0x5c, 0xba, 0x3a, 0x7c, 0xdc, 0x41, 0xa8, 0xb0, 0x93, 0x90, 0x1a, 0x5b, 0x8b, 0xe0, 0x64, 0x20, 0xe1, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2185 = { .name = "ecdsa_brainpoolp512r1_sha512_2185", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2185_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2185_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2185_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 235 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2186 for ECDSA, tcId is 236 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2186_pubkey[] = { 0x2c, 0xb7, 0x36, 0x4c, 0xce, 0xc9, 0x14, 0x8a, 0x32, 0x42, 0xee, 0xe1, 0x7c, 0xe0, 0x1d, 0x82, 0xa5, 0x6d, 0x03, 0x7c, 0xb0, 0x17, 0x46, 0xfd, 0xd2, 0x4b, 0x89, 0x3f, 0x35, 0xe0, 0x72, 0x82, 0x7c, 0xe4, 0x63, 0xad, 0xaf, 0xca, 0x62, 0x82, 0xd9, 0x3c, 0xf6, 0x66, 0xa7, 0x40, 0xee, 0x88, 0xad, 0xbe, 0xf2, 0x41, 0xf1, 0x79, 0x55, 0xd2, 0xbf, 0x5f, 0x9f, 0x95, 0x95, 0x8a, 0x38, 0xa6, 0x96, 0xda, 0x56, 0x43, 0xe5, 0xfe, 0x05, 0x7f, 0x1c, 0x3b, 0x93, 0x1e, 0x36, 0xd3, 0x3f, 0x0e, 0x2f, 0x5f, 0xba, 0x68, 0x09, 0x32, 0xa3, 0x59, 0x87, 0xb7, 0x98, 0x55, 0xb6, 0xc1, 0xf0, 0xea, 0xd6, 0x4c, 0xbe, 0x9c, 0x72, 0x95, 0x9e, 0xce, 0x21, 0x84, 0xee, 0x65, 0xa7, 0x68, 0x41, 0x0d, 0xf1, 0xda, 0xd8, 0x1c, 0x4d, 0xba, 0x85, 0x33, 0x40, 0xa2, 0x39, 0x6a, 0xbf, 0x82, 0xe3, 0x6a, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2186_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2186_sig[] = { 0x1b, 0x8e, 0x84, 0x40, 0xbd, 0x94, 0x75, 0x2d, 0xc6, 0x03, 0x15, 0x97, 0x28, 0xa3, 0x46, 0x87, 0x2c, 0xad, 0x48, 0xdf, 0xff, 0x81, 0x9f, 0x18, 0x1f, 0x9d, 0x53, 0x53, 0x7a, 0x80, 0x86, 0x8b, 0xff, 0x12, 0x80, 0xac, 0xfd, 0x23, 0x97, 0xa8, 0x46, 0xd3, 0x25, 0x90, 0x49, 0x35, 0x2b, 0xc1, 0x1f, 0x5f, 0xb7, 0x39, 0x41, 0x0c, 0x76, 0x6d, 0x13, 0x44, 0xcb, 0xcb, 0xc0, 0x3b, 0xf7, 0x61, 0x21, 0x61, 0x07, 0x40, 0x79, 0x9a, 0x83, 0xa1, 0x3b, 0x49, 0xaa, 0x45, 0xdd, 0x85, 0x4d, 0x85, 0xb0, 0x58, 0xbd, 0x95, 0x5a, 0x41, 0x05, 0xd7, 0x49, 0xcb, 0xa7, 0x4b, 0x8f, 0x2a, 0x38, 0xcf, 0x7c, 0x33, 0xed, 0x56, 0x92, 0x1d, 0x02, 0x9e, 0x74, 0x93, 0x89, 0x4a, 0xd3, 0xd8, 0xf2, 0x8f, 0x44, 0x31, 0xdc, 0xeb, 0x89, 0xcd, 0x56, 0x31, 0x6d, 0xe9, 0x3d, 0xc0, 0x97, 0x77, 0xca, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2186 = { .name = "ecdsa_brainpoolp512r1_sha512_2186", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2186_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2186_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2186_sig, .siglen = 128, .result = 1, .comment = "point duplication during verification, tcId is 236 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2187 for ECDSA, tcId is 237 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2187_pubkey[] = { 0x2c, 0xb7, 0x36, 0x4c, 0xce, 0xc9, 0x14, 0x8a, 0x32, 0x42, 0xee, 0xe1, 0x7c, 0xe0, 0x1d, 0x82, 0xa5, 0x6d, 0x03, 0x7c, 0xb0, 0x17, 0x46, 0xfd, 0xd2, 0x4b, 0x89, 0x3f, 0x35, 0xe0, 0x72, 0x82, 0x7c, 0xe4, 0x63, 0xad, 0xaf, 0xca, 0x62, 0x82, 0xd9, 0x3c, 0xf6, 0x66, 0xa7, 0x40, 0xee, 0x88, 0xad, 0xbe, 0xf2, 0x41, 0xf1, 0x79, 0x55, 0xd2, 0xbf, 0x5f, 0x9f, 0x95, 0x95, 0x8a, 0x38, 0xa6, 0x14, 0x03, 0x47, 0x74, 0xf5, 0xeb, 0xbf, 0x0c, 0x23, 0x99, 0x53, 0x8f, 0xfc, 0xf6, 0xbc, 0xf9, 0x9b, 0xd0, 0xd3, 0x4b, 0xaa, 0x97, 0x2e, 0xb5, 0x4e, 0xac, 0x04, 0x74, 0xb9, 0x71, 0x17, 0x86, 0xa7, 0x00, 0xdc, 0x64, 0x29, 0x30, 0xc9, 0x74, 0x8d, 0x48, 0xb2, 0xc5, 0x3f, 0x3b, 0x3f, 0xd8, 0x36, 0xa7, 0x27, 0x12, 0xdf, 0xc8, 0x41, 0x51, 0xe8, 0x08, 0x26, 0xeb, 0x98, 0xb7, 0x65, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2187_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2187_sig[] = { 0x1b, 0x8e, 0x84, 0x40, 0xbd, 0x94, 0x75, 0x2d, 0xc6, 0x03, 0x15, 0x97, 0x28, 0xa3, 0x46, 0x87, 0x2c, 0xad, 0x48, 0xdf, 0xff, 0x81, 0x9f, 0x18, 0x1f, 0x9d, 0x53, 0x53, 0x7a, 0x80, 0x86, 0x8b, 0xff, 0x12, 0x80, 0xac, 0xfd, 0x23, 0x97, 0xa8, 0x46, 0xd3, 0x25, 0x90, 0x49, 0x35, 0x2b, 0xc1, 0x1f, 0x5f, 0xb7, 0x39, 0x41, 0x0c, 0x76, 0x6d, 0x13, 0x44, 0xcb, 0xcb, 0xc0, 0x3b, 0xf7, 0x61, 0x21, 0x61, 0x07, 0x40, 0x79, 0x9a, 0x83, 0xa1, 0x3b, 0x49, 0xaa, 0x45, 0xdd, 0x85, 0x4d, 0x85, 0xb0, 0x58, 0xbd, 0x95, 0x5a, 0x41, 0x05, 0xd7, 0x49, 0xcb, 0xa7, 0x4b, 0x8f, 0x2a, 0x38, 0xcf, 0x7c, 0x33, 0xed, 0x56, 0x92, 0x1d, 0x02, 0x9e, 0x74, 0x93, 0x89, 0x4a, 0xd3, 0xd8, 0xf2, 0x8f, 0x44, 0x31, 0xdc, 0xeb, 0x89, 0xcd, 0x56, 0x31, 0x6d, 0xe9, 0x3d, 0xc0, 0x97, 0x77, 0xca, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2187 = { .name = "ecdsa_brainpoolp512r1_sha512_2187", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2187_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2187_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2187_sig, .siglen = 128, .result = -1, .comment = "duplication bug, tcId is 237 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2188 for ECDSA, tcId is 238 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2188_pubkey[] = { 0x06, 0x3d, 0x56, 0x6f, 0xa9, 0x3e, 0xe2, 0x19, 0x48, 0x2e, 0xc9, 0x47, 0xe7, 0xbe, 0x46, 0x94, 0xf9, 0xc0, 0x73, 0xb2, 0xbb, 0x78, 0x6d, 0xb8, 0x49, 0xe1, 0xf3, 0x97, 0x3c, 0x51, 0x22, 0x39, 0x4c, 0xf6, 0x8e, 0xdd, 0x99, 0x47, 0xb5, 0x8e, 0x61, 0xfe, 0x42, 0xc9, 0x8d, 0x36, 0x40, 0x84, 0x4e, 0xd2, 0x77, 0x5b, 0x0c, 0x36, 0xb5, 0xf4, 0xc0, 0xc9, 0x60, 0x5d, 0x02, 0x8b, 0xc0, 0xc5, 0x07, 0x52, 0x1b, 0x29, 0x88, 0x96, 0x32, 0xbb, 0x07, 0x56, 0xfe, 0xc9, 0x8e, 0x8e, 0x95, 0x6c, 0xb7, 0xac, 0x51, 0x5a, 0x3f, 0xc9, 0x08, 0x2b, 0x87, 0x18, 0x61, 0x54, 0x8e, 0x97, 0x02, 0x78, 0x6f, 0x59, 0x1e, 0x9a, 0x22, 0x23, 0x91, 0x01, 0x47, 0x25, 0x16, 0x7a, 0x6c, 0x22, 0xaa, 0xf8, 0xc2, 0xc4, 0xbe, 0x94, 0x25, 0x24, 0x8b, 0x4d, 0x5f, 0x94, 0xf3, 0x1c, 0xbd, 0x8b, 0xd3, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2188_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2188_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x22, 0x2c, 0x52, 0xbe, 0x92, 0x61, 0xf4, 0x1b, 0xd9, 0x90, 0xfa, 0xef, 0xa3, 0xf5, 0x32, 0x67, 0xf5, 0x70, 0x1c, 0x57, 0x23, 0xf5, 0x2a, 0x02, 0xf7, 0xad, 0x85, 0xc2, 0x16, 0x70, 0x9b, 0x49, 0xaa, 0xa6, 0x12, 0x73, 0x75, 0xbb, 0x6e, 0x05, 0x0d, 0x1a, 0xe0, 0x38, 0x4c, 0xbc, 0x03, 0x41, 0x6c, 0x56, 0xc3, 0xe6, 0x9b, 0x45, 0xf8, 0x92, 0xbd, 0xe7, 0xea, 0xe6, 0xec, 0x21, 0xcc, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2188 = { .name = "ecdsa_brainpoolp512r1_sha512_2188", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2188_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2188_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2188_sig, .siglen = 128, .result = -1, .comment = "comparison with point at infinity , tcId is 238 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2189 for ECDSA, tcId is 239 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2189_pubkey[] = { 0x13, 0xb9, 0xa0, 0x27, 0x3b, 0x3b, 0x28, 0x3c, 0xc8, 0xa2, 0x5a, 0xaa, 0xf2, 0xa8, 0x50, 0x8a, 0x74, 0x5d, 0xb0, 0x22, 0xe7, 0xf4, 0xdd, 0xc0, 0x6a, 0xcd, 0xf0, 0x6e, 0xb7, 0x77, 0x0f, 0xd9, 0x5b, 0xa6, 0x8b, 0x04, 0x7b, 0x03, 0x04, 0x19, 0xae, 0xc3, 0x66, 0xbd, 0x18, 0x7e, 0xb8, 0x40, 0xa4, 0x3d, 0xf7, 0xd9, 0x43, 0x94, 0x19, 0xe2, 0x63, 0x96, 0x14, 0xd5, 0xb4, 0xeb, 0x22, 0xd2, 0x3b, 0xa9, 0xa5, 0xc0, 0x30, 0x17, 0x08, 0xdc, 0x50, 0xab, 0x9e, 0x4a, 0xd4, 0xed, 0x48, 0xad, 0x0f, 0x70, 0x1c, 0xf3, 0x87, 0xf2, 0x10, 0xe5, 0x7b, 0x6d, 0x06, 0xfb, 0x69, 0xcd, 0x58, 0xdf, 0xb0, 0x68, 0x5f, 0x89, 0xd9, 0xed, 0x1a, 0x31, 0x9f, 0x00, 0x15, 0x1d, 0x90, 0x82, 0x66, 0x30, 0x46, 0xcc, 0x27, 0x10, 0x1b, 0x69, 0x2c, 0xa2, 0x2a, 0x6b, 0x3e, 0x08, 0x3d, 0xd0, 0xff, 0x7f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2189_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2189_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2189 = { .name = "ecdsa_brainpoolp512r1_sha512_2189", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2189_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2189_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2189_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 239 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2190 for ECDSA, tcId is 240 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2190_pubkey[] = { 0x45, 0xd4, 0xd4, 0xad, 0x6b, 0x3a, 0xaf, 0x94, 0xb6, 0xd7, 0x39, 0xa0, 0x72, 0xf3, 0x1b, 0x1e, 0x74, 0x4f, 0x13, 0x87, 0x63, 0x04, 0xea, 0x11, 0x11, 0x3f, 0xe8, 0x12, 0x3a, 0x15, 0x5e, 0x1a, 0x92, 0x1b, 0xe4, 0x6c, 0xde, 0x2f, 0x24, 0x12, 0xe0, 0x2a, 0x0f, 0xa5, 0xc1, 0x86, 0x5d, 0xb8, 0xa6, 0xdb, 0xd4, 0x4e, 0xea, 0xc1, 0x65, 0xb0, 0xf7, 0xfa, 0x73, 0xc0, 0x47, 0x83, 0x80, 0x2d, 0x1c, 0xb9, 0x51, 0xcc, 0x65, 0xc9, 0x05, 0x64, 0x80, 0x69, 0x5b, 0xc4, 0x67, 0xdc, 0xa5, 0x77, 0x96, 0x4c, 0xee, 0x04, 0x8a, 0x14, 0xc8, 0x17, 0x16, 0xce, 0x95, 0x58, 0xb4, 0x50, 0x98, 0x1c, 0xf3, 0xa0, 0xf0, 0x05, 0x9d, 0x58, 0x1b, 0x07, 0x6a, 0xfb, 0x69, 0xef, 0xe0, 0xa5, 0x05, 0x35, 0x7b, 0x80, 0x60, 0xe0, 0x2d, 0x6b, 0x9f, 0x13, 0xa0, 0x31, 0xa1, 0xda, 0xe5, 0xf1, 0xce, 0x3c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2190_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2190_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x7a, 0x0c, 0x02, 0xf1, 0xc1, 0xa6, 0xfa, 0x1a, 0x52, 0x2a, 0x5b, 0xa1, 0x00, 0x6b, 0xb4, 0x05, 0x91, 0x22, 0xae, 0x5b, 0xc9, 0x90, 0x28, 0x53, 0xbd, 0xb4, 0xdd, 0xb5, 0x2b, 0x92, 0x2a, 0x99, 0x61, 0x75, 0xaf, 0x9c, 0x5b, 0x54, 0x3f, 0xc8, 0xe5, 0xa9, 0x20, 0xc9, 0x12, 0x0d, 0x30, 0x32, 0xcc, 0x11, 0x4d, 0xee, 0x73, 0xb0, 0xc0, 0xe7, 0x81, 0xa9, 0xfd, 0xcb, 0x02, 0x2f, 0x92, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2190 = { .name = "ecdsa_brainpoolp512r1_sha512_2190", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2190_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2190_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2190_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 240 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2191 for ECDSA, tcId is 241 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2191_pubkey[] = { 0x90, 0x60, 0x43, 0x0c, 0x44, 0x39, 0xc3, 0x52, 0xcb, 0xc0, 0x8c, 0xd0, 0x90, 0x6f, 0x91, 0x46, 0x4c, 0xe3, 0x7a, 0x79, 0x74, 0xde, 0x99, 0x65, 0x25, 0x75, 0x86, 0x28, 0xb9, 0xd3, 0x58, 0x05, 0x40, 0xaf, 0xe9, 0xbe, 0x74, 0xba, 0x10, 0x50, 0xd0, 0x3a, 0xcb, 0xb0, 0xac, 0x29, 0xe6, 0x0a, 0xca, 0x9b, 0x96, 0x29, 0x5a, 0x6b, 0x5e, 0x49, 0x70, 0x74, 0x10, 0x25, 0x7f, 0xb7, 0x63, 0x9d, 0x59, 0xf8, 0x88, 0xad, 0x8a, 0x62, 0xbe, 0xcd, 0xe0, 0x66, 0x1d, 0xef, 0xee, 0xe4, 0x81, 0x35, 0xd3, 0x61, 0x67, 0xf9, 0xe8, 0x58, 0x0f, 0x27, 0x14, 0xbc, 0xd5, 0xb6, 0x7e, 0xc7, 0x0a, 0xe3, 0xde, 0xae, 0x5d, 0x80, 0xb1, 0xe9, 0xd1, 0x0c, 0x13, 0xf2, 0x1c, 0xe7, 0xc5, 0x9c, 0x79, 0xac, 0x2c, 0xf7, 0x05, 0xae, 0xe8, 0x90, 0xad, 0xf4, 0x34, 0xf2, 0x9a, 0xa8, 0x41, 0xa0, 0x5b, 0x0f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2191_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2191_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x88, 0xb1, 0x4a, 0xfa, 0x49, 0x87, 0xd0, 0x6f, 0x66, 0x43, 0xeb, 0xbe, 0x8f, 0xd4, 0xc9, 0x9f, 0xd5, 0xc0, 0x71, 0x5c, 0x8f, 0xd4, 0xa8, 0x0b, 0xde, 0xb6, 0x17, 0x08, 0x59, 0xc2, 0x6d, 0x26, 0xaa, 0x98, 0x49, 0xcd, 0xd6, 0xed, 0xb8, 0x14, 0x34, 0x6b, 0x80, 0xe1, 0x32, 0xf0, 0x0d, 0x05, 0xb1, 0x5b, 0x0f, 0x9a, 0x6d, 0x17, 0xe2, 0x4a, 0xf7, 0x9f, 0xab, 0x9b, 0xb0, 0x87, 0x33, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2191 = { .name = "ecdsa_brainpoolp512r1_sha512_2191", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2191_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2191_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2191_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 241 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2192 for ECDSA, tcId is 242 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2192_pubkey[] = { 0x73, 0x26, 0x13, 0x7c, 0x69, 0x9e, 0x6b, 0x1d, 0x2b, 0xf3, 0x13, 0xc0, 0x4c, 0x34, 0xb8, 0x6e, 0x63, 0x29, 0x3d, 0x7e, 0x20, 0x54, 0xe4, 0x71, 0x87, 0xef, 0x84, 0x3f, 0xb4, 0x26, 0x74, 0xf6, 0x5b, 0x7e, 0x01, 0x36, 0xec, 0xda, 0xf8, 0xe4, 0x11, 0xc6, 0xe2, 0xdb, 0xbf, 0x5a, 0xc5, 0x00, 0x74, 0x01, 0x74, 0x3e, 0xc7, 0x24, 0x4e, 0x7d, 0xac, 0x03, 0x79, 0x51, 0x6b, 0xb9, 0x2f, 0x39, 0x92, 0xe5, 0x46, 0xd0, 0x1c, 0x16, 0x55, 0xcf, 0x68, 0x54, 0x93, 0x91, 0xd8, 0x58, 0x20, 0x35, 0xee, 0x47, 0x1e, 0x58, 0xf4, 0x33, 0xea, 0x89, 0xf3, 0x8f, 0x8c, 0xc1, 0xed, 0xc1, 0x92, 0x82, 0x25, 0xb3, 0xf5, 0xa3, 0x76, 0xe0, 0x15, 0xce, 0xe6, 0xae, 0x9e, 0x1e, 0xaa, 0xe6, 0x09, 0xbe, 0x2e, 0x69, 0x53, 0x7e, 0x59, 0x6b, 0x06, 0xb7, 0x7e, 0x4b, 0x6b, 0x74, 0x82, 0xfa, 0xb6, 0x0b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2192_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2192_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x22, 0x2c, 0x52, 0xbe, 0x92, 0x61, 0xf4, 0x1b, 0xd9, 0x90, 0xfa, 0xef, 0xa3, 0xf5, 0x32, 0x67, 0xf5, 0x70, 0x1c, 0x57, 0x23, 0xf5, 0x2a, 0x02, 0xf7, 0xad, 0x85, 0xc2, 0x16, 0x70, 0x9b, 0x49, 0xaa, 0xa6, 0x12, 0x73, 0x75, 0xbb, 0x6e, 0x05, 0x0d, 0x1a, 0xe0, 0x38, 0x4c, 0xbc, 0x03, 0x41, 0x6c, 0x56, 0xc3, 0xe6, 0x9b, 0x45, 0xf8, 0x92, 0xbd, 0xe7, 0xea, 0xe6, 0xec, 0x21, 0xcc, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2192 = { .name = "ecdsa_brainpoolp512r1_sha512_2192", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2192_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2192_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2192_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 242 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2193 for ECDSA, tcId is 243 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2193_pubkey[] = { 0x56, 0xbd, 0x4e, 0x3c, 0xa3, 0x22, 0xf6, 0x5c, 0x29, 0xb6, 0x11, 0xf7, 0x9f, 0x3f, 0x95, 0x0f, 0x21, 0x63, 0x8e, 0x02, 0x6f, 0xcc, 0xf6, 0x73, 0xb0, 0x8c, 0xff, 0xc7, 0x3c, 0xc3, 0x94, 0x95, 0xce, 0xd5, 0xb8, 0x8e, 0x26, 0x41, 0x9e, 0xbd, 0xe7, 0x5c, 0x85, 0xfd, 0xff, 0x14, 0x60, 0x94, 0x7e, 0xf7, 0xaf, 0xe9, 0x9a, 0xca, 0x58, 0x78, 0xb1, 0xaf, 0x79, 0x68, 0x81, 0x81, 0xe3, 0x23, 0x69, 0xe6, 0x46, 0xbb, 0x9d, 0x01, 0xa1, 0x0c, 0xc4, 0x93, 0x12, 0x59, 0xdc, 0x8f, 0x59, 0x7d, 0x95, 0xe8, 0x5e, 0xbd, 0x56, 0x72, 0x90, 0x98, 0xcf, 0xab, 0x14, 0x43, 0x16, 0x5e, 0x55, 0x8f, 0x05, 0x36, 0x98, 0xb0, 0xbb, 0x4f, 0x44, 0x22, 0x2e, 0xa2, 0x45, 0xac, 0x4c, 0x21, 0x71, 0x7e, 0xb2, 0x2a, 0xaf, 0xf6, 0x50, 0xa3, 0x29, 0xee, 0xe2, 0x42, 0x03, 0x84, 0x1c, 0x59, 0xd1, 0x3f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2193_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2193_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x30, 0xd1, 0x9a, 0xc7, 0x1a, 0x42, 0xca, 0x70, 0xed, 0xaa, 0x8b, 0x0d, 0x33, 0x5e, 0x48, 0x02, 0x3a, 0x0d, 0xdf, 0x57, 0xea, 0x39, 0xa9, 0xbb, 0x18, 0xae, 0xbf, 0x15, 0x44, 0xa0, 0xdd, 0xd6, 0xf3, 0xc8, 0xac, 0xa4, 0xf1, 0x54, 0xe6, 0x50, 0x5b, 0xdd, 0x40, 0x50, 0x6d, 0x9e, 0xe0, 0x14, 0x51, 0xa0, 0x85, 0x92, 0x94, 0xad, 0x19, 0xf6, 0x33, 0xdd, 0x98, 0xb7, 0x9a, 0x79, 0x6d, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2193 = { .name = "ecdsa_brainpoolp512r1_sha512_2193", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2193_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2193_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2193_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 243 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2194 for ECDSA, tcId is 244 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2194_pubkey[] = { 0x68, 0x8d, 0x0f, 0x39, 0x4a, 0xcb, 0x16, 0x11, 0x9e, 0x0b, 0x29, 0xb5, 0x6e, 0x78, 0x0f, 0x29, 0x5a, 0x24, 0xdc, 0xba, 0x16, 0x15, 0xa2, 0x3e, 0x59, 0xe6, 0x7b, 0x1d, 0xc9, 0x54, 0x9b, 0xff, 0x87, 0x91, 0xa6, 0x21, 0x30, 0xd4, 0xb0, 0xd8, 0xd7, 0x57, 0x39, 0xf0, 0x6d, 0xfc, 0x08, 0xcf, 0x6b, 0x5c, 0xb1, 0xe3, 0x1a, 0x63, 0xbc, 0x72, 0xb1, 0xfa, 0xd6, 0xf0, 0x58, 0xb1, 0xcd, 0x59, 0x9f, 0x94, 0x46, 0xae, 0x8a, 0x7f, 0x41, 0xbd, 0xfb, 0xac, 0x1d, 0xdb, 0xcd, 0xd6, 0xe6, 0x49, 0x01, 0x93, 0x26, 0x0d, 0xcd, 0xad, 0xa0, 0x72, 0x07, 0x9c, 0xbf, 0x13, 0x9b, 0x66, 0x6c, 0xf5, 0x93, 0x4f, 0x11, 0xab, 0xf5, 0x72, 0xa3, 0x3e, 0x7f, 0x12, 0x35, 0xcd, 0xf7, 0x08, 0x20, 0xa5, 0x47, 0x5d, 0x14, 0xec, 0xed, 0x67, 0xad, 0x6a, 0x4a, 0x85, 0x78, 0xf9, 0xb6, 0xe4, 0x09, 0x3c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2194_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2194_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x10, 0xb9, 0x89, 0x00, 0x28, 0x55, 0xff, 0xaf, 0xbd, 0x8c, 0x23, 0xa6, 0x61, 0xf3, 0xb9, 0x3c, 0xcf, 0xff, 0x4f, 0xbe, 0x84, 0xa2, 0x3d, 0x1a, 0x6c, 0x4a, 0xff, 0x44, 0x05, 0xbd, 0xb9, 0x4c, 0x3f, 0x86, 0x02, 0x24, 0xe2, 0x05, 0x03, 0x2f, 0xdc, 0x9a, 0x1d, 0xc8, 0x0c, 0x7d, 0x6b, 0x21, 0x40, 0x9f, 0x96, 0x32, 0xe0, 0xfb, 0x54, 0x00, 0x21, 0xcc, 0xc4, 0x21, 0x61, 0xb7, 0x0f, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2194 = { .name = "ecdsa_brainpoolp512r1_sha512_2194", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2194_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2194_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2194_sig, .siglen = 128, .result = 1, .comment = "extreme value for k, tcId is 244 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2195 for ECDSA, tcId is 245 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2195_pubkey[] = { 0x83, 0x67, 0x2d, 0x9b, 0x61, 0xf7, 0x3f, 0x1a, 0x0b, 0x2e, 0x06, 0x6b, 0xc3, 0xd0, 0x09, 0x74, 0x9d, 0x28, 0xd4, 0xe5, 0x84, 0xa1, 0xaf, 0xea, 0x28, 0xdc, 0xff, 0xd7, 0x8b, 0x6b, 0x2d, 0x65, 0x9d, 0xbb, 0x0c, 0x5c, 0xf7, 0xbe, 0xd6, 0x1f, 0x3b, 0x03, 0xc3, 0xc1, 0x29, 0xe3, 0x1d, 0x4b, 0x49, 0xca, 0x8d, 0xa3, 0x81, 0x3c, 0xf2, 0x5b, 0x6f, 0x02, 0x5d, 0x84, 0xee, 0x82, 0xd5, 0x61, 0x37, 0x9b, 0xe7, 0xf5, 0xc8, 0x37, 0xfd, 0x23, 0xe0, 0xac, 0xd7, 0x49, 0x16, 0x75, 0x49, 0xe8, 0x70, 0x3d, 0xba, 0xd3, 0xbc, 0x7a, 0xdd, 0x9d, 0x3a, 0x9f, 0xf0, 0x1a, 0xbd, 0x34, 0xb5, 0x53, 0x42, 0xf5, 0x32, 0x42, 0x8d, 0x95, 0xcc, 0x1f, 0x0c, 0x9b, 0xae, 0x7f, 0x45, 0x8d, 0x94, 0x11, 0x91, 0x9a, 0x28, 0x16, 0x00, 0x96, 0x58, 0x22, 0x42, 0x18, 0x85, 0x1b, 0x0f, 0x8d, 0x57, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2195_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2195_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2195 = { .name = "ecdsa_brainpoolp512r1_sha512_2195", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2195_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2195_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2195_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 245 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2196 for ECDSA, tcId is 246 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2196_pubkey[] = { 0x73, 0x86, 0xa1, 0x09, 0x91, 0xc1, 0x47, 0x5c, 0x6c, 0x53, 0xf0, 0x58, 0x67, 0xe6, 0x9a, 0x35, 0x21, 0x9b, 0xc5, 0xca, 0xd4, 0x40, 0x5c, 0x96, 0x03, 0x22, 0x84, 0x3a, 0x56, 0xbb, 0x07, 0xbb, 0xaa, 0x31, 0x7d, 0x20, 0xa0, 0xbc, 0x98, 0x78, 0x6a, 0xb7, 0xb4, 0xc0, 0xcf, 0x6d, 0xea, 0xdf, 0x09, 0x3b, 0xb0, 0x7d, 0x5b, 0xd5, 0x63, 0xc0, 0xd5, 0x6b, 0x38, 0x0f, 0x88, 0x0e, 0x7a, 0xd1, 0x98, 0x19, 0xe9, 0xe8, 0x97, 0xc7, 0x64, 0x05, 0xda, 0xfb, 0xe1, 0xd7, 0x85, 0xb3, 0xbf, 0xf2, 0xe6, 0xe4, 0x87, 0x70, 0xad, 0xa1, 0xf4, 0x52, 0xec, 0x2b, 0x4a, 0x34, 0x7b, 0xda, 0xba, 0x7b, 0x6d, 0x71, 0x22, 0x00, 0x2d, 0x5f, 0x6e, 0xc4, 0xca, 0xbc, 0x58, 0x5b, 0x4e, 0xf8, 0x30, 0xe5, 0x2c, 0x62, 0x46, 0x41, 0xfe, 0x03, 0x82, 0x97, 0x80, 0x5e, 0xf0, 0xb7, 0xe8, 0xe8, 0x2b, 0xdd, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2196_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2196_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x7a, 0x0c, 0x02, 0xf1, 0xc1, 0xa6, 0xfa, 0x1a, 0x52, 0x2a, 0x5b, 0xa1, 0x00, 0x6b, 0xb4, 0x05, 0x91, 0x22, 0xae, 0x5b, 0xc9, 0x90, 0x28, 0x53, 0xbd, 0xb4, 0xdd, 0xb5, 0x2b, 0x92, 0x2a, 0x99, 0x61, 0x75, 0xaf, 0x9c, 0x5b, 0x54, 0x3f, 0xc8, 0xe5, 0xa9, 0x20, 0xc9, 0x12, 0x0d, 0x30, 0x32, 0xcc, 0x11, 0x4d, 0xee, 0x73, 0xb0, 0xc0, 0xe7, 0x81, 0xa9, 0xfd, 0xcb, 0x02, 0x2f, 0x92, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2196 = { .name = "ecdsa_brainpoolp512r1_sha512_2196", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2196_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2196_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2196_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 246 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2197 for ECDSA, tcId is 247 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2197_pubkey[] = { 0x7d, 0x76, 0xf0, 0x9d, 0xb5, 0xfc, 0x7e, 0xd7, 0x67, 0xdf, 0xad, 0x2a, 0xf9, 0xaf, 0x54, 0x70, 0xa4, 0x3e, 0x06, 0x2f, 0x21, 0x49, 0x24, 0x99, 0xaf, 0x5f, 0xc7, 0x19, 0xf6, 0xbe, 0x17, 0x88, 0x19, 0x57, 0xef, 0x47, 0x66, 0x88, 0xfa, 0x30, 0x49, 0xb1, 0x3d, 0x48, 0xc5, 0x1f, 0x25, 0x9e, 0x5d, 0x60, 0x43, 0x44, 0x65, 0xd8, 0x44, 0x45, 0xd3, 0x59, 0xb8, 0x9f, 0x66, 0xc8, 0x8b, 0xac, 0x42, 0x06, 0x61, 0x69, 0x92, 0x73, 0xb2, 0x38, 0x38, 0x82, 0x7c, 0x69, 0x90, 0x89, 0x78, 0x06, 0x4b, 0x7c, 0x98, 0xf4, 0x19, 0x5a, 0xd5, 0xe2, 0xec, 0x70, 0x9a, 0x03, 0x6e, 0xad, 0x56, 0xe3, 0x4a, 0x3e, 0x99, 0x9e, 0x8c, 0x37, 0xdd, 0xea, 0x5b, 0x00, 0x49, 0x0a, 0x01, 0x1d, 0x9d, 0x11, 0x66, 0x76, 0xe9, 0x02, 0x2c, 0x12, 0x4b, 0x3c, 0x08, 0x18, 0xbc, 0xc3, 0x48, 0x8f, 0x78, 0xd3, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2197_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2197_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x88, 0xb1, 0x4a, 0xfa, 0x49, 0x87, 0xd0, 0x6f, 0x66, 0x43, 0xeb, 0xbe, 0x8f, 0xd4, 0xc9, 0x9f, 0xd5, 0xc0, 0x71, 0x5c, 0x8f, 0xd4, 0xa8, 0x0b, 0xde, 0xb6, 0x17, 0x08, 0x59, 0xc2, 0x6d, 0x26, 0xaa, 0x98, 0x49, 0xcd, 0xd6, 0xed, 0xb8, 0x14, 0x34, 0x6b, 0x80, 0xe1, 0x32, 0xf0, 0x0d, 0x05, 0xb1, 0x5b, 0x0f, 0x9a, 0x6d, 0x17, 0xe2, 0x4a, 0xf7, 0x9f, 0xab, 0x9b, 0xb0, 0x87, 0x33, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2197 = { .name = "ecdsa_brainpoolp512r1_sha512_2197", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2197_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2197_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2197_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 247 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2198 for ECDSA, tcId is 248 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2198_pubkey[] = { 0x2a, 0x3a, 0x7f, 0x88, 0x15, 0x98, 0x3c, 0x92, 0x51, 0xdf, 0x92, 0x20, 0xcb, 0x5f, 0x42, 0x4f, 0x4d, 0x8e, 0xb9, 0xcf, 0xce, 0x3d, 0x96, 0xde, 0x72, 0x5b, 0xbe, 0xa6, 0xdb, 0xfe, 0xfe, 0x22, 0x6d, 0x78, 0x9f, 0xef, 0x85, 0x33, 0x19, 0x47, 0x87, 0x66, 0x8b, 0x66, 0xf8, 0xfb, 0x64, 0x0d, 0x13, 0x5a, 0x25, 0xa3, 0x0f, 0x5a, 0x25, 0x11, 0x1d, 0xdc, 0xfc, 0x5c, 0x9c, 0x7e, 0xb2, 0x2d, 0x9b, 0xa3, 0x5f, 0x30, 0x54, 0xac, 0x43, 0x9e, 0x0f, 0x55, 0x8e, 0xad, 0x8d, 0x09, 0x79, 0xa0, 0xfa, 0xb0, 0x46, 0xa4, 0x7a, 0xa0, 0x33, 0x9e, 0xf1, 0x6c, 0x0e, 0x1d, 0x37, 0xe4, 0xd1, 0xd6, 0xf2, 0x9f, 0xb7, 0xf6, 0x74, 0xdd, 0x51, 0xed, 0x57, 0x23, 0x34, 0x09, 0xac, 0x9e, 0x50, 0x5e, 0x29, 0xd4, 0x03, 0x78, 0x89, 0x71, 0x94, 0xcf, 0x5f, 0xbc, 0x92, 0x59, 0x5f, 0xd7, 0x74, 0xbe, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2198_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2198_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x22, 0x2c, 0x52, 0xbe, 0x92, 0x61, 0xf4, 0x1b, 0xd9, 0x90, 0xfa, 0xef, 0xa3, 0xf5, 0x32, 0x67, 0xf5, 0x70, 0x1c, 0x57, 0x23, 0xf5, 0x2a, 0x02, 0xf7, 0xad, 0x85, 0xc2, 0x16, 0x70, 0x9b, 0x49, 0xaa, 0xa6, 0x12, 0x73, 0x75, 0xbb, 0x6e, 0x05, 0x0d, 0x1a, 0xe0, 0x38, 0x4c, 0xbc, 0x03, 0x41, 0x6c, 0x56, 0xc3, 0xe6, 0x9b, 0x45, 0xf8, 0x92, 0xbd, 0xe7, 0xea, 0xe6, 0xec, 0x21, 0xcc, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2198 = { .name = "ecdsa_brainpoolp512r1_sha512_2198", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2198_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2198_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2198_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 248 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2199 for ECDSA, tcId is 249 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2199_pubkey[] = { 0x03, 0xf4, 0x98, 0xf2, 0xea, 0x6e, 0x36, 0xb4, 0x98, 0xac, 0x66, 0x46, 0x3a, 0x06, 0x70, 0x8f, 0xb9, 0x31, 0xac, 0x59, 0xa2, 0xa1, 0xdf, 0xa6, 0xeb, 0xb4, 0x97, 0x3c, 0xf0, 0x1a, 0x06, 0xce, 0xef, 0x58, 0xb3, 0x44, 0xb8, 0x5e, 0x89, 0xfc, 0x78, 0x35, 0x12, 0x11, 0xf7, 0x1f, 0xd1, 0xf1, 0x18, 0x18, 0xf7, 0xef, 0x96, 0xe2, 0x96, 0x46, 0x6b, 0x0d, 0x3b, 0x70, 0xc2, 0xda, 0x69, 0x20, 0x64, 0xaa, 0x78, 0x28, 0x54, 0x39, 0xf1, 0x7d, 0x69, 0xa9, 0x8c, 0xae, 0x8a, 0x13, 0x79, 0xbd, 0xac, 0x05, 0xce, 0xd9, 0x30, 0xa1, 0x8f, 0x44, 0x93, 0x9b, 0xd9, 0x1f, 0x86, 0x69, 0xa3, 0x7f, 0xe8, 0xfb, 0x1e, 0x9a, 0xb1, 0xea, 0xd4, 0xdb, 0x0b, 0x33, 0x7a, 0xc5, 0x94, 0xfd, 0x21, 0xd9, 0xe0, 0xd4, 0x32, 0x5a, 0xb7, 0xee, 0x07, 0x20, 0x8f, 0x1c, 0x07, 0x60, 0x1b, 0xb9, 0x13, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2199_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2199_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x30, 0xd1, 0x9a, 0xc7, 0x1a, 0x42, 0xca, 0x70, 0xed, 0xaa, 0x8b, 0x0d, 0x33, 0x5e, 0x48, 0x02, 0x3a, 0x0d, 0xdf, 0x57, 0xea, 0x39, 0xa9, 0xbb, 0x18, 0xae, 0xbf, 0x15, 0x44, 0xa0, 0xdd, 0xd6, 0xf3, 0xc8, 0xac, 0xa4, 0xf1, 0x54, 0xe6, 0x50, 0x5b, 0xdd, 0x40, 0x50, 0x6d, 0x9e, 0xe0, 0x14, 0x51, 0xa0, 0x85, 0x92, 0x94, 0xad, 0x19, 0xf6, 0x33, 0xdd, 0x98, 0xb7, 0x9a, 0x79, 0x6d, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2199 = { .name = "ecdsa_brainpoolp512r1_sha512_2199", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2199_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2199_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2199_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 249 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2200 for ECDSA, tcId is 250 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2200_pubkey[] = { 0x7b, 0xb5, 0xf9, 0xef, 0xbc, 0xc2, 0x60, 0xb0, 0x81, 0x20, 0xc7, 0xc4, 0x19, 0x35, 0x66, 0x13, 0x33, 0x22, 0xce, 0x47, 0xe6, 0x66, 0x04, 0x7e, 0xdf, 0xb4, 0x62, 0xfb, 0xc3, 0x10, 0xbb, 0x06, 0x50, 0x3e, 0x8d, 0x62, 0xd0, 0xcf, 0x60, 0x55, 0xe2, 0x71, 0xa8, 0x18, 0x7b, 0xe2, 0x2d, 0xc5, 0xa1, 0xd6, 0xb0, 0x97, 0x04, 0xa3, 0xb9, 0x90, 0x65, 0xed, 0xb8, 0x7b, 0x46, 0xc2, 0xae, 0x32, 0x40, 0x1f, 0x00, 0x40, 0x04, 0x8f, 0x94, 0x7f, 0xa0, 0x20, 0x17, 0xbc, 0xa6, 0x1a, 0xb6, 0xd6, 0x35, 0x3f, 0xc5, 0x88, 0x07, 0xbb, 0xa2, 0xf0, 0xa4, 0x65, 0x21, 0xe2, 0x0f, 0x20, 0x66, 0x82, 0x4e, 0xc8, 0x4b, 0xae, 0x1b, 0x54, 0x5a, 0x41, 0x4a, 0x29, 0x6a, 0xde, 0xe2, 0x23, 0x15, 0xfd, 0x48, 0x57, 0x3a, 0x7c, 0x5b, 0x3b, 0xd4, 0xc5, 0x39, 0x8b, 0x27, 0xd7, 0xf2, 0x82, 0x4f, 0x2c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2200_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2200_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x10, 0xb9, 0x89, 0x00, 0x28, 0x55, 0xff, 0xaf, 0xbd, 0x8c, 0x23, 0xa6, 0x61, 0xf3, 0xb9, 0x3c, 0xcf, 0xff, 0x4f, 0xbe, 0x84, 0xa2, 0x3d, 0x1a, 0x6c, 0x4a, 0xff, 0x44, 0x05, 0xbd, 0xb9, 0x4c, 0x3f, 0x86, 0x02, 0x24, 0xe2, 0x05, 0x03, 0x2f, 0xdc, 0x9a, 0x1d, 0xc8, 0x0c, 0x7d, 0x6b, 0x21, 0x40, 0x9f, 0x96, 0x32, 0xe0, 0xfb, 0x54, 0x00, 0x21, 0xcc, 0xc4, 0x21, 0x61, 0xb7, 0x0f, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2200 = { .name = "ecdsa_brainpoolp512r1_sha512_2200", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2200_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2200_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2200_sig, .siglen = 128, .result = 1, .comment = "extreme value for k, tcId is 250 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2201 for ECDSA, tcId is 251 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2201_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd, 0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11, 0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae, 0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2201_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2201_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x23, 0x21, 0x02, 0x81, 0x75, 0x7b, 0x30, 0xe1, 0x92, 0x18, 0xa3, 0x7c, 0xbd, 0x61, 0x20, 0x86, 0xfb, 0xc1, 0x58, 0xca, 0xa8, 0xb4, 0xe1, 0xac, 0xb2, 0xec, 0x00, 0x83, 0x7e, 0x5d, 0x94, 0x1f, 0x34, 0x2f, 0xb3, 0xcc, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2201 = { .name = "ecdsa_brainpoolp512r1_sha512_2201", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2201_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2201_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2201_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 251 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2202 for ECDSA, tcId is 252 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2202_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd, 0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11, 0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae, 0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2202_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2202_sig[] = { 0x66, 0xe5, 0x9c, 0xbc, 0xf0, 0xf0, 0xa0, 0xfe, 0xe7, 0x25, 0x6d, 0x52, 0x66, 0x1c, 0xf7, 0x4b, 0x81, 0x63, 0x08, 0xa7, 0x7a, 0x7c, 0x9e, 0x8c, 0x41, 0x30, 0x46, 0x1a, 0x4d, 0x12, 0x05, 0xee, 0xdf, 0xc3, 0x2b, 0x5f, 0xba, 0x90, 0x82, 0x9c, 0x84, 0x25, 0x40, 0x92, 0x83, 0xea, 0xb7, 0x7c, 0x74, 0xfc, 0xf1, 0xd4, 0x55, 0x71, 0xda, 0x5a, 0x37, 0x2a, 0x02, 0x63, 0x68, 0x79, 0x4c, 0x9d, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2202 = { .name = "ecdsa_brainpoolp512r1_sha512_2202", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2202_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2202_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2202_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 252 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2203 for ECDSA, tcId is 253 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2203_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x2c, 0xff, 0x65, 0x5b, 0x85, 0x86, 0x91, 0x9e, 0x7e, 0xea, 0x27, 0x04, 0x64, 0x51, 0xd9, 0x09, 0xd9, 0x26, 0x96, 0xb3, 0x8f, 0x24, 0x56, 0xf4, 0x36, 0x62, 0xd7, 0x6e, 0xe8, 0x13, 0x87, 0x5f, 0xca, 0x70, 0xbc, 0xb7, 0x51, 0x67, 0x1f, 0xe4, 0x53, 0x03, 0x55, 0x52, 0x5c, 0x7c, 0x1d, 0x37, 0x56, 0xb7, 0xd3, 0xff, 0x84, 0x92, 0x72, 0x7e, 0xaf, 0xdd, 0x42, 0x47, 0x1d, 0x62, 0x40, 0x61, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2203_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2203_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x23, 0x21, 0x02, 0x81, 0x75, 0x7b, 0x30, 0xe1, 0x92, 0x18, 0xa3, 0x7c, 0xbd, 0x61, 0x20, 0x86, 0xfb, 0xc1, 0x58, 0xca, 0xa8, 0xb4, 0xe1, 0xac, 0xb2, 0xec, 0x00, 0x83, 0x7e, 0x5d, 0x94, 0x1f, 0x34, 0x2f, 0xb3, 0xcc, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2203 = { .name = "ecdsa_brainpoolp512r1_sha512_2203", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2203_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2203_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2203_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 253 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2204 for ECDSA, tcId is 254 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2204_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x2c, 0xff, 0x65, 0x5b, 0x85, 0x86, 0x91, 0x9e, 0x7e, 0xea, 0x27, 0x04, 0x64, 0x51, 0xd9, 0x09, 0xd9, 0x26, 0x96, 0xb3, 0x8f, 0x24, 0x56, 0xf4, 0x36, 0x62, 0xd7, 0x6e, 0xe8, 0x13, 0x87, 0x5f, 0xca, 0x70, 0xbc, 0xb7, 0x51, 0x67, 0x1f, 0xe4, 0x53, 0x03, 0x55, 0x52, 0x5c, 0x7c, 0x1d, 0x37, 0x56, 0xb7, 0xd3, 0xff, 0x84, 0x92, 0x72, 0x7e, 0xaf, 0xdd, 0x42, 0x47, 0x1d, 0x62, 0x40, 0x61, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2204_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2204_sig[] = { 0x66, 0xe5, 0x9c, 0xbc, 0xf0, 0xf0, 0xa0, 0xfe, 0xe7, 0x25, 0x6d, 0x52, 0x66, 0x1c, 0xf7, 0x4b, 0x81, 0x63, 0x08, 0xa7, 0x7a, 0x7c, 0x9e, 0x8c, 0x41, 0x30, 0x46, 0x1a, 0x4d, 0x12, 0x05, 0xee, 0xdf, 0xc3, 0x2b, 0x5f, 0xba, 0x90, 0x82, 0x9c, 0x84, 0x25, 0x40, 0x92, 0x83, 0xea, 0xb7, 0x7c, 0x74, 0xfc, 0xf1, 0xd4, 0x55, 0x71, 0xda, 0x5a, 0x37, 0x2a, 0x02, 0x63, 0x68, 0x79, 0x4c, 0x9d, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2204 = { .name = "ecdsa_brainpoolp512r1_sha512_2204", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2204_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2204_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2204_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 254 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2205 for ECDSA, tcId is 255 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2205_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2205_sig[] = { 0x89, 0xed, 0xf7, 0x5e, 0x6e, 0x98, 0x63, 0x05, 0xd8, 0x18, 0x13, 0x86, 0xc1, 0x6d, 0xb4, 0x4b, 0xa0, 0xd7, 0xff, 0x40, 0xf4, 0x33, 0x55, 0x69, 0x75, 0x4a, 0x48, 0x1f, 0x5c, 0xd4, 0x8c, 0x62, 0x11, 0xa6, 0x3d, 0xe7, 0xbd, 0xaa, 0x48, 0x5e, 0x9f, 0xa7, 0x98, 0x58, 0xa4, 0xea, 0xbf, 0x11, 0x1f, 0xed, 0x29, 0x59, 0xf0, 0x31, 0xde, 0x2a, 0x13, 0x2b, 0xa7, 0x09, 0x41, 0x26, 0x83, 0xa9, 0x7a, 0x8c, 0x08, 0x56, 0x4f, 0x51, 0x53, 0x41, 0x28, 0xbb, 0x52, 0xfe, 0x36, 0xdf, 0xfa, 0xae, 0x89, 0x07, 0x90, 0x11, 0x25, 0x6e, 0xf8, 0x06, 0x9e, 0x64, 0xd6, 0x4c, 0x56, 0x10, 0xd3, 0xe6, 0x11, 0xc0, 0xba, 0x8b, 0x19, 0x02, 0x73, 0x88, 0xfc, 0xcc, 0x21, 0x25, 0x23, 0xb2, 0x2c, 0x44, 0xe8, 0x5a, 0x78, 0x9e, 0x16, 0xcb, 0x1b, 0xbd, 0x32, 0x40, 0xc8, 0x6b, 0x43, 0x48, 0x0f, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2205 = { .name = "ecdsa_brainpoolp512r1_sha512_2205", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2205_pubkey, .pubkeylen = 128, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp512r1_sha512_2205_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 255 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2206 for ECDSA, tcId is 256 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2206_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2206_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2206_sig[] = { 0x22, 0x5d, 0xc2, 0x31, 0x01, 0x77, 0xce, 0x62, 0x67, 0xef, 0xde, 0x99, 0x37, 0xef, 0xf8, 0x98, 0xfb, 0x0b, 0xad, 0x12, 0xb0, 0xdb, 0xeb, 0x4f, 0xa9, 0xc6, 0xbe, 0x6e, 0x20, 0xf8, 0x85, 0x63, 0xe6, 0xd2, 0x99, 0x1d, 0x47, 0xa6, 0x48, 0xb0, 0xba, 0x5a, 0x70, 0x39, 0x84, 0x2d, 0xbf, 0x88, 0x3b, 0xbd, 0x73, 0x5d, 0xf7, 0x93, 0xcc, 0xe0, 0xd1, 0x36, 0x02, 0x3f, 0xbf, 0xc9, 0xbe, 0x95, 0x00, 0xd5, 0x97, 0x83, 0xd8, 0xbd, 0x05, 0x0c, 0xf7, 0x28, 0xb3, 0x50, 0x6c, 0x16, 0xee, 0x4a, 0x78, 0xac, 0x26, 0xc1, 0x2f, 0xd3, 0x3d, 0xad, 0xb6, 0xee, 0x81, 0x46, 0x37, 0x2e, 0x4f, 0xb2, 0xa8, 0x80, 0xef, 0x77, 0xeb, 0x20, 0xac, 0x90, 0xf3, 0xa4, 0x27, 0x5c, 0x17, 0x18, 0xa0, 0x33, 0xa7, 0xc0, 0xb2, 0xdf, 0x53, 0x8e, 0xb3, 0x58, 0x27, 0x33, 0x01, 0x54, 0x19, 0x11, 0x53, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2206 = { .name = "ecdsa_brainpoolp512r1_sha512_2206", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2206_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2206_msg, .msglen = 3, .sig = ecdsa_brainpoolp512r1_sha512_2206_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 256 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2207 for ECDSA, tcId is 257 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2207_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2207_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2207_sig[] = { 0x61, 0x48, 0x3c, 0x72, 0x93, 0x69, 0x41, 0x31, 0x44, 0xa6, 0xbe, 0x0d, 0xd0, 0x5c, 0x1a, 0xc2, 0x9b, 0xc4, 0x40, 0xbb, 0xda, 0xf8, 0x7e, 0x57, 0x2a, 0xa9, 0x87, 0xe9, 0xca, 0x42, 0x36, 0x39, 0xf3, 0x39, 0xbc, 0xaa, 0xad, 0x99, 0xcb, 0x1f, 0xa8, 0x0b, 0x7c, 0x35, 0x41, 0x6a, 0x18, 0x34, 0xec, 0x04, 0xbc, 0xf0, 0xfe, 0x78, 0x12, 0xc7, 0x12, 0xeb, 0x1f, 0x06, 0xa1, 0x6d, 0xac, 0xa3, 0x41, 0xbb, 0x95, 0x6c, 0x33, 0x9e, 0xbc, 0xf5, 0xe4, 0xe4, 0x03, 0xc7, 0xd8, 0x92, 0x8d, 0x5e, 0xb4, 0xfd, 0xf7, 0xd3, 0xf5, 0x3a, 0x2c, 0x06, 0xd6, 0xc9, 0xfa, 0xc3, 0x47, 0xf6, 0x03, 0xac, 0x32, 0x09, 0xa2, 0xaf, 0x37, 0x51, 0x6f, 0x80, 0x7b, 0x50, 0x36, 0x3b, 0x53, 0x28, 0xbc, 0x98, 0xb9, 0x43, 0x54, 0xaf, 0x7d, 0x59, 0x96, 0x6d, 0x16, 0x0f, 0x68, 0xe8, 0x0c, 0x6b, 0x2d, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2207 = { .name = "ecdsa_brainpoolp512r1_sha512_2207", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2207_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2207_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2207_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 257 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2208 for ECDSA, tcId is 258 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2208_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2208_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2208_sig[] = { 0xa6, 0x20, 0x88, 0x0b, 0xb7, 0xfa, 0xb1, 0x18, 0x0e, 0x3d, 0x8f, 0x39, 0x3e, 0x4b, 0x33, 0x43, 0xdd, 0x4e, 0xb1, 0xc3, 0x74, 0xf9, 0xd6, 0x12, 0x52, 0xf8, 0xa2, 0x01, 0xd9, 0x09, 0x6b, 0xa8, 0x36, 0x72, 0x1f, 0x8e, 0x2d, 0x8b, 0x56, 0xcb, 0xf4, 0x06, 0x96, 0x0a, 0xae, 0x0e, 0x50, 0x32, 0x5a, 0xdf, 0xca, 0x6b, 0x1b, 0x52, 0x9f, 0x06, 0xa8, 0x12, 0x60, 0xbd, 0x8b, 0x15, 0xff, 0x68, 0x76, 0x53, 0x7f, 0xeb, 0xbc, 0x0e, 0x24, 0xab, 0x49, 0x92, 0xb5, 0x76, 0xab, 0xf8, 0xbc, 0x02, 0x01, 0xca, 0xcf, 0x5c, 0xcf, 0x67, 0x4a, 0xd3, 0xc3, 0xb1, 0x55, 0x2c, 0x98, 0xca, 0x64, 0x64, 0x2e, 0xff, 0x54, 0x01, 0xaf, 0xec, 0xab, 0x16, 0x7e, 0xc0, 0xbe, 0x19, 0x5f, 0xe5, 0xff, 0xa1, 0x78, 0xf1, 0x45, 0x67, 0xef, 0x17, 0x1b, 0x48, 0x27, 0x96, 0x4a, 0x55, 0x9d, 0x07, 0x9b, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2208 = { .name = "ecdsa_brainpoolp512r1_sha512_2208", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2208_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2208_msg, .msglen = 20, .sig = ecdsa_brainpoolp512r1_sha512_2208_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 258 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2209 for ECDSA, tcId is 259 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2209_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0x00, 0x00, 0x00, 0x00, 0x1a, 0x4b, 0x00, 0xc7, 0x4a, 0x5a, 0x61, 0xac, 0x19, 0x6f, 0xaf, 0x4d, 0xc3, 0x9a, 0xcd, 0x41, 0xbf, 0x35, 0x4d, 0xef, 0x0a, 0x27, 0x52, 0x99, 0x64, 0x35, 0x91, 0x32, 0xa7, 0x6f, 0x28, 0x65, 0x42, 0x48, 0xd1, 0xac, 0x00, 0x4d, 0x11, 0xd8, 0x11, 0xab, 0xa0, 0xac, 0xb9, 0xc2, 0x6d, 0x2f, 0x4a, 0x54, 0x01, 0x2c, 0x5d, 0x8a, 0x9a, 0x1e, 0x7c, 0x8b, 0x4a, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2209_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2209_sig[] = { 0x47, 0x9c, 0xe8, 0x45, 0x8b, 0x04, 0xb2, 0xdc, 0x12, 0x7b, 0x46, 0x97, 0x1e, 0x6c, 0x79, 0x83, 0x1b, 0xf7, 0x88, 0xf6, 0x5d, 0xdc, 0x77, 0x06, 0x20, 0xda, 0xaa, 0x15, 0x58, 0x3f, 0x8d, 0x50, 0x6f, 0x2a, 0x66, 0x52, 0xd8, 0x2b, 0x38, 0x56, 0x0e, 0xc1, 0x97, 0x75, 0x86, 0xe1, 0x19, 0x29, 0xb6, 0x66, 0xf6, 0xd7, 0x01, 0x2d, 0x81, 0x6f, 0xd3, 0x56, 0xd4, 0x1e, 0x93, 0x04, 0xd6, 0x0f, 0xa7, 0x50, 0xf7, 0x3c, 0xca, 0xef, 0xf5, 0xd9, 0x94, 0x06, 0x7e, 0x66, 0xe4, 0x5c, 0x20, 0x08, 0x92, 0xc6, 0x07, 0xb3, 0x29, 0xbe, 0x5e, 0x64, 0xdb, 0x5c, 0x38, 0x3c, 0x7b, 0xe7, 0x11, 0xc9, 0x7b, 0x5d, 0xd4, 0x25, 0xa5, 0x22, 0x50, 0xbc, 0x86, 0x24, 0x77, 0xe2, 0x8b, 0x3a, 0xfa, 0x4e, 0xf3, 0xd8, 0x31, 0x06, 0x6a, 0x7b, 0x14, 0x34, 0x32, 0xa5, 0xd1, 0x54, 0x03, 0x02, 0x14, 0x57, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2209 = { .name = "ecdsa_brainpoolp512r1_sha512_2209", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2209_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2209_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2209_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 259 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2210 for ECDSA, tcId is 260 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2210_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0x00, 0x00, 0x00, 0x00, 0x1a, 0x4b, 0x00, 0xc7, 0x4a, 0x5a, 0x61, 0xac, 0x19, 0x6f, 0xaf, 0x4d, 0xc3, 0x9a, 0xcd, 0x41, 0xbf, 0x35, 0x4d, 0xef, 0x0a, 0x27, 0x52, 0x99, 0x64, 0x35, 0x91, 0x32, 0xa7, 0x6f, 0x28, 0x65, 0x42, 0x48, 0xd1, 0xac, 0x00, 0x4d, 0x11, 0xd8, 0x11, 0xab, 0xa0, 0xac, 0xb9, 0xc2, 0x6d, 0x2f, 0x4a, 0x54, 0x01, 0x2c, 0x5d, 0x8a, 0x9a, 0x1e, 0x7c, 0x8b, 0x4a, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2210_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2210_sig[] = { 0x68, 0x5b, 0x8b, 0x29, 0x29, 0xc9, 0xa0, 0xa9, 0xb0, 0xde, 0xb6, 0xba, 0xef, 0xd0, 0x0e, 0x26, 0xf5, 0x0d, 0x4c, 0x1f, 0xc3, 0xfe, 0xd4, 0x7d, 0x7e, 0xf8, 0x12, 0xc5, 0x2b, 0x66, 0xec, 0x6f, 0x6d, 0x09, 0xf5, 0x4e, 0x9b, 0xdb, 0x72, 0x02, 0x01, 0x65, 0x70, 0xf7, 0x5b, 0xb9, 0x91, 0x2a, 0xab, 0x3a, 0x57, 0x2b, 0xfb, 0x97, 0xea, 0x58, 0x9a, 0xce, 0x29, 0x4f, 0xf0, 0xfe, 0x66, 0x62, 0x4c, 0x28, 0x62, 0x67, 0xcb, 0x87, 0xa6, 0xbe, 0x56, 0xf4, 0xcd, 0x00, 0x80, 0x39, 0x8c, 0x23, 0xe5, 0x69, 0xf2, 0xeb, 0xda, 0x71, 0xd2, 0xcd, 0x16, 0x82, 0x08, 0x02, 0x90, 0xde, 0xb4, 0x14, 0x3b, 0xdc, 0x61, 0xe7, 0x5b, 0x42, 0xab, 0xef, 0xbc, 0xbb, 0xdd, 0xf4, 0xc7, 0x94, 0x54, 0x5a, 0x05, 0x37, 0x86, 0x56, 0xa1, 0x85, 0x86, 0x58, 0xe0, 0xa4, 0x59, 0x58, 0x33, 0xfc, 0x40, 0xf6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2210 = { .name = "ecdsa_brainpoolp512r1_sha512_2210", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2210_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2210_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2210_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 260 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2211 for ECDSA, tcId is 261 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2211_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0x00, 0x00, 0x00, 0x00, 0x1a, 0x4b, 0x00, 0xc7, 0x4a, 0x5a, 0x61, 0xac, 0x19, 0x6f, 0xaf, 0x4d, 0xc3, 0x9a, 0xcd, 0x41, 0xbf, 0x35, 0x4d, 0xef, 0x0a, 0x27, 0x52, 0x99, 0x64, 0x35, 0x91, 0x32, 0xa7, 0x6f, 0x28, 0x65, 0x42, 0x48, 0xd1, 0xac, 0x00, 0x4d, 0x11, 0xd8, 0x11, 0xab, 0xa0, 0xac, 0xb9, 0xc2, 0x6d, 0x2f, 0x4a, 0x54, 0x01, 0x2c, 0x5d, 0x8a, 0x9a, 0x1e, 0x7c, 0x8b, 0x4a, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2211_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2211_sig[] = { 0x81, 0x11, 0x12, 0xd2, 0x7c, 0xa1, 0xe4, 0x34, 0xb0, 0x0c, 0x02, 0x93, 0x32, 0x02, 0x84, 0xb1, 0xc5, 0x36, 0x9f, 0xd0, 0x07, 0xf9, 0x0e, 0x7a, 0x99, 0xd4, 0x4c, 0x9c, 0x02, 0x01, 0x36, 0x88, 0xd1, 0x6e, 0x5e, 0x0a, 0x2f, 0xc3, 0xa0, 0x77, 0x06, 0x4a, 0x99, 0x5c, 0x42, 0x44, 0x19, 0x5c, 0x04, 0xf0, 0x03, 0x23, 0xe3, 0x3a, 0xde, 0xa6, 0xb3, 0x77, 0x01, 0xad, 0x5c, 0xb3, 0x62, 0x16, 0x82, 0xdd, 0x5c, 0x3e, 0x36, 0x42, 0xfc, 0x43, 0xe5, 0xc4, 0xc6, 0x52, 0xe3, 0xb2, 0xd0, 0x0f, 0x6d, 0x13, 0x72, 0x07, 0xbe, 0x8c, 0x9b, 0x21, 0x25, 0x56, 0x1c, 0x08, 0x70, 0x3e, 0x4a, 0x84, 0xd2, 0xa8, 0x27, 0x85, 0xf7, 0x75, 0xab, 0xd1, 0x8a, 0xab, 0x24, 0xe5, 0x2f, 0x12, 0xc5, 0xf8, 0xcb, 0x56, 0xb2, 0x8b, 0x91, 0x5f, 0x9c, 0x0b, 0x11, 0x10, 0xc5, 0x42, 0xba, 0x92, 0xb3, 0x13, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2211 = { .name = "ecdsa_brainpoolp512r1_sha512_2211", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2211_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2211_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2211_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 261 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2212 for ECDSA, tcId is 262 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2212_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0xaa, 0xdd, 0x9d, 0xb8, 0xc1, 0x9e, 0xc3, 0xc3, 0xf5, 0x7a, 0x85, 0x02, 0x1a, 0x5a, 0x4c, 0xba, 0x07, 0x95, 0xc0, 0x71, 0xf4, 0x94, 0x84, 0x1f, 0xcc, 0x3c, 0x4a, 0x31, 0x0b, 0xfd, 0x77, 0x3e, 0xd5, 0xde, 0x72, 0x9b, 0x59, 0x7d, 0x96, 0x96, 0xae, 0x80, 0x8f, 0x52, 0xd4, 0xf7, 0xe0, 0x39, 0x6e, 0xbf, 0x91, 0xff, 0xe3, 0x2e, 0xc5, 0x58, 0xcb, 0x1f, 0xc6, 0x37, 0xdb, 0xae, 0xfe, 0xa1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2212_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2212_sig[] = { 0x39, 0xd0, 0xc5, 0xc4, 0xe4, 0x8c, 0xa1, 0x40, 0x64, 0xb2, 0xe9, 0xb3, 0x60, 0x0d, 0xeb, 0x0e, 0xc2, 0xfb, 0x3e, 0x0c, 0x65, 0xb3, 0xbe, 0x5c, 0xe3, 0xf2, 0x06, 0x16, 0x6d, 0x76, 0xdf, 0xc5, 0xa5, 0xf6, 0xea, 0x87, 0x02, 0xda, 0x3a, 0xec, 0xb1, 0x3e, 0x7b, 0x55, 0xa8, 0x7b, 0x12, 0x63, 0xc4, 0x88, 0x46, 0x11, 0xe5, 0xde, 0x44, 0x0f, 0x6c, 0x89, 0xed, 0x12, 0xf8, 0x8a, 0xe5, 0x0f, 0x6a, 0xe7, 0x83, 0x98, 0xe7, 0xf9, 0x42, 0xb3, 0x5e, 0x7d, 0x87, 0xef, 0x27, 0xce, 0x83, 0x06, 0x90, 0xf7, 0x32, 0x7a, 0xd2, 0xa8, 0x3d, 0xf5, 0x6e, 0x9d, 0x02, 0x88, 0xb5, 0x19, 0x99, 0x45, 0x4b, 0xd9, 0x0f, 0x89, 0x5e, 0x78, 0x49, 0xf3, 0x5b, 0x2a, 0x65, 0x2a, 0x3a, 0xf9, 0x7b, 0xf5, 0x57, 0x95, 0xb4, 0x69, 0x8e, 0x0b, 0x01, 0x4e, 0xa6, 0xff, 0x02, 0x1a, 0x00, 0x87, 0x8f, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2212 = { .name = "ecdsa_brainpoolp512r1_sha512_2212", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2212_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2212_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2212_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 262 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2213 for ECDSA, tcId is 263 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2213_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0xaa, 0xdd, 0x9d, 0xb8, 0xc1, 0x9e, 0xc3, 0xc3, 0xf5, 0x7a, 0x85, 0x02, 0x1a, 0x5a, 0x4c, 0xba, 0x07, 0x95, 0xc0, 0x71, 0xf4, 0x94, 0x84, 0x1f, 0xcc, 0x3c, 0x4a, 0x31, 0x0b, 0xfd, 0x77, 0x3e, 0xd5, 0xde, 0x72, 0x9b, 0x59, 0x7d, 0x96, 0x96, 0xae, 0x80, 0x8f, 0x52, 0xd4, 0xf7, 0xe0, 0x39, 0x6e, 0xbf, 0x91, 0xff, 0xe3, 0x2e, 0xc5, 0x58, 0xcb, 0x1f, 0xc6, 0x37, 0xdb, 0xae, 0xfe, 0xa1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2213_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2213_sig[] = { 0x7c, 0x3a, 0xb2, 0xe3, 0xde, 0xaf, 0xb8, 0x23, 0xee, 0x59, 0x1d, 0xc5, 0x3c, 0x97, 0xb3, 0x89, 0xc6, 0xd1, 0x8a, 0x8c, 0xa9, 0xa6, 0xae, 0x20, 0xc7, 0x43, 0x28, 0x60, 0x6d, 0xb2, 0xd7, 0xc7, 0xd2, 0xbb, 0x3c, 0xe2, 0x68, 0x94, 0xe3, 0xf3, 0x07, 0x85, 0x23, 0x7b, 0x9e, 0x87, 0x43, 0x50, 0xd6, 0x15, 0x78, 0x63, 0x81, 0xb0, 0xc8, 0xc4, 0x20, 0x22, 0x4d, 0x2f, 0x5e, 0x35, 0x94, 0x68, 0x34, 0xe7, 0x03, 0xdd, 0x93, 0x9b, 0x2b, 0x1a, 0x20, 0x08, 0x72, 0x33, 0x4e, 0x2f, 0x86, 0x4d, 0xbf, 0x26, 0x68, 0x8f, 0x84, 0x75, 0xc9, 0xe3, 0x8a, 0x38, 0x41, 0x02, 0xe0, 0x8a, 0x18, 0xc2, 0x7d, 0x4e, 0x30, 0xd8, 0x02, 0x09, 0x5f, 0xff, 0x3e, 0xdd, 0xa6, 0xdc, 0x1e, 0x03, 0xaa, 0x81, 0xae, 0xd9, 0x67, 0x19, 0xcb, 0x49, 0x61, 0x24, 0x71, 0xfa, 0x11, 0x88, 0x75, 0xa1, 0x5c, 0x18, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2213 = { .name = "ecdsa_brainpoolp512r1_sha512_2213", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2213_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2213_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2213_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 263 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2214 for ECDSA, tcId is 264 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2214_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0xaa, 0xdd, 0x9d, 0xb8, 0xc1, 0x9e, 0xc3, 0xc3, 0xf5, 0x7a, 0x85, 0x02, 0x1a, 0x5a, 0x4c, 0xba, 0x07, 0x95, 0xc0, 0x71, 0xf4, 0x94, 0x84, 0x1f, 0xcc, 0x3c, 0x4a, 0x31, 0x0b, 0xfd, 0x77, 0x3e, 0xd5, 0xde, 0x72, 0x9b, 0x59, 0x7d, 0x96, 0x96, 0xae, 0x80, 0x8f, 0x52, 0xd4, 0xf7, 0xe0, 0x39, 0x6e, 0xbf, 0x91, 0xff, 0xe3, 0x2e, 0xc5, 0x58, 0xcb, 0x1f, 0xc6, 0x37, 0xdb, 0xae, 0xfe, 0xa1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2214_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2214_sig[] = { 0x4c, 0xd8, 0xa5, 0xf1, 0x97, 0x7a, 0x3c, 0xf8, 0xe8, 0x47, 0xa1, 0x37, 0x73, 0x59, 0xcc, 0xa7, 0x04, 0x6c, 0x79, 0x3a, 0xda, 0x06, 0x65, 0xf2, 0xc0, 0x69, 0x08, 0xfd, 0xce, 0xc2, 0x4e, 0x6c, 0xd5, 0x5a, 0x17, 0x50, 0xca, 0x57, 0x64, 0x21, 0xb8, 0xa6, 0x5a, 0xa9, 0x9a, 0xed, 0x86, 0x3c, 0xda, 0xaa, 0x77, 0xd7, 0xf7, 0xcf, 0x84, 0x44, 0x8e, 0xa5, 0x8e, 0x95, 0xc5, 0x7a, 0x13, 0x3c, 0xa3, 0x40, 0x57, 0x2d, 0x5d, 0x96, 0x83, 0xe7, 0x2e, 0x15, 0x7e, 0x68, 0x3a, 0xb1, 0x6d, 0x0e, 0x2a, 0x35, 0x03, 0x0f, 0xf3, 0xe1, 0x64, 0x1d, 0x1b, 0x4f, 0x80, 0x1d, 0x80, 0x73, 0x2c, 0x32, 0xb9, 0xfb, 0xb5, 0x3f, 0xdc, 0xae, 0xa9, 0x33, 0xf1, 0x31, 0x13, 0x6f, 0x8a, 0xb2, 0x53, 0x11, 0x01, 0x8b, 0x87, 0x1f, 0x53, 0x75, 0x37, 0x82, 0x98, 0x9a, 0x87, 0xef, 0x23, 0x1a, 0x38, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2214 = { .name = "ecdsa_brainpoolp512r1_sha512_2214", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2214_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2214_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2214_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 264 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2215 for ECDSA, tcId is 265 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2215_pubkey[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xbb, 0x41, 0x89, 0xa6, 0xd2, 0xab, 0x7b, 0x5a, 0xae, 0x55, 0x0f, 0xe8, 0xdc, 0x00, 0xbe, 0x2e, 0x00, 0xf4, 0xb3, 0x5b, 0x57, 0x6d, 0x6f, 0x86, 0x2c, 0x09, 0x86, 0x92, 0x10, 0xfc, 0x82, 0xfb, 0xd1, 0x5a, 0x54, 0xde, 0xf1, 0x44, 0x29, 0x79, 0xfa, 0x0d, 0xa1, 0xc6, 0x44, 0x08, 0xfd, 0x84, 0x37, 0xa6, 0x00, 0x46, 0x93, 0x08, 0x20, 0x74, 0x8e, 0xcd, 0xfc, 0x66, 0x4a, 0x59, 0xa8, 0x7e, 0xae, 0x33, 0x8d, 0x22, 0xd0, 0x83, 0x55, 0x23, 0x15, 0x6f, 0x8f, 0x7d, 0x93, 0x47, 0x10, 0xa7, 0x47, 0xcf, 0x19, 0x2d, 0x3e, 0x31, 0x7b, 0xc4, 0x5f, 0x04, 0x89, 0xd6, 0x97, 0x98, 0x87, 0xc6, 0x5e, 0xc1, 0x7a, 0xb7, 0xb5, 0xe3, 0xda, 0x9f, 0x4c, 0xb1, 0x10, 0x11, 0x6e, 0xf0, 0x73, 0x98, 0x49, 0xac, 0xc5, 0x6d, 0x24, 0xe5, 0xa3, 0x36, 0x5f, 0xcf, 0xb2, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2215_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2215_sig[] = { 0x53, 0x19, 0x2c, 0x28, 0x82, 0x0e, 0xc2, 0x66, 0x63, 0x9f, 0xee, 0x09, 0xe2, 0x14, 0xa5, 0x5c, 0xc0, 0xef, 0xb0, 0x7b, 0x22, 0xdc, 0x0d, 0x3f, 0x29, 0x3b, 0xda, 0x20, 0x72, 0xfc, 0xf9, 0xb4, 0x62, 0xda, 0x93, 0xec, 0x9e, 0x71, 0x69, 0xae, 0x1f, 0x11, 0x48, 0x70, 0x51, 0x89, 0xf7, 0xf1, 0x5d, 0x2c, 0xbe, 0xc4, 0x6d, 0x22, 0x41, 0x97, 0xa3, 0xa7, 0xa9, 0x24, 0xb0, 0xc0, 0x0a, 0x32, 0x1b, 0x66, 0x45, 0x36, 0xae, 0xdb, 0xdc, 0x97, 0xbe, 0xd4, 0xde, 0xe2, 0x3e, 0xb9, 0x4a, 0x49, 0xf2, 0x3d, 0xe3, 0xbd, 0x84, 0xa7, 0x8f, 0x29, 0x9e, 0x81, 0xed, 0xfe, 0x01, 0x7a, 0x7d, 0x3c, 0xa3, 0xa7, 0xc8, 0xaa, 0xce, 0x8d, 0x13, 0xb6, 0xb2, 0xeb, 0x47, 0x7b, 0x92, 0x2c, 0x43, 0x98, 0x39, 0xea, 0xcd, 0xff, 0x27, 0x83, 0x07, 0x07, 0x57, 0x75, 0x48, 0x63, 0x58, 0x2f, 0x71, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2215 = { .name = "ecdsa_brainpoolp512r1_sha512_2215", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2215_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2215_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2215_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 265 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2216 for ECDSA, tcId is 266 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2216_pubkey[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xbb, 0x41, 0x89, 0xa6, 0xd2, 0xab, 0x7b, 0x5a, 0xae, 0x55, 0x0f, 0xe8, 0xdc, 0x00, 0xbe, 0x2e, 0x00, 0xf4, 0xb3, 0x5b, 0x57, 0x6d, 0x6f, 0x86, 0x2c, 0x09, 0x86, 0x92, 0x10, 0xfc, 0x82, 0xfb, 0xd1, 0x5a, 0x54, 0xde, 0xf1, 0x44, 0x29, 0x79, 0xfa, 0x0d, 0xa1, 0xc6, 0x44, 0x08, 0xfd, 0x84, 0x37, 0xa6, 0x00, 0x46, 0x93, 0x08, 0x20, 0x74, 0x8e, 0xcd, 0xfc, 0x66, 0x4a, 0x59, 0xa8, 0x7e, 0xae, 0x33, 0x8d, 0x22, 0xd0, 0x83, 0x55, 0x23, 0x15, 0x6f, 0x8f, 0x7d, 0x93, 0x47, 0x10, 0xa7, 0x47, 0xcf, 0x19, 0x2d, 0x3e, 0x31, 0x7b, 0xc4, 0x5f, 0x04, 0x89, 0xd6, 0x97, 0x98, 0x87, 0xc6, 0x5e, 0xc1, 0x7a, 0xb7, 0xb5, 0xe3, 0xda, 0x9f, 0x4c, 0xb1, 0x10, 0x11, 0x6e, 0xf0, 0x73, 0x98, 0x49, 0xac, 0xc5, 0x6d, 0x24, 0xe5, 0xa3, 0x36, 0x5f, 0xcf, 0xb2, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2216_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2216_sig[] = { 0x96, 0x90, 0x58, 0xc1, 0x5d, 0x67, 0x5b, 0x1b, 0x26, 0x21, 0x52, 0xa4, 0x52, 0x0f, 0x7e, 0x80, 0x3a, 0xb4, 0x65, 0xa9, 0xe1, 0xee, 0xef, 0x7b, 0x8a, 0x5d, 0x0f, 0xb3, 0xe8, 0x80, 0x32, 0xb8, 0xe8, 0xf1, 0xbe, 0x9f, 0x37, 0xc8, 0x0f, 0x9c, 0x7b, 0x95, 0x0f, 0x4d, 0xa9, 0x50, 0xba, 0xae, 0x9b, 0x21, 0x6e, 0xcd, 0x6c, 0x79, 0x3d, 0xdb, 0x14, 0x59, 0xcf, 0xdf, 0x49, 0x77, 0x6b, 0xae, 0x20, 0xe0, 0xd0, 0x78, 0xa5, 0xa1, 0x13, 0xe9, 0x2f, 0xac, 0xdf, 0xe5, 0xcb, 0x39, 0x24, 0x32, 0x47, 0x25, 0x4a, 0xa0, 0xa6, 0x56, 0xb8, 0x3e, 0x7b, 0xaa, 0x34, 0x3d, 0x36, 0xf7, 0xb1, 0x4b, 0x86, 0xf1, 0x5e, 0x54, 0xb7, 0x1b, 0xa7, 0x50, 0x6d, 0x51, 0x19, 0xff, 0x52, 0xc4, 0x7e, 0x0e, 0xe5, 0x49, 0x92, 0x7a, 0x00, 0x8c, 0xbf, 0x2b, 0xbf, 0xe1, 0x91, 0x6d, 0x1c, 0xc2, 0x74, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2216 = { .name = "ecdsa_brainpoolp512r1_sha512_2216", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2216_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2216_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2216_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 266 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2217 for ECDSA, tcId is 267 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2217_pubkey[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xbb, 0x41, 0x89, 0xa6, 0xd2, 0xab, 0x7b, 0x5a, 0xae, 0x55, 0x0f, 0xe8, 0xdc, 0x00, 0xbe, 0x2e, 0x00, 0xf4, 0xb3, 0x5b, 0x57, 0x6d, 0x6f, 0x86, 0x2c, 0x09, 0x86, 0x92, 0x10, 0xfc, 0x82, 0xfb, 0xd1, 0x5a, 0x54, 0xde, 0xf1, 0x44, 0x29, 0x79, 0xfa, 0x0d, 0xa1, 0xc6, 0x44, 0x08, 0xfd, 0x84, 0x37, 0xa6, 0x00, 0x46, 0x93, 0x08, 0x20, 0x74, 0x8e, 0xcd, 0xfc, 0x66, 0x4a, 0x59, 0xa8, 0x7e, 0xae, 0x33, 0x8d, 0x22, 0xd0, 0x83, 0x55, 0x23, 0x15, 0x6f, 0x8f, 0x7d, 0x93, 0x47, 0x10, 0xa7, 0x47, 0xcf, 0x19, 0x2d, 0x3e, 0x31, 0x7b, 0xc4, 0x5f, 0x04, 0x89, 0xd6, 0x97, 0x98, 0x87, 0xc6, 0x5e, 0xc1, 0x7a, 0xb7, 0xb5, 0xe3, 0xda, 0x9f, 0x4c, 0xb1, 0x10, 0x11, 0x6e, 0xf0, 0x73, 0x98, 0x49, 0xac, 0xc5, 0x6d, 0x24, 0xe5, 0xa3, 0x36, 0x5f, 0xcf, 0xb2, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2217_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2217_sig[] = { 0x1d, 0xe5, 0xdf, 0x62, 0x13, 0x64, 0x43, 0x6b, 0xed, 0x5c, 0xac, 0xf8, 0xdb, 0xe4, 0x20, 0xe4, 0xe4, 0xe5, 0xd1, 0xb0, 0x43, 0x4f, 0xcf, 0x9d, 0xc3, 0x35, 0x64, 0x5d, 0xd0, 0xaa, 0x07, 0xcc, 0x1d, 0x1e, 0xa3, 0x0a, 0x8c, 0xaf, 0xe2, 0x53, 0x1c, 0xd4, 0x03, 0x5d, 0xd9, 0x72, 0xc0, 0xd6, 0xc3, 0x72, 0x0f, 0x16, 0x0e, 0x24, 0x26, 0x4f, 0xd6, 0xc4, 0x15, 0x21, 0xe4, 0x4e, 0xb0, 0xcb, 0x72, 0xe9, 0xab, 0xd5, 0x45, 0x61, 0xba, 0xc8, 0x9b, 0x23, 0x4b, 0xf9, 0xe5, 0x1a, 0x3f, 0x60, 0x03, 0x59, 0x0a, 0xf1, 0x77, 0x09, 0x8e, 0x25, 0xf0, 0x05, 0x3a, 0x3a, 0xe1, 0x8a, 0x6c, 0x74, 0xb3, 0x89, 0x67, 0x4a, 0x6e, 0xb8, 0x03, 0x78, 0xff, 0xd2, 0x55, 0xcf, 0xe5, 0x23, 0x23, 0x64, 0x5c, 0xdf, 0xe9, 0xa1, 0x0a, 0x96, 0x53, 0x41, 0xb4, 0xe4, 0x7f, 0xc0, 0xdd, 0x08, 0x2e, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2217 = { .name = "ecdsa_brainpoolp512r1_sha512_2217", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2217_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2217_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2217_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 267 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2218 for ECDSA, tcId is 268 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2218_pubkey[] = { 0x24, 0xc1, 0x04, 0x40, 0xe3, 0x7a, 0x15, 0xd7, 0xec, 0x9a, 0x3a, 0x48, 0x96, 0x5a, 0x9c, 0xe9, 0x38, 0x02, 0x21, 0xfc, 0x51, 0x15, 0x5f, 0x1e, 0x99, 0x27, 0x16, 0xcd, 0x99, 0x33, 0xd0, 0x9c, 0xe0, 0xa5, 0x42, 0x44, 0x71, 0x87, 0x7e, 0x89, 0x94, 0x49, 0x4a, 0x4c, 0x2a, 0xde, 0x0a, 0x81, 0xef, 0x52, 0x95, 0x2e, 0x39, 0x56, 0x55, 0x15, 0x7f, 0x0b, 0x74, 0x3b, 0x3b, 0x21, 0x9e, 0x2d, 0x62, 0x8f, 0xd5, 0xba, 0x51, 0x0f, 0x61, 0x0e, 0xe6, 0x93, 0xa1, 0xe0, 0xd3, 0x9e, 0xf3, 0x9d, 0x91, 0xa6, 0x24, 0x83, 0x79, 0xc6, 0x22, 0xa1, 0x75, 0xa2, 0x3a, 0x53, 0x30, 0xa8, 0x8b, 0x2d, 0x5a, 0x60, 0xdb, 0xf6, 0xd2, 0x49, 0x70, 0x2c, 0xd1, 0x50, 0x45, 0x61, 0x53, 0x5e, 0xa1, 0x7e, 0x1b, 0xe1, 0xb7, 0x0a, 0x41, 0xdc, 0x46, 0x3e, 0x8e, 0x1a, 0x1a, 0xf0, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2218_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2218_sig[] = { 0x42, 0x2f, 0xb1, 0x8c, 0xde, 0xc9, 0x66, 0x93, 0x71, 0x45, 0xb0, 0xf1, 0x60, 0xb8, 0xce, 0x22, 0x2b, 0x0b, 0xa1, 0x6f, 0xab, 0x07, 0x5e, 0x16, 0xf1, 0xda, 0xc8, 0x39, 0xb8, 0xd7, 0x77, 0x2f, 0xee, 0x27, 0xa2, 0x83, 0xad, 0x72, 0x22, 0x25, 0xbe, 0xbe, 0x83, 0xdb, 0x2d, 0x5a, 0x8b, 0x25, 0xcb, 0x2c, 0xbe, 0x45, 0x24, 0x8b, 0x3a, 0xa8, 0x76, 0x55, 0x4c, 0x6a, 0x37, 0xf8, 0x13, 0x75, 0x7a, 0x38, 0x89, 0xd5, 0x3b, 0xb4, 0x2a, 0x6d, 0x41, 0xf3, 0x93, 0xeb, 0x00, 0xc4, 0x36, 0x23, 0x93, 0x70, 0x29, 0xd4, 0xcc, 0x1d, 0x36, 0x74, 0x69, 0xf6, 0xea, 0x4e, 0xc1, 0x66, 0x58, 0x61, 0x9d, 0x29, 0x35, 0xde, 0x0a, 0x65, 0x5a, 0xda, 0xe4, 0xcb, 0xb6, 0x24, 0xf2, 0xff, 0xe3, 0xce, 0x41, 0xf0, 0x24, 0x26, 0x9d, 0x91, 0x49, 0xdb, 0xd8, 0x3c, 0xb1, 0xc9, 0x7a, 0xed, 0x41, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2218 = { .name = "ecdsa_brainpoolp512r1_sha512_2218", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2218_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2218_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2218_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 268 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2219 for ECDSA, tcId is 269 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2219_pubkey[] = { 0x24, 0xc1, 0x04, 0x40, 0xe3, 0x7a, 0x15, 0xd7, 0xec, 0x9a, 0x3a, 0x48, 0x96, 0x5a, 0x9c, 0xe9, 0x38, 0x02, 0x21, 0xfc, 0x51, 0x15, 0x5f, 0x1e, 0x99, 0x27, 0x16, 0xcd, 0x99, 0x33, 0xd0, 0x9c, 0xe0, 0xa5, 0x42, 0x44, 0x71, 0x87, 0x7e, 0x89, 0x94, 0x49, 0x4a, 0x4c, 0x2a, 0xde, 0x0a, 0x81, 0xef, 0x52, 0x95, 0x2e, 0x39, 0x56, 0x55, 0x15, 0x7f, 0x0b, 0x74, 0x3b, 0x3b, 0x21, 0x9e, 0x2d, 0x62, 0x8f, 0xd5, 0xba, 0x51, 0x0f, 0x61, 0x0e, 0xe6, 0x93, 0xa1, 0xe0, 0xd3, 0x9e, 0xf3, 0x9d, 0x91, 0xa6, 0x24, 0x83, 0x79, 0xc6, 0x22, 0xa1, 0x75, 0xa2, 0x3a, 0x53, 0x30, 0xa8, 0x8b, 0x2d, 0x5a, 0x60, 0xdb, 0xf6, 0xd2, 0x49, 0x70, 0x2c, 0xd1, 0x50, 0x45, 0x61, 0x53, 0x5e, 0xa1, 0x7e, 0x1b, 0xe1, 0xb7, 0x0a, 0x41, 0xdc, 0x46, 0x3e, 0x8e, 0x1a, 0x1a, 0xf0, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2219_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2219_sig[] = { 0x98, 0x36, 0xee, 0x7a, 0xe0, 0x44, 0x7e, 0xc0, 0x7a, 0x6a, 0x21, 0x66, 0x33, 0xe0, 0xa9, 0x7d, 0xe8, 0x31, 0xfa, 0x04, 0xfc, 0xd7, 0x60, 0xab, 0xe3, 0x9e, 0x8f, 0x45, 0x77, 0x96, 0xfd, 0xfc, 0xe9, 0xc6, 0x9e, 0xd1, 0x3c, 0x82, 0x7d, 0xe0, 0xca, 0x6b, 0x60, 0xd8, 0x49, 0xed, 0x69, 0x76, 0xac, 0x09, 0x1b, 0x7d, 0x90, 0xce, 0x3e, 0x98, 0xd3, 0xc9, 0x14, 0x4a, 0xfe, 0x63, 0x8d, 0x42, 0x1c, 0x9d, 0x8e, 0x14, 0x2b, 0xae, 0xe8, 0x57, 0xd6, 0xad, 0xec, 0x8e, 0xff, 0x84, 0xea, 0x1d, 0x23, 0xb0, 0x5f, 0x54, 0x82, 0xcc, 0x29, 0x50, 0x45, 0x15, 0x86, 0xcf, 0x5d, 0xe0, 0xcb, 0xf9, 0xe3, 0xa7, 0x27, 0xa4, 0xa4, 0xe9, 0x3e, 0x15, 0xb6, 0xcc, 0x01, 0x25, 0xe5, 0xfc, 0xd1, 0x91, 0x06, 0x36, 0x89, 0x80, 0x64, 0xa6, 0x38, 0x13, 0xa0, 0xc7, 0x5f, 0xee, 0x28, 0x04, 0x1b, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2219 = { .name = "ecdsa_brainpoolp512r1_sha512_2219", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2219_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2219_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2219_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 269 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2220 for ECDSA, tcId is 270 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2220_pubkey[] = { 0x24, 0xc1, 0x04, 0x40, 0xe3, 0x7a, 0x15, 0xd7, 0xec, 0x9a, 0x3a, 0x48, 0x96, 0x5a, 0x9c, 0xe9, 0x38, 0x02, 0x21, 0xfc, 0x51, 0x15, 0x5f, 0x1e, 0x99, 0x27, 0x16, 0xcd, 0x99, 0x33, 0xd0, 0x9c, 0xe0, 0xa5, 0x42, 0x44, 0x71, 0x87, 0x7e, 0x89, 0x94, 0x49, 0x4a, 0x4c, 0x2a, 0xde, 0x0a, 0x81, 0xef, 0x52, 0x95, 0x2e, 0x39, 0x56, 0x55, 0x15, 0x7f, 0x0b, 0x74, 0x3b, 0x3b, 0x21, 0x9e, 0x2d, 0x62, 0x8f, 0xd5, 0xba, 0x51, 0x0f, 0x61, 0x0e, 0xe6, 0x93, 0xa1, 0xe0, 0xd3, 0x9e, 0xf3, 0x9d, 0x91, 0xa6, 0x24, 0x83, 0x79, 0xc6, 0x22, 0xa1, 0x75, 0xa2, 0x3a, 0x53, 0x30, 0xa8, 0x8b, 0x2d, 0x5a, 0x60, 0xdb, 0xf6, 0xd2, 0x49, 0x70, 0x2c, 0xd1, 0x50, 0x45, 0x61, 0x53, 0x5e, 0xa1, 0x7e, 0x1b, 0xe1, 0xb7, 0x0a, 0x41, 0xdc, 0x46, 0x3e, 0x8e, 0x1a, 0x1a, 0xf0, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2220_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2220_sig[] = { 0x08, 0x77, 0xd7, 0xa3, 0xff, 0xac, 0xf4, 0xef, 0x36, 0xcb, 0xed, 0xfd, 0x44, 0xe4, 0xcc, 0x02, 0x37, 0xbd, 0xee, 0xde, 0x8c, 0xe0, 0xbd, 0xfb, 0x33, 0x0b, 0xb7, 0x3b, 0x31, 0x7b, 0x7d, 0x16, 0x1c, 0x45, 0xbd, 0x14, 0x96, 0xe1, 0x23, 0x3c, 0xed, 0x8f, 0x7d, 0xcf, 0xd0, 0x5e, 0x0e, 0x1c, 0xc6, 0x65, 0xfb, 0x1d, 0xc9, 0x2b, 0x54, 0xfc, 0xbe, 0x9b, 0x0e, 0x55, 0xd9, 0xba, 0x1b, 0xe4, 0x0f, 0x7a, 0xb8, 0x71, 0x74, 0x2e, 0xbf, 0x22, 0xe0, 0xb7, 0x67, 0x46, 0x14, 0xd7, 0x15, 0x69, 0xd5, 0x08, 0x4c, 0xcc, 0x0c, 0x98, 0xc2, 0xe4, 0x0d, 0x08, 0x8a, 0xe8, 0x8e, 0xab, 0x37, 0x82, 0x0a, 0x89, 0xa2, 0xdb, 0xe4, 0x9e, 0x1b, 0x67, 0xec, 0x55, 0xae, 0x1a, 0x34, 0xfe, 0x48, 0x22, 0xd6, 0x91, 0xbb, 0xf5, 0x49, 0x0f, 0xcc, 0x2c, 0x47, 0xe7, 0xc1, 0xba, 0x4d, 0xc5, 0x6e, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2220 = { .name = "ecdsa_brainpoolp512r1_sha512_2220", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2220_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2220_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2220_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 270 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2221 for ECDSA, tcId is 271 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2221_pubkey[] = { 0x0b, 0xa1, 0x8c, 0xc0, 0x55, 0x72, 0x42, 0x4a, 0x7a, 0x39, 0x1f, 0x4b, 0x48, 0x25, 0x8a, 0x87, 0x1a, 0x0f, 0x6d, 0x82, 0x16, 0xc5, 0xcf, 0x82, 0x44, 0x6c, 0x2d, 0x15, 0x6d, 0x55, 0x86, 0xb4, 0xc1, 0x96, 0xda, 0x0b, 0x2f, 0x3a, 0x23, 0x51, 0x1b, 0x89, 0xef, 0xf3, 0x1d, 0xd4, 0xf0, 0xc8, 0x8d, 0xbb, 0x1a, 0x76, 0xc5, 0xe4, 0xb2, 0x7c, 0x42, 0x76, 0xf8, 0xfb, 0xc7, 0x4a, 0x1b, 0x9d, 0xa2, 0x8c, 0xc8, 0xc3, 0x41, 0xea, 0x2e, 0x39, 0x08, 0xae, 0x6a, 0xb6, 0x82, 0x5f, 0x95, 0x60, 0x32, 0xc5, 0x3e, 0x62, 0x56, 0x97, 0xf8, 0x0b, 0x7b, 0x4e, 0xe7, 0x2d, 0xcc, 0x9f, 0x3c, 0xff, 0x73, 0x03, 0x49, 0xe0, 0xd3, 0x0d, 0xe4, 0x10, 0x91, 0x7f, 0x3d, 0x0d, 0x1c, 0x89, 0x88, 0x56, 0x2c, 0x1d, 0x55, 0x58, 0x3b, 0x47, 0xf0, 0xde, 0xc2, 0x34, 0xfd, 0xa2, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2221_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2221_sig[] = { 0xa7, 0x32, 0x20, 0x46, 0xba, 0x74, 0x73, 0x71, 0x6d, 0x35, 0x74, 0x2d, 0x96, 0x1a, 0xc5, 0xf2, 0xfe, 0x2e, 0x1d, 0xd5, 0x74, 0xec, 0xe7, 0xbd, 0x15, 0xda, 0x8c, 0x66, 0xa2, 0x62, 0xb2, 0xe7, 0x9b, 0x0d, 0x1d, 0xf2, 0x76, 0x19, 0xfd, 0xeb, 0xbb, 0x41, 0xda, 0x1b, 0x27, 0xba, 0x7c, 0x9a, 0x03, 0x70, 0xef, 0x96, 0x2e, 0xe8, 0xa4, 0x51, 0x05, 0xf4, 0x41, 0x6d, 0x16, 0xeb, 0xf1, 0x3e, 0x84, 0x18, 0xe4, 0x45, 0xdb, 0x45, 0xcf, 0xbd, 0xc8, 0x45, 0x80, 0x55, 0x38, 0x6d, 0x65, 0xe9, 0xbc, 0x07, 0xb4, 0x97, 0xb8, 0xd4, 0xbe, 0xf5, 0xf5, 0x15, 0xe7, 0x94, 0x70, 0x50, 0xd9, 0xab, 0x97, 0x99, 0xfb, 0x52, 0x0f, 0x32, 0x2b, 0xf0, 0x0f, 0xae, 0x4f, 0xae, 0x03, 0xc1, 0x26, 0x95, 0x10, 0xeb, 0xb3, 0xe1, 0xdc, 0x8c, 0xca, 0x59, 0x29, 0x8e, 0x26, 0x94, 0x58, 0x62, 0xe9, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2221 = { .name = "ecdsa_brainpoolp512r1_sha512_2221", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2221_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2221_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2221_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 271 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2222 for ECDSA, tcId is 272 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2222_pubkey[] = { 0x0b, 0xa1, 0x8c, 0xc0, 0x55, 0x72, 0x42, 0x4a, 0x7a, 0x39, 0x1f, 0x4b, 0x48, 0x25, 0x8a, 0x87, 0x1a, 0x0f, 0x6d, 0x82, 0x16, 0xc5, 0xcf, 0x82, 0x44, 0x6c, 0x2d, 0x15, 0x6d, 0x55, 0x86, 0xb4, 0xc1, 0x96, 0xda, 0x0b, 0x2f, 0x3a, 0x23, 0x51, 0x1b, 0x89, 0xef, 0xf3, 0x1d, 0xd4, 0xf0, 0xc8, 0x8d, 0xbb, 0x1a, 0x76, 0xc5, 0xe4, 0xb2, 0x7c, 0x42, 0x76, 0xf8, 0xfb, 0xc7, 0x4a, 0x1b, 0x9d, 0xa2, 0x8c, 0xc8, 0xc3, 0x41, 0xea, 0x2e, 0x39, 0x08, 0xae, 0x6a, 0xb6, 0x82, 0x5f, 0x95, 0x60, 0x32, 0xc5, 0x3e, 0x62, 0x56, 0x97, 0xf8, 0x0b, 0x7b, 0x4e, 0xe7, 0x2d, 0xcc, 0x9f, 0x3c, 0xff, 0x73, 0x03, 0x49, 0xe0, 0xd3, 0x0d, 0xe4, 0x10, 0x91, 0x7f, 0x3d, 0x0d, 0x1c, 0x89, 0x88, 0x56, 0x2c, 0x1d, 0x55, 0x58, 0x3b, 0x47, 0xf0, 0xde, 0xc2, 0x34, 0xfd, 0xa2, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2222_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2222_sig[] = { 0x1b, 0xb4, 0x60, 0xac, 0x42, 0xbb, 0x36, 0x40, 0xbf, 0xc7, 0x39, 0xa0, 0x18, 0x6e, 0xf3, 0x36, 0x2e, 0xd2, 0x7b, 0x25, 0x4f, 0x54, 0x8c, 0x07, 0x39, 0x35, 0xca, 0xa2, 0x11, 0xa1, 0xaa, 0x30, 0x2e, 0x79, 0xa9, 0x46, 0x6d, 0x7f, 0xec, 0xe7, 0x74, 0xd2, 0x50, 0xc1, 0xae, 0xae, 0xf9, 0x64, 0x1b, 0x9a, 0x2f, 0x25, 0xe6, 0x1c, 0xa3, 0x7f, 0xad, 0xa8, 0xee, 0x07, 0xf4, 0x9f, 0xd5, 0x1e, 0x3d, 0x91, 0x8a, 0x07, 0xa3, 0x6f, 0x57, 0x8d, 0xa8, 0xb0, 0xd4, 0x2d, 0x30, 0xba, 0xd6, 0x0e, 0xcf, 0xbd, 0x60, 0x3a, 0x45, 0xd0, 0xc1, 0xa7, 0x1b, 0xb0, 0x14, 0x47, 0xea, 0xd8, 0x1a, 0x53, 0x13, 0x26, 0x5c, 0xc9, 0xb5, 0x86, 0x0a, 0xba, 0x03, 0xf1, 0xc9, 0x3a, 0x9c, 0xb9, 0xf3, 0xbd, 0xd9, 0xa8, 0x5f, 0x27, 0x0d, 0xd3, 0x69, 0x14, 0x65, 0x94, 0x1d, 0x2b, 0x80, 0x98, 0xf9, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2222 = { .name = "ecdsa_brainpoolp512r1_sha512_2222", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2222_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2222_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2222_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 272 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2223 for ECDSA, tcId is 273 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2223_pubkey[] = { 0x0b, 0xa1, 0x8c, 0xc0, 0x55, 0x72, 0x42, 0x4a, 0x7a, 0x39, 0x1f, 0x4b, 0x48, 0x25, 0x8a, 0x87, 0x1a, 0x0f, 0x6d, 0x82, 0x16, 0xc5, 0xcf, 0x82, 0x44, 0x6c, 0x2d, 0x15, 0x6d, 0x55, 0x86, 0xb4, 0xc1, 0x96, 0xda, 0x0b, 0x2f, 0x3a, 0x23, 0x51, 0x1b, 0x89, 0xef, 0xf3, 0x1d, 0xd4, 0xf0, 0xc8, 0x8d, 0xbb, 0x1a, 0x76, 0xc5, 0xe4, 0xb2, 0x7c, 0x42, 0x76, 0xf8, 0xfb, 0xc7, 0x4a, 0x1b, 0x9d, 0xa2, 0x8c, 0xc8, 0xc3, 0x41, 0xea, 0x2e, 0x39, 0x08, 0xae, 0x6a, 0xb6, 0x82, 0x5f, 0x95, 0x60, 0x32, 0xc5, 0x3e, 0x62, 0x56, 0x97, 0xf8, 0x0b, 0x7b, 0x4e, 0xe7, 0x2d, 0xcc, 0x9f, 0x3c, 0xff, 0x73, 0x03, 0x49, 0xe0, 0xd3, 0x0d, 0xe4, 0x10, 0x91, 0x7f, 0x3d, 0x0d, 0x1c, 0x89, 0x88, 0x56, 0x2c, 0x1d, 0x55, 0x58, 0x3b, 0x47, 0xf0, 0xde, 0xc2, 0x34, 0xfd, 0xa2, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2223_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2223_sig[] = { 0x5b, 0x44, 0xe4, 0xfd, 0x49, 0x96, 0xf2, 0x7a, 0x7d, 0xcf, 0x30, 0x6b, 0xc9, 0xff, 0xf4, 0xa9, 0xc3, 0x6e, 0x3f, 0xe0, 0x90, 0x26, 0xfa, 0x72, 0x12, 0x2b, 0x64, 0xa4, 0xff, 0x65, 0xf8, 0x61, 0xa5, 0x95, 0x4c, 0xe8, 0xa4, 0x1f, 0x69, 0xa3, 0x91, 0x5c, 0x84, 0xa6, 0x3d, 0xb0, 0xc5, 0x7c, 0x6d, 0xfe, 0xcb, 0xac, 0x4f, 0xde, 0x99, 0xea, 0x5f, 0xcb, 0x10, 0x4d, 0x69, 0x67, 0xd6, 0x13, 0x08, 0x8e, 0x7b, 0x84, 0x6d, 0x6c, 0x5e, 0x09, 0x3a, 0x7b, 0xa1, 0x74, 0x27, 0xbc, 0xba, 0x0e, 0x92, 0x5a, 0xcb, 0x82, 0x6e, 0x4e, 0x9b, 0x97, 0x2b, 0x2d, 0x8a, 0x6d, 0x23, 0x2f, 0x63, 0x5c, 0xbe, 0x96, 0xbf, 0x6f, 0x16, 0x31, 0x74, 0xdb, 0x64, 0x6c, 0x2f, 0x66, 0x23, 0xc8, 0x9d, 0xc6, 0xe4, 0xa8, 0x28, 0xd4, 0xe2, 0xe2, 0xfc, 0xf3, 0xc4, 0x27, 0xc4, 0x2b, 0xdb, 0x72, 0xef, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2223 = { .name = "ecdsa_brainpoolp512r1_sha512_2223", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2223_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2223_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2223_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 273 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2224 for ECDSA, tcId is 274 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2224_pubkey[] = { 0x7f, 0x33, 0x27, 0xe3, 0x46, 0x62, 0x27, 0x4a, 0xa1, 0x47, 0x95, 0x3a, 0x00, 0x7f, 0x30, 0xc2, 0xee, 0x1b, 0x06, 0xd7, 0xbb, 0x05, 0x3e, 0x8c, 0xe1, 0xc9, 0xb6, 0x83, 0xf0, 0xf4, 0x65, 0x63, 0xdd, 0x38, 0xdb, 0x07, 0x1d, 0x87, 0x43, 0x3b, 0x30, 0x38, 0x04, 0x34, 0xc9, 0x2e, 0x8c, 0xb7, 0x6d, 0x60, 0x3d, 0x19, 0x36, 0xfb, 0xa1, 0xe9, 0x31, 0x7a, 0x06, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x52, 0xca, 0x47, 0x8f, 0x03, 0x67, 0xab, 0x24, 0x85, 0x7e, 0x78, 0x85, 0x76, 0xf1, 0x7b, 0xfc, 0xd0, 0x5e, 0x62, 0xd2, 0x0d, 0x0f, 0xbe, 0xfd, 0x1b, 0x2d, 0x95, 0x4b, 0x99, 0x6e, 0xab, 0xa6, 0x78, 0x19, 0x02, 0x36, 0x35, 0xe3, 0x14, 0x83, 0xf5, 0xb0, 0x25, 0x7f, 0x89, 0xb4, 0x6a, 0x1d, 0x2b, 0x9c, 0xb2, 0x42, 0x0e, 0x1c, 0xdb, 0x94, 0x0c, 0xea, 0xff, 0x54, 0x29, 0xdd, 0x80, 0x13, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2224_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2224_sig[] = { 0x73, 0x96, 0x7e, 0xb2, 0x4e, 0x20, 0xf0, 0xd4, 0xba, 0x58, 0x89, 0x5a, 0x49, 0xf8, 0x12, 0xc2, 0x8d, 0x24, 0xe5, 0xf0, 0xfd, 0x5e, 0x35, 0xf1, 0x07, 0x58, 0x10, 0xa4, 0x78, 0xd9, 0x37, 0x17, 0xc8, 0xaa, 0x26, 0x05, 0xac, 0x84, 0x22, 0x6d, 0xd3, 0xd5, 0x3c, 0x39, 0xc0, 0xd8, 0xc5, 0x2e, 0xea, 0xc8, 0xe9, 0x98, 0xba, 0xd9, 0x31, 0xf5, 0xef, 0xdd, 0x66, 0x4b, 0x57, 0xce, 0xe5, 0x55, 0x05, 0xb0, 0x03, 0x1f, 0xb1, 0x0d, 0xfc, 0x7c, 0x36, 0xed, 0x89, 0xaa, 0xfe, 0x66, 0x44, 0x48, 0x35, 0xcd, 0x9c, 0x53, 0xe1, 0xc8, 0x50, 0xaf, 0x5f, 0x05, 0x5e, 0x2b, 0x26, 0x3d, 0x3e, 0x73, 0x7a, 0x4e, 0x6a, 0x83, 0xca, 0xdb, 0x9d, 0x76, 0xdd, 0xe5, 0x35, 0xe8, 0x09, 0xf4, 0x47, 0x45, 0x53, 0x24, 0xd4, 0xae, 0xe6, 0xf0, 0x36, 0x48, 0x5d, 0x41, 0x67, 0xa6, 0xe6, 0x0e, 0xed, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2224 = { .name = "ecdsa_brainpoolp512r1_sha512_2224", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2224_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2224_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2224_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 274 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2225 for ECDSA, tcId is 275 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2225_pubkey[] = { 0x7f, 0x33, 0x27, 0xe3, 0x46, 0x62, 0x27, 0x4a, 0xa1, 0x47, 0x95, 0x3a, 0x00, 0x7f, 0x30, 0xc2, 0xee, 0x1b, 0x06, 0xd7, 0xbb, 0x05, 0x3e, 0x8c, 0xe1, 0xc9, 0xb6, 0x83, 0xf0, 0xf4, 0x65, 0x63, 0xdd, 0x38, 0xdb, 0x07, 0x1d, 0x87, 0x43, 0x3b, 0x30, 0x38, 0x04, 0x34, 0xc9, 0x2e, 0x8c, 0xb7, 0x6d, 0x60, 0x3d, 0x19, 0x36, 0xfb, 0xa1, 0xe9, 0x31, 0x7a, 0x06, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x52, 0xca, 0x47, 0x8f, 0x03, 0x67, 0xab, 0x24, 0x85, 0x7e, 0x78, 0x85, 0x76, 0xf1, 0x7b, 0xfc, 0xd0, 0x5e, 0x62, 0xd2, 0x0d, 0x0f, 0xbe, 0xfd, 0x1b, 0x2d, 0x95, 0x4b, 0x99, 0x6e, 0xab, 0xa6, 0x78, 0x19, 0x02, 0x36, 0x35, 0xe3, 0x14, 0x83, 0xf5, 0xb0, 0x25, 0x7f, 0x89, 0xb4, 0x6a, 0x1d, 0x2b, 0x9c, 0xb2, 0x42, 0x0e, 0x1c, 0xdb, 0x94, 0x0c, 0xea, 0xff, 0x54, 0x29, 0xdd, 0x80, 0x13, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2225_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2225_sig[] = { 0x63, 0x3f, 0x45, 0x69, 0x14, 0x70, 0x79, 0x23, 0xf4, 0xb0, 0x08, 0x6e, 0xa3, 0x18, 0xb8, 0xce, 0xbd, 0xba, 0x5f, 0xa1, 0x43, 0x52, 0xe3, 0xd9, 0xc6, 0x06, 0xbd, 0x8d, 0xab, 0xf0, 0x32, 0x83, 0x5b, 0xbd, 0xa7, 0x6a, 0xa5, 0x14, 0xc1, 0xa6, 0xdd, 0xe1, 0xb3, 0x21, 0x80, 0x3d, 0x27, 0xf2, 0x53, 0xdf, 0xe1, 0xca, 0xe5, 0x32, 0xa5, 0xbd, 0xcd, 0x9e, 0x93, 0xe5, 0xf9, 0x45, 0x96, 0xd1, 0x9b, 0x9c, 0x8b, 0xa0, 0x74, 0xde, 0xeb, 0x03, 0x74, 0x5d, 0x8a, 0xe3, 0x7c, 0x73, 0xe0, 0x22, 0x73, 0x07, 0x1a, 0x35, 0xdc, 0xfe, 0x0f, 0x65, 0xe4, 0x63, 0xe2, 0x08, 0xbd, 0x11, 0xc6, 0xcc, 0xb3, 0xad, 0xed, 0x6b, 0xe7, 0x31, 0x3d, 0x7a, 0x65, 0x6d, 0x5e, 0x87, 0x1b, 0x8e, 0xa4, 0xd1, 0xd5, 0x1b, 0x77, 0x84, 0x67, 0xb6, 0xdd, 0xe6, 0x57, 0x8e, 0x10, 0x5d, 0x56, 0xb6, 0x17, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2225 = { .name = "ecdsa_brainpoolp512r1_sha512_2225", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2225_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2225_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2225_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 275 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2226 for ECDSA, tcId is 276 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2226_pubkey[] = { 0x7f, 0x33, 0x27, 0xe3, 0x46, 0x62, 0x27, 0x4a, 0xa1, 0x47, 0x95, 0x3a, 0x00, 0x7f, 0x30, 0xc2, 0xee, 0x1b, 0x06, 0xd7, 0xbb, 0x05, 0x3e, 0x8c, 0xe1, 0xc9, 0xb6, 0x83, 0xf0, 0xf4, 0x65, 0x63, 0xdd, 0x38, 0xdb, 0x07, 0x1d, 0x87, 0x43, 0x3b, 0x30, 0x38, 0x04, 0x34, 0xc9, 0x2e, 0x8c, 0xb7, 0x6d, 0x60, 0x3d, 0x19, 0x36, 0xfb, 0xa1, 0xe9, 0x31, 0x7a, 0x06, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x52, 0xca, 0x47, 0x8f, 0x03, 0x67, 0xab, 0x24, 0x85, 0x7e, 0x78, 0x85, 0x76, 0xf1, 0x7b, 0xfc, 0xd0, 0x5e, 0x62, 0xd2, 0x0d, 0x0f, 0xbe, 0xfd, 0x1b, 0x2d, 0x95, 0x4b, 0x99, 0x6e, 0xab, 0xa6, 0x78, 0x19, 0x02, 0x36, 0x35, 0xe3, 0x14, 0x83, 0xf5, 0xb0, 0x25, 0x7f, 0x89, 0xb4, 0x6a, 0x1d, 0x2b, 0x9c, 0xb2, 0x42, 0x0e, 0x1c, 0xdb, 0x94, 0x0c, 0xea, 0xff, 0x54, 0x29, 0xdd, 0x80, 0x13, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2226_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2226_sig[] = { 0x40, 0x89, 0x1a, 0x57, 0xb9, 0xb8, 0xf0, 0xbc, 0x6a, 0x87, 0x61, 0xd2, 0x42, 0x4c, 0xb6, 0x0b, 0x3f, 0x39, 0xde, 0x4e, 0x60, 0x1b, 0xc8, 0xda, 0xf1, 0x5a, 0xb3, 0x21, 0x6c, 0x2c, 0x56, 0xeb, 0xcc, 0x76, 0x0d, 0xe3, 0x09, 0x07, 0xe8, 0x92, 0x94, 0xaf, 0x58, 0x18, 0xf5, 0xa7, 0x2a, 0x2d, 0xf4, 0x09, 0xbb, 0x69, 0x18, 0xf3, 0xd6, 0xe5, 0x06, 0xce, 0x53, 0x14, 0x60, 0x2e, 0x50, 0xc1, 0x68, 0x62, 0x07, 0x56, 0xee, 0x2a, 0x60, 0x0a, 0x14, 0x67, 0xf2, 0x96, 0x08, 0xea, 0xd0, 0x19, 0xd0, 0xd5, 0x16, 0xb7, 0x9c, 0x8a, 0x75, 0x6f, 0xc5, 0x37, 0xa9, 0xfc, 0x73, 0x46, 0x16, 0xbf, 0xec, 0x13, 0x38, 0x39, 0xbe, 0xb4, 0x77, 0x8f, 0xdf, 0xfd, 0x3f, 0xb4, 0x22, 0x6e, 0x51, 0xce, 0x4b, 0xc0, 0x96, 0x27, 0x33, 0x1c, 0x8d, 0xae, 0xf1, 0xf7, 0x11, 0x64, 0x8a, 0x30, 0xfb, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2226 = { .name = "ecdsa_brainpoolp512r1_sha512_2226", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2226_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2226_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2226_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 276 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2227 for ECDSA, tcId is 277 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2227_pubkey[] = { 0x12, 0x48, 0x2f, 0x15, 0x8e, 0x62, 0xe8, 0x34, 0x67, 0x29, 0x7b, 0x4e, 0xda, 0xd9, 0x30, 0xad, 0x31, 0x90, 0x48, 0x28, 0x3f, 0x09, 0x49, 0x30, 0x06, 0x05, 0xa4, 0xa2, 0xd1, 0x9f, 0x72, 0xf9, 0x24, 0xd4, 0x1e, 0x1c, 0xc3, 0xad, 0x2c, 0x24, 0x65, 0x74, 0xf4, 0xa0, 0xeb, 0x63, 0x7c, 0xdd, 0x38, 0x6c, 0x1e, 0xbf, 0x4a, 0x00, 0x70, 0x7b, 0x71, 0xa6, 0x46, 0xdc, 0xff, 0xff, 0xff, 0xff, 0x18, 0xd8, 0x51, 0xef, 0x92, 0x83, 0x5f, 0x7b, 0xe9, 0x2a, 0x25, 0xb9, 0x88, 0xae, 0x8d, 0x5f, 0x7e, 0xd4, 0x2f, 0x31, 0x2f, 0x7c, 0x89, 0x68, 0x50, 0xa5, 0x89, 0xf7, 0xbb, 0x75, 0x00, 0x33, 0x0d, 0x13, 0x8c, 0xc2, 0x0d, 0xc5, 0x63, 0x0a, 0x7d, 0x52, 0x59, 0x26, 0xe8, 0xf7, 0x17, 0x63, 0x5e, 0xe7, 0x29, 0x37, 0x03, 0x57, 0x36, 0xac, 0xe8, 0x8f, 0x0c, 0x49, 0x1f, 0x31, 0x93, 0x0d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2227_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2227_sig[] = { 0x4d, 0xeb, 0xd0, 0x68, 0x30, 0x28, 0xf2, 0x33, 0x5b, 0x23, 0x3c, 0x49, 0x53, 0x1b, 0x60, 0x96, 0xe7, 0xc5, 0x52, 0x1f, 0x75, 0xfc, 0xb4, 0xb5, 0xf5, 0xe3, 0x22, 0x41, 0xbe, 0x08, 0x1f, 0x3c, 0x2b, 0x85, 0x49, 0xb5, 0x7f, 0x31, 0x21, 0x7b, 0xe9, 0xb7, 0xaa, 0x1a, 0x46, 0x87, 0xa7, 0x2e, 0xc9, 0xa5, 0xd3, 0x76, 0x30, 0x72, 0x52, 0xca, 0x7c, 0x1b, 0x9b, 0x61, 0x0d, 0x25, 0xb4, 0xd0, 0x04, 0xd1, 0x30, 0x3f, 0x6b, 0x91, 0xac, 0x01, 0xc9, 0x14, 0x11, 0xa9, 0x83, 0xf3, 0xab, 0xb0, 0x4f, 0x36, 0x98, 0xb1, 0x69, 0xf8, 0xa3, 0x9f, 0xfd, 0x19, 0x31, 0xc0, 0x61, 0xe6, 0x6f, 0x43, 0x48, 0x2f, 0xec, 0x79, 0x5d, 0xfd, 0x0d, 0x0a, 0xbe, 0x87, 0x9f, 0xa8, 0xdb, 0x88, 0x5b, 0x61, 0x8a, 0xca, 0x2a, 0xe0, 0x13, 0xe6, 0x93, 0xf1, 0x54, 0xbb, 0x9d, 0x0a, 0x77, 0xad, 0xef, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2227 = { .name = "ecdsa_brainpoolp512r1_sha512_2227", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2227_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2227_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2227_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 277 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2228 for ECDSA, tcId is 278 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2228_pubkey[] = { 0x12, 0x48, 0x2f, 0x15, 0x8e, 0x62, 0xe8, 0x34, 0x67, 0x29, 0x7b, 0x4e, 0xda, 0xd9, 0x30, 0xad, 0x31, 0x90, 0x48, 0x28, 0x3f, 0x09, 0x49, 0x30, 0x06, 0x05, 0xa4, 0xa2, 0xd1, 0x9f, 0x72, 0xf9, 0x24, 0xd4, 0x1e, 0x1c, 0xc3, 0xad, 0x2c, 0x24, 0x65, 0x74, 0xf4, 0xa0, 0xeb, 0x63, 0x7c, 0xdd, 0x38, 0x6c, 0x1e, 0xbf, 0x4a, 0x00, 0x70, 0x7b, 0x71, 0xa6, 0x46, 0xdc, 0xff, 0xff, 0xff, 0xff, 0x18, 0xd8, 0x51, 0xef, 0x92, 0x83, 0x5f, 0x7b, 0xe9, 0x2a, 0x25, 0xb9, 0x88, 0xae, 0x8d, 0x5f, 0x7e, 0xd4, 0x2f, 0x31, 0x2f, 0x7c, 0x89, 0x68, 0x50, 0xa5, 0x89, 0xf7, 0xbb, 0x75, 0x00, 0x33, 0x0d, 0x13, 0x8c, 0xc2, 0x0d, 0xc5, 0x63, 0x0a, 0x7d, 0x52, 0x59, 0x26, 0xe8, 0xf7, 0x17, 0x63, 0x5e, 0xe7, 0x29, 0x37, 0x03, 0x57, 0x36, 0xac, 0xe8, 0x8f, 0x0c, 0x49, 0x1f, 0x31, 0x93, 0x0d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2228_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2228_sig[] = { 0x34, 0xac, 0x9a, 0x4e, 0x6f, 0xb1, 0x71, 0xf4, 0x24, 0xbb, 0x59, 0x2d, 0x1b, 0x84, 0x5b, 0xee, 0x55, 0x17, 0x3b, 0x42, 0x42, 0x2f, 0xd5, 0xb5, 0x13, 0x2f, 0x85, 0x9a, 0x27, 0xdd, 0xcd, 0xa5, 0x53, 0x2f, 0xd3, 0x81, 0x16, 0xe6, 0x27, 0x7d, 0x93, 0x75, 0x63, 0x9f, 0xb2, 0x5b, 0x0f, 0x66, 0xf1, 0xe8, 0xa1, 0xac, 0xca, 0xa7, 0x80, 0x0c, 0x91, 0xc8, 0x7e, 0x74, 0x39, 0x98, 0x7d, 0x58, 0x75, 0x89, 0x2b, 0xe8, 0xe1, 0x1d, 0x9b, 0xf3, 0xe8, 0x1e, 0x83, 0x70, 0xaf, 0x02, 0xd8, 0x8b, 0xda, 0x83, 0xce, 0x0a, 0xe9, 0xc2, 0x1a, 0xeb, 0x48, 0x7e, 0xef, 0x4c, 0x4c, 0x54, 0x58, 0xe5, 0x1a, 0x99, 0xe4, 0xd7, 0x88, 0xdb, 0x84, 0x06, 0x4c, 0xfb, 0xc4, 0x82, 0x40, 0xf5, 0x66, 0x12, 0x07, 0x87, 0x69, 0xfd, 0xe0, 0xe3, 0xb7, 0x06, 0x12, 0x5f, 0x46, 0xe2, 0xf2, 0x6a, 0x35, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2228 = { .name = "ecdsa_brainpoolp512r1_sha512_2228", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2228_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2228_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2228_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 278 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2229 for ECDSA, tcId is 279 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2229_pubkey[] = { 0x12, 0x48, 0x2f, 0x15, 0x8e, 0x62, 0xe8, 0x34, 0x67, 0x29, 0x7b, 0x4e, 0xda, 0xd9, 0x30, 0xad, 0x31, 0x90, 0x48, 0x28, 0x3f, 0x09, 0x49, 0x30, 0x06, 0x05, 0xa4, 0xa2, 0xd1, 0x9f, 0x72, 0xf9, 0x24, 0xd4, 0x1e, 0x1c, 0xc3, 0xad, 0x2c, 0x24, 0x65, 0x74, 0xf4, 0xa0, 0xeb, 0x63, 0x7c, 0xdd, 0x38, 0x6c, 0x1e, 0xbf, 0x4a, 0x00, 0x70, 0x7b, 0x71, 0xa6, 0x46, 0xdc, 0xff, 0xff, 0xff, 0xff, 0x18, 0xd8, 0x51, 0xef, 0x92, 0x83, 0x5f, 0x7b, 0xe9, 0x2a, 0x25, 0xb9, 0x88, 0xae, 0x8d, 0x5f, 0x7e, 0xd4, 0x2f, 0x31, 0x2f, 0x7c, 0x89, 0x68, 0x50, 0xa5, 0x89, 0xf7, 0xbb, 0x75, 0x00, 0x33, 0x0d, 0x13, 0x8c, 0xc2, 0x0d, 0xc5, 0x63, 0x0a, 0x7d, 0x52, 0x59, 0x26, 0xe8, 0xf7, 0x17, 0x63, 0x5e, 0xe7, 0x29, 0x37, 0x03, 0x57, 0x36, 0xac, 0xe8, 0x8f, 0x0c, 0x49, 0x1f, 0x31, 0x93, 0x0d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2229_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2229_sig[] = { 0x36, 0xb6, 0x8b, 0x5c, 0xad, 0x74, 0x28, 0x80, 0x3f, 0x60, 0x66, 0x15, 0x50, 0x58, 0x57, 0xaa, 0x7c, 0xfb, 0x68, 0x3d, 0x1e, 0x9c, 0xe8, 0x56, 0xd4, 0x99, 0xfa, 0x6e, 0x13, 0xee, 0x6a, 0x4f, 0x23, 0x5e, 0xdd, 0x00, 0x40, 0x34, 0x29, 0xff, 0x14, 0xbc, 0x57, 0x8d, 0xd1, 0x21, 0xfd, 0x25, 0x60, 0x04, 0x79, 0x4a, 0xdd, 0x4f, 0xb8, 0x19, 0x5b, 0x43, 0xa9, 0xe1, 0xee, 0xfb, 0xd3, 0xa1, 0x45, 0xc6, 0xaf, 0xfd, 0x60, 0x7f, 0x54, 0x24, 0xa0, 0xe4, 0x9c, 0x0f, 0x1a, 0x72, 0xeb, 0xf7, 0x94, 0x8a, 0x80, 0xb4, 0x82, 0xef, 0x17, 0x1e, 0xe1, 0x61, 0xdc, 0x36, 0x51, 0x56, 0x79, 0xe3, 0x2f, 0xa9, 0xed, 0xaa, 0x92, 0xc5, 0x74, 0x03, 0xe6, 0xe1, 0x02, 0x64, 0x3b, 0x77, 0x39, 0x1a, 0xed, 0xee, 0xc2, 0xb0, 0x54, 0x96, 0x43, 0x15, 0xde, 0xdd, 0x4c, 0xc3, 0x69, 0xf2, 0x3f, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2229 = { .name = "ecdsa_brainpoolp512r1_sha512_2229", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2229_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2229_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2229_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 279 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2230 for ECDSA, tcId is 280 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2230_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x37, 0xf7, 0x89, 0x18, 0x50, 0x6e, 0xa9, 0xcc, 0x14, 0xf1, 0x49, 0x2e, 0xb6, 0x6c, 0x9e, 0x1c, 0x4e, 0x27, 0xf3, 0xcb, 0x00, 0xbb, 0x51, 0x1d, 0x5d, 0xfd, 0xbe, 0xa6, 0xf8, 0x17, 0xa8, 0x7b, 0xfd, 0x81, 0xde, 0x29, 0x55, 0xfa, 0x03, 0x2f, 0x52, 0x87, 0x3f, 0x79, 0x91, 0x69, 0xcc, 0x44, 0x5c, 0xb0, 0x39, 0x1e, 0x46, 0xe5, 0x71, 0x79, 0xef, 0x84, 0xd5, 0x0c, 0x85, 0xdb, 0x5c, 0x97, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2230_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2230_sig[] = { 0x5e, 0x1b, 0xf4, 0xb1, 0xde, 0xba, 0xcb, 0xa4, 0x72, 0x5f, 0xc3, 0xcc, 0x82, 0x14, 0x53, 0x4d, 0xe5, 0xf6, 0xe5, 0x92, 0x64, 0x5b, 0x60, 0xf4, 0xc4, 0xa1, 0xdd, 0x22, 0x60, 0xd3, 0x35, 0x7d, 0x8f, 0xb2, 0xad, 0xa7, 0xf7, 0x2a, 0x48, 0x34, 0x6a, 0x7e, 0x34, 0x39, 0x5a, 0x6a, 0x18, 0x1c, 0x69, 0x40, 0x48, 0xae, 0x82, 0x58, 0xf1, 0xcb, 0x3b, 0x6f, 0x63, 0xf4, 0x93, 0x28, 0x29, 0xeb, 0x5e, 0x3d, 0xf0, 0xbe, 0xee, 0x22, 0xfa, 0x96, 0xd4, 0x65, 0x58, 0x33, 0x86, 0x2f, 0x73, 0xb5, 0x2f, 0x12, 0xe4, 0xc4, 0xc7, 0xd8, 0x18, 0xb2, 0x18, 0x46, 0xef, 0xfb, 0x39, 0xd6, 0xf0, 0x9f, 0xc3, 0x5b, 0x2d, 0x0f, 0xac, 0x8f, 0x5c, 0xb3, 0xc4, 0x05, 0x1f, 0xf4, 0x5f, 0x53, 0x05, 0xe9, 0x3b, 0x24, 0x13, 0x8a, 0x0f, 0x95, 0xfa, 0xd2, 0xfe, 0xf1, 0xc1, 0x0c, 0xd1, 0xdc, 0xf2, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2230 = { .name = "ecdsa_brainpoolp512r1_sha512_2230", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2230_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2230_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2230_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP512t1, tcId is 280 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2231 for ECDSA, tcId is 281 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2231_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x37, 0xf7, 0x89, 0x18, 0x50, 0x6e, 0xa9, 0xcc, 0x14, 0xf1, 0x49, 0x2e, 0xb6, 0x6c, 0x9e, 0x1c, 0x4e, 0x27, 0xf3, 0xcb, 0x00, 0xbb, 0x51, 0x1d, 0x5d, 0xfd, 0xbe, 0xa6, 0xf8, 0x17, 0xa8, 0x7b, 0xfd, 0x81, 0xde, 0x29, 0x55, 0xfa, 0x03, 0x2f, 0x52, 0x87, 0x3f, 0x79, 0x91, 0x69, 0xcc, 0x44, 0x5c, 0xb0, 0x39, 0x1e, 0x46, 0xe5, 0x71, 0x79, 0xef, 0x84, 0xd5, 0x0c, 0x85, 0xdb, 0x5c, 0x97, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2231_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2231_sig[] = { 0x80, 0x40, 0x0b, 0xee, 0x9a, 0x34, 0x2f, 0x3a, 0xfb, 0xa2, 0xdb, 0xb0, 0x29, 0x23, 0x5a, 0xd5, 0x11, 0xae, 0xdb, 0x30, 0x96, 0x0c, 0x53, 0xba, 0xd6, 0x70, 0x46, 0x0b, 0x38, 0x30, 0x4d, 0x7c, 0xbd, 0x70, 0x6f, 0xf9, 0x8f, 0x12, 0x96, 0xcb, 0x7e, 0x74, 0x6f, 0x8c, 0xa3, 0xa4, 0x39, 0x37, 0xa5, 0xcd, 0x03, 0x5a, 0x00, 0xc6, 0x38, 0x68, 0x00, 0x1f, 0xa4, 0x29, 0xb4, 0x91, 0xbd, 0x8e, 0x5c, 0x66, 0x94, 0x1e, 0xdc, 0xda, 0x56, 0x22, 0x8e, 0xdc, 0xe7, 0x73, 0x73, 0xa7, 0xb9, 0xdc, 0xdd, 0x46, 0x4e, 0xd1, 0x80, 0x75, 0xe7, 0xda, 0x14, 0x27, 0x91, 0x17, 0x78, 0x78, 0x4f, 0x80, 0x17, 0xbe, 0xf6, 0xf1, 0x87, 0x51, 0xcb, 0xa1, 0x23, 0x55, 0xbd, 0x90, 0xba, 0x63, 0xb8, 0xd3, 0x1e, 0xa3, 0x73, 0x38, 0x7f, 0x36, 0x49, 0x4e, 0x36, 0x42, 0x00, 0x80, 0x82, 0xd3, 0x49, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2231 = { .name = "ecdsa_brainpoolp512r1_sha512_2231", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2231_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2231_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2231_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP512t1, tcId is 281 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2232 for ECDSA, tcId is 282 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2232_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x37, 0xf7, 0x89, 0x18, 0x50, 0x6e, 0xa9, 0xcc, 0x14, 0xf1, 0x49, 0x2e, 0xb6, 0x6c, 0x9e, 0x1c, 0x4e, 0x27, 0xf3, 0xcb, 0x00, 0xbb, 0x51, 0x1d, 0x5d, 0xfd, 0xbe, 0xa6, 0xf8, 0x17, 0xa8, 0x7b, 0xfd, 0x81, 0xde, 0x29, 0x55, 0xfa, 0x03, 0x2f, 0x52, 0x87, 0x3f, 0x79, 0x91, 0x69, 0xcc, 0x44, 0x5c, 0xb0, 0x39, 0x1e, 0x46, 0xe5, 0x71, 0x79, 0xef, 0x84, 0xd5, 0x0c, 0x85, 0xdb, 0x5c, 0x97, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2232_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2232_sig[] = { 0x47, 0x68, 0xdf, 0xdd, 0xae, 0x4c, 0xb8, 0x35, 0x66, 0xf2, 0xc3, 0xa9, 0x34, 0x00, 0x91, 0xc2, 0x60, 0x8e, 0x0e, 0x27, 0x0a, 0x4b, 0x3f, 0x48, 0xde, 0xd7, 0xc7, 0x5b, 0x4a, 0xa1, 0x5a, 0xb6, 0x5c, 0xb0, 0x50, 0xcf, 0xdb, 0x31, 0x2c, 0x32, 0xbf, 0xaa, 0x77, 0x59, 0x86, 0x9c, 0x9c, 0x0c, 0xe2, 0x7f, 0x6c, 0xdf, 0x1f, 0xb5, 0x84, 0x37, 0x9f, 0x63, 0x98, 0xc9, 0x5e, 0xbf, 0x86, 0x44, 0x7e, 0x1a, 0x3a, 0xac, 0xd8, 0xd6, 0x03, 0xfa, 0xec, 0xf8, 0x79, 0x02, 0x14, 0x7b, 0x67, 0x43, 0x5d, 0x99, 0x2e, 0xe9, 0xe5, 0x43, 0xf9, 0x34, 0xdd, 0x4c, 0x40, 0xd8, 0xa1, 0x2c, 0xd1, 0xe1, 0x03, 0x66, 0xd0, 0x74, 0x3d, 0x78, 0x62, 0xb9, 0xc8, 0xba, 0x8b, 0x68, 0x16, 0x63, 0x9c, 0x35, 0x09, 0xb5, 0xca, 0xa2, 0xa9, 0x15, 0x33, 0xc0, 0xaf, 0x50, 0xec, 0xe2, 0xfd, 0x2c, 0x53, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2232 = { .name = "ecdsa_brainpoolp512r1_sha512_2232", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2232_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2232_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2232_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP512t1, tcId is 282 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2233 for ECDSA, tcId is 283 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2233_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x72, 0xe6, 0x14, 0xa0, 0x8b, 0x7b, 0x1a, 0xbf, 0x2a, 0xe3, 0x9d, 0x7f, 0x7d, 0x5d, 0x5d, 0xeb, 0x7d, 0x08, 0x99, 0xe8, 0xb3, 0x0e, 0x80, 0xf1, 0x78, 0x65, 0xde, 0x23, 0x78, 0x1b, 0x5f, 0xf5, 0x7f, 0xcb, 0xbc, 0xd7, 0x45, 0xcc, 0x65, 0x13, 0x5c, 0x46, 0x61, 0xb1, 0x55, 0x39, 0xb4, 0xa1, 0xcb, 0xd1, 0xc6, 0x10, 0xe6, 0x9d, 0x55, 0x0b, 0x39, 0x25, 0x8b, 0x49, 0xd2, 0x5e, 0xec, 0x5c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2233_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2233_sig[] = { 0x27, 0xd9, 0xc6, 0xc4, 0xdb, 0x31, 0xaf, 0xf2, 0x88, 0xfa, 0x4e, 0x40, 0x15, 0x9d, 0x6e, 0xe1, 0x8c, 0x98, 0x13, 0x94, 0x27, 0x48, 0x47, 0x96, 0xf1, 0xf8, 0x74, 0x5c, 0x98, 0x27, 0xdf, 0xc0, 0x8d, 0x39, 0x3a, 0xbe, 0x14, 0x4d, 0xf6, 0xb7, 0xc1, 0x2d, 0x48, 0x97, 0x1f, 0xdd, 0x28, 0x4b, 0x81, 0xe6, 0xe1, 0x08, 0x60, 0x35, 0x9e, 0xf7, 0x14, 0x73, 0xb9, 0xe6, 0xbb, 0x84, 0xcb, 0x1e, 0x07, 0xa0, 0x42, 0x0c, 0x8a, 0x9b, 0x26, 0x91, 0x1b, 0x63, 0x62, 0x65, 0x40, 0xa8, 0x5f, 0x60, 0xaa, 0x27, 0x7a, 0xfd, 0xef, 0x99, 0x90, 0xfc, 0x8d, 0xc1, 0xd3, 0xf1, 0xf2, 0xc5, 0xa9, 0x27, 0xe1, 0xe4, 0xa2, 0x9d, 0x81, 0xa7, 0x01, 0xb4, 0x8b, 0x36, 0x6f, 0x00, 0x0f, 0x96, 0x26, 0x14, 0x89, 0x9c, 0xbf, 0x19, 0x38, 0x26, 0xca, 0x8d, 0xe4, 0xa4, 0x25, 0x53, 0x8d, 0xe5, 0xac, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2233 = { .name = "ecdsa_brainpoolp512r1_sha512_2233", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2233_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2233_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2233_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP512t1, tcId is 283 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2234 for ECDSA, tcId is 284 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2234_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x72, 0xe6, 0x14, 0xa0, 0x8b, 0x7b, 0x1a, 0xbf, 0x2a, 0xe3, 0x9d, 0x7f, 0x7d, 0x5d, 0x5d, 0xeb, 0x7d, 0x08, 0x99, 0xe8, 0xb3, 0x0e, 0x80, 0xf1, 0x78, 0x65, 0xde, 0x23, 0x78, 0x1b, 0x5f, 0xf5, 0x7f, 0xcb, 0xbc, 0xd7, 0x45, 0xcc, 0x65, 0x13, 0x5c, 0x46, 0x61, 0xb1, 0x55, 0x39, 0xb4, 0xa1, 0xcb, 0xd1, 0xc6, 0x10, 0xe6, 0x9d, 0x55, 0x0b, 0x39, 0x25, 0x8b, 0x49, 0xd2, 0x5e, 0xec, 0x5c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2234_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2234_sig[] = { 0x49, 0x54, 0x2e, 0xec, 0x3b, 0x96, 0xc4, 0x76, 0xb5, 0x9b, 0x2b, 0x94, 0xd5, 0xfc, 0x7e, 0xe0, 0x8f, 0xd2, 0xa1, 0xb1, 0xe7, 0x32, 0xe6, 0x60, 0x90, 0x98, 0xab, 0x2a, 0x7f, 0x25, 0x04, 0x52, 0xfb, 0xc1, 0x05, 0x7a, 0x6d, 0x3f, 0xec, 0xcb, 0xca, 0xeb, 0x00, 0x46, 0x8b, 0x26, 0x22, 0x2e, 0xb4, 0x80, 0x65, 0xfc, 0xaa, 0xd7, 0x64, 0x76, 0x81, 0x82, 0x38, 0x60, 0x45, 0x1e, 0x1e, 0x91, 0x37, 0xdb, 0x33, 0x6d, 0xee, 0x1e, 0x45, 0xd9, 0xac, 0xe5, 0x50, 0x05, 0x35, 0x11, 0xc9, 0xc3, 0x75, 0x56, 0x57, 0xe7, 0x8e, 0xca, 0x10, 0x8d, 0x3d, 0xfd, 0x1e, 0x68, 0xfe, 0x83, 0xda, 0x62, 0x6b, 0x8d, 0xac, 0xbb, 0x19, 0xf0, 0xee, 0x23, 0x2b, 0x0f, 0x8b, 0xfe, 0x8d, 0xdb, 0xe7, 0xd5, 0xe9, 0x8b, 0x7a, 0x2e, 0xcc, 0xd0, 0x3f, 0x37, 0x5d, 0x16, 0x4c, 0xe8, 0x28, 0x63, 0x18, 0x96, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2234 = { .name = "ecdsa_brainpoolp512r1_sha512_2234", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2234_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2234_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2234_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP512t1, tcId is 284 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2235 for ECDSA, tcId is 285 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2235_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x72, 0xe6, 0x14, 0xa0, 0x8b, 0x7b, 0x1a, 0xbf, 0x2a, 0xe3, 0x9d, 0x7f, 0x7d, 0x5d, 0x5d, 0xeb, 0x7d, 0x08, 0x99, 0xe8, 0xb3, 0x0e, 0x80, 0xf1, 0x78, 0x65, 0xde, 0x23, 0x78, 0x1b, 0x5f, 0xf5, 0x7f, 0xcb, 0xbc, 0xd7, 0x45, 0xcc, 0x65, 0x13, 0x5c, 0x46, 0x61, 0xb1, 0x55, 0x39, 0xb4, 0xa1, 0xcb, 0xd1, 0xc6, 0x10, 0xe6, 0x9d, 0x55, 0x0b, 0x39, 0x25, 0x8b, 0x49, 0xd2, 0x5e, 0xec, 0x5c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2235_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2235_sig[] = { 0x4f, 0x90, 0xce, 0xb7, 0x6b, 0xc7, 0x2f, 0x0c, 0xca, 0x10, 0x70, 0x5d, 0x3b, 0xad, 0xab, 0x6c, 0xaa, 0x60, 0x19, 0xef, 0x6b, 0xfe, 0x7d, 0xe1, 0xb7, 0x59, 0x51, 0xd5, 0x17, 0xd2, 0xb1, 0x61, 0x68, 0x51, 0x5b, 0xf3, 0x05, 0xf0, 0x00, 0x62, 0x92, 0xe4, 0x90, 0x05, 0x98, 0x25, 0x61, 0x41, 0xe4, 0x5c, 0x19, 0x07, 0x7f, 0xa4, 0x47, 0xdd, 0x5f, 0x32, 0xda, 0xa6, 0x2c, 0x25, 0x08, 0x15, 0x67, 0x12, 0xa7, 0x84, 0x10, 0x28, 0x02, 0x82, 0x1e, 0x97, 0x08, 0xe3, 0x49, 0xd0, 0x3a, 0x88, 0x29, 0x7b, 0x37, 0x4e, 0xf8, 0x1a, 0x4e, 0xdc, 0x35, 0x01, 0x65, 0x24, 0xcd, 0x2a, 0x22, 0xaf, 0xea, 0x7b, 0x8b, 0x31, 0x71, 0xde, 0x60, 0xac, 0x1b, 0x38, 0x82, 0x53, 0x36, 0x50, 0x58, 0x6d, 0xca, 0xd3, 0x38, 0xea, 0x48, 0x23, 0x14, 0x86, 0xe1, 0x0e, 0x31, 0x20, 0xce, 0x3d, 0x2a, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2235 = { .name = "ecdsa_brainpoolp512r1_sha512_2235", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2235_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2235_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2235_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP512t1, tcId is 285 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2236 for ECDSA, tcId is 286 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2236_pubkey[] = { 0x05, 0x18, 0xff, 0x14, 0xba, 0x05, 0x18, 0x8a, 0xbe, 0xd0, 0xa8, 0xc8, 0x8d, 0xb0, 0xf0, 0x97, 0xb5, 0x66, 0x0a, 0xac, 0x57, 0xe9, 0xa3, 0xcd, 0xbb, 0x9c, 0x83, 0x3e, 0x2a, 0x7f, 0x9f, 0x61, 0x3e, 0x49, 0x95, 0x6b, 0x53, 0xa6, 0x35, 0x95, 0x2e, 0x29, 0x81, 0x8e, 0x4a, 0x80, 0x15, 0xcb, 0x6a, 0x15, 0x0c, 0xed, 0xe6, 0x36, 0xc2, 0x55, 0x8f, 0x2d, 0x36, 0x02, 0x48, 0x39, 0x63, 0xb9, 0x9e, 0xd9, 0xfe, 0x84, 0x2f, 0x3e, 0xd4, 0x18, 0x46, 0x2c, 0x63, 0xe2, 0x66, 0x94, 0x4c, 0xa2, 0x74, 0x7e, 0x15, 0xbd, 0x8f, 0x52, 0x84, 0x4d, 0x6a, 0x1c, 0xe9, 0x81, 0x52, 0x10, 0x42, 0x12, 0x06, 0x80, 0x5c, 0x6e, 0xd7, 0x92, 0x35, 0x6e, 0xc5, 0x7d, 0x79, 0xfa, 0x3e, 0x36, 0xff, 0xf2, 0x3e, 0x2f, 0xc6, 0x37, 0x0c, 0x67, 0xbc, 0x51, 0xd3, 0xf8, 0xb5, 0x55, 0xc9, 0x04, 0x8d, 0x6d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2236_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2236_sig[] = { 0x45, 0x9e, 0x3e, 0x6e, 0x67, 0x1a, 0x6c, 0x34, 0x2d, 0x58, 0x5d, 0xb6, 0x89, 0x04, 0x3d, 0x32, 0xa4, 0x94, 0xce, 0x00, 0x39, 0xee, 0x71, 0xac, 0x67, 0xed, 0x6e, 0xc0, 0x86, 0x19, 0x08, 0xeb, 0xae, 0x6b, 0x2d, 0x6e, 0x4a, 0x67, 0xca, 0xa7, 0xa8, 0xf0, 0x57, 0x6a, 0x49, 0x88, 0x9a, 0x4a, 0x63, 0xd4, 0xb0, 0xb8, 0xaa, 0x88, 0x45, 0xc9, 0xcf, 0x78, 0x5b, 0x49, 0x41, 0x2a, 0x70, 0x71, 0xa5, 0xed, 0xd7, 0xab, 0xfc, 0xe9, 0xd4, 0x41, 0x3b, 0x22, 0x28, 0x93, 0x97, 0x78, 0x5b, 0x3d, 0x84, 0xb2, 0xc0, 0xd3, 0x71, 0x94, 0x09, 0x25, 0x5b, 0xb7, 0x12, 0x82, 0x68, 0xe0, 0xbc, 0xd3, 0x7d, 0x92, 0x8b, 0xea, 0x54, 0x86, 0xbf, 0x56, 0xff, 0xe2, 0x59, 0xc7, 0xec, 0x9f, 0x50, 0xb8, 0x78, 0xe0, 0x15, 0x5d, 0x73, 0xe3, 0xbd, 0xe5, 0xcf, 0xfe, 0x55, 0xe6, 0x12, 0xf8, 0xd7, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2236 = { .name = "ecdsa_brainpoolp512r1_sha512_2236", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2236_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2236_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2236_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 286 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2237 for ECDSA, tcId is 287 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2237_pubkey[] = { 0x05, 0x18, 0xff, 0x14, 0xba, 0x05, 0x18, 0x8a, 0xbe, 0xd0, 0xa8, 0xc8, 0x8d, 0xb0, 0xf0, 0x97, 0xb5, 0x66, 0x0a, 0xac, 0x57, 0xe9, 0xa3, 0xcd, 0xbb, 0x9c, 0x83, 0x3e, 0x2a, 0x7f, 0x9f, 0x61, 0x3e, 0x49, 0x95, 0x6b, 0x53, 0xa6, 0x35, 0x95, 0x2e, 0x29, 0x81, 0x8e, 0x4a, 0x80, 0x15, 0xcb, 0x6a, 0x15, 0x0c, 0xed, 0xe6, 0x36, 0xc2, 0x55, 0x8f, 0x2d, 0x36, 0x02, 0x48, 0x39, 0x63, 0xb9, 0x9e, 0xd9, 0xfe, 0x84, 0x2f, 0x3e, 0xd4, 0x18, 0x46, 0x2c, 0x63, 0xe2, 0x66, 0x94, 0x4c, 0xa2, 0x74, 0x7e, 0x15, 0xbd, 0x8f, 0x52, 0x84, 0x4d, 0x6a, 0x1c, 0xe9, 0x81, 0x52, 0x10, 0x42, 0x12, 0x06, 0x80, 0x5c, 0x6e, 0xd7, 0x92, 0x35, 0x6e, 0xc5, 0x7d, 0x79, 0xfa, 0x3e, 0x36, 0xff, 0xf2, 0x3e, 0x2f, 0xc6, 0x37, 0x0c, 0x67, 0xbc, 0x51, 0xd3, 0xf8, 0xb5, 0x55, 0xc9, 0x04, 0x8d, 0x6d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2237_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2237_sig[] = { 0x1b, 0x2f, 0x7e, 0xa4, 0x09, 0x60, 0xe3, 0x7e, 0x28, 0xb5, 0x56, 0xb7, 0xe4, 0x46, 0xc4, 0x64, 0x1e, 0x2f, 0x3d, 0x8a, 0x82, 0x9d, 0xcc, 0x4a, 0x34, 0x95, 0x53, 0xe4, 0x2c, 0xf9, 0xce, 0x62, 0x72, 0xdc, 0x9c, 0xdc, 0xda, 0x01, 0x3e, 0x39, 0x81, 0xcb, 0x73, 0xb1, 0x0d, 0x46, 0x32, 0x1c, 0x80, 0x50, 0x1d, 0x6a, 0x34, 0xad, 0x7f, 0xd9, 0x59, 0xa0, 0xc7, 0x8f, 0x89, 0x1f, 0x33, 0xf0, 0x7f, 0x19, 0x5b, 0x76, 0x96, 0xed, 0xfc, 0x76, 0x87, 0xff, 0x01, 0x26, 0xea, 0xba, 0x13, 0xda, 0xd1, 0xe1, 0x95, 0x63, 0xe8, 0xd3, 0x95, 0xaf, 0x32, 0xdb, 0x3d, 0x6a, 0x7b, 0x4e, 0x82, 0xf2, 0x80, 0x04, 0x50, 0x1d, 0x92, 0xb7, 0x53, 0x7d, 0xa3, 0x97, 0x84, 0x5b, 0x7a, 0xa3, 0x98, 0xa1, 0x10, 0x51, 0x05, 0x2e, 0x52, 0x26, 0x4b, 0xd8, 0xcb, 0xcb, 0xa9, 0x98, 0x7e, 0xc6, 0x74, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2237 = { .name = "ecdsa_brainpoolp512r1_sha512_2237", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2237_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2237_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2237_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 287 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2238 for ECDSA, tcId is 288 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2238_pubkey[] = { 0x05, 0x18, 0xff, 0x14, 0xba, 0x05, 0x18, 0x8a, 0xbe, 0xd0, 0xa8, 0xc8, 0x8d, 0xb0, 0xf0, 0x97, 0xb5, 0x66, 0x0a, 0xac, 0x57, 0xe9, 0xa3, 0xcd, 0xbb, 0x9c, 0x83, 0x3e, 0x2a, 0x7f, 0x9f, 0x61, 0x3e, 0x49, 0x95, 0x6b, 0x53, 0xa6, 0x35, 0x95, 0x2e, 0x29, 0x81, 0x8e, 0x4a, 0x80, 0x15, 0xcb, 0x6a, 0x15, 0x0c, 0xed, 0xe6, 0x36, 0xc2, 0x55, 0x8f, 0x2d, 0x36, 0x02, 0x48, 0x39, 0x63, 0xb9, 0x9e, 0xd9, 0xfe, 0x84, 0x2f, 0x3e, 0xd4, 0x18, 0x46, 0x2c, 0x63, 0xe2, 0x66, 0x94, 0x4c, 0xa2, 0x74, 0x7e, 0x15, 0xbd, 0x8f, 0x52, 0x84, 0x4d, 0x6a, 0x1c, 0xe9, 0x81, 0x52, 0x10, 0x42, 0x12, 0x06, 0x80, 0x5c, 0x6e, 0xd7, 0x92, 0x35, 0x6e, 0xc5, 0x7d, 0x79, 0xfa, 0x3e, 0x36, 0xff, 0xf2, 0x3e, 0x2f, 0xc6, 0x37, 0x0c, 0x67, 0xbc, 0x51, 0xd3, 0xf8, 0xb5, 0x55, 0xc9, 0x04, 0x8d, 0x6d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2238_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2238_sig[] = { 0x1b, 0x5c, 0x1d, 0x2b, 0x2b, 0x06, 0x59, 0x1a, 0x1f, 0xa5, 0x16, 0xcf, 0xfa, 0x9c, 0x8a, 0x57, 0xcf, 0x1f, 0xff, 0xc2, 0x2c, 0xec, 0xb7, 0x24, 0x92, 0x81, 0x67, 0x0b, 0xc2, 0x38, 0x83, 0xa6, 0x85, 0x53, 0xe0, 0xca, 0xf1, 0xed, 0xd9, 0xf1, 0x70, 0x3a, 0x25, 0xb7, 0x4e, 0x00, 0x00, 0xa3, 0x7e, 0x32, 0xe6, 0xcc, 0x35, 0x76, 0x93, 0x9f, 0x45, 0x8c, 0x3d, 0xd5, 0xc4, 0xdb, 0xcc, 0x9c, 0x4b, 0x23, 0xd7, 0xed, 0x7f, 0x8a, 0x6b, 0x7b, 0xa7, 0xd2, 0x2a, 0xef, 0xa8, 0xfd, 0xe0, 0x30, 0xec, 0xb3, 0xf2, 0xfe, 0xd4, 0xa5, 0xf2, 0x6f, 0x12, 0xd5, 0x9a, 0x29, 0xd6, 0x3c, 0xdd, 0x0e, 0xc0, 0x3f, 0xae, 0x55, 0x7d, 0x14, 0x1c, 0x7b, 0x0e, 0x87, 0x12, 0xc3, 0x06, 0xb0, 0xee, 0xbb, 0xd0, 0xca, 0xb2, 0x76, 0x96, 0x01, 0x20, 0x62, 0x62, 0x2b, 0xb1, 0x80, 0x04, 0x30, 0x34, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2238 = { .name = "ecdsa_brainpoolp512r1_sha512_2238", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2238_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2238_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2238_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 288 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2239 for ECDSA, tcId is 289 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2239_pubkey[] = { 0x3f, 0x89, 0xe7, 0x87, 0xb4, 0xd5, 0xd2, 0x59, 0x96, 0x24, 0x51, 0x35, 0x30, 0xe7, 0x50, 0xab, 0x3c, 0x59, 0x57, 0xdc, 0x9a, 0xa0, 0xe7, 0xb0, 0x8a, 0x3e, 0x25, 0x35, 0x68, 0x18, 0xe2, 0x03, 0x7d, 0x06, 0x2f, 0x33, 0x6d, 0x4e, 0xed, 0x41, 0x7c, 0x91, 0xbc, 0xb1, 0x1b, 0x54, 0xb5, 0x7d, 0x54, 0xa4, 0xf0, 0x2a, 0x72, 0xfb, 0x74, 0x26, 0x2f, 0x74, 0x2c, 0xc6, 0xf3, 0x40, 0x44, 0x01, 0x3a, 0x44, 0x8b, 0x8e, 0x2d, 0x0d, 0x5a, 0x7c, 0x5b, 0x4f, 0x1b, 0x9f, 0x5b, 0x70, 0x1a, 0x9d, 0x21, 0xff, 0x55, 0xe3, 0x67, 0x8c, 0xa1, 0x19, 0xb6, 0xd7, 0xc5, 0x11, 0xba, 0x0a, 0xef, 0x89, 0xf3, 0x1a, 0xeb, 0x19, 0x5d, 0xb0, 0x0f, 0x24, 0x83, 0x59, 0xae, 0xe9, 0x24, 0xe7, 0xc8, 0x60, 0xb7, 0x68, 0x45, 0xf6, 0x51, 0x2a, 0x2a, 0x4a, 0xad, 0xc1, 0x28, 0x7a, 0x15, 0x09, 0x52, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2239_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2239_sig[] = { 0xa9, 0x52, 0x84, 0x7a, 0xcf, 0x21, 0x3c, 0x86, 0xe2, 0x31, 0x31, 0x6d, 0x8f, 0x91, 0x30, 0xf7, 0xcb, 0xdf, 0x7f, 0x39, 0x52, 0x30, 0x7a, 0x57, 0x70, 0x76, 0x34, 0x2d, 0x13, 0x93, 0x9b, 0x4a, 0xb5, 0xa1, 0x31, 0x3b, 0x34, 0xab, 0xb8, 0x92, 0x04, 0xd3, 0xfd, 0x1f, 0x87, 0x38, 0x85, 0xff, 0xfa, 0x68, 0x3c, 0x5a, 0x49, 0x3e, 0x54, 0x61, 0xc7, 0xf1, 0x40, 0x0a, 0xf8, 0x6a, 0xe7, 0xfe, 0x9a, 0x65, 0xa8, 0xa4, 0x15, 0x0d, 0xe5, 0x93, 0xb2, 0x96, 0x42, 0xb9, 0x88, 0xb2, 0xec, 0x2e, 0x23, 0xe1, 0x5e, 0x15, 0x6e, 0xcf, 0x0a, 0xf5, 0xfd, 0xe2, 0xfb, 0xd7, 0x32, 0x08, 0xf6, 0x9f, 0x25, 0x06, 0xd1, 0x41, 0xe0, 0xb4, 0x7c, 0x0e, 0x1f, 0x2f, 0xa0, 0x9e, 0xf2, 0x6b, 0x38, 0x9a, 0x6b, 0xd2, 0xb0, 0x23, 0x09, 0x30, 0xa1, 0x6f, 0xd1, 0x19, 0x76, 0x7e, 0x38, 0x27, 0x24, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2239 = { .name = "ecdsa_brainpoolp512r1_sha512_2239", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2239_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2239_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2239_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP512t1, tcId is 289 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2240 for ECDSA, tcId is 290 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2240_pubkey[] = { 0x3f, 0x89, 0xe7, 0x87, 0xb4, 0xd5, 0xd2, 0x59, 0x96, 0x24, 0x51, 0x35, 0x30, 0xe7, 0x50, 0xab, 0x3c, 0x59, 0x57, 0xdc, 0x9a, 0xa0, 0xe7, 0xb0, 0x8a, 0x3e, 0x25, 0x35, 0x68, 0x18, 0xe2, 0x03, 0x7d, 0x06, 0x2f, 0x33, 0x6d, 0x4e, 0xed, 0x41, 0x7c, 0x91, 0xbc, 0xb1, 0x1b, 0x54, 0xb5, 0x7d, 0x54, 0xa4, 0xf0, 0x2a, 0x72, 0xfb, 0x74, 0x26, 0x2f, 0x74, 0x2c, 0xc6, 0xf3, 0x40, 0x44, 0x01, 0x3a, 0x44, 0x8b, 0x8e, 0x2d, 0x0d, 0x5a, 0x7c, 0x5b, 0x4f, 0x1b, 0x9f, 0x5b, 0x70, 0x1a, 0x9d, 0x21, 0xff, 0x55, 0xe3, 0x67, 0x8c, 0xa1, 0x19, 0xb6, 0xd7, 0xc5, 0x11, 0xba, 0x0a, 0xef, 0x89, 0xf3, 0x1a, 0xeb, 0x19, 0x5d, 0xb0, 0x0f, 0x24, 0x83, 0x59, 0xae, 0xe9, 0x24, 0xe7, 0xc8, 0x60, 0xb7, 0x68, 0x45, 0xf6, 0x51, 0x2a, 0x2a, 0x4a, 0xad, 0xc1, 0x28, 0x7a, 0x15, 0x09, 0x52, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2240_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2240_sig[] = { 0x51, 0xbf, 0xb8, 0x0a, 0xae, 0x30, 0x26, 0x2a, 0x67, 0xbf, 0x07, 0x71, 0xa6, 0xb8, 0xd1, 0x95, 0xe5, 0x9a, 0xa0, 0x4e, 0x87, 0xbd, 0x06, 0x0f, 0xe5, 0xa9, 0xbd, 0x56, 0xd3, 0x53, 0x85, 0xa5, 0xfc, 0x3d, 0xa5, 0xdf, 0xc3, 0xae, 0x8c, 0x67, 0xdb, 0xd4, 0x08, 0x18, 0x44, 0x82, 0x85, 0x5e, 0x35, 0x63, 0xde, 0xde, 0xe7, 0x2a, 0x21, 0xb6, 0x0f, 0xaf, 0xd7, 0x38, 0x19, 0xaa, 0x83, 0x7c, 0x80, 0x7f, 0x0d, 0x69, 0x38, 0x54, 0x67, 0xad, 0x6c, 0xd8, 0xa4, 0x4d, 0x48, 0x2c, 0xa3, 0xb6, 0xe1, 0x8f, 0x7b, 0x35, 0x2e, 0xf1, 0x9a, 0x2b, 0xc9, 0x80, 0x50, 0x0b, 0x6d, 0x59, 0x04, 0x5f, 0x0d, 0x6f, 0x7a, 0xb7, 0xe4, 0x14, 0xc5, 0x0d, 0x2b, 0x68, 0xd7, 0xf6, 0xe6, 0xc0, 0x1d, 0x3e, 0x83, 0x53, 0xcd, 0xfd, 0x47, 0x5f, 0x24, 0x9b, 0x31, 0x84, 0x2f, 0xe5, 0x99, 0x55, 0xf4, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2240 = { .name = "ecdsa_brainpoolp512r1_sha512_2240", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2240_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2240_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2240_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP512t1, tcId is 290 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2241 for ECDSA, tcId is 291 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2241_pubkey[] = { 0x3f, 0x89, 0xe7, 0x87, 0xb4, 0xd5, 0xd2, 0x59, 0x96, 0x24, 0x51, 0x35, 0x30, 0xe7, 0x50, 0xab, 0x3c, 0x59, 0x57, 0xdc, 0x9a, 0xa0, 0xe7, 0xb0, 0x8a, 0x3e, 0x25, 0x35, 0x68, 0x18, 0xe2, 0x03, 0x7d, 0x06, 0x2f, 0x33, 0x6d, 0x4e, 0xed, 0x41, 0x7c, 0x91, 0xbc, 0xb1, 0x1b, 0x54, 0xb5, 0x7d, 0x54, 0xa4, 0xf0, 0x2a, 0x72, 0xfb, 0x74, 0x26, 0x2f, 0x74, 0x2c, 0xc6, 0xf3, 0x40, 0x44, 0x01, 0x3a, 0x44, 0x8b, 0x8e, 0x2d, 0x0d, 0x5a, 0x7c, 0x5b, 0x4f, 0x1b, 0x9f, 0x5b, 0x70, 0x1a, 0x9d, 0x21, 0xff, 0x55, 0xe3, 0x67, 0x8c, 0xa1, 0x19, 0xb6, 0xd7, 0xc5, 0x11, 0xba, 0x0a, 0xef, 0x89, 0xf3, 0x1a, 0xeb, 0x19, 0x5d, 0xb0, 0x0f, 0x24, 0x83, 0x59, 0xae, 0xe9, 0x24, 0xe7, 0xc8, 0x60, 0xb7, 0x68, 0x45, 0xf6, 0x51, 0x2a, 0x2a, 0x4a, 0xad, 0xc1, 0x28, 0x7a, 0x15, 0x09, 0x52, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2241_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2241_sig[] = { 0x4e, 0x87, 0x11, 0xb0, 0x0d, 0xe3, 0x55, 0xf1, 0x4c, 0x8e, 0xb9, 0x19, 0x59, 0xc1, 0x3c, 0x77, 0xf9, 0x15, 0x57, 0x54, 0x76, 0x5f, 0x10, 0xf2, 0xaa, 0xa8, 0xfd, 0xad, 0x6a, 0x14, 0xc6, 0xa4, 0xe6, 0x2c, 0x5e, 0xd4, 0x8a, 0x9d, 0x8c, 0xa4, 0x03, 0xc9, 0x02, 0xdb, 0x0c, 0x2c, 0x07, 0x35, 0x42, 0x6b, 0x33, 0xe6, 0x78, 0x28, 0xac, 0x32, 0xae, 0x19, 0xb8, 0x4e, 0x65, 0x98, 0x68, 0x19, 0x7d, 0x10, 0x4a, 0xe5, 0xe5, 0xd0, 0xda, 0x26, 0xcb, 0x42, 0x7d, 0x79, 0x51, 0xd4, 0x0d, 0xf4, 0x29, 0xb4, 0x20, 0x50, 0x86, 0xe6, 0x33, 0xb8, 0x00, 0xd7, 0xd7, 0xb8, 0xbd, 0xe4, 0x8a, 0x9b, 0xec, 0x4e, 0x43, 0xdd, 0xeb, 0x42, 0x26, 0x19, 0x2b, 0x5c, 0x9b, 0x30, 0xff, 0xa3, 0xef, 0xa7, 0xd2, 0x38, 0x5a, 0xb2, 0x8a, 0x19, 0x0c, 0x16, 0x5f, 0xb2, 0xa2, 0xc5, 0x85, 0x72, 0xc2, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2241 = { .name = "ecdsa_brainpoolp512r1_sha512_2241", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2241_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2241_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2241_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP512t1, tcId is 291 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2242 for ECDSA, tcId is 292 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2242_pubkey[] = { 0x78, 0x60, 0xa4, 0x74, 0x3b, 0xb4, 0x8e, 0x77, 0x93, 0xc7, 0xf1, 0x41, 0x6f, 0xba, 0xc6, 0xca, 0x0b, 0x53, 0x82, 0x10, 0xd7, 0x43, 0xf2, 0x49, 0x76, 0xaf, 0x3e, 0xfd, 0xa9, 0x7f, 0x28, 0xbc, 0x95, 0x91, 0x34, 0x01, 0xec, 0x4c, 0xa5, 0xe7, 0x44, 0xa2, 0x3d, 0x1a, 0x55, 0x26, 0x53, 0xff, 0x11, 0x0e, 0xc8, 0x42, 0x1b, 0x3d, 0xe5, 0x31, 0xf3, 0xba, 0xcd, 0xa0, 0x7b, 0xfb, 0x09, 0xd6, 0x03, 0x66, 0x2f, 0x2f, 0x24, 0x75, 0xbb, 0xf5, 0xe2, 0x0d, 0xa4, 0x8b, 0x50, 0x16, 0x9d, 0x28, 0x9c, 0x89, 0xc5, 0x4e, 0xd0, 0xf9, 0x7b, 0xbb, 0xc7, 0xf3, 0x80, 0x16, 0xf1, 0xa9, 0x55, 0xcb, 0x74, 0xc5, 0x27, 0x27, 0xef, 0x80, 0x20, 0x55, 0xea, 0x09, 0x0f, 0xe1, 0xa4, 0x9b, 0xe5, 0x8d, 0xdc, 0x60, 0x83, 0xbc, 0xa3, 0xf7, 0xc0, 0x2f, 0xf6, 0x44, 0x77, 0x5c, 0xd0, 0x02, 0x7f, 0x06, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2242_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2242_sig[] = { 0x4c, 0xd6, 0x17, 0x54, 0x21, 0x1d, 0x22, 0x23, 0x71, 0xe5, 0x52, 0x57, 0x8f, 0xf7, 0x05, 0xcc, 0x81, 0x9a, 0x2f, 0x9f, 0xb2, 0x72, 0x9f, 0x05, 0xd8, 0x48, 0xca, 0xab, 0xf4, 0x4a, 0x31, 0xfd, 0xa1, 0xbd, 0x03, 0x8f, 0x1b, 0x87, 0xef, 0xd2, 0x8a, 0x8c, 0xe5, 0x32, 0x22, 0xfd, 0xfe, 0xc1, 0x8d, 0x59, 0x29, 0xdf, 0x92, 0x6d, 0xf2, 0x7c, 0x2c, 0x7e, 0x73, 0x60, 0xbc, 0x5c, 0x0c, 0x70, 0x5c, 0xe9, 0x4c, 0x85, 0x1d, 0xb1, 0x80, 0x7d, 0xc7, 0x9d, 0xcc, 0x08, 0x7c, 0x08, 0x30, 0xd7, 0x0a, 0x00, 0x69, 0xcf, 0x52, 0xba, 0xff, 0xaf, 0x34, 0x7a, 0xef, 0xa1, 0xdd, 0xba, 0x77, 0xf6, 0xf7, 0x70, 0xc1, 0x48, 0x3f, 0xdd, 0xe3, 0x8f, 0x5d, 0x74, 0xbd, 0xb3, 0x23, 0x72, 0xe1, 0x2f, 0xee, 0x84, 0x3e, 0xff, 0xf0, 0xf2, 0xdc, 0x93, 0x44, 0xca, 0x1e, 0x3b, 0x26, 0xb9, 0xb0, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2242 = { .name = "ecdsa_brainpoolp512r1_sha512_2242", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2242_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2242_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2242_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 292 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2243 for ECDSA, tcId is 293 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2243_pubkey[] = { 0x78, 0x60, 0xa4, 0x74, 0x3b, 0xb4, 0x8e, 0x77, 0x93, 0xc7, 0xf1, 0x41, 0x6f, 0xba, 0xc6, 0xca, 0x0b, 0x53, 0x82, 0x10, 0xd7, 0x43, 0xf2, 0x49, 0x76, 0xaf, 0x3e, 0xfd, 0xa9, 0x7f, 0x28, 0xbc, 0x95, 0x91, 0x34, 0x01, 0xec, 0x4c, 0xa5, 0xe7, 0x44, 0xa2, 0x3d, 0x1a, 0x55, 0x26, 0x53, 0xff, 0x11, 0x0e, 0xc8, 0x42, 0x1b, 0x3d, 0xe5, 0x31, 0xf3, 0xba, 0xcd, 0xa0, 0x7b, 0xfb, 0x09, 0xd6, 0x03, 0x66, 0x2f, 0x2f, 0x24, 0x75, 0xbb, 0xf5, 0xe2, 0x0d, 0xa4, 0x8b, 0x50, 0x16, 0x9d, 0x28, 0x9c, 0x89, 0xc5, 0x4e, 0xd0, 0xf9, 0x7b, 0xbb, 0xc7, 0xf3, 0x80, 0x16, 0xf1, 0xa9, 0x55, 0xcb, 0x74, 0xc5, 0x27, 0x27, 0xef, 0x80, 0x20, 0x55, 0xea, 0x09, 0x0f, 0xe1, 0xa4, 0x9b, 0xe5, 0x8d, 0xdc, 0x60, 0x83, 0xbc, 0xa3, 0xf7, 0xc0, 0x2f, 0xf6, 0x44, 0x77, 0x5c, 0xd0, 0x02, 0x7f, 0x06, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2243_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2243_sig[] = { 0x48, 0xb4, 0xbd, 0xe7, 0xbe, 0xfb, 0x1b, 0x1c, 0xad, 0x50, 0xce, 0xe6, 0x23, 0x3c, 0xbf, 0x32, 0x81, 0x28, 0x60, 0xc8, 0x1d, 0x7a, 0xd5, 0xb0, 0xe9, 0xd6, 0x37, 0x72, 0x02, 0xbc, 0xd3, 0x48, 0x27, 0xc5, 0x34, 0xda, 0x0a, 0xc9, 0x64, 0x6a, 0xe0, 0x15, 0x46, 0x89, 0xe3, 0x8c, 0x60, 0x88, 0x94, 0xbb, 0x31, 0x26, 0xe1, 0x02, 0x5f, 0x69, 0xc8, 0x24, 0xc6, 0x9a, 0xb8, 0x21, 0x27, 0x4a, 0x83, 0x69, 0xf5, 0x84, 0x0f, 0x77, 0x66, 0x68, 0xeb, 0xb4, 0x35, 0xb3, 0x3b, 0xe0, 0x5d, 0xce, 0x4a, 0xdf, 0xab, 0xb8, 0x86, 0x0c, 0xcc, 0x90, 0x0d, 0x07, 0xdb, 0x00, 0x6a, 0x50, 0x19, 0x5f, 0xd4, 0xde, 0x98, 0x63, 0x21, 0x92, 0xfb, 0xe7, 0x31, 0x9c, 0xed, 0xff, 0x26, 0xaa, 0x86, 0x82, 0xcf, 0x7b, 0xf5, 0xf1, 0xc0, 0x2e, 0x58, 0xb9, 0xc1, 0x63, 0x23, 0x61, 0x03, 0xd9, 0xb3, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2243 = { .name = "ecdsa_brainpoolp512r1_sha512_2243", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2243_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2243_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2243_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 293 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2244 for ECDSA, tcId is 294 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2244_pubkey[] = { 0x78, 0x60, 0xa4, 0x74, 0x3b, 0xb4, 0x8e, 0x77, 0x93, 0xc7, 0xf1, 0x41, 0x6f, 0xba, 0xc6, 0xca, 0x0b, 0x53, 0x82, 0x10, 0xd7, 0x43, 0xf2, 0x49, 0x76, 0xaf, 0x3e, 0xfd, 0xa9, 0x7f, 0x28, 0xbc, 0x95, 0x91, 0x34, 0x01, 0xec, 0x4c, 0xa5, 0xe7, 0x44, 0xa2, 0x3d, 0x1a, 0x55, 0x26, 0x53, 0xff, 0x11, 0x0e, 0xc8, 0x42, 0x1b, 0x3d, 0xe5, 0x31, 0xf3, 0xba, 0xcd, 0xa0, 0x7b, 0xfb, 0x09, 0xd6, 0x03, 0x66, 0x2f, 0x2f, 0x24, 0x75, 0xbb, 0xf5, 0xe2, 0x0d, 0xa4, 0x8b, 0x50, 0x16, 0x9d, 0x28, 0x9c, 0x89, 0xc5, 0x4e, 0xd0, 0xf9, 0x7b, 0xbb, 0xc7, 0xf3, 0x80, 0x16, 0xf1, 0xa9, 0x55, 0xcb, 0x74, 0xc5, 0x27, 0x27, 0xef, 0x80, 0x20, 0x55, 0xea, 0x09, 0x0f, 0xe1, 0xa4, 0x9b, 0xe5, 0x8d, 0xdc, 0x60, 0x83, 0xbc, 0xa3, 0xf7, 0xc0, 0x2f, 0xf6, 0x44, 0x77, 0x5c, 0xd0, 0x02, 0x7f, 0x06, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2244_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2244_sig[] = { 0x19, 0x52, 0x4b, 0x15, 0xcf, 0x4e, 0xcb, 0x40, 0x0b, 0x93, 0x8e, 0xf5, 0xf7, 0x52, 0xb8, 0x6e, 0xc8, 0xf0, 0x7c, 0x59, 0x03, 0xda, 0x5d, 0xba, 0x9c, 0x91, 0xab, 0x79, 0x65, 0xb1, 0x22, 0x3a, 0x8e, 0x26, 0x2b, 0xef, 0x8c, 0xca, 0x89, 0x73, 0xed, 0x98, 0x79, 0x7f, 0x37, 0xa3, 0x5e, 0x1c, 0x59, 0x99, 0xcf, 0x20, 0x3e, 0x61, 0x0e, 0xf7, 0x73, 0xc6, 0xaa, 0x27, 0x86, 0xbb, 0xa0, 0x64, 0x98, 0xcf, 0x75, 0x26, 0xf5, 0xa2, 0x4a, 0x0e, 0x2f, 0x22, 0xf9, 0x09, 0xf8, 0x19, 0x0b, 0x13, 0x13, 0x04, 0x51, 0xb1, 0x5d, 0xd6, 0x77, 0x4b, 0xde, 0xa9, 0xd9, 0x29, 0x34, 0x2d, 0x92, 0x4b, 0xc7, 0xeb, 0xa1, 0xdf, 0x89, 0x91, 0x9c, 0x1b, 0x9a, 0xee, 0x8d, 0x09, 0x20, 0x36, 0x06, 0xd1, 0x0c, 0xeb, 0xff, 0x89, 0x90, 0x4c, 0xb7, 0xe7, 0x1a, 0x82, 0xd8, 0x97, 0x2d, 0x75, 0x53, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2244 = { .name = "ecdsa_brainpoolp512r1_sha512_2244", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2244_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2244_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2244_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 294 in file ecdsa_brainpoolP512r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2245 for ECDSA, tcId is 1 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2245_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2245_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2245_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x44, 0xb4, 0x23, 0x04, 0xe6, 0x93, 0x79, 0x66, 0x18, 0xd0, 0x90, 0xdb, 0xcb, 0x2a, 0x25, 0x51, 0xc3, 0xcb, 0x78, 0x53, 0x46, 0x11, 0xe6, 0x1f, 0xd9, 0xd1, 0xa5, 0xc0, 0x93, 0x8b, 0x5b, 0x8e, 0xc6, 0xed, 0x53, 0xd2, 0xd2, 0x89, 0x99, 0xea, 0xbb, 0xd8, 0xe7, 0x79, 0x2d, 0x16, 0x7f, 0xcf, 0x58, 0x24, 0x92, 0x40, 0x3a, 0x6a, 0x0f, 0x7c, 0xc9, 0x4c, 0x73, 0xa2, 0x8f, 0xb7, 0x6b, 0x71, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2245 = { .name = "ecdsa_brainpoolp512r1_sha512_2245", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2245_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2245_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2245_sig, .siglen = 128, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2246 for ECDSA, tcId is 2 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2246_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2246_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2246_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2246 = { .name = "ecdsa_brainpoolp512r1_sha512_2246", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2246_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2246_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2246_sig, .siglen = 128, .result = 1, .comment = "valid, tcId is 2 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2247 for ECDSA, tcId is 3 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2247_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2247_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2247_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2247 = { .name = "ecdsa_brainpoolp512r1_sha512_2247", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2247_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2247_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2247_sig, .siglen = 128, .result = 0, .comment = "length of sequence contains leading 0, tcId is 3 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2248 for ECDSA, tcId is 66 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2248_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2248_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2248_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2248 = { .name = "ecdsa_brainpoolp512r1_sha512_2248", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2248_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2248_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2248_sig, .siglen = 128, .result = 0, .comment = "long form encoding of length of integer, tcId is 66 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2249 for ECDSA, tcId is 67 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2249_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2249_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2249_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2249 = { .name = "ecdsa_brainpoolp512r1_sha512_2249", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2249_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2249_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2249_sig, .siglen = 128, .result = 0, .comment = "long form encoding of length of integer, tcId is 67 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2250 for ECDSA, tcId is 68 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2250_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2250_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2250_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2250 = { .name = "ecdsa_brainpoolp512r1_sha512_2250", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2250_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2250_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2250_sig, .siglen = 128, .result = 0, .comment = "length of integer contains leading 0, tcId is 68 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2251 for ECDSA, tcId is 69 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2251_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2251_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2251_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2251 = { .name = "ecdsa_brainpoolp512r1_sha512_2251", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2251_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2251_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2251_sig, .siglen = 128, .result = 0, .comment = "length of integer contains leading 0, tcId is 69 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2252 for ECDSA, tcId is 91 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2252_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2252_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2252_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x00, 0x00, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2252 = { .name = "ecdsa_brainpoolp512r1_sha512_2252", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2252_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2252_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2252_sig, .siglen = 130, .result = -1, .comment = "appending 0's to integer, tcId is 91 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2253 for ECDSA, tcId is 92 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2253_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2253_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2253_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2253 = { .name = "ecdsa_brainpoolp512r1_sha512_2253", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2253_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2253_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2253_sig, .siglen = 130, .result = -1, .comment = "appending 0's to integer, tcId is 92 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2254 for ECDSA, tcId is 93 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2254_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2254_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2254_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2254 = { .name = "ecdsa_brainpoolp512r1_sha512_2254", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2254_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2254_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2254_sig, .siglen = 128, .result = 0, .comment = "prepending 0's to integer, tcId is 93 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2255 for ECDSA, tcId is 94 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2255_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2255_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2255_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2255 = { .name = "ecdsa_brainpoolp512r1_sha512_2255", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2255_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2255_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2255_sig, .siglen = 128, .result = 0, .comment = "prepending 0's to integer, tcId is 94 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2256 for ECDSA, tcId is 96 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2256_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2256_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2256_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x05, 0x00, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2256 = { .name = "ecdsa_brainpoolp512r1_sha512_2256", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2256_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2256_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2256_sig, .siglen = 130, .result = -1, .comment = "appending null value to integer, tcId is 96 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2257 for ECDSA, tcId is 97 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2257_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2257_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2257_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2257 = { .name = "ecdsa_brainpoolp512r1_sha512_2257", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2257_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2257_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2257_sig, .siglen = 130, .result = -1, .comment = "appending null value to integer, tcId is 97 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2258 for ECDSA, tcId is 112 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2258_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2258_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2258_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2258 = { .name = "ecdsa_brainpoolp512r1_sha512_2258", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2258_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2258_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2258_sig, .siglen = 128, .result = -1, .comment = "dropping value of integer, tcId is 112 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2259 for ECDSA, tcId is 113 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2259_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2259_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2259_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2259 = { .name = "ecdsa_brainpoolp512r1_sha512_2259", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2259_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2259_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2259_sig, .siglen = 128, .result = -1, .comment = "dropping value of integer, tcId is 113 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2260 for ECDSA, tcId is 116 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2260_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2260_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2260_sig[] = { 0x09, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2260 = { .name = "ecdsa_brainpoolp512r1_sha512_2260", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2260_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2260_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2260_sig, .siglen = 128, .result = -1, .comment = "modify first byte of integer, tcId is 116 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2261 for ECDSA, tcId is 117 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2261_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2261_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2261_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x64, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2261 = { .name = "ecdsa_brainpoolp512r1_sha512_2261", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2261_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2261_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2261_sig, .siglen = 128, .result = -1, .comment = "modify first byte of integer, tcId is 117 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2262 for ECDSA, tcId is 118 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2262_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2262_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2262_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0x47, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2262 = { .name = "ecdsa_brainpoolp512r1_sha512_2262", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2262_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2262_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2262_sig, .siglen = 128, .result = -1, .comment = "modify last byte of integer, tcId is 118 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2263 for ECDSA, tcId is 119 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2263_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2263_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2263_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2263 = { .name = "ecdsa_brainpoolp512r1_sha512_2263", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2263_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2263_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2263_sig, .siglen = 128, .result = -1, .comment = "modify last byte of integer, tcId is 119 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2264 for ECDSA, tcId is 120 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2264_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2264_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2264_sig[] = { 0x00, 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2264 = { .name = "ecdsa_brainpoolp512r1_sha512_2264", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2264_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2264_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2264_sig, .siglen = 128, .result = -1, .comment = "truncated integer, tcId is 120 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2265 for ECDSA, tcId is 121 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2265_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2265_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2265_sig[] = { 0x00, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2265 = { .name = "ecdsa_brainpoolp512r1_sha512_2265", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2265_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2265_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2265_sig, .siglen = 128, .result = -1, .comment = "truncated integer, tcId is 121 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2266 for ECDSA, tcId is 122 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2266_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2266_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2266_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x00, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2266 = { .name = "ecdsa_brainpoolp512r1_sha512_2266", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2266_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2266_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2266_sig, .siglen = 128, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2267 for ECDSA, tcId is 123 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2267_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2267_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2267_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x00, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2267 = { .name = "ecdsa_brainpoolp512r1_sha512_2267", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2267_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2267_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2267_sig, .siglen = 128, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2268 for ECDSA, tcId is 124 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2268_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2268_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2268_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2268 = { .name = "ecdsa_brainpoolp512r1_sha512_2268", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2268_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2268_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2268_sig, .siglen = 128, .result = 0, .comment = "leading ff in integer, tcId is 124 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2269 for ECDSA, tcId is 125 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2269_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2269_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2269_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2269 = { .name = "ecdsa_brainpoolp512r1_sha512_2269", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2269_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2269_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2269_sig, .siglen = 128, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_brainpoolP512r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2270 for ECDSA, tcId is 128 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2270_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2270_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2270_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2270 = { .name = "ecdsa_brainpoolp512r1_sha512_2270", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2270_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2270_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2270_sig, .siglen = 128, .result = -1, .comment = "replacing integer with zero, tcId is 128 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2271 for ECDSA, tcId is 129 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2271_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2271_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2271_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2271 = { .name = "ecdsa_brainpoolp512r1_sha512_2271", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2271_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2271_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2271_sig, .siglen = 128, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2272 for ECDSA, tcId is 130 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2272_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2272_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2272_sig[] = { 0xb6, 0xaf, 0xf6, 0xed, 0x23, 0xb6, 0x30, 0x8e, 0x0a, 0xce, 0x84, 0x0e, 0x75, 0x57, 0xd0, 0x36, 0x65, 0x49, 0xda, 0x44, 0xc2, 0x31, 0x27, 0xfb, 0xe2, 0xd3, 0xf6, 0x77, 0x1c, 0x98, 0x73, 0x75, 0x22, 0x3c, 0x7a, 0xc4, 0x94, 0xef, 0x54, 0xfd, 0x71, 0xec, 0xe3, 0x54, 0x6d, 0xdb, 0xfd, 0xc3, 0xbd, 0xc4, 0xbd, 0x0a, 0x16, 0x59, 0x44, 0x64, 0x23, 0x02, 0x7f, 0x0e, 0x01, 0xaf, 0xfa, 0x30, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2272 = { .name = "ecdsa_brainpoolp512r1_sha512_2272", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2272_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2272_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2272_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 130 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2273 for ECDSA, tcId is 131 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2273_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2273_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2273_sig[] = { 0x60, 0xf4, 0xbb, 0x7b, 0x6b, 0xe2, 0xa7, 0x77, 0x8b, 0x24, 0xb6, 0xb2, 0x0d, 0xc3, 0xd8, 0x26, 0xce, 0xe8, 0xbe, 0xdd, 0x5a, 0x9d, 0x83, 0xde, 0x36, 0x0c, 0xbc, 0xe2, 0x3c, 0x32, 0x62, 0x94, 0x77, 0xbf, 0xc2, 0x41, 0xfb, 0x9d, 0x08, 0xca, 0xee, 0xe0, 0x21, 0x21, 0x6e, 0x83, 0xdd, 0x35, 0x82, 0x61, 0x16, 0x08, 0x05, 0x9d, 0x8e, 0xa8, 0xb7, 0xf3, 0x52, 0x08, 0xc8, 0x5d, 0xf9, 0x5e, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2273 = { .name = "ecdsa_brainpoolp512r1_sha512_2273", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2273_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2273_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2273_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2274 for ECDSA, tcId is 132 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2274_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2274_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2274_sig[] = { 0xf4, 0x2d, 0xa6, 0xcb, 0xb8, 0x33, 0x93, 0xfd, 0x35, 0x06, 0x62, 0x9f, 0xbe, 0x72, 0x2b, 0xd1, 0x65, 0xe6, 0xb3, 0x6e, 0xf1, 0x98, 0xaa, 0x12, 0xf3, 0x8f, 0xa6, 0x53, 0x53, 0x9a, 0x94, 0xfb, 0x33, 0x01, 0xe1, 0x7c, 0xb7, 0xb9, 0xd1, 0x1b, 0xcf, 0x99, 0x7d, 0xc5, 0x11, 0xd0, 0x12, 0x83, 0x5f, 0xed, 0x16, 0x76, 0xf2, 0x04, 0x96, 0x79, 0x92, 0x85, 0x17, 0x74, 0x9a, 0xf9, 0x06, 0x39, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2274 = { .name = "ecdsa_brainpoolp512r1_sha512_2274", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2274_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2274_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2274_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2275 for ECDSA, tcId is 133 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2275_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2275_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2275_sig[] = { 0x9f, 0x0b, 0x44, 0x84, 0x94, 0x1d, 0x58, 0x88, 0x74, 0xdb, 0x49, 0x4d, 0xf2, 0x3c, 0x27, 0xd9, 0x31, 0x17, 0x41, 0x22, 0xa5, 0x62, 0x7c, 0x21, 0xc9, 0xf3, 0x43, 0x1d, 0xc3, 0xcd, 0x9d, 0x6b, 0x88, 0x40, 0x3d, 0xbe, 0x04, 0x62, 0xf7, 0x35, 0x11, 0x1f, 0xde, 0xde, 0x91, 0x7c, 0x22, 0xca, 0x7d, 0x9e, 0xe9, 0xf7, 0xfa, 0x62, 0x71, 0x57, 0x48, 0x0c, 0xad, 0xf7, 0x37, 0xa2, 0x06, 0xa2, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2275 = { .name = "ecdsa_brainpoolp512r1_sha512_2275", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2275_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2275_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2275_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2276 for ECDSA, tcId is 134 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2276_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2276_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2276_sig[] = { 0x49, 0x50, 0x09, 0x12, 0xdc, 0x49, 0xcf, 0x71, 0xf5, 0x31, 0x7b, 0xf1, 0x8a, 0xa8, 0x2f, 0xc9, 0x9a, 0xb6, 0x25, 0xbb, 0x3d, 0xce, 0xd8, 0x04, 0x1d, 0x2c, 0x09, 0x88, 0xe3, 0x67, 0x8c, 0x8a, 0xdd, 0xc3, 0x85, 0x3b, 0x6b, 0x10, 0xab, 0x02, 0x8e, 0x13, 0x1c, 0xab, 0x92, 0x24, 0x02, 0x3c, 0x42, 0x3b, 0x42, 0xf5, 0xe9, 0xa6, 0xbb, 0x9b, 0xdc, 0xfd, 0x80, 0xf1, 0xfe, 0x50, 0x05, 0xd0, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2276 = { .name = "ecdsa_brainpoolp512r1_sha512_2276", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2276_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2276_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2276_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2277 for ECDSA, tcId is 135 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2277_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2277_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2277_sig[] = { 0x01, 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2277 = { .name = "ecdsa_brainpoolp512r1_sha512_2277", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2277_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2277_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2277_sig, .siglen = 129, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2278 for ECDSA, tcId is 136 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2278_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2278_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2278_sig[] = { 0xf4, 0x2d, 0xa6, 0xcb, 0xb8, 0x33, 0x93, 0xfd, 0x35, 0x06, 0x62, 0x9f, 0xbe, 0x72, 0x2b, 0xd1, 0x65, 0xe6, 0xb3, 0x6e, 0xf1, 0x98, 0xaa, 0x12, 0xf3, 0x8f, 0xa6, 0x53, 0x53, 0x9a, 0x94, 0xfb, 0x33, 0x01, 0xe1, 0x7c, 0xb7, 0xb9, 0xd1, 0x1b, 0xcf, 0x99, 0x7d, 0xc5, 0x11, 0xd0, 0x12, 0x83, 0x5f, 0xed, 0x16, 0x76, 0xf2, 0x04, 0x96, 0x79, 0x92, 0x85, 0x17, 0x74, 0x9a, 0xf9, 0x06, 0x39, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2278 = { .name = "ecdsa_brainpoolp512r1_sha512_2278", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2278_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2278_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2278_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2279 for ECDSA, tcId is 137 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2279_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2279_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2279_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x01, 0x11, 0x07, 0x18, 0x6c, 0xd1, 0x40, 0x0f, 0xb0, 0x66, 0xd9, 0x3c, 0x80, 0x9c, 0x69, 0xd2, 0xbd, 0xd2, 0x95, 0xa3, 0x14, 0x21, 0x81, 0xbd, 0xfd, 0xd2, 0xf5, 0x93, 0xd4, 0x4c, 0xda, 0xb5, 0x51, 0xe3, 0x8f, 0x64, 0xaf, 0xc6, 0xc8, 0xb2, 0x47, 0xc7, 0x33, 0xda, 0xb9, 0xd2, 0x41, 0xa0, 0xbe, 0xe3, 0x3f, 0x14, 0xc1, 0xd6, 0x51, 0xa6, 0x3e, 0xa1, 0xc2, 0xb9, 0x62, 0xa9, 0x9a, 0x95, 0x61, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2279 = { .name = "ecdsa_brainpoolp512r1_sha512_2279", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2279_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2279_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2279_sig, .siglen = 129, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2280 for ECDSA, tcId is 138 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2280_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2280_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2280_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0xbb, 0x4b, 0xdc, 0xfb, 0x19, 0x6c, 0x86, 0x99, 0xe7, 0x2f, 0x6f, 0x24, 0x34, 0xd5, 0xda, 0xae, 0x3c, 0x34, 0x87, 0xac, 0xb9, 0xee, 0x19, 0xe0, 0x26, 0x2e, 0x5a, 0x3f, 0x6c, 0x74, 0xa4, 0x71, 0x39, 0x12, 0xac, 0x2d, 0x2d, 0x76, 0x66, 0x15, 0x44, 0x27, 0x18, 0x86, 0xd2, 0xe9, 0x80, 0x30, 0xa7, 0xdb, 0x6d, 0xbf, 0xc5, 0x95, 0xf0, 0x83, 0x36, 0xb3, 0x8c, 0x5d, 0x70, 0x48, 0x94, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2280 = { .name = "ecdsa_brainpoolp512r1_sha512_2280", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2280_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2280_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2280_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2281 for ECDSA, tcId is 139 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2281_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2281_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2281_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x99, 0xd6, 0x85, 0x4c, 0x0a, 0xa9, 0xb4, 0xda, 0xd8, 0xfb, 0xaa, 0x2d, 0x97, 0x60, 0x29, 0x49, 0xf8, 0x9a, 0xea, 0x9f, 0x92, 0x48, 0x14, 0x11, 0x03, 0x6e, 0x08, 0xf6, 0x23, 0x58, 0x53, 0x1e, 0x71, 0xae, 0xf7, 0x91, 0x85, 0xe0, 0x73, 0xd1, 0x7a, 0x52, 0x86, 0x5f, 0xad, 0x6a, 0x6f, 0x88, 0x3a, 0x72, 0xbe, 0xbf, 0x32, 0x0c, 0x34, 0x9f, 0x13, 0xc4, 0xdd, 0x1f, 0xf3, 0x0e, 0x6b, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2281 = { .name = "ecdsa_brainpoolp512r1_sha512_2281", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2281_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2281_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2281_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2282 for ECDSA, tcId is 140 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2282_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2282_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2282_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0xfe, 0xee, 0xf8, 0xe7, 0x93, 0x2e, 0xbf, 0xf0, 0x4f, 0x99, 0x26, 0xc3, 0x7f, 0x63, 0x96, 0x2d, 0x42, 0x2d, 0x6a, 0x5c, 0xeb, 0xde, 0x7e, 0x42, 0x02, 0x2d, 0x0a, 0x6c, 0x2b, 0xb3, 0x25, 0x4a, 0xae, 0x1c, 0x70, 0x9b, 0x50, 0x39, 0x37, 0x4d, 0xb8, 0x38, 0xcc, 0x25, 0x46, 0x2d, 0xbe, 0x5f, 0x41, 0x1c, 0xc0, 0xeb, 0x3e, 0x29, 0xae, 0x59, 0xc1, 0x5e, 0x3d, 0x46, 0x9d, 0x56, 0x65, 0x6a, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2282 = { .name = "ecdsa_brainpoolp512r1_sha512_2282", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2282_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2282_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2282_sig, .siglen = 129, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2283 for ECDSA, tcId is 141 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2283_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2283_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2283_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x01, 0x66, 0x29, 0x7a, 0xb3, 0xf5, 0x56, 0x4b, 0x25, 0x27, 0x04, 0x55, 0xd2, 0x68, 0x9f, 0xd6, 0xb6, 0x07, 0x65, 0x15, 0x60, 0x6d, 0xb7, 0xeb, 0xee, 0xfc, 0x91, 0xf7, 0x09, 0xdc, 0xa7, 0xac, 0xe1, 0x8e, 0x51, 0x08, 0x6e, 0x7a, 0x1f, 0x8c, 0x2e, 0x85, 0xad, 0x79, 0xa0, 0x52, 0x95, 0x90, 0x77, 0xc5, 0x8d, 0x41, 0x40, 0xcd, 0xf3, 0xcb, 0x60, 0xec, 0x3b, 0x22, 0xe0, 0x0c, 0xf1, 0x94, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2283 = { .name = "ecdsa_brainpoolp512r1_sha512_2283", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2283_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2283_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2283_sig, .siglen = 129, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2284 for ECDSA, tcId is 142 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2284_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2284_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2284_sig[] = { 0x0b, 0xd2, 0x59, 0x34, 0x47, 0xcc, 0x6c, 0x02, 0xca, 0xf9, 0x9d, 0x60, 0x41, 0x8d, 0xd4, 0x2e, 0x9a, 0x19, 0x4c, 0x91, 0x0e, 0x67, 0x55, 0xed, 0x0c, 0x70, 0x59, 0xac, 0xac, 0x65, 0x6b, 0x04, 0xcc, 0xfe, 0x1e, 0x83, 0x48, 0x46, 0x2e, 0xe4, 0x30, 0x66, 0x82, 0x3a, 0xee, 0x2f, 0xed, 0x7c, 0xa0, 0x12, 0xe9, 0x89, 0x0d, 0xfb, 0x69, 0x86, 0x6d, 0x7a, 0xe8, 0x8b, 0x65, 0x06, 0xf9, 0xc7, 0x99, 0xd6, 0x85, 0x4c, 0x0a, 0xa9, 0xb4, 0xda, 0xd8, 0xfb, 0xaa, 0x2d, 0x97, 0x60, 0x29, 0x49, 0xf8, 0x9a, 0xea, 0x9f, 0x92, 0x48, 0x14, 0x11, 0x03, 0x6e, 0x08, 0xf6, 0x23, 0x58, 0x53, 0x1e, 0x71, 0xae, 0xf7, 0x91, 0x85, 0xe0, 0x73, 0xd1, 0x7a, 0x52, 0x86, 0x5f, 0xad, 0x6a, 0x6f, 0x88, 0x3a, 0x72, 0xbe, 0xbf, 0x32, 0x0c, 0x34, 0x9f, 0x13, 0xc4, 0xdd, 0x1f, 0xf3, 0x0e, 0x6b, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2284 = { .name = "ecdsa_brainpoolp512r1_sha512_2284", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2284_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2284_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2284_sig, .siglen = 128, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2285 for ECDSA, tcId is 143 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2285_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2285_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2285_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2285 = { .name = "ecdsa_brainpoolp512r1_sha512_2285", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2285_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2285_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2285_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 143 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2286 for ECDSA, tcId is 144 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2286_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2286_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2286_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2286 = { .name = "ecdsa_brainpoolp512r1_sha512_2286", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2286_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2286_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2286_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2287 for ECDSA, tcId is 145 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2287_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2287_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2287_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2287 = { .name = "ecdsa_brainpoolp512r1_sha512_2287", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2287_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2287_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2287_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2288 for ECDSA, tcId is 146 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2288_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2288_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2288_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2288 = { .name = "ecdsa_brainpoolp512r1_sha512_2288", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2288_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2288_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2288_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2289 for ECDSA, tcId is 147 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2289_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2289_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2289_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2289 = { .name = "ecdsa_brainpoolp512r1_sha512_2289", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2289_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2289_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2289_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2290 for ECDSA, tcId is 148 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2290_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2290_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2290_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2290 = { .name = "ecdsa_brainpoolp512r1_sha512_2290", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2290_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2290_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2290_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2291 for ECDSA, tcId is 149 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2291_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2291_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2291_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2291 = { .name = "ecdsa_brainpoolp512r1_sha512_2291", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2291_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2291_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2291_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2292 for ECDSA, tcId is 150 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2292_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2292_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2292_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2292 = { .name = "ecdsa_brainpoolp512r1_sha512_2292", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2292_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2292_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2292_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2293 for ECDSA, tcId is 153 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2293_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2293_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2293_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2293 = { .name = "ecdsa_brainpoolp512r1_sha512_2293", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2293_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2293_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2293_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 153 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2294 for ECDSA, tcId is 154 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2294_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2294_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2294_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2294 = { .name = "ecdsa_brainpoolp512r1_sha512_2294", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2294_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2294_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2294_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2295 for ECDSA, tcId is 155 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2295_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2295_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2295_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2295 = { .name = "ecdsa_brainpoolp512r1_sha512_2295", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2295_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2295_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2295_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2296 for ECDSA, tcId is 156 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2296_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2296_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2296_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2296 = { .name = "ecdsa_brainpoolp512r1_sha512_2296", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2296_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2296_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2296_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2297 for ECDSA, tcId is 157 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2297_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2297_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2297_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2297 = { .name = "ecdsa_brainpoolp512r1_sha512_2297", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2297_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2297_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2297_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2298 for ECDSA, tcId is 158 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2298_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2298_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2298_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2298 = { .name = "ecdsa_brainpoolp512r1_sha512_2298", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2298_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2298_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2298_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2299 for ECDSA, tcId is 159 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2299_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2299_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2299_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2299 = { .name = "ecdsa_brainpoolp512r1_sha512_2299", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2299_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2299_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2299_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2300 for ECDSA, tcId is 160 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2300_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2300_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2300_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2300 = { .name = "ecdsa_brainpoolp512r1_sha512_2300", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2300_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2300_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2300_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2301 for ECDSA, tcId is 163 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2301_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2301_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2301_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2301 = { .name = "ecdsa_brainpoolp512r1_sha512_2301", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2301_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2301_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2301_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 163 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2302 for ECDSA, tcId is 164 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2302_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2302_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2302_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2302 = { .name = "ecdsa_brainpoolp512r1_sha512_2302", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2302_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2302_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2302_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2303 for ECDSA, tcId is 165 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2303_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2303_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2303_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2303 = { .name = "ecdsa_brainpoolp512r1_sha512_2303", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2303_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2303_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2303_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2304 for ECDSA, tcId is 166 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2304_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2304_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2304_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2304 = { .name = "ecdsa_brainpoolp512r1_sha512_2304", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2304_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2304_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2304_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2305 for ECDSA, tcId is 167 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2305_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2305_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2305_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2305 = { .name = "ecdsa_brainpoolp512r1_sha512_2305", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2305_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2305_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2305_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2306 for ECDSA, tcId is 168 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2306_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2306_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2306_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2306 = { .name = "ecdsa_brainpoolp512r1_sha512_2306", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2306_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2306_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2306_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2307 for ECDSA, tcId is 169 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2307_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2307_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2307_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2307 = { .name = "ecdsa_brainpoolp512r1_sha512_2307", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2307_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2307_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2307_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2308 for ECDSA, tcId is 170 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2308_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2308_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2308_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2308 = { .name = "ecdsa_brainpoolp512r1_sha512_2308", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2308_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2308_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2308_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2309 for ECDSA, tcId is 173 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2309_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2309_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2309_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2309 = { .name = "ecdsa_brainpoolp512r1_sha512_2309", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2309_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2309_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2309_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 173 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2310 for ECDSA, tcId is 174 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2310_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2310_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2310_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2310 = { .name = "ecdsa_brainpoolp512r1_sha512_2310", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2310_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2310_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2310_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2311 for ECDSA, tcId is 175 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2311_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2311_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2311_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2311 = { .name = "ecdsa_brainpoolp512r1_sha512_2311", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2311_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2311_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2311_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2312 for ECDSA, tcId is 176 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2312_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2312_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2312_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2312 = { .name = "ecdsa_brainpoolp512r1_sha512_2312", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2312_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2312_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2312_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2313 for ECDSA, tcId is 177 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2313_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2313_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2313_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2313 = { .name = "ecdsa_brainpoolp512r1_sha512_2313", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2313_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2313_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2313_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2314 for ECDSA, tcId is 178 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2314_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2314_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2314_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2314 = { .name = "ecdsa_brainpoolp512r1_sha512_2314", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2314_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2314_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2314_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2315 for ECDSA, tcId is 179 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2315_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2315_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2315_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2315 = { .name = "ecdsa_brainpoolp512r1_sha512_2315", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2315_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2315_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2315_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2316 for ECDSA, tcId is 180 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2316_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2316_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2316_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2316 = { .name = "ecdsa_brainpoolp512r1_sha512_2316", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2316_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2316_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2316_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2317 for ECDSA, tcId is 183 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2317_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2317_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2317_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2317 = { .name = "ecdsa_brainpoolp512r1_sha512_2317", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2317_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2317_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2317_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 183 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2318 for ECDSA, tcId is 184 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2318_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2318_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2318_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2318 = { .name = "ecdsa_brainpoolp512r1_sha512_2318", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2318_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2318_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2318_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2319 for ECDSA, tcId is 185 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2319_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2319_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2319_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2319 = { .name = "ecdsa_brainpoolp512r1_sha512_2319", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2319_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2319_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2319_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2320 for ECDSA, tcId is 186 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2320_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2320_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2320_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2320 = { .name = "ecdsa_brainpoolp512r1_sha512_2320", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2320_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2320_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2320_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2321 for ECDSA, tcId is 187 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2321_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2321_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2321_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2321 = { .name = "ecdsa_brainpoolp512r1_sha512_2321", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2321_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2321_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2321_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2322 for ECDSA, tcId is 188 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2322_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2322_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2322_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2322 = { .name = "ecdsa_brainpoolp512r1_sha512_2322", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2322_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2322_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2322_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2323 for ECDSA, tcId is 189 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2323_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2323_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2323_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2323 = { .name = "ecdsa_brainpoolp512r1_sha512_2323", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2323_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2323_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2323_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2324 for ECDSA, tcId is 190 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2324_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2324_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2324_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2324 = { .name = "ecdsa_brainpoolp512r1_sha512_2324", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2324_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2324_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2324_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2325 for ECDSA, tcId is 193 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2325_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2325_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2325_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2325 = { .name = "ecdsa_brainpoolp512r1_sha512_2325", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2325_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2325_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2325_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 193 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2326 for ECDSA, tcId is 194 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2326_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2326_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2326_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2326 = { .name = "ecdsa_brainpoolp512r1_sha512_2326", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2326_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2326_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2326_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2327 for ECDSA, tcId is 195 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2327_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2327_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2327_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2327 = { .name = "ecdsa_brainpoolp512r1_sha512_2327", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2327_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2327_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2327_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2328 for ECDSA, tcId is 196 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2328_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2328_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2328_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2328 = { .name = "ecdsa_brainpoolp512r1_sha512_2328", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2328_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2328_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2328_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2329 for ECDSA, tcId is 197 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2329_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2329_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2329_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2329 = { .name = "ecdsa_brainpoolp512r1_sha512_2329", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2329_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2329_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2329_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2330 for ECDSA, tcId is 198 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2330_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2330_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2330_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2330 = { .name = "ecdsa_brainpoolp512r1_sha512_2330", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2330_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2330_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2330_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2331 for ECDSA, tcId is 199 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2331_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2331_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2331_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2331 = { .name = "ecdsa_brainpoolp512r1_sha512_2331", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2331_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2331_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2331_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2332 for ECDSA, tcId is 200 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2332_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2332_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2332_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2332 = { .name = "ecdsa_brainpoolp512r1_sha512_2332", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2332_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2332_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2332_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2333 for ECDSA, tcId is 203 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2333_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2333_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2333_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2333 = { .name = "ecdsa_brainpoolp512r1_sha512_2333", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2333_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2333_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2333_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 203 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2334 for ECDSA, tcId is 204 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2334_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2334_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2334_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2334 = { .name = "ecdsa_brainpoolp512r1_sha512_2334", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2334_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2334_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2334_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2335 for ECDSA, tcId is 205 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2335_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2335_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2335_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2335 = { .name = "ecdsa_brainpoolp512r1_sha512_2335", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2335_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2335_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2335_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2336 for ECDSA, tcId is 206 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2336_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2336_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2336_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2336 = { .name = "ecdsa_brainpoolp512r1_sha512_2336", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2336_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2336_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2336_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2337 for ECDSA, tcId is 207 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2337_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2337_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2337_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2337 = { .name = "ecdsa_brainpoolp512r1_sha512_2337", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2337_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2337_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2337_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2338 for ECDSA, tcId is 208 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2338_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2338_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2338_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2338 = { .name = "ecdsa_brainpoolp512r1_sha512_2338", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2338_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2338_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2338_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2339 for ECDSA, tcId is 209 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2339_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2339_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2339_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2339 = { .name = "ecdsa_brainpoolp512r1_sha512_2339", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2339_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2339_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2339_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2340 for ECDSA, tcId is 210 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2340_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2340_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2340_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2340 = { .name = "ecdsa_brainpoolp512r1_sha512_2340", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2340_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2340_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2340_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2341 for ECDSA, tcId is 213 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2341_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2341_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2341_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2341 = { .name = "ecdsa_brainpoolp512r1_sha512_2341", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2341_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2341_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2341_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 213 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2342 for ECDSA, tcId is 214 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2342_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2342_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2342_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2342 = { .name = "ecdsa_brainpoolp512r1_sha512_2342", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2342_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2342_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2342_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2343 for ECDSA, tcId is 215 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2343_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2343_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2343_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2343 = { .name = "ecdsa_brainpoolp512r1_sha512_2343", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2343_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2343_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2343_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2344 for ECDSA, tcId is 216 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2344_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2344_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2344_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2344 = { .name = "ecdsa_brainpoolp512r1_sha512_2344", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2344_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2344_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2344_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2345 for ECDSA, tcId is 217 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2345_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2345_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2345_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2345 = { .name = "ecdsa_brainpoolp512r1_sha512_2345", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2345_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2345_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2345_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2346 for ECDSA, tcId is 218 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2346_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2346_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2346_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2346 = { .name = "ecdsa_brainpoolp512r1_sha512_2346", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2346_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2346_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2346_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2347 for ECDSA, tcId is 219 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2347_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2347_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2347_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2347 = { .name = "ecdsa_brainpoolp512r1_sha512_2347", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2347_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2347_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2347_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2348 for ECDSA, tcId is 220 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2348_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2348_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2348_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2348 = { .name = "ecdsa_brainpoolp512r1_sha512_2348", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2348_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2348_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2348_sig, .siglen = 128, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2349 for ECDSA, tcId is 229 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2349_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2349_msg[] = { 0x31, 0x31, 0x31, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2349_sig[] = { 0x7d, 0xa1, 0x1e, 0x5b, 0x4b, 0xb7, 0x93, 0x21, 0x35, 0xcd, 0x91, 0xac, 0xce, 0xf8, 0x89, 0x2c, 0x42, 0x86, 0x65, 0x4a, 0x7b, 0xe7, 0xc9, 0xd3, 0x84, 0xb6, 0x00, 0xd9, 0x79, 0x00, 0xee, 0x12, 0xa2, 0x3f, 0xf1, 0xf9, 0xae, 0x9a, 0x4f, 0xe7, 0x4c, 0xca, 0x18, 0x5d, 0x0d, 0xc9, 0xf5, 0x9d, 0xc2, 0x4b, 0xe0, 0x3d, 0x02, 0x23, 0xd8, 0xfe, 0xb5, 0x5b, 0x6d, 0xde, 0x17, 0x77, 0x47, 0x5f, 0x06, 0x86, 0xbc, 0x31, 0x3a, 0xa5, 0xc1, 0x92, 0x3a, 0xb0, 0x54, 0x33, 0x31, 0x39, 0x81, 0x90, 0xca, 0x5f, 0x22, 0xa3, 0xa9, 0x7e, 0x96, 0x3a, 0x13, 0xce, 0xdf, 0x68, 0x8d, 0xa1, 0xdf, 0xe4, 0xa3, 0x48, 0x94, 0x54, 0x97, 0xb2, 0x1c, 0x01, 0xc8, 0xa1, 0x7c, 0x23, 0x25, 0x2b, 0x3e, 0x8e, 0xac, 0x1f, 0x9a, 0x92, 0xd6, 0x32, 0x0e, 0xaa, 0x32, 0x4b, 0x44, 0x80, 0x7c, 0x32, 0x61, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2349 = { .name = "ecdsa_brainpoolp512r1_sha512_2349", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2349_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2349_msg, .msglen = 4, .sig = ecdsa_brainpoolp512r1_sha512_2349_sig, .siglen = 128, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 229 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2350 for ECDSA, tcId is 230 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2350_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2350_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x31, 0x39, 0x34, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2350_sig[] = { 0x6d, 0x87, 0xbe, 0x05, 0x95, 0x8c, 0xa5, 0xc7, 0x0c, 0x5d, 0x29, 0x62, 0x91, 0x60, 0x50, 0x21, 0x40, 0x2d, 0xeb, 0xa1, 0x77, 0x2f, 0x31, 0xbb, 0xba, 0x09, 0xdc, 0x65, 0xa8, 0x37, 0xb0, 0x9a, 0x78, 0xd3, 0x32, 0xb6, 0x16, 0x2a, 0x32, 0x01, 0xca, 0x1a, 0x30, 0xd4, 0x16, 0x2d, 0x8f, 0x18, 0x6b, 0x2b, 0xff, 0xca, 0x53, 0x02, 0x33, 0x3a, 0xca, 0x14, 0x89, 0x4d, 0x5f, 0x09, 0x3f, 0xe7, 0x10, 0xb8, 0xb3, 0xc9, 0x0b, 0x46, 0x09, 0xcc, 0xbd, 0xdd, 0xed, 0x27, 0x5d, 0x42, 0x49, 0x85, 0x7d, 0x88, 0x27, 0x49, 0xe4, 0xb8, 0x36, 0xd0, 0x17, 0xdb, 0xaa, 0xe0, 0x5e, 0x3a, 0x19, 0xcf, 0x78, 0x10, 0x63, 0x23, 0x29, 0xa0, 0x25, 0x80, 0xda, 0xe4, 0x41, 0x36, 0xca, 0xdc, 0xf0, 0x6c, 0xa5, 0x7d, 0xfe, 0x56, 0x0e, 0x1c, 0x11, 0x22, 0xe2, 0xec, 0x00, 0xff, 0x04, 0xd7, 0x88, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2350 = { .name = "ecdsa_brainpoolp512r1_sha512_2350", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2350_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2350_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2350_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 230 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2351 for ECDSA, tcId is 231 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2351_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2351_msg[] = { 0x35, 0x33, 0x36, 0x37, 0x36, 0x34, 0x31, 0x38, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2351_sig[] = { 0x23, 0xe9, 0xba, 0xc3, 0xf1, 0x4d, 0x56, 0x67, 0x9b, 0xda, 0x0b, 0xb2, 0xf4, 0xf1, 0x9e, 0xec, 0xaf, 0x6d, 0xd5, 0x03, 0x64, 0x9c, 0x81, 0x14, 0x92, 0x27, 0x88, 0x0f, 0x14, 0x37, 0x6d, 0x02, 0x24, 0x19, 0x3d, 0x2b, 0x1b, 0xda, 0x4b, 0x08, 0xf8, 0x7e, 0x46, 0x68, 0x7d, 0xd9, 0x14, 0x12, 0x78, 0xa3, 0x99, 0xf0, 0xa3, 0xcd, 0x0d, 0x00, 0x2f, 0x23, 0x6d, 0x0e, 0x7d, 0x73, 0x82, 0xb7, 0x9c, 0x24, 0xfb, 0x21, 0x28, 0xd6, 0x2e, 0x5d, 0xdf, 0x59, 0xbb, 0x86, 0xb3, 0xa6, 0xb7, 0x87, 0xb1, 0x0c, 0xc7, 0x58, 0x65, 0xe5, 0xae, 0xab, 0x41, 0xa8, 0x4f, 0x87, 0x8a, 0xb3, 0xa9, 0x47, 0xa2, 0xf6, 0xb4, 0xb0, 0x87, 0x1a, 0xf4, 0x94, 0xc1, 0x30, 0xf5, 0x8b, 0xb3, 0x95, 0x7c, 0xe0, 0x3d, 0x61, 0x37, 0x3f, 0x3f, 0xb5, 0xcb, 0xe9, 0x7e, 0xbe, 0xdc, 0x1b, 0x3a, 0xca, 0x17, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2351 = { .name = "ecdsa_brainpoolp512r1_sha512_2351", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2351_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2351_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2351_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2352 for ECDSA, tcId is 232 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2352_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2352_msg[] = { 0x35, 0x36, 0x37, 0x31, 0x34, 0x38, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2352_sig[] = { 0x2d, 0x07, 0xd8, 0xbb, 0x62, 0x77, 0xb7, 0x8f, 0xa4, 0x48, 0xd5, 0x2e, 0x3e, 0x1d, 0x90, 0x1c, 0xcb, 0xdd, 0x68, 0x29, 0x30, 0xfc, 0xa9, 0xd8, 0x69, 0x59, 0xa6, 0x3b, 0x5a, 0x79, 0x2a, 0x8a, 0xa8, 0x2f, 0xf9, 0xbd, 0x7d, 0xa3, 0xe4, 0x05, 0x7f, 0x40, 0x2a, 0x76, 0xe8, 0x28, 0x36, 0xaa, 0x3d, 0xa3, 0x4b, 0x6f, 0xf6, 0xbb, 0x8b, 0x21, 0x89, 0xac, 0x24, 0x2b, 0xae, 0xa2, 0xb0, 0xee, 0x58, 0xeb, 0xef, 0x50, 0xea, 0x30, 0xd1, 0x5a, 0xc2, 0x6f, 0xa0, 0x3e, 0x2b, 0x06, 0x5c, 0x7b, 0xa5, 0x0f, 0x33, 0x1a, 0x5c, 0xf2, 0x40, 0x17, 0x5f, 0xf3, 0xa6, 0xa1, 0xd8, 0xdb, 0x40, 0x0e, 0x15, 0x97, 0xce, 0x67, 0x5e, 0xb3, 0x2f, 0x26, 0x9b, 0x43, 0x67, 0x01, 0x1a, 0xcf, 0x32, 0x76, 0x58, 0x06, 0x02, 0xee, 0xd7, 0xc2, 0x93, 0x84, 0x39, 0x77, 0x2e, 0x1b, 0xe1, 0xb9, 0x38, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2352 = { .name = "ecdsa_brainpoolp512r1_sha512_2352", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2352_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2352_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2352_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2353 for ECDSA, tcId is 233 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2353_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2353_msg[] = { 0x31, 0x31, 0x32, 0x30, 0x37, 0x31, 0x37, 0x32, 0x39, 0x30, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2353_sig[] = { 0x0d, 0x67, 0x43, 0xa7, 0xbc, 0x90, 0x4a, 0x21, 0xd7, 0x31, 0x20, 0x5f, 0xca, 0xa7, 0xfc, 0xd0, 0x01, 0x8e, 0xad, 0x44, 0x6e, 0xcc, 0x9b, 0xaf, 0xc4, 0x53, 0x2b, 0xd0, 0xce, 0x6b, 0xfa, 0x69, 0x60, 0x15, 0x9f, 0x59, 0xb5, 0xeb, 0x37, 0xc7, 0x50, 0xd4, 0x23, 0xc4, 0xfb, 0xcf, 0xb2, 0x0a, 0x71, 0x8e, 0x56, 0x55, 0xd5, 0x17, 0xb7, 0x4f, 0xff, 0x89, 0x86, 0xc9, 0x63, 0x8f, 0x4f, 0x29, 0x03, 0x99, 0xd7, 0x94, 0x1f, 0xe5, 0xf3, 0xf3, 0x08, 0xaf, 0xb8, 0xa8, 0xa4, 0xff, 0x8f, 0x2b, 0xec, 0x1b, 0xfe, 0x6b, 0x91, 0x0c, 0x83, 0x99, 0xd8, 0x31, 0xeb, 0x62, 0x21, 0x68, 0x48, 0x75, 0xf6, 0x7f, 0xe6, 0xa2, 0x57, 0x6c, 0x86, 0xfe, 0xad, 0xf3, 0xcd, 0x2a, 0xf1, 0x47, 0x29, 0x78, 0x30, 0x11, 0x36, 0x11, 0xfc, 0xff, 0xfa, 0xcd, 0x8a, 0x8c, 0x8c, 0x52, 0xcf, 0x95, 0x7f, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2353 = { .name = "ecdsa_brainpoolp512r1_sha512_2353", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2353_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2353_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2353_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2354 for ECDSA, tcId is 234 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2354_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2354_msg[] = { 0x31, 0x31, 0x32, 0x39, 0x38, 0x30, 0x33, 0x34, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2354_sig[] = { 0xaa, 0xbc, 0x4b, 0xdc, 0xc4, 0x4c, 0xea, 0xcf, 0xe0, 0x3a, 0x96, 0xa7, 0x93, 0x9b, 0xf0, 0x8c, 0x40, 0x7d, 0x30, 0x0d, 0xe4, 0x46, 0x51, 0x4f, 0xc9, 0x64, 0xde, 0x4d, 0xab, 0xf2, 0x9e, 0xbd, 0xa0, 0x60, 0x8c, 0x17, 0x09, 0xc7, 0x22, 0x44, 0xf8, 0xd8, 0x88, 0xcb, 0x0e, 0x55, 0x6d, 0x75, 0x82, 0x87, 0x56, 0xd1, 0x1c, 0x11, 0xbe, 0x77, 0x87, 0x60, 0x3b, 0xff, 0xc6, 0x71, 0x8a, 0xc5, 0x81, 0xeb, 0x84, 0xc8, 0x74, 0x3a, 0xd6, 0xab, 0x78, 0xa0, 0x21, 0xa6, 0xf5, 0x5b, 0x3a, 0xe0, 0x84, 0x5f, 0x18, 0x30, 0x7e, 0xa1, 0x8e, 0x77, 0x1e, 0x3c, 0x4e, 0x11, 0xb3, 0x12, 0xeb, 0x8e, 0x53, 0x00, 0x02, 0xc9, 0x5c, 0xdb, 0x51, 0x78, 0x55, 0xb1, 0x7e, 0xa9, 0x72, 0x6e, 0xc9, 0x60, 0x2f, 0x34, 0x7e, 0x78, 0x9f, 0xab, 0x42, 0x05, 0x5e, 0x68, 0x8a, 0x55, 0x8e, 0x3f, 0xc9, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2354 = { .name = "ecdsa_brainpoolp512r1_sha512_2354", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2354_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2354_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2354_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2355 for ECDSA, tcId is 235 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2355_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2355_msg[] = { 0x39, 0x38, 0x37, 0x36, 0x30, 0x32, 0x39, 0x36, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2355_sig[] = { 0x4e, 0x7f, 0x75, 0x68, 0x1d, 0xd7, 0xcb, 0x2e, 0xea, 0x02, 0x2e, 0x5b, 0x86, 0x32, 0x9b, 0x25, 0x30, 0x7c, 0x21, 0xb8, 0x28, 0xc7, 0x41, 0x69, 0x16, 0xcf, 0x1f, 0x59, 0x38, 0x07, 0x15, 0x19, 0xcb, 0x7d, 0xa6, 0x68, 0xec, 0x6b, 0xc2, 0x19, 0xe7, 0x2d, 0x35, 0x87, 0x32, 0xf1, 0xc7, 0x7a, 0xbf, 0xcc, 0x61, 0x06, 0x5a, 0xa3, 0x23, 0x94, 0x19, 0x08, 0x9f, 0xab, 0xef, 0xe3, 0x96, 0xdf, 0x4f, 0x9e, 0xc1, 0x96, 0xa7, 0x1c, 0x5c, 0x8e, 0xd8, 0x8d, 0x7f, 0xe1, 0xd0, 0x03, 0x8f, 0x37, 0x2a, 0xc6, 0x0b, 0xfa, 0x18, 0x0c, 0xee, 0x24, 0x98, 0xaa, 0x9c, 0x02, 0x48, 0x16, 0x6f, 0x17, 0x38, 0x23, 0x68, 0xfa, 0x2b, 0x3b, 0x8c, 0xe2, 0x9d, 0x50, 0xd7, 0xa2, 0x1e, 0x91, 0xa8, 0x3c, 0xa8, 0x8d, 0xb5, 0xd4, 0xef, 0xd0, 0x73, 0xf8, 0x21, 0xa8, 0xc5, 0xaa, 0x4d, 0x26, 0x67, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2355 = { .name = "ecdsa_brainpoolp512r1_sha512_2355", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2355_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2355_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2355_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2356 for ECDSA, tcId is 236 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2356_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2356_msg[] = { 0x32, 0x30, 0x32, 0x30, 0x34, 0x32, 0x39, 0x36, 0x35, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2356_sig[] = { 0xa0, 0xe1, 0xc2, 0xbb, 0x33, 0x20, 0x02, 0x54, 0xbe, 0xab, 0x5e, 0x73, 0x5c, 0x1a, 0x2c, 0x59, 0x0f, 0xc1, 0x18, 0x54, 0x03, 0x01, 0xad, 0xd7, 0xe5, 0x49, 0x17, 0x01, 0xd2, 0x2c, 0x71, 0x29, 0x3a, 0xdf, 0xed, 0xdf, 0x43, 0x08, 0x94, 0x0f, 0xd8, 0xa0, 0x66, 0x22, 0x2c, 0xcf, 0xb3, 0x80, 0x2e, 0xaf, 0xff, 0xe0, 0x3b, 0x21, 0x56, 0xc8, 0xe7, 0x9c, 0x32, 0x60, 0xd1, 0x80, 0xb3, 0xb8, 0x9d, 0x84, 0x82, 0x12, 0x7f, 0x22, 0xec, 0xa1, 0x0b, 0x27, 0x92, 0x74, 0x7d, 0x60, 0x16, 0xba, 0x71, 0x99, 0x65, 0x60, 0x3e, 0xe8, 0xe7, 0x1f, 0x2a, 0x39, 0x50, 0x0a, 0x2f, 0x21, 0x1d, 0xcb, 0x2d, 0xa5, 0x82, 0xd5, 0xdb, 0xd0, 0xc6, 0xa4, 0x07, 0x15, 0x5e, 0x1b, 0x01, 0x08, 0x5b, 0x75, 0x9c, 0x80, 0x97, 0x1c, 0xf1, 0x85, 0xfd, 0x0a, 0x26, 0xe3, 0x88, 0x92, 0x63, 0xa7, 0xf2, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2356 = { .name = "ecdsa_brainpoolp512r1_sha512_2356", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2356_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2356_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2356_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2357 for ECDSA, tcId is 237 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2357_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2357_msg[] = { 0x31, 0x34, 0x35, 0x31, 0x36, 0x36, 0x39, 0x31, 0x38, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2357_sig[] = { 0x2e, 0xe9, 0xca, 0x54, 0xe2, 0xdf, 0x79, 0xd6, 0xe0, 0x6f, 0x13, 0x01, 0x89, 0xfa, 0xca, 0x80, 0x1c, 0xcb, 0x08, 0x1c, 0x43, 0x47, 0x2d, 0x4f, 0x88, 0x8a, 0xed, 0x89, 0x2d, 0xf8, 0x78, 0xd1, 0x2c, 0xa1, 0x4c, 0x8e, 0x80, 0x0f, 0xb7, 0xa7, 0x5c, 0x22, 0x90, 0xa0, 0x28, 0xfb, 0x7d, 0x12, 0x93, 0x64, 0x99, 0xc3, 0x01, 0x0b, 0xc5, 0xc7, 0xc0, 0x7b, 0x2f, 0x73, 0x89, 0x24, 0x76, 0x6e, 0x55, 0x8c, 0x02, 0xbc, 0xd1, 0x32, 0x90, 0xff, 0x34, 0xe0, 0x39, 0xa1, 0x99, 0x38, 0x43, 0x85, 0xa4, 0x4f, 0x97, 0xef, 0x9a, 0x7d, 0xcd, 0xaa, 0x0f, 0xac, 0xa6, 0x63, 0x57, 0xec, 0x7b, 0x9c, 0x1b, 0x40, 0xea, 0x7a, 0x35, 0x29, 0xf4, 0xbb, 0x79, 0x6f, 0xbd, 0xda, 0xdf, 0xbe, 0x64, 0xd3, 0xe6, 0xab, 0xfc, 0x54, 0xc2, 0x94, 0x6f, 0x5b, 0x1f, 0x54, 0x8f, 0xa0, 0x87, 0x7f, 0x3a, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2357 = { .name = "ecdsa_brainpoolp512r1_sha512_2357", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2357_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2357_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2357_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2358 for ECDSA, tcId is 238 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2358_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2358_msg[] = { 0x31, 0x30, 0x39, 0x33, 0x36, 0x38, 0x35, 0x39, 0x35, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2358_sig[] = { 0x54, 0xf4, 0x5f, 0x0b, 0xc3, 0x0a, 0x88, 0x9a, 0x4f, 0xae, 0x7e, 0xaa, 0x04, 0x7e, 0xa0, 0x2c, 0xa0, 0xb9, 0xe3, 0x87, 0xd6, 0x36, 0x78, 0x01, 0xf8, 0xbc, 0xce, 0xc2, 0xec, 0x7c, 0x0f, 0xf8, 0x9d, 0x66, 0x03, 0xd7, 0x0f, 0x7c, 0x8e, 0x05, 0x5e, 0x59, 0xfa, 0x69, 0x90, 0x5b, 0x18, 0x5f, 0xaa, 0xb4, 0x37, 0x77, 0x9d, 0x62, 0xc4, 0xd2, 0xee, 0xf4, 0xb1, 0x2a, 0x90, 0xc2, 0x0a, 0xb4, 0x43, 0xc2, 0xca, 0x32, 0x05, 0xa7, 0xf8, 0xb6, 0x1f, 0x64, 0x66, 0x1d, 0x0f, 0xe7, 0x46, 0xbd, 0x23, 0xfd, 0x0f, 0x26, 0x49, 0x99, 0x31, 0x0a, 0x56, 0xb3, 0x98, 0x04, 0x8a, 0xd4, 0x6f, 0xba, 0xb8, 0xa5, 0xe3, 0xb3, 0xe2, 0xe1, 0x6c, 0x4b, 0x2f, 0x03, 0xf1, 0x01, 0x57, 0x3e, 0x2f, 0x65, 0x93, 0xb6, 0x4a, 0xcc, 0xf3, 0x19, 0xdc, 0x9e, 0x2e, 0x2e, 0x84, 0x7b, 0x06, 0xfc, 0xdd, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2358 = { .name = "ecdsa_brainpoolp512r1_sha512_2358", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2358_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2358_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2358_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2359 for ECDSA, tcId is 239 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2359_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2359_msg[] = { 0x36, 0x32, 0x31, 0x39, 0x35, 0x36, 0x30, 0x32, 0x30, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2359_sig[] = { 0x8a, 0x03, 0x0f, 0xd4, 0xba, 0x48, 0xd3, 0xf5, 0x99, 0x80, 0x10, 0xc7, 0x64, 0xe8, 0x69, 0x21, 0x1a, 0x4c, 0xe3, 0x31, 0x22, 0xa7, 0xfd, 0xc7, 0xb8, 0xdf, 0x26, 0x76, 0x3b, 0xe1, 0x80, 0xf2, 0x5e, 0x06, 0x8d, 0xb6, 0xc9, 0x28, 0x20, 0xbe, 0x64, 0x1b, 0x8a, 0xfd, 0x17, 0x8a, 0x80, 0x33, 0x60, 0xbd, 0x19, 0x7a, 0x86, 0xcc, 0x8e, 0xf7, 0x6c, 0xa0, 0x08, 0x44, 0x3e, 0xc4, 0xad, 0x63, 0x80, 0x37, 0xc3, 0xa2, 0xc1, 0xca, 0xc2, 0x6e, 0x6f, 0xf8, 0x98, 0x94, 0xa0, 0x7b, 0x3e, 0x25, 0xf5, 0x13, 0x68, 0x0f, 0xc2, 0xe4, 0x6e, 0xd6, 0x93, 0xdf, 0x96, 0xd0, 0xee, 0x85, 0xb9, 0x40, 0x0c, 0xd6, 0x2d, 0x72, 0x3f, 0xc9, 0x8a, 0xdc, 0xa2, 0xa6, 0x79, 0xfa, 0xfe, 0xc9, 0xdb, 0x5f, 0xe0, 0x78, 0xf2, 0x5f, 0x98, 0x04, 0xe0, 0xd0, 0xce, 0x16, 0xd1, 0xa4, 0x32, 0xd1, 0x94, 0xff, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2359 = { .name = "ecdsa_brainpoolp512r1_sha512_2359", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2359_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2359_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2359_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2360 for ECDSA, tcId is 240 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2360_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2360_msg[] = { 0x35, 0x36, 0x38, 0x32, 0x34, 0x37, 0x34, 0x33, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2360_sig[] = { 0x3b, 0xbd, 0x19, 0x97, 0x80, 0x2b, 0x5f, 0xc5, 0xd4, 0xf2, 0xb8, 0x7b, 0x6c, 0xdd, 0xb9, 0x75, 0x29, 0xca, 0xc1, 0xba, 0x29, 0xdd, 0x29, 0xcf, 0xff, 0x73, 0x15, 0xb7, 0x87, 0x11, 0x6d, 0x9d, 0x3d, 0xab, 0xdd, 0xd1, 0xb4, 0x41, 0x49, 0x95, 0xc2, 0x26, 0x99, 0x06, 0xa7, 0xbc, 0x19, 0x59, 0xa0, 0x6d, 0xe5, 0xbc, 0xd4, 0xd5, 0x63, 0x04, 0x2e, 0x17, 0x41, 0xaf, 0x00, 0x9c, 0xba, 0x9f, 0x51, 0xb3, 0xd4, 0x35, 0xef, 0xe7, 0x95, 0x73, 0xac, 0xa8, 0xef, 0xd3, 0xcc, 0x1c, 0x8a, 0x22, 0x7e, 0xcd, 0x94, 0xeb, 0x40, 0x79, 0x67, 0x54, 0x59, 0xb6, 0xf4, 0xf1, 0x68, 0xb6, 0x11, 0x1c, 0x07, 0xc6, 0x33, 0xe6, 0x4e, 0x60, 0xd4, 0x3a, 0x5f, 0x3b, 0x0d, 0x0b, 0x2f, 0x43, 0x71, 0xf6, 0x8c, 0x7c, 0xde, 0xb6, 0xbd, 0x8f, 0xbb, 0xf3, 0xbe, 0xd2, 0xef, 0xfa, 0x25, 0x42, 0xb0, 0xae, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2360 = { .name = "ecdsa_brainpoolp512r1_sha512_2360", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2360_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2360_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2360_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2361 for ECDSA, tcId is 241 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2361_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2361_msg[] = { 0x33, 0x37, 0x33, 0x36, 0x35, 0x33, 0x31, 0x37, 0x38, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2361_sig[] = { 0x82, 0x93, 0xa5, 0x45, 0x97, 0x44, 0x30, 0xb3, 0xd7, 0xf7, 0xe3, 0x14, 0xab, 0x0e, 0xf4, 0x87, 0x31, 0x71, 0x5a, 0x5f, 0x79, 0xc2, 0xf3, 0x4b, 0x94, 0xf1, 0x20, 0xfc, 0x01, 0x70, 0x39, 0x71, 0x30, 0x29, 0x88, 0x03, 0x77, 0x8b, 0x53, 0x2f, 0xf1, 0x00, 0x20, 0xdb, 0x06, 0x0d, 0x19, 0xd9, 0x31, 0xd7, 0x48, 0x56, 0xfb, 0xf3, 0x30, 0xa7, 0x5b, 0x28, 0x41, 0x6d, 0x45, 0xaf, 0x54, 0xb6, 0x2b, 0x8d, 0xb4, 0x83, 0x08, 0xc0, 0xb1, 0xf6, 0x21, 0xe2, 0x2c, 0x7d, 0xc1, 0xe7, 0x62, 0xb0, 0x85, 0x08, 0xbe, 0x1a, 0x8e, 0xb4, 0x35, 0x5f, 0x6f, 0x9c, 0xcb, 0x84, 0x20, 0x85, 0xa1, 0xf6, 0x64, 0xd7, 0xb6, 0x8b, 0x1a, 0x24, 0xbd, 0x88, 0xf1, 0x7b, 0x16, 0xd1, 0x41, 0xb0, 0xc1, 0xc3, 0xa5, 0xd7, 0xf1, 0xa7, 0xef, 0x4d, 0x53, 0x3b, 0x90, 0x0d, 0x18, 0x53, 0xbc, 0x5a, 0x6f, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2361 = { .name = "ecdsa_brainpoolp512r1_sha512_2361", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2361_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2361_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2361_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2362 for ECDSA, tcId is 242 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2362_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2362_msg[] = { 0x34, 0x37, 0x39, 0x35, 0x39, 0x30, 0x33, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2362_sig[] = { 0x52, 0x59, 0x40, 0xc2, 0x17, 0x98, 0x6b, 0x7e, 0xf0, 0xe1, 0x8c, 0x81, 0xfe, 0x10, 0x06, 0x3d, 0x65, 0xdb, 0xe1, 0x80, 0x9d, 0x72, 0x6c, 0x8a, 0x1a, 0xa0, 0xb6, 0x17, 0xf3, 0x34, 0x89, 0x1e, 0x94, 0xc5, 0xdf, 0x14, 0xf7, 0xb9, 0x44, 0xa1, 0x63, 0x99, 0x50, 0xa4, 0x3e, 0x98, 0xeb, 0x6f, 0x1c, 0x34, 0x91, 0x21, 0xd1, 0x07, 0xf9, 0x1c, 0xa7, 0x14, 0x2b, 0x7f, 0xf6, 0x2e, 0xc7, 0x76, 0x6b, 0x35, 0x67, 0xe4, 0x96, 0x5f, 0x2d, 0x76, 0x6f, 0xd0, 0x72, 0x80, 0xf3, 0x1f, 0x8c, 0x77, 0x92, 0x12, 0x65, 0xf0, 0x0e, 0x71, 0x9c, 0x7c, 0x00, 0x55, 0xe5, 0x1c, 0x85, 0xe1, 0xf3, 0xd4, 0x6a, 0xc9, 0x39, 0x67, 0x81, 0x61, 0x30, 0xa6, 0x53, 0x2c, 0x90, 0x25, 0x43, 0xa5, 0x30, 0xe2, 0x7b, 0x41, 0x97, 0xcf, 0xd1, 0x47, 0x8c, 0x90, 0xce, 0x1f, 0xc7, 0x41, 0x24, 0x63, 0x6b, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2362 = { .name = "ecdsa_brainpoolp512r1_sha512_2362", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2362_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2362_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2362_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2363 for ECDSA, tcId is 243 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2363_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2363_msg[] = { 0x39, 0x33, 0x39, 0x39, 0x36, 0x31, 0x31, 0x30, 0x30, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2363_sig[] = { 0x20, 0x5c, 0xae, 0xf7, 0x8b, 0x7f, 0x03, 0x00, 0x26, 0x61, 0x08, 0xdd, 0xf4, 0xe2, 0x8b, 0x6e, 0xc1, 0xa2, 0x19, 0x8b, 0x85, 0x7f, 0x92, 0xb2, 0xdf, 0x58, 0xa6, 0xd9, 0x68, 0xd3, 0xdb, 0x3e, 0xf6, 0x46, 0x9f, 0x7a, 0xfc, 0x20, 0xc6, 0x32, 0x21, 0x9a, 0xc4, 0x31, 0x39, 0xea, 0x08, 0x47, 0x6e, 0x16, 0x58, 0xad, 0x14, 0x5c, 0xe8, 0xe3, 0x97, 0x3c, 0x67, 0x4b, 0xa8, 0x17, 0x3e, 0xfc, 0x4a, 0x7a, 0x53, 0x20, 0xe5, 0xe2, 0x49, 0xc3, 0xff, 0x54, 0xcf, 0x90, 0x3b, 0xac, 0xe8, 0x6f, 0x39, 0xb6, 0x20, 0xac, 0xc1, 0x90, 0x07, 0x41, 0x3c, 0xd1, 0x3a, 0x2d, 0xf0, 0xa1, 0xf5, 0x98, 0x4e, 0x7a, 0x4d, 0x18, 0xcd, 0x8d, 0x12, 0x97, 0x56, 0x02, 0x95, 0xd4, 0x18, 0x3a, 0xf1, 0x85, 0x7b, 0xd8, 0xe6, 0xe3, 0x38, 0xaa, 0x37, 0x99, 0xca, 0x15, 0x50, 0x63, 0x5e, 0x4a, 0xe0, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2363 = { .name = "ecdsa_brainpoolp512r1_sha512_2363", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2363_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2363_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2363_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2364 for ECDSA, tcId is 244 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2364_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2364_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x34, 0x39, 0x31, 0x31, 0x38, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2364_sig[] = { 0x89, 0xf6, 0xe2, 0xf3, 0x42, 0xb4, 0xbc, 0x2f, 0x00, 0x4f, 0xdc, 0x1d, 0x0e, 0x24, 0xa7, 0xd1, 0xd4, 0xcb, 0x6b, 0x00, 0x32, 0xb8, 0xfa, 0x2f, 0x50, 0xe3, 0xf9, 0x0f, 0x38, 0x80, 0x91, 0x8f, 0x31, 0xaa, 0xfd, 0x50, 0x22, 0xff, 0x74, 0xbb, 0xe1, 0xcc, 0x64, 0xfe, 0xba, 0xbb, 0x3b, 0xf3, 0x3a, 0x8e, 0x71, 0x4f, 0x59, 0x7d, 0xdb, 0x0b, 0xe8, 0x06, 0x7d, 0x8a, 0x09, 0x64, 0xdf, 0xe1, 0x3a, 0xd6, 0x7d, 0xd5, 0x53, 0x64, 0xc2, 0x9d, 0x4a, 0x5b, 0x44, 0x6c, 0x64, 0x6f, 0x30, 0xbc, 0x5e, 0x64, 0x8a, 0x88, 0x9a, 0xc7, 0xb1, 0xbe, 0xe4, 0x9b, 0x71, 0x91, 0x8c, 0x32, 0x55, 0x4d, 0x0d, 0x95, 0xd5, 0xa5, 0x7e, 0xf5, 0xe7, 0xf4, 0xb2, 0x67, 0x04, 0x2f, 0xa3, 0x02, 0x5f, 0x13, 0x23, 0xbd, 0x7d, 0xbd, 0x1d, 0x60, 0xc4, 0x4e, 0x32, 0x5d, 0x4f, 0x78, 0xc6, 0x5a, 0x4a, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2364 = { .name = "ecdsa_brainpoolp512r1_sha512_2364", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2364_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2364_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2364_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2365 for ECDSA, tcId is 245 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2365_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2365_msg[] = { 0x33, 0x32, 0x33, 0x36, 0x36, 0x37, 0x38, 0x35, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2365_sig[] = { 0x2f, 0x30, 0x52, 0x55, 0x0c, 0x59, 0x5e, 0xd8, 0x92, 0x0a, 0x79, 0x94, 0xb4, 0xad, 0xb7, 0x8b, 0x8f, 0x75, 0x02, 0xfc, 0x06, 0x6a, 0xc4, 0x7a, 0xb4, 0xff, 0xbe, 0x01, 0x0d, 0x4a, 0x5e, 0x3e, 0x54, 0x54, 0x52, 0x79, 0xa7, 0x47, 0xd2, 0x9c, 0x61, 0xc7, 0xd2, 0x85, 0x6b, 0x8e, 0x47, 0xd0, 0x04, 0x0e, 0x07, 0x13, 0xbd, 0xe5, 0x0e, 0x42, 0xe0, 0x38, 0xdf, 0xd5, 0xaf, 0x61, 0xe8, 0x91, 0x54, 0xf8, 0xc5, 0x88, 0x93, 0xf1, 0x9f, 0xbc, 0xf0, 0x10, 0xd2, 0x27, 0x01, 0x7b, 0x88, 0xa4, 0x9c, 0xb6, 0xfd, 0x1e, 0xe6, 0xab, 0x88, 0x3d, 0x21, 0xcb, 0x58, 0xfc, 0x08, 0x69, 0xc3, 0x7e, 0xd7, 0x3c, 0x73, 0x12, 0xc6, 0x7f, 0x5a, 0xc1, 0x9b, 0xf5, 0xbf, 0x0a, 0xbe, 0x4b, 0xc8, 0x36, 0xee, 0x35, 0xb2, 0xa2, 0xc8, 0x05, 0xc3, 0x95, 0x3c, 0x48, 0xe7, 0x9a, 0xb8, 0x66, 0x5a, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2365 = { .name = "ecdsa_brainpoolp512r1_sha512_2365", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2365_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2365_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2365_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2366 for ECDSA, tcId is 246 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2366_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2366_msg[] = { 0x31, 0x34, 0x34, 0x38, 0x39, 0x39, 0x37, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2366_sig[] = { 0x8e, 0x36, 0x69, 0x55, 0xff, 0xb2, 0xa7, 0xfb, 0xc8, 0x36, 0x44, 0x14, 0x92, 0xf7, 0x4c, 0xae, 0x45, 0x52, 0xfb, 0x0d, 0x24, 0x96, 0xcf, 0xe7, 0xd8, 0xc4, 0x4b, 0x94, 0x20, 0x29, 0x09, 0x47, 0xe2, 0x9b, 0xf8, 0xa8, 0x82, 0x65, 0xe2, 0xc6, 0xcf, 0xc3, 0x7d, 0x29, 0xd2, 0xbb, 0xbd, 0x3d, 0x10, 0x51, 0x3e, 0x08, 0x95, 0xe7, 0x35, 0x51, 0xe2, 0xd7, 0xfa, 0x80, 0xd0, 0x69, 0x71, 0x06, 0x63, 0x11, 0x52, 0x81, 0x52, 0xbc, 0xf6, 0x12, 0x17, 0x33, 0x86, 0x7b, 0x61, 0xfc, 0x52, 0x3e, 0x7f, 0x01, 0xbd, 0x15, 0x00, 0x99, 0x84, 0xea, 0x30, 0xb1, 0x7e, 0xc1, 0x5b, 0x82, 0x40, 0xc1, 0x3f, 0x1a, 0xd1, 0x37, 0xdf, 0x37, 0xde, 0x4a, 0x32, 0xf6, 0xe3, 0xb9, 0x3b, 0xc1, 0x90, 0x95, 0x9d, 0xe1, 0x7a, 0x1b, 0xa3, 0xfe, 0x71, 0xb0, 0x3e, 0x97, 0x54, 0x1c, 0x90, 0xa8, 0x49, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2366 = { .name = "ecdsa_brainpoolp512r1_sha512_2366", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2366_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2366_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2366_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2367 for ECDSA, tcId is 247 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2367_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2367_msg[] = { 0x35, 0x37, 0x31, 0x34, 0x36, 0x33, 0x32, 0x38, 0x30, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2367_sig[] = { 0x38, 0xa4, 0x9f, 0x5f, 0x88, 0xf9, 0x9e, 0x64, 0x07, 0x4f, 0x02, 0x81, 0xec, 0xfa, 0xb9, 0xb8, 0xbf, 0x02, 0x09, 0x2d, 0xbc, 0x11, 0xb8, 0x70, 0x41, 0xbf, 0xb5, 0x61, 0xb4, 0xb3, 0xcf, 0x29, 0x94, 0x5a, 0xb5, 0xd9, 0xdc, 0x45, 0xf1, 0xed, 0xf4, 0x16, 0x06, 0xef, 0x6d, 0x22, 0x04, 0xba, 0xdb, 0x67, 0x61, 0x15, 0x84, 0xb8, 0x92, 0x99, 0x3d, 0xe2, 0x7e, 0x8f, 0x64, 0x02, 0xcd, 0x9a, 0x97, 0xe2, 0xda, 0x75, 0x8a, 0x8e, 0x37, 0x7a, 0x7d, 0x68, 0x2f, 0x50, 0xb0, 0xe3, 0x0f, 0x69, 0x5a, 0x6f, 0x6c, 0x53, 0xe6, 0x71, 0x42, 0x43, 0xaa, 0x9d, 0x53, 0x3b, 0x4a, 0x9b, 0x98, 0x77, 0xd5, 0xd5, 0x0a, 0xf3, 0xe7, 0xa4, 0xf1, 0xfe, 0x60, 0x77, 0xc7, 0xea, 0x70, 0x4b, 0x91, 0x8c, 0x59, 0x95, 0x00, 0xaf, 0xb8, 0x4d, 0x0b, 0xa0, 0x16, 0x82, 0x8a, 0xa2, 0xe6, 0xfd, 0x13, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2367 = { .name = "ecdsa_brainpoolp512r1_sha512_2367", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2367_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2367_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2367_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2368 for ECDSA, tcId is 248 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2368_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2368_msg[] = { 0x32, 0x32, 0x36, 0x34, 0x38, 0x37, 0x34, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2368_sig[] = { 0x6d, 0xe2, 0x9d, 0x0b, 0x50, 0x95, 0x0a, 0x64, 0x09, 0xd2, 0x9d, 0x25, 0x83, 0xe6, 0xc2, 0xd7, 0x73, 0x89, 0x74, 0x0e, 0xd0, 0xbe, 0x4e, 0xbb, 0xd4, 0x57, 0x1e, 0x82, 0xb5, 0x30, 0x3c, 0xa2, 0x70, 0x87, 0xce, 0x13, 0x27, 0x83, 0x2e, 0x99, 0x91, 0xcb, 0xf7, 0x33, 0x08, 0xa1, 0xba, 0xed, 0xf9, 0x7d, 0x1f, 0x3a, 0xf9, 0xed, 0xf3, 0x5e, 0x27, 0xc1, 0x5a, 0x0c, 0xc0, 0x03, 0xd6, 0xaa, 0x9a, 0x19, 0xf3, 0x3f, 0xf3, 0xa8, 0x8e, 0xd3, 0x03, 0xff, 0xf9, 0x05, 0x35, 0xaa, 0x16, 0x05, 0xbb, 0xdc, 0x00, 0x6b, 0x80, 0x3a, 0x80, 0x4e, 0xb1, 0xdf, 0x09, 0x2b, 0x5a, 0xeb, 0x9d, 0xb1, 0xbe, 0x0c, 0xb9, 0xb6, 0x76, 0x69, 0x45, 0x03, 0xe3, 0x6d, 0x2c, 0xd3, 0x86, 0x8d, 0xb0, 0xc3, 0x48, 0x96, 0xc9, 0x4c, 0xdd, 0xab, 0xd5, 0x4e, 0xc9, 0x5f, 0xfe, 0xb6, 0x98, 0x8a, 0x7f, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2368 = { .name = "ecdsa_brainpoolp512r1_sha512_2368", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2368_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2368_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2368_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2369 for ECDSA, tcId is 249 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2369_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2369_msg[] = { 0x35, 0x33, 0x35, 0x33, 0x34, 0x34, 0x39, 0x34, 0x37, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2369_sig[] = { 0x17, 0x0f, 0x01, 0xe9, 0x2b, 0x69, 0xcb, 0xf0, 0xd3, 0xd9, 0xe4, 0xa5, 0x74, 0x01, 0x63, 0xd7, 0xeb, 0xaf, 0xa7, 0xbb, 0x8d, 0x38, 0x35, 0x03, 0x9f, 0x14, 0x0d, 0x07, 0x5e, 0x95, 0x0d, 0xd5, 0x7d, 0xfd, 0xf1, 0xb7, 0xb8, 0xd1, 0x67, 0x85, 0x48, 0x44, 0x64, 0x10, 0x46, 0x8c, 0xf2, 0x89, 0x8e, 0x13, 0x0c, 0x74, 0x5e, 0x07, 0xdd, 0xff, 0x92, 0x1c, 0x55, 0x42, 0x19, 0x1c, 0xae, 0xfa, 0xa7, 0xb5, 0xd9, 0x28, 0xbe, 0x42, 0x79, 0x9a, 0x55, 0xb0, 0x5e, 0x15, 0x75, 0x8a, 0x1a, 0xff, 0x02, 0x77, 0x5a, 0xf9, 0xed, 0xc2, 0x14, 0x21, 0x4c, 0xa8, 0x9f, 0x73, 0xad, 0x12, 0x01, 0x7d, 0x67, 0x2e, 0x59, 0xcd, 0x6a, 0xa5, 0x4f, 0x18, 0xf2, 0x70, 0xe0, 0x1a, 0xb4, 0xdb, 0xbb, 0x2f, 0x74, 0x8c, 0x87, 0xcb, 0xc2, 0xac, 0x90, 0x81, 0xdf, 0x2e, 0x76, 0x52, 0x4d, 0xa1, 0x77, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2369 = { .name = "ecdsa_brainpoolp512r1_sha512_2369", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2369_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2369_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2369_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2370 for ECDSA, tcId is 250 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2370_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2370_msg[] = { 0x34, 0x37, 0x38, 0x37, 0x33, 0x30, 0x33, 0x38, 0x38, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2370_sig[] = { 0x8b, 0xc0, 0x89, 0xbc, 0xcd, 0xd8, 0x84, 0x3c, 0x06, 0xd5, 0xa7, 0x9e, 0x38, 0x6c, 0x51, 0x3a, 0xf5, 0x19, 0x31, 0x66, 0x0d, 0xb8, 0xb8, 0x88, 0xbc, 0xe5, 0xb5, 0xbd, 0xdb, 0xbe, 0x4c, 0x73, 0x95, 0x6a, 0x9a, 0xcb, 0xc3, 0x2e, 0x1c, 0xea, 0xa5, 0x05, 0x3f, 0xc3, 0x93, 0x08, 0xdd, 0x64, 0x51, 0xe6, 0xe4, 0x03, 0xca, 0x57, 0x43, 0x10, 0x66, 0x70, 0x93, 0xc6, 0xd7, 0x89, 0xb9, 0x80, 0x41, 0x7c, 0x96, 0x6d, 0xc3, 0x6d, 0xba, 0x5c, 0x13, 0xd9, 0x67, 0x01, 0x94, 0x6c, 0x86, 0xa0, 0x68, 0x38, 0x05, 0x69, 0x2f, 0x24, 0xc0, 0x12, 0xb1, 0xa7, 0xd5, 0x71, 0x40, 0x5e, 0xfd, 0x85, 0x0a, 0x99, 0x70, 0x65, 0xb1, 0x9d, 0x35, 0x62, 0x1b, 0xb4, 0xb3, 0x9c, 0x76, 0x49, 0x33, 0x84, 0x9f, 0xf7, 0xd8, 0xb8, 0xf7, 0xdf, 0x9f, 0xc5, 0x04, 0x8b, 0x59, 0x8e, 0xc1, 0xfa, 0xee, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2370 = { .name = "ecdsa_brainpoolp512r1_sha512_2370", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2370_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2370_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2370_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2371 for ECDSA, tcId is 251 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2371_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2371_msg[] = { 0x32, 0x32, 0x33, 0x32, 0x31, 0x39, 0x35, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2371_sig[] = { 0x8f, 0xab, 0xc9, 0x39, 0xe7, 0xa6, 0xc1, 0x3a, 0xc6, 0x9c, 0xdd, 0x47, 0xf9, 0x96, 0x24, 0x8b, 0xfe, 0xbe, 0x3f, 0x8e, 0x80, 0xde, 0xaf, 0x9c, 0x35, 0xe5, 0xa5, 0xcd, 0xca, 0x08, 0x6f, 0x9f, 0x81, 0x66, 0x1a, 0x1a, 0x41, 0xf6, 0x9e, 0x35, 0x95, 0xb0, 0x55, 0xa5, 0x14, 0xd5, 0x7e, 0xfb, 0x2e, 0xaf, 0x5c, 0x15, 0x25, 0xdc, 0xcf, 0x21, 0x73, 0x6d, 0x2b, 0xbe, 0x89, 0xa5, 0x66, 0x8c, 0xa8, 0xf9, 0xb1, 0x71, 0xb3, 0xd3, 0x38, 0x98, 0xcf, 0x7e, 0xac, 0xe3, 0x5d, 0xad, 0x6c, 0x3f, 0xdb, 0x99, 0x8f, 0xc4, 0x09, 0xfd, 0xb7, 0x08, 0x33, 0x8f, 0x20, 0xc9, 0xe4, 0xb8, 0x29, 0x7b, 0x37, 0x54, 0x85, 0xa5, 0xe8, 0x7e, 0xae, 0x6f, 0xe6, 0x8b, 0x11, 0x39, 0xb1, 0xfb, 0x4a, 0x3b, 0xfa, 0x25, 0x0f, 0x47, 0x04, 0x5f, 0x12, 0xa5, 0xfa, 0xe9, 0x45, 0xa2, 0xab, 0xe7, 0x0c, 0x50, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2371 = { .name = "ecdsa_brainpoolp512r1_sha512_2371", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2371_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2371_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2371_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2372 for ECDSA, tcId is 252 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2372_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2372_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x39, 0x33, 0x39, 0x31, 0x39, 0x31, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2372_sig[] = { 0x26, 0xf4, 0x05, 0xc9, 0xcf, 0x5a, 0xfb, 0x29, 0xe3, 0xf6, 0x0d, 0xe6, 0x72, 0xe2, 0x50, 0x16, 0xd3, 0x96, 0x66, 0xf6, 0xb3, 0x4a, 0xf5, 0x4b, 0x74, 0x56, 0x2d, 0x4c, 0xa9, 0xe0, 0x3d, 0xd8, 0x7e, 0x2b, 0xf0, 0x20, 0x18, 0x9e, 0x5d, 0x2f, 0xae, 0xa5, 0xbf, 0xba, 0xe2, 0x1a, 0xde, 0xce, 0x9f, 0x21, 0x0b, 0xcb, 0x02, 0xa7, 0x55, 0x8d, 0xad, 0x1b, 0x73, 0xd7, 0x8b, 0x05, 0x32, 0xf8, 0x2b, 0x4b, 0x0c, 0x35, 0x05, 0x7b, 0x95, 0x24, 0xe8, 0x66, 0x62, 0x5e, 0x7d, 0xf8, 0x20, 0xe1, 0x5c, 0x86, 0xc2, 0xef, 0xdc, 0x1c, 0xd6, 0xc4, 0xc3, 0xcd, 0x4e, 0x6e, 0xff, 0x5d, 0x57, 0x58, 0xbd, 0x7f, 0x95, 0xb8, 0xf7, 0x7e, 0x10, 0x16, 0x3f, 0xf6, 0x5b, 0x38, 0x0e, 0xff, 0x97, 0x0c, 0xaa, 0xa7, 0xed, 0x3b, 0xd0, 0xa1, 0x21, 0xd3, 0xbb, 0xff, 0x3b, 0x6e, 0x7a, 0x26, 0x1b, 0x75, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2372 = { .name = "ecdsa_brainpoolp512r1_sha512_2372", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2372_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2372_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2372_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2373 for ECDSA, tcId is 253 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2373_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2373_msg[] = { 0x31, 0x38, 0x38, 0x31, 0x30, 0x32, 0x37, 0x33, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2373_sig[] = { 0x36, 0xc5, 0xc4, 0x72, 0x0d, 0x10, 0xa4, 0x55, 0xf4, 0x95, 0x2a, 0x95, 0x87, 0x2c, 0xc6, 0x9e, 0x5c, 0x48, 0xe9, 0x68, 0x9a, 0x6e, 0xa6, 0xe3, 0xe2, 0x82, 0xc9, 0xcb, 0xa5, 0x8b, 0x01, 0xfa, 0x3c, 0xf6, 0x4c, 0x9c, 0x99, 0xa6, 0x00, 0x3d, 0x42, 0x48, 0x95, 0xb9, 0x96, 0xe2, 0x60, 0x72, 0xab, 0x6e, 0x76, 0xb2, 0x9d, 0x1c, 0xf1, 0xda, 0xbc, 0x2b, 0x27, 0x68, 0x02, 0x35, 0x8a, 0xd6, 0x81, 0xa9, 0xe6, 0xb7, 0x9f, 0x80, 0x55, 0xe2, 0xbd, 0xe4, 0x36, 0x5e, 0xac, 0x15, 0x3d, 0xf4, 0x00, 0x3d, 0x48, 0x7b, 0x58, 0x9a, 0xd3, 0x30, 0x6d, 0x4a, 0x49, 0x38, 0x7d, 0x24, 0x4a, 0xbc, 0xda, 0xa0, 0x9c, 0x1b, 0x63, 0xf0, 0x87, 0x7b, 0x15, 0x46, 0x8f, 0xe3, 0xe1, 0x4d, 0xcf, 0x4c, 0xb6, 0x34, 0x00, 0xa9, 0x9f, 0xae, 0x7d, 0xce, 0x5f, 0xe9, 0x46, 0x54, 0x8e, 0x64, 0xab, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2373 = { .name = "ecdsa_brainpoolp512r1_sha512_2373", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2373_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2373_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2373_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2374 for ECDSA, tcId is 254 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2374_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2374_msg[] = { 0x36, 0x30, 0x36, 0x31, 0x36, 0x39, 0x33, 0x39, 0x30, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2374_sig[] = { 0x6e, 0x68, 0x46, 0x11, 0x32, 0x7c, 0xfc, 0xd9, 0xd4, 0x0e, 0x52, 0x52, 0xab, 0xd3, 0xd4, 0x8f, 0xb7, 0x35, 0x88, 0x59, 0x70, 0xe9, 0xb3, 0xba, 0x3f, 0x55, 0xa1, 0x0b, 0x38, 0x78, 0x98, 0x5c, 0x54, 0x8f, 0x0c, 0x52, 0x44, 0x61, 0x96, 0x76, 0xa0, 0xe5, 0xc4, 0x4b, 0x4c, 0x9b, 0x1c, 0xcc, 0x1a, 0x20, 0xac, 0xce, 0x42, 0xe5, 0x0d, 0x4d, 0x1a, 0xee, 0xcb, 0x4a, 0xa6, 0xd8, 0x7a, 0xe5, 0x77, 0x49, 0xfd, 0x22, 0x82, 0x93, 0xae, 0x52, 0x7e, 0x3d, 0x30, 0xde, 0x8f, 0x6f, 0xae, 0x99, 0x15, 0x1e, 0x38, 0x32, 0x9a, 0x10, 0x94, 0xc9, 0x2b, 0x34, 0x72, 0x09, 0xa4, 0xf7, 0xb6, 0x94, 0x74, 0xac, 0x90, 0xf2, 0x1d, 0x56, 0xc6, 0x25, 0xf1, 0xc7, 0x6a, 0xb9, 0x1b, 0x4c, 0x3d, 0x12, 0xa2, 0xbf, 0x4b, 0xa2, 0x82, 0x6c, 0xf0, 0x0a, 0xdf, 0xba, 0x75, 0x36, 0x8e, 0xf5, 0x0c, 0x24, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2374 = { .name = "ecdsa_brainpoolp512r1_sha512_2374", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2374_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2374_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2374_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2375 for ECDSA, tcId is 255 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2375_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2375_msg[] = { 0x38, 0x38, 0x39, 0x35, 0x32, 0x32, 0x37, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2375_sig[] = { 0x88, 0x7f, 0xe5, 0x33, 0x94, 0x54, 0x5f, 0x10, 0x7a, 0x27, 0x86, 0x7d, 0xf0, 0x2f, 0xbc, 0x1f, 0x59, 0x86, 0x58, 0x5a, 0x42, 0xb5, 0x21, 0x95, 0x24, 0x3a, 0x0f, 0xb7, 0xd1, 0xe7, 0x00, 0xbc, 0xab, 0xed, 0x30, 0x1c, 0xaf, 0xf3, 0xad, 0x8c, 0x2a, 0xf2, 0x34, 0x97, 0xb2, 0xac, 0x02, 0x7f, 0xc1, 0x86, 0xb8, 0xaa, 0xf4, 0xe6, 0x51, 0x2b, 0xf5, 0xbe, 0xa5, 0xa3, 0x57, 0xad, 0x83, 0xfa, 0xa9, 0x23, 0xa3, 0xb4, 0xaf, 0xe3, 0x0e, 0xae, 0x49, 0xb0, 0x18, 0x76, 0x6d, 0xa2, 0x91, 0x3c, 0x66, 0x47, 0xd7, 0x38, 0x41, 0x78, 0xf6, 0x56, 0xd4, 0x0d, 0x01, 0x0f, 0xe1, 0x14, 0x7d, 0x78, 0x6e, 0xe5, 0x09, 0x32, 0x28, 0x6c, 0x81, 0x3e, 0xa4, 0x0e, 0x5c, 0x11, 0x55, 0x5f, 0x6b, 0x8d, 0x8a, 0x6f, 0x82, 0x75, 0x14, 0x5c, 0xb9, 0x4c, 0xc0, 0x41, 0xf1, 0xcd, 0xfc, 0xdf, 0xdd, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2375 = { .name = "ecdsa_brainpoolp512r1_sha512_2375", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2375_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2375_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2375_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2376 for ECDSA, tcId is 256 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2376_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2376_msg[] = { 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, 0x34, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2376_sig[] = { 0x68, 0xd9, 0xfb, 0x18, 0x1a, 0x84, 0x50, 0xae, 0x37, 0x7d, 0xc7, 0x50, 0xf3, 0xbf, 0xbf, 0x82, 0xcb, 0xc3, 0x93, 0x47, 0xcf, 0x5d, 0x25, 0x26, 0xbc, 0xb6, 0xc3, 0xf6, 0x34, 0x3a, 0x74, 0x51, 0x06, 0x5c, 0xb4, 0xa7, 0xb2, 0xc0, 0xed, 0x3d, 0x68, 0xce, 0x32, 0x0d, 0x9a, 0x9c, 0x35, 0xc9, 0x66, 0xc0, 0x5b, 0xbf, 0x45, 0xb1, 0xac, 0xd2, 0xcf, 0xea, 0xb3, 0x3b, 0x7b, 0xbf, 0x17, 0x6d, 0x85, 0x38, 0x46, 0x9e, 0x63, 0x19, 0x60, 0xf5, 0xe1, 0x3f, 0x6a, 0x3c, 0xdb, 0xd5, 0xcf, 0x6e, 0x89, 0x3d, 0x0b, 0x15, 0x4f, 0x43, 0x03, 0x2b, 0x1b, 0xdc, 0xdb, 0xe2, 0xc5, 0xff, 0x53, 0x38, 0xcf, 0xf5, 0x22, 0x3a, 0x1f, 0x0e, 0xae, 0x7c, 0xa3, 0xed, 0x39, 0x23, 0x22, 0x19, 0xc8, 0x48, 0xfa, 0x75, 0xb0, 0xaa, 0x18, 0xe3, 0x18, 0xc0, 0x6a, 0xbe, 0x47, 0x47, 0x30, 0xe2, 0x6e, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2376 = { .name = "ecdsa_brainpoolp512r1_sha512_2376", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2376_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2376_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2376_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2377 for ECDSA, tcId is 257 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2377_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2377_msg[] = { 0x33, 0x39, 0x36, 0x35, 0x39, 0x39, 0x31, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2377_sig[] = { 0x0d, 0x0d, 0x1e, 0xb2, 0x12, 0x5e, 0xaf, 0xaa, 0xa4, 0x7d, 0x2e, 0x30, 0xe0, 0x65, 0x0b, 0xc7, 0xe5, 0xc9, 0x9f, 0x4f, 0xb5, 0xbe, 0x14, 0x73, 0x70, 0x8d, 0x19, 0xa9, 0x91, 0xf4, 0xcf, 0xd1, 0xfe, 0x31, 0x9c, 0xa7, 0x3e, 0xd1, 0xa8, 0xb5, 0x9d, 0x4c, 0x00, 0xb2, 0x2e, 0xe0, 0xcd, 0xa9, 0xbb, 0x2f, 0x00, 0xe7, 0x8f, 0x13, 0xbc, 0xbf, 0x37, 0x2e, 0xfc, 0x0a, 0x00, 0x3d, 0x2d, 0x1e, 0x87, 0x8e, 0x71, 0xc2, 0xf5, 0xd5, 0x3a, 0xc0, 0x7b, 0x2e, 0xa1, 0x34, 0x91, 0x10, 0xff, 0xac, 0x6d, 0xfd, 0xfa, 0x21, 0x52, 0xd3, 0xb9, 0xfb, 0x66, 0x2f, 0x6f, 0x9e, 0xf4, 0xe7, 0x60, 0xdf, 0xab, 0xdf, 0x81, 0xed, 0x69, 0x0e, 0x85, 0xd8, 0x0d, 0xb3, 0x21, 0x34, 0x81, 0xda, 0xbe, 0xf6, 0xda, 0xe1, 0x4b, 0x20, 0xc2, 0x5f, 0x6f, 0x56, 0xa3, 0x60, 0xec, 0x97, 0x62, 0x11, 0x4b, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2377 = { .name = "ecdsa_brainpoolp512r1_sha512_2377", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2377_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2377_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2377_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2378 for ECDSA, tcId is 258 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2378_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2378_msg[] = { 0x32, 0x32, 0x38, 0x38, 0x37, 0x33, 0x32, 0x31, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2378_sig[] = { 0x1c, 0x75, 0xcf, 0xcc, 0xa1, 0x16, 0x61, 0xbc, 0x91, 0x28, 0x9b, 0x25, 0x99, 0x0a, 0x2c, 0x83, 0x68, 0x69, 0xa2, 0xfb, 0x5b, 0xb6, 0x1a, 0x55, 0x30, 0xcf, 0x24, 0x89, 0x18, 0xdb, 0x45, 0x88, 0x32, 0x73, 0xd8, 0xd9, 0xd2, 0x4a, 0x49, 0x2d, 0xcc, 0xc4, 0x29, 0x48, 0x0e, 0xb9, 0xd8, 0x43, 0x54, 0x4d, 0xfb, 0x8b, 0xf9, 0x6e, 0xa7, 0x5f, 0x06, 0xe4, 0xca, 0xee, 0x91, 0xfc, 0x3c, 0x5e, 0x45, 0x7a, 0x98, 0xf6, 0x87, 0x0b, 0x4d, 0x13, 0x1f, 0x9f, 0x76, 0x92, 0x29, 0xcb, 0xe9, 0x3e, 0x97, 0x61, 0x43, 0x2c, 0xf4, 0xe2, 0x2a, 0xe0, 0xf4, 0xb3, 0x5c, 0x55, 0x12, 0x37, 0x70, 0x33, 0x67, 0x84, 0x06, 0x0b, 0x74, 0x7c, 0x34, 0xbc, 0xd3, 0xba, 0xd3, 0xf8, 0x97, 0x07, 0x18, 0xfa, 0x88, 0x77, 0x7b, 0x2b, 0x56, 0x5d, 0xa3, 0xf3, 0x24, 0x98, 0x28, 0x6a, 0xd0, 0x01, 0x53, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2378 = { .name = "ecdsa_brainpoolp512r1_sha512_2378", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2378_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2378_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2378_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2379 for ECDSA, tcId is 259 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2379_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2379_msg[] = { 0x32, 0x32, 0x33, 0x30, 0x38, 0x38, 0x37, 0x33, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2379_sig[] = { 0x96, 0xbc, 0x97, 0x87, 0xcc, 0x6d, 0x51, 0x2a, 0x2f, 0xda, 0x9b, 0x34, 0x98, 0xb0, 0x4b, 0x53, 0xf9, 0xc0, 0x3f, 0x40, 0x60, 0xab, 0x03, 0x82, 0xbe, 0x7c, 0xb7, 0x07, 0x78, 0x55, 0x19, 0x6e, 0x60, 0xe0, 0xd1, 0x50, 0xea, 0xaa, 0xe6, 0x09, 0x9a, 0xcb, 0x93, 0x41, 0xa1, 0x5d, 0x06, 0xc9, 0x47, 0x8a, 0xfc, 0x44, 0x50, 0x21, 0xa5, 0xef, 0x29, 0x8f, 0x14, 0x98, 0xbf, 0xfe, 0xbd, 0x9c, 0x8d, 0xb2, 0x6e, 0x51, 0xfb, 0xf0, 0xd7, 0xa5, 0xea, 0xbc, 0x67, 0xa7, 0xf7, 0xdd, 0x69, 0x8d, 0x16, 0xa9, 0x76, 0x43, 0x78, 0x4d, 0x49, 0xc7, 0xf2, 0x92, 0x48, 0x11, 0x14, 0xa0, 0x1c, 0x58, 0x1f, 0xdf, 0xc6, 0xf7, 0x79, 0xb1, 0xcb, 0xcc, 0xf5, 0xe8, 0xea, 0x59, 0x5c, 0x98, 0xb7, 0x60, 0xc3, 0xc5, 0xa1, 0x0f, 0xfe, 0x1e, 0x6e, 0x2c, 0xb1, 0x01, 0xe1, 0xa5, 0xc8, 0xa1, 0x4a, 0x44, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2379 = { .name = "ecdsa_brainpoolp512r1_sha512_2379", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2379_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2379_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2379_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2380 for ECDSA, tcId is 260 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2380_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2380_msg[] = { 0x31, 0x32, 0x39, 0x30, 0x35, 0x36, 0x39, 0x33, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2380_sig[] = { 0x06, 0xe2, 0x0f, 0x46, 0x8d, 0x6f, 0xce, 0x4b, 0x55, 0x71, 0xd6, 0xe1, 0x88, 0xf1, 0x0c, 0xea, 0x05, 0x54, 0x1d, 0x82, 0xc9, 0xf8, 0x17, 0x91, 0xd7, 0xe7, 0xb2, 0x71, 0x6d, 0x92, 0xdc, 0x57, 0x49, 0x40, 0x53, 0x71, 0x2b, 0x0b, 0x01, 0xb3, 0x46, 0xe5, 0x79, 0x72, 0x43, 0x32, 0x6d, 0xb9, 0x20, 0x28, 0xe8, 0x0f, 0x1d, 0x8e, 0x03, 0x82, 0xb1, 0xe6, 0x3c, 0x4d, 0x96, 0xda, 0xa9, 0xd9, 0x21, 0x55, 0xeb, 0x23, 0x64, 0x92, 0x6f, 0xc3, 0x47, 0x97, 0x92, 0x31, 0x25, 0x50, 0x3c, 0xda, 0xda, 0x99, 0x83, 0xe6, 0x25, 0x12, 0x73, 0xe5, 0xfe, 0x1e, 0x02, 0x98, 0xe6, 0x1e, 0x26, 0x85, 0x7d, 0xc4, 0x12, 0x19, 0x0c, 0x7e, 0x67, 0x77, 0x60, 0x56, 0x95, 0x00, 0xf8, 0x5a, 0xb2, 0x66, 0x5b, 0x6e, 0x88, 0x90, 0x1b, 0xe8, 0x61, 0xcf, 0xce, 0x3f, 0xa4, 0xe2, 0xbd, 0xa5, 0x54, 0x29, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2380 = { .name = "ecdsa_brainpoolp512r1_sha512_2380", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2380_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2380_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2380_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2381 for ECDSA, tcId is 261 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2381_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2381_msg[] = { 0x32, 0x37, 0x34, 0x38, 0x36, 0x35, 0x36, 0x34, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2381_sig[] = { 0x1e, 0x24, 0x80, 0xc5, 0x6b, 0xe7, 0x2a, 0x52, 0xfe, 0x00, 0x94, 0x5f, 0xd7, 0xc2, 0xfe, 0xef, 0xdd, 0x03, 0xbd, 0x71, 0x3b, 0xc3, 0xe3, 0xd6, 0xe6, 0xd4, 0x34, 0xd5, 0xa2, 0xa7, 0xa2, 0xc8, 0xe1, 0xb4, 0x7c, 0xb1, 0x42, 0x8b, 0x96, 0xf4, 0xd8, 0x58, 0x9d, 0x6e, 0xe5, 0xfb, 0x32, 0xdd, 0x7d, 0x0a, 0x76, 0x77, 0x90, 0xf8, 0x20, 0x9b, 0x5f, 0xd3, 0x41, 0x2c, 0x0d, 0x56, 0x25, 0x79, 0x3c, 0x05, 0x00, 0xf7, 0x53, 0x1d, 0xc5, 0xf0, 0x04, 0x0f, 0x0b, 0xb0, 0xf5, 0x33, 0xbc, 0x5b, 0xf3, 0x44, 0xfd, 0x1f, 0x32, 0x5a, 0x80, 0xc4, 0x20, 0x43, 0x5f, 0x93, 0xd3, 0xca, 0x7e, 0xee, 0xb1, 0x5b, 0x1a, 0x4f, 0x43, 0x91, 0x40, 0x8f, 0x16, 0x69, 0x71, 0xc9, 0xdd, 0xb7, 0x9b, 0xfb, 0x68, 0xf2, 0x3c, 0x69, 0x97, 0xc2, 0xae, 0x40, 0xd6, 0x6c, 0xd0, 0xf4, 0xfa, 0x71, 0x12, 0x17, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2381 = { .name = "ecdsa_brainpoolp512r1_sha512_2381", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2381_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2381_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2381_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2382 for ECDSA, tcId is 262 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2382_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2382_msg[] = { 0x37, 0x35, 0x38, 0x33, 0x35, 0x30, 0x32, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2382_sig[] = { 0x77, 0x4d, 0x85, 0x2a, 0x1d, 0xf9, 0xf3, 0xb5, 0x30, 0xdb, 0x4d, 0x03, 0x45, 0xc3, 0xf7, 0xc4, 0x13, 0xc8, 0xdc, 0x4d, 0xf1, 0xc1, 0x8f, 0x42, 0x89, 0xcb, 0xdf, 0x39, 0xde, 0x2d, 0x9e, 0xb8, 0xbd, 0x90, 0xca, 0x78, 0x03, 0xc2, 0xb3, 0xfe, 0x8a, 0x8e, 0xb9, 0xd8, 0x04, 0xdf, 0xcf, 0x0d, 0x0b, 0xc7, 0x92, 0x11, 0xac, 0x19, 0x9d, 0xa1, 0xc0, 0x9a, 0xbd, 0x80, 0xb0, 0xf2, 0x20, 0xf4, 0x70, 0xfd, 0x03, 0xa6, 0xfb, 0x63, 0x58, 0x2b, 0xc6, 0x41, 0x28, 0x75, 0x8c, 0xc8, 0xbf, 0xfc, 0xf5, 0xba, 0x0b, 0xf1, 0x54, 0xed, 0x42, 0x1b, 0x37, 0xe9, 0x59, 0x87, 0xd4, 0x64, 0x7e, 0xd7, 0xa3, 0xed, 0xe5, 0x15, 0x9a, 0xc1, 0x75, 0xf7, 0x37, 0x0a, 0x2e, 0x23, 0xff, 0xf6, 0x45, 0x10, 0x5c, 0x4e, 0x0d, 0x99, 0xdd, 0xd1, 0x48, 0x6a, 0xd6, 0xac, 0x5a, 0x83, 0x29, 0x03, 0xd5, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2382 = { .name = "ecdsa_brainpoolp512r1_sha512_2382", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2382_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2382_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2382_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2383 for ECDSA, tcId is 263 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2383_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2383_msg[] = { 0x32, 0x33, 0x32, 0x37, 0x37, 0x35, 0x34, 0x32, 0x37, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2383_sig[] = { 0x2e, 0x7f, 0x63, 0xda, 0x65, 0x7a, 0x65, 0x10, 0x52, 0x87, 0xc6, 0x44, 0xcb, 0xa0, 0x7b, 0x0f, 0x98, 0x6b, 0x4b, 0x2f, 0x3a, 0x18, 0xc0, 0x80, 0x9d, 0xcf, 0x8d, 0x8a, 0xc2, 0x16, 0x94, 0x50, 0xb2, 0x06, 0x7c, 0xc5, 0xe0, 0xac, 0x3d, 0x65, 0xe1, 0xea, 0xc6, 0x7f, 0x3c, 0xea, 0x3a, 0x62, 0xc7, 0x23, 0xee, 0xe0, 0x62, 0xd3, 0x07, 0x57, 0xdc, 0xaa, 0x9e, 0x92, 0x6e, 0xbf, 0xbd, 0x00, 0x61, 0xb2, 0x62, 0xa4, 0xaa, 0x85, 0x0b, 0xa1, 0x2e, 0x31, 0x76, 0x1d, 0xcb, 0xde, 0x8c, 0xc7, 0xc9, 0xab, 0xd4, 0x88, 0x52, 0xa7, 0x34, 0xb3, 0x8b, 0x26, 0xcb, 0xb1, 0x53, 0xa8, 0x02, 0x89, 0xc4, 0x78, 0x83, 0x89, 0xb1, 0x6b, 0xaf, 0x10, 0x1f, 0x6c, 0x5d, 0xa8, 0xee, 0xc6, 0xd5, 0x84, 0xd0, 0xba, 0x88, 0x3e, 0x53, 0xb6, 0xd7, 0xd2, 0xaf, 0xe3, 0x6d, 0xb8, 0x3e, 0xa9, 0x51, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2383 = { .name = "ecdsa_brainpoolp512r1_sha512_2383", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2383_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2383_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2383_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2384 for ECDSA, tcId is 264 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2384_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2384_msg[] = { 0x37, 0x37, 0x35, 0x35, 0x30, 0x38, 0x35, 0x38, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2384_sig[] = { 0x9b, 0x0b, 0xe1, 0xef, 0xf1, 0x1d, 0x16, 0xb6, 0xc4, 0x80, 0xa0, 0xe1, 0x7c, 0x5f, 0x34, 0x71, 0xea, 0xe4, 0xfc, 0xae, 0xff, 0x92, 0x48, 0x72, 0x09, 0xf0, 0xf2, 0x3c, 0x57, 0xa7, 0xdf, 0xab, 0xed, 0xe9, 0x75, 0x66, 0x98, 0xef, 0xc6, 0x25, 0xc7, 0x79, 0x35, 0x66, 0x7a, 0x51, 0x9e, 0x42, 0x06, 0x2e, 0x9d, 0x08, 0x78, 0x42, 0xc8, 0x3e, 0x08, 0xb9, 0x76, 0xd3, 0xb9, 0x6e, 0xa6, 0xdc, 0x9c, 0x9e, 0xf5, 0xe7, 0x76, 0x0a, 0x03, 0x6b, 0xc4, 0x0e, 0xc7, 0x10, 0xba, 0x88, 0xe9, 0xad, 0x6f, 0x8e, 0x06, 0x94, 0x8d, 0xfa, 0x77, 0xa2, 0x6c, 0xb8, 0xfd, 0x6c, 0x3b, 0x87, 0x11, 0x2d, 0xc0, 0xd0, 0xf6, 0xcc, 0xaf, 0xe0, 0x8f, 0xa5, 0xb6, 0x36, 0xf4, 0x29, 0xa0, 0x97, 0xaf, 0x39, 0xd5, 0x69, 0x43, 0x3c, 0x93, 0x3f, 0x90, 0x25, 0x16, 0xe8, 0x58, 0x71, 0xbe, 0xc3, 0x01, 0x07, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2384 = { .name = "ecdsa_brainpoolp512r1_sha512_2384", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2384_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2384_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2384_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2385 for ECDSA, tcId is 265 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2385_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2385_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x36, 0x34, 0x38, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2385_sig[] = { 0x73, 0x96, 0xb4, 0x96, 0x96, 0x31, 0x1d, 0x10, 0xda, 0x5c, 0x85, 0xa3, 0x32, 0x4b, 0xc0, 0x7b, 0x85, 0x5a, 0xde, 0xd9, 0xf5, 0x56, 0xfc, 0xef, 0x6b, 0x3a, 0x15, 0x7c, 0xcd, 0xee, 0xce, 0xdf, 0xaf, 0xeb, 0xfe, 0xc2, 0x7e, 0x9b, 0x76, 0x4a, 0xcc, 0x84, 0xf0, 0xab, 0x13, 0x7e, 0xe3, 0x01, 0x6d, 0xba, 0x85, 0xf4, 0x56, 0x4e, 0xb9, 0xb2, 0x20, 0x64, 0x1e, 0x73, 0x67, 0x1f, 0x85, 0x09, 0x34, 0xd8, 0x5e, 0xae, 0x9b, 0xfd, 0x43, 0x89, 0x0f, 0xcd, 0x2b, 0x05, 0x11, 0xae, 0xaa, 0x75, 0x34, 0xa4, 0x70, 0xd4, 0xa6, 0x10, 0xfd, 0x59, 0x2a, 0xcd, 0x0e, 0x01, 0x78, 0x4d, 0xc6, 0xbe, 0x4a, 0xb0, 0xfa, 0xe5, 0xea, 0x6f, 0xae, 0xb6, 0xc1, 0x7a, 0x5c, 0x2a, 0x84, 0xdc, 0x75, 0xb9, 0x1a, 0x05, 0x17, 0x35, 0x94, 0xf6, 0x21, 0x2f, 0x2a, 0xa2, 0x16, 0x0f, 0x22, 0x9b, 0xd0, 0x96, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2385 = { .name = "ecdsa_brainpoolp512r1_sha512_2385", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2385_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2385_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2385_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2386 for ECDSA, tcId is 266 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2386_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2386_msg[] = { 0x32, 0x33, 0x39, 0x36, 0x37, 0x37, 0x37, 0x33, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2386_sig[] = { 0x24, 0xdc, 0x7d, 0x0a, 0xa8, 0x9c, 0xa2, 0x2d, 0xce, 0xc2, 0x02, 0x48, 0xf6, 0x70, 0x6b, 0x62, 0x09, 0x58, 0x32, 0x36, 0xdb, 0xa3, 0xbc, 0x32, 0x6f, 0x29, 0x32, 0x1c, 0x5b, 0xef, 0x77, 0xdd, 0xf4, 0x96, 0x8e, 0x27, 0xab, 0x2d, 0xbf, 0x18, 0x82, 0xde, 0x29, 0x85, 0xe4, 0x90, 0x1c, 0x03, 0xdc, 0xe5, 0x39, 0xd0, 0xdf, 0x17, 0x16, 0x09, 0x7e, 0xa2, 0x07, 0xfa, 0xe6, 0xb6, 0x11, 0x40, 0x61, 0x68, 0xc1, 0x27, 0x7b, 0x7c, 0x88, 0x17, 0x66, 0xb7, 0x67, 0x08, 0x3d, 0xe4, 0xf4, 0xdf, 0x82, 0xaf, 0x8a, 0xc4, 0x07, 0x12, 0x22, 0x95, 0xec, 0xe5, 0x8f, 0xa4, 0x9c, 0xc0, 0x51, 0x30, 0x88, 0x48, 0xdc, 0x38, 0x06, 0x75, 0x80, 0x0a, 0x4a, 0x4d, 0xfd, 0x6b, 0x81, 0x32, 0x07, 0xd8, 0xd0, 0xe4, 0x22, 0xc2, 0x32, 0xf3, 0x0b, 0xdf, 0xf7, 0xdf, 0x7d, 0x89, 0xf4, 0x27, 0xc1, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2386 = { .name = "ecdsa_brainpoolp512r1_sha512_2386", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2386_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2386_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2386_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2387 for ECDSA, tcId is 267 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2387_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2387_msg[] = { 0x35, 0x39, 0x39, 0x38, 0x31, 0x30, 0x35, 0x38, 0x30, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2387_sig[] = { 0x2d, 0x47, 0xca, 0x2c, 0x03, 0xad, 0xbf, 0xf2, 0x84, 0x03, 0x1e, 0x2c, 0x63, 0x15, 0x83, 0x63, 0x97, 0xba, 0x34, 0xb7, 0x60, 0x50, 0x57, 0x52, 0x6b, 0x15, 0x9e, 0x69, 0x75, 0xee, 0x66, 0x0e, 0xc8, 0x09, 0xea, 0x15, 0xf5, 0x52, 0x08, 0x7b, 0x2a, 0xb5, 0xbd, 0x3f, 0x71, 0x8f, 0x8f, 0x82, 0xf9, 0xe9, 0xee, 0x47, 0xf1, 0x0c, 0x7e, 0x96, 0xcb, 0x06, 0xa5, 0xa7, 0xb4, 0xb0, 0x24, 0x7a, 0x3c, 0xb1, 0xf5, 0x68, 0x1e, 0x4b, 0xa1, 0xb0, 0x5b, 0x5c, 0x9a, 0x2c, 0x03, 0xf0, 0xd6, 0xbd, 0x83, 0x9a, 0xd5, 0xbc, 0xcf, 0x4b, 0xe2, 0xea, 0x08, 0x5b, 0x6d, 0xb5, 0x51, 0x60, 0x37, 0xcc, 0x5d, 0x36, 0xfa, 0xa8, 0x3c, 0x67, 0xa1, 0x7c, 0xf7, 0x3f, 0x8f, 0x75, 0xe5, 0x0c, 0xa3, 0x3f, 0xb7, 0x59, 0x1c, 0xf2, 0x4f, 0x95, 0x08, 0xa7, 0xee, 0xd6, 0x13, 0x14, 0xa4, 0x7d, 0x9e, 0x54, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2387 = { .name = "ecdsa_brainpoolp512r1_sha512_2387", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2387_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2387_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2387_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2388 for ECDSA, tcId is 268 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2388_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2388_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x37, 0x38, 0x32, 0x37, 0x30, 0x35, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2388_sig[] = { 0x0a, 0xf3, 0x27, 0x3b, 0x41, 0x19, 0x62, 0x49, 0x79, 0xea, 0xb3, 0x05, 0xa0, 0xf8, 0x3e, 0x51, 0x36, 0xef, 0x6a, 0x56, 0x59, 0x7c, 0x53, 0x53, 0xd8, 0xd7, 0x67, 0x23, 0x52, 0x94, 0x03, 0x99, 0x5c, 0x45, 0xf3, 0xa2, 0x4b, 0xb1, 0x3a, 0xe8, 0x5d, 0x38, 0x72, 0xdc, 0x81, 0x1e, 0x00, 0x8e, 0xaa, 0x2c, 0x58, 0x42, 0xf4, 0x9a, 0x7c, 0x2e, 0xc6, 0x8d, 0xc7, 0xcb, 0x4f, 0x33, 0xcc, 0xc3, 0x61, 0xf5, 0xb2, 0x36, 0x33, 0x49, 0x64, 0xeb, 0x3e, 0xe2, 0xc6, 0xc6, 0xbc, 0xeb, 0x9f, 0x2f, 0x8e, 0xcf, 0x06, 0x44, 0xce, 0x9c, 0xa7, 0x23, 0xd5, 0x98, 0xe3, 0x94, 0x72, 0xe3, 0xd3, 0x9a, 0x99, 0x34, 0x81, 0xd2, 0x7c, 0x8d, 0xf5, 0xdf, 0x2b, 0x78, 0x1d, 0x6a, 0x02, 0x2a, 0xc4, 0x89, 0xa9, 0x19, 0x94, 0x75, 0x62, 0x0d, 0x4b, 0xab, 0x39, 0x0a, 0x3f, 0xcb, 0x6b, 0xf4, 0x49, 0x41, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2388 = { .name = "ecdsa_brainpoolp512r1_sha512_2388", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2388_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2388_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2388_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2389 for ECDSA, tcId is 269 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2389_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2389_msg[] = { 0x32, 0x30, 0x36, 0x32, 0x31, 0x34, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2389_sig[] = { 0x9d, 0x54, 0xcc, 0xdc, 0xdd, 0xe1, 0xb7, 0xb1, 0x1f, 0xa6, 0xa7, 0x0f, 0xd7, 0x5d, 0xa9, 0xa2, 0x38, 0x7a, 0xee, 0xf9, 0x48, 0x82, 0x50, 0x6e, 0xb8, 0x98, 0xd7, 0x25, 0x6d, 0xa4, 0xd0, 0xae, 0x2e, 0xa0, 0xcf, 0x54, 0xf9, 0x66, 0xed, 0x35, 0x0c, 0xe4, 0x74, 0xc7, 0x4f, 0x00, 0xae, 0xff, 0x42, 0xcc, 0x16, 0x06, 0x4b, 0x06, 0x9b, 0x8a, 0x68, 0x82, 0x0b, 0xa5, 0x57, 0xb5, 0x34, 0xd0, 0x99, 0x12, 0xc6, 0x02, 0x99, 0x47, 0x81, 0x60, 0x6f, 0x98, 0x72, 0x13, 0xb4, 0xe1, 0xe0, 0x56, 0xf3, 0xae, 0x17, 0x93, 0x5d, 0xa0, 0x59, 0x34, 0x1b, 0xba, 0x17, 0x48, 0x4a, 0xc6, 0x2e, 0x32, 0xf2, 0xd0, 0x4b, 0x39, 0x73, 0x27, 0x5e, 0x73, 0x88, 0x76, 0xeb, 0xb1, 0x6f, 0xa1, 0x46, 0x5f, 0x8e, 0x6b, 0xd2, 0x60, 0x19, 0xd9, 0x6a, 0xaa, 0x28, 0xcc, 0xfe, 0x94, 0xab, 0x7e, 0xa9, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2389 = { .name = "ecdsa_brainpoolp512r1_sha512_2389", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2389_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2389_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2389_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2390 for ECDSA, tcId is 270 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2390_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2390_msg[] = { 0x36, 0x38, 0x34, 0x32, 0x34, 0x39, 0x36, 0x30, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2390_sig[] = { 0x7f, 0x7b, 0x14, 0xc2, 0x50, 0x2a, 0x2b, 0xbf, 0x3f, 0x7d, 0x18, 0x29, 0x01, 0x26, 0x37, 0xa1, 0xe4, 0x63, 0x11, 0xef, 0xb1, 0xb8, 0x7d, 0xb4, 0x13, 0x04, 0x31, 0x82, 0x50, 0xd0, 0xd1, 0xb2, 0x55, 0x2d, 0x24, 0x25, 0x37, 0x8d, 0xad, 0x4b, 0xfd, 0xa6, 0xef, 0x11, 0x97, 0xd7, 0xb9, 0x84, 0x63, 0x84, 0xac, 0xfd, 0xbf, 0xae, 0x03, 0x6a, 0x5f, 0x73, 0x2e, 0x94, 0x97, 0xc8, 0x58, 0x4a, 0x50, 0x69, 0x3e, 0xee, 0x71, 0xae, 0x5d, 0x70, 0x61, 0x05, 0xd8, 0x19, 0x08, 0x9a, 0xc9, 0x48, 0xb3, 0xd7, 0xb4, 0x15, 0x1b, 0x0a, 0xf5, 0x54, 0x36, 0x89, 0x98, 0x54, 0xd9, 0xcc, 0x8b, 0x75, 0x26, 0xae, 0xd8, 0x96, 0xae, 0x1f, 0x3d, 0xdd, 0xfe, 0x30, 0x19, 0x62, 0x04, 0x3f, 0x4f, 0x3b, 0xa1, 0x40, 0x86, 0x4e, 0xf8, 0xd1, 0xbb, 0x6d, 0x45, 0xd5, 0xad, 0xd1, 0x32, 0x5d, 0x84, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2390 = { .name = "ecdsa_brainpoolp512r1_sha512_2390", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2390_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2390_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2390_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2391 for ECDSA, tcId is 271 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2391_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2391_msg[] = { 0x33, 0x32, 0x36, 0x39, 0x38, 0x39, 0x37, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2391_sig[] = { 0x8c, 0x33, 0xb1, 0x62, 0x3e, 0x10, 0xe2, 0xf5, 0x1e, 0xdc, 0x0b, 0x96, 0x86, 0x2c, 0xd2, 0xea, 0xf5, 0xfa, 0xee, 0x8e, 0xa6, 0xcc, 0xc9, 0x85, 0xcc, 0xdb, 0x94, 0xbf, 0xb1, 0x41, 0xd6, 0x3d, 0xb2, 0x51, 0xfa, 0xf1, 0xe7, 0xd6, 0x9e, 0xd3, 0x90, 0xa2, 0xbe, 0xb7, 0x11, 0x85, 0xdb, 0x40, 0x29, 0xf0, 0x7f, 0x03, 0xaf, 0x4a, 0xc4, 0xaa, 0xea, 0xf4, 0x8a, 0xf0, 0x1e, 0x6f, 0x24, 0x20, 0x55, 0xb0, 0x36, 0x5b, 0x12, 0xf7, 0xd6, 0x40, 0xf7, 0x58, 0xe5, 0xaf, 0x6e, 0x2d, 0x6a, 0x41, 0xfc, 0x5c, 0x56, 0xc8, 0x05, 0x98, 0xf7, 0xbb, 0xa0, 0x99, 0x0b, 0x0d, 0x89, 0x9f, 0x22, 0xcb, 0x63, 0x4c, 0x22, 0xf6, 0x4d, 0x7a, 0x1e, 0x97, 0x08, 0x56, 0xb3, 0xb3, 0x1b, 0xb0, 0x13, 0xd3, 0x9f, 0x76, 0x1d, 0x58, 0x8b, 0xa1, 0x4a, 0x95, 0x83, 0xf8, 0x38, 0x7d, 0x91, 0xd0, 0x58, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2391 = { .name = "ecdsa_brainpoolp512r1_sha512_2391", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2391_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2391_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2391_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2392 for ECDSA, tcId is 272 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2392_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2392_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x33, 0x32, 0x34, 0x36, 0x39, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2392_sig[] = { 0xa3, 0x4a, 0xc9, 0xc0, 0x77, 0x53, 0x8c, 0x21, 0xf9, 0x2a, 0xb4, 0xbf, 0x0d, 0xd4, 0x0d, 0x9f, 0xab, 0xee, 0x1f, 0x40, 0x9e, 0x81, 0xcc, 0xe7, 0x1b, 0xed, 0x23, 0xd0, 0x6b, 0xa7, 0x2e, 0xb1, 0x5b, 0x7b, 0x7a, 0x96, 0xfb, 0xe2, 0x56, 0xbd, 0x0c, 0x41, 0xa0, 0xd5, 0xe3, 0xf0, 0x74, 0x89, 0x96, 0xc1, 0x6d, 0x74, 0x27, 0x05, 0xd9, 0xa0, 0x6c, 0x54, 0x4a, 0x4e, 0x57, 0x3c, 0x35, 0x97, 0x45, 0x00, 0xed, 0x99, 0x5c, 0x26, 0x08, 0xdc, 0x62, 0xec, 0xc9, 0x20, 0xee, 0x56, 0x05, 0x90, 0x64, 0x81, 0x00, 0xe5, 0xb8, 0x9e, 0x7f, 0x10, 0x9a, 0x2c, 0x15, 0xa8, 0x51, 0x70, 0x89, 0x53, 0xe6, 0x99, 0x49, 0x9c, 0x98, 0x7c, 0x1e, 0x95, 0x23, 0xf9, 0xd8, 0x98, 0x5e, 0x60, 0x61, 0xcb, 0x9a, 0x84, 0xe5, 0x8e, 0x2c, 0x26, 0x57, 0x9b, 0xbb, 0x08, 0x4b, 0x9d, 0x5d, 0x71, 0xf3, 0xaa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2392 = { .name = "ecdsa_brainpoolp512r1_sha512_2392", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2392_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2392_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2392_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2393 for ECDSA, tcId is 273 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2393_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2393_msg[] = { 0x34, 0x31, 0x31, 0x38, 0x38, 0x38, 0x37, 0x35, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2393_sig[] = { 0x63, 0x9a, 0x6c, 0xc0, 0xc3, 0xe5, 0x0f, 0x24, 0x57, 0xf8, 0x43, 0xc4, 0x0f, 0x17, 0x14, 0x09, 0x6e, 0x61, 0x63, 0x7c, 0x78, 0xba, 0x9d, 0x84, 0x7a, 0xdf, 0x0f, 0x6b, 0x2e, 0xce, 0x78, 0xad, 0xea, 0x98, 0xdd, 0x15, 0x6a, 0x91, 0x63, 0x8e, 0xea, 0xc7, 0x43, 0x97, 0x1f, 0x5d, 0x46, 0x95, 0x06, 0xfd, 0x19, 0xe1, 0x15, 0x55, 0xfc, 0x55, 0xfe, 0xe3, 0xf8, 0x2a, 0xe7, 0xb0, 0x5b, 0x8f, 0x24, 0x27, 0xb3, 0xfa, 0x23, 0x84, 0x30, 0xe0, 0xcd, 0x79, 0x4f, 0x28, 0xb4, 0xe0, 0xf2, 0xc1, 0xd3, 0xc8, 0x3a, 0xb6, 0xfd, 0x00, 0xd4, 0x7a, 0x4c, 0x63, 0x0f, 0x5f, 0x07, 0x2f, 0x96, 0x15, 0x23, 0xcd, 0x53, 0x16, 0xb0, 0xf8, 0xe7, 0xa1, 0x38, 0x77, 0x27, 0xe3, 0x30, 0xfe, 0xf6, 0x92, 0x89, 0x0a, 0x47, 0x24, 0x95, 0xc6, 0x9c, 0xf2, 0x16, 0x72, 0x7f, 0xba, 0x37, 0x71, 0xad, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2393 = { .name = "ecdsa_brainpoolp512r1_sha512_2393", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2393_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2393_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2393_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2394 for ECDSA, tcId is 274 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2394_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2394_msg[] = { 0x39, 0x38, 0x38, 0x36, 0x30, 0x36, 0x35, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2394_sig[] = { 0x61, 0x94, 0x92, 0x20, 0xd6, 0x68, 0xcd, 0x59, 0x00, 0x9b, 0x00, 0x69, 0x60, 0x7a, 0xfa, 0xc3, 0xa3, 0xbe, 0x38, 0x66, 0xf5, 0x0b, 0x0c, 0x3b, 0xdb, 0xd9, 0x8e, 0x9e, 0xb3, 0x06, 0x08, 0x2b, 0x23, 0x13, 0x6f, 0xbe, 0x61, 0x73, 0xdc, 0xb6, 0xb8, 0xd3, 0x4e, 0x81, 0xa9, 0xe0, 0x38, 0xe8, 0xa7, 0x80, 0x71, 0x63, 0x5b, 0x7b, 0xc4, 0xc7, 0x87, 0xef, 0xb7, 0xbf, 0x8a, 0x8b, 0xa1, 0x2a, 0x84, 0x26, 0xf6, 0x8e, 0x8c, 0x7f, 0xc3, 0xe8, 0xbe, 0xa8, 0x4d, 0x7b, 0x56, 0xaa, 0x2e, 0x6b, 0xbb, 0x2b, 0x06, 0x3e, 0x32, 0x0e, 0xcd, 0x52, 0x0d, 0x36, 0x5a, 0x06, 0x6d, 0x92, 0x40, 0xf5, 0xda, 0xa5, 0x33, 0xda, 0xea, 0x28, 0xd9, 0x9c, 0xa1, 0xff, 0xae, 0x9c, 0x3b, 0x9b, 0x0e, 0x7c, 0xd2, 0x8d, 0x74, 0x21, 0xba, 0x35, 0xc3, 0x05, 0xc8, 0x91, 0x03, 0x48, 0x67, 0x76, 0x8b, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2394 = { .name = "ecdsa_brainpoolp512r1_sha512_2394", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2394_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2394_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2394_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2395 for ECDSA, tcId is 275 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2395_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2395_msg[] = { 0x32, 0x34, 0x37, 0x39, 0x31, 0x31, 0x35, 0x38, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2395_sig[] = { 0x47, 0xff, 0xc9, 0xcd, 0xf4, 0x0e, 0x55, 0x80, 0xa4, 0xa9, 0x38, 0xc3, 0x72, 0x7a, 0xcf, 0x8c, 0x37, 0xad, 0x63, 0x8b, 0x11, 0xc2, 0x35, 0xd0, 0x5e, 0x44, 0xbf, 0xb0, 0xa6, 0x80, 0xa3, 0xc6, 0xef, 0xf5, 0x79, 0x01, 0x54, 0x1b, 0xe0, 0xc6, 0x02, 0x46, 0x74, 0x9f, 0x1f, 0x00, 0x71, 0xa8, 0x59, 0x4e, 0xd6, 0xeb, 0xa4, 0x3e, 0xa1, 0xf9, 0x26, 0x68, 0xd5, 0x4d, 0x93, 0x8c, 0x98, 0xd3, 0x15, 0x21, 0xec, 0xb3, 0xeb, 0x40, 0x8c, 0x98, 0x60, 0xb8, 0x3b, 0xb7, 0x48, 0xaf, 0xe3, 0x06, 0xc3, 0x5b, 0x93, 0xee, 0x6b, 0x9e, 0x1e, 0x58, 0x4c, 0x98, 0xd7, 0x88, 0xd0, 0x4d, 0x01, 0x3d, 0xe6, 0x91, 0xca, 0xfc, 0xd0, 0xf5, 0xd7, 0x1f, 0xe3, 0xdc, 0x6c, 0x8c, 0x77, 0xed, 0x03, 0x48, 0x8d, 0x8b, 0x92, 0xab, 0x2c, 0x2e, 0x00, 0x7e, 0xe3, 0x5a, 0xd0, 0x2c, 0x4d, 0xdd, 0x05, 0x63, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2395 = { .name = "ecdsa_brainpoolp512r1_sha512_2395", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2395_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2395_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2395_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2396 for ECDSA, tcId is 276 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2396_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2396_msg[] = { 0x35, 0x30, 0x37, 0x36, 0x38, 0x38, 0x37, 0x33, 0x36, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2396_sig[] = { 0x64, 0x63, 0x8c, 0x51, 0xaf, 0x92, 0x69, 0xfb, 0x24, 0xd8, 0xe0, 0x97, 0x41, 0x02, 0xbe, 0x6e, 0x94, 0xbc, 0xea, 0xdf, 0xe9, 0xce, 0xa1, 0xa9, 0xc8, 0x9f, 0xd7, 0x78, 0x01, 0x08, 0x91, 0x84, 0x5d, 0x26, 0xe5, 0xdc, 0x7a, 0x0f, 0xe7, 0xf0, 0xa6, 0xea, 0x9e, 0xa0, 0xc1, 0xdd, 0x7c, 0x90, 0x5e, 0x8c, 0xe4, 0x3b, 0xe6, 0x48, 0x60, 0x9e, 0xaf, 0x84, 0x94, 0xf0, 0x60, 0x50, 0xb5, 0x50, 0x9f, 0xf2, 0xab, 0xd8, 0x31, 0x91, 0x59, 0xbf, 0x51, 0xc6, 0xf3, 0x30, 0x71, 0x98, 0xd3, 0xc0, 0x50, 0x0a, 0xd8, 0x67, 0x4f, 0x42, 0xa9, 0x16, 0x78, 0x31, 0x73, 0x42, 0xe8, 0x2e, 0xc0, 0x78, 0x1d, 0x43, 0x10, 0xd6, 0x18, 0x69, 0x4b, 0xd8, 0xd0, 0x74, 0x65, 0x0a, 0xe6, 0x49, 0x10, 0xa2, 0x4a, 0x03, 0x59, 0x8f, 0x00, 0x16, 0x81, 0x20, 0xe5, 0x30, 0xaa, 0x60, 0x31, 0x7a, 0xd4, 0x70, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2396 = { .name = "ecdsa_brainpoolp512r1_sha512_2396", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2396_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2396_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2396_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2397 for ECDSA, tcId is 277 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2397_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2397_msg[] = { 0x39, 0x38, 0x38, 0x35, 0x30, 0x36, 0x39, 0x36, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2397_sig[] = { 0x25, 0x3d, 0x7a, 0xff, 0x81, 0x71, 0x37, 0x21, 0x96, 0xdd, 0x15, 0x2c, 0xe3, 0x53, 0x6e, 0x65, 0xff, 0x00, 0xac, 0x3f, 0xee, 0xfc, 0x32, 0xd7, 0x90, 0xb6, 0xdd, 0xc8, 0x5b, 0x0c, 0xef, 0x07, 0x4a, 0x17, 0x36, 0xbb, 0x47, 0x33, 0x31, 0xb3, 0x81, 0x4b, 0x2f, 0x69, 0xd2, 0x0e, 0x90, 0x05, 0x0e, 0xd2, 0xd3, 0xca, 0x12, 0x57, 0x35, 0x33, 0x6d, 0x15, 0xf9, 0xc0, 0x12, 0xe2, 0x89, 0xcb, 0x38, 0x50, 0x57, 0x3a, 0x85, 0x9b, 0x7f, 0x9b, 0x15, 0x3f, 0xe0, 0xd9, 0x5f, 0x48, 0xed, 0x30, 0x87, 0x7e, 0xeb, 0x34, 0xff, 0xd3, 0x0e, 0x99, 0x80, 0xf4, 0xc4, 0x2c, 0x26, 0xe9, 0x53, 0x8f, 0x7e, 0xdf, 0xe5, 0x0d, 0x52, 0xf8, 0xe4, 0x53, 0xaf, 0x03, 0xd4, 0x55, 0x4b, 0xca, 0x7a, 0xb2, 0xb3, 0xb9, 0x8d, 0x79, 0x4a, 0x31, 0x7d, 0xda, 0x12, 0x3f, 0xd3, 0x1e, 0x4e, 0xa7, 0x06, 0xda, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2397 = { .name = "ecdsa_brainpoolp512r1_sha512_2397", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2397_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2397_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2397_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2398 for ECDSA, tcId is 278 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2398_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2398_msg[] = { 0x32, 0x37, 0x32, 0x31, 0x33, 0x30, 0x36, 0x31, 0x33, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2398_sig[] = { 0x74, 0x82, 0xb5, 0xe6, 0xbc, 0x84, 0xf2, 0x89, 0xbe, 0x96, 0xff, 0x9c, 0x01, 0xea, 0x2d, 0xf6, 0x32, 0xcc, 0x1d, 0x23, 0xb9, 0x88, 0xf9, 0x53, 0x26, 0x41, 0x00, 0xe8, 0xa2, 0x12, 0xe7, 0x7c, 0x83, 0x6f, 0xc3, 0xf6, 0x60, 0x71, 0xd9, 0xec, 0x62, 0x54, 0x34, 0x1c, 0xec, 0xfc, 0xd8, 0xaa, 0xa9, 0x40, 0xcc, 0x0c, 0xc1, 0xe2, 0x60, 0x77, 0xf3, 0xc0, 0xa1, 0xa8, 0x55, 0xe3, 0x0c, 0x51, 0x32, 0x8e, 0x8a, 0x1f, 0xc1, 0x40, 0xc8, 0x79, 0x1b, 0x9d, 0x17, 0xe1, 0xe2, 0xdf, 0xdc, 0xeb, 0x96, 0x9a, 0x21, 0xd2, 0xb0, 0x24, 0x5b, 0x1c, 0xc2, 0x07, 0x66, 0xb6, 0xb4, 0x1a, 0x2d, 0x6c, 0xdf, 0x96, 0x09, 0xdd, 0xa1, 0xb1, 0xd2, 0xc2, 0xc6, 0xc3, 0x85, 0x98, 0x6e, 0x6c, 0x6f, 0xac, 0xbf, 0xd6, 0x8a, 0x67, 0x48, 0x60, 0xf4, 0x8f, 0xb8, 0xd1, 0x13, 0xf5, 0x77, 0xef, 0x23, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2398 = { .name = "ecdsa_brainpoolp512r1_sha512_2398", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2398_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2398_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2398_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2399 for ECDSA, tcId is 279 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2399_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2399_msg[] = { 0x33, 0x32, 0x30, 0x34, 0x31, 0x30, 0x31, 0x36, 0x35, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2399_sig[] = { 0x65, 0x99, 0x44, 0x1c, 0x0e, 0xd9, 0xe2, 0xa8, 0x2f, 0x5f, 0x09, 0xcf, 0xa9, 0x62, 0x7b, 0x25, 0xd5, 0x01, 0x95, 0x75, 0x07, 0x23, 0xac, 0x18, 0x90, 0x7e, 0xde, 0xa3, 0xb5, 0x88, 0xb7, 0x36, 0xde, 0xed, 0xcd, 0xcd, 0x0a, 0xee, 0x44, 0xdf, 0x73, 0xf5, 0xf3, 0x64, 0xe4, 0x84, 0xb9, 0x94, 0x9b, 0x7d, 0x7b, 0x69, 0x8f, 0xde, 0x04, 0x3e, 0x61, 0x02, 0xcf, 0xee, 0xd6, 0x9d, 0xb4, 0x69, 0x40, 0x04, 0x9f, 0x8d, 0xd6, 0xee, 0x0b, 0xbb, 0x4b, 0x9a, 0x29, 0xf2, 0xed, 0xed, 0x3c, 0x8b, 0xf0, 0xb1, 0x0c, 0x8b, 0xd3, 0xbe, 0x6b, 0xf5, 0xe4, 0xf9, 0x7f, 0x07, 0x4d, 0x71, 0x68, 0x65, 0xfa, 0x82, 0x4f, 0x51, 0xfa, 0x79, 0xcc, 0xfe, 0x79, 0x1d, 0x5d, 0xf6, 0xad, 0x7f, 0xee, 0x6b, 0xad, 0x96, 0xac, 0x5b, 0xff, 0x21, 0xa5, 0x02, 0xf9, 0x0a, 0xb8, 0x0e, 0x21, 0x12, 0x53, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2399 = { .name = "ecdsa_brainpoolp512r1_sha512_2399", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2399_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2399_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2399_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2400 for ECDSA, tcId is 280 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2400_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2400_msg[] = { 0x33, 0x31, 0x35, 0x30, 0x36, 0x38, 0x30, 0x39, 0x35, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2400_sig[] = { 0x74, 0xe1, 0x1c, 0x74, 0xd4, 0x13, 0x9e, 0xb9, 0xe5, 0x32, 0xe5, 0x83, 0xcf, 0x3e, 0xdd, 0x0b, 0x9e, 0x0e, 0x7b, 0x6e, 0x82, 0xa3, 0xb7, 0x9d, 0x82, 0x00, 0xe8, 0xe5, 0x81, 0xde, 0xb7, 0x1b, 0x15, 0x3b, 0x96, 0x16, 0x46, 0xa7, 0x63, 0x20, 0x33, 0x9f, 0x4c, 0x1a, 0x5f, 0x75, 0xa6, 0x38, 0xba, 0x2b, 0x0c, 0x3f, 0x06, 0x5e, 0xd8, 0x56, 0xad, 0x0a, 0x15, 0x8e, 0x32, 0x35, 0xc7, 0x0e, 0x6f, 0xf9, 0x40, 0x33, 0x9c, 0x04, 0x49, 0xd6, 0xe2, 0x40, 0x37, 0x30, 0xb5, 0x8d, 0x0d, 0xfc, 0x8d, 0xe7, 0x9b, 0xca, 0x0d, 0xf0, 0x6c, 0x5a, 0x6d, 0x43, 0x7c, 0xc2, 0xc1, 0x26, 0x6a, 0x46, 0x8a, 0x8a, 0xca, 0x2a, 0x29, 0x03, 0xc2, 0x99, 0x79, 0xd7, 0xf4, 0xd4, 0xf7, 0x87, 0x1a, 0x10, 0x6b, 0x31, 0xec, 0x48, 0x5c, 0x28, 0xca, 0xb6, 0x2e, 0xb2, 0x10, 0x01, 0x98, 0x87, 0x1b, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2400 = { .name = "ecdsa_brainpoolp512r1_sha512_2400", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2400_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2400_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2400_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2401 for ECDSA, tcId is 281 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2401_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2401_msg[] = { 0x31, 0x37, 0x32, 0x37, 0x34, 0x36, 0x30, 0x31, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2401_sig[] = { 0x55, 0x48, 0x02, 0x0c, 0x2a, 0x07, 0x64, 0x52, 0x4c, 0xa5, 0x43, 0xd0, 0x8e, 0x15, 0x26, 0xce, 0x14, 0x76, 0xba, 0x97, 0x6a, 0xf8, 0xd6, 0x15, 0x0d, 0x8d, 0x2a, 0xe4, 0x74, 0x95, 0xe5, 0xfe, 0x68, 0xcc, 0xe9, 0x84, 0x93, 0xb5, 0x03, 0x04, 0x13, 0x1d, 0xf7, 0x1c, 0x1a, 0x3d, 0x47, 0x76, 0xa7, 0x7d, 0x5c, 0xeb, 0x74, 0xe4, 0x7b, 0x2a, 0x8e, 0x65, 0x01, 0x08, 0xeb, 0xab, 0x14, 0x28, 0x62, 0x0e, 0x2d, 0xbf, 0x67, 0x21, 0x5f, 0x95, 0xfb, 0xbc, 0x92, 0xa9, 0x92, 0xf2, 0x0a, 0x4e, 0x7f, 0x30, 0x1a, 0x2c, 0x3c, 0x38, 0x80, 0xb7, 0xe8, 0x91, 0xad, 0x48, 0x46, 0x47, 0xa9, 0x7a, 0xa0, 0x0a, 0xec, 0xde, 0xfd, 0x03, 0x15, 0x52, 0x07, 0xa9, 0xe4, 0x59, 0xef, 0x74, 0x5a, 0x9d, 0x29, 0xa5, 0x4b, 0x08, 0xf4, 0x7b, 0x81, 0xca, 0xdb, 0xe4, 0xbe, 0xa4, 0x57, 0xea, 0xc6, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2401 = { .name = "ecdsa_brainpoolp512r1_sha512_2401", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2401_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2401_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2401_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2402 for ECDSA, tcId is 282 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2402_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2402_msg[] = { 0x31, 0x34, 0x35, 0x37, 0x31, 0x34, 0x36, 0x31, 0x32, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2402_sig[] = { 0x83, 0xde, 0x91, 0x22, 0xab, 0x46, 0x27, 0x22, 0x93, 0x9d, 0x85, 0x1d, 0x45, 0x6b, 0x9b, 0x02, 0x29, 0x37, 0xbe, 0x85, 0xb1, 0x5e, 0xb6, 0x5d, 0x2e, 0xc1, 0xa4, 0x84, 0x10, 0xa2, 0xf2, 0x34, 0xe9, 0x81, 0x40, 0xf2, 0x08, 0xed, 0x59, 0x5d, 0xe2, 0xfb, 0x50, 0x73, 0xb2, 0xea, 0x49, 0x4a, 0xca, 0xde, 0x8d, 0xc5, 0xa4, 0x4e, 0xd7, 0x16, 0x2c, 0xfe, 0x7a, 0x70, 0x18, 0x24, 0x79, 0xdd, 0x2e, 0x0c, 0x93, 0x8f, 0x56, 0x53, 0x38, 0x57, 0x95, 0x6e, 0x56, 0xd7, 0x9c, 0x78, 0xfd, 0x10, 0x1d, 0xde, 0xcb, 0x1a, 0x96, 0x95, 0xa5, 0x6f, 0x18, 0xf6, 0xa8, 0x9b, 0x94, 0xc0, 0xd3, 0xdb, 0x47, 0x42, 0x9a, 0xfd, 0xde, 0x6b, 0x68, 0x28, 0x32, 0xbf, 0x4c, 0x0f, 0xb8, 0x49, 0xec, 0x7f, 0xaf, 0x72, 0x9c, 0xb5, 0x9d, 0x8e, 0x21, 0x9d, 0xad, 0x70, 0xb7, 0xc8, 0xe2, 0x57, 0xff, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2402 = { .name = "ecdsa_brainpoolp512r1_sha512_2402", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2402_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2402_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2402_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2403 for ECDSA, tcId is 283 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2403_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2403_msg[] = { 0x34, 0x31, 0x37, 0x39, 0x35, 0x31, 0x36, 0x30, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2403_sig[] = { 0x8d, 0x42, 0xb3, 0xbe, 0xd0, 0x20, 0x25, 0x93, 0xad, 0x44, 0xa9, 0x3b, 0x43, 0xeb, 0xac, 0x7e, 0xe0, 0xd9, 0xec, 0x1d, 0xbc, 0x5c, 0x54, 0x66, 0x19, 0xd5, 0xa9, 0xbf, 0xb5, 0xc9, 0xce, 0xe7, 0x44, 0xa4, 0x45, 0x87, 0x3f, 0x10, 0x53, 0x9b, 0x51, 0x54, 0x5e, 0xa7, 0x87, 0x64, 0x8d, 0xbc, 0x44, 0xba, 0x2d, 0x27, 0xf9, 0x1e, 0xee, 0xc5, 0x9d, 0xe9, 0x2f, 0x2d, 0x71, 0x60, 0x15, 0x53, 0x98, 0x5a, 0xc4, 0x97, 0x2c, 0x7b, 0x12, 0x23, 0x65, 0x6d, 0xfe, 0xc7, 0x96, 0xcd, 0x33, 0x52, 0xd9, 0x1d, 0x6c, 0x83, 0xce, 0x33, 0x0e, 0x1d, 0xcb, 0x1e, 0xc9, 0x81, 0x73, 0x99, 0x34, 0x0d, 0x7c, 0xa9, 0x74, 0x57, 0xaf, 0x51, 0xc1, 0x9c, 0x6f, 0xd0, 0x78, 0x7e, 0x69, 0x65, 0xd4, 0xf8, 0x5e, 0xde, 0x5c, 0x7f, 0x50, 0x75, 0x98, 0xb8, 0xbd, 0xd5, 0xc8, 0x08, 0xdb, 0x45, 0x9e, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2403 = { .name = "ecdsa_brainpoolp512r1_sha512_2403", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2403_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2403_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2403_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2404 for ECDSA, tcId is 284 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2404_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2404_msg[] = { 0x35, 0x38, 0x39, 0x32, 0x37, 0x31, 0x33, 0x30, 0x35, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2404_sig[] = { 0x5b, 0x82, 0x6d, 0x16, 0x04, 0x0e, 0x44, 0x8d, 0xfb, 0x70, 0x19, 0x5d, 0xe1, 0x6e, 0x97, 0x45, 0x4b, 0x13, 0x3a, 0xeb, 0x10, 0x51, 0x37, 0x3d, 0x51, 0x11, 0xf1, 0x08, 0x14, 0xb7, 0xf4, 0xad, 0x17, 0x14, 0xb2, 0x5c, 0x0c, 0x56, 0x61, 0xef, 0xee, 0x43, 0xfa, 0x93, 0x29, 0xa4, 0xaf, 0x09, 0x60, 0x7e, 0xb6, 0x6c, 0x72, 0xb2, 0xbe, 0x2e, 0x21, 0xbb, 0x4d, 0x02, 0x29, 0xe3, 0xa1, 0xaf, 0x07, 0xf0, 0x0f, 0x39, 0x35, 0x56, 0x6f, 0x4c, 0xa1, 0x6e, 0x34, 0x6e, 0xf5, 0xac, 0x47, 0xb2, 0x95, 0x3f, 0xc8, 0xb5, 0xcc, 0x88, 0x70, 0xae, 0x63, 0x8c, 0x55, 0xfa, 0xde, 0x1b, 0x58, 0x6b, 0x37, 0xa1, 0x19, 0x01, 0x5f, 0xd7, 0xbe, 0x3a, 0x33, 0xfd, 0x39, 0x16, 0x55, 0x64, 0xf6, 0x11, 0x74, 0x35, 0xbc, 0x1a, 0x20, 0xbf, 0xd5, 0x74, 0x06, 0x60, 0x8b, 0x3b, 0x27, 0xa9, 0x1b, 0xe3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2404 = { .name = "ecdsa_brainpoolp512r1_sha512_2404", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2404_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2404_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2404_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2405 for ECDSA, tcId is 285 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2405_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2405_msg[] = { 0x33, 0x38, 0x39, 0x36, 0x31, 0x38, 0x32, 0x32, 0x39, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2405_sig[] = { 0x8f, 0x89, 0xdb, 0x5a, 0x6d, 0x6d, 0xc6, 0xfe, 0x96, 0xec, 0x5f, 0x95, 0x96, 0x0c, 0x2f, 0x03, 0xa6, 0xa0, 0x72, 0xe6, 0x44, 0xd1, 0x58, 0x24, 0x7d, 0x5b, 0x8b, 0x66, 0xe2, 0x34, 0x68, 0x34, 0xee, 0x11, 0xe5, 0xed, 0xe6, 0xbf, 0x9e, 0x8e, 0x02, 0x34, 0xa7, 0xf7, 0x5c, 0xe8, 0x64, 0x49, 0x14, 0xc5, 0x85, 0xe0, 0x95, 0x3d, 0x37, 0x1c, 0x36, 0x3e, 0x2f, 0x21, 0xfe, 0xaa, 0x27, 0x63, 0x66, 0x01, 0xd2, 0x28, 0xf4, 0xb5, 0x3d, 0xab, 0x15, 0x46, 0xeb, 0xf7, 0x67, 0x33, 0x60, 0xdb, 0xa5, 0xdc, 0x3d, 0x59, 0xc9, 0x53, 0xbf, 0x86, 0x7c, 0x75, 0x43, 0x25, 0xc0, 0xcf, 0xde, 0x85, 0xb6, 0x45, 0x05, 0xfc, 0x99, 0x59, 0x41, 0x92, 0x9b, 0x53, 0xc5, 0x56, 0x6b, 0x42, 0xf0, 0x34, 0xba, 0x1a, 0x09, 0xed, 0x96, 0xe1, 0x13, 0x96, 0x1a, 0x1a, 0x73, 0x57, 0xa2, 0x27, 0x93, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2405 = { .name = "ecdsa_brainpoolp512r1_sha512_2405", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2405_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2405_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2405_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 285 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2406 for ECDSA, tcId is 286 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2406_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2406_msg[] = { 0x38, 0x32, 0x38, 0x33, 0x33, 0x34, 0x36, 0x37, 0x33, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2406_sig[] = { 0x7e, 0x61, 0x07, 0xbc, 0x6e, 0x5f, 0x0d, 0x09, 0x58, 0x78, 0x9e, 0x4b, 0x91, 0x20, 0x1c, 0xa1, 0x9d, 0x93, 0xc1, 0x2b, 0xc4, 0x19, 0x4c, 0x83, 0x16, 0xc2, 0x22, 0x44, 0x51, 0xf5, 0x74, 0x8b, 0xb6, 0xfb, 0x46, 0x49, 0x71, 0x06, 0xc6, 0x13, 0xb0, 0x7e, 0xfa, 0xac, 0x95, 0x4e, 0x2c, 0xcb, 0x21, 0x06, 0x20, 0x05, 0xb9, 0xef, 0x4e, 0xa7, 0x2c, 0xe4, 0x47, 0x1d, 0xaa, 0x5a, 0x3e, 0xa3, 0x7f, 0x18, 0x37, 0x82, 0x77, 0x27, 0x68, 0x5d, 0xe8, 0xc8, 0x86, 0x8d, 0x94, 0x25, 0xdb, 0x06, 0xe3, 0x3f, 0x67, 0x78, 0xb3, 0xb4, 0xd1, 0xe0, 0x8e, 0x5f, 0x73, 0xe2, 0x68, 0x04, 0xa1, 0x42, 0x72, 0x3a, 0x3d, 0x68, 0xa7, 0xd7, 0x5f, 0xdf, 0x82, 0x6e, 0x79, 0xf7, 0x91, 0xf7, 0xa6, 0xb0, 0xf8, 0x9a, 0x36, 0xe5, 0x79, 0xcd, 0xa9, 0x19, 0x6f, 0xdd, 0x9f, 0x64, 0x19, 0xf7, 0x1c, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2406 = { .name = "ecdsa_brainpoolp512r1_sha512_2406", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2406_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2406_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2406_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 286 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2407 for ECDSA, tcId is 287 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2407_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2407_msg[] = { 0x33, 0x33, 0x36, 0x36, 0x39, 0x37, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2407_sig[] = { 0x35, 0x39, 0x94, 0x4e, 0x52, 0xd0, 0xdb, 0x1f, 0xe5, 0xe9, 0xca, 0x3d, 0x4c, 0x8d, 0x93, 0x13, 0x9a, 0x2d, 0x5c, 0x85, 0xe5, 0x19, 0x60, 0xed, 0x68, 0xe8, 0xfb, 0x5f, 0x29, 0xcb, 0x10, 0x8f, 0xa1, 0x84, 0xfd, 0x66, 0x86, 0x4f, 0xed, 0x2b, 0xd9, 0x0e, 0x00, 0x17, 0x92, 0x5c, 0x5d, 0x54, 0x3d, 0x61, 0x8e, 0x28, 0x7d, 0xe4, 0x3d, 0x22, 0xf7, 0xa9, 0x4f, 0x17, 0x51, 0x4f, 0x85, 0xaa, 0x06, 0x0a, 0x37, 0xda, 0x27, 0x53, 0x92, 0x5c, 0x18, 0xba, 0x4b, 0x97, 0xc9, 0x5d, 0x16, 0xce, 0x57, 0x4c, 0xe9, 0x54, 0x2e, 0x91, 0x8b, 0x4e, 0xa2, 0xe7, 0xf3, 0x89, 0x0e, 0x72, 0x3a, 0x37, 0x5b, 0x0c, 0x7c, 0xcd, 0x49, 0x7c, 0xda, 0x6c, 0x24, 0x11, 0x15, 0x03, 0xff, 0x94, 0x8e, 0xe1, 0xb0, 0x97, 0x5b, 0x90, 0xb2, 0x1c, 0x07, 0x47, 0xf0, 0xb4, 0xbf, 0xd3, 0x54, 0xe2, 0xea, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2407 = { .name = "ecdsa_brainpoolp512r1_sha512_2407", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2407_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2407_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2407_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 287 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2408 for ECDSA, tcId is 288 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2408_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2408_msg[] = { 0x32, 0x31, 0x39, 0x39, 0x31, 0x35, 0x33, 0x32, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2408_sig[] = { 0x13, 0x39, 0xcc, 0x85, 0xb9, 0x10, 0xc8, 0x2c, 0x7d, 0x5a, 0x06, 0x04, 0x42, 0x71, 0x50, 0xe3, 0x25, 0xc4, 0x58, 0xcb, 0x2d, 0xe1, 0xcf, 0x27, 0x19, 0x45, 0x46, 0xdb, 0x13, 0xca, 0xb0, 0x56, 0xc0, 0x21, 0xf6, 0xa7, 0x8f, 0x55, 0x05, 0xe8, 0xbf, 0x68, 0x65, 0xf2, 0x9b, 0x36, 0xbf, 0x67, 0xa3, 0xc2, 0x30, 0x00, 0x61, 0x7e, 0x35, 0xf9, 0x2c, 0x87, 0x36, 0x85, 0x4c, 0x5d, 0x72, 0xa1, 0x80, 0x18, 0x93, 0x6e, 0x27, 0x84, 0x7e, 0xe6, 0x81, 0x9b, 0x10, 0x45, 0x85, 0x22, 0xd7, 0x89, 0x91, 0xcd, 0xe9, 0xd0, 0x8b, 0x5e, 0x85, 0xf2, 0xe3, 0x39, 0xba, 0xc6, 0xba, 0x9a, 0xfd, 0xba, 0x19, 0xa5, 0xc9, 0x9e, 0x21, 0x17, 0x75, 0x23, 0x45, 0xbd, 0xaa, 0x7a, 0x71, 0xbe, 0x57, 0xf0, 0x0e, 0x4a, 0x2d, 0x8d, 0xb0, 0x88, 0xf3, 0x50, 0x72, 0x18, 0x53, 0xf6, 0xea, 0x14, 0x40, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2408 = { .name = "ecdsa_brainpoolp512r1_sha512_2408", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2408_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2408_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2408_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 288 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2409 for ECDSA, tcId is 289 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2409_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2409_msg[] = { 0x35, 0x36, 0x30, 0x30, 0x33, 0x31, 0x36, 0x38, 0x32, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2409_sig[] = { 0x0b, 0x62, 0xb7, 0x68, 0x86, 0x41, 0x2a, 0x3e, 0x92, 0x18, 0x0a, 0xda, 0x31, 0xe8, 0x6c, 0x28, 0xe2, 0x88, 0x65, 0x9e, 0xe7, 0x12, 0x51, 0xb5, 0xfc, 0xab, 0x69, 0xfb, 0xe3, 0xa3, 0xea, 0x7a, 0x9e, 0xcb, 0xe5, 0x13, 0xef, 0x2f, 0x7e, 0x09, 0x00, 0x73, 0x82, 0x50, 0xd2, 0x81, 0x8d, 0x25, 0x5b, 0x83, 0x8d, 0xc0, 0x92, 0xf0, 0x45, 0xfe, 0x5f, 0x90, 0xe9, 0x9a, 0x6f, 0xc4, 0x8c, 0x20, 0x75, 0x25, 0x5d, 0xeb, 0xf5, 0x53, 0x18, 0xa2, 0x65, 0x51, 0x1e, 0x3f, 0x7b, 0xdf, 0x64, 0x7c, 0x88, 0xdb, 0xce, 0x18, 0x5a, 0xe1, 0x39, 0x05, 0x0c, 0x43, 0x71, 0x54, 0xfc, 0x4d, 0xee, 0x27, 0x86, 0xc4, 0x40, 0xb4, 0xf6, 0x75, 0x28, 0xa1, 0xa3, 0x43, 0xc8, 0xf4, 0x20, 0x57, 0xe9, 0xbd, 0x22, 0x3d, 0xf6, 0x4c, 0xe7, 0x57, 0x08, 0x1d, 0xff, 0x7f, 0x16, 0xa7, 0x84, 0xef, 0x58, 0x68, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2409 = { .name = "ecdsa_brainpoolp512r1_sha512_2409", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2409_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2409_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2409_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 289 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2410 for ECDSA, tcId is 290 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2410_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2410_msg[] = { 0x38, 0x36, 0x39, 0x36, 0x35, 0x31, 0x36, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2410_sig[] = { 0x02, 0x51, 0x7c, 0xfd, 0xd2, 0x2c, 0x2b, 0xe4, 0xc6, 0x2f, 0xf7, 0x2f, 0x02, 0x42, 0xf8, 0x44, 0xcf, 0x13, 0x7f, 0x23, 0x0b, 0x41, 0xbd, 0x1b, 0x96, 0x84, 0x26, 0xd7, 0x5f, 0xd0, 0x1f, 0x2b, 0x46, 0x7a, 0x3d, 0x3d, 0xba, 0xe1, 0x56, 0xd1, 0x9e, 0xe3, 0x34, 0x98, 0x07, 0x0a, 0x67, 0x27, 0x94, 0x12, 0x99, 0x65, 0x06, 0x45, 0x14, 0x33, 0x75, 0x96, 0xd1, 0xbc, 0x66, 0x48, 0x1a, 0x1a, 0x1e, 0x40, 0x50, 0x9a, 0x67, 0x1f, 0xbf, 0x96, 0x38, 0xd1, 0xd2, 0xb2, 0x42, 0xf3, 0x04, 0x10, 0x96, 0xd6, 0xb5, 0x9d, 0x1e, 0xb7, 0x10, 0x72, 0x06, 0x86, 0x20, 0xfd, 0xf3, 0x19, 0x53, 0xb2, 0x0a, 0x4b, 0xde, 0xbf, 0xb0, 0x8d, 0x24, 0x8f, 0x0d, 0x7e, 0x34, 0xf0, 0x53, 0xe6, 0x34, 0xf4, 0x3a, 0xa4, 0x2a, 0x38, 0x63, 0xd7, 0x53, 0x14, 0x7d, 0xe7, 0x36, 0x8b, 0x28, 0xa7, 0x4d, 0x84, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2410 = { .name = "ecdsa_brainpoolp512r1_sha512_2410", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2410_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2410_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2410_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 290 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2411 for ECDSA, tcId is 291 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2411_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2411_msg[] = { 0x36, 0x35, 0x38, 0x33, 0x39, 0x32, 0x36, 0x33, 0x37, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2411_sig[] = { 0x8f, 0xef, 0x6b, 0x52, 0xc4, 0xd6, 0x43, 0xfd, 0x9d, 0x5f, 0x28, 0xfd, 0x52, 0x04, 0xfc, 0x5b, 0x5b, 0x6a, 0x3e, 0x57, 0xe6, 0xdb, 0x9c, 0x8e, 0xef, 0x75, 0x14, 0x06, 0x89, 0x33, 0x37, 0x7a, 0x7f, 0x16, 0xa0, 0x69, 0xa9, 0x5b, 0xb6, 0xf6, 0x49, 0xdd, 0x33, 0x10, 0x92, 0x2a, 0x98, 0x22, 0x11, 0xf2, 0x42, 0x09, 0x3a, 0x23, 0xab, 0x44, 0xdf, 0x81, 0x0e, 0xb4, 0xd7, 0x44, 0xb0, 0x54, 0x5e, 0x38, 0x62, 0xa4, 0x2f, 0xe8, 0xa5, 0x60, 0x43, 0x2d, 0x5d, 0xe0, 0x42, 0xf9, 0x80, 0x61, 0x3e, 0x68, 0xf6, 0xb3, 0x44, 0x4d, 0x7d, 0x53, 0x52, 0x66, 0x00, 0xa5, 0x05, 0x99, 0x23, 0x71, 0xf6, 0xf7, 0x2d, 0xd1, 0xaa, 0x77, 0x5e, 0x58, 0xe2, 0x42, 0x12, 0xa0, 0xc2, 0x64, 0x39, 0xd2, 0xeb, 0x71, 0x73, 0x40, 0xfd, 0x53, 0x6d, 0x38, 0xf9, 0x14, 0x8d, 0x21, 0x36, 0x85, 0x0a, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2411 = { .name = "ecdsa_brainpoolp512r1_sha512_2411", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2411_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2411_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2411_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 291 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2412 for ECDSA, tcId is 292 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2412_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2412_msg[] = { 0x31, 0x33, 0x32, 0x30, 0x35, 0x30, 0x31, 0x35, 0x37, 0x32, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2412_sig[] = { 0x14, 0xbe, 0x63, 0x6d, 0x9a, 0xa0, 0xaa, 0xcb, 0x84, 0xf1, 0xd7, 0xd0, 0xb8, 0x83, 0x72, 0xc0, 0x32, 0x26, 0x87, 0x76, 0x7d, 0x45, 0x23, 0x9d, 0x7b, 0x88, 0x37, 0xd7, 0x47, 0xd6, 0x0f, 0xc6, 0xcb, 0x0f, 0xa7, 0xe8, 0x97, 0xbb, 0xdb, 0x19, 0x19, 0x4c, 0x82, 0xde, 0xbd, 0xdb, 0x46, 0xdd, 0xd0, 0x94, 0xcb, 0x00, 0x1d, 0xdb, 0x7e, 0x02, 0x59, 0x23, 0x83, 0x5d, 0x7e, 0x0e, 0xed, 0xa4, 0x09, 0x0d, 0x62, 0x99, 0x7f, 0xb4, 0xff, 0x82, 0x89, 0x6d, 0x2e, 0x8a, 0x0a, 0xe2, 0x2c, 0xef, 0x6d, 0xac, 0xf1, 0x88, 0x9b, 0xef, 0x71, 0x80, 0x5d, 0xba, 0x0f, 0x70, 0x1d, 0x41, 0xac, 0x21, 0x98, 0x20, 0xe1, 0x5e, 0x91, 0x5e, 0x10, 0x51, 0x3d, 0x49, 0x1b, 0x6a, 0xa3, 0x08, 0xb3, 0x59, 0x06, 0xdc, 0x5d, 0x45, 0x19, 0x19, 0x28, 0xf5, 0x02, 0x56, 0x83, 0xbe, 0x8a, 0x3a, 0x9f, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2412 = { .name = "ecdsa_brainpoolp512r1_sha512_2412", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2412_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2412_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2412_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 292 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2413 for ECDSA, tcId is 293 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2413_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2413_msg[] = { 0x35, 0x30, 0x38, 0x35, 0x33, 0x33, 0x30, 0x37, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2413_sig[] = { 0x9a, 0xf9, 0x8b, 0xee, 0x99, 0x11, 0x64, 0x0f, 0xb5, 0xd5, 0x8f, 0xa0, 0x80, 0x3e, 0x53, 0x93, 0xb7, 0x72, 0xfb, 0x0c, 0x86, 0x2e, 0xe9, 0xf8, 0x54, 0x5d, 0x9d, 0xad, 0xba, 0xfb, 0x1a, 0x6c, 0x73, 0xc8, 0x5b, 0x79, 0xf3, 0x9d, 0x11, 0x85, 0xf4, 0xb2, 0xc4, 0xbb, 0x54, 0xe5, 0x13, 0x17, 0xe2, 0x63, 0x3d, 0x50, 0xfc, 0x8f, 0x75, 0x88, 0x85, 0x04, 0x26, 0x8b, 0x84, 0xf4, 0x0e, 0x24, 0x87, 0xfb, 0x7c, 0x8a, 0x2d, 0x81, 0xf7, 0x22, 0x6d, 0xeb, 0xff, 0x31, 0xb4, 0xf0, 0xa2, 0x9a, 0x08, 0xf1, 0xf9, 0xa4, 0xc5, 0x0e, 0x56, 0x15, 0xb5, 0x70, 0x55, 0x5e, 0xf2, 0xcc, 0xa1, 0xdf, 0x2b, 0x70, 0x4e, 0x92, 0xe9, 0xb8, 0xad, 0xb4, 0x41, 0x89, 0xe6, 0x95, 0x53, 0xed, 0x79, 0xef, 0xfe, 0x31, 0x5b, 0xd4, 0x01, 0xd0, 0xb2, 0x32, 0x8c, 0xb0, 0x65, 0xcf, 0x10, 0xe1, 0x30, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2413 = { .name = "ecdsa_brainpoolp512r1_sha512_2413", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2413_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2413_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2413_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 293 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2414 for ECDSA, tcId is 294 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2414_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2414_msg[] = { 0x37, 0x38, 0x36, 0x36, 0x38, 0x31, 0x33, 0x31, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2414_sig[] = { 0xa6, 0x4a, 0x9d, 0xad, 0xf5, 0xb6, 0xa5, 0x70, 0x28, 0x04, 0x4e, 0x08, 0xd7, 0x88, 0x78, 0x4e, 0x07, 0xac, 0x98, 0xdf, 0xa1, 0xed, 0x23, 0x83, 0x48, 0xe4, 0x5e, 0x95, 0xd4, 0x4f, 0x63, 0x1d, 0x9f, 0x14, 0xab, 0xb9, 0x46, 0x43, 0xf8, 0x7d, 0x1c, 0xf3, 0xf9, 0xfe, 0xc5, 0xdc, 0x27, 0x20, 0xe4, 0x29, 0x64, 0x6c, 0x0e, 0xc7, 0x15, 0x1f, 0xb8, 0x99, 0x24, 0xcd, 0x43, 0x1c, 0x30, 0x73, 0x11, 0x5f, 0x65, 0x3a, 0x3d, 0x32, 0x7d, 0x93, 0x11, 0x8c, 0xdd, 0x24, 0xff, 0xff, 0x03, 0x9d, 0xa5, 0x16, 0xaf, 0xa2, 0x7f, 0x37, 0xc7, 0x87, 0x35, 0xc9, 0x85, 0x97, 0x3c, 0xfe, 0x55, 0x27, 0x5b, 0x61, 0x0d, 0x7b, 0xe2, 0x49, 0x69, 0xeb, 0x53, 0x17, 0x21, 0xa0, 0xa4, 0x86, 0x19, 0x4b, 0x6b, 0x88, 0x23, 0xd0, 0xd7, 0x0b, 0x0d, 0xc1, 0xfd, 0x4c, 0x76, 0x11, 0xc3, 0x28, 0x61, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2414 = { .name = "ecdsa_brainpoolp512r1_sha512_2414", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2414_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2414_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2414_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 294 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2415 for ECDSA, tcId is 295 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2415_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2415_msg[] = { 0x32, 0x30, 0x38, 0x32, 0x35, 0x33, 0x39, 0x34, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2415_sig[] = { 0x95, 0xd0, 0x81, 0xc0, 0x72, 0x8f, 0xee, 0x3f, 0x5b, 0x11, 0xa5, 0x93, 0x39, 0x58, 0x69, 0xaa, 0x34, 0x2c, 0x26, 0x0d, 0xfa, 0x05, 0xe5, 0x57, 0x53, 0x17, 0x15, 0x02, 0x36, 0x48, 0x2d, 0x00, 0xee, 0x80, 0xa6, 0xf0, 0xa3, 0xa2, 0x5c, 0x0c, 0x8e, 0x3a, 0x67, 0x90, 0x01, 0x4c, 0x67, 0x47, 0xd8, 0xb5, 0xdd, 0xb0, 0x81, 0x32, 0x8b, 0xd5, 0x3e, 0x4c, 0x64, 0x22, 0xc6, 0x23, 0xd7, 0x95, 0x98, 0x33, 0x4d, 0xdc, 0x2a, 0x1e, 0xd8, 0x87, 0xb2, 0x6f, 0xa2, 0x35, 0x99, 0x01, 0x2b, 0x31, 0xfb, 0xd5, 0xfa, 0x38, 0x4d, 0xb5, 0xc0, 0x90, 0x22, 0x33, 0xc1, 0xef, 0xe6, 0x1f, 0x85, 0xfc, 0xce, 0x09, 0xa9, 0xe7, 0xfc, 0x13, 0xfb, 0x02, 0x53, 0xc8, 0xcf, 0xce, 0xb8, 0x76, 0x23, 0x60, 0xee, 0x5d, 0x20, 0xe1, 0x7d, 0xeb, 0xbe, 0x84, 0xa1, 0xc8, 0xeb, 0x68, 0xdb, 0x7f, 0xfd, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2415 = { .name = "ecdsa_brainpoolp512r1_sha512_2415", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2415_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2415_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2415_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 295 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2416 for ECDSA, tcId is 296 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2416_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2416_msg[] = { 0x31, 0x30, 0x30, 0x36, 0x35, 0x39, 0x35, 0x36, 0x36, 0x39, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2416_sig[] = { 0x9d, 0xdd, 0x4a, 0xc3, 0x92, 0xe9, 0xb8, 0x39, 0x1d, 0x76, 0x6b, 0x6f, 0x5d, 0x26, 0xf1, 0x64, 0xef, 0x6f, 0x45, 0x52, 0xd7, 0x3f, 0x1e, 0xe9, 0xd0, 0x96, 0xb7, 0x7e, 0x3d, 0xcc, 0x3a, 0x42, 0x02, 0x35, 0x73, 0x15, 0x6c, 0x59, 0x54, 0x18, 0x7e, 0xbe, 0xcb, 0x2f, 0x60, 0xed, 0x7a, 0x01, 0x43, 0x98, 0x09, 0xdd, 0x8e, 0xba, 0x28, 0x6e, 0x53, 0x40, 0xee, 0xb7, 0xe1, 0x84, 0x59, 0x3d, 0x16, 0x6a, 0x4a, 0x2b, 0x9e, 0x0c, 0xee, 0xab, 0x82, 0x78, 0x3c, 0x1a, 0x7d, 0x62, 0x2d, 0xcf, 0x7b, 0xff, 0xc6, 0x9b, 0x85, 0xae, 0x41, 0xe5, 0xad, 0x9b, 0x55, 0x2b, 0xf3, 0xb6, 0x87, 0xa2, 0x28, 0xcf, 0xf6, 0x44, 0xd5, 0x49, 0x7b, 0xa0, 0xa1, 0x64, 0x4c, 0x03, 0x91, 0x62, 0xec, 0xdf, 0xb0, 0x95, 0xd2, 0x3d, 0xda, 0x25, 0xef, 0xe1, 0x4f, 0x48, 0x03, 0x2c, 0x6d, 0x09, 0xca, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2416 = { .name = "ecdsa_brainpoolp512r1_sha512_2416", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2416_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2416_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2416_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 296 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2417 for ECDSA, tcId is 297 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2417_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2417_msg[] = { 0x33, 0x30, 0x32, 0x34, 0x31, 0x38, 0x31, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2417_sig[] = { 0x7d, 0xb0, 0xfb, 0xdd, 0xcf, 0x43, 0x7e, 0x25, 0x80, 0x4b, 0xfa, 0x6d, 0x47, 0x60, 0x07, 0xbb, 0x2e, 0x49, 0x13, 0x85, 0x27, 0xff, 0x27, 0xd7, 0x59, 0xd0, 0x5c, 0x0b, 0x1a, 0x3d, 0xad, 0xa2, 0x32, 0x7c, 0x49, 0x81, 0x32, 0x00, 0xcc, 0x24, 0xfd, 0x81, 0xf0, 0xde, 0xef, 0xb6, 0x06, 0x13, 0x14, 0xd0, 0x68, 0x29, 0x02, 0x4f, 0x44, 0x64, 0x59, 0x1f, 0x52, 0x0d, 0x5c, 0xbd, 0x9d, 0xae, 0x17, 0x53, 0xcb, 0xe7, 0xf6, 0xd1, 0x8e, 0x8f, 0xc2, 0x26, 0xa9, 0x50, 0x38, 0x5a, 0x43, 0x85, 0x8d, 0xdd, 0xdf, 0xba, 0x4b, 0x57, 0xc5, 0xc0, 0x7d, 0x58, 0x1f, 0x51, 0xcb, 0xf5, 0xc8, 0xf9, 0x37, 0x81, 0xb4, 0x8c, 0xcc, 0x88, 0x7c, 0x03, 0x9f, 0xcd, 0xec, 0xd6, 0xe6, 0x5e, 0x3e, 0x59, 0x48, 0x94, 0xc6, 0x78, 0x75, 0xed, 0x89, 0xe8, 0x6c, 0x44, 0xe5, 0x2d, 0x65, 0x6c, 0x34, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2417 = { .name = "ecdsa_brainpoolp512r1_sha512_2417", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2417_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2417_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2417_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 297 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2418 for ECDSA, tcId is 298 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2418_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2418_msg[] = { 0x37, 0x37, 0x36, 0x37, 0x38, 0x35, 0x32, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2418_sig[] = { 0x89, 0x86, 0xb0, 0xea, 0x9c, 0x57, 0xe0, 0x37, 0x96, 0x0e, 0x76, 0xd8, 0xb5, 0x39, 0xaf, 0xc7, 0x14, 0xcc, 0x3a, 0xdc, 0x90, 0x39, 0x4b, 0x96, 0xbc, 0xfa, 0x3f, 0x7f, 0xbe, 0xad, 0x4f, 0xc5, 0x85, 0x13, 0x3e, 0x4f, 0x61, 0xb7, 0xce, 0x3e, 0xdf, 0xf0, 0x93, 0xb9, 0x8c, 0x25, 0x7d, 0xbb, 0xb4, 0x97, 0xf8, 0x6d, 0xbf, 0x46, 0x7f, 0x1a, 0xed, 0x8d, 0x7a, 0x7d, 0xbf, 0xb4, 0x46, 0x32, 0x9e, 0x7d, 0x1f, 0xa0, 0x9c, 0xcb, 0x4b, 0x4d, 0x49, 0xa2, 0x46, 0x3f, 0x12, 0xa9, 0xf7, 0x60, 0xd3, 0xcc, 0x0b, 0xe3, 0x8e, 0x40, 0x9a, 0x35, 0x21, 0x72, 0x3e, 0x6f, 0x48, 0x39, 0x80, 0x01, 0x90, 0x11, 0x53, 0xe1, 0x41, 0xc1, 0x21, 0x50, 0x0c, 0x8b, 0xa6, 0x89, 0x89, 0x6e, 0x2c, 0x3c, 0x88, 0x37, 0x67, 0x37, 0x89, 0x20, 0x37, 0x5c, 0xb5, 0x2f, 0x0c, 0xbe, 0x5a, 0xe9, 0x81, 0x61, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2418 = { .name = "ecdsa_brainpoolp512r1_sha512_2418", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2418_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2418_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2418_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 298 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2419 for ECDSA, tcId is 299 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2419_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2419_msg[] = { 0x35, 0x34, 0x34, 0x31, 0x39, 0x39, 0x39, 0x37, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2419_sig[] = { 0x75, 0xdf, 0xf0, 0xfc, 0x67, 0x96, 0x4d, 0x57, 0xff, 0x01, 0x3e, 0x4e, 0xb8, 0xa7, 0xd3, 0x56, 0xb9, 0xf4, 0x08, 0xbe, 0x6f, 0x5a, 0xed, 0x81, 0x85, 0x46, 0xb0, 0x64, 0x10, 0x22, 0x70, 0xa8, 0x14, 0x7f, 0x3a, 0xb7, 0x8b, 0x94, 0x32, 0x7b, 0x60, 0x23, 0x2f, 0xe0, 0x86, 0x22, 0x2f, 0x7e, 0xe7, 0xc0, 0x27, 0xc6, 0xa2, 0xf8, 0x56, 0x46, 0x79, 0x22, 0x15, 0x6c, 0xd0, 0x0c, 0x52, 0x46, 0x59, 0x72, 0x54, 0x41, 0x17, 0x56, 0x72, 0x21, 0xcd, 0x67, 0x57, 0x54, 0x28, 0xc5, 0xc6, 0x1e, 0xdf, 0xb2, 0x28, 0xb1, 0x31, 0x46, 0x49, 0x27, 0x65, 0x7e, 0x45, 0xae, 0x8e, 0x55, 0x62, 0x5c, 0x87, 0x4c, 0x46, 0x97, 0x8c, 0x7d, 0xd4, 0x81, 0xd2, 0xdb, 0x8e, 0xe9, 0xca, 0xbd, 0x1a, 0x61, 0xbc, 0x24, 0x47, 0xce, 0xd2, 0xff, 0x9a, 0x72, 0xed, 0xe1, 0x22, 0xda, 0xbc, 0x6d, 0x9c, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2419 = { .name = "ecdsa_brainpoolp512r1_sha512_2419", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2419_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2419_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2419_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 299 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2420 for ECDSA, tcId is 300 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2420_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2420_msg[] = { 0x35, 0x38, 0x34, 0x33, 0x34, 0x38, 0x30, 0x33, 0x39, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2420_sig[] = { 0xa2, 0xce, 0x4a, 0x96, 0x61, 0xc7, 0x1f, 0x7e, 0xde, 0x80, 0xc1, 0x67, 0xc6, 0x75, 0x86, 0x0c, 0xf6, 0x8d, 0x7e, 0xf5, 0x40, 0x03, 0x12, 0xf2, 0xae, 0x05, 0x0c, 0x41, 0x2d, 0xdd, 0xdd, 0x88, 0x69, 0xce, 0x09, 0x3b, 0x2e, 0x11, 0xe3, 0x84, 0x95, 0x24, 0x5d, 0x04, 0x25, 0x2e, 0x44, 0x12, 0x9e, 0x99, 0x45, 0x36, 0x43, 0x52, 0x10, 0xe3, 0xb7, 0xd1, 0xeb, 0xb0, 0xc0, 0x15, 0xba, 0xc5, 0x69, 0x32, 0x85, 0x5e, 0xfe, 0xcc, 0x41, 0x21, 0x5d, 0x2c, 0xaf, 0x8b, 0xbe, 0xd6, 0xf0, 0xa2, 0xd8, 0x06, 0xd2, 0xbe, 0x34, 0x85, 0x76, 0x0d, 0xfa, 0x8c, 0x88, 0x17, 0x95, 0x81, 0x47, 0xe2, 0x6f, 0x6f, 0x6b, 0xfd, 0x91, 0xf0, 0x87, 0x4e, 0x14, 0x49, 0xc9, 0x74, 0x56, 0x53, 0x48, 0x8c, 0x06, 0x8a, 0xb8, 0x0f, 0xd9, 0x92, 0x27, 0xb5, 0xa7, 0x9c, 0x17, 0xfd, 0x26, 0x6b, 0x7b, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2420 = { .name = "ecdsa_brainpoolp512r1_sha512_2420", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2420_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2420_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2420_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 300 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2421 for ECDSA, tcId is 301 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2421_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2421_msg[] = { 0x37, 0x31, 0x38, 0x38, 0x39, 0x32, 0x36, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2421_sig[] = { 0x1b, 0x60, 0x26, 0x3f, 0x05, 0xe2, 0xe8, 0x18, 0xf6, 0x79, 0x41, 0xb1, 0xb5, 0xf5, 0xe8, 0x66, 0x8d, 0xbb, 0xa5, 0x1a, 0xaf, 0xc4, 0xdf, 0xdf, 0x9b, 0x49, 0x97, 0x9a, 0x80, 0xae, 0x0c, 0x51, 0xf2, 0xb1, 0xb2, 0x88, 0x24, 0xfd, 0x9d, 0x4b, 0x0a, 0x2d, 0x32, 0xb7, 0xe6, 0xf6, 0xe3, 0xea, 0xc5, 0x80, 0x59, 0x07, 0x52, 0xe1, 0x71, 0xbf, 0x1d, 0xed, 0x04, 0xda, 0x54, 0x17, 0xae, 0x29, 0x7a, 0xaf, 0xf6, 0x36, 0x85, 0xf5, 0x0e, 0x01, 0xfb, 0xb2, 0xd7, 0x27, 0xac, 0xa6, 0x63, 0x55, 0xc7, 0xf5, 0x24, 0xb3, 0xb0, 0xb7, 0xc5, 0x23, 0x01, 0xcb, 0x9b, 0x5a, 0xea, 0xa2, 0xb6, 0x23, 0x85, 0x42, 0x7c, 0xc6, 0xaa, 0xc1, 0x26, 0xe1, 0x65, 0x2f, 0xe0, 0xe6, 0x2c, 0xcb, 0x14, 0x79, 0xb1, 0xa4, 0x8a, 0xc7, 0xdd, 0x81, 0x73, 0xd7, 0x54, 0xd0, 0x6f, 0x50, 0x5d, 0xd4, 0x43, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2421 = { .name = "ecdsa_brainpoolp512r1_sha512_2421", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2421_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2421_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2421_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 301 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2422 for ECDSA, tcId is 302 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2422_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2422_msg[] = { 0x31, 0x37, 0x34, 0x33, 0x32, 0x32, 0x33, 0x34, 0x34, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2422_sig[] = { 0x86, 0x03, 0x9c, 0x7f, 0x13, 0x94, 0x31, 0xe6, 0x64, 0x8b, 0xeb, 0xeb, 0x5e, 0xac, 0xa3, 0xda, 0xc0, 0x7c, 0xe8, 0x07, 0xb5, 0x1c, 0x68, 0xe7, 0x59, 0x01, 0x20, 0xfa, 0xae, 0xe7, 0xfa, 0xe4, 0x28, 0x0b, 0x33, 0xb1, 0xa4, 0xdc, 0x97, 0x92, 0x01, 0x82, 0x3b, 0x31, 0xf1, 0x50, 0xef, 0x2d, 0x02, 0x85, 0xa4, 0x58, 0x86, 0x62, 0xb7, 0xc8, 0x7e, 0x50, 0x15, 0x5d, 0x40, 0x62, 0x74, 0xa7, 0x5e, 0xd7, 0xcb, 0xcb, 0x6b, 0xa0, 0x8d, 0x0a, 0x20, 0x51, 0x4f, 0x80, 0x15, 0x03, 0xca, 0x84, 0xb4, 0xa4, 0x09, 0xce, 0x8f, 0x55, 0x65, 0x16, 0x43, 0x01, 0x39, 0x99, 0xf8, 0xd3, 0xff, 0x65, 0xa9, 0xb0, 0xbf, 0x2a, 0x7c, 0x52, 0xf8, 0x4d, 0xd2, 0x94, 0x5d, 0x22, 0x67, 0x7f, 0xa4, 0x62, 0x27, 0xa6, 0x4c, 0x73, 0x59, 0x18, 0x0f, 0xbb, 0x4b, 0x15, 0x03, 0x3e, 0xe8, 0xa8, 0xab, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2422 = { .name = "ecdsa_brainpoolp512r1_sha512_2422", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2422_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2422_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2422_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 302 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2423 for ECDSA, tcId is 303 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2423_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2423_msg[] = { 0x32, 0x34, 0x30, 0x36, 0x30, 0x30, 0x35, 0x39, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2423_sig[] = { 0x70, 0x16, 0x46, 0x8a, 0x36, 0xf8, 0x55, 0xab, 0xbb, 0xb4, 0xd4, 0xd8, 0x59, 0x93, 0x7f, 0x5f, 0xae, 0x56, 0xa4, 0xda, 0x2c, 0x4d, 0x27, 0x19, 0xfa, 0x77, 0xe1, 0x11, 0xa5, 0x6c, 0xd3, 0xa2, 0x1e, 0x92, 0x67, 0x12, 0x01, 0x27, 0xdb, 0x5a, 0x67, 0xaf, 0xe2, 0xb3, 0x2c, 0x7b, 0x4c, 0x3b, 0xfe, 0x15, 0xd0, 0xad, 0x44, 0xc6, 0x0c, 0x40, 0x89, 0xa4, 0xfe, 0x4f, 0xa5, 0x3c, 0xdc, 0xa9, 0x7f, 0xcb, 0x61, 0xda, 0x56, 0x1c, 0xb7, 0xcb, 0x8a, 0xba, 0x8c, 0x07, 0xe7, 0x41, 0x74, 0x23, 0xbe, 0xd2, 0xe9, 0x97, 0x84, 0xb5, 0xf6, 0x46, 0x99, 0x00, 0x14, 0xe6, 0x87, 0x25, 0x52, 0xa0, 0x7e, 0x10, 0x34, 0xd8, 0x0e, 0x69, 0xb3, 0x19, 0xb7, 0xcd, 0x2c, 0x7b, 0x15, 0x75, 0x46, 0x32, 0x3d, 0xf4, 0xa2, 0xab, 0x84, 0x33, 0xc6, 0x23, 0xeb, 0x0c, 0x77, 0xd4, 0x15, 0x9f, 0x01, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2423 = { .name = "ecdsa_brainpoolp512r1_sha512_2423", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2423_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2423_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2423_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 303 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2424 for ECDSA, tcId is 304 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2424_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2424_msg[] = { 0x31, 0x36, 0x31, 0x34, 0x30, 0x33, 0x36, 0x39, 0x38, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2424_sig[] = { 0x43, 0xac, 0xf8, 0x4a, 0x07, 0x6d, 0x74, 0x0e, 0x99, 0x7b, 0xca, 0xa3, 0x5d, 0xec, 0x9e, 0x75, 0xdf, 0x3c, 0x0c, 0x4f, 0x25, 0xb2, 0x07, 0x5d, 0xaf, 0x07, 0x7d, 0xe6, 0x0b, 0x5b, 0x9f, 0xb7, 0xf7, 0x84, 0xa6, 0x02, 0x76, 0x99, 0xa2, 0x16, 0xa0, 0x47, 0xa2, 0x13, 0x5a, 0x3b, 0x53, 0x0f, 0xd8, 0xfa, 0x00, 0x77, 0x33, 0x8d, 0x4d, 0xc8, 0x5f, 0xbb, 0xaa, 0xce, 0xb6, 0x64, 0x10, 0x22, 0x80, 0x7a, 0x3c, 0xdf, 0xc0, 0xf3, 0x3b, 0xbe, 0x7a, 0x5a, 0x52, 0xf7, 0xe4, 0x78, 0x7c, 0x67, 0x34, 0x0d, 0x95, 0x8b, 0xaf, 0x0d, 0x95, 0x7d, 0x01, 0x5c, 0x73, 0xc9, 0xc8, 0xd0, 0xb6, 0x0f, 0x87, 0xa4, 0x26, 0xbf, 0xd2, 0xc9, 0x20, 0x9f, 0xa7, 0xf5, 0xfa, 0xb1, 0xb0, 0x5a, 0x88, 0x60, 0x85, 0x71, 0x71, 0x40, 0x07, 0x14, 0x08, 0x1b, 0x6f, 0x6e, 0x73, 0x3f, 0x38, 0x0c, 0x39, 0x63, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2424 = { .name = "ecdsa_brainpoolp512r1_sha512_2424", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2424_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2424_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2424_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 304 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2425 for ECDSA, tcId is 305 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2425_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2425_msg[] = { 0x32, 0x30, 0x39, 0x35, 0x34, 0x32, 0x35, 0x36, 0x38, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2425_sig[] = { 0x85, 0x1f, 0xa8, 0x85, 0x95, 0x49, 0x8d, 0xd5, 0xa5, 0xfb, 0x5a, 0x07, 0x10, 0xe0, 0x2f, 0xee, 0x1a, 0x02, 0x3e, 0x4b, 0x4a, 0xac, 0xfe, 0xba, 0x03, 0xf7, 0xc4, 0xc1, 0x4a, 0x8f, 0xb4, 0x33, 0x93, 0x4e, 0xa2, 0x33, 0xe5, 0xd2, 0x7d, 0xe1, 0x55, 0xda, 0xca, 0x4d, 0x4e, 0x38, 0x43, 0xf0, 0xf2, 0xcd, 0x58, 0x61, 0x70, 0x72, 0x8a, 0x2d, 0x4c, 0xe6, 0x52, 0x23, 0x58, 0x0c, 0xec, 0x66, 0x17, 0x31, 0xb6, 0xc0, 0x02, 0x00, 0xf4, 0x47, 0x4d, 0x4e, 0xa2, 0x04, 0x67, 0x75, 0xd9, 0x35, 0x0e, 0x45, 0xf2, 0xab, 0xd4, 0x5b, 0xbc, 0xc1, 0x16, 0x3c, 0x77, 0xde, 0xae, 0xaf, 0xc9, 0x42, 0x10, 0x98, 0x5b, 0x74, 0x66, 0xcf, 0x61, 0xbc, 0x78, 0xd5, 0x9b, 0xdd, 0x24, 0x39, 0xaa, 0x1c, 0x7d, 0xda, 0xc7, 0x1e, 0x00, 0x72, 0xd7, 0x3d, 0x87, 0x6a, 0x14, 0xf3, 0x26, 0x1a, 0xf7, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2425 = { .name = "ecdsa_brainpoolp512r1_sha512_2425", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2425_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2425_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2425_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 305 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2426 for ECDSA, tcId is 306 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2426_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2426_msg[] = { 0x31, 0x30, 0x30, 0x38, 0x30, 0x39, 0x38, 0x39, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2426_sig[] = { 0x78, 0x45, 0x6d, 0x35, 0x83, 0xb9, 0x3f, 0xba, 0x20, 0x9d, 0x6f, 0xaf, 0x73, 0x63, 0xf8, 0xe8, 0x78, 0x66, 0xcc, 0xe8, 0xf1, 0xa8, 0xf7, 0x56, 0x52, 0x0d, 0x5f, 0xc7, 0xd2, 0x2d, 0x36, 0x94, 0x08, 0x75, 0x33, 0x73, 0xa9, 0x99, 0xc8, 0xe5, 0xba, 0x58, 0x17, 0xc6, 0x1f, 0xf9, 0xa3, 0xa0, 0xa9, 0x80, 0x41, 0x21, 0xa0, 0x01, 0x04, 0xc7, 0xc1, 0x5d, 0xda, 0x9b, 0x60, 0xbd, 0x74, 0x4d, 0x67, 0xe1, 0x49, 0xae, 0x6a, 0x20, 0x6d, 0x3d, 0xee, 0xee, 0xaf, 0x78, 0xf9, 0x0f, 0xc5, 0xfc, 0x69, 0xc0, 0xc1, 0x01, 0x27, 0x35, 0x12, 0xad, 0x42, 0xd5, 0xfd, 0x39, 0x93, 0xba, 0xbc, 0x67, 0x1d, 0xe9, 0xc4, 0xaa, 0xc0, 0x15, 0x31, 0x0b, 0xe8, 0xeb, 0x6d, 0x83, 0x12, 0x1b, 0x97, 0x09, 0xb9, 0x3c, 0xd4, 0x37, 0x63, 0xbf, 0xba, 0x9d, 0xd8, 0x39, 0x76, 0xa9, 0x1a, 0x75, 0xf5, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2426 = { .name = "ecdsa_brainpoolp512r1_sha512_2426", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2426_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2426_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2426_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 306 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2427 for ECDSA, tcId is 307 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2427_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2427_msg[] = { 0x31, 0x35, 0x37, 0x34, 0x31, 0x34, 0x37, 0x39, 0x32, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2427_sig[] = { 0x5f, 0xfc, 0x31, 0xa2, 0xe8, 0x16, 0x87, 0x48, 0xc6, 0x29, 0xe0, 0x69, 0x01, 0x61, 0xcc, 0x62, 0x49, 0x68, 0x0c, 0x03, 0xde, 0x5c, 0xba, 0xd4, 0x4b, 0x12, 0x1a, 0xa8, 0x56, 0xf5, 0x57, 0xcf, 0x9a, 0x84, 0x98, 0x3e, 0x49, 0x3f, 0x40, 0xe2, 0xc0, 0xf5, 0x98, 0x73, 0x8b, 0x0f, 0x6e, 0xc8, 0x57, 0x5b, 0x66, 0xe4, 0xc4, 0xe5, 0x9b, 0x6b, 0x63, 0x99, 0x60, 0x58, 0xe4, 0xac, 0xa2, 0xaa, 0x41, 0xe0, 0x85, 0x7e, 0x6e, 0x95, 0x9c, 0x55, 0xbd, 0x80, 0x76, 0x29, 0x36, 0x1a, 0xc4, 0x1d, 0xde, 0x64, 0x0f, 0xea, 0xcd, 0xc2, 0x12, 0xd7, 0xcd, 0x2e, 0x1d, 0xcb, 0x9a, 0x3a, 0x9a, 0x4e, 0x93, 0x3c, 0xf8, 0xe9, 0x1f, 0xc7, 0xb1, 0x25, 0x7b, 0x7a, 0x4f, 0x96, 0x96, 0x28, 0x3e, 0x06, 0xe3, 0x2f, 0x97, 0x69, 0x87, 0xdf, 0x86, 0xda, 0x2c, 0x87, 0x97, 0x8b, 0x34, 0xcc, 0x5e, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2427 = { .name = "ecdsa_brainpoolp512r1_sha512_2427", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2427_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2427_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2427_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 307 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2428 for ECDSA, tcId is 308 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2428_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2428_msg[] = { 0x32, 0x38, 0x36, 0x36, 0x37, 0x37, 0x31, 0x35, 0x32, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2428_sig[] = { 0x31, 0x49, 0x2b, 0x08, 0x88, 0xf6, 0xff, 0xf5, 0x2d, 0x24, 0x7b, 0xee, 0x17, 0x34, 0xc8, 0x42, 0x5c, 0x35, 0x60, 0x6c, 0x9d, 0x8c, 0xc6, 0x3d, 0xf3, 0x82, 0xdc, 0xe5, 0x22, 0x4c, 0x8d, 0x55, 0xff, 0x2b, 0xa6, 0xcf, 0xa2, 0x9d, 0x09, 0x50, 0x01, 0x24, 0xe8, 0x57, 0x6a, 0xbb, 0xd0, 0xd7, 0x10, 0xba, 0xeb, 0x09, 0x9e, 0xfe, 0xf0, 0x2f, 0xe8, 0x10, 0xd4, 0xa1, 0x9d, 0xc2, 0xca, 0x44, 0x24, 0xd3, 0xb3, 0x20, 0xde, 0xf3, 0x94, 0x3a, 0xc8, 0x56, 0x68, 0x0e, 0x00, 0x89, 0x1c, 0x28, 0xda, 0x01, 0x18, 0x40, 0xaf, 0x29, 0xf4, 0xf2, 0xc8, 0x88, 0x4a, 0x02, 0x24, 0x63, 0xa1, 0xda, 0x9d, 0xbc, 0xcb, 0x11, 0xbd, 0x4b, 0x72, 0x0e, 0x72, 0xb9, 0xaf, 0xa8, 0xb6, 0xb8, 0x71, 0xa8, 0x6f, 0x12, 0xf8, 0x75, 0xcc, 0x1c, 0x09, 0x07, 0x7f, 0xcc, 0x15, 0xa9, 0x0f, 0x40, 0x2a, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2428 = { .name = "ecdsa_brainpoolp512r1_sha512_2428", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2428_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2428_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2428_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 308 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2429 for ECDSA, tcId is 309 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2429_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2429_msg[] = { 0x31, 0x36, 0x39, 0x34, 0x32, 0x38, 0x30, 0x37, 0x38, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2429_sig[] = { 0x8e, 0xe3, 0xad, 0x5b, 0x61, 0xde, 0x2a, 0x1e, 0x3a, 0x10, 0xaa, 0xa2, 0xb5, 0xb7, 0xc1, 0xf9, 0xf7, 0x90, 0xeb, 0xcd, 0x11, 0x0a, 0xfd, 0xcc, 0x08, 0xac, 0x9b, 0x70, 0xfe, 0x75, 0x30, 0xfd, 0xa9, 0xce, 0x94, 0xe4, 0x40, 0x58, 0x74, 0x0e, 0x17, 0xb7, 0x30, 0x83, 0x31, 0xdd, 0xb0, 0xce, 0xb0, 0xbc, 0x69, 0xb9, 0x49, 0x44, 0x21, 0x22, 0x71, 0x35, 0x82, 0xe4, 0x94, 0x1a, 0xec, 0xd3, 0x32, 0x5d, 0xfe, 0xfb, 0x8f, 0x46, 0x2d, 0x5e, 0x7d, 0xc4, 0x12, 0x4e, 0xf0, 0x71, 0x9f, 0xef, 0x76, 0x49, 0xd4, 0x70, 0xf3, 0xf1, 0x55, 0x51, 0x72, 0x48, 0x4b, 0x03, 0x04, 0xe7, 0x5b, 0xa1, 0x22, 0x80, 0x2d, 0x1a, 0x85, 0x97, 0xb4, 0x62, 0xb3, 0x45, 0xf3, 0x4e, 0x17, 0xdf, 0x4a, 0x3c, 0x25, 0xea, 0xea, 0x26, 0x9e, 0xa1, 0x1e, 0xf5, 0xb0, 0x42, 0x44, 0x0b, 0x5c, 0xab, 0xb7, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2429 = { .name = "ecdsa_brainpoolp512r1_sha512_2429", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2429_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2429_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2429_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 309 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2430 for ECDSA, tcId is 310 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2430_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2430_msg[] = { 0x39, 0x39, 0x32, 0x31, 0x36, 0x39, 0x32, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2430_sig[] = { 0x55, 0x6b, 0x51, 0x39, 0x02, 0x29, 0x14, 0x50, 0xe9, 0xa2, 0xb1, 0x26, 0xb8, 0x58, 0xe1, 0xe2, 0xbb, 0x0a, 0x23, 0xe2, 0xee, 0x90, 0x46, 0x77, 0xd9, 0xe5, 0xea, 0xc8, 0x8a, 0x25, 0xf0, 0x14, 0x08, 0xb8, 0xf5, 0x12, 0xd9, 0x13, 0x52, 0xc4, 0x3c, 0x51, 0x9d, 0x9d, 0x74, 0x57, 0x0b, 0x3d, 0x78, 0x36, 0x6d, 0xf4, 0x37, 0xa4, 0x29, 0x8b, 0x31, 0x1a, 0x39, 0xa6, 0x3c, 0x44, 0x2a, 0xbd, 0x7b, 0x84, 0x26, 0x25, 0x87, 0x89, 0x97, 0x1c, 0x56, 0xc5, 0x3d, 0x99, 0x7d, 0xcf, 0xa1, 0x27, 0x05, 0x43, 0xbc, 0x9f, 0x7c, 0x42, 0xca, 0x2e, 0xa2, 0xfa, 0xc0, 0x88, 0x52, 0xc4, 0x72, 0xbb, 0x2b, 0x28, 0x4a, 0xab, 0x59, 0xa4, 0xba, 0xaf, 0x0f, 0x2c, 0x98, 0x6a, 0x2c, 0x68, 0xfd, 0x3e, 0x6f, 0xc9, 0x1f, 0x1d, 0x28, 0xbe, 0x9b, 0x75, 0x77, 0xf7, 0x78, 0x4c, 0x58, 0x7f, 0x37, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2430 = { .name = "ecdsa_brainpoolp512r1_sha512_2430", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2430_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2430_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2430_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 310 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2431 for ECDSA, tcId is 311 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2431_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2431_msg[] = { 0x31, 0x31, 0x36, 0x30, 0x39, 0x34, 0x33, 0x39, 0x37, 0x39, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2431_sig[] = { 0x60, 0x55, 0x7b, 0x79, 0x3e, 0xfc, 0x6f, 0xd8, 0xe2, 0x2f, 0x6f, 0xb8, 0x80, 0xb9, 0xb2, 0x4f, 0x4c, 0xe9, 0x5b, 0x09, 0x0f, 0x69, 0x4f, 0xab, 0x28, 0x66, 0xbc, 0x18, 0xdd, 0x85, 0xed, 0x5f, 0x47, 0x9f, 0xa8, 0x96, 0xd8, 0x40, 0x92, 0xda, 0xdc, 0xb4, 0xb9, 0x68, 0x6a, 0xd8, 0x07, 0x4d, 0x69, 0xbe, 0x84, 0x29, 0xea, 0xad, 0x63, 0xd0, 0x3c, 0x63, 0xc6, 0x21, 0x7f, 0xd7, 0xcc, 0x71, 0x78, 0x19, 0x87, 0x9f, 0x51, 0x05, 0xf3, 0x0c, 0xe8, 0xef, 0xd8, 0x7c, 0x04, 0x42, 0x79, 0xae, 0x9e, 0xac, 0x32, 0x55, 0x32, 0x7d, 0x9a, 0x8b, 0x08, 0x3e, 0x9d, 0xcd, 0xbb, 0xda, 0x1e, 0x01, 0xec, 0xbc, 0x9e, 0xa6, 0x90, 0xbf, 0xab, 0x77, 0x1b, 0x63, 0x31, 0x8a, 0x96, 0x49, 0x42, 0xf4, 0x57, 0x78, 0x47, 0xf5, 0x71, 0xb6, 0x79, 0x36, 0x33, 0x11, 0xce, 0x1b, 0xd2, 0x0a, 0x2a, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2431 = { .name = "ecdsa_brainpoolp512r1_sha512_2431", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2431_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2431_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2431_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 311 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2432 for ECDSA, tcId is 312 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2432_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2432_msg[] = { 0x37, 0x31, 0x38, 0x36, 0x31, 0x36, 0x32, 0x31, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2432_sig[] = { 0x96, 0xa8, 0xb7, 0x36, 0xb4, 0xd1, 0xc2, 0xe4, 0x01, 0x32, 0xb0, 0xc1, 0xdc, 0x35, 0x1c, 0x70, 0x0b, 0x62, 0xdb, 0x81, 0xe8, 0xbb, 0x39, 0xaa, 0x71, 0x7a, 0x1e, 0xc0, 0x25, 0x8e, 0xb9, 0x2d, 0xa8, 0x19, 0xdf, 0x01, 0x17, 0xa7, 0x04, 0x7e, 0x6c, 0x33, 0x54, 0x9d, 0x38, 0x48, 0xd6, 0xee, 0xa3, 0xf7, 0x25, 0xaa, 0x39, 0xb0, 0x32, 0x22, 0x46, 0x3f, 0xf2, 0x46, 0xe8, 0x96, 0x64, 0x21, 0x6b, 0xb7, 0xc1, 0xe5, 0xfd, 0xe9, 0x8b, 0x5e, 0xab, 0x97, 0x61, 0x93, 0x68, 0x2c, 0xea, 0x86, 0x48, 0xdf, 0x80, 0xa6, 0x49, 0xc2, 0xad, 0x68, 0xe0, 0xb2, 0xed, 0xa5, 0xe2, 0xbe, 0xe9, 0xaa, 0x9b, 0x77, 0x3f, 0x4d, 0x62, 0x48, 0x6e, 0xdb, 0xb0, 0x9e, 0xcf, 0x43, 0x4c, 0x1a, 0xe0, 0xdb, 0xa2, 0x73, 0xf6, 0x8b, 0xfa, 0x0f, 0x98, 0x5c, 0xed, 0x5d, 0x7b, 0x01, 0x20, 0xed, 0x88, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2432 = { .name = "ecdsa_brainpoolp512r1_sha512_2432", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2432_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2432_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2432_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 312 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2433 for ECDSA, tcId is 313 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2433_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2433_msg[] = { 0x33, 0x32, 0x39, 0x34, 0x33, 0x34, 0x37, 0x31, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2433_sig[] = { 0x4d, 0x9d, 0x07, 0xd3, 0xa4, 0x5f, 0x1c, 0x91, 0x36, 0x34, 0x71, 0x3d, 0x7b, 0xa7, 0x4f, 0xfb, 0xd3, 0xcd, 0x11, 0x4a, 0xe7, 0x5f, 0x17, 0x8f, 0xe7, 0xac, 0x7d, 0xef, 0xce, 0x73, 0x14, 0x81, 0x8b, 0x61, 0x67, 0x76, 0x0c, 0xb6, 0xe7, 0xd0, 0xa2, 0x4f, 0x42, 0x7d, 0x8e, 0xee, 0x60, 0x12, 0xb5, 0x2c, 0x68, 0x38, 0x83, 0xbd, 0x97, 0xe3, 0x51, 0x40, 0x5c, 0x93, 0x7e, 0x4f, 0x6e, 0xda, 0x27, 0xbc, 0xb6, 0x29, 0xe3, 0x10, 0x66, 0xdd, 0x6a, 0x4c, 0x65, 0x43, 0x2d, 0x39, 0xc2, 0x5a, 0xdd, 0x00, 0xbf, 0xa3, 0x69, 0xd4, 0x8b, 0x0e, 0x48, 0x20, 0xa1, 0x9f, 0x08, 0x1e, 0x9e, 0xda, 0x97, 0x78, 0x75, 0x63, 0x6a, 0x8c, 0xf9, 0x84, 0x01, 0x22, 0xd5, 0xe1, 0xbb, 0x3c, 0xea, 0x5f, 0xef, 0xe0, 0x20, 0x3f, 0x60, 0x16, 0x16, 0xd6, 0xae, 0xc8, 0x20, 0xa1, 0x58, 0x05, 0x90, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2433 = { .name = "ecdsa_brainpoolp512r1_sha512_2433", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2433_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2433_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2433_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 313 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2434 for ECDSA, tcId is 314 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2434_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2434_msg[] = { 0x31, 0x38, 0x35, 0x31, 0x34, 0x34, 0x35, 0x35, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2434_sig[] = { 0x91, 0x51, 0xeb, 0x10, 0x14, 0x55, 0x7b, 0x00, 0xc8, 0xf2, 0x88, 0x92, 0xa2, 0x91, 0x1f, 0x5d, 0x67, 0xd5, 0x93, 0x96, 0xa9, 0x3d, 0xa4, 0x32, 0x7d, 0x00, 0x59, 0xfb, 0xa7, 0x67, 0xb9, 0x7d, 0xed, 0xd5, 0x2e, 0x0c, 0xc8, 0x5e, 0x0b, 0xf8, 0x98, 0x8c, 0x7e, 0xec, 0x23, 0x10, 0x08, 0xa0, 0xf9, 0x72, 0xd5, 0x11, 0x39, 0xa2, 0xfe, 0x12, 0xb7, 0x55, 0x91, 0xc0, 0x71, 0xfc, 0xe9, 0xec, 0xaa, 0x89, 0xb5, 0x92, 0xfd, 0x30, 0x93, 0x27, 0xe6, 0xc9, 0x11, 0xe2, 0xdf, 0x0d, 0x95, 0xfe, 0x99, 0xbf, 0x01, 0xde, 0x32, 0x6a, 0x9f, 0xf0, 0x66, 0x48, 0xa3, 0x21, 0xa3, 0x63, 0xa7, 0x9e, 0x7b, 0xd5, 0xb0, 0x51, 0xe0, 0x16, 0x0f, 0xef, 0x18, 0xab, 0x81, 0x40, 0x31, 0xa0, 0x76, 0x01, 0xa6, 0x78, 0x3c, 0xc4, 0xef, 0xc6, 0x8c, 0x68, 0x1d, 0x2d, 0xf6, 0x48, 0xfb, 0xc5, 0x47, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2434 = { .name = "ecdsa_brainpoolp512r1_sha512_2434", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2434_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2434_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2434_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 314 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2435 for ECDSA, tcId is 315 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2435_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2435_msg[] = { 0x34, 0x37, 0x36, 0x30, 0x34, 0x33, 0x39, 0x33, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2435_sig[] = { 0x37, 0x4e, 0x3d, 0x3b, 0xff, 0x57, 0xb2, 0xa0, 0xf9, 0x24, 0xaa, 0x19, 0xed, 0x2c, 0x8d, 0x44, 0x42, 0x9f, 0x8f, 0x8a, 0x62, 0x93, 0x4a, 0xda, 0x5c, 0x0b, 0xd8, 0x3c, 0x2c, 0xa9, 0xef, 0x25, 0x38, 0xf1, 0x86, 0xf2, 0x86, 0x36, 0x80, 0x18, 0x3c, 0x51, 0x32, 0x4e, 0xf4, 0xca, 0xc5, 0xa9, 0x45, 0xdc, 0xb9, 0x08, 0xac, 0x40, 0xf4, 0xdb, 0xcb, 0x1d, 0x20, 0x45, 0xca, 0xc6, 0x58, 0x54, 0x2b, 0xa1, 0xc3, 0x96, 0x03, 0x86, 0x17, 0x77, 0x23, 0x80, 0x9d, 0xdd, 0xab, 0x3f, 0x80, 0x6a, 0x10, 0xda, 0x5e, 0x74, 0xc6, 0x7c, 0x9c, 0x46, 0x0b, 0x6c, 0x41, 0x63, 0xf3, 0x72, 0x30, 0xc3, 0x55, 0xcd, 0x4b, 0x09, 0x8a, 0xad, 0x23, 0xda, 0x52, 0x4e, 0x1e, 0x70, 0x40, 0x36, 0x3f, 0x4d, 0x72, 0x8f, 0xaf, 0xe4, 0xd9, 0x52, 0xad, 0x5f, 0xf1, 0x37, 0x0c, 0x10, 0x10, 0xef, 0xbf, 0x09, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2435 = { .name = "ecdsa_brainpoolp512r1_sha512_2435", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2435_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2435_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2435_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 315 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2436 for ECDSA, tcId is 316 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2436_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2436_msg[] = { 0x32, 0x35, 0x36, 0x37, 0x33, 0x37, 0x38, 0x37, 0x34, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2436_sig[] = { 0x60, 0xf1, 0xa5, 0xbc, 0x4a, 0x35, 0xf0, 0x01, 0x11, 0x4e, 0x5d, 0x71, 0x05, 0xc2, 0x1d, 0x6e, 0x51, 0x61, 0xad, 0xeb, 0x5d, 0x1d, 0x88, 0x25, 0x17, 0x91, 0xfd, 0x08, 0xe0, 0x19, 0x2a, 0x6f, 0xc9, 0x4e, 0xde, 0x21, 0x09, 0x28, 0x83, 0x89, 0xb3, 0xea, 0x9d, 0x00, 0x57, 0x5b, 0x66, 0xec, 0x0c, 0xee, 0x5f, 0x1e, 0x53, 0x1c, 0x05, 0xc0, 0x88, 0x54, 0x27, 0xa3, 0xbd, 0x65, 0xd6, 0x47, 0x5f, 0x62, 0xc3, 0x5c, 0xfb, 0xaa, 0x2a, 0xef, 0xde, 0xc1, 0x13, 0x33, 0x5f, 0xc5, 0xf5, 0x64, 0x6e, 0xd8, 0x58, 0xda, 0x0b, 0xe4, 0x85, 0x21, 0x77, 0x13, 0x5d, 0x7e, 0xe6, 0x2c, 0x12, 0x20, 0xce, 0x44, 0x7c, 0xb6, 0xab, 0x26, 0xcb, 0xf5, 0x43, 0x21, 0x5b, 0x2c, 0x15, 0xaf, 0x42, 0xd9, 0x5a, 0x51, 0x5b, 0x72, 0x50, 0xfb, 0x5e, 0xd7, 0x92, 0x04, 0xa5, 0x7c, 0xb0, 0x4f, 0x65, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2436 = { .name = "ecdsa_brainpoolp512r1_sha512_2436", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2436_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2436_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2436_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 316 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2437 for ECDSA, tcId is 317 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2437_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2437_msg[] = { 0x35, 0x37, 0x33, 0x39, 0x39, 0x33, 0x34, 0x39, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2437_sig[] = { 0x4b, 0xec, 0xd6, 0x57, 0xfd, 0x4c, 0x98, 0x66, 0xfb, 0xdd, 0xa4, 0xcc, 0x07, 0xc4, 0xcd, 0x52, 0x89, 0x64, 0xb1, 0x20, 0xb4, 0x13, 0x7a, 0xfe, 0x1c, 0x14, 0x27, 0x58, 0xd0, 0x48, 0x03, 0x98, 0xa1, 0xfe, 0x6e, 0x20, 0x3b, 0x56, 0x46, 0x57, 0xc9, 0x9e, 0xf0, 0x3a, 0x04, 0x4f, 0x89, 0xc4, 0xa5, 0xbc, 0xfb, 0x3c, 0xfa, 0x66, 0x59, 0x67, 0x1f, 0xcf, 0xa1, 0xd8, 0x38, 0x4b, 0x82, 0xd9, 0xa1, 0x64, 0x92, 0x56, 0xd0, 0xc4, 0x3f, 0x7f, 0x6c, 0x19, 0x26, 0x77, 0x41, 0x73, 0x89, 0x03, 0xd8, 0x29, 0x76, 0xcc, 0x3a, 0x67, 0x8b, 0x48, 0x0c, 0x50, 0xb5, 0x2a, 0xea, 0x3d, 0x49, 0x3a, 0x80, 0xc2, 0x0f, 0xfd, 0xe7, 0xb5, 0x7f, 0x92, 0x91, 0xb2, 0x2b, 0xe5, 0xb4, 0x13, 0x0d, 0xce, 0xfc, 0x82, 0xfe, 0xe7, 0x0b, 0xc3, 0xf1, 0xf3, 0x08, 0xab, 0x0a, 0x84, 0x03, 0x82, 0x8e, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2437 = { .name = "ecdsa_brainpoolp512r1_sha512_2437", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2437_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2437_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2437_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 317 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2438 for ECDSA, tcId is 318 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2438_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2438_msg[] = { 0x33, 0x34, 0x37, 0x38, 0x33, 0x36, 0x36, 0x31, 0x33, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2438_sig[] = { 0x6b, 0x3f, 0x15, 0x33, 0xf5, 0x3f, 0xda, 0x74, 0x48, 0xa7, 0x10, 0xa4, 0xd0, 0xe3, 0xd8, 0x27, 0x8c, 0x96, 0xd6, 0x56, 0x63, 0x5a, 0x8e, 0xc9, 0xc8, 0x60, 0x85, 0xed, 0x23, 0x37, 0xb7, 0x33, 0x68, 0xf5, 0xc5, 0x93, 0x4a, 0x46, 0xd5, 0x9d, 0xc7, 0x9e, 0xe6, 0xc3, 0x34, 0x9f, 0xc7, 0x88, 0x74, 0xc0, 0x5f, 0x5e, 0x5e, 0xf8, 0x59, 0xea, 0xb0, 0x3d, 0xd8, 0x58, 0xd2, 0xc2, 0x8e, 0x85, 0x25, 0xcf, 0x5a, 0x2f, 0x26, 0x38, 0xeb, 0xf2, 0xe7, 0x62, 0x38, 0xbb, 0x54, 0xda, 0xb1, 0xe9, 0x6e, 0x9d, 0xe0, 0xd6, 0x7d, 0x55, 0x79, 0x15, 0x1e, 0x22, 0x56, 0xc9, 0x52, 0x7e, 0xbd, 0x4d, 0x38, 0x57, 0x73, 0x1f, 0xae, 0x84, 0xab, 0x3b, 0x56, 0xb7, 0x4b, 0xc8, 0x9c, 0x4a, 0x99, 0x63, 0x9b, 0x0c, 0x68, 0x7b, 0x2a, 0x13, 0x3b, 0xf7, 0x70, 0x29, 0xd5, 0xab, 0xe4, 0xa5, 0xfd, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2438 = { .name = "ecdsa_brainpoolp512r1_sha512_2438", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2438_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2438_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2438_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 318 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2439 for ECDSA, tcId is 319 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2439_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2439_msg[] = { 0x36, 0x34, 0x39, 0x30, 0x35, 0x32, 0x36, 0x30, 0x32, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2439_sig[] = { 0x6f, 0xf4, 0xbe, 0x5d, 0xf3, 0xf1, 0x2c, 0xf2, 0xcb, 0x78, 0x16, 0x98, 0x5e, 0x9b, 0xa0, 0x09, 0x9c, 0xf5, 0x89, 0xa2, 0xa2, 0x23, 0x67, 0xab, 0xe0, 0x19, 0x32, 0x87, 0x89, 0xad, 0x50, 0x92, 0x10, 0x7d, 0x12, 0xdf, 0xed, 0x83, 0x52, 0xa1, 0xdd, 0x4a, 0xd9, 0x75, 0xe8, 0x61, 0xab, 0x9f, 0x9c, 0x64, 0xcb, 0x6b, 0x5b, 0xc9, 0x8c, 0x57, 0x86, 0x24, 0x7b, 0xdb, 0x4e, 0xa4, 0x82, 0x9d, 0x5e, 0xff, 0x29, 0xe6, 0xe2, 0x0e, 0x9e, 0xbf, 0x1a, 0xc6, 0x02, 0x58, 0x9c, 0x5b, 0xa6, 0x4b, 0x20, 0x20, 0xd1, 0xf2, 0xfe, 0xe8, 0x3e, 0x6d, 0x0c, 0x9c, 0xdd, 0xa1, 0xaf, 0x8d, 0x7c, 0x0a, 0xb8, 0xe5, 0xff, 0x05, 0x9e, 0xa4, 0x57, 0xb9, 0x03, 0xd2, 0xfd, 0xd4, 0x8f, 0xf8, 0x4a, 0x32, 0xe3, 0x38, 0xf0, 0x27, 0x05, 0x15, 0xfb, 0x0b, 0xa4, 0x4c, 0x00, 0x95, 0x24, 0xab, 0x78, 0x80, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2439 = { .name = "ecdsa_brainpoolp512r1_sha512_2439", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2439_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2439_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2439_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 319 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2440 for ECDSA, tcId is 320 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2440_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2440_msg[] = { 0x34, 0x37, 0x36, 0x33, 0x38, 0x38, 0x37, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2440_sig[] = { 0x56, 0xb9, 0x1c, 0xe3, 0x7f, 0x56, 0x0c, 0x1c, 0x65, 0x57, 0xf7, 0xfe, 0x00, 0x29, 0x75, 0x4f, 0x87, 0xc8, 0xf1, 0x0d, 0x92, 0xdc, 0x52, 0x5d, 0xfc, 0xb4, 0xcd, 0x5a, 0x96, 0x6b, 0xe0, 0xe8, 0xd9, 0x9f, 0xc0, 0x08, 0x51, 0xe8, 0x5b, 0x85, 0x82, 0x7d, 0x31, 0xc8, 0x61, 0x03, 0x4c, 0x20, 0xd2, 0xac, 0xb4, 0x9e, 0x4f, 0x1e, 0xeb, 0xd8, 0xe0, 0xd0, 0x21, 0x5d, 0x54, 0xdb, 0x2b, 0x11, 0x7c, 0xec, 0x29, 0x70, 0xfe, 0x9f, 0x29, 0x3c, 0x9d, 0x3a, 0x67, 0x2d, 0x37, 0x77, 0xff, 0x0e, 0xdf, 0x72, 0x85, 0x45, 0xbc, 0xbe, 0x00, 0x5c, 0x17, 0x8e, 0x0b, 0x40, 0x5f, 0xe4, 0x22, 0x3a, 0xab, 0x60, 0xdd, 0x44, 0x52, 0x1b, 0xe3, 0x21, 0x67, 0x2e, 0x81, 0x44, 0x58, 0x92, 0x91, 0x11, 0x30, 0xe6, 0x02, 0xa4, 0xb8, 0x35, 0x9b, 0xb3, 0x63, 0x2f, 0x90, 0x99, 0x18, 0xe0, 0x2a, 0x58, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2440 = { .name = "ecdsa_brainpoolp512r1_sha512_2440", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2440_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2440_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2440_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 320 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2441 for ECDSA, tcId is 321 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2441_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2441_msg[] = { 0x35, 0x37, 0x39, 0x30, 0x32, 0x30, 0x30, 0x38, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2441_sig[] = { 0x49, 0xcd, 0x57, 0xe2, 0x5c, 0xfb, 0x68, 0x04, 0x37, 0x05, 0x18, 0x49, 0x69, 0xe3, 0x09, 0x06, 0x69, 0x86, 0x05, 0x7d, 0x9c, 0x0b, 0x7a, 0x2f, 0x87, 0x76, 0x6a, 0xad, 0xcf, 0x76, 0xed, 0xa8, 0x02, 0x8d, 0x4e, 0xce, 0xac, 0xec, 0xed, 0x91, 0x53, 0xac, 0x97, 0x60, 0xf4, 0x75, 0x14, 0xdd, 0xdd, 0x33, 0x47, 0x3a, 0xf0, 0x9f, 0xf0, 0xdf, 0xc0, 0x00, 0xd5, 0x31, 0x30, 0xa2, 0x01, 0x0e, 0x73, 0xd5, 0x34, 0xbd, 0x76, 0x52, 0x26, 0x81, 0xe7, 0x11, 0x09, 0xc0, 0x7c, 0xb1, 0x7b, 0x09, 0xe6, 0x61, 0xc1, 0x1c, 0x51, 0x9b, 0x20, 0xfe, 0x6d, 0xb8, 0x0d, 0x47, 0x75, 0x6f, 0x84, 0x48, 0x40, 0xb7, 0xbe, 0x6b, 0x95, 0xc5, 0xdb, 0x49, 0x7e, 0x70, 0x6c, 0x5f, 0x58, 0xc7, 0x8a, 0x35, 0x0a, 0x8e, 0x80, 0x2e, 0xff, 0xbd, 0x55, 0xb5, 0x96, 0x7b, 0xdf, 0x87, 0xce, 0x75, 0xf0, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2441 = { .name = "ecdsa_brainpoolp512r1_sha512_2441", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2441_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2441_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2441_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 321 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2442 for ECDSA, tcId is 322 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2442_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2442_msg[] = { 0x35, 0x33, 0x34, 0x34, 0x37, 0x38, 0x37, 0x38, 0x34, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2442_sig[] = { 0x68, 0x0d, 0x7c, 0x82, 0xbb, 0xff, 0x29, 0x1b, 0xb7, 0x1f, 0x2d, 0xa5, 0x32, 0xf1, 0xa9, 0x31, 0xeb, 0x39, 0xa2, 0x22, 0x33, 0x6d, 0x5e, 0x40, 0x65, 0x7c, 0xc2, 0xfb, 0x12, 0x6b, 0x22, 0x47, 0xcf, 0x2d, 0xae, 0x23, 0x35, 0x55, 0x56, 0x4e, 0xa4, 0x42, 0x4e, 0xc3, 0x79, 0x12, 0xb3, 0x7e, 0x88, 0x66, 0xd4, 0x5c, 0x39, 0x3c, 0x6a, 0x91, 0xce, 0x13, 0x2d, 0xbc, 0x9f, 0x46, 0x63, 0x5d, 0x1f, 0x0c, 0x51, 0x58, 0x56, 0xa6, 0x2a, 0xf6, 0x8f, 0x0f, 0x23, 0x14, 0x5a, 0xad, 0x92, 0xa7, 0x7d, 0x71, 0x07, 0xd8, 0xd8, 0xaa, 0x46, 0xca, 0xbc, 0xc7, 0x2b, 0x2c, 0x08, 0x21, 0x85, 0xdb, 0x1d, 0x75, 0xd1, 0x54, 0x6a, 0x4e, 0x6c, 0xf5, 0x27, 0xc6, 0x9f, 0xe5, 0x2c, 0xb7, 0x6e, 0xe1, 0x5e, 0xaa, 0x62, 0x04, 0x44, 0xb6, 0xf2, 0x72, 0xb4, 0x02, 0x76, 0x35, 0xeb, 0xe8, 0x36, 0x76, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2442 = { .name = "ecdsa_brainpoolp512r1_sha512_2442", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2442_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2442_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2442_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 322 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2443 for ECDSA, tcId is 323 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2443_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2443_msg[] = { 0x31, 0x39, 0x32, 0x36, 0x36, 0x34, 0x31, 0x30, 0x39, 0x32, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2443_sig[] = { 0x59, 0xff, 0xf5, 0xae, 0x97, 0x29, 0xb2, 0x1c, 0x38, 0x9a, 0x12, 0x70, 0x23, 0x60, 0xac, 0xa2, 0x57, 0x5e, 0xd4, 0xa4, 0x49, 0x22, 0xe1, 0x7d, 0xe5, 0x7c, 0xe9, 0x39, 0x79, 0xf1, 0x95, 0x56, 0xde, 0x0e, 0x25, 0x58, 0x1c, 0xfc, 0x98, 0xc1, 0xa6, 0x8e, 0xf0, 0x01, 0xa7, 0xf8, 0xd1, 0x57, 0xe7, 0x59, 0x1b, 0xae, 0xa4, 0x4e, 0x00, 0x3c, 0x45, 0x4e, 0x94, 0x1b, 0xbf, 0x9e, 0x5f, 0x7e, 0x10, 0x91, 0x96, 0xa8, 0x0b, 0x32, 0xa0, 0xa5, 0x7a, 0x7b, 0xcd, 0x3a, 0x6c, 0xe7, 0xf9, 0x25, 0xd1, 0x4f, 0x51, 0xc6, 0x15, 0x2a, 0xd8, 0x66, 0xd3, 0x37, 0x30, 0x08, 0xd6, 0x50, 0xb5, 0xaf, 0x7a, 0x25, 0xe2, 0xbf, 0xbd, 0x59, 0xb6, 0x37, 0x1f, 0xff, 0xec, 0xfd, 0xe1, 0x16, 0xd2, 0xa3, 0x6a, 0x8d, 0x1f, 0xe9, 0x17, 0x8b, 0xa3, 0xb3, 0xf3, 0x7c, 0x09, 0xb2, 0x71, 0xa5, 0xb0, 0x50, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2443 = { .name = "ecdsa_brainpoolp512r1_sha512_2443", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2443_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2443_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2443_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 323 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2444 for ECDSA, tcId is 324 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2444_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2444_msg[] = { 0x33, 0x37, 0x30, 0x33, 0x39, 0x31, 0x35, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2444_sig[] = { 0x66, 0xef, 0x24, 0x6c, 0x7b, 0x80, 0xb5, 0x6e, 0x0e, 0xa7, 0x83, 0xac, 0x73, 0x71, 0x51, 0xc7, 0x36, 0x10, 0x21, 0x8d, 0x00, 0xc9, 0x36, 0xf4, 0xc1, 0x8d, 0x5a, 0x6c, 0x44, 0xf3, 0x5e, 0xe1, 0x9d, 0x8a, 0xa1, 0x57, 0x65, 0xdf, 0xfd, 0xfe, 0x51, 0xaa, 0xa3, 0x31, 0x12, 0x3e, 0xe4, 0xc5, 0xc8, 0xd6, 0x72, 0x63, 0xf6, 0x95, 0x56, 0x1e, 0x7c, 0xf7, 0xe6, 0x48, 0xef, 0xb7, 0xa4, 0xf7, 0x2a, 0x0a, 0xc4, 0x9a, 0x98, 0x4c, 0xbd, 0xf6, 0x6c, 0x59, 0xc6, 0x5d, 0xee, 0x9a, 0x3c, 0xc5, 0x81, 0x6b, 0x78, 0x82, 0xaf, 0x45, 0x34, 0x1e, 0x9d, 0xc5, 0x14, 0xae, 0xfa, 0xec, 0xd2, 0x46, 0x8c, 0xd5, 0xb9, 0x67, 0xa5, 0x36, 0x54, 0x88, 0x00, 0x46, 0xe1, 0x8e, 0x1a, 0xdc, 0x99, 0x1f, 0xe1, 0xb7, 0xbc, 0x0e, 0x53, 0x79, 0x17, 0x9b, 0xa3, 0xdc, 0x84, 0xbc, 0xee, 0x12, 0xc6, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2444 = { .name = "ecdsa_brainpoolp512r1_sha512_2444", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2444_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2444_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2444_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 324 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2445 for ECDSA, tcId is 325 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2445_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2445_msg[] = { 0x38, 0x31, 0x35, 0x34, 0x35, 0x37, 0x37, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2445_sig[] = { 0x74, 0x69, 0x76, 0x7e, 0x75, 0x12, 0xc7, 0xd2, 0x94, 0xd8, 0x32, 0x90, 0x87, 0x1b, 0x5c, 0xb7, 0xec, 0x5d, 0x6e, 0xbf, 0x05, 0xb2, 0xd7, 0x65, 0x18, 0x39, 0x72, 0x9b, 0x87, 0x27, 0x81, 0x8e, 0x9e, 0x53, 0x08, 0x75, 0xe9, 0x01, 0xb7, 0x59, 0xe9, 0x2c, 0x79, 0x86, 0x10, 0xd4, 0x47, 0x35, 0x91, 0xb2, 0xcf, 0xb8, 0x74, 0x28, 0xa2, 0xf0, 0xb1, 0xaf, 0xb2, 0x5d, 0x25, 0xf9, 0x86, 0x8c, 0x13, 0xaa, 0x65, 0xad, 0x34, 0x38, 0x8e, 0xe1, 0x02, 0xce, 0x4f, 0xe0, 0xf3, 0x80, 0x1d, 0xb5, 0xf1, 0xbe, 0x38, 0xb8, 0xf5, 0x91, 0x94, 0x6a, 0xe5, 0x5b, 0xe7, 0x15, 0x9a, 0x2e, 0x04, 0x7d, 0x03, 0x76, 0x18, 0xce, 0x45, 0xa0, 0x98, 0x0c, 0x9f, 0x68, 0x6a, 0x7b, 0xee, 0x7f, 0xe8, 0xc7, 0x88, 0x22, 0x62, 0xc4, 0xf7, 0xc6, 0x60, 0x85, 0x96, 0xe1, 0x29, 0x00, 0xce, 0xa6, 0x20, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2445 = { .name = "ecdsa_brainpoolp512r1_sha512_2445", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2445_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2445_msg, .msglen = 8, .sig = ecdsa_brainpoolp512r1_sha512_2445_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 325 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2446 for ECDSA, tcId is 326 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2446_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2446_msg[] = { 0x31, 0x39, 0x35, 0x35, 0x33, 0x30, 0x33, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2446_sig[] = { 0x2d, 0xde, 0x8d, 0xae, 0x88, 0x3b, 0x5f, 0x5b, 0x82, 0x22, 0xb2, 0x61, 0xff, 0x19, 0x8b, 0x0d, 0x46, 0x15, 0xb2, 0x23, 0x73, 0x53, 0x80, 0x03, 0x1e, 0x37, 0x60, 0x3d, 0x97, 0x66, 0xc3, 0xa6, 0x60, 0xcc, 0xba, 0xe3, 0x50, 0xd4, 0x09, 0x94, 0xeb, 0xb4, 0x9a, 0x09, 0xd8, 0xc9, 0x02, 0xbe, 0xac, 0xf8, 0xf0, 0xde, 0x1c, 0xa2, 0xb0, 0xa4, 0xa3, 0x1d, 0x00, 0xb5, 0x6b, 0xd8, 0x45, 0xa4, 0x66, 0x04, 0xfd, 0xe7, 0x0a, 0xc7, 0x61, 0x42, 0x01, 0x33, 0x62, 0x4d, 0xef, 0x5c, 0x44, 0xb5, 0xd5, 0xa5, 0x79, 0x5d, 0x44, 0x12, 0xdd, 0x73, 0x98, 0x3a, 0xef, 0x62, 0x90, 0x80, 0xae, 0x47, 0x63, 0x64, 0x97, 0x01, 0x8c, 0xd5, 0xd3, 0x1c, 0x8b, 0x85, 0xb2, 0xb0, 0x3d, 0x72, 0x17, 0x14, 0x88, 0x42, 0x9e, 0xaf, 0x4b, 0x82, 0x47, 0xaa, 0x6b, 0x01, 0x04, 0x4c, 0x0a, 0xe4, 0x61, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2446 = { .name = "ecdsa_brainpoolp512r1_sha512_2446", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2446_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2446_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2446_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 326 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2447 for ECDSA, tcId is 327 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2447_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2447_msg[] = { 0x31, 0x32, 0x36, 0x37, 0x38, 0x31, 0x30, 0x39, 0x30, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2447_sig[] = { 0x24, 0x5d, 0xbf, 0x6c, 0x53, 0xa2, 0xd7, 0x88, 0x1b, 0x8d, 0x15, 0x7a, 0x62, 0x00, 0xd9, 0xba, 0x32, 0x43, 0xe4, 0xd9, 0xc1, 0x2d, 0x3e, 0xde, 0xbd, 0x8f, 0xf9, 0xe1, 0x03, 0xc6, 0x15, 0x8f, 0x89, 0x6e, 0xd5, 0xbc, 0xab, 0x43, 0x38, 0x3c, 0xf6, 0xbe, 0xcd, 0xbc, 0xf0, 0x81, 0x60, 0x4a, 0x59, 0x55, 0x08, 0x17, 0x2b, 0xbf, 0x43, 0xf1, 0x52, 0xb6, 0x69, 0xc4, 0xf4, 0x1d, 0x21, 0xe5, 0xa1, 0xdf, 0xaf, 0x17, 0xa6, 0xe5, 0x51, 0xfe, 0x0b, 0xc0, 0xcc, 0x24, 0xca, 0xc5, 0xa8, 0x21, 0x4d, 0xbd, 0x75, 0x08, 0x60, 0xa6, 0x03, 0x00, 0x21, 0x0a, 0xe9, 0xdc, 0x4a, 0xa1, 0x60, 0xf7, 0x88, 0xdd, 0x58, 0xb8, 0x2f, 0x96, 0x88, 0x40, 0x75, 0x51, 0xb0, 0xa2, 0x0e, 0x36, 0x70, 0x83, 0xa1, 0xa0, 0xf9, 0x9c, 0x35, 0x71, 0x52, 0x28, 0xc2, 0x25, 0x2f, 0x0f, 0x0d, 0xdb, 0x25, 0x85, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2447 = { .name = "ecdsa_brainpoolp512r1_sha512_2447", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2447_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2447_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2447_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 327 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2448 for ECDSA, tcId is 328 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2448_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2448_msg[] = { 0x31, 0x31, 0x31, 0x38, 0x30, 0x37, 0x32, 0x30, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2448_sig[] = { 0x45, 0x50, 0xb9, 0x86, 0xfb, 0x04, 0xcc, 0x7f, 0xde, 0x0d, 0xc8, 0x5a, 0x95, 0xa1, 0x58, 0x17, 0x94, 0xb2, 0x52, 0x10, 0x20, 0x53, 0x2d, 0xc0, 0x0f, 0xb5, 0xed, 0x4b, 0x0e, 0xbd, 0x68, 0x34, 0xf1, 0x83, 0xf3, 0xc6, 0x2a, 0x57, 0x56, 0xbf, 0x5b, 0xd0, 0xb9, 0xa5, 0x16, 0xbc, 0x3d, 0x6c, 0x7e, 0x81, 0xef, 0xe5, 0x51, 0x16, 0x4b, 0x9d, 0xe0, 0xc1, 0x52, 0x93, 0x82, 0x95, 0xe2, 0xfb, 0x48, 0x59, 0x76, 0x25, 0x3d, 0x58, 0x03, 0x2d, 0x27, 0xed, 0x61, 0x56, 0xec, 0x15, 0xcf, 0x85, 0x34, 0x40, 0xdd, 0xec, 0xdf, 0x63, 0xbd, 0xb3, 0x04, 0xe1, 0xe7, 0x4d, 0x13, 0x9c, 0x13, 0x19, 0x67, 0x46, 0x64, 0xc5, 0xaa, 0xed, 0x9b, 0xb3, 0x04, 0x3a, 0x6e, 0x8a, 0xab, 0x1c, 0xa2, 0xe1, 0x5a, 0xfd, 0xb4, 0x5d, 0x33, 0x20, 0x04, 0x27, 0x50, 0xf9, 0xea, 0x82, 0x96, 0xfc, 0xd5, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2448 = { .name = "ecdsa_brainpoolp512r1_sha512_2448", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2448_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2448_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2448_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 328 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2449 for ECDSA, tcId is 329 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2449_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2449_msg[] = { 0x38, 0x33, 0x38, 0x31, 0x38, 0x36, 0x39, 0x32, 0x39, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2449_sig[] = { 0x53, 0x91, 0x83, 0xda, 0xde, 0xa6, 0x63, 0x0b, 0xd4, 0x41, 0x6a, 0x49, 0xa8, 0xd6, 0xe7, 0x79, 0x23, 0x03, 0xe1, 0xe4, 0x4d, 0x20, 0x28, 0x72, 0x6f, 0x84, 0x69, 0x7c, 0x49, 0x6c, 0x26, 0xda, 0xcc, 0xac, 0x5f, 0xc4, 0xa4, 0xad, 0x34, 0x86, 0x6e, 0x71, 0x8e, 0x90, 0x67, 0xc4, 0xaf, 0x1b, 0xc9, 0xe2, 0x2c, 0x70, 0xb9, 0x4e, 0x74, 0xf2, 0x82, 0x2f, 0xef, 0x92, 0x9e, 0x7b, 0xad, 0x56, 0x4a, 0xbb, 0x75, 0x51, 0x92, 0xa1, 0x8e, 0xfb, 0x2e, 0x72, 0xa2, 0xfb, 0x4e, 0xe5, 0x1e, 0x47, 0xdb, 0x6d, 0x3b, 0xb2, 0x1b, 0xe2, 0xdd, 0xef, 0xb8, 0xfc, 0xff, 0x5e, 0x08, 0x4a, 0x2d, 0x8c, 0x8c, 0x7a, 0x1f, 0x44, 0xd0, 0x4c, 0x54, 0xb6, 0xbc, 0xbb, 0x95, 0x7c, 0x14, 0xa6, 0x2d, 0x75, 0x47, 0xfe, 0xcc, 0xb5, 0xd3, 0xf2, 0x0e, 0xd2, 0x00, 0x93, 0x13, 0x6d, 0x97, 0xdc, 0xb6, 0x89, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2449 = { .name = "ecdsa_brainpoolp512r1_sha512_2449", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2449_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2449_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2449_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 329 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2450 for ECDSA, tcId is 330 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2450_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2450_msg[] = { 0x33, 0x31, 0x33, 0x31, 0x32, 0x38, 0x37, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2450_sig[] = { 0x20, 0x82, 0x50, 0xa2, 0xa6, 0x62, 0xf8, 0x53, 0x6b, 0x5c, 0xdc, 0xff, 0xa1, 0x37, 0xb8, 0x3c, 0x52, 0x55, 0x12, 0xd9, 0xe3, 0xcd, 0xfe, 0xd0, 0x20, 0x76, 0x0c, 0x1b, 0x05, 0xb5, 0x5f, 0xc9, 0xf6, 0x6c, 0x6d, 0x7a, 0x8c, 0x25, 0xbf, 0xa4, 0x75, 0xb1, 0x07, 0x83, 0x11, 0x53, 0x73, 0x8d, 0x55, 0xa4, 0xdd, 0x07, 0xa7, 0x81, 0x92, 0xd0, 0x41, 0x69, 0x2b, 0xf5, 0x35, 0xe1, 0xac, 0x04, 0x3d, 0x85, 0x7d, 0xdd, 0x8c, 0xb2, 0x46, 0xac, 0x6e, 0xd2, 0x1e, 0x1d, 0xc5, 0x36, 0x81, 0x90, 0xda, 0xa9, 0x9b, 0xf8, 0xc3, 0x64, 0x49, 0xed, 0xd3, 0x18, 0xb2, 0x78, 0x27, 0xa2, 0x4c, 0x9a, 0xb0, 0x31, 0x4c, 0x59, 0x26, 0x17, 0x24, 0x9a, 0x1d, 0xa9, 0xfd, 0xe1, 0x35, 0xbc, 0x85, 0xe4, 0xc4, 0x80, 0x5d, 0x05, 0x17, 0x9b, 0x40, 0xc8, 0xcf, 0x4e, 0xdb, 0xc0, 0xad, 0xf1, 0x9f, 0x46, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2450 = { .name = "ecdsa_brainpoolp512r1_sha512_2450", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2450_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2450_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2450_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 330 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2451 for ECDSA, tcId is 331 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2451_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2451_msg[] = { 0x31, 0x34, 0x33, 0x33, 0x31, 0x39, 0x32, 0x36, 0x35, 0x33, 0x38, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2451_sig[] = { 0x65, 0xc6, 0x39, 0xaa, 0x06, 0x86, 0x81, 0x53, 0xb7, 0x76, 0x3f, 0xf6, 0x8b, 0xce, 0x97, 0xc7, 0xd9, 0xfe, 0x2f, 0x02, 0x8d, 0x9b, 0xea, 0x62, 0x32, 0x85, 0x21, 0x4e, 0xc5, 0x57, 0x2f, 0x64, 0x12, 0x74, 0xe4, 0x19, 0xa8, 0x33, 0x5d, 0xec, 0x43, 0xff, 0xf2, 0x23, 0x4d, 0xed, 0x00, 0xbb, 0x01, 0x23, 0x41, 0x1d, 0xea, 0x84, 0x3e, 0x97, 0x0b, 0xfb, 0x8f, 0xed, 0x4a, 0x51, 0x4e, 0xe4, 0x3f, 0xd4, 0xea, 0xb5, 0x37, 0x13, 0x23, 0x1e, 0x91, 0x91, 0x90, 0x6e, 0xf0, 0xcb, 0xa9, 0xc4, 0xcb, 0x50, 0xfc, 0x24, 0x62, 0x8c, 0x8f, 0x2d, 0xb1, 0x91, 0x4d, 0x6c, 0xce, 0xc4, 0x91, 0xc7, 0x80, 0xc9, 0x6c, 0xdb, 0x1b, 0x9b, 0xe6, 0xa6, 0x3c, 0xd3, 0x79, 0xa8, 0x46, 0x39, 0x39, 0xaa, 0x8a, 0x6e, 0xca, 0x63, 0x57, 0x23, 0x7f, 0xa8, 0xe8, 0x29, 0xfa, 0x4a, 0x38, 0x44, 0x8f, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2451 = { .name = "ecdsa_brainpoolp512r1_sha512_2451", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2451_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2451_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2451_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 331 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2452 for ECDSA, tcId is 332 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2452_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2452_msg[] = { 0x33, 0x34, 0x34, 0x39, 0x30, 0x38, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2452_sig[] = { 0x4a, 0x11, 0x0c, 0xc6, 0xab, 0xa1, 0x29, 0x60, 0x3a, 0x61, 0x7f, 0x0f, 0x83, 0xc8, 0xd7, 0xe9, 0xa6, 0x61, 0xdf, 0x8b, 0x57, 0x1f, 0xed, 0x84, 0x98, 0x32, 0x2d, 0x5e, 0x44, 0x8b, 0x46, 0x6f, 0x79, 0x42, 0xe3, 0x9a, 0x56, 0xa0, 0x85, 0x30, 0x3d, 0xdb, 0x92, 0x2d, 0xb5, 0x9c, 0x7d, 0xca, 0xee, 0x44, 0xde, 0x09, 0x4a, 0x78, 0x53, 0xe7, 0x17, 0xa3, 0xe9, 0x28, 0x17, 0x9f, 0xbc, 0x76, 0x2e, 0x54, 0x84, 0x86, 0x7e, 0x70, 0xcf, 0x9e, 0x3b, 0xfc, 0xff, 0x30, 0x9e, 0x89, 0xee, 0x1d, 0x90, 0x99, 0x04, 0xf4, 0xb9, 0x40, 0x22, 0xae, 0x91, 0x17, 0x75, 0x54, 0x70, 0x61, 0x22, 0xe5, 0xc4, 0x5f, 0x9a, 0x72, 0xae, 0xe7, 0x64, 0x10, 0xbb, 0x84, 0x4f, 0x09, 0xf8, 0xe6, 0x6e, 0x0e, 0xed, 0xe2, 0x87, 0xd6, 0xc3, 0x65, 0x24, 0x4e, 0x76, 0x32, 0xf4, 0x78, 0xa7, 0x53, 0x0a, 0x11, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2452 = { .name = "ecdsa_brainpoolp512r1_sha512_2452", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2452_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2452_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2452_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 332 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2453 for ECDSA, tcId is 333 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2453_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2453_msg[] = { 0x36, 0x38, 0x32, 0x39, 0x38, 0x33, 0x35, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2453_sig[] = { 0x39, 0xc8, 0x96, 0xc0, 0x40, 0x99, 0x67, 0xf9, 0xbe, 0x11, 0xfd, 0xff, 0xf9, 0xe8, 0xf7, 0xb0, 0x8b, 0x7f, 0x2c, 0xf4, 0x4b, 0xe4, 0x71, 0xd4, 0xea, 0x1e, 0x25, 0x69, 0x32, 0x34, 0x44, 0x36, 0x66, 0x3a, 0x4d, 0xa8, 0xfe, 0x28, 0xff, 0xe7, 0x9d, 0x27, 0x74, 0x58, 0xe9, 0xea, 0x2f, 0x59, 0x7a, 0x7d, 0xb8, 0x47, 0x41, 0x4b, 0xb2, 0xad, 0x24, 0x38, 0x03, 0x7c, 0xb6, 0xc4, 0xa6, 0xcd, 0x91, 0x0d, 0x53, 0xab, 0x2c, 0x5c, 0x56, 0xbf, 0x05, 0x83, 0x74, 0x29, 0xe5, 0xe3, 0xd0, 0x8a, 0x02, 0xd0, 0xe6, 0x02, 0x27, 0x28, 0x30, 0x29, 0x79, 0x22, 0xbc, 0x91, 0xe2, 0x9f, 0x4f, 0x98, 0x82, 0x71, 0xfd, 0xd6, 0x0f, 0x07, 0x0e, 0xb0, 0xaa, 0x1e, 0x57, 0xd7, 0x42, 0xca, 0x75, 0x96, 0x56, 0x38, 0x27, 0x4f, 0x3c, 0xfb, 0x2b, 0x7b, 0x28, 0xd1, 0xa1, 0x46, 0x2a, 0x38, 0x4f, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2453 = { .name = "ecdsa_brainpoolp512r1_sha512_2453", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2453_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2453_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2453_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 333 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2454 for ECDSA, tcId is 334 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2454_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2454_msg[] = { 0x33, 0x34, 0x34, 0x35, 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2454_sig[] = { 0x43, 0x17, 0x01, 0xfe, 0x9a, 0x41, 0xc1, 0xcd, 0xa0, 0xa2, 0x3b, 0x6c, 0x4f, 0xff, 0xb7, 0x12, 0x8b, 0x53, 0x6b, 0xc9, 0xc0, 0xfa, 0x14, 0x55, 0xd7, 0x26, 0x3a, 0xf0, 0x4a, 0x1a, 0x1d, 0x40, 0x9a, 0x96, 0xa2, 0xe0, 0x4a, 0x56, 0xe1, 0x91, 0x28, 0x38, 0xd4, 0xad, 0x45, 0xae, 0x9d, 0x66, 0xdb, 0x7d, 0x93, 0x47, 0xe1, 0x60, 0x49, 0x5b, 0x4b, 0xe7, 0x71, 0x22, 0x85, 0x2a, 0x28, 0x1d, 0x82, 0x4c, 0xb1, 0x38, 0xa2, 0x9f, 0x22, 0x43, 0x5d, 0x40, 0x18, 0x80, 0x55, 0x6e, 0x16, 0xc5, 0x85, 0x93, 0x49, 0xbd, 0x19, 0xf5, 0x3c, 0x5c, 0x20, 0x51, 0x6a, 0xce, 0x4d, 0x84, 0xc5, 0xc6, 0x00, 0xbf, 0x61, 0x11, 0x4e, 0x05, 0x69, 0x7c, 0xde, 0x12, 0x16, 0x86, 0x92, 0x1b, 0x97, 0x74, 0xb8, 0x3b, 0x84, 0xd0, 0x0c, 0x2c, 0xd6, 0xb7, 0x8c, 0xc5, 0x92, 0x0c, 0x63, 0x21, 0x87, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2454 = { .name = "ecdsa_brainpoolp512r1_sha512_2454", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2454_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2454_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2454_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 334 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2455 for ECDSA, tcId is 335 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2455_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2455_msg[] = { 0x31, 0x32, 0x36, 0x39, 0x37, 0x39, 0x38, 0x37, 0x36, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2455_sig[] = { 0x68, 0x4e, 0x6e, 0x41, 0xe2, 0x58, 0x85, 0x06, 0xb6, 0xec, 0x29, 0xb4, 0x58, 0x30, 0x1a, 0x79, 0x81, 0xc1, 0x09, 0x33, 0x00, 0x67, 0x5a, 0x9c, 0xfe, 0xc0, 0xf1, 0x95, 0x69, 0x6d, 0x35, 0xa1, 0x60, 0x68, 0xc4, 0xe2, 0x54, 0x24, 0xfc, 0x9b, 0x27, 0x6d, 0x84, 0xf7, 0xaf, 0xeb, 0x39, 0xaf, 0x09, 0x6e, 0xff, 0xec, 0xff, 0x09, 0xa6, 0xac, 0x67, 0x32, 0x70, 0x95, 0xe2, 0xe2, 0x5c, 0x2a, 0x1c, 0x30, 0x80, 0xb7, 0xf7, 0x0c, 0xeb, 0xd1, 0x93, 0x0a, 0x2b, 0x8b, 0xf6, 0x07, 0x31, 0xe8, 0x38, 0x0f, 0xae, 0x8a, 0x08, 0xf0, 0x31, 0x1a, 0x27, 0xab, 0xc1, 0x5d, 0x11, 0x05, 0xe4, 0xaa, 0x62, 0x62, 0x60, 0xce, 0xe8, 0x65, 0xd2, 0xcf, 0x22, 0x4a, 0xc7, 0xa9, 0x25, 0xc4, 0xeb, 0x5b, 0xab, 0xce, 0x2f, 0xec, 0xb5, 0xe2, 0x0d, 0x61, 0xf7, 0xa5, 0xdb, 0xbb, 0xe3, 0x3a, 0x01, 0x93, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2455 = { .name = "ecdsa_brainpoolp512r1_sha512_2455", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2455_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2455_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2455_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 335 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2456 for ECDSA, tcId is 336 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2456_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2456_msg[] = { 0x33, 0x39, 0x39, 0x32, 0x34, 0x32, 0x35, 0x35, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2456_sig[] = { 0x4c, 0x56, 0xb1, 0x3a, 0x81, 0xa3, 0x9c, 0xb7, 0xf2, 0x76, 0x7b, 0x11, 0x5f, 0xb4, 0x09, 0xb9, 0xcb, 0x99, 0x88, 0xaa, 0xc5, 0x88, 0x5b, 0x63, 0x27, 0x12, 0xb1, 0x33, 0xf2, 0x3b, 0xec, 0x54, 0xc6, 0xfd, 0x53, 0x31, 0x8e, 0x26, 0x5f, 0xbc, 0xb1, 0x84, 0x76, 0x71, 0x73, 0x39, 0xea, 0x90, 0x12, 0x59, 0xfe, 0x62, 0x9a, 0x39, 0x62, 0x67, 0x74, 0x1e, 0xf4, 0x4e, 0x44, 0x75, 0xa7, 0xbb, 0x24, 0xfc, 0xa6, 0x80, 0x64, 0xbb, 0xf8, 0xbe, 0xe1, 0x55, 0x1c, 0x2d, 0x00, 0xb5, 0x4a, 0x16, 0xb5, 0x0b, 0x48, 0x21, 0xc2, 0x99, 0xe2, 0xaa, 0x1a, 0x73, 0xdf, 0xe2, 0xf8, 0x1c, 0x73, 0xc4, 0x09, 0x93, 0x16, 0x6a, 0xb8, 0xed, 0x9b, 0xd8, 0x48, 0x9c, 0xfe, 0x52, 0x3e, 0x41, 0xcf, 0x6e, 0x35, 0xef, 0x7a, 0x7a, 0x33, 0x1b, 0xd8, 0xd2, 0xa4, 0xdb, 0x77, 0xdf, 0xf4, 0x0d, 0x11, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2456 = { .name = "ecdsa_brainpoolp512r1_sha512_2456", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2456_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2456_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2456_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 336 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2457 for ECDSA, tcId is 337 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2457_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2457_msg[] = { 0x31, 0x36, 0x30, 0x31, 0x39, 0x37, 0x37, 0x39, 0x37, 0x37, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2457_sig[] = { 0x68, 0x2a, 0xfc, 0x3b, 0x92, 0x59, 0xdb, 0xc9, 0x16, 0x01, 0x19, 0x01, 0x46, 0x19, 0x37, 0x5a, 0x7d, 0x49, 0x16, 0xbd, 0x08, 0xa9, 0x31, 0xcf, 0x78, 0x77, 0x87, 0x5f, 0xc7, 0x77, 0xd1, 0x8a, 0x3c, 0xaa, 0xf2, 0x53, 0xc6, 0x05, 0xc1, 0x19, 0x73, 0x99, 0xef, 0x93, 0x72, 0xb9, 0xf5, 0x85, 0xa5, 0x84, 0x14, 0x98, 0x56, 0x5f, 0xb5, 0x77, 0x01, 0x81, 0x60, 0xf6, 0x2f, 0x9f, 0x3b, 0x6b, 0x56, 0xa7, 0xe2, 0xdc, 0x08, 0xf6, 0xfb, 0x56, 0x1b, 0x62, 0x0f, 0x09, 0xe8, 0x30, 0xce, 0x6f, 0xd5, 0x2b, 0x49, 0xda, 0x81, 0x5f, 0x9c, 0x3e, 0x89, 0x95, 0x9b, 0x0d, 0x2f, 0xcc, 0x79, 0xad, 0xfb, 0x6d, 0xd9, 0xf9, 0xdd, 0xf0, 0xed, 0x9e, 0x29, 0x5b, 0x72, 0x8c, 0x30, 0x5e, 0xff, 0xcb, 0x4d, 0x97, 0xef, 0xde, 0x40, 0xd9, 0x3d, 0xc2, 0xb6, 0x37, 0x7e, 0x9d, 0x4f, 0x72, 0xbe, 0x15, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2457 = { .name = "ecdsa_brainpoolp512r1_sha512_2457", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2457_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2457_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2457_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 337 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2458 for ECDSA, tcId is 338 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2458_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2458_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x35, 0x35, 0x31, 0x34, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2458_sig[] = { 0x8a, 0x68, 0x54, 0xac, 0xf4, 0xc8, 0x03, 0x27, 0xde, 0xf8, 0xe3, 0xec, 0x10, 0x46, 0xde, 0x4f, 0x35, 0x49, 0x8d, 0xf7, 0x98, 0xa9, 0x16, 0xed, 0xc8, 0x44, 0x31, 0x67, 0x4d, 0x4e, 0xb4, 0x5d, 0x20, 0x55, 0x9c, 0xcd, 0xb8, 0xc1, 0xa1, 0x47, 0x54, 0xde, 0x6e, 0xf4, 0x04, 0xb5, 0xe8, 0xa6, 0x6c, 0x36, 0x28, 0xab, 0xac, 0xd0, 0x7e, 0x8c, 0xa4, 0x06, 0xdd, 0xc0, 0xd9, 0x75, 0x60, 0xe6, 0x1e, 0x5a, 0x07, 0xf8, 0x2b, 0xf3, 0x20, 0xb7, 0x74, 0xa4, 0x60, 0xf3, 0xeb, 0xf5, 0x34, 0x96, 0xef, 0x63, 0x2f, 0x7a, 0x33, 0xd5, 0x1f, 0xa2, 0x84, 0x7f, 0x63, 0x93, 0x1f, 0xef, 0x13, 0x11, 0xb5, 0x3c, 0x21, 0x38, 0x40, 0xea, 0x3c, 0x6e, 0x70, 0xd2, 0x84, 0x6a, 0x57, 0x65, 0x99, 0x02, 0x6a, 0xc1, 0x66, 0x90, 0x25, 0x8e, 0x4f, 0xc8, 0xed, 0xbb, 0x12, 0x11, 0x81, 0x6f, 0xc1, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2458 = { .name = "ecdsa_brainpoolp512r1_sha512_2458", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2458_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2458_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2458_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 338 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2459 for ECDSA, tcId is 339 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2459_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2459_msg[] = { 0x37, 0x30, 0x30, 0x34, 0x32, 0x35, 0x32, 0x39, 0x39, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2459_sig[] = { 0x1b, 0x06, 0x05, 0xbe, 0x20, 0xe4, 0x37, 0x4b, 0x17, 0xe4, 0xea, 0xc2, 0x6b, 0xd2, 0xbb, 0x95, 0x70, 0x20, 0xe1, 0xe0, 0x51, 0x08, 0x27, 0x9b, 0xd2, 0x69, 0x60, 0xde, 0x64, 0xd3, 0x9e, 0xf2, 0xd1, 0x9c, 0xc8, 0xcc, 0xbe, 0x8f, 0xd7, 0x2e, 0x12, 0x24, 0x12, 0xc2, 0xc6, 0x20, 0xcd, 0x2c, 0x46, 0x40, 0x26, 0x8b, 0x38, 0xdf, 0x93, 0x19, 0x3b, 0x8a, 0xc7, 0xe0, 0xd8, 0x38, 0x2c, 0xa5, 0x28, 0x99, 0x27, 0xed, 0x08, 0xef, 0x4e, 0x0e, 0x5a, 0x41, 0x72, 0x87, 0x75, 0xa1, 0x0d, 0xde, 0x8c, 0x6c, 0xc6, 0xe0, 0x8f, 0x9e, 0xab, 0xa5, 0x10, 0x77, 0xc8, 0x80, 0xc5, 0xaa, 0xd6, 0x47, 0xbc, 0x2f, 0x35, 0xde, 0xf5, 0x92, 0xd0, 0xdd, 0xd1, 0xd3, 0xe1, 0x40, 0xb6, 0xe7, 0x56, 0xc4, 0x6b, 0xe3, 0x60, 0x13, 0xcc, 0x5a, 0x6e, 0x5b, 0xb9, 0x87, 0x0b, 0x5c, 0x4d, 0xca, 0xf2, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2459 = { .name = "ecdsa_brainpoolp512r1_sha512_2459", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2459_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2459_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2459_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 339 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2460 for ECDSA, tcId is 340 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2460_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2460_msg[] = { 0x31, 0x35, 0x36, 0x35, 0x33, 0x32, 0x35, 0x32, 0x38, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2460_sig[] = { 0x37, 0x38, 0x44, 0x06, 0x33, 0x23, 0xbe, 0xb4, 0xe6, 0xa4, 0xd2, 0x82, 0x19, 0x35, 0x92, 0xdf, 0x39, 0xdc, 0x57, 0x67, 0x51, 0x9a, 0x80, 0x31, 0xb6, 0x2d, 0x8a, 0xab, 0xd5, 0xde, 0xd6, 0x95, 0x40, 0x7b, 0xc4, 0x68, 0x7a, 0xc0, 0x9d, 0xe9, 0x3f, 0xa3, 0x8a, 0x89, 0x41, 0x2c, 0xfe, 0x6a, 0xcb, 0x5c, 0x09, 0x97, 0x57, 0x79, 0xa9, 0xe4, 0x17, 0x02, 0xe1, 0x81, 0x57, 0xb8, 0x44, 0x57, 0x92, 0x62, 0x01, 0x4c, 0xca, 0xcb, 0x90, 0xa4, 0xb8, 0x33, 0x3b, 0x97, 0x43, 0xf2, 0x5b, 0x89, 0x82, 0x5f, 0x3f, 0x7d, 0x21, 0x71, 0xe6, 0xf3, 0xaf, 0xd8, 0x2c, 0x04, 0x8a, 0x98, 0x05, 0x74, 0x5b, 0x78, 0x12, 0xb4, 0x6c, 0x2c, 0x54, 0x47, 0xfe, 0x10, 0x0e, 0x3b, 0xee, 0xa0, 0xec, 0x3b, 0xb4, 0xfd, 0xed, 0x37, 0x44, 0x53, 0x1e, 0xb0, 0x0c, 0x4d, 0xf1, 0xe0, 0x5d, 0x39, 0xc5, 0x73, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2460 = { .name = "ecdsa_brainpoolp512r1_sha512_2460", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2460_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2460_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2460_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 340 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2461 for ECDSA, tcId is 341 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2461_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2461_msg[] = { 0x32, 0x33, 0x38, 0x32, 0x36, 0x33, 0x34, 0x32, 0x33, 0x35, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2461_sig[] = { 0x79, 0x8f, 0x30, 0x08, 0xa6, 0x28, 0xad, 0x65, 0xc7, 0xf8, 0x3a, 0xb5, 0x1f, 0x2e, 0x7b, 0x9e, 0x1d, 0x1b, 0x74, 0xca, 0xd8, 0x64, 0x33, 0x4c, 0xde, 0x33, 0x9b, 0xa3, 0xd2, 0xd7, 0x3f, 0x13, 0x54, 0x9a, 0x18, 0xc6, 0xbc, 0x8f, 0x82, 0x72, 0xd5, 0xa0, 0x36, 0x57, 0x0f, 0x45, 0xa1, 0xcf, 0xf2, 0x05, 0x1c, 0xbc, 0x48, 0xe8, 0xa9, 0x90, 0xc3, 0x30, 0x3b, 0xd6, 0xdf, 0x88, 0x7e, 0xd9, 0x60, 0xa1, 0xa0, 0xef, 0x92, 0xd5, 0xc2, 0x8b, 0x6d, 0x6a, 0xfe, 0xb2, 0x71, 0x8d, 0xec, 0xb5, 0x76, 0x61, 0x25, 0x3a, 0xc5, 0xfd, 0x2e, 0x13, 0x63, 0x9b, 0x04, 0xfe, 0x6d, 0x41, 0x7e, 0xeb, 0x40, 0xd7, 0x53, 0x14, 0x6f, 0xdb, 0x80, 0x49, 0x37, 0xac, 0x6b, 0xa9, 0x2c, 0x8f, 0x8b, 0xf9, 0x6a, 0x9e, 0x0c, 0x81, 0x53, 0x2e, 0xf0, 0x39, 0x10, 0xbf, 0x4c, 0xe0, 0x48, 0x3b, 0xf3, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2461 = { .name = "ecdsa_brainpoolp512r1_sha512_2461", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2461_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2461_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2461_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 341 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2462 for ECDSA, tcId is 342 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2462_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2462_msg[] = { 0x31, 0x34, 0x34, 0x37, 0x38, 0x34, 0x37, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2462_sig[] = { 0x95, 0x82, 0xbf, 0xa8, 0xa2, 0x12, 0xba, 0x8d, 0x08, 0x52, 0xa4, 0x69, 0x0b, 0xff, 0x7c, 0x93, 0x7b, 0xaf, 0xdd, 0xd2, 0xf8, 0x44, 0x7d, 0x85, 0x0a, 0xe5, 0x18, 0x38, 0x9f, 0x20, 0x18, 0x2b, 0xf8, 0x3b, 0x00, 0x05, 0x2c, 0x3b, 0x3d, 0xc6, 0x5b, 0x1a, 0x70, 0xcf, 0x21, 0x6c, 0xdf, 0xa6, 0x2d, 0xcd, 0x17, 0xa5, 0xad, 0xf3, 0x31, 0xa2, 0xa7, 0x32, 0xba, 0xae, 0xee, 0xc0, 0xad, 0x9d, 0xa4, 0xa1, 0xe4, 0x1f, 0x5f, 0xdb, 0xb9, 0x00, 0x0d, 0x0f, 0x3b, 0xbe, 0x31, 0x19, 0x95, 0xa2, 0x8a, 0xf8, 0x6b, 0x9b, 0x03, 0x34, 0xde, 0x54, 0x98, 0x82, 0x96, 0x4c, 0x53, 0x11, 0xaa, 0x52, 0xd8, 0x7d, 0xe9, 0x62, 0x67, 0x06, 0xbb, 0x25, 0x14, 0xc1, 0xcf, 0x40, 0x9e, 0x99, 0x07, 0xf4, 0xe9, 0x1e, 0x9a, 0x49, 0xd6, 0x55, 0x24, 0xb4, 0xdf, 0xcb, 0xa5, 0x20, 0x92, 0x02, 0x55, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2462 = { .name = "ecdsa_brainpoolp512r1_sha512_2462", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2462_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2462_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2462_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 342 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2463 for ECDSA, tcId is 343 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2463_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2463_msg[] = { 0x31, 0x34, 0x32, 0x36, 0x30, 0x32, 0x30, 0x35, 0x35, 0x34, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2463_sig[] = { 0x4d, 0x67, 0x90, 0xc4, 0x9c, 0x82, 0xa7, 0xac, 0x06, 0xce, 0x84, 0x21, 0x53, 0x94, 0xc8, 0x6c, 0x70, 0x11, 0xb1, 0xb5, 0xf7, 0x14, 0x73, 0x8b, 0x1a, 0xd4, 0xd7, 0xb0, 0x10, 0xd8, 0x54, 0x67, 0x63, 0xf6, 0x02, 0xc9, 0xaf, 0x1e, 0x67, 0x48, 0xa2, 0x7d, 0x29, 0x7b, 0xed, 0x04, 0xeb, 0xea, 0xd4, 0xbf, 0x62, 0x90, 0x43, 0xe4, 0xde, 0xb3, 0x98, 0xa2, 0x7d, 0x4f, 0x86, 0xf3, 0xd7, 0x95, 0x6a, 0x6d, 0xcf, 0x9c, 0x89, 0x8c, 0x07, 0xd2, 0x4f, 0x13, 0xe7, 0x63, 0x66, 0xfd, 0xfb, 0x76, 0xed, 0xdd, 0x41, 0x57, 0xef, 0x2b, 0xef, 0xa9, 0x10, 0x52, 0x49, 0x34, 0xa8, 0xd4, 0x10, 0x9c, 0x12, 0xe0, 0x1e, 0xc4, 0x5d, 0x9f, 0xd4, 0x97, 0x8f, 0xb2, 0x91, 0x06, 0x81, 0xe5, 0x46, 0x03, 0x71, 0xbb, 0xfc, 0x76, 0x52, 0x87, 0x03, 0xe8, 0xb8, 0xa8, 0xbc, 0xbe, 0x8a, 0x6c, 0x8a, 0x39, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2463 = { .name = "ecdsa_brainpoolp512r1_sha512_2463", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2463_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2463_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2463_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 343 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2464 for ECDSA, tcId is 344 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2464_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2464_msg[] = { 0x31, 0x39, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x38, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2464_sig[] = { 0x65, 0xb4, 0x9e, 0xbf, 0x51, 0x98, 0xda, 0x39, 0x5a, 0xa1, 0x82, 0xba, 0x31, 0xd4, 0x73, 0x12, 0x9a, 0xcc, 0x2f, 0xd6, 0x5f, 0xdc, 0x0d, 0xf2, 0xcd, 0x59, 0xa1, 0xc6, 0x8a, 0x52, 0x78, 0x82, 0xc9, 0x22, 0xf7, 0x39, 0x93, 0x39, 0x63, 0x55, 0xbd, 0x6c, 0xdf, 0x4e, 0x4f, 0xe9, 0xc4, 0x2e, 0x17, 0x16, 0xf6, 0x6e, 0xaf, 0x3e, 0x0e, 0x73, 0x25, 0x3d, 0x5f, 0x61, 0x8c, 0x30, 0x06, 0x39, 0x8d, 0xeb, 0x03, 0xcc, 0x46, 0x40, 0x19, 0x4c, 0xe2, 0x30, 0xda, 0x1d, 0x77, 0xaa, 0xcb, 0x00, 0x74, 0x27, 0x55, 0x7f, 0x70, 0xd4, 0xa0, 0xee, 0x81, 0x48, 0x12, 0xc5, 0x60, 0x86, 0x5f, 0x14, 0xf2, 0x4a, 0x8f, 0x79, 0x39, 0x3c, 0xef, 0x1a, 0x15, 0x9d, 0x28, 0x34, 0xd9, 0xfd, 0xee, 0x0a, 0x16, 0xa8, 0x5b, 0xcd, 0x5c, 0xd5, 0x0e, 0x0f, 0x7c, 0x26, 0x32, 0x30, 0x36, 0x33, 0x5f, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2464 = { .name = "ecdsa_brainpoolp512r1_sha512_2464", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2464_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2464_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2464_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 344 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2465 for ECDSA, tcId is 345 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2465_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2465_msg[] = { 0x34, 0x32, 0x39, 0x32, 0x31, 0x35, 0x33, 0x35, 0x32, 0x33, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2465_sig[] = { 0x87, 0x3e, 0x39, 0xe7, 0xf6, 0xb7, 0xdd, 0xe5, 0xe4, 0x0c, 0xa7, 0xfd, 0x4b, 0x8e, 0x85, 0xf3, 0xcd, 0xee, 0xae, 0x46, 0x71, 0xd6, 0x32, 0x18, 0xb9, 0xf7, 0x19, 0x54, 0x45, 0x66, 0x1d, 0xa0, 0xd1, 0xf5, 0x46, 0x07, 0x59, 0x9a, 0xe7, 0x53, 0x12, 0x02, 0xeb, 0xba, 0xe9, 0xb5, 0xa1, 0xa5, 0x8d, 0x37, 0xc4, 0xa1, 0xfd, 0x3f, 0xff, 0x8e, 0x96, 0x54, 0x7f, 0xdd, 0x3f, 0x76, 0xf8, 0x83, 0x74, 0xbf, 0x6d, 0xb0, 0x93, 0x26, 0x0e, 0xff, 0x6c, 0xac, 0x9f, 0x06, 0xdb, 0x16, 0x46, 0xc0, 0x83, 0xe4, 0xbc, 0x09, 0xc8, 0xf1, 0x75, 0x5a, 0xa3, 0x02, 0xec, 0xf7, 0x91, 0x69, 0x79, 0x01, 0x9c, 0xad, 0x8b, 0xed, 0x73, 0x90, 0x07, 0x97, 0x0c, 0x2c, 0xee, 0x87, 0xd0, 0x25, 0x2c, 0xc6, 0x8f, 0x05, 0x6f, 0x71, 0x03, 0x30, 0xc6, 0x5f, 0xc5, 0x65, 0x51, 0x29, 0x73, 0x12, 0xb2, 0x20, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2465 = { .name = "ecdsa_brainpoolp512r1_sha512_2465", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2465_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2465_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2465_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 345 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2466 for ECDSA, tcId is 346 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2466_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2466_msg[] = { 0x34, 0x34, 0x35, 0x39, 0x39, 0x30, 0x31, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2466_sig[] = { 0x01, 0x27, 0xad, 0xa3, 0x3f, 0xf4, 0xc6, 0x44, 0x1e, 0x79, 0xf6, 0x01, 0x46, 0x51, 0xdf, 0x82, 0xd4, 0xd1, 0x0c, 0xf4, 0x60, 0x1a, 0xc5, 0x67, 0xd4, 0x41, 0x42, 0xb0, 0xdc, 0xfc, 0x93, 0x3f, 0x7c, 0x8a, 0x2e, 0x23, 0x1d, 0x0d, 0x29, 0x0c, 0xbf, 0x04, 0x2d, 0xf6, 0x11, 0x2d, 0x6f, 0xe1, 0x6d, 0xdd, 0x2c, 0x1e, 0x96, 0xf7, 0x98, 0x20, 0x5c, 0xbf, 0x59, 0x52, 0x68, 0xa9, 0x41, 0x57, 0x22, 0x35, 0x41, 0x1c, 0x90, 0xcc, 0x9a, 0xc1, 0x87, 0x2d, 0x23, 0x8e, 0x7c, 0x7d, 0x8d, 0xeb, 0x07, 0x55, 0xb3, 0x66, 0x2c, 0xd9, 0xf2, 0x49, 0xbf, 0x3c, 0x84, 0x4e, 0x75, 0x0c, 0xf5, 0x8f, 0x90, 0xfe, 0x90, 0x8f, 0x28, 0xb1, 0x38, 0x67, 0x6e, 0xf9, 0xcb, 0x24, 0xef, 0xbb, 0xaf, 0xab, 0x8d, 0x3b, 0xeb, 0xc1, 0x77, 0xa5, 0xb3, 0x2a, 0x32, 0xd1, 0x7b, 0x91, 0xfc, 0x49, 0xb0, 0xdd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2466 = { .name = "ecdsa_brainpoolp512r1_sha512_2466", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2466_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2466_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2466_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 346 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2467 for ECDSA, tcId is 347 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2467_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2467_msg[] = { 0x31, 0x33, 0x39, 0x33, 0x39, 0x37, 0x31, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2467_sig[] = { 0x82, 0x44, 0xc7, 0x33, 0x17, 0xb5, 0x3e, 0x37, 0x47, 0x3d, 0x7b, 0xee, 0xf9, 0xf8, 0xe5, 0xbd, 0x31, 0xed, 0x80, 0x1f, 0x9b, 0xbd, 0xb9, 0x63, 0x9b, 0x7f, 0x0f, 0x24, 0xe0, 0x32, 0x9c, 0x79, 0x14, 0x95, 0x9b, 0xf0, 0xcd, 0x20, 0x06, 0x98, 0x6f, 0xa8, 0x1f, 0x7f, 0x4b, 0x40, 0x02, 0x50, 0x33, 0x43, 0xae, 0xc0, 0x46, 0x5d, 0x8f, 0x1e, 0xd1, 0x7c, 0x97, 0x74, 0x6e, 0xd6, 0xca, 0xed, 0x14, 0xbc, 0x6c, 0xc4, 0xd1, 0x55, 0x37, 0x71, 0x75, 0xea, 0x95, 0xc3, 0x59, 0xc6, 0x96, 0x24, 0xaf, 0xe1, 0x85, 0x79, 0x01, 0x44, 0x21, 0xb6, 0x6a, 0x14, 0x0e, 0x87, 0xc1, 0x43, 0x9f, 0x7d, 0x78, 0xf5, 0x64, 0x5d, 0x4b, 0xd8, 0xc0, 0x27, 0x54, 0x95, 0x26, 0x86, 0x58, 0x55, 0xff, 0xf0, 0xfc, 0x52, 0x7f, 0x49, 0x36, 0x23, 0xc3, 0x64, 0x7b, 0x5c, 0x90, 0x1d, 0x8d, 0xe4, 0xb8, 0x29, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2467 = { .name = "ecdsa_brainpoolp512r1_sha512_2467", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2467_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2467_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2467_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 347 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2468 for ECDSA, tcId is 348 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2468_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2468_msg[] = { 0x32, 0x33, 0x39, 0x30, 0x36, 0x39, 0x36, 0x34, 0x39, 0x35, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2468_sig[] = { 0x00, 0x11, 0xdd, 0xcc, 0x69, 0xdd, 0xa5, 0x67, 0x64, 0xaf, 0xdb, 0xea, 0xcd, 0x61, 0x5b, 0x3c, 0x29, 0x50, 0x58, 0x79, 0x43, 0x71, 0x6e, 0xd6, 0xda, 0xc7, 0x65, 0x86, 0x79, 0xa2, 0x1b, 0x2b, 0x4c, 0xdb, 0xe8, 0x5a, 0x5e, 0x40, 0x94, 0xde, 0xf2, 0x53, 0xed, 0xe5, 0x7f, 0x31, 0xef, 0x75, 0x88, 0xee, 0x31, 0x24, 0xd8, 0x05, 0xab, 0xc1, 0x2e, 0xcb, 0xf7, 0xf5, 0x5a, 0x7c, 0xb5, 0x5d, 0x11, 0x9d, 0x72, 0x2b, 0xc3, 0x72, 0xa4, 0xe6, 0xc5, 0xb4, 0xe3, 0x9f, 0xdf, 0x25, 0x81, 0x6f, 0x23, 0x87, 0xd0, 0x0e, 0xf0, 0x40, 0xd0, 0xad, 0x75, 0xbd, 0xa2, 0x79, 0x70, 0x00, 0x1c, 0xe5, 0xcd, 0xf5, 0xa2, 0xd4, 0xdd, 0x8b, 0xc8, 0x04, 0x21, 0x9f, 0xe8, 0xe9, 0x71, 0x52, 0x96, 0xad, 0xb5, 0x33, 0x03, 0xb9, 0x0f, 0x2c, 0x5c, 0x1f, 0x3f, 0x94, 0xb3, 0xf5, 0xf2, 0xfd, 0xa8, 0xc2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2468 = { .name = "ecdsa_brainpoolp512r1_sha512_2468", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2468_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2468_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2468_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 348 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2469 for ECDSA, tcId is 349 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2469_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2469_msg[] = { 0x31, 0x31, 0x34, 0x34, 0x36, 0x30, 0x35, 0x36, 0x32, 0x36, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2469_sig[] = { 0x12, 0xe5, 0x9c, 0xd4, 0x84, 0xad, 0xba, 0x7d, 0x0f, 0xc2, 0xe4, 0x02, 0xd6, 0xca, 0xf0, 0xe4, 0x4a, 0x0e, 0xd2, 0x52, 0xa8, 0x91, 0x62, 0x3d, 0x26, 0x87, 0x90, 0x2b, 0x51, 0x83, 0x76, 0xef, 0xd7, 0x34, 0xa7, 0xb7, 0x53, 0x3d, 0x79, 0x7c, 0xe8, 0xf1, 0x45, 0x02, 0x8b, 0x42, 0x8c, 0x18, 0xf5, 0xf2, 0x04, 0x43, 0xc5, 0x3f, 0x04, 0xe6, 0x04, 0xaa, 0x31, 0x13, 0x15, 0xe9, 0x26, 0x6d, 0x47, 0x73, 0x6e, 0x60, 0x34, 0x5f, 0x1c, 0xb9, 0xbf, 0x7b, 0xd1, 0x17, 0xd8, 0xcb, 0x82, 0xc9, 0x41, 0x17, 0x9f, 0x08, 0x93, 0xa4, 0xb7, 0xd8, 0x76, 0x2f, 0x7b, 0xc9, 0x32, 0x20, 0x25, 0xa5, 0x64, 0xac, 0xbd, 0x7b, 0x3b, 0xb4, 0x7d, 0xe3, 0x84, 0xa4, 0x58, 0x2f, 0x33, 0x7b, 0x80, 0x9e, 0x84, 0xc4, 0x8b, 0x08, 0x61, 0x0a, 0x3d, 0xfd, 0x0c, 0x87, 0x5d, 0xfe, 0x9b, 0x88, 0x85, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2469 = { .name = "ecdsa_brainpoolp512r1_sha512_2469", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2469_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2469_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2469_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 349 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2470 for ECDSA, tcId is 350 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2470_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2470_msg[] = { 0x36, 0x38, 0x35, 0x30, 0x30, 0x34, 0x37, 0x35, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2470_sig[] = { 0x00, 0x9a, 0x5f, 0x64, 0x0c, 0xda, 0xaf, 0x26, 0xf1, 0xc1, 0x5c, 0xfc, 0x5c, 0x27, 0x49, 0x8a, 0x82, 0x31, 0x57, 0x1f, 0x22, 0x05, 0x31, 0x54, 0xcc, 0x2f, 0x52, 0x87, 0x7c, 0xbe, 0x5c, 0xf2, 0x89, 0xc5, 0x53, 0xd7, 0xbd, 0xf8, 0x6b, 0x19, 0x73, 0x26, 0x36, 0x04, 0xd5, 0x94, 0xe5, 0x29, 0xab, 0x2d, 0x1d, 0xf1, 0x06, 0x6d, 0x88, 0x5f, 0xd5, 0xa0, 0x61, 0xf6, 0x38, 0xe7, 0xa3, 0x46, 0x91, 0xfe, 0x33, 0xe0, 0x50, 0x74, 0x8b, 0xd7, 0xd7, 0x68, 0x83, 0xa0, 0x3d, 0x5f, 0x29, 0x76, 0x48, 0x7a, 0x03, 0x26, 0xa3, 0xa3, 0xc5, 0xef, 0x27, 0x6c, 0x38, 0xa9, 0xca, 0x09, 0x96, 0x25, 0x70, 0xec, 0xc8, 0xb8, 0x9f, 0x93, 0x1a, 0x14, 0x54, 0x97, 0xb7, 0x7a, 0x48, 0x2a, 0x73, 0x12, 0x89, 0xc2, 0xf7, 0x9c, 0x4a, 0x7b, 0x87, 0x19, 0x28, 0xb3, 0x9e, 0x94, 0xa1, 0x48, 0x8c, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2470 = { .name = "ecdsa_brainpoolp512r1_sha512_2470", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2470_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2470_msg, .msglen = 9, .sig = ecdsa_brainpoolp512r1_sha512_2470_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 350 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2471 for ECDSA, tcId is 351 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2471_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2471_msg[] = { 0x32, 0x32, 0x32, 0x30, 0x35, 0x33, 0x36, 0x30, 0x36, 0x31, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2471_sig[] = { 0x68, 0xc0, 0x01, 0xac, 0x8c, 0x88, 0x04, 0xc0, 0xa9, 0xc3, 0x8f, 0x18, 0x10, 0x9e, 0x26, 0xb4, 0xe8, 0xa1, 0xba, 0x18, 0xd0, 0xfb, 0xa8, 0x54, 0x7f, 0x70, 0xe3, 0x98, 0x9f, 0x3c, 0x51, 0x08, 0x71, 0xe8, 0x0f, 0x8a, 0x7b, 0x31, 0x4f, 0xc5, 0x21, 0xb7, 0xc7, 0x9c, 0x3b, 0xb3, 0xb6, 0x91, 0x56, 0x0a, 0xb9, 0xd6, 0x99, 0xa2, 0x49, 0x15, 0xfc, 0x68, 0x2f, 0xda, 0xc1, 0xf0, 0x1c, 0x6f, 0x8c, 0x2f, 0xa0, 0xa4, 0xd9, 0x60, 0xd2, 0x68, 0x84, 0x42, 0xdb, 0xd6, 0x63, 0xe8, 0x5f, 0x46, 0xd8, 0x58, 0xfa, 0xaa, 0xff, 0x91, 0xb7, 0xba, 0x9a, 0xe9, 0x6b, 0xa6, 0x61, 0x96, 0x63, 0x78, 0x0f, 0x05, 0x95, 0x0d, 0x0a, 0xd8, 0x9b, 0x79, 0xcd, 0x69, 0x5d, 0x14, 0xde, 0xe5, 0x7f, 0x27, 0xbc, 0xa9, 0x9f, 0x01, 0x65, 0xf1, 0xd4, 0xbb, 0x12, 0x3d, 0x17, 0xb1, 0xa4, 0x6b, 0xda, 0x32, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2471 = { .name = "ecdsa_brainpoolp512r1_sha512_2471", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2471_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2471_msg, .msglen = 11, .sig = ecdsa_brainpoolp512r1_sha512_2471_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 351 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2472 for ECDSA, tcId is 352 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2472_pubkey[] = { 0x67, 0xce, 0xa1, 0xbe, 0xdf, 0x84, 0xcb, 0xdc, 0xba, 0x69, 0xa0, 0x5b, 0xb2, 0xce, 0x3a, 0x2d, 0x1c, 0x9d, 0x91, 0x1d, 0x23, 0x6c, 0x48, 0x09, 0x29, 0xa1, 0x6a, 0xd6, 0x97, 0xb4, 0x5a, 0x6c, 0xa1, 0x27, 0x07, 0x9f, 0xe8, 0xd7, 0x86, 0x86, 0x71, 0xe2, 0x8e, 0xf3, 0x3b, 0xdf, 0x93, 0x19, 0xe2, 0xe5, 0x1c, 0x84, 0xb1, 0x90, 0xac, 0x5c, 0x91, 0xb5, 0x1b, 0xaf, 0x0a, 0x98, 0x0b, 0xa5, 0x00, 0xa7, 0xe7, 0x90, 0x06, 0x19, 0x4b, 0x53, 0x78, 0xf6, 0x5c, 0xbe, 0x62, 0x5e, 0xf2, 0xc4, 0x7c, 0x64, 0xe5, 0x60, 0x40, 0xd8, 0x73, 0xb9, 0x95, 0xb5, 0xb1, 0xeb, 0xaa, 0x4a, 0x6c, 0xe9, 0x71, 0xda, 0x16, 0x43, 0x91, 0xff, 0x61, 0x9a, 0xf3, 0xbc, 0xfc, 0x71, 0xc5, 0xe1, 0xad, 0x27, 0xee, 0x0e, 0x85, 0x9c, 0x29, 0x43, 0xe2, 0xde, 0x8e, 0xf7, 0xc4, 0x3d, 0x3c, 0x97, 0x6e, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2472_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x36, 0x36, 0x35, 0x31, 0x32, 0x34, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2472_sig[] = { 0x4b, 0x1e, 0x61, 0x39, 0x4e, 0x6c, 0x26, 0x2b, 0x1e, 0x4a, 0x63, 0xea, 0x7c, 0xf4, 0x1e, 0x66, 0x00, 0x20, 0xb2, 0x47, 0x35, 0x8d, 0x1b, 0x15, 0xaa, 0xec, 0x95, 0x33, 0xd5, 0x87, 0xd8, 0x24, 0x25, 0xa8, 0x60, 0xdc, 0x9f, 0x7a, 0x8e, 0x2b, 0x17, 0x61, 0x39, 0x3d, 0x3f, 0xc2, 0xa9, 0xd1, 0xac, 0x43, 0x3a, 0x06, 0x62, 0xa1, 0xe2, 0xee, 0x25, 0x55, 0xfc, 0x9c, 0x38, 0x49, 0xad, 0x4b, 0x86, 0xda, 0xeb, 0x19, 0x61, 0xef, 0x42, 0x2a, 0x09, 0xf5, 0x3b, 0xfa, 0x0e, 0x5f, 0xfc, 0x7f, 0x52, 0xa3, 0xb5, 0x5e, 0x76, 0xf0, 0xc2, 0xeb, 0xb7, 0xf8, 0xb0, 0x34, 0xb3, 0xcf, 0xaf, 0xf0, 0x8c, 0x52, 0x7a, 0x15, 0xa9, 0xf9, 0x7e, 0x8d, 0x09, 0xda, 0x81, 0x2e, 0x39, 0x5d, 0x5c, 0x61, 0x16, 0x80, 0xb7, 0xf6, 0x51, 0xd4, 0x16, 0x94, 0xf0, 0xb5, 0x8f, 0xe9, 0xeb, 0x31, 0x0b, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2472 = { .name = "ecdsa_brainpoolp512r1_sha512_2472", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2472_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2472_msg, .msglen = 10, .sig = ecdsa_brainpoolp512r1_sha512_2472_sig, .siglen = 128, .result = 1, .comment = "special case hash, tcId is 352 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2473 for ECDSA, tcId is 353 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2473_pubkey[] = { 0x6b, 0x67, 0x63, 0xa1, 0x86, 0xaa, 0x51, 0x59, 0x04, 0x9f, 0x2e, 0xa5, 0xc8, 0xa2, 0x32, 0xdc, 0xbe, 0x63, 0x37, 0xb0, 0xd9, 0x2e, 0x96, 0x9d, 0xa5, 0x2a, 0xf3, 0x25, 0x24, 0xf6, 0x1d, 0xa3, 0x09, 0x7f, 0xa3, 0x14, 0xac, 0x79, 0x22, 0x34, 0xe5, 0x98, 0x67, 0xaf, 0x32, 0x04, 0x78, 0x77, 0x4b, 0xd4, 0xc7, 0x85, 0xa0, 0x33, 0x06, 0x24, 0xc0, 0xb4, 0xba, 0xbe, 0x25, 0x7f, 0x65, 0x97, 0x2e, 0x40, 0x63, 0xe4, 0x5e, 0x13, 0xd5, 0x05, 0xe1, 0x4d, 0xb6, 0xf5, 0xfe, 0xf3, 0x53, 0x8d, 0xb1, 0x81, 0xcc, 0x1a, 0x6e, 0x0a, 0x93, 0x81, 0xfa, 0x3f, 0x03, 0x21, 0xbe, 0x47, 0xf4, 0x0d, 0xc0, 0x5a, 0xb8, 0x0e, 0x9c, 0xaa, 0x3b, 0x75, 0x59, 0xc6, 0x75, 0x35, 0xe8, 0x3d, 0x98, 0x4f, 0x3b, 0x95, 0x57, 0x11, 0x8d, 0xde, 0x29, 0xc5, 0xe7, 0xa5, 0xa4, 0xa1, 0x8d, 0x0c, 0x9d, 0x43, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2473_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2473_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x28, 0x0f, 0x3e, 0xbf, 0x4f, 0x1d, 0x42, 0x29, 0x6d, 0x47, 0x40, 0x11, 0x66, 0xf7, 0x70, 0x9f, 0x0a, 0xd0, 0x2b, 0xae, 0x25, 0x24, 0xeb, 0xa7, 0x73, 0x22, 0xc9, 0xd3, 0xbb, 0x91, 0x48, 0x89, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2473 = { .name = "ecdsa_brainpoolp512r1_sha512_2473", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2473_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2473_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2473_sig, .siglen = 128, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 353 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2474 for ECDSA, tcId is 354 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2474_pubkey[] = { 0x6b, 0x67, 0x63, 0xa1, 0x86, 0xaa, 0x51, 0x59, 0x04, 0x9f, 0x2e, 0xa5, 0xc8, 0xa2, 0x32, 0xdc, 0xbe, 0x63, 0x37, 0xb0, 0xd9, 0x2e, 0x96, 0x9d, 0xa5, 0x2a, 0xf3, 0x25, 0x24, 0xf6, 0x1d, 0xa3, 0x09, 0x7f, 0xa3, 0x14, 0xac, 0x79, 0x22, 0x34, 0xe5, 0x98, 0x67, 0xaf, 0x32, 0x04, 0x78, 0x77, 0x4b, 0xd4, 0xc7, 0x85, 0xa0, 0x33, 0x06, 0x24, 0xc0, 0xb4, 0xba, 0xbe, 0x25, 0x7f, 0x65, 0x97, 0x2e, 0x40, 0x63, 0xe4, 0x5e, 0x13, 0xd5, 0x05, 0xe1, 0x4d, 0xb6, 0xf5, 0xfe, 0xf3, 0x53, 0x8d, 0xb1, 0x81, 0xcc, 0x1a, 0x6e, 0x0a, 0x93, 0x81, 0xfa, 0x3f, 0x03, 0x21, 0xbe, 0x47, 0xf4, 0x0d, 0xc0, 0x5a, 0xb8, 0x0e, 0x9c, 0xaa, 0x3b, 0x75, 0x59, 0xc6, 0x75, 0x35, 0xe8, 0x3d, 0x98, 0x4f, 0x3b, 0x95, 0x57, 0x11, 0x8d, 0xde, 0x29, 0xc5, 0xe7, 0xa5, 0xa4, 0xa1, 0x8d, 0x0c, 0x9d, 0x43, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2474_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2474_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf2, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x66, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2474 = { .name = "ecdsa_brainpoolp512r1_sha512_2474", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2474_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2474_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2474_sig, .siglen = 128, .result = -1, .comment = "r too large, tcId is 354 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2475 for ECDSA, tcId is 355 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2475_pubkey[] = { 0x8f, 0x67, 0x69, 0x59, 0xbf, 0xda, 0x02, 0xd3, 0x73, 0x97, 0x7a, 0x80, 0x52, 0x8b, 0x61, 0xd4, 0x14, 0x8f, 0x8e, 0xab, 0xc2, 0x02, 0x7f, 0xb5, 0xb5, 0xdb, 0x58, 0x27, 0x67, 0x7d, 0x14, 0x7a, 0x72, 0x86, 0x61, 0xfd, 0x5c, 0x54, 0x6b, 0x6a, 0xd5, 0xf0, 0xa8, 0x9a, 0x34, 0x74, 0x49, 0xaa, 0x2f, 0x32, 0x11, 0x2e, 0x3b, 0xbd, 0xa8, 0x03, 0x50, 0x89, 0x54, 0x79, 0x29, 0xb5, 0x6a, 0x55, 0x78, 0xc4, 0x5c, 0xe0, 0xa6, 0x88, 0xae, 0xa3, 0x90, 0xd4, 0xe4, 0xdb, 0x4d, 0x48, 0xd2, 0xcd, 0xb2, 0x18, 0x65, 0xbc, 0x8c, 0xef, 0xd1, 0x5f, 0x2b, 0xba, 0xe4, 0x27, 0x0a, 0xb7, 0x65, 0xa7, 0x6f, 0x04, 0x94, 0x49, 0xf1, 0x7c, 0xe1, 0xac, 0x7f, 0x51, 0x39, 0x77, 0xce, 0x0a, 0x52, 0x37, 0xe5, 0xbd, 0x63, 0xb4, 0xaf, 0x92, 0xa6, 0xcf, 0x49, 0x18, 0xd9, 0x1b, 0xcc, 0xd0, 0xf2, 0x79, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2475_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2475_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x65, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x64, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2475 = { .name = "ecdsa_brainpoolp512r1_sha512_2475", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2475_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2475_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2475_sig, .siglen = 128, .result = 1, .comment = "r,s are large, tcId is 355 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2476 for ECDSA, tcId is 356 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2476_pubkey[] = { 0x14, 0xf3, 0x8a, 0xfb, 0xc8, 0xd6, 0xbe, 0x59, 0xee, 0x70, 0x75, 0xbd, 0xfd, 0x26, 0x16, 0xa4, 0x4b, 0x86, 0x53, 0x56, 0x87, 0xd0, 0x5c, 0x23, 0x47, 0x55, 0x31, 0x73, 0xcd, 0x14, 0xdf, 0x8a, 0xbd, 0x0a, 0x4c, 0x10, 0x2c, 0x62, 0xe8, 0x14, 0x11, 0x27, 0xdc, 0x66, 0xd2, 0xdc, 0xaa, 0xe3, 0x8c, 0x93, 0x24, 0x98, 0x0e, 0xde, 0x20, 0x46, 0x88, 0xbb, 0x9f, 0x91, 0x6b, 0xa9, 0xf1, 0xa8, 0x23, 0xf3, 0x58, 0x13, 0x93, 0x16, 0xca, 0x27, 0xb8, 0x87, 0x4e, 0x68, 0xb9, 0x33, 0x88, 0xf9, 0x78, 0x0d, 0x9b, 0xa7, 0xe2, 0x3b, 0x84, 0x21, 0xbf, 0xad, 0x38, 0xa1, 0x9e, 0xd1, 0x61, 0x47, 0x7e, 0x0a, 0x05, 0x38, 0x0b, 0xeb, 0xd7, 0xa1, 0x15, 0x6d, 0xc3, 0x2f, 0x69, 0x04, 0x76, 0x79, 0xfa, 0x2b, 0x97, 0x7f, 0xad, 0xc0, 0xc2, 0x9e, 0xbc, 0x1e, 0xbc, 0xea, 0x6c, 0xc1, 0x89, 0x4c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2476_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2476_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x43, 0x38, 0xed, 0x95, 0xac, 0x0d, 0x09, 0xc5, 0x1d, 0x70, 0x44, 0xd5, 0x9f, 0x1b, 0xc2, 0x6f, 0x8f, 0x3f, 0x11, 0xfc, 0x7b, 0xf2, 0xf8, 0x1b, 0xdf, 0x0b, 0x21, 0xb5, 0xc0, 0xb9, 0xc8, 0x9b, 0xea, 0x3c, 0xc6, 0xdd, 0x8b, 0x36, 0x92, 0xc8, 0x31, 0x0b, 0x98, 0x11, 0x7b, 0x50, 0x8d, 0x13, 0x00, 0x73, 0xe7, 0x4b, 0x02, 0xb3, 0xba, 0x48, 0x2f, 0xb0, 0xa5, 0xef, 0x10, 0x36, 0xa3, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2476 = { .name = "ecdsa_brainpoolp512r1_sha512_2476", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2476_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2476_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2476_sig, .siglen = 128, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 356 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2477 for ECDSA, tcId is 357 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2477_pubkey[] = { 0x3d, 0xf9, 0xe5, 0x86, 0x41, 0x0b, 0xa6, 0x33, 0xb9, 0xf1, 0x65, 0xd2, 0x9b, 0x07, 0x3b, 0x67, 0xa1, 0x67, 0x29, 0x7c, 0xb4, 0x08, 0x68, 0x89, 0xe5, 0x2b, 0x92, 0x5a, 0x9c, 0xb2, 0x5a, 0xcc, 0x4c, 0x85, 0xe5, 0xb8, 0x11, 0x22, 0x21, 0xba, 0x49, 0xec, 0xc9, 0x9a, 0x0c, 0xb7, 0xfb, 0x33, 0x85, 0x35, 0x2a, 0x71, 0x40, 0x07, 0x2f, 0x79, 0xc2, 0xf4, 0x43, 0x96, 0xee, 0x8b, 0x67, 0x86, 0x22, 0xc7, 0xb6, 0x18, 0x5e, 0x4b, 0x66, 0x7a, 0x5c, 0xc4, 0x27, 0xc9, 0x9c, 0xa5, 0x3f, 0xe5, 0x4f, 0x03, 0xdf, 0xee, 0xca, 0x92, 0xba, 0x2c, 0x1a, 0xe1, 0xf2, 0xb3, 0xfe, 0xeb, 0xed, 0xea, 0xba, 0x62, 0xee, 0x3b, 0xa0, 0x65, 0xac, 0x53, 0x03, 0xc2, 0xd5, 0x69, 0x69, 0xf0, 0xb3, 0x41, 0x48, 0x6f, 0x29, 0xf3, 0xb2, 0xa0, 0x6d, 0xf3, 0x28, 0x30, 0xf2, 0x59, 0x99, 0xc4, 0x2f, 0x88, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2477_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2477_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x39, 0xc9, 0x82, 0xe2, 0xa4, 0xf5, 0x60, 0xc5, 0x09, 0x05, 0x58, 0x88, 0xf6, 0x03, 0x17, 0xe6, 0xb5, 0xbb, 0x61, 0xd5, 0x94, 0xd7, 0xbd, 0x4f, 0x58, 0x97, 0x39, 0x6b, 0xf3, 0xe8, 0x1a, 0x09, 0xcf, 0x70, 0x3d, 0x31, 0x9f, 0x9b, 0x4a, 0x09, 0x2d, 0x46, 0xd5, 0xf2, 0x02, 0xff, 0x5d, 0xdb, 0x77, 0x6c, 0x57, 0xe8, 0xed, 0xe8, 0x45, 0x4d, 0xef, 0x70, 0x37, 0xb5, 0x41, 0xc9, 0x74, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2477 = { .name = "ecdsa_brainpoolp512r1_sha512_2477", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2477_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2477_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2477_sig, .siglen = 128, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 357 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2478 for ECDSA, tcId is 358 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2478_pubkey[] = { 0x0a, 0xd6, 0x6a, 0xbd, 0xba, 0x9f, 0xbe, 0xe1, 0xfd, 0xd1, 0xb9, 0xe0, 0xdb, 0x9a, 0x74, 0x60, 0xf4, 0x60, 0xde, 0x39, 0x16, 0xef, 0xd1, 0x6d, 0x7d, 0x9c, 0x6c, 0xc7, 0xa6, 0xcc, 0x9f, 0xa5, 0xcc, 0x03, 0x02, 0x0d, 0x9f, 0x8c, 0x90, 0x94, 0xc0, 0xcb, 0x52, 0xfe, 0x1b, 0xab, 0xd6, 0x3c, 0x69, 0xab, 0x20, 0xf0, 0x4a, 0x11, 0x6e, 0xce, 0xe3, 0xa0, 0x09, 0xd5, 0xac, 0xb5, 0x72, 0x9d, 0x5b, 0x47, 0x65, 0x85, 0x8f, 0x69, 0x6b, 0x61, 0xbf, 0x6b, 0x3a, 0x18, 0x12, 0xd0, 0x57, 0xbe, 0xe9, 0x3b, 0x14, 0x38, 0x36, 0xa7, 0x64, 0x92, 0x79, 0x71, 0xfb, 0x74, 0x61, 0x41, 0xb5, 0x42, 0x2f, 0xc0, 0x77, 0xf7, 0x3c, 0xaa, 0x00, 0x0f, 0x62, 0xce, 0x00, 0x10, 0x35, 0x02, 0xd1, 0xec, 0xb0, 0x95, 0x4f, 0x2c, 0xad, 0x60, 0xb2, 0x24, 0xec, 0x6f, 0xe1, 0x03, 0x30, 0x09, 0xd6, 0x4c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2478_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2478_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2478 = { .name = "ecdsa_brainpoolp512r1_sha512_2478", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2478_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2478_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2478_sig, .siglen = 128, .result = 1, .comment = "small r and s, tcId is 358 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2479 for ECDSA, tcId is 359 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2479_pubkey[] = { 0x97, 0x41, 0xc2, 0x63, 0x4e, 0x42, 0xf1, 0x86, 0x56, 0x25, 0xa9, 0xd9, 0x7e, 0xbc, 0x54, 0x9a, 0xc8, 0xc6, 0x7e, 0xb6, 0xd0, 0x3c, 0xd2, 0xa7, 0xc5, 0x98, 0x7f, 0x0f, 0x51, 0x64, 0xc9, 0xbe, 0x97, 0x75, 0xe3, 0x2c, 0x5d, 0x59, 0xd3, 0x17, 0x5d, 0xe4, 0x68, 0xe2, 0x43, 0x59, 0x10, 0x21, 0xab, 0x62, 0x3f, 0x6b, 0x09, 0xb3, 0x1a, 0x40, 0x28, 0x63, 0x9b, 0x04, 0x16, 0x84, 0xf3, 0x59, 0x47, 0x0d, 0xdf, 0xf1, 0x73, 0xc6, 0x7c, 0x71, 0x05, 0x5f, 0x5f, 0x71, 0x5b, 0x7b, 0x74, 0x99, 0x38, 0x00, 0x30, 0x59, 0x38, 0xbb, 0xda, 0x89, 0xd2, 0x4b, 0x18, 0x7f, 0x48, 0x19, 0xc3, 0x05, 0x75, 0xd5, 0xe2, 0x27, 0x5f, 0x08, 0xcb, 0xf3, 0xba, 0x86, 0xb1, 0xa1, 0x1f, 0x12, 0x67, 0x1d, 0x2e, 0xb0, 0x09, 0xd0, 0x25, 0x16, 0xf3, 0xd1, 0xda, 0x0a, 0xaf, 0xcd, 0x1d, 0x81, 0xa0, 0xc1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2479_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2479_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2479 = { .name = "ecdsa_brainpoolp512r1_sha512_2479", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2479_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2479_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2479_sig, .siglen = 128, .result = 1, .comment = "small r and s, tcId is 359 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2480 for ECDSA, tcId is 360 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2480_pubkey[] = { 0x8b, 0x06, 0xa7, 0x76, 0x16, 0xea, 0x21, 0xf1, 0x40, 0x93, 0xd3, 0xa3, 0x73, 0xa8, 0xf5, 0x71, 0x06, 0xa7, 0x19, 0x39, 0xf2, 0x54, 0x15, 0xf6, 0xa9, 0xaa, 0x00, 0x16, 0x40, 0xb5, 0xed, 0x0a, 0xdf, 0x39, 0xfc, 0x2f, 0x5e, 0x58, 0xd4, 0x23, 0x3c, 0x2e, 0xef, 0xe4, 0xf1, 0x70, 0x49, 0x9d, 0xa5, 0x7e, 0x9d, 0xce, 0xb7, 0xf8, 0xcd, 0x5f, 0x38, 0xc4, 0x18, 0x1f, 0xa7, 0xd2, 0xf7, 0x68, 0x07, 0x4a, 0x91, 0xe9, 0x9e, 0xab, 0xce, 0xd1, 0xbd, 0xa3, 0x58, 0x65, 0x3e, 0x09, 0xb5, 0x1e, 0xb8, 0xb1, 0xa9, 0x52, 0x6f, 0x5a, 0x1b, 0x32, 0xc7, 0xed, 0xd3, 0xb7, 0x01, 0xf5, 0xaf, 0x41, 0x03, 0x31, 0x49, 0x71, 0xd5, 0xc0, 0x82, 0xc5, 0xf2, 0x00, 0x53, 0xc3, 0xb6, 0x6d, 0x39, 0xa1, 0xcb, 0x6c, 0x4d, 0x31, 0x0d, 0xbe, 0x89, 0x55, 0x46, 0x89, 0x2d, 0x42, 0x96, 0xd9, 0x6e, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2480_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2480_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2480 = { .name = "ecdsa_brainpoolp512r1_sha512_2480", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2480_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2480_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2480_sig, .siglen = 128, .result = 1, .comment = "small r and s, tcId is 360 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2481 for ECDSA, tcId is 361 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2481_pubkey[] = { 0x8b, 0x06, 0xa7, 0x76, 0x16, 0xea, 0x21, 0xf1, 0x40, 0x93, 0xd3, 0xa3, 0x73, 0xa8, 0xf5, 0x71, 0x06, 0xa7, 0x19, 0x39, 0xf2, 0x54, 0x15, 0xf6, 0xa9, 0xaa, 0x00, 0x16, 0x40, 0xb5, 0xed, 0x0a, 0xdf, 0x39, 0xfc, 0x2f, 0x5e, 0x58, 0xd4, 0x23, 0x3c, 0x2e, 0xef, 0xe4, 0xf1, 0x70, 0x49, 0x9d, 0xa5, 0x7e, 0x9d, 0xce, 0xb7, 0xf8, 0xcd, 0x5f, 0x38, 0xc4, 0x18, 0x1f, 0xa7, 0xd2, 0xf7, 0x68, 0x07, 0x4a, 0x91, 0xe9, 0x9e, 0xab, 0xce, 0xd1, 0xbd, 0xa3, 0x58, 0x65, 0x3e, 0x09, 0xb5, 0x1e, 0xb8, 0xb1, 0xa9, 0x52, 0x6f, 0x5a, 0x1b, 0x32, 0xc7, 0xed, 0xd3, 0xb7, 0x01, 0xf5, 0xaf, 0x41, 0x03, 0x31, 0x49, 0x71, 0xd5, 0xc0, 0x82, 0xc5, 0xf2, 0x00, 0x53, 0xc3, 0xb6, 0x6d, 0x39, 0xa1, 0xcb, 0x6c, 0x4d, 0x31, 0x0d, 0xbe, 0x89, 0x55, 0x46, 0x89, 0x2d, 0x42, 0x96, 0xd9, 0x6e, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2481_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2481_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x6c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2481 = { .name = "ecdsa_brainpoolp512r1_sha512_2481", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2481_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2481_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2481_sig, .siglen = 128, .result = -1, .comment = "r is larger than n, tcId is 361 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2482 for ECDSA, tcId is 362 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2482_pubkey[] = { 0x79, 0x2f, 0xec, 0xee, 0xb3, 0x16, 0x63, 0x56, 0xd1, 0x0a, 0xeb, 0x09, 0x40, 0x12, 0x42, 0x94, 0x34, 0x18, 0x02, 0x92, 0x4c, 0x79, 0xf2, 0x39, 0x1b, 0x77, 0x87, 0x56, 0x57, 0xc1, 0x7f, 0x55, 0x95, 0x5b, 0x28, 0x68, 0x5c, 0xc2, 0x20, 0x3f, 0x18, 0xc2, 0x20, 0x04, 0xba, 0xb1, 0xda, 0x51, 0x68, 0x96, 0xf0, 0x1b, 0x05, 0x29, 0xc8, 0x04, 0x24, 0x5b, 0xaa, 0x3a, 0x69, 0x30, 0xb3, 0x55, 0x26, 0xde, 0xb7, 0x3e, 0x37, 0x21, 0x76, 0xcc, 0x73, 0x58, 0xc0, 0x42, 0x47, 0x92, 0x3a, 0x79, 0x11, 0x81, 0xce, 0x72, 0xc1, 0x83, 0x50, 0x60, 0x46, 0xe6, 0x9d, 0xe4, 0x97, 0x6d, 0x4f, 0x26, 0x37, 0xf1, 0x1e, 0x70, 0x5f, 0x1f, 0x9a, 0x5a, 0x0f, 0x99, 0xee, 0xa1, 0x84, 0x1e, 0x54, 0x0c, 0x6a, 0xa4, 0x3d, 0x4f, 0xb2, 0x00, 0x30, 0xd7, 0x0d, 0x4a, 0x54, 0xfb, 0x6a, 0x6e, 0x85, 0x59, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2482_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2482_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xbb, 0xd6, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2482 = { .name = "ecdsa_brainpoolp512r1_sha512_2482", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2482_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2482_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2482_sig, .siglen = 128, .result = -1, .comment = "s is larger than n, tcId is 362 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2483 for ECDSA, tcId is 363 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2483_pubkey[] = { 0x81, 0xb4, 0x2a, 0xda, 0xac, 0x02, 0xa5, 0xfd, 0x87, 0xa0, 0x4a, 0x16, 0xdd, 0xc2, 0x33, 0x30, 0x75, 0x77, 0x8f, 0x13, 0x3e, 0xa0, 0xaf, 0x66, 0x04, 0x9c, 0x72, 0xa0, 0x67, 0x21, 0xe3, 0x92, 0x49, 0x79, 0x24, 0x9e, 0x04, 0x29, 0x1e, 0x4b, 0x99, 0xd4, 0xec, 0xf4, 0x48, 0xb3, 0xfd, 0xc5, 0xe5, 0x6e, 0xa2, 0x33, 0x81, 0xd6, 0xd0, 0x6e, 0x23, 0x01, 0x19, 0x65, 0xd1, 0x65, 0x38, 0x16, 0x24, 0x43, 0x27, 0xf9, 0xd5, 0x9c, 0xa6, 0x78, 0x75, 0x75, 0xbb, 0x77, 0x07, 0xef, 0x26, 0x72, 0xf1, 0x13, 0xba, 0x7a, 0x30, 0x2d, 0x69, 0xc2, 0x9f, 0xea, 0x6f, 0xf6, 0x6f, 0x44, 0x9d, 0xcd, 0x3b, 0x27, 0x3b, 0x33, 0x98, 0x48, 0x17, 0x76, 0xc2, 0xf2, 0xa6, 0x85, 0xcb, 0x6d, 0xde, 0x31, 0xe1, 0x76, 0xbe, 0x8f, 0x2b, 0x78, 0x5f, 0xed, 0x31, 0x3b, 0xe5, 0x73, 0x0c, 0x66, 0x24, 0xed, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2483_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2483_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x12, 0xd5, 0xe9, 0x12, 0x5c, 0xc7, 0x1f, 0xbe, 0xb8, 0x6c, 0x21, 0x7e, 0x09, 0xbd, 0x92, 0xb6, 0x46, 0xc6, 0xdd, 0x3a, 0x1b, 0xe1, 0xd6, 0xa6, 0xed, 0x4d, 0x80, 0x26, 0x71, 0x27, 0xe4, 0xb5, 0xb4, 0xbc, 0x4a, 0xac, 0x7d, 0x5d, 0x3a, 0xa0, 0x03, 0x31, 0x14, 0xc8, 0x5a, 0xac, 0x2a, 0x1b, 0xff, 0x3d, 0xef, 0x00, 0x1d, 0x24, 0x8d, 0x0a, 0x54, 0x83, 0xdc, 0x2e, 0xa6, 0x6f, 0x5a, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2483 = { .name = "ecdsa_brainpoolp512r1_sha512_2483", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2483_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2483_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2483_sig, .siglen = 128, .result = 1, .comment = "small r and s^-1, tcId is 363 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2484 for ECDSA, tcId is 364 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2484_pubkey[] = { 0x01, 0xa0, 0xe0, 0x0b, 0xb4, 0xa6, 0x69, 0xf1, 0x0f, 0x59, 0x44, 0x89, 0xa4, 0x2f, 0x1b, 0xab, 0xd3, 0xa0, 0x28, 0xb5, 0xea, 0x75, 0x75, 0x7a, 0x98, 0x6c, 0x55, 0xf6, 0x15, 0x94, 0x69, 0x75, 0x2b, 0x88, 0xbb, 0xe9, 0xf5, 0x2f, 0x24, 0x22, 0xd5, 0x03, 0xa4, 0xd9, 0xa8, 0x49, 0xc3, 0xda, 0xd4, 0x10, 0xa6, 0xdc, 0x4e, 0x4e, 0x32, 0xb9, 0x54, 0x69, 0xe0, 0x93, 0x86, 0x06, 0x34, 0x01, 0x57, 0x4c, 0x50, 0x11, 0x28, 0x90, 0x64, 0x59, 0xa2, 0x3a, 0xf9, 0x3b, 0x98, 0x30, 0xe2, 0x97, 0xf3, 0xe7, 0x3d, 0x31, 0x73, 0xdf, 0x78, 0x07, 0x67, 0x9b, 0x71, 0x3c, 0xe6, 0xb3, 0x4f, 0x64, 0xb1, 0xee, 0x75, 0x47, 0xb9, 0x27, 0xe4, 0x31, 0x05, 0x11, 0x8c, 0x49, 0x6b, 0x9a, 0x3c, 0x1e, 0x02, 0x64, 0xe8, 0x4b, 0x5b, 0x0f, 0xb4, 0x59, 0x58, 0x2a, 0xf9, 0x8e, 0xdf, 0x0c, 0x11, 0x7f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2484_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2484_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x76, 0x75, 0x2c, 0xe2, 0x89, 0xc3, 0x8f, 0x22, 0xde, 0x7f, 0x75, 0xd0, 0xfa, 0x6d, 0xa0, 0x56, 0xf4, 0x73, 0xc7, 0x71, 0x94, 0xde, 0x93, 0x1d, 0x97, 0xef, 0xd6, 0x54, 0x21, 0xff, 0x3e, 0xc8, 0x2c, 0x57, 0xa6, 0x39, 0x3a, 0x42, 0x70, 0x2e, 0x14, 0xa2, 0xd8, 0x31, 0x76, 0x88, 0x65, 0xab, 0x93, 0x32, 0x81, 0xab, 0xf1, 0xbc, 0xf5, 0x2a, 0x7e, 0xf6, 0xb7, 0x3f, 0x23, 0x73, 0xc9, 0xee, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2484 = { .name = "ecdsa_brainpoolp512r1_sha512_2484", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2484_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2484_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2484_sig, .siglen = 128, .result = 1, .comment = "smallish r and s^-1, tcId is 364 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2485 for ECDSA, tcId is 365 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2485_pubkey[] = { 0x0d, 0xc4, 0xc5, 0x63, 0x9b, 0x76, 0x90, 0x15, 0x7c, 0x21, 0x0b, 0x75, 0xe7, 0xa0, 0x06, 0xd9, 0xcf, 0xdf, 0x80, 0xf9, 0xd0, 0xb2, 0xbb, 0xd6, 0x43, 0x03, 0x68, 0x90, 0xa8, 0x16, 0x8a, 0x88, 0x94, 0x7b, 0x19, 0x7a, 0xa9, 0xa6, 0x00, 0x47, 0xcd, 0x8f, 0x6e, 0x77, 0xc0, 0x77, 0x7b, 0xb9, 0xe0, 0x9d, 0xa7, 0x37, 0xdb, 0xbe, 0x57, 0xa9, 0x77, 0xa6, 0xae, 0x07, 0x07, 0x98, 0x35, 0x64, 0x60, 0xb0, 0xa4, 0x9d, 0x4f, 0x95, 0x78, 0x27, 0x3f, 0x6e, 0x5a, 0xb3, 0x87, 0x31, 0x94, 0x29, 0x2e, 0x89, 0x3e, 0x06, 0xc5, 0xa3, 0x9b, 0xb1, 0xf8, 0xa0, 0x55, 0x1f, 0x4e, 0x01, 0xca, 0x46, 0x0a, 0x03, 0xa7, 0x7c, 0x35, 0xcf, 0xf8, 0xd7, 0xd6, 0xe0, 0xf3, 0x3b, 0x8a, 0x88, 0xac, 0xdc, 0x36, 0xea, 0xe5, 0xa8, 0x3a, 0x12, 0x9b, 0xfe, 0xec, 0xc2, 0xa6, 0x89, 0x36, 0x88, 0x3d, 0x91, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2485_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2485_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfd, 0x9c, 0xe7, 0x66, 0x00, 0x6a, 0x51, 0x30, 0x00, 0x5e, 0x79, 0xca, 0xdd, 0xba, 0x04, 0x30, 0x27, 0x08, 0x48, 0x7a, 0x27, 0x82, 0x3b, 0xd1, 0xd3, 0xd9, 0xca, 0x0a, 0x80, 0x1f, 0x4f, 0xbc, 0x0b, 0x83, 0x12, 0x6a, 0xa1, 0x91, 0x1a, 0xd4, 0x4a, 0xfd, 0x6a, 0x77, 0x0c, 0x75, 0x3d, 0x61, 0x9f, 0xef, 0x70, 0x7e, 0x7c, 0x77, 0x3f, 0x46, 0x7d, 0xe5, 0x73, 0x8b, 0x35, 0x33, 0x38, 0x93, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2485 = { .name = "ecdsa_brainpoolp512r1_sha512_2485", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2485_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2485_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2485_sig, .siglen = 128, .result = 1, .comment = "100-bit r and small s^-1, tcId is 365 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2486 for ECDSA, tcId is 366 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2486_pubkey[] = { 0x86, 0x7d, 0xfd, 0xd7, 0x26, 0xce, 0xe9, 0x31, 0x25, 0x6d, 0xd9, 0xaa, 0xe0, 0xc1, 0xa6, 0x60, 0xa1, 0x2b, 0x1d, 0xfd, 0x6b, 0xaf, 0x18, 0x0b, 0x35, 0xe3, 0x9c, 0x0f, 0x93, 0xcb, 0xf9, 0x80, 0x0c, 0x5c, 0xf1, 0x1b, 0x29, 0xf1, 0x86, 0x78, 0xd3, 0x25, 0x12, 0x1f, 0xb2, 0x86, 0x54, 0x5a, 0x51, 0x2d, 0xd8, 0xf6, 0xc2, 0xcb, 0x81, 0xe5, 0x98, 0xd0, 0x5f, 0xc4, 0x0c, 0xfc, 0xf9, 0xdc, 0x91, 0xd4, 0xd2, 0x15, 0x3f, 0x66, 0x75, 0x93, 0xe2, 0x5f, 0xee, 0x42, 0xe3, 0x9d, 0xaf, 0xd1, 0x81, 0x19, 0x74, 0x94, 0x3e, 0x87, 0x5d, 0xfc, 0xc6, 0xba, 0xdc, 0x0e, 0xa2, 0x2d, 0xb4, 0x21, 0x26, 0x37, 0xbe, 0x71, 0xc6, 0xb7, 0x43, 0x75, 0xc4, 0x3c, 0xfb, 0xf7, 0x19, 0x08, 0x86, 0x91, 0xae, 0xc7, 0x0e, 0x69, 0x1e, 0x46, 0xed, 0xfe, 0x8c, 0xcd, 0xb4, 0xce, 0xfc, 0xb1, 0x35, 0x1e, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2486_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2486_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x02, 0x9c, 0x0d, 0xe2, 0x21, 0x6b, 0xab, 0x72, 0xaf, 0x9e, 0xc8, 0x23, 0x41, 0x1e, 0x7e, 0xe4, 0x44, 0x48, 0x2b, 0xc2, 0x68, 0xae, 0x1b, 0xa9, 0x06, 0x4e, 0x04, 0x01, 0x96, 0x09, 0x75, 0x7d, 0x95, 0xb2, 0xe0, 0xc5, 0xa3, 0xfd, 0xe3, 0x77, 0xa8, 0x7f, 0xcd, 0x38, 0xb3, 0x2f, 0x80, 0x61, 0xbd, 0x3d, 0xc8, 0x1c, 0xbb, 0xdb, 0x96, 0xca, 0x62, 0x6e, 0x65, 0x82, 0xba, 0x61, 0xdc, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2486 = { .name = "ecdsa_brainpoolp512r1_sha512_2486", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2486_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2486_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2486_sig, .siglen = 128, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 366 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2487 for ECDSA, tcId is 367 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2487_pubkey[] = { 0x34, 0x30, 0x8c, 0x7d, 0x6e, 0xaa, 0x1b, 0xd7, 0xd8, 0xed, 0xc0, 0x2f, 0xc6, 0x27, 0x7c, 0x52, 0x71, 0xca, 0x84, 0x74, 0x28, 0xff, 0x21, 0x0d, 0x60, 0x78, 0xec, 0x96, 0x8d, 0xf4, 0xe8, 0x73, 0x0e, 0x21, 0xbc, 0x77, 0x15, 0xa7, 0xee, 0x85, 0xa7, 0x35, 0x28, 0x02, 0x46, 0x6c, 0x0a, 0xb2, 0x35, 0x60, 0x92, 0x9b, 0xab, 0x49, 0x29, 0x65, 0x09, 0x93, 0x7f, 0xe7, 0xcd, 0x6e, 0xdc, 0x02, 0x36, 0x49, 0x1a, 0x29, 0xb8, 0x6e, 0xa0, 0xe6, 0x12, 0x4f, 0x4b, 0x72, 0x10, 0x1f, 0x48, 0x23, 0x0b, 0xdc, 0x1f, 0x5b, 0x36, 0xd2, 0xe6, 0x50, 0x0c, 0x3f, 0xfd, 0x4b, 0xa9, 0x81, 0x8b, 0x43, 0x50, 0x46, 0x33, 0x5a, 0x2d, 0xa1, 0x5a, 0x89, 0xbc, 0x51, 0x11, 0x72, 0x04, 0xd3, 0x30, 0x83, 0x2a, 0xbc, 0x0f, 0x7b, 0x09, 0xa5, 0x9d, 0x82, 0xbb, 0xb0, 0x1d, 0x71, 0x76, 0x2d, 0x8d, 0xf5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2487_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2487_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x25, 0x02, 0x9c, 0x0d, 0xe2, 0x21, 0x6b, 0xab, 0x72, 0xaf, 0x9e, 0xc8, 0x23, 0x41, 0x1e, 0x7e, 0xe4, 0x44, 0x48, 0x2b, 0xc2, 0x68, 0xae, 0x1b, 0xa9, 0x06, 0x4e, 0x04, 0x01, 0x96, 0x09, 0x75, 0x7d, 0x95, 0xb2, 0xe0, 0xc5, 0xa3, 0xfd, 0xe3, 0x77, 0xa8, 0x7f, 0xcd, 0x38, 0xb3, 0x2f, 0x80, 0x61, 0xbd, 0x3d, 0xc8, 0x1c, 0xbb, 0xdb, 0x96, 0xca, 0x62, 0x6e, 0x65, 0x82, 0xba, 0x61, 0xdc, 0x31, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2487 = { .name = "ecdsa_brainpoolp512r1_sha512_2487", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2487_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2487_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2487_sig, .siglen = 128, .result = 1, .comment = "100-bit r and s^-1, tcId is 367 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2488 for ECDSA, tcId is 368 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2488_pubkey[] = { 0x78, 0xd3, 0x5a, 0x1c, 0x8a, 0x83, 0x99, 0x73, 0x00, 0xa0, 0x2e, 0xb4, 0x77, 0x91, 0x6e, 0x70, 0x95, 0xb0, 0x01, 0xbf, 0xc4, 0x73, 0x41, 0x52, 0x8f, 0x75, 0xc6, 0xce, 0xbe, 0xfd, 0x2d, 0x59, 0xc5, 0xd5, 0xef, 0xae, 0xae, 0x9c, 0x5b, 0xd8, 0xad, 0x4b, 0xdb, 0xad, 0x76, 0xda, 0x1c, 0xbc, 0xd3, 0x54, 0x7a, 0x95, 0xd3, 0x92, 0xdf, 0xf5, 0x3c, 0xe8, 0x5b, 0xc4, 0xe4, 0xb2, 0x3f, 0xf9, 0x4b, 0xb3, 0x42, 0x7e, 0x60, 0x74, 0x13, 0x8f, 0xc0, 0xe4, 0x38, 0x32, 0x0a, 0x31, 0x4e, 0x20, 0x36, 0x71, 0x37, 0x13, 0x3b, 0x4f, 0xee, 0x63, 0xd8, 0x0e, 0xcf, 0xb5, 0x93, 0x16, 0x66, 0xb0, 0x87, 0x3d, 0xcd, 0x45, 0x6a, 0x36, 0x99, 0x4e, 0xdf, 0xda, 0x75, 0xb0, 0xf3, 0xea, 0x81, 0x73, 0x22, 0x77, 0xe7, 0x7a, 0xdc, 0x43, 0xa4, 0x81, 0xff, 0x0f, 0x0e, 0xd4, 0xd2, 0xf3, 0x7f, 0xf0, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2488_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2488_sig[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa8, 0xff, 0xe9, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2488 = { .name = "ecdsa_brainpoolp512r1_sha512_2488", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2488_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2488_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2488_sig, .siglen = 128, .result = 1, .comment = "r and s^-1 are close to n, tcId is 368 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2489 for ECDSA, tcId is 369 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2489_pubkey[] = { 0x90, 0x19, 0xbe, 0x20, 0xf6, 0x40, 0xec, 0xb2, 0xb7, 0xc3, 0x31, 0x1b, 0xcd, 0xa8, 0x70, 0x95, 0x49, 0x38, 0xa7, 0x80, 0x68, 0x6c, 0x06, 0x3f, 0xe0, 0xab, 0x26, 0xf5, 0x7b, 0xa6, 0x05, 0x11, 0xff, 0x3c, 0xee, 0x32, 0x86, 0xd8, 0xd9, 0x04, 0x87, 0xeb, 0x80, 0x14, 0x78, 0x8a, 0x1f, 0x13, 0x4e, 0xd5, 0x9a, 0x77, 0x4f, 0xdb, 0x8b, 0x0d, 0x24, 0x77, 0x0b, 0xf2, 0x30, 0x1b, 0x2d, 0x18, 0x08, 0xfe, 0x93, 0x4d, 0xc9, 0x11, 0xd1, 0x5c, 0x44, 0xe5, 0x9b, 0x90, 0x26, 0x81, 0x1e, 0x7c, 0xd8, 0xfd, 0xd8, 0x74, 0x41, 0x0d, 0x51, 0xa5, 0x6f, 0x5a, 0xea, 0x13, 0x7b, 0xfc, 0x4a, 0x8e, 0x85, 0xb7, 0xeb, 0xa7, 0x52, 0x89, 0x49, 0xcd, 0xab, 0xc4, 0xd3, 0x3a, 0xef, 0x16, 0x15, 0x7d, 0x14, 0xe3, 0xf5, 0xf6, 0x8b, 0xde, 0x5d, 0xe1, 0xc5, 0x19, 0x69, 0x17, 0xa5, 0x6d, 0xab, 0x29, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2489_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2489_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2489 = { .name = "ecdsa_brainpoolp512r1_sha512_2489", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2489_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2489_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2489_sig, .siglen = 128, .result = 1, .comment = "s == 1, tcId is 369 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2490 for ECDSA, tcId is 370 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2490_pubkey[] = { 0x90, 0x19, 0xbe, 0x20, 0xf6, 0x40, 0xec, 0xb2, 0xb7, 0xc3, 0x31, 0x1b, 0xcd, 0xa8, 0x70, 0x95, 0x49, 0x38, 0xa7, 0x80, 0x68, 0x6c, 0x06, 0x3f, 0xe0, 0xab, 0x26, 0xf5, 0x7b, 0xa6, 0x05, 0x11, 0xff, 0x3c, 0xee, 0x32, 0x86, 0xd8, 0xd9, 0x04, 0x87, 0xeb, 0x80, 0x14, 0x78, 0x8a, 0x1f, 0x13, 0x4e, 0xd5, 0x9a, 0x77, 0x4f, 0xdb, 0x8b, 0x0d, 0x24, 0x77, 0x0b, 0xf2, 0x30, 0x1b, 0x2d, 0x18, 0x08, 0xfe, 0x93, 0x4d, 0xc9, 0x11, 0xd1, 0x5c, 0x44, 0xe5, 0x9b, 0x90, 0x26, 0x81, 0x1e, 0x7c, 0xd8, 0xfd, 0xd8, 0x74, 0x41, 0x0d, 0x51, 0xa5, 0x6f, 0x5a, 0xea, 0x13, 0x7b, 0xfc, 0x4a, 0x8e, 0x85, 0xb7, 0xeb, 0xa7, 0x52, 0x89, 0x49, 0xcd, 0xab, 0xc4, 0xd3, 0x3a, 0xef, 0x16, 0x15, 0x7d, 0x14, 0xe3, 0xf5, 0xf6, 0x8b, 0xde, 0x5d, 0xe1, 0xc5, 0x19, 0x69, 0x17, 0xa5, 0x6d, 0xab, 0x29, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2490_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2490_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2490 = { .name = "ecdsa_brainpoolp512r1_sha512_2490", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2490_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2490_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2490_sig, .siglen = 128, .result = -1, .comment = "s == 0, tcId is 370 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2491 for ECDSA, tcId is 371 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2491_pubkey[] = { 0x41, 0x7d, 0xb8, 0xe9, 0x5f, 0x89, 0x13, 0x14, 0x57, 0x98, 0x3e, 0x75, 0x37, 0x90, 0x09, 0x90, 0x5d, 0x2d, 0x80, 0x08, 0xb7, 0x90, 0x51, 0x9d, 0x65, 0xe6, 0x50, 0xd3, 0xb6, 0x0a, 0x32, 0x56, 0x3c, 0x18, 0xc5, 0xaf, 0xd0, 0x6c, 0xa3, 0x14, 0xbc, 0x3a, 0x17, 0x74, 0x60, 0x87, 0xa5, 0x78, 0xce, 0x78, 0xcb, 0xb6, 0x0c, 0xb5, 0x99, 0xcf, 0x0d, 0xd9, 0xcf, 0xf2, 0x2a, 0xcb, 0x84, 0xcf, 0x0b, 0x86, 0xf2, 0xe5, 0x7c, 0xe2, 0x98, 0xc8, 0x5b, 0xc2, 0x8f, 0x3d, 0x02, 0x74, 0xcf, 0x31, 0x40, 0xea, 0x5f, 0xc6, 0x01, 0x5f, 0x4b, 0x63, 0x6f, 0xb2, 0x71, 0xda, 0x09, 0x44, 0x5e, 0x15, 0xad, 0xcb, 0x60, 0xae, 0x1f, 0x6d, 0x00, 0x1a, 0xd4, 0xe2, 0x5e, 0x6d, 0x69, 0x76, 0x72, 0x36, 0xcc, 0x16, 0xe7, 0x25, 0xf5, 0xd7, 0xb2, 0xaf, 0x44, 0x99, 0x39, 0x01, 0x7a, 0x8c, 0x8c, 0x85, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2491_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2491_sig[] = { 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2491 = { .name = "ecdsa_brainpoolp512r1_sha512_2491", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2491_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2491_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2491_sig, .siglen = 128, .result = -1, .comment = "point at infinity during verify, tcId is 371 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2492 for ECDSA, tcId is 372 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2492_pubkey[] = { 0x9a, 0x8e, 0x0c, 0x2a, 0xa4, 0x95, 0x52, 0x03, 0xdf, 0x86, 0x6d, 0x44, 0xea, 0x32, 0x0d, 0x62, 0xfa, 0x43, 0xf1, 0xba, 0xea, 0xbc, 0xcd, 0x34, 0xec, 0x08, 0x49, 0xb3, 0xfa, 0x19, 0xbe, 0x29, 0x00, 0xca, 0x10, 0x67, 0x7c, 0x03, 0x6d, 0xa9, 0xdb, 0xb5, 0x1c, 0xa6, 0x03, 0x81, 0xcd, 0x58, 0xdf, 0xab, 0x9b, 0x2a, 0x1f, 0x6f, 0x77, 0x6b, 0x71, 0x2a, 0x22, 0xd6, 0x57, 0x57, 0x85, 0xd5, 0x1b, 0xed, 0x65, 0x2c, 0xf7, 0x75, 0xd9, 0x1b, 0xff, 0x11, 0xf9, 0x88, 0x65, 0x4a, 0xde, 0x8d, 0xd2, 0x84, 0x15, 0xb7, 0xc0, 0xde, 0x7d, 0x2c, 0x74, 0x24, 0x25, 0x6c, 0x3f, 0xd7, 0x1e, 0x9c, 0x4f, 0xab, 0xf1, 0xef, 0xf3, 0x80, 0xfd, 0xe6, 0xf8, 0xa8, 0xfe, 0x0d, 0x15, 0x60, 0xd1, 0x21, 0xba, 0x65, 0x61, 0x84, 0x51, 0xef, 0x60, 0xf9, 0x35, 0xd2, 0x92, 0xac, 0x2a, 0x26, 0x72, 0x9c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2492_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2492_sig[] = { 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2492 = { .name = "ecdsa_brainpoolp512r1_sha512_2492", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2492_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2492_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2492_sig, .siglen = 128, .result = 1, .comment = "edge case for signature malleability, tcId is 372 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2493 for ECDSA, tcId is 373 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2493_pubkey[] = { 0x23, 0xfa, 0xce, 0x62, 0x06, 0x2c, 0xed, 0x95, 0xc7, 0x88, 0x8f, 0xcf, 0x7d, 0x4c, 0x5a, 0xf3, 0xd2, 0xa2, 0xa1, 0xcb, 0xf0, 0x86, 0x93, 0x26, 0x49, 0x69, 0x62, 0x18, 0x82, 0x73, 0x8a, 0xd7, 0x98, 0x47, 0x6f, 0xac, 0x70, 0x36, 0x1b, 0xbf, 0x2c, 0xc7, 0x9c, 0x24, 0x9f, 0xc5, 0x02, 0x71, 0xc1, 0xbf, 0xdc, 0x3f, 0x5b, 0xca, 0x20, 0xeb, 0xcc, 0xea, 0x8c, 0x36, 0x58, 0xf8, 0xd4, 0xe3, 0x07, 0x3c, 0x1a, 0x74, 0xb3, 0xc4, 0x6a, 0x20, 0x5d, 0x97, 0x07, 0x78, 0x33, 0xdc, 0xa1, 0xf3, 0x63, 0xf7, 0x6f, 0x67, 0xb6, 0x8e, 0xe1, 0x76, 0x43, 0x85, 0x28, 0xaa, 0x76, 0xab, 0xbc, 0x36, 0xb6, 0xf0, 0xa9, 0x88, 0xfb, 0x22, 0x5f, 0xe7, 0xa3, 0x3e, 0xe8, 0x85, 0x1f, 0xf2, 0x4e, 0x37, 0x13, 0x82, 0x43, 0xe2, 0xb2, 0x1d, 0xa8, 0x52, 0xa3, 0x34, 0xdb, 0xd0, 0x36, 0xcf, 0x10, 0x39, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2493_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2493_sig[] = { 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x34, 0x55, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x35, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2493 = { .name = "ecdsa_brainpoolp512r1_sha512_2493", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2493_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2493_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2493_sig, .siglen = 128, .result = 1, .comment = "edge case for signature malleability, tcId is 373 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2494 for ECDSA, tcId is 374 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2494_pubkey[] = { 0x38, 0x59, 0x7c, 0x68, 0xea, 0xbf, 0xbe, 0x64, 0x8b, 0xca, 0x0b, 0x3e, 0x8d, 0x23, 0x5f, 0x90, 0x82, 0xcf, 0x15, 0xd6, 0x94, 0xe1, 0x4e, 0x68, 0x6b, 0x1e, 0x0a, 0x89, 0xb7, 0x3e, 0x3d, 0xbc, 0x34, 0x6e, 0xbb, 0xde, 0x38, 0xda, 0x2c, 0x60, 0x2f, 0xe9, 0x75, 0xc2, 0x1a, 0x1f, 0xbc, 0x8f, 0x36, 0x3b, 0x59, 0x29, 0x03, 0xd0, 0x2d, 0x44, 0x34, 0xfa, 0xe5, 0x2e, 0xe8, 0xcc, 0x3b, 0x3a, 0x57, 0x2b, 0x82, 0x08, 0x47, 0x47, 0xea, 0x5a, 0xf0, 0x63, 0x39, 0x36, 0xb5, 0x70, 0x35, 0x43, 0x65, 0xee, 0x2d, 0x7f, 0xba, 0x4c, 0x40, 0x4b, 0xd6, 0x94, 0x58, 0xeb, 0x82, 0x50, 0x07, 0xed, 0x89, 0x06, 0x7e, 0xff, 0xec, 0x6b, 0x2e, 0x67, 0xc3, 0x2d, 0x19, 0x7e, 0x8c, 0x28, 0xec, 0xfe, 0xfa, 0x7e, 0xe7, 0x9c, 0xea, 0x09, 0xd7, 0xeb, 0x24, 0x89, 0x25, 0xc5, 0x43, 0xc3, 0x0b, 0xa5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2494_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2494_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x23, 0x21, 0x02, 0x81, 0x75, 0x7b, 0x30, 0xe1, 0x92, 0x18, 0xa3, 0x7c, 0xbd, 0x61, 0x20, 0x86, 0xfb, 0xc1, 0x58, 0xca, 0xa8, 0xb4, 0xe1, 0xac, 0xb2, 0xec, 0x00, 0x83, 0x7e, 0x5d, 0x94, 0x1f, 0x34, 0x2f, 0xb3, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2494 = { .name = "ecdsa_brainpoolp512r1_sha512_2494", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2494_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2494_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2494_sig, .siglen = 128, .result = 1, .comment = "u1 == 1, tcId is 374 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2495 for ECDSA, tcId is 375 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2495_pubkey[] = { 0x9d, 0x60, 0xec, 0x91, 0x97, 0x6a, 0x8f, 0xc7, 0xf8, 0x42, 0x28, 0x76, 0xcc, 0xb2, 0x28, 0x70, 0xec, 0xa8, 0xd3, 0x9b, 0x8c, 0xdf, 0xc3, 0x01, 0x93, 0xe3, 0xbb, 0x22, 0xa1, 0x0e, 0x37, 0xc5, 0x37, 0xa0, 0x92, 0xdb, 0xb0, 0x12, 0x4c, 0x8c, 0x4b, 0x26, 0x65, 0x5a, 0xd9, 0x61, 0x27, 0xd3, 0x14, 0x0b, 0xc1, 0xf9, 0x55, 0x6e, 0xba, 0xbf, 0x47, 0x7f, 0xd9, 0x59, 0x51, 0xb4, 0xb0, 0xdd, 0x2b, 0xc1, 0xfc, 0xd7, 0xd6, 0x84, 0x0f, 0xd8, 0x3a, 0x5e, 0x98, 0x23, 0x61, 0xc3, 0x04, 0xa3, 0x4e, 0xd1, 0x0e, 0x87, 0x3a, 0xa4, 0x63, 0x7e, 0xca, 0xc2, 0x9f, 0x55, 0x5c, 0x05, 0x26, 0xb5, 0x19, 0xc2, 0x38, 0xce, 0x0b, 0x00, 0x2d, 0x7e, 0x2f, 0x98, 0x22, 0x5d, 0xec, 0x88, 0x4c, 0x95, 0xd7, 0x42, 0xe8, 0x6f, 0xa6, 0x8c, 0xe6, 0xe8, 0x1f, 0x65, 0x42, 0xfe, 0x81, 0x73, 0x0c, 0xfb, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2495_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2495_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x66, 0xe5, 0x9c, 0xbc, 0xf0, 0xf0, 0xa0, 0xfe, 0xe7, 0x25, 0x6d, 0x52, 0x66, 0x1c, 0xf7, 0x4b, 0x81, 0x63, 0x08, 0xa7, 0x7a, 0x7c, 0x9e, 0x8c, 0x41, 0x30, 0x46, 0x1a, 0x4d, 0x12, 0x05, 0xee, 0xdf, 0xc3, 0x2b, 0x5f, 0xba, 0x90, 0x82, 0x9c, 0x84, 0x25, 0x40, 0x92, 0x83, 0xea, 0xb7, 0x7c, 0x74, 0xfc, 0xf1, 0xd4, 0x55, 0x71, 0xda, 0x5a, 0x37, 0x2a, 0x02, 0x63, 0x68, 0x79, 0x4c, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2495 = { .name = "ecdsa_brainpoolp512r1_sha512_2495", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2495_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2495_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2495_sig, .siglen = 128, .result = 1, .comment = "u1 == n - 1, tcId is 375 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2496 for ECDSA, tcId is 376 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2496_pubkey[] = { 0xa9, 0x11, 0xdf, 0x35, 0x0e, 0x95, 0xc0, 0xda, 0x4d, 0x56, 0xc3, 0xc4, 0x4a, 0x84, 0xaa, 0xd8, 0x8e, 0xe8, 0x5e, 0x62, 0x8c, 0xcc, 0x44, 0xc5, 0xe1, 0x31, 0xdf, 0xad, 0x8a, 0x3f, 0xc6, 0x9e, 0xed, 0x9c, 0x62, 0x0e, 0xd8, 0xc8, 0x21, 0xc8, 0x4d, 0xe2, 0xc2, 0x11, 0x3c, 0x1d, 0x6c, 0x10, 0xaa, 0xea, 0x55, 0x44, 0x90, 0x3b, 0x1d, 0x59, 0x67, 0x8d, 0x39, 0xb0, 0x52, 0xe0, 0xf1, 0xb3, 0xa2, 0xc1, 0x6d, 0x1e, 0x74, 0xae, 0x6f, 0xd9, 0x93, 0xb9, 0x86, 0x23, 0x46, 0x65, 0xed, 0xa1, 0x4f, 0xf6, 0x78, 0xe5, 0x8c, 0x41, 0x4a, 0xe5, 0x5d, 0xe8, 0xaa, 0x1e, 0xda, 0x26, 0x24, 0x2d, 0x61, 0x6b, 0x26, 0x7e, 0x6f, 0xdb, 0x74, 0x91, 0xef, 0xb5, 0xa3, 0xc1, 0x79, 0xb8, 0x49, 0x03, 0x12, 0x70, 0x70, 0xe5, 0xe2, 0x59, 0x7d, 0x2f, 0x0b, 0x2a, 0xf3, 0x33, 0xb6, 0x34, 0x98, 0x57, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2496_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2496_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2496 = { .name = "ecdsa_brainpoolp512r1_sha512_2496", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2496_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2496_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2496_sig, .siglen = 128, .result = 1, .comment = "u2 == 1, tcId is 376 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2497 for ECDSA, tcId is 377 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2497_pubkey[] = { 0x01, 0x82, 0x3d, 0xb8, 0xfd, 0x2b, 0xa4, 0xa3, 0x4b, 0xac, 0xc4, 0xf6, 0x42, 0x83, 0x90, 0x9f, 0x4d, 0x01, 0xd0, 0x2b, 0x8d, 0xb6, 0x6f, 0x9c, 0xb9, 0xbd, 0x77, 0x80, 0x6b, 0x89, 0x0b, 0xa3, 0x1a, 0x69, 0x15, 0xb9, 0x3d, 0xcb, 0xdd, 0x72, 0xc8, 0x33, 0x38, 0xeb, 0x60, 0x29, 0xf2, 0x2c, 0x31, 0x79, 0x57, 0x12, 0xb1, 0xac, 0x7a, 0x1f, 0xb8, 0x1a, 0x30, 0x4e, 0x3c, 0x58, 0xd8, 0xd5, 0x4e, 0xc2, 0x67, 0xba, 0xd3, 0x98, 0x4a, 0x3e, 0x2f, 0xd8, 0x7d, 0xef, 0xbe, 0x86, 0x3d, 0x73, 0x88, 0x58, 0x72, 0x48, 0x8b, 0xdd, 0xa9, 0xd6, 0xe3, 0xda, 0x8e, 0xcf, 0x8e, 0xab, 0xfd, 0x46, 0x74, 0xd2, 0x01, 0x27, 0x8f, 0xfc, 0x63, 0xcb, 0xc1, 0xff, 0xa0, 0xf9, 0x9e, 0xb5, 0xe8, 0x5c, 0x9b, 0x20, 0xae, 0x10, 0xa2, 0x26, 0xe1, 0xe5, 0x59, 0x4c, 0xa7, 0x8f, 0xc0, 0xd5, 0x31, 0xd8, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2497_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2497_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x71, 0xe9, 0x13, 0xd0, 0x92, 0x9b, 0xd8, 0x5c, 0xd5, 0x38, 0x99, 0xc9, 0x77, 0xdb, 0xfd, 0x5a, 0x87, 0x75, 0xb3, 0xcd, 0x22, 0x86, 0x8c, 0x09, 0xe4, 0x42, 0x68, 0x86, 0xf5, 0x77, 0x5a, 0xf5, 0x8e, 0x29, 0x92, 0xd6, 0x33, 0x1b, 0x6e, 0xbb, 0x81, 0x04, 0x40, 0xbb, 0xaa, 0x72, 0xb5, 0x84, 0xbe, 0x76, 0x8d, 0x00, 0xb0, 0x3e, 0x91, 0xe9, 0x23, 0xaf, 0xb9, 0xac, 0x68, 0x70, 0xaa, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2497 = { .name = "ecdsa_brainpoolp512r1_sha512_2497", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2497_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2497_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2497_sig, .siglen = 128, .result = 1, .comment = "u2 == n - 1, tcId is 377 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2498 for ECDSA, tcId is 378 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2498_pubkey[] = { 0x9f, 0xa4, 0x44, 0x01, 0xdb, 0x09, 0x8e, 0x9f, 0x28, 0x57, 0x9a, 0xaf, 0x02, 0xad, 0xff, 0x61, 0xfa, 0xf1, 0xe6, 0xf7, 0x03, 0x9c, 0xf1, 0xb3, 0x13, 0x4b, 0x83, 0xdf, 0xba, 0x96, 0x2b, 0x13, 0xa4, 0x39, 0x7d, 0xcd, 0xd6, 0xfe, 0xef, 0x4b, 0x64, 0xfc, 0x32, 0xeb, 0x3d, 0xfb, 0xa3, 0xf5, 0x96, 0xf5, 0xf7, 0x5b, 0xea, 0xbd, 0x3d, 0xad, 0xe4, 0x84, 0x08, 0x93, 0x10, 0xb6, 0x58, 0x22, 0x8b, 0xb1, 0x89, 0x7c, 0x75, 0xda, 0x51, 0xe5, 0x6d, 0xb1, 0x9d, 0x8d, 0xf1, 0x36, 0x23, 0x75, 0x4a, 0x0d, 0xb9, 0xd6, 0xda, 0x50, 0x02, 0xff, 0xc8, 0xa7, 0x3b, 0xe2, 0x1b, 0x80, 0xee, 0xec, 0xca, 0x35, 0xec, 0x54, 0x1e, 0x81, 0x83, 0x1b, 0x3f, 0xec, 0x4c, 0xc3, 0x19, 0x3d, 0xc5, 0x92, 0x9f, 0x12, 0xc4, 0xc4, 0x63, 0xa4, 0x10, 0x79, 0x11, 0xbb, 0xb0, 0xf1, 0x5a, 0xe3, 0x90, 0xef, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2498_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2498_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x4f, 0x9c, 0x8a, 0x3c, 0x42, 0x4b, 0xa2, 0xb2, 0x88, 0x2c, 0x20, 0x03, 0x55, 0xd2, 0x55, 0x96, 0xb1, 0xaa, 0x06, 0x3f, 0xf9, 0xb2, 0x57, 0x30, 0x79, 0x32, 0x51, 0x28, 0xdb, 0xc6, 0xae, 0x50, 0x98, 0xe8, 0x84, 0x60, 0xf4, 0xeb, 0x43, 0x31, 0xff, 0xa2, 0x80, 0x8a, 0xd3, 0xcf, 0x23, 0x05, 0xec, 0xcc, 0xe7, 0x0f, 0x3e, 0x6d, 0xf3, 0xcb, 0x11, 0x4c, 0x63, 0x8b, 0x45, 0x9d, 0x91, 0x67, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2498 = { .name = "ecdsa_brainpoolp512r1_sha512_2498", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2498_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2498_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2498_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 378 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2499 for ECDSA, tcId is 379 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2499_pubkey[] = { 0x0f, 0xe7, 0xf7, 0xca, 0x44, 0x45, 0x35, 0x60, 0xe1, 0xba, 0x38, 0xb3, 0x4e, 0xc8, 0xdf, 0xbc, 0x74, 0x5e, 0xde, 0xfc, 0x58, 0x87, 0x82, 0x55, 0x45, 0x2f, 0x61, 0x4f, 0xee, 0x56, 0x1a, 0x8a, 0x62, 0x0b, 0x4d, 0x86, 0x24, 0xe1, 0x59, 0xbd, 0x48, 0x3d, 0xb0, 0x8c, 0x9a, 0x62, 0x10, 0x0f, 0xd2, 0xea, 0x69, 0xef, 0x73, 0x81, 0xf5, 0x20, 0xab, 0xe6, 0x51, 0xb2, 0xea, 0x22, 0x6e, 0xea, 0x15, 0x6e, 0x75, 0xaf, 0x46, 0x5b, 0x22, 0xd2, 0x26, 0x40, 0x83, 0x14, 0x53, 0x6d, 0x42, 0x38, 0xa7, 0x39, 0xfd, 0x2f, 0x40, 0x03, 0xba, 0xc5, 0x52, 0xae, 0x34, 0xbf, 0xa2, 0x7e, 0x9b, 0xe4, 0x60, 0xfe, 0x40, 0xa5, 0x46, 0x8c, 0xed, 0xd3, 0x22, 0x10, 0x48, 0xcd, 0x1b, 0x8d, 0x79, 0x6b, 0xc2, 0x74, 0x94, 0x56, 0x5f, 0x88, 0xaa, 0xf7, 0xfc, 0xcc, 0x4c, 0x0f, 0xc3, 0x6b, 0x78, 0xb1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2499_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2499_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x28, 0x20, 0xc6, 0x03, 0x53, 0x4f, 0x43, 0x0d, 0xb8, 0xe4, 0x97, 0x27, 0x24, 0x4a, 0x31, 0x6a, 0xcd, 0x6e, 0xa3, 0x07, 0x33, 0x07, 0x0d, 0xc4, 0xfd, 0xd2, 0x4e, 0x22, 0x11, 0xdd, 0xed, 0x80, 0x59, 0x7a, 0x9c, 0xb6, 0xbd, 0x86, 0x6f, 0x37, 0xb2, 0x55, 0x05, 0x7a, 0xb7, 0x71, 0x92, 0x5e, 0xb4, 0x39, 0x29, 0x33, 0x19, 0xa9, 0xa2, 0xc1, 0x2d, 0xc0, 0xb7, 0xcb, 0x1d, 0xbf, 0x4f, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2499 = { .name = "ecdsa_brainpoolp512r1_sha512_2499", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2499_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2499_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2499_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 379 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2500 for ECDSA, tcId is 380 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2500_pubkey[] = { 0x99, 0xe5, 0xc3, 0xad, 0x1e, 0xf5, 0x3a, 0xd7, 0x80, 0xc3, 0xc4, 0xd9, 0x0c, 0x27, 0xcc, 0x19, 0x86, 0x49, 0x6a, 0x21, 0x5b, 0x25, 0x82, 0x9a, 0x88, 0xde, 0x20, 0x0a, 0x9c, 0x21, 0x46, 0xae, 0xc8, 0xf1, 0x82, 0xdc, 0x6d, 0xec, 0x66, 0x11, 0xc7, 0xff, 0xda, 0x1a, 0x55, 0xb0, 0xcc, 0xb2, 0x04, 0x5b, 0x1e, 0xd5, 0xc9, 0x23, 0x1b, 0x9e, 0xb3, 0xcb, 0x23, 0x24, 0x17, 0xe2, 0xfc, 0xfa, 0x35, 0xe8, 0xb3, 0xf6, 0x04, 0xf5, 0xd7, 0x93, 0xd1, 0x35, 0xce, 0x06, 0xe2, 0x3f, 0xc6, 0xac, 0x82, 0xc0, 0x99, 0x7d, 0xe9, 0xe3, 0xf4, 0xd2, 0xdc, 0x36, 0x36, 0xba, 0x0b, 0x52, 0x1c, 0x78, 0x57, 0x76, 0xdb, 0xc8, 0xd4, 0x8d, 0xa5, 0xd5, 0x9a, 0x86, 0xfb, 0x3e, 0x90, 0xfb, 0x00, 0xbc, 0xcb, 0x01, 0x7d, 0x25, 0x10, 0x0b, 0xe8, 0xe3, 0x5d, 0xb1, 0xdf, 0xb5, 0xb4, 0x49, 0x67, 0xef, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2500_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2500_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x6e, 0x5d, 0x2d, 0xd1, 0xe3, 0xd2, 0x78, 0xeb, 0xc6, 0xf7, 0x34, 0x09, 0x65, 0x1e, 0xbc, 0x46, 0xb6, 0x5c, 0x6c, 0x3e, 0xfe, 0x11, 0x65, 0xb7, 0x4b, 0x51, 0x64, 0x35, 0x67, 0x83, 0x25, 0x1e, 0x3b, 0xb6, 0x66, 0x80, 0x4f, 0xaa, 0x7b, 0xf3, 0x89, 0xb5, 0xff, 0x28, 0x5b, 0x66, 0xb9, 0x12, 0xc5, 0x1c, 0x47, 0x8c, 0x58, 0xcd, 0x2d, 0xbe, 0x52, 0x93, 0xd9, 0x57, 0x35, 0xab, 0x94, 0x36, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2500 = { .name = "ecdsa_brainpoolp512r1_sha512_2500", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2500_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2500_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2500_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 380 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2501 for ECDSA, tcId is 381 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2501_pubkey[] = { 0x42, 0x3f, 0xc7, 0xaa, 0x8d, 0x6d, 0x77, 0xfa, 0xe6, 0x0b, 0xeb, 0xce, 0x77, 0x57, 0xe1, 0x56, 0x89, 0x42, 0x6c, 0xba, 0xbd, 0x2c, 0x3f, 0xa6, 0xff, 0x71, 0xda, 0x77, 0x65, 0xab, 0x88, 0x7a, 0x93, 0xc9, 0x3c, 0xb8, 0xe1, 0x00, 0x88, 0x92, 0xc0, 0xd8, 0xf1, 0xe0, 0x3e, 0x48, 0x55, 0x5c, 0x81, 0xdf, 0xc4, 0x33, 0xd4, 0x2f, 0x48, 0x90, 0xb7, 0x11, 0x77, 0xb8, 0x48, 0xaa, 0xb9, 0xcc, 0x1f, 0xf6, 0xab, 0xd7, 0xc7, 0xf9, 0x53, 0xde, 0x79, 0x74, 0x80, 0xe2, 0x92, 0xb9, 0x87, 0xdd, 0xf4, 0x75, 0x70, 0xd8, 0x8d, 0xc5, 0xe5, 0x1c, 0x7a, 0x47, 0xc3, 0x57, 0xd7, 0x19, 0x78, 0x19, 0x09, 0x31, 0x97, 0x6f, 0x55, 0xcc, 0x84, 0xc3, 0xa4, 0xcd, 0x46, 0x35, 0xed, 0x5b, 0xa4, 0x92, 0x0e, 0xfa, 0x82, 0x19, 0xc7, 0xaa, 0x16, 0x85, 0xbf, 0x1a, 0x9b, 0xc7, 0x12, 0x9f, 0xa2, 0xcb, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2501_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2501_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2b, 0xd0, 0xea, 0x22, 0xdf, 0x17, 0xe2, 0xf0, 0x85, 0x40, 0x94, 0x00, 0x2d, 0xf5, 0x6a, 0x63, 0xda, 0x80, 0x71, 0x32, 0x74, 0xb5, 0x19, 0x23, 0x27, 0xb1, 0xd8, 0x6c, 0x25, 0x64, 0x37, 0xbd, 0x10, 0xf7, 0xa2, 0x1e, 0x1c, 0x74, 0x80, 0x83, 0x6d, 0xea, 0x40, 0xf5, 0x6e, 0xe9, 0xb5, 0x81, 0x0c, 0x68, 0xf2, 0xa0, 0x6e, 0x72, 0x8a, 0x80, 0x2d, 0x01, 0xb5, 0xa5, 0x14, 0xdb, 0x69, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2501 = { .name = "ecdsa_brainpoolp512r1_sha512_2501", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2501_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2501_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2501_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 381 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2502 for ECDSA, tcId is 382 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2502_pubkey[] = { 0x41, 0x5e, 0x9d, 0x50, 0xaf, 0x5d, 0xa7, 0x11, 0x89, 0x60, 0x78, 0x11, 0x68, 0x0d, 0xc1, 0x6d, 0x3d, 0xa9, 0xa0, 0xe3, 0x39, 0xa5, 0x3d, 0x16, 0x6b, 0x9b, 0x22, 0x68, 0x06, 0xa6, 0xff, 0xda, 0xe0, 0x1e, 0xb4, 0x02, 0x95, 0xcf, 0x5e, 0x00, 0xf4, 0x7d, 0xdf, 0x0b, 0x4a, 0xfa, 0x67, 0x29, 0xa8, 0xf7, 0xd1, 0x8a, 0x43, 0x7d, 0x15, 0x7d, 0xf4, 0xd9, 0x9c, 0x19, 0x18, 0x1e, 0xf5, 0x24, 0x90, 0x7e, 0xfd, 0xc1, 0x5b, 0x33, 0x86, 0x64, 0xe9, 0x11, 0xb6, 0x2f, 0x9a, 0xc0, 0x15, 0xd9, 0xe3, 0x6b, 0xb7, 0xbe, 0x0c, 0xcc, 0xdf, 0x33, 0x05, 0x17, 0xd5, 0x29, 0x70, 0xda, 0xb1, 0x88, 0x48, 0xbc, 0xe0, 0xbf, 0xdf, 0xc0, 0xbd, 0x39, 0xc6, 0x75, 0x75, 0x36, 0x66, 0x03, 0x6e, 0x4c, 0x4c, 0x5e, 0xb0, 0xc6, 0x23, 0x21, 0xb2, 0x2b, 0xd1, 0xcb, 0x1f, 0xa3, 0x52, 0x67, 0x0f, 0xbc, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2502_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2502_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x3d, 0xa9, 0x45, 0xbb, 0x81, 0x5e, 0xe5, 0x30, 0x3a, 0x05, 0xdc, 0x5e, 0xec, 0x32, 0x85, 0xb0, 0xa1, 0xed, 0xf4, 0x3b, 0xe7, 0xca, 0xa1, 0x9f, 0xc8, 0xf5, 0xac, 0x06, 0x12, 0x2b, 0x34, 0x51, 0xd8, 0x5b, 0x7d, 0xf2, 0xda, 0x41, 0xf3, 0x47, 0xe2, 0xe5, 0x14, 0x58, 0xf3, 0x9d, 0x4d, 0x16, 0xc3, 0xcc, 0x87, 0xaa, 0xd7, 0xb4, 0x51, 0x75, 0x8d, 0x3a, 0xfd, 0x97, 0x29, 0x65, 0x91, 0x56, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2502 = { .name = "ecdsa_brainpoolp512r1_sha512_2502", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2502_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2502_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2502_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 382 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2503 for ECDSA, tcId is 383 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2503_pubkey[] = { 0x2c, 0x65, 0xb6, 0x1f, 0xa1, 0xf4, 0xd3, 0xc8, 0x6c, 0x82, 0x9d, 0x15, 0xd4, 0xde, 0x5b, 0x47, 0xc5, 0xb7, 0x89, 0xf5, 0x3a, 0x43, 0x55, 0x66, 0x1f, 0x09, 0xee, 0xf3, 0xb9, 0x7b, 0x21, 0xa3, 0xb9, 0x3f, 0xae, 0x0f, 0x03, 0x5b, 0xf3, 0x47, 0xa3, 0x15, 0x59, 0x47, 0x85, 0x05, 0x9b, 0x37, 0xcc, 0xf8, 0x06, 0x2a, 0x39, 0x1a, 0xce, 0x30, 0xe6, 0x9a, 0x98, 0x4d, 0x84, 0x17, 0xca, 0x2c, 0x34, 0x1a, 0x80, 0x19, 0x65, 0x3a, 0xd6, 0x17, 0xda, 0x57, 0xc9, 0x99, 0x7c, 0x2d, 0xeb, 0xfa, 0xf3, 0x40, 0xa6, 0x78, 0x0b, 0xd8, 0x37, 0x1a, 0xee, 0x2c, 0x66, 0x8b, 0x7d, 0xcc, 0x70, 0xfe, 0x06, 0x78, 0x9b, 0x8f, 0x36, 0xf8, 0xf1, 0x3f, 0x40, 0x82, 0x2f, 0x04, 0x01, 0x10, 0x2e, 0x03, 0x74, 0x2c, 0x8f, 0xfa, 0xa1, 0xdc, 0xf0, 0xba, 0xf9, 0x81, 0xc7, 0xec, 0xc1, 0xa7, 0xe2, 0x78, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2503_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2503_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x7b, 0x52, 0x8b, 0x77, 0x02, 0xbd, 0xca, 0x60, 0x74, 0x0b, 0xb8, 0xbd, 0xd8, 0x65, 0x0b, 0x61, 0x43, 0xdb, 0xe8, 0x77, 0xcf, 0x95, 0x43, 0x3f, 0x91, 0xeb, 0x58, 0x0c, 0x24, 0x56, 0x68, 0xa3, 0xb0, 0xb6, 0xfb, 0xe5, 0xb4, 0x83, 0xe6, 0x8f, 0xc5, 0xca, 0x28, 0xb1, 0xe7, 0x3a, 0x9a, 0x2d, 0x87, 0x99, 0x0f, 0x55, 0xaf, 0x68, 0xa2, 0xeb, 0x1a, 0x75, 0xfb, 0x2e, 0x52, 0xcb, 0x22, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2503 = { .name = "ecdsa_brainpoolp512r1_sha512_2503", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2503_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2503_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2503_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 383 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2504 for ECDSA, tcId is 384 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2504_pubkey[] = { 0x6a, 0x82, 0x22, 0xda, 0x63, 0x25, 0x50, 0xf8, 0x5a, 0x0d, 0x59, 0xfa, 0x8e, 0x8f, 0x32, 0x7e, 0x16, 0x27, 0x4b, 0x63, 0x97, 0xd5, 0xa4, 0x2a, 0xa1, 0xbf, 0x6f, 0x1a, 0x1b, 0x5c, 0xed, 0xd3, 0xa1, 0x18, 0x2d, 0xd0, 0xf2, 0x2f, 0xca, 0x69, 0x0c, 0x5e, 0xf5, 0xa2, 0x61, 0xe6, 0xe5, 0xd8, 0xba, 0xe3, 0x4f, 0x2e, 0x1a, 0xe2, 0x94, 0xb5, 0x0a, 0x28, 0x7c, 0x88, 0x25, 0x74, 0xee, 0x7c, 0x82, 0xd8, 0x62, 0x18, 0x78, 0x23, 0x38, 0x75, 0x7b, 0x9b, 0xab, 0x35, 0x9e, 0x63, 0x51, 0x6c, 0xe3, 0xdb, 0xf5, 0xe7, 0xfd, 0xbd, 0x5b, 0xaa, 0x4a, 0xe9, 0x97, 0x13, 0xfe, 0x5d, 0xd8, 0x5b, 0xb6, 0x1e, 0xa1, 0x2a, 0x17, 0x8c, 0xfb, 0x50, 0xa2, 0x5e, 0xef, 0x41, 0xa0, 0x85, 0xdc, 0xd5, 0xe5, 0xb8, 0x8f, 0x14, 0x8b, 0xad, 0xf4, 0xc8, 0xf4, 0x03, 0x1e, 0x03, 0xd4, 0x9a, 0xec, 0x6b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2504_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2504_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2d, 0x17, 0x04, 0x8e, 0xe5, 0x7e, 0x45, 0xb6, 0x60, 0x57, 0xac, 0xfa, 0xb9, 0xc3, 0xb2, 0xa4, 0x93, 0x9e, 0x81, 0xb1, 0xeb, 0x0f, 0x89, 0x72, 0xa8, 0xc2, 0xb5, 0xaa, 0x6b, 0x04, 0xc1, 0x55, 0x84, 0x89, 0x4e, 0x16, 0x8e, 0x15, 0xdc, 0x5c, 0xf8, 0x89, 0xfa, 0x09, 0xf7, 0x93, 0x4d, 0x10, 0x84, 0xde, 0xf3, 0x51, 0x04, 0x2c, 0x2b, 0x97, 0xcd, 0xe3, 0xc1, 0x00, 0xb8, 0x94, 0xba, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2504 = { .name = "ecdsa_brainpoolp512r1_sha512_2504", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2504_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2504_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2504_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 384 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2505 for ECDSA, tcId is 385 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2505_pubkey[] = { 0xaa, 0x17, 0xb5, 0xbd, 0x2b, 0xbf, 0xce, 0x1a, 0xe1, 0x33, 0xe2, 0x47, 0x9f, 0xe1, 0xf8, 0x7e, 0x64, 0xe6, 0x16, 0x58, 0x97, 0xee, 0x45, 0x73, 0x91, 0xbc, 0x2d, 0xae, 0xe9, 0xfd, 0x76, 0x86, 0xb8, 0xd4, 0xbe, 0xc8, 0xec, 0xfa, 0x8a, 0x56, 0x93, 0xf3, 0x9b, 0x4e, 0xf9, 0xb4, 0x16, 0x3c, 0xdb, 0xc5, 0xc4, 0x54, 0x6f, 0xad, 0xba, 0x0c, 0xfe, 0x3e, 0x15, 0x32, 0xea, 0x2a, 0xad, 0xd4, 0x73, 0xfa, 0x93, 0x03, 0x97, 0x17, 0xf9, 0xdf, 0xd4, 0x9a, 0x9c, 0x28, 0x84, 0xdc, 0x2d, 0x10, 0x12, 0xd7, 0x1d, 0x60, 0x54, 0xea, 0x0f, 0x39, 0x16, 0x85, 0xbd, 0xe5, 0xe8, 0xc0, 0xd5, 0xd6, 0x11, 0xb4, 0x0b, 0xd1, 0xfb, 0xe3, 0x5d, 0xc5, 0xbd, 0x7e, 0x91, 0x6d, 0xdc, 0x9a, 0x66, 0xba, 0x54, 0xae, 0x89, 0x49, 0x77, 0x6f, 0x2f, 0x21, 0xd4, 0xcf, 0x54, 0xb2, 0xf6, 0xc7, 0x57, 0xc5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2505_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2505_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2b, 0x18, 0x98, 0x6d, 0x87, 0xbd, 0x21, 0xcd, 0xcb, 0xf0, 0xf1, 0x31, 0x03, 0x79, 0x47, 0x35, 0x97, 0x93, 0x54, 0x29, 0x0c, 0x43, 0xaa, 0x8c, 0x29, 0x8d, 0xbd, 0x47, 0x3d, 0xe5, 0xa3, 0x89, 0xcb, 0x55, 0xf0, 0x0c, 0x21, 0x84, 0xa2, 0x35, 0xf6, 0xb7, 0x34, 0x73, 0x05, 0x92, 0x6c, 0x0e, 0x25, 0x78, 0x5e, 0xca, 0x6d, 0x98, 0xeb, 0x2b, 0xd9, 0x21, 0x56, 0x21, 0x64, 0xf3, 0x65, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2505 = { .name = "ecdsa_brainpoolp512r1_sha512_2505", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2505_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2505_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2505_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 385 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2506 for ECDSA, tcId is 386 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2506_pubkey[] = { 0xa7, 0x2d, 0xe8, 0xd4, 0xd2, 0x89, 0x6f, 0x9b, 0xc6, 0xd7, 0x2a, 0x68, 0xf8, 0xb2, 0x58, 0x8f, 0xa2, 0xec, 0xb4, 0x99, 0x2e, 0x8e, 0x36, 0x16, 0xfd, 0x58, 0xa1, 0xa1, 0x2f, 0x03, 0x27, 0xdb, 0x1f, 0xc3, 0x74, 0x0e, 0xd3, 0x84, 0x02, 0x20, 0x78, 0x15, 0x6f, 0xe6, 0x67, 0x12, 0xbf, 0x09, 0x2c, 0xab, 0xbc, 0x43, 0x65, 0x9c, 0xdd, 0xc9, 0xcf, 0x3d, 0xbf, 0x80, 0x7b, 0xcf, 0x36, 0x35, 0x88, 0x19, 0x31, 0x9a, 0xef, 0x0e, 0x23, 0xb1, 0x42, 0xe7, 0x5d, 0x9c, 0x4c, 0x13, 0x98, 0x12, 0xe5, 0x5e, 0x1c, 0x41, 0x9d, 0x96, 0x08, 0x4a, 0x68, 0xb9, 0x50, 0x35, 0x6c, 0x46, 0xeb, 0x23, 0x57, 0x51, 0x2f, 0x20, 0x8b, 0xb1, 0xdb, 0xe9, 0x70, 0xd1, 0x90, 0x0c, 0x8d, 0xfd, 0xa7, 0x7d, 0x2f, 0x47, 0x77, 0x60, 0xdb, 0x63, 0xd2, 0x28, 0xdb, 0xf8, 0xb3, 0x42, 0x26, 0x5b, 0xcb, 0xde, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2506_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2506_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x44, 0x5f, 0x8c, 0xaa, 0xf2, 0x09, 0x3f, 0x68, 0x82, 0xbc, 0x6c, 0x7a, 0xf5, 0x37, 0xeb, 0xac, 0xbf, 0x86, 0x20, 0xf0, 0xb6, 0xac, 0x68, 0xa1, 0x9a, 0x5d, 0xe1, 0x93, 0x52, 0x25, 0xcc, 0x94, 0x9c, 0x24, 0x36, 0x55, 0x04, 0x22, 0x29, 0x38, 0xc5, 0x69, 0x82, 0xb8, 0x24, 0xbb, 0xee, 0x59, 0x25, 0x3f, 0x4a, 0x86, 0x64, 0x85, 0x14, 0x9e, 0xc4, 0xc5, 0xb5, 0xec, 0x9a, 0xd7, 0x4e, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2506 = { .name = "ecdsa_brainpoolp512r1_sha512_2506", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2506_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2506_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2506_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 386 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2507 for ECDSA, tcId is 387 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2507_pubkey[] = { 0x37, 0xd8, 0x51, 0x9f, 0x0c, 0x74, 0x92, 0xff, 0x44, 0x3b, 0xad, 0x34, 0xcb, 0xd5, 0x4e, 0xee, 0x9b, 0xa1, 0x20, 0xe4, 0x1f, 0xbb, 0x9f, 0xd6, 0x04, 0xcd, 0xd6, 0xd4, 0x1b, 0x76, 0x2b, 0xf2, 0xbb, 0xa3, 0x92, 0xd4, 0xf4, 0x64, 0x69, 0x78, 0x73, 0x0f, 0x65, 0x56, 0x66, 0x2b, 0x99, 0x76, 0x8d, 0xcb, 0x27, 0x54, 0xc1, 0x80, 0xc0, 0xfb, 0xd8, 0xad, 0x70, 0x76, 0x36, 0xd8, 0xf8, 0xb1, 0x43, 0xb1, 0x7d, 0x72, 0x8f, 0xfe, 0xac, 0x45, 0x40, 0x19, 0x53, 0x0d, 0x2b, 0xb0, 0xf6, 0x9a, 0x58, 0x53, 0x5a, 0x2e, 0x8e, 0x60, 0x9f, 0xf6, 0x95, 0x96, 0xd5, 0x3d, 0x11, 0xa0, 0x0e, 0x6f, 0x65, 0x0d, 0x49, 0xd9, 0xa5, 0xf2, 0x11, 0x20, 0x4b, 0x4e, 0x5a, 0x42, 0x1c, 0x75, 0x7f, 0x8e, 0x17, 0x38, 0x95, 0x5d, 0xf9, 0x6b, 0xad, 0x5b, 0xfd, 0xd7, 0x1e, 0x15, 0x5a, 0x93, 0x2d, 0x1f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2507_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2507_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2d, 0xa0, 0x89, 0xbe, 0x4c, 0xcf, 0x10, 0xec, 0x5b, 0xd4, 0x63, 0x55, 0x6e, 0xfb, 0xd3, 0x38, 0x8c, 0xc3, 0x43, 0xb9, 0xdd, 0x0b, 0xbd, 0x6f, 0x2e, 0x98, 0xa5, 0xd0, 0xca, 0x36, 0x2d, 0x0f, 0xde, 0x2a, 0xeb, 0xf0, 0x2b, 0xde, 0xf1, 0x73, 0xa0, 0xf1, 0xf0, 0x47, 0x55, 0xee, 0x76, 0xa0, 0x98, 0x72, 0x76, 0x38, 0xe4, 0xf7, 0xf3, 0x89, 0x52, 0x1d, 0x99, 0x7b, 0xab, 0x85, 0xb7, 0x81, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2507 = { .name = "ecdsa_brainpoolp512r1_sha512_2507", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2507_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2507_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2507_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 387 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2508 for ECDSA, tcId is 388 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2508_pubkey[] = { 0x2a, 0xfb, 0x78, 0x6d, 0x24, 0x6b, 0x43, 0xa5, 0x3d, 0xf6, 0x84, 0x1d, 0x04, 0xd4, 0xc7, 0x70, 0x53, 0x57, 0x93, 0x96, 0x97, 0x71, 0x4e, 0xd4, 0x68, 0x1d, 0xc5, 0x95, 0x18, 0x81, 0x91, 0x87, 0x7a, 0x46, 0xf3, 0xc6, 0xbb, 0xc6, 0x31, 0x70, 0x40, 0x6e, 0x0c, 0x6d, 0xb7, 0xdd, 0x67, 0x89, 0xa6, 0x44, 0x73, 0x8f, 0x7d, 0x0a, 0xcb, 0x7c, 0x9e, 0x59, 0x59, 0xc0, 0x1e, 0x39, 0xe9, 0x75, 0x20, 0x32, 0x7e, 0x6e, 0x5c, 0x92, 0x51, 0x98, 0xb7, 0x4a, 0xf0, 0xbe, 0xb5, 0x1a, 0x83, 0xea, 0x66, 0x2e, 0xfb, 0xc3, 0xf8, 0x5b, 0xba, 0x89, 0x24, 0x04, 0x6b, 0x97, 0xda, 0xcb, 0x07, 0x17, 0xd6, 0xb7, 0xf4, 0x22, 0xd8, 0x42, 0x66, 0x25, 0xea, 0x7f, 0x6b, 0x4c, 0xe8, 0x65, 0xdf, 0xab, 0x26, 0x4b, 0xa5, 0x24, 0x7b, 0x4d, 0xad, 0x3e, 0x2c, 0xa5, 0x61, 0x4b, 0xff, 0x4c, 0x0d, 0x5f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2508_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2508_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x5b, 0x41, 0x13, 0x7c, 0x99, 0x9e, 0x21, 0xd8, 0xb7, 0xa8, 0xc6, 0xaa, 0xdd, 0xf7, 0xa6, 0x71, 0x19, 0x86, 0x87, 0x73, 0xba, 0x17, 0x7a, 0xde, 0x5d, 0x31, 0x4b, 0xa1, 0x94, 0x6c, 0x5a, 0x1f, 0xbc, 0x55, 0xd7, 0xe0, 0x57, 0xbd, 0xe2, 0xe7, 0x41, 0xe3, 0xe0, 0x8e, 0xab, 0xdc, 0xed, 0x41, 0x30, 0xe4, 0xec, 0x71, 0xc9, 0xef, 0xe7, 0x12, 0xa4, 0x3b, 0x32, 0xf7, 0x57, 0x0b, 0x6f, 0x02, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2508 = { .name = "ecdsa_brainpoolp512r1_sha512_2508", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2508_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2508_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2508_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 388 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2509 for ECDSA, tcId is 389 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2509_pubkey[] = { 0x1b, 0x41, 0x9a, 0xa3, 0x9d, 0x3e, 0x31, 0x25, 0xae, 0x70, 0x5f, 0x77, 0x88, 0x5c, 0x3b, 0x11, 0x38, 0x7b, 0xc4, 0x22, 0xfa, 0xdb, 0xba, 0x7e, 0xb0, 0xa6, 0x6a, 0xc1, 0x4a, 0xe2, 0x6c, 0x0f, 0x97, 0x83, 0x33, 0xdc, 0xe6, 0x4e, 0x4f, 0xe0, 0xd3, 0xbd, 0xbc, 0x6d, 0x52, 0xad, 0xce, 0xe3, 0xb5, 0x14, 0x93, 0xa2, 0x6d, 0x21, 0x37, 0x6b, 0xef, 0x76, 0x4e, 0x06, 0x28, 0xdf, 0xbb, 0x12, 0x73, 0xee, 0x3e, 0xf2, 0xea, 0xe0, 0x4a, 0x27, 0xe7, 0x98, 0x32, 0x3d, 0x50, 0xe0, 0xf4, 0xfe, 0xfb, 0xc4, 0x3f, 0xc4, 0x61, 0x36, 0x77, 0x31, 0x1d, 0xa8, 0x58, 0xf8, 0x3e, 0x5d, 0x9b, 0x3b, 0x9e, 0x41, 0xaf, 0x6c, 0x55, 0x82, 0x90, 0x8a, 0x3e, 0xf2, 0x94, 0x8e, 0x4b, 0x5d, 0xc8, 0xc5, 0xb8, 0xa5, 0x90, 0xb3, 0xce, 0xda, 0x18, 0xe4, 0xc4, 0xcc, 0x05, 0xdd, 0xc2, 0x68, 0xdc, 0xfe, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2509_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2509_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x88, 0xe1, 0x9d, 0x3a, 0xe6, 0x6d, 0x32, 0xc5, 0x13, 0x7d, 0x2a, 0x00, 0x4c, 0xf3, 0x79, 0xa9, 0xa6, 0x49, 0xcb, 0x2d, 0x97, 0x23, 0x38, 0x4d, 0x8b, 0xc9, 0xf1, 0x72, 0x5e, 0xa2, 0x87, 0x2f, 0x9a, 0x80, 0xc3, 0xd0, 0x83, 0x9c, 0xd4, 0x5a, 0xe2, 0xd5, 0xd0, 0xd6, 0x01, 0xcb, 0x63, 0xe1, 0xc9, 0x57, 0x62, 0xaa, 0xae, 0xe7, 0xda, 0x9b, 0xf6, 0x58, 0xcc, 0x73, 0x02, 0x91, 0x26, 0x83, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2509 = { .name = "ecdsa_brainpoolp512r1_sha512_2509", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2509_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2509_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2509_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 389 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2510 for ECDSA, tcId is 390 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2510_pubkey[] = { 0x32, 0x7a, 0x6e, 0x5e, 0x4e, 0xf2, 0xbe, 0xc0, 0x63, 0x1e, 0x13, 0x35, 0x40, 0x94, 0xcc, 0xa4, 0xdf, 0x5b, 0xc4, 0x01, 0x8a, 0x05, 0x72, 0xc0, 0x08, 0x73, 0x54, 0x3d, 0x98, 0x10, 0x0a, 0xc0, 0x9d, 0x76, 0xd2, 0x7b, 0xd6, 0xe0, 0xbc, 0x2d, 0xc9, 0x6b, 0xd8, 0xcb, 0xbe, 0x19, 0xae, 0xc0, 0xc1, 0x41, 0x32, 0x0f, 0xfd, 0x64, 0xae, 0xdb, 0xa5, 0xc1, 0x7a, 0x1b, 0xe4, 0xbd, 0x29, 0x60, 0x78, 0xdc, 0xcc, 0x45, 0x3c, 0x2a, 0xa7, 0xe9, 0x2a, 0x77, 0x34, 0x82, 0x33, 0x06, 0xc6, 0xc1, 0xae, 0x3e, 0x52, 0x13, 0x1e, 0xdb, 0xfa, 0x5f, 0xdd, 0xb7, 0x19, 0xc8, 0xd5, 0xd0, 0x0b, 0xa3, 0xd3, 0x8b, 0xaa, 0x8f, 0xb7, 0x27, 0xbb, 0x94, 0x1e, 0x21, 0xba, 0xff, 0x37, 0x55, 0x03, 0xc2, 0x7e, 0xed, 0x70, 0x46, 0xfa, 0x6d, 0x00, 0xc7, 0x0e, 0xf1, 0x36, 0xe0, 0x1d, 0x36, 0xef, 0xd5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2510_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2510_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x37, 0x2e, 0x96, 0xe8, 0xf1, 0xe9, 0x3c, 0x75, 0xe3, 0x7b, 0x9a, 0x04, 0xb2, 0x8f, 0x5e, 0x23, 0x5b, 0x2e, 0x36, 0x1f, 0x7f, 0x08, 0xb2, 0xdb, 0xa5, 0xa8, 0xb2, 0x1a, 0xb3, 0xc1, 0x92, 0x8f, 0x1d, 0xdb, 0x33, 0x40, 0x27, 0xd5, 0x3d, 0xf9, 0xc4, 0xda, 0xff, 0x94, 0x2d, 0xb3, 0x5c, 0x89, 0x62, 0x8e, 0x23, 0xc6, 0x2c, 0x66, 0x96, 0xdf, 0x29, 0x49, 0xec, 0xab, 0x9a, 0xd5, 0xca, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2510 = { .name = "ecdsa_brainpoolp512r1_sha512_2510", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2510_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2510_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2510_sig, .siglen = 128, .result = 1, .comment = "edge case for u1, tcId is 390 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2511 for ECDSA, tcId is 391 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2511_pubkey[] = { 0x9a, 0xa1, 0x89, 0xb5, 0xb1, 0xe5, 0xb6, 0x66, 0x41, 0xc7, 0xec, 0x3f, 0xa7, 0xd0, 0xdb, 0xb6, 0xa7, 0x2d, 0x87, 0x4d, 0x18, 0xc7, 0x92, 0x7c, 0xac, 0x84, 0x70, 0xa7, 0x09, 0x69, 0xf3, 0x57, 0x05, 0xbc, 0x73, 0x18, 0x2a, 0xbc, 0x10, 0xb5, 0xa1, 0x69, 0x55, 0x88, 0x96, 0x19, 0xbc, 0xba, 0x6f, 0xf3, 0x10, 0x20, 0x94, 0x73, 0xc3, 0x12, 0x0e, 0x44, 0xa2, 0xe1, 0xbf, 0x9f, 0xc9, 0xc7, 0x2e, 0x5d, 0xe7, 0x47, 0x49, 0xa0, 0x52, 0x27, 0x50, 0x9a, 0x2b, 0x3d, 0x03, 0x22, 0xa8, 0xf9, 0x02, 0x07, 0x09, 0xcb, 0x8e, 0x5d, 0xa6, 0x7d, 0xfe, 0xe2, 0x8e, 0x96, 0xe0, 0xab, 0x8a, 0x1c, 0x32, 0x08, 0x05, 0x5d, 0x1f, 0x08, 0xf3, 0x8f, 0xa1, 0xcc, 0x79, 0xc1, 0x19, 0xff, 0x70, 0x45, 0x92, 0xa8, 0xee, 0xf5, 0x8b, 0xf6, 0x62, 0x04, 0xb8, 0x1a, 0xd0, 0xb0, 0xab, 0xdd, 0x03, 0x90, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2511_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2511_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x2a, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2511 = { .name = "ecdsa_brainpoolp512r1_sha512_2511", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2511_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2511_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2511_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 391 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2512 for ECDSA, tcId is 392 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2512_pubkey[] = { 0x43, 0x9a, 0x85, 0x9d, 0x7a, 0xaf, 0x99, 0xf5, 0x72, 0x05, 0xf2, 0x10, 0xc9, 0x3a, 0xb8, 0x9c, 0x31, 0x7b, 0xd2, 0xfa, 0x21, 0x5e, 0x79, 0x03, 0xa6, 0x79, 0x76, 0xd3, 0x36, 0xd8, 0x3b, 0x1b, 0xf9, 0x71, 0x90, 0x67, 0x07, 0x74, 0x20, 0x07, 0x8f, 0x83, 0x75, 0x14, 0xd6, 0x07, 0xae, 0x39, 0x81, 0x18, 0x5d, 0xc7, 0xb0, 0x26, 0x27, 0xb0, 0x5a, 0xc6, 0x6e, 0x49, 0x1a, 0x2b, 0x94, 0xc5, 0x4c, 0x3f, 0xa4, 0x7a, 0x92, 0x6d, 0xbd, 0x69, 0x45, 0xac, 0xa6, 0xd4, 0x04, 0xf8, 0x5f, 0x46, 0xe0, 0x70, 0xd0, 0x4e, 0x7d, 0xab, 0xf6, 0xfa, 0x9c, 0xb8, 0x8c, 0x34, 0x28, 0xdd, 0x02, 0xfd, 0x01, 0xa9, 0xb1, 0x90, 0xbb, 0x61, 0xdf, 0xb7, 0xb2, 0x43, 0x9e, 0x42, 0xd0, 0xb6, 0x89, 0xae, 0xf9, 0x68, 0x35, 0x6b, 0x01, 0x1c, 0xf3, 0x05, 0x4a, 0xb9, 0x29, 0xc8, 0x57, 0x77, 0xe6, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2512_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2512_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x48, 0xd7, 0x85, 0x1b, 0x07, 0x9f, 0x62, 0x02, 0x09, 0xe8, 0xba, 0x05, 0xeb, 0x24, 0xee, 0x51, 0x59, 0x64, 0xd3, 0x75, 0x77, 0xc7, 0xc3, 0xae, 0x30, 0x9a, 0xb2, 0xbd, 0xdd, 0x7e, 0xee, 0x71, 0x01, 0x89, 0x9d, 0x0c, 0x6c, 0x78, 0x01, 0x11, 0xbe, 0xde, 0x61, 0xed, 0x12, 0x15, 0xec, 0x42, 0x39, 0x94, 0x09, 0xd6, 0x05, 0xec, 0xcc, 0x9a, 0xac, 0x4c, 0x95, 0x48, 0xf8, 0x77, 0x70, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2512 = { .name = "ecdsa_brainpoolp512r1_sha512_2512", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2512_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2512_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2512_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 392 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2513 for ECDSA, tcId is 393 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2513_pubkey[] = { 0x66, 0xfa, 0x15, 0x8c, 0x51, 0xd3, 0xa9, 0x42, 0x1c, 0xbb, 0x13, 0x37, 0x99, 0xab, 0x90, 0xa1, 0x23, 0x87, 0xec, 0x78, 0x75, 0xa2, 0xb3, 0x54, 0xb8, 0x48, 0x76, 0x73, 0x49, 0x5b, 0xb1, 0x87, 0x9e, 0xf1, 0x67, 0x2f, 0x49, 0x28, 0xa2, 0x03, 0x40, 0x95, 0xa0, 0x2c, 0x7d, 0x08, 0x3f, 0x27, 0xe0, 0xea, 0xc0, 0xa4, 0x0b, 0x87, 0xd8, 0x37, 0xf5, 0x2e, 0x76, 0x48, 0x20, 0x0c, 0x56, 0x66, 0x27, 0x80, 0x37, 0xcd, 0x7e, 0x5e, 0x8b, 0xc6, 0x82, 0x10, 0x27, 0xb2, 0x1a, 0x2c, 0xa7, 0xae, 0x9c, 0x69, 0x4a, 0xe8, 0x09, 0x96, 0x6b, 0x79, 0xd4, 0x41, 0xdc, 0xdc, 0x9d, 0x3b, 0x44, 0x4f, 0x87, 0x93, 0x12, 0x2f, 0x30, 0x95, 0x6a, 0xe0, 0xa7, 0xaa, 0xdf, 0xbe, 0x43, 0x1a, 0x34, 0x2d, 0xcd, 0x85, 0x70, 0x95, 0xbd, 0x05, 0x8a, 0x74, 0x2b, 0xa5, 0x8a, 0xf1, 0x8b, 0x1a, 0x51, 0x9b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2513_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2513_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x0e, 0x6c, 0xf6, 0x8d, 0x5b, 0xe5, 0x13, 0x82, 0x53, 0xde, 0x29, 0x0e, 0xc4, 0x1b, 0xde, 0x7d, 0xcf, 0x96, 0x06, 0x5c, 0x28, 0x0d, 0x0a, 0x09, 0xd9, 0xa4, 0x88, 0x8d, 0x5d, 0xe0, 0x4d, 0xbe, 0xa7, 0x50, 0x38, 0xfc, 0x06, 0x1b, 0x65, 0x33, 0x40, 0x69, 0x6c, 0x62, 0xba, 0xae, 0xa9, 0x2d, 0x57, 0x47, 0xe5, 0x02, 0x49, 0x03, 0x4c, 0x42, 0x7f, 0x2f, 0x81, 0x3e, 0x2b, 0x98, 0xc2, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2513 = { .name = "ecdsa_brainpoolp512r1_sha512_2513", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2513_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2513_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2513_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 393 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2514 for ECDSA, tcId is 394 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2514_pubkey[] = { 0x29, 0xbd, 0xf2, 0xfe, 0xb7, 0x67, 0x40, 0x76, 0x3f, 0x50, 0x98, 0xcf, 0xd5, 0xef, 0xac, 0xa5, 0xfa, 0x2b, 0x19, 0x65, 0x4b, 0xd4, 0xe8, 0xd5, 0xd7, 0x59, 0x78, 0xb9, 0x05, 0x20, 0xe7, 0x48, 0x38, 0x75, 0xbf, 0xbe, 0x2a, 0xc0, 0xe5, 0x7a, 0xdf, 0x90, 0xcc, 0x14, 0x0a, 0xf5, 0x98, 0x21, 0x78, 0x67, 0x24, 0xe5, 0xea, 0xb9, 0x11, 0x14, 0x45, 0xa2, 0xde, 0x4b, 0x37, 0x68, 0x77, 0x4c, 0x32, 0xae, 0x39, 0x79, 0xb3, 0x52, 0xdc, 0xfb, 0x0c, 0x72, 0xe8, 0xf6, 0x79, 0x9a, 0xb7, 0x64, 0x15, 0x42, 0x8a, 0x99, 0x56, 0xca, 0x5d, 0x2b, 0x14, 0xd7, 0x4b, 0x9a, 0x1b, 0xe1, 0x89, 0xbc, 0xd3, 0x03, 0x2f, 0x74, 0x2e, 0xc9, 0x47, 0x44, 0xc3, 0x3a, 0x3c, 0xdc, 0xa1, 0x0d, 0xff, 0x4d, 0x5b, 0x07, 0x92, 0x96, 0x60, 0xd6, 0xe7, 0x87, 0x29, 0xad, 0xa6, 0xe5, 0xbe, 0x9a, 0xe1, 0x01, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2514_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2514_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x41, 0xb2, 0xaf, 0x78, 0x29, 0x41, 0x65, 0xd8, 0x6f, 0x75, 0x1c, 0xb8, 0x2a, 0x80, 0x32, 0x7a, 0x0e, 0xb4, 0xc0, 0x54, 0x4a, 0x06, 0xd4, 0xa5, 0x71, 0x9a, 0xea, 0x4a, 0x09, 0x8f, 0x11, 0x59, 0x73, 0xaf, 0xf4, 0xc1, 0xa8, 0xce, 0xc2, 0xdc, 0xf0, 0xf5, 0xf0, 0xfa, 0x24, 0x19, 0x0b, 0x47, 0x4a, 0x25, 0xb9, 0xab, 0x3b, 0xae, 0xf7, 0x77, 0x0f, 0x68, 0xba, 0x9c, 0x7e, 0xf7, 0xf7, 0xca, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2514 = { .name = "ecdsa_brainpoolp512r1_sha512_2514", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2514_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2514_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2514_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 394 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2515 for ECDSA, tcId is 395 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2515_pubkey[] = { 0x80, 0xaf, 0x1b, 0xb9, 0xdf, 0xce, 0x00, 0x96, 0x37, 0x99, 0xe0, 0x1a, 0xec, 0xbf, 0x8b, 0xf5, 0xa6, 0x59, 0xb6, 0xbb, 0xfa, 0x46, 0x89, 0xf0, 0x67, 0x4a, 0x61, 0x15, 0xbc, 0xdf, 0x99, 0x6d, 0x15, 0x5d, 0x9a, 0x75, 0xc5, 0x29, 0x51, 0x41, 0xe2, 0xcc, 0x3e, 0x61, 0x1b, 0x32, 0xc5, 0x89, 0xe6, 0xae, 0x76, 0xae, 0xf1, 0x90, 0xdc, 0x8a, 0x36, 0x3b, 0xa9, 0xf9, 0xc3, 0xcc, 0x57, 0x27, 0x03, 0x8c, 0xd9, 0x5b, 0xcd, 0x34, 0x42, 0x0e, 0x63, 0xae, 0x43, 0x5a, 0xfe, 0xd0, 0x9f, 0x70, 0xe4, 0xeb, 0xc3, 0x50, 0x1b, 0x42, 0xf3, 0x5e, 0xbb, 0xec, 0xd8, 0xb0, 0xa1, 0x65, 0xc6, 0x16, 0x16, 0x09, 0x0b, 0x11, 0x8e, 0xf0, 0x5a, 0x43, 0xc3, 0x1f, 0x3b, 0x71, 0x09, 0x07, 0xc7, 0x45, 0x26, 0x4b, 0x1f, 0x53, 0x7c, 0x28, 0x59, 0x6a, 0x40, 0x3c, 0x25, 0x19, 0x5e, 0x87, 0x54, 0x5e, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2515_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2515_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x9c, 0x5f, 0xc3, 0xfb, 0xf7, 0x0f, 0x16, 0xcc, 0xda, 0xc9, 0x2f, 0x95, 0x97, 0x44, 0x08, 0xff, 0xff, 0x7e, 0x05, 0xbd, 0x02, 0x68, 0xcf, 0xdf, 0x86, 0x2e, 0x9b, 0xeb, 0x17, 0x4f, 0xb4, 0x8e, 0xe1, 0xe0, 0xe1, 0x0f, 0x94, 0x2d, 0x8f, 0xc6, 0x7e, 0xd6, 0x9f, 0x7a, 0x94, 0xc8, 0x5f, 0x61, 0xc8, 0x40, 0x48, 0x61, 0x7e, 0x67, 0xc1, 0xcc, 0x6c, 0x02, 0x60, 0xe0, 0x48, 0x64, 0x1a, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2515 = { .name = "ecdsa_brainpoolp512r1_sha512_2515", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2515_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2515_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2515_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 395 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2516 for ECDSA, tcId is 396 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2516_pubkey[] = { 0x6e, 0xeb, 0x47, 0x35, 0x28, 0x6c, 0x2c, 0x09, 0x4d, 0xda, 0x29, 0x71, 0x0a, 0x77, 0x4e, 0xcc, 0xdb, 0x6c, 0xa5, 0xfa, 0x89, 0x91, 0xf9, 0xad, 0xbc, 0x76, 0x9b, 0x44, 0x8d, 0x38, 0x99, 0x94, 0x3c, 0x86, 0x0e, 0x3f, 0xb5, 0x0c, 0xff, 0x34, 0x82, 0x5a, 0xda, 0xee, 0x82, 0xaa, 0xb5, 0xa5, 0x33, 0xad, 0xaf, 0x74, 0xfb, 0xfe, 0x7e, 0x8b, 0x03, 0x2e, 0x26, 0x42, 0xfa, 0x5f, 0xc8, 0x6f, 0x5e, 0xf7, 0x4a, 0xa6, 0x1a, 0x26, 0x82, 0x3b, 0xc2, 0xed, 0x70, 0xf0, 0x8b, 0x64, 0xa6, 0x90, 0x6d, 0xb9, 0x81, 0x56, 0x4d, 0x5e, 0x0c, 0x15, 0xa0, 0x76, 0xa5, 0x82, 0xda, 0x8f, 0xee, 0x20, 0xb7, 0x73, 0xef, 0x59, 0x1f, 0x90, 0x54, 0xda, 0x34, 0xd9, 0x0a, 0x1f, 0x13, 0x17, 0x29, 0x46, 0x10, 0xa8, 0x1d, 0x3e, 0x0f, 0x1a, 0xdc, 0xe4, 0xf6, 0xd2, 0xfd, 0x6b, 0xa4, 0xb9, 0x35, 0x01, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2516_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2516_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x8d, 0xe1, 0xea, 0x3f, 0x12, 0x34, 0x69, 0x0e, 0x75, 0xbd, 0x78, 0x7c, 0xfa, 0xbe, 0x15, 0xf8, 0x33, 0xcb, 0x7d, 0xc6, 0x51, 0x07, 0xcd, 0xb0, 0x35, 0xf9, 0x9b, 0x0b, 0xbe, 0x6c, 0x60, 0xad, 0x6e, 0x83, 0x65, 0xdd, 0xdb, 0xb1, 0xf9, 0x73, 0xbc, 0x26, 0xdd, 0xdb, 0xa9, 0xe4, 0xae, 0x7c, 0x72, 0xce, 0xbd, 0x41, 0xf4, 0x71, 0xa8, 0xbb, 0x22, 0x7d, 0x2b, 0x3d, 0xf4, 0x1f, 0x34, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2516 = { .name = "ecdsa_brainpoolp512r1_sha512_2516", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2516_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2516_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2516_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 396 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2517 for ECDSA, tcId is 397 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2517_pubkey[] = { 0x93, 0x88, 0x41, 0x93, 0x75, 0x50, 0x13, 0x4c, 0x5a, 0x4b, 0xad, 0xe1, 0x9a, 0x50, 0x21, 0xc7, 0x3c, 0xff, 0xc7, 0x74, 0xfd, 0xca, 0x87, 0x54, 0x13, 0xa7, 0xd5, 0x41, 0xe6, 0x51, 0x45, 0xfb, 0x77, 0xda, 0xd4, 0xa7, 0xc7, 0xeb, 0x3a, 0x96, 0x6c, 0x18, 0x4d, 0x73, 0xcd, 0xcf, 0x3f, 0x1b, 0xea, 0x98, 0x4a, 0xd2, 0x5d, 0xd4, 0xfb, 0x7f, 0x47, 0x23, 0x9f, 0xaa, 0x5b, 0x53, 0x9f, 0x6d, 0x32, 0x75, 0xcd, 0xe5, 0x3c, 0x18, 0xf3, 0xbb, 0x53, 0x7a, 0x7f, 0x06, 0xc7, 0xea, 0x1b, 0x4f, 0x35, 0x50, 0x25, 0x91, 0x90, 0x02, 0xba, 0xe9, 0xa3, 0xa3, 0xc1, 0xdc, 0xf1, 0x50, 0xc1, 0xb5, 0x3b, 0xc8, 0xdf, 0xe5, 0x3f, 0x60, 0xcc, 0x78, 0x5e, 0x44, 0x05, 0x1c, 0x95, 0xb7, 0x35, 0x55, 0x2b, 0xa6, 0x22, 0x89, 0x7d, 0x5b, 0xf7, 0x55, 0x6f, 0xd7, 0xb9, 0xe3, 0x8b, 0x65, 0x31, 0xbe, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2517_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2517_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x32, 0x6a, 0x7e, 0x59, 0xc4, 0xbc, 0xf9, 0xba, 0x52, 0x23, 0x5a, 0x8e, 0x06, 0xd2, 0x44, 0x55, 0x7a, 0xcf, 0x66, 0x88, 0x5b, 0x64, 0xf9, 0x23, 0x8c, 0xdd, 0xb3, 0xbe, 0x32, 0x7b, 0x62, 0x05, 0x75, 0x8b, 0x60, 0xf3, 0x20, 0x34, 0x18, 0xcb, 0xe5, 0xb3, 0x30, 0xe2, 0x8a, 0x9d, 0x7a, 0x36, 0x0e, 0xdf, 0xb8, 0xdd, 0xf3, 0x9d, 0x46, 0x34, 0x0d, 0x5c, 0x27, 0x92, 0x82, 0x4b, 0x7c, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2517 = { .name = "ecdsa_brainpoolp512r1_sha512_2517", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2517_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2517_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2517_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 397 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2518 for ECDSA, tcId is 398 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2518_pubkey[] = { 0x78, 0xfb, 0xd1, 0xe7, 0x62, 0x01, 0x96, 0x02, 0xff, 0x71, 0x87, 0xcf, 0x06, 0xa8, 0x86, 0xd2, 0xed, 0x2c, 0xb5, 0xd0, 0x64, 0x81, 0xb0, 0x6c, 0x3c, 0x4b, 0xe4, 0xf7, 0xf3, 0x74, 0x6c, 0xd0, 0x15, 0x1d, 0x57, 0xf4, 0xd6, 0xae, 0xbd, 0x60, 0x48, 0x89, 0x5c, 0xab, 0xfe, 0x95, 0x00, 0xad, 0xf3, 0xda, 0xec, 0x59, 0xff, 0xa6, 0xee, 0x96, 0x21, 0xc8, 0xb5, 0x84, 0xed, 0x6d, 0xad, 0x1a, 0x6f, 0x3c, 0x20, 0x70, 0xe0, 0x14, 0x21, 0xa1, 0xeb, 0xb9, 0x69, 0x60, 0x7d, 0x44, 0xf7, 0x67, 0x78, 0x74, 0x8b, 0xcb, 0x55, 0x9a, 0x8b, 0x5e, 0xed, 0x83, 0xb0, 0x47, 0x60, 0xab, 0x53, 0x55, 0x6b, 0x00, 0x39, 0xe8, 0x76, 0x5a, 0xb8, 0x5a, 0x92, 0x95, 0x0c, 0x10, 0xca, 0x6b, 0xbd, 0xcc, 0x9d, 0x6e, 0x2f, 0x03, 0xd8, 0x8b, 0x6d, 0x7b, 0xbd, 0xcd, 0x53, 0xc8, 0xb1, 0xff, 0x86, 0xcc, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2518_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2518_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x3c, 0x5d, 0x08, 0x33, 0x9f, 0x2f, 0x6f, 0x97, 0xa2, 0xb8, 0x6b, 0x83, 0x29, 0x66, 0x78, 0xf7, 0xbf, 0xf6, 0x1e, 0x1b, 0x74, 0x87, 0xcd, 0xa1, 0x4f, 0x3b, 0x12, 0xfc, 0xe6, 0xae, 0xaf, 0xa3, 0xf2, 0xfb, 0x38, 0x5a, 0xea, 0x3e, 0x82, 0xf3, 0x12, 0xa6, 0x88, 0x0e, 0xfd, 0x18, 0xa1, 0xd7, 0x7f, 0xd7, 0xfa, 0xaf, 0xaf, 0x9d, 0x1e, 0xcc, 0x5e, 0xe9, 0xc2, 0xc0, 0xf7, 0x1d, 0x10, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2518 = { .name = "ecdsa_brainpoolp512r1_sha512_2518", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2518_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2518_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2518_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 398 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2519 for ECDSA, tcId is 399 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2519_pubkey[] = { 0x4c, 0x9a, 0xda, 0x2f, 0xa2, 0xac, 0xf8, 0xd0, 0x1f, 0xba, 0x2b, 0x01, 0x5f, 0x7b, 0xad, 0xc3, 0x22, 0x78, 0x5c, 0x85, 0xf2, 0x19, 0x9b, 0x6c, 0x4a, 0xc4, 0x90, 0xda, 0x8e, 0x1e, 0xc9, 0x73, 0x38, 0x7f, 0x4a, 0xbe, 0x26, 0xd5, 0x26, 0xa0, 0x56, 0xdc, 0x71, 0x95, 0xfb, 0x1c, 0x9c, 0x0c, 0xa7, 0x61, 0x2c, 0xb6, 0x5f, 0x15, 0xf1, 0x06, 0x38, 0x0d, 0x8c, 0x5d, 0xec, 0xe5, 0x29, 0xf3, 0x21, 0x72, 0xc8, 0xb9, 0xb3, 0xb6, 0xfb, 0x0b, 0xbe, 0x9f, 0x22, 0x73, 0xd9, 0xa2, 0x18, 0xbd, 0x51, 0x24, 0x79, 0xdd, 0x27, 0x60, 0x5b, 0x2a, 0x6e, 0x8b, 0x44, 0xf5, 0x8d, 0x17, 0x61, 0x78, 0x39, 0x0c, 0x2b, 0xdd, 0x1c, 0xcf, 0x60, 0xc1, 0xe8, 0x23, 0xa2, 0x3e, 0x8b, 0x0f, 0xce, 0x7d, 0xab, 0x2f, 0x19, 0x79, 0x13, 0xb1, 0xfe, 0x30, 0xf6, 0x99, 0xe3, 0xbf, 0x36, 0x6b, 0xf1, 0xbf, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2519_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2519_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x95, 0x84, 0xa4, 0xbd, 0xf0, 0xc6, 0xc8, 0xca, 0x72, 0x21, 0x1f, 0x58, 0x9d, 0xcd, 0xd7, 0xbe, 0x18, 0x1a, 0xcc, 0xb9, 0x26, 0xf2, 0x43, 0x0d, 0xc7, 0x13, 0x5a, 0xbb, 0xfa, 0x78, 0x87, 0xd6, 0x06, 0x03, 0x0c, 0x85, 0xc7, 0x2f, 0x5a, 0x3c, 0x05, 0xfc, 0xc7, 0xe0, 0xd1, 0xfb, 0x33, 0xaf, 0xc0, 0x25, 0x1f, 0xd3, 0x3e, 0xa0, 0x4b, 0x3b, 0x96, 0x47, 0x0b, 0xc2, 0x6c, 0xe6, 0x12, 0xab, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2519 = { .name = "ecdsa_brainpoolp512r1_sha512_2519", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2519_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2519_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2519_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 399 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2520 for ECDSA, tcId is 400 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2520_pubkey[] = { 0x85, 0x4c, 0xf9, 0x60, 0x10, 0x10, 0xbe, 0x20, 0x63, 0x3f, 0x5d, 0x17, 0x21, 0x4c, 0xab, 0x68, 0x7d, 0xab, 0x3a, 0xa5, 0x4a, 0x38, 0xa0, 0x2c, 0x55, 0xed, 0x00, 0x36, 0x15, 0xec, 0x8e, 0xfa, 0xda, 0x2a, 0xc0, 0xd6, 0x2d, 0x92, 0x3d, 0x0e, 0x1d, 0xf9, 0xaa, 0x38, 0x2d, 0x51, 0x27, 0x06, 0xca, 0xdf, 0x55, 0x39, 0x85, 0x8a, 0x62, 0xa5, 0xec, 0x62, 0xfd, 0x82, 0x48, 0xe6, 0x32, 0x77, 0x6a, 0x78, 0x33, 0x03, 0x28, 0x52, 0x06, 0x01, 0x8c, 0xbb, 0x9f, 0xc1, 0xe9, 0x8c, 0xdf, 0x94, 0xac, 0x6f, 0x2f, 0xec, 0xbd, 0xc7, 0xd8, 0x42, 0x8f, 0xf4, 0x85, 0xe5, 0x9b, 0x00, 0xb2, 0xbf, 0xa4, 0x5a, 0x06, 0xaa, 0xa9, 0x3e, 0x6b, 0x51, 0xb7, 0xad, 0x1b, 0x8a, 0xc0, 0xdb, 0xe1, 0x35, 0x45, 0x5d, 0x8d, 0x28, 0x75, 0x23, 0x13, 0x57, 0x06, 0x09, 0x90, 0xab, 0xcd, 0xe5, 0x63, 0xde, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2520_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2520_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x40, 0x19, 0x79, 0x87, 0x18, 0x9f, 0x8c, 0xf0, 0x4a, 0x95, 0x1e, 0x01, 0xc4, 0x8f, 0xa8, 0xae, 0x90, 0x42, 0xf1, 0x84, 0x84, 0x8f, 0x93, 0xb2, 0x15, 0xdc, 0x79, 0x0f, 0xe2, 0xc4, 0x2e, 0xe2, 0xd5, 0x49, 0xd8, 0xcb, 0x50, 0xff, 0x3d, 0xb7, 0x4b, 0x6d, 0xdb, 0x37, 0x6a, 0x80, 0xb2, 0xce, 0x39, 0x83, 0x94, 0x6b, 0x2e, 0xd9, 0x98, 0x19, 0x85, 0x6e, 0x75, 0xeb, 0xf8, 0xff, 0x2a, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2520 = { .name = "ecdsa_brainpoolp512r1_sha512_2520", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2520_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2520_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2520_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 400 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2521 for ECDSA, tcId is 401 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2521_pubkey[] = { 0x5e, 0x3d, 0xe5, 0x09, 0xf7, 0x58, 0x5c, 0x0f, 0x6d, 0x05, 0xc3, 0x87, 0xa6, 0xd0, 0x7a, 0x06, 0x1c, 0x9f, 0x98, 0xc6, 0xad, 0xc8, 0xb3, 0xc3, 0x6e, 0xfb, 0xde, 0xfc, 0xbf, 0xf2, 0xe6, 0xad, 0x46, 0x78, 0x96, 0x05, 0x24, 0xd1, 0x16, 0x15, 0x4f, 0x5b, 0x17, 0x33, 0x22, 0x04, 0xe3, 0xa1, 0x86, 0x70, 0x82, 0xd2, 0xe5, 0x18, 0x50, 0x4f, 0x43, 0x3e, 0x27, 0x26, 0xad, 0x58, 0xe9, 0xd7, 0xa0, 0xb3, 0x2e, 0x9d, 0x3c, 0x52, 0x3b, 0xac, 0x3c, 0x1c, 0xcd, 0xd7, 0x5f, 0x82, 0xb9, 0x09, 0xa8, 0x30, 0x6c, 0x74, 0xbe, 0x89, 0x9f, 0x13, 0x22, 0x8a, 0xbf, 0x87, 0xdb, 0x76, 0xb9, 0x11, 0x5c, 0x0b, 0x29, 0x3d, 0x7d, 0x30, 0xf3, 0xc8, 0x62, 0x30, 0x46, 0x1b, 0x28, 0xa4, 0x5a, 0x6c, 0xc8, 0x8b, 0x8f, 0xe0, 0x79, 0x14, 0x31, 0x03, 0xc5, 0xb0, 0x10, 0x16, 0xba, 0x95, 0xbc, 0xd5, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2521_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2521_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x80, 0x32, 0xf3, 0x0e, 0x31, 0x3f, 0x19, 0xe0, 0x95, 0x2a, 0x3c, 0x03, 0x89, 0x1f, 0x51, 0x5d, 0x20, 0x85, 0xe3, 0x09, 0x09, 0x1f, 0x27, 0x64, 0x2b, 0xb8, 0xf2, 0x1f, 0xc5, 0x88, 0x5d, 0xc5, 0xaa, 0x93, 0xb1, 0x96, 0xa1, 0xfe, 0x7b, 0x6e, 0x96, 0xdb, 0xb6, 0x6e, 0xd5, 0x01, 0x65, 0x9c, 0x73, 0x07, 0x28, 0xd6, 0x5d, 0xb3, 0x30, 0x33, 0x0a, 0xdc, 0xeb, 0xd7, 0xf1, 0xfe, 0x55, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2521 = { .name = "ecdsa_brainpoolp512r1_sha512_2521", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2521_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2521_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2521_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 401 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2522 for ECDSA, tcId is 402 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2522_pubkey[] = { 0x15, 0xd2, 0xff, 0xcd, 0x46, 0x17, 0xeb, 0x1b, 0x40, 0x06, 0x10, 0xcb, 0xa8, 0xd7, 0x38, 0xc7, 0x6c, 0x8e, 0x15, 0xad, 0x72, 0xb3, 0x4e, 0x57, 0x67, 0x72, 0xae, 0x19, 0xcd, 0x83, 0x45, 0x29, 0x46, 0x44, 0xd1, 0x3a, 0xc6, 0x2a, 0x29, 0x37, 0x88, 0xde, 0x2a, 0x92, 0xdd, 0x54, 0x7c, 0x2a, 0xc3, 0xa9, 0x8a, 0xba, 0x72, 0x95, 0x2d, 0x3e, 0xa2, 0xd4, 0x91, 0xd7, 0xee, 0xa5, 0xb9, 0xcb, 0xa3, 0xec, 0x2c, 0x79, 0xa2, 0xcf, 0x7b, 0xa0, 0x08, 0x39, 0x33, 0xb2, 0xc5, 0x34, 0xfd, 0x4b, 0x51, 0x58, 0x7c, 0x4e, 0xbc, 0x3c, 0xba, 0xaa, 0x28, 0xd9, 0x2b, 0x95, 0xe3, 0xc8, 0xe9, 0x01, 0x42, 0xef, 0xfa, 0xc2, 0x7b, 0xba, 0xb2, 0x15, 0xac, 0x0b, 0x39, 0xd1, 0xc5, 0xf3, 0x32, 0xfe, 0xb7, 0x79, 0x35, 0x1a, 0x66, 0xc2, 0x94, 0xe4, 0xed, 0x62, 0xf5, 0xcd, 0x32, 0x29, 0xa9, 0x23, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2522_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2522_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x15, 0x6e, 0xce, 0xdc, 0x6d, 0xf4, 0xe2, 0x45, 0x9f, 0xea, 0x73, 0x57, 0x19, 0xe4, 0xfe, 0x03, 0xe5, 0x98, 0x46, 0xd9, 0xd9, 0xe4, 0xe9, 0x07, 0x6b, 0x31, 0xce, 0x65, 0x38, 0x19, 0x84, 0x38, 0x2a, 0x9f, 0x2e, 0x20, 0xa6, 0x54, 0x93, 0x0c, 0xa0, 0xc3, 0x30, 0x8c, 0xbf, 0xd6, 0x08, 0x23, 0x8e, 0xd8, 0xe9, 0xc0, 0x84, 0x2e, 0xed, 0x6e, 0xda, 0xc3, 0xcb, 0x41, 0x4e, 0x54, 0x80, 0x37, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2522 = { .name = "ecdsa_brainpoolp512r1_sha512_2522", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2522_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2522_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2522_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 402 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2523 for ECDSA, tcId is 403 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2523_pubkey[] = { 0x97, 0x4d, 0xf3, 0xe7, 0xa6, 0x12, 0x83, 0x83, 0x0e, 0x54, 0x4b, 0xa9, 0x02, 0x34, 0x79, 0xcb, 0x8d, 0x75, 0x59, 0x52, 0x4d, 0xf7, 0x6f, 0xb3, 0x8d, 0x23, 0xc5, 0x5d, 0x29, 0x92, 0x3e, 0x72, 0xec, 0x5c, 0xb4, 0x87, 0x17, 0xfa, 0xb8, 0x59, 0xf2, 0xf3, 0x11, 0x15, 0x85, 0xbb, 0xee, 0x00, 0x45, 0x95, 0xc5, 0xfe, 0xd6, 0x44, 0x11, 0xfb, 0xbf, 0x9f, 0x63, 0x51, 0xbf, 0x5f, 0x69, 0xe8, 0x4e, 0x1f, 0xdd, 0x69, 0x1b, 0x30, 0xb0, 0xb4, 0xc2, 0x59, 0x0a, 0x88, 0x1c, 0xe4, 0x58, 0x05, 0x33, 0x49, 0x35, 0x6d, 0xa7, 0x47, 0xcd, 0x93, 0xba, 0x93, 0x1e, 0xee, 0x6a, 0xe8, 0x8c, 0xae, 0x82, 0x70, 0x07, 0x10, 0x5c, 0x3b, 0x16, 0x33, 0xa4, 0x8e, 0x1c, 0x9d, 0xb5, 0x27, 0x2a, 0xc0, 0x11, 0x45, 0xae, 0xe6, 0x13, 0x2b, 0xa7, 0x3a, 0xf8, 0x3d, 0x6e, 0x6c, 0x41, 0x06, 0xb2, 0x90, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2523_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2523_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfb, 0x5c, 0xa5, 0x4a, 0x23, 0x1b, 0xe7, 0x6c, 0x06, 0xc9, 0xd9, 0x87, 0xde, 0x7b, 0xf2, 0xed, 0x42, 0xcd, 0x63, 0x4a, 0x07, 0xed, 0xeb, 0x6e, 0x0c, 0x58, 0x04, 0x12, 0xab, 0xe7, 0x09, 0xab, 0x17, 0x7e, 0x47, 0x4a, 0x9e, 0xa9, 0x62, 0x45, 0xa6, 0x40, 0xf7, 0xe6, 0xbe, 0x1d, 0x2d, 0x5c, 0xba, 0x3a, 0x7c, 0xdc, 0x41, 0xa8, 0xb0, 0x93, 0x90, 0x1a, 0x5b, 0x8b, 0xe0, 0x64, 0x20, 0xe1, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2523 = { .name = "ecdsa_brainpoolp512r1_sha512_2523", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2523_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2523_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2523_sig, .siglen = 128, .result = 1, .comment = "edge case for u2, tcId is 403 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2524 for ECDSA, tcId is 404 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2524_pubkey[] = { 0x2c, 0xb7, 0x36, 0x4c, 0xce, 0xc9, 0x14, 0x8a, 0x32, 0x42, 0xee, 0xe1, 0x7c, 0xe0, 0x1d, 0x82, 0xa5, 0x6d, 0x03, 0x7c, 0xb0, 0x17, 0x46, 0xfd, 0xd2, 0x4b, 0x89, 0x3f, 0x35, 0xe0, 0x72, 0x82, 0x7c, 0xe4, 0x63, 0xad, 0xaf, 0xca, 0x62, 0x82, 0xd9, 0x3c, 0xf6, 0x66, 0xa7, 0x40, 0xee, 0x88, 0xad, 0xbe, 0xf2, 0x41, 0xf1, 0x79, 0x55, 0xd2, 0xbf, 0x5f, 0x9f, 0x95, 0x95, 0x8a, 0x38, 0xa6, 0x96, 0xda, 0x56, 0x43, 0xe5, 0xfe, 0x05, 0x7f, 0x1c, 0x3b, 0x93, 0x1e, 0x36, 0xd3, 0x3f, 0x0e, 0x2f, 0x5f, 0xba, 0x68, 0x09, 0x32, 0xa3, 0x59, 0x87, 0xb7, 0x98, 0x55, 0xb6, 0xc1, 0xf0, 0xea, 0xd6, 0x4c, 0xbe, 0x9c, 0x72, 0x95, 0x9e, 0xce, 0x21, 0x84, 0xee, 0x65, 0xa7, 0x68, 0x41, 0x0d, 0xf1, 0xda, 0xd8, 0x1c, 0x4d, 0xba, 0x85, 0x33, 0x40, 0xa2, 0x39, 0x6a, 0xbf, 0x82, 0xe3, 0x6a, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2524_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2524_sig[] = { 0x1b, 0x8e, 0x84, 0x40, 0xbd, 0x94, 0x75, 0x2d, 0xc6, 0x03, 0x15, 0x97, 0x28, 0xa3, 0x46, 0x87, 0x2c, 0xad, 0x48, 0xdf, 0xff, 0x81, 0x9f, 0x18, 0x1f, 0x9d, 0x53, 0x53, 0x7a, 0x80, 0x86, 0x8b, 0xff, 0x12, 0x80, 0xac, 0xfd, 0x23, 0x97, 0xa8, 0x46, 0xd3, 0x25, 0x90, 0x49, 0x35, 0x2b, 0xc1, 0x1f, 0x5f, 0xb7, 0x39, 0x41, 0x0c, 0x76, 0x6d, 0x13, 0x44, 0xcb, 0xcb, 0xc0, 0x3b, 0xf7, 0x61, 0x21, 0x61, 0x07, 0x40, 0x79, 0x9a, 0x83, 0xa1, 0x3b, 0x49, 0xaa, 0x45, 0xdd, 0x85, 0x4d, 0x85, 0xb0, 0x58, 0xbd, 0x95, 0x5a, 0x41, 0x05, 0xd7, 0x49, 0xcb, 0xa7, 0x4b, 0x8f, 0x2a, 0x38, 0xcf, 0x7c, 0x33, 0xed, 0x56, 0x92, 0x1d, 0x02, 0x9e, 0x74, 0x93, 0x89, 0x4a, 0xd3, 0xd8, 0xf2, 0x8f, 0x44, 0x31, 0xdc, 0xeb, 0x89, 0xcd, 0x56, 0x31, 0x6d, 0xe9, 0x3d, 0xc0, 0x97, 0x77, 0xca, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2524 = { .name = "ecdsa_brainpoolp512r1_sha512_2524", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2524_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2524_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2524_sig, .siglen = 128, .result = 1, .comment = "point duplication during verification, tcId is 404 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2525 for ECDSA, tcId is 405 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2525_pubkey[] = { 0x2c, 0xb7, 0x36, 0x4c, 0xce, 0xc9, 0x14, 0x8a, 0x32, 0x42, 0xee, 0xe1, 0x7c, 0xe0, 0x1d, 0x82, 0xa5, 0x6d, 0x03, 0x7c, 0xb0, 0x17, 0x46, 0xfd, 0xd2, 0x4b, 0x89, 0x3f, 0x35, 0xe0, 0x72, 0x82, 0x7c, 0xe4, 0x63, 0xad, 0xaf, 0xca, 0x62, 0x82, 0xd9, 0x3c, 0xf6, 0x66, 0xa7, 0x40, 0xee, 0x88, 0xad, 0xbe, 0xf2, 0x41, 0xf1, 0x79, 0x55, 0xd2, 0xbf, 0x5f, 0x9f, 0x95, 0x95, 0x8a, 0x38, 0xa6, 0x14, 0x03, 0x47, 0x74, 0xf5, 0xeb, 0xbf, 0x0c, 0x23, 0x99, 0x53, 0x8f, 0xfc, 0xf6, 0xbc, 0xf9, 0x9b, 0xd0, 0xd3, 0x4b, 0xaa, 0x97, 0x2e, 0xb5, 0x4e, 0xac, 0x04, 0x74, 0xb9, 0x71, 0x17, 0x86, 0xa7, 0x00, 0xdc, 0x64, 0x29, 0x30, 0xc9, 0x74, 0x8d, 0x48, 0xb2, 0xc5, 0x3f, 0x3b, 0x3f, 0xd8, 0x36, 0xa7, 0x27, 0x12, 0xdf, 0xc8, 0x41, 0x51, 0xe8, 0x08, 0x26, 0xeb, 0x98, 0xb7, 0x65, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2525_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2525_sig[] = { 0x1b, 0x8e, 0x84, 0x40, 0xbd, 0x94, 0x75, 0x2d, 0xc6, 0x03, 0x15, 0x97, 0x28, 0xa3, 0x46, 0x87, 0x2c, 0xad, 0x48, 0xdf, 0xff, 0x81, 0x9f, 0x18, 0x1f, 0x9d, 0x53, 0x53, 0x7a, 0x80, 0x86, 0x8b, 0xff, 0x12, 0x80, 0xac, 0xfd, 0x23, 0x97, 0xa8, 0x46, 0xd3, 0x25, 0x90, 0x49, 0x35, 0x2b, 0xc1, 0x1f, 0x5f, 0xb7, 0x39, 0x41, 0x0c, 0x76, 0x6d, 0x13, 0x44, 0xcb, 0xcb, 0xc0, 0x3b, 0xf7, 0x61, 0x21, 0x61, 0x07, 0x40, 0x79, 0x9a, 0x83, 0xa1, 0x3b, 0x49, 0xaa, 0x45, 0xdd, 0x85, 0x4d, 0x85, 0xb0, 0x58, 0xbd, 0x95, 0x5a, 0x41, 0x05, 0xd7, 0x49, 0xcb, 0xa7, 0x4b, 0x8f, 0x2a, 0x38, 0xcf, 0x7c, 0x33, 0xed, 0x56, 0x92, 0x1d, 0x02, 0x9e, 0x74, 0x93, 0x89, 0x4a, 0xd3, 0xd8, 0xf2, 0x8f, 0x44, 0x31, 0xdc, 0xeb, 0x89, 0xcd, 0x56, 0x31, 0x6d, 0xe9, 0x3d, 0xc0, 0x97, 0x77, 0xca, 0x10, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2525 = { .name = "ecdsa_brainpoolp512r1_sha512_2525", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2525_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2525_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2525_sig, .siglen = 128, .result = -1, .comment = "duplication bug, tcId is 405 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2526 for ECDSA, tcId is 406 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2526_pubkey[] = { 0x06, 0x3d, 0x56, 0x6f, 0xa9, 0x3e, 0xe2, 0x19, 0x48, 0x2e, 0xc9, 0x47, 0xe7, 0xbe, 0x46, 0x94, 0xf9, 0xc0, 0x73, 0xb2, 0xbb, 0x78, 0x6d, 0xb8, 0x49, 0xe1, 0xf3, 0x97, 0x3c, 0x51, 0x22, 0x39, 0x4c, 0xf6, 0x8e, 0xdd, 0x99, 0x47, 0xb5, 0x8e, 0x61, 0xfe, 0x42, 0xc9, 0x8d, 0x36, 0x40, 0x84, 0x4e, 0xd2, 0x77, 0x5b, 0x0c, 0x36, 0xb5, 0xf4, 0xc0, 0xc9, 0x60, 0x5d, 0x02, 0x8b, 0xc0, 0xc5, 0x07, 0x52, 0x1b, 0x29, 0x88, 0x96, 0x32, 0xbb, 0x07, 0x56, 0xfe, 0xc9, 0x8e, 0x8e, 0x95, 0x6c, 0xb7, 0xac, 0x51, 0x5a, 0x3f, 0xc9, 0x08, 0x2b, 0x87, 0x18, 0x61, 0x54, 0x8e, 0x97, 0x02, 0x78, 0x6f, 0x59, 0x1e, 0x9a, 0x22, 0x23, 0x91, 0x01, 0x47, 0x25, 0x16, 0x7a, 0x6c, 0x22, 0xaa, 0xf8, 0xc2, 0xc4, 0xbe, 0x94, 0x25, 0x24, 0x8b, 0x4d, 0x5f, 0x94, 0xf3, 0x1c, 0xbd, 0x8b, 0xd3, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2526_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2526_sig[] = { 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, 0x22, 0x2c, 0x52, 0xbe, 0x92, 0x61, 0xf4, 0x1b, 0xd9, 0x90, 0xfa, 0xef, 0xa3, 0xf5, 0x32, 0x67, 0xf5, 0x70, 0x1c, 0x57, 0x23, 0xf5, 0x2a, 0x02, 0xf7, 0xad, 0x85, 0xc2, 0x16, 0x70, 0x9b, 0x49, 0xaa, 0xa6, 0x12, 0x73, 0x75, 0xbb, 0x6e, 0x05, 0x0d, 0x1a, 0xe0, 0x38, 0x4c, 0xbc, 0x03, 0x41, 0x6c, 0x56, 0xc3, 0xe6, 0x9b, 0x45, 0xf8, 0x92, 0xbd, 0xe7, 0xea, 0xe6, 0xec, 0x21, 0xcc, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2526 = { .name = "ecdsa_brainpoolp512r1_sha512_2526", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2526_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2526_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2526_sig, .siglen = 128, .result = -1, .comment = "comparison with point at infinity , tcId is 406 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2527 for ECDSA, tcId is 407 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2527_pubkey[] = { 0x13, 0xb9, 0xa0, 0x27, 0x3b, 0x3b, 0x28, 0x3c, 0xc8, 0xa2, 0x5a, 0xaa, 0xf2, 0xa8, 0x50, 0x8a, 0x74, 0x5d, 0xb0, 0x22, 0xe7, 0xf4, 0xdd, 0xc0, 0x6a, 0xcd, 0xf0, 0x6e, 0xb7, 0x77, 0x0f, 0xd9, 0x5b, 0xa6, 0x8b, 0x04, 0x7b, 0x03, 0x04, 0x19, 0xae, 0xc3, 0x66, 0xbd, 0x18, 0x7e, 0xb8, 0x40, 0xa4, 0x3d, 0xf7, 0xd9, 0x43, 0x94, 0x19, 0xe2, 0x63, 0x96, 0x14, 0xd5, 0xb4, 0xeb, 0x22, 0xd2, 0x3b, 0xa9, 0xa5, 0xc0, 0x30, 0x17, 0x08, 0xdc, 0x50, 0xab, 0x9e, 0x4a, 0xd4, 0xed, 0x48, 0xad, 0x0f, 0x70, 0x1c, 0xf3, 0x87, 0xf2, 0x10, 0xe5, 0x7b, 0x6d, 0x06, 0xfb, 0x69, 0xcd, 0x58, 0xdf, 0xb0, 0x68, 0x5f, 0x89, 0xd9, 0xed, 0x1a, 0x31, 0x9f, 0x00, 0x15, 0x1d, 0x90, 0x82, 0x66, 0x30, 0x46, 0xcc, 0x27, 0x10, 0x1b, 0x69, 0x2c, 0xa2, 0x2a, 0x6b, 0x3e, 0x08, 0x3d, 0xd0, 0xff, 0x7f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2527_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2527_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2527 = { .name = "ecdsa_brainpoolp512r1_sha512_2527", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2527_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2527_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2527_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 407 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2528 for ECDSA, tcId is 408 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2528_pubkey[] = { 0x45, 0xd4, 0xd4, 0xad, 0x6b, 0x3a, 0xaf, 0x94, 0xb6, 0xd7, 0x39, 0xa0, 0x72, 0xf3, 0x1b, 0x1e, 0x74, 0x4f, 0x13, 0x87, 0x63, 0x04, 0xea, 0x11, 0x11, 0x3f, 0xe8, 0x12, 0x3a, 0x15, 0x5e, 0x1a, 0x92, 0x1b, 0xe4, 0x6c, 0xde, 0x2f, 0x24, 0x12, 0xe0, 0x2a, 0x0f, 0xa5, 0xc1, 0x86, 0x5d, 0xb8, 0xa6, 0xdb, 0xd4, 0x4e, 0xea, 0xc1, 0x65, 0xb0, 0xf7, 0xfa, 0x73, 0xc0, 0x47, 0x83, 0x80, 0x2d, 0x1c, 0xb9, 0x51, 0xcc, 0x65, 0xc9, 0x05, 0x64, 0x80, 0x69, 0x5b, 0xc4, 0x67, 0xdc, 0xa5, 0x77, 0x96, 0x4c, 0xee, 0x04, 0x8a, 0x14, 0xc8, 0x17, 0x16, 0xce, 0x95, 0x58, 0xb4, 0x50, 0x98, 0x1c, 0xf3, 0xa0, 0xf0, 0x05, 0x9d, 0x58, 0x1b, 0x07, 0x6a, 0xfb, 0x69, 0xef, 0xe0, 0xa5, 0x05, 0x35, 0x7b, 0x80, 0x60, 0xe0, 0x2d, 0x6b, 0x9f, 0x13, 0xa0, 0x31, 0xa1, 0xda, 0xe5, 0xf1, 0xce, 0x3c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2528_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2528_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x7a, 0x0c, 0x02, 0xf1, 0xc1, 0xa6, 0xfa, 0x1a, 0x52, 0x2a, 0x5b, 0xa1, 0x00, 0x6b, 0xb4, 0x05, 0x91, 0x22, 0xae, 0x5b, 0xc9, 0x90, 0x28, 0x53, 0xbd, 0xb4, 0xdd, 0xb5, 0x2b, 0x92, 0x2a, 0x99, 0x61, 0x75, 0xaf, 0x9c, 0x5b, 0x54, 0x3f, 0xc8, 0xe5, 0xa9, 0x20, 0xc9, 0x12, 0x0d, 0x30, 0x32, 0xcc, 0x11, 0x4d, 0xee, 0x73, 0xb0, 0xc0, 0xe7, 0x81, 0xa9, 0xfd, 0xcb, 0x02, 0x2f, 0x92, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2528 = { .name = "ecdsa_brainpoolp512r1_sha512_2528", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2528_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2528_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2528_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 408 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2529 for ECDSA, tcId is 409 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2529_pubkey[] = { 0x90, 0x60, 0x43, 0x0c, 0x44, 0x39, 0xc3, 0x52, 0xcb, 0xc0, 0x8c, 0xd0, 0x90, 0x6f, 0x91, 0x46, 0x4c, 0xe3, 0x7a, 0x79, 0x74, 0xde, 0x99, 0x65, 0x25, 0x75, 0x86, 0x28, 0xb9, 0xd3, 0x58, 0x05, 0x40, 0xaf, 0xe9, 0xbe, 0x74, 0xba, 0x10, 0x50, 0xd0, 0x3a, 0xcb, 0xb0, 0xac, 0x29, 0xe6, 0x0a, 0xca, 0x9b, 0x96, 0x29, 0x5a, 0x6b, 0x5e, 0x49, 0x70, 0x74, 0x10, 0x25, 0x7f, 0xb7, 0x63, 0x9d, 0x59, 0xf8, 0x88, 0xad, 0x8a, 0x62, 0xbe, 0xcd, 0xe0, 0x66, 0x1d, 0xef, 0xee, 0xe4, 0x81, 0x35, 0xd3, 0x61, 0x67, 0xf9, 0xe8, 0x58, 0x0f, 0x27, 0x14, 0xbc, 0xd5, 0xb6, 0x7e, 0xc7, 0x0a, 0xe3, 0xde, 0xae, 0x5d, 0x80, 0xb1, 0xe9, 0xd1, 0x0c, 0x13, 0xf2, 0x1c, 0xe7, 0xc5, 0x9c, 0x79, 0xac, 0x2c, 0xf7, 0x05, 0xae, 0xe8, 0x90, 0xad, 0xf4, 0x34, 0xf2, 0x9a, 0xa8, 0x41, 0xa0, 0x5b, 0x0f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2529_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2529_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x88, 0xb1, 0x4a, 0xfa, 0x49, 0x87, 0xd0, 0x6f, 0x66, 0x43, 0xeb, 0xbe, 0x8f, 0xd4, 0xc9, 0x9f, 0xd5, 0xc0, 0x71, 0x5c, 0x8f, 0xd4, 0xa8, 0x0b, 0xde, 0xb6, 0x17, 0x08, 0x59, 0xc2, 0x6d, 0x26, 0xaa, 0x98, 0x49, 0xcd, 0xd6, 0xed, 0xb8, 0x14, 0x34, 0x6b, 0x80, 0xe1, 0x32, 0xf0, 0x0d, 0x05, 0xb1, 0x5b, 0x0f, 0x9a, 0x6d, 0x17, 0xe2, 0x4a, 0xf7, 0x9f, 0xab, 0x9b, 0xb0, 0x87, 0x33, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2529 = { .name = "ecdsa_brainpoolp512r1_sha512_2529", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2529_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2529_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2529_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 409 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2530 for ECDSA, tcId is 410 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2530_pubkey[] = { 0x73, 0x26, 0x13, 0x7c, 0x69, 0x9e, 0x6b, 0x1d, 0x2b, 0xf3, 0x13, 0xc0, 0x4c, 0x34, 0xb8, 0x6e, 0x63, 0x29, 0x3d, 0x7e, 0x20, 0x54, 0xe4, 0x71, 0x87, 0xef, 0x84, 0x3f, 0xb4, 0x26, 0x74, 0xf6, 0x5b, 0x7e, 0x01, 0x36, 0xec, 0xda, 0xf8, 0xe4, 0x11, 0xc6, 0xe2, 0xdb, 0xbf, 0x5a, 0xc5, 0x00, 0x74, 0x01, 0x74, 0x3e, 0xc7, 0x24, 0x4e, 0x7d, 0xac, 0x03, 0x79, 0x51, 0x6b, 0xb9, 0x2f, 0x39, 0x92, 0xe5, 0x46, 0xd0, 0x1c, 0x16, 0x55, 0xcf, 0x68, 0x54, 0x93, 0x91, 0xd8, 0x58, 0x20, 0x35, 0xee, 0x47, 0x1e, 0x58, 0xf4, 0x33, 0xea, 0x89, 0xf3, 0x8f, 0x8c, 0xc1, 0xed, 0xc1, 0x92, 0x82, 0x25, 0xb3, 0xf5, 0xa3, 0x76, 0xe0, 0x15, 0xce, 0xe6, 0xae, 0x9e, 0x1e, 0xaa, 0xe6, 0x09, 0xbe, 0x2e, 0x69, 0x53, 0x7e, 0x59, 0x6b, 0x06, 0xb7, 0x7e, 0x4b, 0x6b, 0x74, 0x82, 0xfa, 0xb6, 0x0b, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2530_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2530_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x22, 0x2c, 0x52, 0xbe, 0x92, 0x61, 0xf4, 0x1b, 0xd9, 0x90, 0xfa, 0xef, 0xa3, 0xf5, 0x32, 0x67, 0xf5, 0x70, 0x1c, 0x57, 0x23, 0xf5, 0x2a, 0x02, 0xf7, 0xad, 0x85, 0xc2, 0x16, 0x70, 0x9b, 0x49, 0xaa, 0xa6, 0x12, 0x73, 0x75, 0xbb, 0x6e, 0x05, 0x0d, 0x1a, 0xe0, 0x38, 0x4c, 0xbc, 0x03, 0x41, 0x6c, 0x56, 0xc3, 0xe6, 0x9b, 0x45, 0xf8, 0x92, 0xbd, 0xe7, 0xea, 0xe6, 0xec, 0x21, 0xcc, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2530 = { .name = "ecdsa_brainpoolp512r1_sha512_2530", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2530_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2530_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2530_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 410 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2531 for ECDSA, tcId is 411 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2531_pubkey[] = { 0x56, 0xbd, 0x4e, 0x3c, 0xa3, 0x22, 0xf6, 0x5c, 0x29, 0xb6, 0x11, 0xf7, 0x9f, 0x3f, 0x95, 0x0f, 0x21, 0x63, 0x8e, 0x02, 0x6f, 0xcc, 0xf6, 0x73, 0xb0, 0x8c, 0xff, 0xc7, 0x3c, 0xc3, 0x94, 0x95, 0xce, 0xd5, 0xb8, 0x8e, 0x26, 0x41, 0x9e, 0xbd, 0xe7, 0x5c, 0x85, 0xfd, 0xff, 0x14, 0x60, 0x94, 0x7e, 0xf7, 0xaf, 0xe9, 0x9a, 0xca, 0x58, 0x78, 0xb1, 0xaf, 0x79, 0x68, 0x81, 0x81, 0xe3, 0x23, 0x69, 0xe6, 0x46, 0xbb, 0x9d, 0x01, 0xa1, 0x0c, 0xc4, 0x93, 0x12, 0x59, 0xdc, 0x8f, 0x59, 0x7d, 0x95, 0xe8, 0x5e, 0xbd, 0x56, 0x72, 0x90, 0x98, 0xcf, 0xab, 0x14, 0x43, 0x16, 0x5e, 0x55, 0x8f, 0x05, 0x36, 0x98, 0xb0, 0xbb, 0x4f, 0x44, 0x22, 0x2e, 0xa2, 0x45, 0xac, 0x4c, 0x21, 0x71, 0x7e, 0xb2, 0x2a, 0xaf, 0xf6, 0x50, 0xa3, 0x29, 0xee, 0xe2, 0x42, 0x03, 0x84, 0x1c, 0x59, 0xd1, 0x3f, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2531_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2531_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x30, 0xd1, 0x9a, 0xc7, 0x1a, 0x42, 0xca, 0x70, 0xed, 0xaa, 0x8b, 0x0d, 0x33, 0x5e, 0x48, 0x02, 0x3a, 0x0d, 0xdf, 0x57, 0xea, 0x39, 0xa9, 0xbb, 0x18, 0xae, 0xbf, 0x15, 0x44, 0xa0, 0xdd, 0xd6, 0xf3, 0xc8, 0xac, 0xa4, 0xf1, 0x54, 0xe6, 0x50, 0x5b, 0xdd, 0x40, 0x50, 0x6d, 0x9e, 0xe0, 0x14, 0x51, 0xa0, 0x85, 0x92, 0x94, 0xad, 0x19, 0xf6, 0x33, 0xdd, 0x98, 0xb7, 0x9a, 0x79, 0x6d, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2531 = { .name = "ecdsa_brainpoolp512r1_sha512_2531", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2531_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2531_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2531_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 411 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2532 for ECDSA, tcId is 412 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2532_pubkey[] = { 0x68, 0x8d, 0x0f, 0x39, 0x4a, 0xcb, 0x16, 0x11, 0x9e, 0x0b, 0x29, 0xb5, 0x6e, 0x78, 0x0f, 0x29, 0x5a, 0x24, 0xdc, 0xba, 0x16, 0x15, 0xa2, 0x3e, 0x59, 0xe6, 0x7b, 0x1d, 0xc9, 0x54, 0x9b, 0xff, 0x87, 0x91, 0xa6, 0x21, 0x30, 0xd4, 0xb0, 0xd8, 0xd7, 0x57, 0x39, 0xf0, 0x6d, 0xfc, 0x08, 0xcf, 0x6b, 0x5c, 0xb1, 0xe3, 0x1a, 0x63, 0xbc, 0x72, 0xb1, 0xfa, 0xd6, 0xf0, 0x58, 0xb1, 0xcd, 0x59, 0x9f, 0x94, 0x46, 0xae, 0x8a, 0x7f, 0x41, 0xbd, 0xfb, 0xac, 0x1d, 0xdb, 0xcd, 0xd6, 0xe6, 0x49, 0x01, 0x93, 0x26, 0x0d, 0xcd, 0xad, 0xa0, 0x72, 0x07, 0x9c, 0xbf, 0x13, 0x9b, 0x66, 0x6c, 0xf5, 0x93, 0x4f, 0x11, 0xab, 0xf5, 0x72, 0xa3, 0x3e, 0x7f, 0x12, 0x35, 0xcd, 0xf7, 0x08, 0x20, 0xa5, 0x47, 0x5d, 0x14, 0xec, 0xed, 0x67, 0xad, 0x6a, 0x4a, 0x85, 0x78, 0xf9, 0xb6, 0xe4, 0x09, 0x3c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2532_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2532_sig[] = { 0x9f, 0x49, 0x45, 0xf6, 0x80, 0xed, 0xf9, 0x80, 0x0a, 0x63, 0x28, 0x57, 0x58, 0xf3, 0x99, 0xb3, 0xd1, 0x8d, 0x81, 0x41, 0xb8, 0xa1, 0x80, 0x64, 0xa3, 0x0d, 0x30, 0x35, 0xf4, 0xcb, 0x65, 0x81, 0x95, 0x78, 0x77, 0xf3, 0xa8, 0xf0, 0xf7, 0x25, 0x97, 0x11, 0x6e, 0x70, 0x29, 0x15, 0xa4, 0xf4, 0xf6, 0x98, 0xf4, 0x04, 0x08, 0x9a, 0x4c, 0xc5, 0x08, 0x04, 0x47, 0xde, 0xf0, 0x2f, 0x48, 0x50, 0x10, 0xb9, 0x89, 0x00, 0x28, 0x55, 0xff, 0xaf, 0xbd, 0x8c, 0x23, 0xa6, 0x61, 0xf3, 0xb9, 0x3c, 0xcf, 0xff, 0x4f, 0xbe, 0x84, 0xa2, 0x3d, 0x1a, 0x6c, 0x4a, 0xff, 0x44, 0x05, 0xbd, 0xb9, 0x4c, 0x3f, 0x86, 0x02, 0x24, 0xe2, 0x05, 0x03, 0x2f, 0xdc, 0x9a, 0x1d, 0xc8, 0x0c, 0x7d, 0x6b, 0x21, 0x40, 0x9f, 0x96, 0x32, 0xe0, 0xfb, 0x54, 0x00, 0x21, 0xcc, 0xc4, 0x21, 0x61, 0xb7, 0x0f, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2532 = { .name = "ecdsa_brainpoolp512r1_sha512_2532", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2532_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2532_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2532_sig, .siglen = 128, .result = 1, .comment = "extreme value for k, tcId is 412 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2533 for ECDSA, tcId is 413 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2533_pubkey[] = { 0x83, 0x67, 0x2d, 0x9b, 0x61, 0xf7, 0x3f, 0x1a, 0x0b, 0x2e, 0x06, 0x6b, 0xc3, 0xd0, 0x09, 0x74, 0x9d, 0x28, 0xd4, 0xe5, 0x84, 0xa1, 0xaf, 0xea, 0x28, 0xdc, 0xff, 0xd7, 0x8b, 0x6b, 0x2d, 0x65, 0x9d, 0xbb, 0x0c, 0x5c, 0xf7, 0xbe, 0xd6, 0x1f, 0x3b, 0x03, 0xc3, 0xc1, 0x29, 0xe3, 0x1d, 0x4b, 0x49, 0xca, 0x8d, 0xa3, 0x81, 0x3c, 0xf2, 0x5b, 0x6f, 0x02, 0x5d, 0x84, 0xee, 0x82, 0xd5, 0x61, 0x37, 0x9b, 0xe7, 0xf5, 0xc8, 0x37, 0xfd, 0x23, 0xe0, 0xac, 0xd7, 0x49, 0x16, 0x75, 0x49, 0xe8, 0x70, 0x3d, 0xba, 0xd3, 0xbc, 0x7a, 0xdd, 0x9d, 0x3a, 0x9f, 0xf0, 0x1a, 0xbd, 0x34, 0xb5, 0x53, 0x42, 0xf5, 0x32, 0x42, 0x8d, 0x95, 0xcc, 0x1f, 0x0c, 0x9b, 0xae, 0x7f, 0x45, 0x8d, 0x94, 0x11, 0x91, 0x9a, 0x28, 0x16, 0x00, 0x96, 0x58, 0x22, 0x42, 0x18, 0x85, 0x1b, 0x0f, 0x8d, 0x57, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2533_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2533_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x38, 0xf4, 0x89, 0xe8, 0x49, 0x4d, 0xec, 0x2e, 0x6a, 0x9c, 0x4c, 0xe4, 0xbb, 0xed, 0xfe, 0xad, 0x43, 0xba, 0xd9, 0xe6, 0x91, 0x43, 0x46, 0x04, 0xf2, 0x21, 0x34, 0x43, 0x7a, 0xbb, 0xad, 0x7a, 0xc7, 0x14, 0xc9, 0x6b, 0x19, 0x8d, 0xb7, 0x5d, 0xc0, 0x82, 0x20, 0x5d, 0xd5, 0x39, 0x5a, 0xc2, 0x5f, 0x3b, 0x46, 0x80, 0x58, 0x1f, 0x48, 0xf4, 0x91, 0xd7, 0xdc, 0xd6, 0x34, 0x38, 0x55, 0x78, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2533 = { .name = "ecdsa_brainpoolp512r1_sha512_2533", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2533_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2533_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2533_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 413 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2534 for ECDSA, tcId is 414 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2534_pubkey[] = { 0x73, 0x86, 0xa1, 0x09, 0x91, 0xc1, 0x47, 0x5c, 0x6c, 0x53, 0xf0, 0x58, 0x67, 0xe6, 0x9a, 0x35, 0x21, 0x9b, 0xc5, 0xca, 0xd4, 0x40, 0x5c, 0x96, 0x03, 0x22, 0x84, 0x3a, 0x56, 0xbb, 0x07, 0xbb, 0xaa, 0x31, 0x7d, 0x20, 0xa0, 0xbc, 0x98, 0x78, 0x6a, 0xb7, 0xb4, 0xc0, 0xcf, 0x6d, 0xea, 0xdf, 0x09, 0x3b, 0xb0, 0x7d, 0x5b, 0xd5, 0x63, 0xc0, 0xd5, 0x6b, 0x38, 0x0f, 0x88, 0x0e, 0x7a, 0xd1, 0x98, 0x19, 0xe9, 0xe8, 0x97, 0xc7, 0x64, 0x05, 0xda, 0xfb, 0xe1, 0xd7, 0x85, 0xb3, 0xbf, 0xf2, 0xe6, 0xe4, 0x87, 0x70, 0xad, 0xa1, 0xf4, 0x52, 0xec, 0x2b, 0x4a, 0x34, 0x7b, 0xda, 0xba, 0x7b, 0x6d, 0x71, 0x22, 0x00, 0x2d, 0x5f, 0x6e, 0xc4, 0xca, 0xbc, 0x58, 0x5b, 0x4e, 0xf8, 0x30, 0xe5, 0x2c, 0x62, 0x46, 0x41, 0xfe, 0x03, 0x82, 0x97, 0x80, 0x5e, 0xf0, 0xb7, 0xe8, 0xe8, 0x2b, 0xdd, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2534_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2534_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x7a, 0x0c, 0x02, 0xf1, 0xc1, 0xa6, 0xfa, 0x1a, 0x52, 0x2a, 0x5b, 0xa1, 0x00, 0x6b, 0xb4, 0x05, 0x91, 0x22, 0xae, 0x5b, 0xc9, 0x90, 0x28, 0x53, 0xbd, 0xb4, 0xdd, 0xb5, 0x2b, 0x92, 0x2a, 0x99, 0x61, 0x75, 0xaf, 0x9c, 0x5b, 0x54, 0x3f, 0xc8, 0xe5, 0xa9, 0x20, 0xc9, 0x12, 0x0d, 0x30, 0x32, 0xcc, 0x11, 0x4d, 0xee, 0x73, 0xb0, 0xc0, 0xe7, 0x81, 0xa9, 0xfd, 0xcb, 0x02, 0x2f, 0x92, 0x94, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2534 = { .name = "ecdsa_brainpoolp512r1_sha512_2534", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2534_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2534_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2534_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 414 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2535 for ECDSA, tcId is 415 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2535_pubkey[] = { 0x7d, 0x76, 0xf0, 0x9d, 0xb5, 0xfc, 0x7e, 0xd7, 0x67, 0xdf, 0xad, 0x2a, 0xf9, 0xaf, 0x54, 0x70, 0xa4, 0x3e, 0x06, 0x2f, 0x21, 0x49, 0x24, 0x99, 0xaf, 0x5f, 0xc7, 0x19, 0xf6, 0xbe, 0x17, 0x88, 0x19, 0x57, 0xef, 0x47, 0x66, 0x88, 0xfa, 0x30, 0x49, 0xb1, 0x3d, 0x48, 0xc5, 0x1f, 0x25, 0x9e, 0x5d, 0x60, 0x43, 0x44, 0x65, 0xd8, 0x44, 0x45, 0xd3, 0x59, 0xb8, 0x9f, 0x66, 0xc8, 0x8b, 0xac, 0x42, 0x06, 0x61, 0x69, 0x92, 0x73, 0xb2, 0x38, 0x38, 0x82, 0x7c, 0x69, 0x90, 0x89, 0x78, 0x06, 0x4b, 0x7c, 0x98, 0xf4, 0x19, 0x5a, 0xd5, 0xe2, 0xec, 0x70, 0x9a, 0x03, 0x6e, 0xad, 0x56, 0xe3, 0x4a, 0x3e, 0x99, 0x9e, 0x8c, 0x37, 0xdd, 0xea, 0x5b, 0x00, 0x49, 0x0a, 0x01, 0x1d, 0x9d, 0x11, 0x66, 0x76, 0xe9, 0x02, 0x2c, 0x12, 0x4b, 0x3c, 0x08, 0x18, 0xbc, 0xc3, 0x48, 0x8f, 0x78, 0xd3, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2535_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2535_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x88, 0xb1, 0x4a, 0xfa, 0x49, 0x87, 0xd0, 0x6f, 0x66, 0x43, 0xeb, 0xbe, 0x8f, 0xd4, 0xc9, 0x9f, 0xd5, 0xc0, 0x71, 0x5c, 0x8f, 0xd4, 0xa8, 0x0b, 0xde, 0xb6, 0x17, 0x08, 0x59, 0xc2, 0x6d, 0x26, 0xaa, 0x98, 0x49, 0xcd, 0xd6, 0xed, 0xb8, 0x14, 0x34, 0x6b, 0x80, 0xe1, 0x32, 0xf0, 0x0d, 0x05, 0xb1, 0x5b, 0x0f, 0x9a, 0x6d, 0x17, 0xe2, 0x4a, 0xf7, 0x9f, 0xab, 0x9b, 0xb0, 0x87, 0x33, 0x87, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2535 = { .name = "ecdsa_brainpoolp512r1_sha512_2535", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2535_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2535_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2535_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 415 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2536 for ECDSA, tcId is 416 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2536_pubkey[] = { 0x2a, 0x3a, 0x7f, 0x88, 0x15, 0x98, 0x3c, 0x92, 0x51, 0xdf, 0x92, 0x20, 0xcb, 0x5f, 0x42, 0x4f, 0x4d, 0x8e, 0xb9, 0xcf, 0xce, 0x3d, 0x96, 0xde, 0x72, 0x5b, 0xbe, 0xa6, 0xdb, 0xfe, 0xfe, 0x22, 0x6d, 0x78, 0x9f, 0xef, 0x85, 0x33, 0x19, 0x47, 0x87, 0x66, 0x8b, 0x66, 0xf8, 0xfb, 0x64, 0x0d, 0x13, 0x5a, 0x25, 0xa3, 0x0f, 0x5a, 0x25, 0x11, 0x1d, 0xdc, 0xfc, 0x5c, 0x9c, 0x7e, 0xb2, 0x2d, 0x9b, 0xa3, 0x5f, 0x30, 0x54, 0xac, 0x43, 0x9e, 0x0f, 0x55, 0x8e, 0xad, 0x8d, 0x09, 0x79, 0xa0, 0xfa, 0xb0, 0x46, 0xa4, 0x7a, 0xa0, 0x33, 0x9e, 0xf1, 0x6c, 0x0e, 0x1d, 0x37, 0xe4, 0xd1, 0xd6, 0xf2, 0x9f, 0xb7, 0xf6, 0x74, 0xdd, 0x51, 0xed, 0x57, 0x23, 0x34, 0x09, 0xac, 0x9e, 0x50, 0x5e, 0x29, 0xd4, 0x03, 0x78, 0x89, 0x71, 0x94, 0xcf, 0x5f, 0xbc, 0x92, 0x59, 0x5f, 0xd7, 0x74, 0xbe, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2536_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2536_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x22, 0x2c, 0x52, 0xbe, 0x92, 0x61, 0xf4, 0x1b, 0xd9, 0x90, 0xfa, 0xef, 0xa3, 0xf5, 0x32, 0x67, 0xf5, 0x70, 0x1c, 0x57, 0x23, 0xf5, 0x2a, 0x02, 0xf7, 0xad, 0x85, 0xc2, 0x16, 0x70, 0x9b, 0x49, 0xaa, 0xa6, 0x12, 0x73, 0x75, 0xbb, 0x6e, 0x05, 0x0d, 0x1a, 0xe0, 0x38, 0x4c, 0xbc, 0x03, 0x41, 0x6c, 0x56, 0xc3, 0xe6, 0x9b, 0x45, 0xf8, 0x92, 0xbd, 0xe7, 0xea, 0xe6, 0xec, 0x21, 0xcc, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2536 = { .name = "ecdsa_brainpoolp512r1_sha512_2536", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2536_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2536_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2536_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 416 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2537 for ECDSA, tcId is 417 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2537_pubkey[] = { 0x03, 0xf4, 0x98, 0xf2, 0xea, 0x6e, 0x36, 0xb4, 0x98, 0xac, 0x66, 0x46, 0x3a, 0x06, 0x70, 0x8f, 0xb9, 0x31, 0xac, 0x59, 0xa2, 0xa1, 0xdf, 0xa6, 0xeb, 0xb4, 0x97, 0x3c, 0xf0, 0x1a, 0x06, 0xce, 0xef, 0x58, 0xb3, 0x44, 0xb8, 0x5e, 0x89, 0xfc, 0x78, 0x35, 0x12, 0x11, 0xf7, 0x1f, 0xd1, 0xf1, 0x18, 0x18, 0xf7, 0xef, 0x96, 0xe2, 0x96, 0x46, 0x6b, 0x0d, 0x3b, 0x70, 0xc2, 0xda, 0x69, 0x20, 0x64, 0xaa, 0x78, 0x28, 0x54, 0x39, 0xf1, 0x7d, 0x69, 0xa9, 0x8c, 0xae, 0x8a, 0x13, 0x79, 0xbd, 0xac, 0x05, 0xce, 0xd9, 0x30, 0xa1, 0x8f, 0x44, 0x93, 0x9b, 0xd9, 0x1f, 0x86, 0x69, 0xa3, 0x7f, 0xe8, 0xfb, 0x1e, 0x9a, 0xb1, 0xea, 0xd4, 0xdb, 0x0b, 0x33, 0x7a, 0xc5, 0x94, 0xfd, 0x21, 0xd9, 0xe0, 0xd4, 0x32, 0x5a, 0xb7, 0xee, 0x07, 0x20, 0x8f, 0x1c, 0x07, 0x60, 0x1b, 0xb9, 0x13, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2537_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2537_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x30, 0xd1, 0x9a, 0xc7, 0x1a, 0x42, 0xca, 0x70, 0xed, 0xaa, 0x8b, 0x0d, 0x33, 0x5e, 0x48, 0x02, 0x3a, 0x0d, 0xdf, 0x57, 0xea, 0x39, 0xa9, 0xbb, 0x18, 0xae, 0xbf, 0x15, 0x44, 0xa0, 0xdd, 0xd6, 0xf3, 0xc8, 0xac, 0xa4, 0xf1, 0x54, 0xe6, 0x50, 0x5b, 0xdd, 0x40, 0x50, 0x6d, 0x9e, 0xe0, 0x14, 0x51, 0xa0, 0x85, 0x92, 0x94, 0xad, 0x19, 0xf6, 0x33, 0xdd, 0x98, 0xb7, 0x9a, 0x79, 0x6d, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2537 = { .name = "ecdsa_brainpoolp512r1_sha512_2537", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2537_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2537_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2537_sig, .siglen = 128, .result = 1, .comment = "extreme value for k and s^-1, tcId is 417 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2538 for ECDSA, tcId is 418 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2538_pubkey[] = { 0x7b, 0xb5, 0xf9, 0xef, 0xbc, 0xc2, 0x60, 0xb0, 0x81, 0x20, 0xc7, 0xc4, 0x19, 0x35, 0x66, 0x13, 0x33, 0x22, 0xce, 0x47, 0xe6, 0x66, 0x04, 0x7e, 0xdf, 0xb4, 0x62, 0xfb, 0xc3, 0x10, 0xbb, 0x06, 0x50, 0x3e, 0x8d, 0x62, 0xd0, 0xcf, 0x60, 0x55, 0xe2, 0x71, 0xa8, 0x18, 0x7b, 0xe2, 0x2d, 0xc5, 0xa1, 0xd6, 0xb0, 0x97, 0x04, 0xa3, 0xb9, 0x90, 0x65, 0xed, 0xb8, 0x7b, 0x46, 0xc2, 0xae, 0x32, 0x40, 0x1f, 0x00, 0x40, 0x04, 0x8f, 0x94, 0x7f, 0xa0, 0x20, 0x17, 0xbc, 0xa6, 0x1a, 0xb6, 0xd6, 0x35, 0x3f, 0xc5, 0x88, 0x07, 0xbb, 0xa2, 0xf0, 0xa4, 0x65, 0x21, 0xe2, 0x0f, 0x20, 0x66, 0x82, 0x4e, 0xc8, 0x4b, 0xae, 0x1b, 0x54, 0x5a, 0x41, 0x4a, 0x29, 0x6a, 0xde, 0xe2, 0x23, 0x15, 0xfd, 0x48, 0x57, 0x3a, 0x7c, 0x5b, 0x3b, 0xd4, 0xc5, 0x39, 0x8b, 0x27, 0xd7, 0xf2, 0x82, 0x4f, 0x2c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2538_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2538_sig[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x10, 0xb9, 0x89, 0x00, 0x28, 0x55, 0xff, 0xaf, 0xbd, 0x8c, 0x23, 0xa6, 0x61, 0xf3, 0xb9, 0x3c, 0xcf, 0xff, 0x4f, 0xbe, 0x84, 0xa2, 0x3d, 0x1a, 0x6c, 0x4a, 0xff, 0x44, 0x05, 0xbd, 0xb9, 0x4c, 0x3f, 0x86, 0x02, 0x24, 0xe2, 0x05, 0x03, 0x2f, 0xdc, 0x9a, 0x1d, 0xc8, 0x0c, 0x7d, 0x6b, 0x21, 0x40, 0x9f, 0x96, 0x32, 0xe0, 0xfb, 0x54, 0x00, 0x21, 0xcc, 0xc4, 0x21, 0x61, 0xb7, 0x0f, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2538 = { .name = "ecdsa_brainpoolp512r1_sha512_2538", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2538_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2538_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2538_sig, .siglen = 128, .result = 1, .comment = "extreme value for k, tcId is 418 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2539 for ECDSA, tcId is 419 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2539_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd, 0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11, 0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae, 0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2539_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2539_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x23, 0x21, 0x02, 0x81, 0x75, 0x7b, 0x30, 0xe1, 0x92, 0x18, 0xa3, 0x7c, 0xbd, 0x61, 0x20, 0x86, 0xfb, 0xc1, 0x58, 0xca, 0xa8, 0xb4, 0xe1, 0xac, 0xb2, 0xec, 0x00, 0x83, 0x7e, 0x5d, 0x94, 0x1f, 0x34, 0x2f, 0xb3, 0xcc, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2539 = { .name = "ecdsa_brainpoolp512r1_sha512_2539", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2539_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2539_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2539_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 419 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2540 for ECDSA, tcId is 420 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2540_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd, 0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11, 0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae, 0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2540_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2540_sig[] = { 0x66, 0xe5, 0x9c, 0xbc, 0xf0, 0xf0, 0xa0, 0xfe, 0xe7, 0x25, 0x6d, 0x52, 0x66, 0x1c, 0xf7, 0x4b, 0x81, 0x63, 0x08, 0xa7, 0x7a, 0x7c, 0x9e, 0x8c, 0x41, 0x30, 0x46, 0x1a, 0x4d, 0x12, 0x05, 0xee, 0xdf, 0xc3, 0x2b, 0x5f, 0xba, 0x90, 0x82, 0x9c, 0x84, 0x25, 0x40, 0x92, 0x83, 0xea, 0xb7, 0x7c, 0x74, 0xfc, 0xf1, 0xd4, 0x55, 0x71, 0xda, 0x5a, 0x37, 0x2a, 0x02, 0x63, 0x68, 0x79, 0x4c, 0x9d, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2540 = { .name = "ecdsa_brainpoolp512r1_sha512_2540", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2540_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2540_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2540_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 420 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2541 for ECDSA, tcId is 421 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2541_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x2c, 0xff, 0x65, 0x5b, 0x85, 0x86, 0x91, 0x9e, 0x7e, 0xea, 0x27, 0x04, 0x64, 0x51, 0xd9, 0x09, 0xd9, 0x26, 0x96, 0xb3, 0x8f, 0x24, 0x56, 0xf4, 0x36, 0x62, 0xd7, 0x6e, 0xe8, 0x13, 0x87, 0x5f, 0xca, 0x70, 0xbc, 0xb7, 0x51, 0x67, 0x1f, 0xe4, 0x53, 0x03, 0x55, 0x52, 0x5c, 0x7c, 0x1d, 0x37, 0x56, 0xb7, 0xd3, 0xff, 0x84, 0x92, 0x72, 0x7e, 0xaf, 0xdd, 0x42, 0x47, 0x1d, 0x62, 0x40, 0x61, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2541_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2541_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x23, 0x21, 0x02, 0x81, 0x75, 0x7b, 0x30, 0xe1, 0x92, 0x18, 0xa3, 0x7c, 0xbd, 0x61, 0x20, 0x86, 0xfb, 0xc1, 0x58, 0xca, 0xa8, 0xb4, 0xe1, 0xac, 0xb2, 0xec, 0x00, 0x83, 0x7e, 0x5d, 0x94, 0x1f, 0x34, 0x2f, 0xb3, 0xcc, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2541 = { .name = "ecdsa_brainpoolp512r1_sha512_2541", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2541_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2541_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2541_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 421 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2542 for ECDSA, tcId is 422 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2542_pubkey[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22, 0x2c, 0xff, 0x65, 0x5b, 0x85, 0x86, 0x91, 0x9e, 0x7e, 0xea, 0x27, 0x04, 0x64, 0x51, 0xd9, 0x09, 0xd9, 0x26, 0x96, 0xb3, 0x8f, 0x24, 0x56, 0xf4, 0x36, 0x62, 0xd7, 0x6e, 0xe8, 0x13, 0x87, 0x5f, 0xca, 0x70, 0xbc, 0xb7, 0x51, 0x67, 0x1f, 0xe4, 0x53, 0x03, 0x55, 0x52, 0x5c, 0x7c, 0x1d, 0x37, 0x56, 0xb7, 0xd3, 0xff, 0x84, 0x92, 0x72, 0x7e, 0xaf, 0xdd, 0x42, 0x47, 0x1d, 0x62, 0x40, 0x61, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2542_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2542_sig[] = { 0x66, 0xe5, 0x9c, 0xbc, 0xf0, 0xf0, 0xa0, 0xfe, 0xe7, 0x25, 0x6d, 0x52, 0x66, 0x1c, 0xf7, 0x4b, 0x81, 0x63, 0x08, 0xa7, 0x7a, 0x7c, 0x9e, 0x8c, 0x41, 0x30, 0x46, 0x1a, 0x4d, 0x12, 0x05, 0xee, 0xdf, 0xc3, 0x2b, 0x5f, 0xba, 0x90, 0x82, 0x9c, 0x84, 0x25, 0x40, 0x92, 0x83, 0xea, 0xb7, 0x7c, 0x74, 0xfc, 0xf1, 0xd4, 0x55, 0x71, 0xda, 0x5a, 0x37, 0x2a, 0x02, 0x63, 0x68, 0x79, 0x4c, 0x9d, 0x18, 0x68, 0xcd, 0x63, 0x8d, 0x21, 0x65, 0x38, 0x76, 0xd5, 0x45, 0x86, 0x99, 0xaf, 0x24, 0x01, 0x1d, 0x06, 0xef, 0xab, 0xf5, 0x1c, 0xd4, 0xdd, 0x8c, 0x57, 0x5f, 0x8a, 0xa2, 0x50, 0x6e, 0xeb, 0x79, 0xe4, 0x56, 0x52, 0x78, 0xaa, 0x73, 0x28, 0x2d, 0xee, 0xa0, 0x28, 0x36, 0xcf, 0x70, 0x0a, 0x28, 0xd0, 0x42, 0xc9, 0x4a, 0x56, 0x8c, 0xfb, 0x19, 0xee, 0xcc, 0x5b, 0xcd, 0x3c, 0xb6, 0xea, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2542 = { .name = "ecdsa_brainpoolp512r1_sha512_2542", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2542_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2542_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2542_sig, .siglen = 128, .result = -1, .comment = "testing point duplication, tcId is 422 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2543 for ECDSA, tcId is 423 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2543_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2543_sig[] = { 0x89, 0xed, 0xf7, 0x5e, 0x6e, 0x98, 0x63, 0x05, 0xd8, 0x18, 0x13, 0x86, 0xc1, 0x6d, 0xb4, 0x4b, 0xa0, 0xd7, 0xff, 0x40, 0xf4, 0x33, 0x55, 0x69, 0x75, 0x4a, 0x48, 0x1f, 0x5c, 0xd4, 0x8c, 0x62, 0x11, 0xa6, 0x3d, 0xe7, 0xbd, 0xaa, 0x48, 0x5e, 0x9f, 0xa7, 0x98, 0x58, 0xa4, 0xea, 0xbf, 0x11, 0x1f, 0xed, 0x29, 0x59, 0xf0, 0x31, 0xde, 0x2a, 0x13, 0x2b, 0xa7, 0x09, 0x41, 0x26, 0x83, 0xa9, 0x7a, 0x8c, 0x08, 0x56, 0x4f, 0x51, 0x53, 0x41, 0x28, 0xbb, 0x52, 0xfe, 0x36, 0xdf, 0xfa, 0xae, 0x89, 0x07, 0x90, 0x11, 0x25, 0x6e, 0xf8, 0x06, 0x9e, 0x64, 0xd6, 0x4c, 0x56, 0x10, 0xd3, 0xe6, 0x11, 0xc0, 0xba, 0x8b, 0x19, 0x02, 0x73, 0x88, 0xfc, 0xcc, 0x21, 0x25, 0x23, 0xb2, 0x2c, 0x44, 0xe8, 0x5a, 0x78, 0x9e, 0x16, 0xcb, 0x1b, 0xbd, 0x32, 0x40, 0xc8, 0x6b, 0x43, 0x48, 0x0f, 0xde, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2543 = { .name = "ecdsa_brainpoolp512r1_sha512_2543", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2543_pubkey, .pubkeylen = 128, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_brainpoolp512r1_sha512_2543_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 423 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2544 for ECDSA, tcId is 424 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2544_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2544_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2544_sig[] = { 0x22, 0x5d, 0xc2, 0x31, 0x01, 0x77, 0xce, 0x62, 0x67, 0xef, 0xde, 0x99, 0x37, 0xef, 0xf8, 0x98, 0xfb, 0x0b, 0xad, 0x12, 0xb0, 0xdb, 0xeb, 0x4f, 0xa9, 0xc6, 0xbe, 0x6e, 0x20, 0xf8, 0x85, 0x63, 0xe6, 0xd2, 0x99, 0x1d, 0x47, 0xa6, 0x48, 0xb0, 0xba, 0x5a, 0x70, 0x39, 0x84, 0x2d, 0xbf, 0x88, 0x3b, 0xbd, 0x73, 0x5d, 0xf7, 0x93, 0xcc, 0xe0, 0xd1, 0x36, 0x02, 0x3f, 0xbf, 0xc9, 0xbe, 0x95, 0x00, 0xd5, 0x97, 0x83, 0xd8, 0xbd, 0x05, 0x0c, 0xf7, 0x28, 0xb3, 0x50, 0x6c, 0x16, 0xee, 0x4a, 0x78, 0xac, 0x26, 0xc1, 0x2f, 0xd3, 0x3d, 0xad, 0xb6, 0xee, 0x81, 0x46, 0x37, 0x2e, 0x4f, 0xb2, 0xa8, 0x80, 0xef, 0x77, 0xeb, 0x20, 0xac, 0x90, 0xf3, 0xa4, 0x27, 0x5c, 0x17, 0x18, 0xa0, 0x33, 0xa7, 0xc0, 0xb2, 0xdf, 0x53, 0x8e, 0xb3, 0x58, 0x27, 0x33, 0x01, 0x54, 0x19, 0x11, 0x53, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2544 = { .name = "ecdsa_brainpoolp512r1_sha512_2544", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2544_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2544_msg, .msglen = 3, .sig = ecdsa_brainpoolp512r1_sha512_2544_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 424 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2545 for ECDSA, tcId is 425 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2545_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2545_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2545_sig[] = { 0x61, 0x48, 0x3c, 0x72, 0x93, 0x69, 0x41, 0x31, 0x44, 0xa6, 0xbe, 0x0d, 0xd0, 0x5c, 0x1a, 0xc2, 0x9b, 0xc4, 0x40, 0xbb, 0xda, 0xf8, 0x7e, 0x57, 0x2a, 0xa9, 0x87, 0xe9, 0xca, 0x42, 0x36, 0x39, 0xf3, 0x39, 0xbc, 0xaa, 0xad, 0x99, 0xcb, 0x1f, 0xa8, 0x0b, 0x7c, 0x35, 0x41, 0x6a, 0x18, 0x34, 0xec, 0x04, 0xbc, 0xf0, 0xfe, 0x78, 0x12, 0xc7, 0x12, 0xeb, 0x1f, 0x06, 0xa1, 0x6d, 0xac, 0xa3, 0x41, 0xbb, 0x95, 0x6c, 0x33, 0x9e, 0xbc, 0xf5, 0xe4, 0xe4, 0x03, 0xc7, 0xd8, 0x92, 0x8d, 0x5e, 0xb4, 0xfd, 0xf7, 0xd3, 0xf5, 0x3a, 0x2c, 0x06, 0xd6, 0xc9, 0xfa, 0xc3, 0x47, 0xf6, 0x03, 0xac, 0x32, 0x09, 0xa2, 0xaf, 0x37, 0x51, 0x6f, 0x80, 0x7b, 0x50, 0x36, 0x3b, 0x53, 0x28, 0xbc, 0x98, 0xb9, 0x43, 0x54, 0xaf, 0x7d, 0x59, 0x96, 0x6d, 0x16, 0x0f, 0x68, 0xe8, 0x0c, 0x6b, 0x2d, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2545 = { .name = "ecdsa_brainpoolp512r1_sha512_2545", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2545_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2545_msg, .msglen = 6, .sig = ecdsa_brainpoolp512r1_sha512_2545_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 425 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2546 for ECDSA, tcId is 426 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2546_pubkey[] = { 0x1e, 0xc7, 0xfe, 0x22, 0x75, 0x86, 0x0c, 0x3b, 0xc0, 0xe4, 0xe6, 0xe4, 0x59, 0xaf, 0x7e, 0x16, 0x98, 0x5d, 0x37, 0xad, 0xba, 0x73, 0x51, 0xac, 0x35, 0x7a, 0x7c, 0x39, 0x7e, 0x07, 0x52, 0x2e, 0xa4, 0x1b, 0xcc, 0xa8, 0xe8, 0x97, 0x77, 0xfe, 0x05, 0xb8, 0xf0, 0xd9, 0xdc, 0x8c, 0x61, 0x40, 0x04, 0xfc, 0xaf, 0x30, 0xa9, 0x70, 0x01, 0xa5, 0x01, 0x1a, 0x15, 0x9f, 0x46, 0xfc, 0xd5, 0x44, 0x3c, 0xbc, 0x1d, 0xdf, 0xc7, 0xac, 0x89, 0xa1, 0xa2, 0xf8, 0xee, 0xf7, 0x7b, 0xf9, 0xbb, 0xa8, 0xad, 0xe7, 0x3d, 0xa2, 0x10, 0x0c, 0xb6, 0xa3, 0x71, 0x54, 0x6b, 0x49, 0x5f, 0xb5, 0xea, 0x88, 0x5e, 0xb6, 0x31, 0x64, 0x5e, 0x79, 0x59, 0x1d, 0xb6, 0x59, 0xc4, 0x92, 0x66, 0xd2, 0x63, 0xd5, 0xcb, 0xd3, 0x40, 0x30, 0x81, 0xcb, 0x40, 0x75, 0x36, 0xef, 0xe9, 0xa5, 0xbe, 0xc6, 0x99, 0x55, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2546_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2546_sig[] = { 0xa6, 0x20, 0x88, 0x0b, 0xb7, 0xfa, 0xb1, 0x18, 0x0e, 0x3d, 0x8f, 0x39, 0x3e, 0x4b, 0x33, 0x43, 0xdd, 0x4e, 0xb1, 0xc3, 0x74, 0xf9, 0xd6, 0x12, 0x52, 0xf8, 0xa2, 0x01, 0xd9, 0x09, 0x6b, 0xa8, 0x36, 0x72, 0x1f, 0x8e, 0x2d, 0x8b, 0x56, 0xcb, 0xf4, 0x06, 0x96, 0x0a, 0xae, 0x0e, 0x50, 0x32, 0x5a, 0xdf, 0xca, 0x6b, 0x1b, 0x52, 0x9f, 0x06, 0xa8, 0x12, 0x60, 0xbd, 0x8b, 0x15, 0xff, 0x68, 0x76, 0x53, 0x7f, 0xeb, 0xbc, 0x0e, 0x24, 0xab, 0x49, 0x92, 0xb5, 0x76, 0xab, 0xf8, 0xbc, 0x02, 0x01, 0xca, 0xcf, 0x5c, 0xcf, 0x67, 0x4a, 0xd3, 0xc3, 0xb1, 0x55, 0x2c, 0x98, 0xca, 0x64, 0x64, 0x2e, 0xff, 0x54, 0x01, 0xaf, 0xec, 0xab, 0x16, 0x7e, 0xc0, 0xbe, 0x19, 0x5f, 0xe5, 0xff, 0xa1, 0x78, 0xf1, 0x45, 0x67, 0xef, 0x17, 0x1b, 0x48, 0x27, 0x96, 0x4a, 0x55, 0x9d, 0x07, 0x9b, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2546 = { .name = "ecdsa_brainpoolp512r1_sha512_2546", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2546_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2546_msg, .msglen = 20, .sig = ecdsa_brainpoolp512r1_sha512_2546_sig, .siglen = 128, .result = 1, .comment = "pseudorandom signature, tcId is 426 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2547 for ECDSA, tcId is 427 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2547_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0x00, 0x00, 0x00, 0x00, 0x1a, 0x4b, 0x00, 0xc7, 0x4a, 0x5a, 0x61, 0xac, 0x19, 0x6f, 0xaf, 0x4d, 0xc3, 0x9a, 0xcd, 0x41, 0xbf, 0x35, 0x4d, 0xef, 0x0a, 0x27, 0x52, 0x99, 0x64, 0x35, 0x91, 0x32, 0xa7, 0x6f, 0x28, 0x65, 0x42, 0x48, 0xd1, 0xac, 0x00, 0x4d, 0x11, 0xd8, 0x11, 0xab, 0xa0, 0xac, 0xb9, 0xc2, 0x6d, 0x2f, 0x4a, 0x54, 0x01, 0x2c, 0x5d, 0x8a, 0x9a, 0x1e, 0x7c, 0x8b, 0x4a, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2547_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2547_sig[] = { 0x47, 0x9c, 0xe8, 0x45, 0x8b, 0x04, 0xb2, 0xdc, 0x12, 0x7b, 0x46, 0x97, 0x1e, 0x6c, 0x79, 0x83, 0x1b, 0xf7, 0x88, 0xf6, 0x5d, 0xdc, 0x77, 0x06, 0x20, 0xda, 0xaa, 0x15, 0x58, 0x3f, 0x8d, 0x50, 0x6f, 0x2a, 0x66, 0x52, 0xd8, 0x2b, 0x38, 0x56, 0x0e, 0xc1, 0x97, 0x75, 0x86, 0xe1, 0x19, 0x29, 0xb6, 0x66, 0xf6, 0xd7, 0x01, 0x2d, 0x81, 0x6f, 0xd3, 0x56, 0xd4, 0x1e, 0x93, 0x04, 0xd6, 0x0f, 0xa7, 0x50, 0xf7, 0x3c, 0xca, 0xef, 0xf5, 0xd9, 0x94, 0x06, 0x7e, 0x66, 0xe4, 0x5c, 0x20, 0x08, 0x92, 0xc6, 0x07, 0xb3, 0x29, 0xbe, 0x5e, 0x64, 0xdb, 0x5c, 0x38, 0x3c, 0x7b, 0xe7, 0x11, 0xc9, 0x7b, 0x5d, 0xd4, 0x25, 0xa5, 0x22, 0x50, 0xbc, 0x86, 0x24, 0x77, 0xe2, 0x8b, 0x3a, 0xfa, 0x4e, 0xf3, 0xd8, 0x31, 0x06, 0x6a, 0x7b, 0x14, 0x34, 0x32, 0xa5, 0xd1, 0x54, 0x03, 0x02, 0x14, 0x57, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2547 = { .name = "ecdsa_brainpoolp512r1_sha512_2547", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2547_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2547_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2547_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 427 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2548 for ECDSA, tcId is 428 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2548_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0x00, 0x00, 0x00, 0x00, 0x1a, 0x4b, 0x00, 0xc7, 0x4a, 0x5a, 0x61, 0xac, 0x19, 0x6f, 0xaf, 0x4d, 0xc3, 0x9a, 0xcd, 0x41, 0xbf, 0x35, 0x4d, 0xef, 0x0a, 0x27, 0x52, 0x99, 0x64, 0x35, 0x91, 0x32, 0xa7, 0x6f, 0x28, 0x65, 0x42, 0x48, 0xd1, 0xac, 0x00, 0x4d, 0x11, 0xd8, 0x11, 0xab, 0xa0, 0xac, 0xb9, 0xc2, 0x6d, 0x2f, 0x4a, 0x54, 0x01, 0x2c, 0x5d, 0x8a, 0x9a, 0x1e, 0x7c, 0x8b, 0x4a, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2548_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2548_sig[] = { 0x68, 0x5b, 0x8b, 0x29, 0x29, 0xc9, 0xa0, 0xa9, 0xb0, 0xde, 0xb6, 0xba, 0xef, 0xd0, 0x0e, 0x26, 0xf5, 0x0d, 0x4c, 0x1f, 0xc3, 0xfe, 0xd4, 0x7d, 0x7e, 0xf8, 0x12, 0xc5, 0x2b, 0x66, 0xec, 0x6f, 0x6d, 0x09, 0xf5, 0x4e, 0x9b, 0xdb, 0x72, 0x02, 0x01, 0x65, 0x70, 0xf7, 0x5b, 0xb9, 0x91, 0x2a, 0xab, 0x3a, 0x57, 0x2b, 0xfb, 0x97, 0xea, 0x58, 0x9a, 0xce, 0x29, 0x4f, 0xf0, 0xfe, 0x66, 0x62, 0x4c, 0x28, 0x62, 0x67, 0xcb, 0x87, 0xa6, 0xbe, 0x56, 0xf4, 0xcd, 0x00, 0x80, 0x39, 0x8c, 0x23, 0xe5, 0x69, 0xf2, 0xeb, 0xda, 0x71, 0xd2, 0xcd, 0x16, 0x82, 0x08, 0x02, 0x90, 0xde, 0xb4, 0x14, 0x3b, 0xdc, 0x61, 0xe7, 0x5b, 0x42, 0xab, 0xef, 0xbc, 0xbb, 0xdd, 0xf4, 0xc7, 0x94, 0x54, 0x5a, 0x05, 0x37, 0x86, 0x56, 0xa1, 0x85, 0x86, 0x58, 0xe0, 0xa4, 0x59, 0x58, 0x33, 0xfc, 0x40, 0xf6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2548 = { .name = "ecdsa_brainpoolp512r1_sha512_2548", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2548_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2548_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2548_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 428 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2549 for ECDSA, tcId is 429 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2549_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0x00, 0x00, 0x00, 0x00, 0x1a, 0x4b, 0x00, 0xc7, 0x4a, 0x5a, 0x61, 0xac, 0x19, 0x6f, 0xaf, 0x4d, 0xc3, 0x9a, 0xcd, 0x41, 0xbf, 0x35, 0x4d, 0xef, 0x0a, 0x27, 0x52, 0x99, 0x64, 0x35, 0x91, 0x32, 0xa7, 0x6f, 0x28, 0x65, 0x42, 0x48, 0xd1, 0xac, 0x00, 0x4d, 0x11, 0xd8, 0x11, 0xab, 0xa0, 0xac, 0xb9, 0xc2, 0x6d, 0x2f, 0x4a, 0x54, 0x01, 0x2c, 0x5d, 0x8a, 0x9a, 0x1e, 0x7c, 0x8b, 0x4a, 0x52, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2549_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2549_sig[] = { 0x81, 0x11, 0x12, 0xd2, 0x7c, 0xa1, 0xe4, 0x34, 0xb0, 0x0c, 0x02, 0x93, 0x32, 0x02, 0x84, 0xb1, 0xc5, 0x36, 0x9f, 0xd0, 0x07, 0xf9, 0x0e, 0x7a, 0x99, 0xd4, 0x4c, 0x9c, 0x02, 0x01, 0x36, 0x88, 0xd1, 0x6e, 0x5e, 0x0a, 0x2f, 0xc3, 0xa0, 0x77, 0x06, 0x4a, 0x99, 0x5c, 0x42, 0x44, 0x19, 0x5c, 0x04, 0xf0, 0x03, 0x23, 0xe3, 0x3a, 0xde, 0xa6, 0xb3, 0x77, 0x01, 0xad, 0x5c, 0xb3, 0x62, 0x16, 0x82, 0xdd, 0x5c, 0x3e, 0x36, 0x42, 0xfc, 0x43, 0xe5, 0xc4, 0xc6, 0x52, 0xe3, 0xb2, 0xd0, 0x0f, 0x6d, 0x13, 0x72, 0x07, 0xbe, 0x8c, 0x9b, 0x21, 0x25, 0x56, 0x1c, 0x08, 0x70, 0x3e, 0x4a, 0x84, 0xd2, 0xa8, 0x27, 0x85, 0xf7, 0x75, 0xab, 0xd1, 0x8a, 0xab, 0x24, 0xe5, 0x2f, 0x12, 0xc5, 0xf8, 0xcb, 0x56, 0xb2, 0x8b, 0x91, 0x5f, 0x9c, 0x0b, 0x11, 0x10, 0xc5, 0x42, 0xba, 0x92, 0xb3, 0x13, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2549 = { .name = "ecdsa_brainpoolp512r1_sha512_2549", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2549_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2549_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2549_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 429 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2550 for ECDSA, tcId is 430 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2550_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0xaa, 0xdd, 0x9d, 0xb8, 0xc1, 0x9e, 0xc3, 0xc3, 0xf5, 0x7a, 0x85, 0x02, 0x1a, 0x5a, 0x4c, 0xba, 0x07, 0x95, 0xc0, 0x71, 0xf4, 0x94, 0x84, 0x1f, 0xcc, 0x3c, 0x4a, 0x31, 0x0b, 0xfd, 0x77, 0x3e, 0xd5, 0xde, 0x72, 0x9b, 0x59, 0x7d, 0x96, 0x96, 0xae, 0x80, 0x8f, 0x52, 0xd4, 0xf7, 0xe0, 0x39, 0x6e, 0xbf, 0x91, 0xff, 0xe3, 0x2e, 0xc5, 0x58, 0xcb, 0x1f, 0xc6, 0x37, 0xdb, 0xae, 0xfe, 0xa1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2550_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2550_sig[] = { 0x39, 0xd0, 0xc5, 0xc4, 0xe4, 0x8c, 0xa1, 0x40, 0x64, 0xb2, 0xe9, 0xb3, 0x60, 0x0d, 0xeb, 0x0e, 0xc2, 0xfb, 0x3e, 0x0c, 0x65, 0xb3, 0xbe, 0x5c, 0xe3, 0xf2, 0x06, 0x16, 0x6d, 0x76, 0xdf, 0xc5, 0xa5, 0xf6, 0xea, 0x87, 0x02, 0xda, 0x3a, 0xec, 0xb1, 0x3e, 0x7b, 0x55, 0xa8, 0x7b, 0x12, 0x63, 0xc4, 0x88, 0x46, 0x11, 0xe5, 0xde, 0x44, 0x0f, 0x6c, 0x89, 0xed, 0x12, 0xf8, 0x8a, 0xe5, 0x0f, 0x6a, 0xe7, 0x83, 0x98, 0xe7, 0xf9, 0x42, 0xb3, 0x5e, 0x7d, 0x87, 0xef, 0x27, 0xce, 0x83, 0x06, 0x90, 0xf7, 0x32, 0x7a, 0xd2, 0xa8, 0x3d, 0xf5, 0x6e, 0x9d, 0x02, 0x88, 0xb5, 0x19, 0x99, 0x45, 0x4b, 0xd9, 0x0f, 0x89, 0x5e, 0x78, 0x49, 0xf3, 0x5b, 0x2a, 0x65, 0x2a, 0x3a, 0xf9, 0x7b, 0xf5, 0x57, 0x95, 0xb4, 0x69, 0x8e, 0x0b, 0x01, 0x4e, 0xa6, 0xff, 0x02, 0x1a, 0x00, 0x87, 0x8f, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2550 = { .name = "ecdsa_brainpoolp512r1_sha512_2550", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2550_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2550_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2550_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 430 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2551 for ECDSA, tcId is 431 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2551_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0xaa, 0xdd, 0x9d, 0xb8, 0xc1, 0x9e, 0xc3, 0xc3, 0xf5, 0x7a, 0x85, 0x02, 0x1a, 0x5a, 0x4c, 0xba, 0x07, 0x95, 0xc0, 0x71, 0xf4, 0x94, 0x84, 0x1f, 0xcc, 0x3c, 0x4a, 0x31, 0x0b, 0xfd, 0x77, 0x3e, 0xd5, 0xde, 0x72, 0x9b, 0x59, 0x7d, 0x96, 0x96, 0xae, 0x80, 0x8f, 0x52, 0xd4, 0xf7, 0xe0, 0x39, 0x6e, 0xbf, 0x91, 0xff, 0xe3, 0x2e, 0xc5, 0x58, 0xcb, 0x1f, 0xc6, 0x37, 0xdb, 0xae, 0xfe, 0xa1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2551_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2551_sig[] = { 0x7c, 0x3a, 0xb2, 0xe3, 0xde, 0xaf, 0xb8, 0x23, 0xee, 0x59, 0x1d, 0xc5, 0x3c, 0x97, 0xb3, 0x89, 0xc6, 0xd1, 0x8a, 0x8c, 0xa9, 0xa6, 0xae, 0x20, 0xc7, 0x43, 0x28, 0x60, 0x6d, 0xb2, 0xd7, 0xc7, 0xd2, 0xbb, 0x3c, 0xe2, 0x68, 0x94, 0xe3, 0xf3, 0x07, 0x85, 0x23, 0x7b, 0x9e, 0x87, 0x43, 0x50, 0xd6, 0x15, 0x78, 0x63, 0x81, 0xb0, 0xc8, 0xc4, 0x20, 0x22, 0x4d, 0x2f, 0x5e, 0x35, 0x94, 0x68, 0x34, 0xe7, 0x03, 0xdd, 0x93, 0x9b, 0x2b, 0x1a, 0x20, 0x08, 0x72, 0x33, 0x4e, 0x2f, 0x86, 0x4d, 0xbf, 0x26, 0x68, 0x8f, 0x84, 0x75, 0xc9, 0xe3, 0x8a, 0x38, 0x41, 0x02, 0xe0, 0x8a, 0x18, 0xc2, 0x7d, 0x4e, 0x30, 0xd8, 0x02, 0x09, 0x5f, 0xff, 0x3e, 0xdd, 0xa6, 0xdc, 0x1e, 0x03, 0xaa, 0x81, 0xae, 0xd9, 0x67, 0x19, 0xcb, 0x49, 0x61, 0x24, 0x71, 0xfa, 0x11, 0x88, 0x75, 0xa1, 0x5c, 0x18, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2551 = { .name = "ecdsa_brainpoolp512r1_sha512_2551", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2551_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2551_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2551_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 431 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2552 for ECDSA, tcId is 432 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2552_pubkey[] = { 0x30, 0xa6, 0x7d, 0xea, 0xaf, 0x0c, 0xee, 0x44, 0xaa, 0xeb, 0x90, 0x3d, 0x8c, 0xdb, 0x24, 0xad, 0x9d, 0xc1, 0x91, 0xd3, 0x75, 0xd7, 0xd6, 0xa6, 0x0d, 0x25, 0x20, 0xe1, 0x93, 0x06, 0xcf, 0xc4, 0x7d, 0xde, 0x9d, 0xcb, 0x80, 0xaa, 0xe0, 0xb0, 0x40, 0x55, 0x4b, 0xb9, 0x8d, 0x60, 0x1e, 0x01, 0x9f, 0x93, 0x36, 0xe8, 0x31, 0xcc, 0xcb, 0x99, 0xf2, 0xd9, 0x2c, 0xf4, 0xb9, 0x16, 0x04, 0xb1, 0xaa, 0xdd, 0x9d, 0xb8, 0xc1, 0x9e, 0xc3, 0xc3, 0xf5, 0x7a, 0x85, 0x02, 0x1a, 0x5a, 0x4c, 0xba, 0x07, 0x95, 0xc0, 0x71, 0xf4, 0x94, 0x84, 0x1f, 0xcc, 0x3c, 0x4a, 0x31, 0x0b, 0xfd, 0x77, 0x3e, 0xd5, 0xde, 0x72, 0x9b, 0x59, 0x7d, 0x96, 0x96, 0xae, 0x80, 0x8f, 0x52, 0xd4, 0xf7, 0xe0, 0x39, 0x6e, 0xbf, 0x91, 0xff, 0xe3, 0x2e, 0xc5, 0x58, 0xcb, 0x1f, 0xc6, 0x37, 0xdb, 0xae, 0xfe, 0xa1, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2552_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2552_sig[] = { 0x4c, 0xd8, 0xa5, 0xf1, 0x97, 0x7a, 0x3c, 0xf8, 0xe8, 0x47, 0xa1, 0x37, 0x73, 0x59, 0xcc, 0xa7, 0x04, 0x6c, 0x79, 0x3a, 0xda, 0x06, 0x65, 0xf2, 0xc0, 0x69, 0x08, 0xfd, 0xce, 0xc2, 0x4e, 0x6c, 0xd5, 0x5a, 0x17, 0x50, 0xca, 0x57, 0x64, 0x21, 0xb8, 0xa6, 0x5a, 0xa9, 0x9a, 0xed, 0x86, 0x3c, 0xda, 0xaa, 0x77, 0xd7, 0xf7, 0xcf, 0x84, 0x44, 0x8e, 0xa5, 0x8e, 0x95, 0xc5, 0x7a, 0x13, 0x3c, 0xa3, 0x40, 0x57, 0x2d, 0x5d, 0x96, 0x83, 0xe7, 0x2e, 0x15, 0x7e, 0x68, 0x3a, 0xb1, 0x6d, 0x0e, 0x2a, 0x35, 0x03, 0x0f, 0xf3, 0xe1, 0x64, 0x1d, 0x1b, 0x4f, 0x80, 0x1d, 0x80, 0x73, 0x2c, 0x32, 0xb9, 0xfb, 0xb5, 0x3f, 0xdc, 0xae, 0xa9, 0x33, 0xf1, 0x31, 0x13, 0x6f, 0x8a, 0xb2, 0x53, 0x11, 0x01, 0x8b, 0x87, 0x1f, 0x53, 0x75, 0x37, 0x82, 0x98, 0x9a, 0x87, 0xef, 0x23, 0x1a, 0x38, 0xac, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2552 = { .name = "ecdsa_brainpoolp512r1_sha512_2552", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2552_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2552_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2552_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 432 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2553 for ECDSA, tcId is 433 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2553_pubkey[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xbb, 0x41, 0x89, 0xa6, 0xd2, 0xab, 0x7b, 0x5a, 0xae, 0x55, 0x0f, 0xe8, 0xdc, 0x00, 0xbe, 0x2e, 0x00, 0xf4, 0xb3, 0x5b, 0x57, 0x6d, 0x6f, 0x86, 0x2c, 0x09, 0x86, 0x92, 0x10, 0xfc, 0x82, 0xfb, 0xd1, 0x5a, 0x54, 0xde, 0xf1, 0x44, 0x29, 0x79, 0xfa, 0x0d, 0xa1, 0xc6, 0x44, 0x08, 0xfd, 0x84, 0x37, 0xa6, 0x00, 0x46, 0x93, 0x08, 0x20, 0x74, 0x8e, 0xcd, 0xfc, 0x66, 0x4a, 0x59, 0xa8, 0x7e, 0xae, 0x33, 0x8d, 0x22, 0xd0, 0x83, 0x55, 0x23, 0x15, 0x6f, 0x8f, 0x7d, 0x93, 0x47, 0x10, 0xa7, 0x47, 0xcf, 0x19, 0x2d, 0x3e, 0x31, 0x7b, 0xc4, 0x5f, 0x04, 0x89, 0xd6, 0x97, 0x98, 0x87, 0xc6, 0x5e, 0xc1, 0x7a, 0xb7, 0xb5, 0xe3, 0xda, 0x9f, 0x4c, 0xb1, 0x10, 0x11, 0x6e, 0xf0, 0x73, 0x98, 0x49, 0xac, 0xc5, 0x6d, 0x24, 0xe5, 0xa3, 0x36, 0x5f, 0xcf, 0xb2, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2553_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2553_sig[] = { 0x53, 0x19, 0x2c, 0x28, 0x82, 0x0e, 0xc2, 0x66, 0x63, 0x9f, 0xee, 0x09, 0xe2, 0x14, 0xa5, 0x5c, 0xc0, 0xef, 0xb0, 0x7b, 0x22, 0xdc, 0x0d, 0x3f, 0x29, 0x3b, 0xda, 0x20, 0x72, 0xfc, 0xf9, 0xb4, 0x62, 0xda, 0x93, 0xec, 0x9e, 0x71, 0x69, 0xae, 0x1f, 0x11, 0x48, 0x70, 0x51, 0x89, 0xf7, 0xf1, 0x5d, 0x2c, 0xbe, 0xc4, 0x6d, 0x22, 0x41, 0x97, 0xa3, 0xa7, 0xa9, 0x24, 0xb0, 0xc0, 0x0a, 0x32, 0x1b, 0x66, 0x45, 0x36, 0xae, 0xdb, 0xdc, 0x97, 0xbe, 0xd4, 0xde, 0xe2, 0x3e, 0xb9, 0x4a, 0x49, 0xf2, 0x3d, 0xe3, 0xbd, 0x84, 0xa7, 0x8f, 0x29, 0x9e, 0x81, 0xed, 0xfe, 0x01, 0x7a, 0x7d, 0x3c, 0xa3, 0xa7, 0xc8, 0xaa, 0xce, 0x8d, 0x13, 0xb6, 0xb2, 0xeb, 0x47, 0x7b, 0x92, 0x2c, 0x43, 0x98, 0x39, 0xea, 0xcd, 0xff, 0x27, 0x83, 0x07, 0x07, 0x57, 0x75, 0x48, 0x63, 0x58, 0x2f, 0x71, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2553 = { .name = "ecdsa_brainpoolp512r1_sha512_2553", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2553_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2553_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2553_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 433 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2554 for ECDSA, tcId is 434 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2554_pubkey[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xbb, 0x41, 0x89, 0xa6, 0xd2, 0xab, 0x7b, 0x5a, 0xae, 0x55, 0x0f, 0xe8, 0xdc, 0x00, 0xbe, 0x2e, 0x00, 0xf4, 0xb3, 0x5b, 0x57, 0x6d, 0x6f, 0x86, 0x2c, 0x09, 0x86, 0x92, 0x10, 0xfc, 0x82, 0xfb, 0xd1, 0x5a, 0x54, 0xde, 0xf1, 0x44, 0x29, 0x79, 0xfa, 0x0d, 0xa1, 0xc6, 0x44, 0x08, 0xfd, 0x84, 0x37, 0xa6, 0x00, 0x46, 0x93, 0x08, 0x20, 0x74, 0x8e, 0xcd, 0xfc, 0x66, 0x4a, 0x59, 0xa8, 0x7e, 0xae, 0x33, 0x8d, 0x22, 0xd0, 0x83, 0x55, 0x23, 0x15, 0x6f, 0x8f, 0x7d, 0x93, 0x47, 0x10, 0xa7, 0x47, 0xcf, 0x19, 0x2d, 0x3e, 0x31, 0x7b, 0xc4, 0x5f, 0x04, 0x89, 0xd6, 0x97, 0x98, 0x87, 0xc6, 0x5e, 0xc1, 0x7a, 0xb7, 0xb5, 0xe3, 0xda, 0x9f, 0x4c, 0xb1, 0x10, 0x11, 0x6e, 0xf0, 0x73, 0x98, 0x49, 0xac, 0xc5, 0x6d, 0x24, 0xe5, 0xa3, 0x36, 0x5f, 0xcf, 0xb2, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2554_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2554_sig[] = { 0x96, 0x90, 0x58, 0xc1, 0x5d, 0x67, 0x5b, 0x1b, 0x26, 0x21, 0x52, 0xa4, 0x52, 0x0f, 0x7e, 0x80, 0x3a, 0xb4, 0x65, 0xa9, 0xe1, 0xee, 0xef, 0x7b, 0x8a, 0x5d, 0x0f, 0xb3, 0xe8, 0x80, 0x32, 0xb8, 0xe8, 0xf1, 0xbe, 0x9f, 0x37, 0xc8, 0x0f, 0x9c, 0x7b, 0x95, 0x0f, 0x4d, 0xa9, 0x50, 0xba, 0xae, 0x9b, 0x21, 0x6e, 0xcd, 0x6c, 0x79, 0x3d, 0xdb, 0x14, 0x59, 0xcf, 0xdf, 0x49, 0x77, 0x6b, 0xae, 0x20, 0xe0, 0xd0, 0x78, 0xa5, 0xa1, 0x13, 0xe9, 0x2f, 0xac, 0xdf, 0xe5, 0xcb, 0x39, 0x24, 0x32, 0x47, 0x25, 0x4a, 0xa0, 0xa6, 0x56, 0xb8, 0x3e, 0x7b, 0xaa, 0x34, 0x3d, 0x36, 0xf7, 0xb1, 0x4b, 0x86, 0xf1, 0x5e, 0x54, 0xb7, 0x1b, 0xa7, 0x50, 0x6d, 0x51, 0x19, 0xff, 0x52, 0xc4, 0x7e, 0x0e, 0xe5, 0x49, 0x92, 0x7a, 0x00, 0x8c, 0xbf, 0x2b, 0xbf, 0xe1, 0x91, 0x6d, 0x1c, 0xc2, 0x74, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2554 = { .name = "ecdsa_brainpoolp512r1_sha512_2554", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2554_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2554_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2554_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 434 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2555 for ECDSA, tcId is 435 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2555_pubkey[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xbb, 0x41, 0x89, 0xa6, 0xd2, 0xab, 0x7b, 0x5a, 0xae, 0x55, 0x0f, 0xe8, 0xdc, 0x00, 0xbe, 0x2e, 0x00, 0xf4, 0xb3, 0x5b, 0x57, 0x6d, 0x6f, 0x86, 0x2c, 0x09, 0x86, 0x92, 0x10, 0xfc, 0x82, 0xfb, 0xd1, 0x5a, 0x54, 0xde, 0xf1, 0x44, 0x29, 0x79, 0xfa, 0x0d, 0xa1, 0xc6, 0x44, 0x08, 0xfd, 0x84, 0x37, 0xa6, 0x00, 0x46, 0x93, 0x08, 0x20, 0x74, 0x8e, 0xcd, 0xfc, 0x66, 0x4a, 0x59, 0xa8, 0x7e, 0xae, 0x33, 0x8d, 0x22, 0xd0, 0x83, 0x55, 0x23, 0x15, 0x6f, 0x8f, 0x7d, 0x93, 0x47, 0x10, 0xa7, 0x47, 0xcf, 0x19, 0x2d, 0x3e, 0x31, 0x7b, 0xc4, 0x5f, 0x04, 0x89, 0xd6, 0x97, 0x98, 0x87, 0xc6, 0x5e, 0xc1, 0x7a, 0xb7, 0xb5, 0xe3, 0xda, 0x9f, 0x4c, 0xb1, 0x10, 0x11, 0x6e, 0xf0, 0x73, 0x98, 0x49, 0xac, 0xc5, 0x6d, 0x24, 0xe5, 0xa3, 0x36, 0x5f, 0xcf, 0xb2, 0x89, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2555_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2555_sig[] = { 0x1d, 0xe5, 0xdf, 0x62, 0x13, 0x64, 0x43, 0x6b, 0xed, 0x5c, 0xac, 0xf8, 0xdb, 0xe4, 0x20, 0xe4, 0xe4, 0xe5, 0xd1, 0xb0, 0x43, 0x4f, 0xcf, 0x9d, 0xc3, 0x35, 0x64, 0x5d, 0xd0, 0xaa, 0x07, 0xcc, 0x1d, 0x1e, 0xa3, 0x0a, 0x8c, 0xaf, 0xe2, 0x53, 0x1c, 0xd4, 0x03, 0x5d, 0xd9, 0x72, 0xc0, 0xd6, 0xc3, 0x72, 0x0f, 0x16, 0x0e, 0x24, 0x26, 0x4f, 0xd6, 0xc4, 0x15, 0x21, 0xe4, 0x4e, 0xb0, 0xcb, 0x72, 0xe9, 0xab, 0xd5, 0x45, 0x61, 0xba, 0xc8, 0x9b, 0x23, 0x4b, 0xf9, 0xe5, 0x1a, 0x3f, 0x60, 0x03, 0x59, 0x0a, 0xf1, 0x77, 0x09, 0x8e, 0x25, 0xf0, 0x05, 0x3a, 0x3a, 0xe1, 0x8a, 0x6c, 0x74, 0xb3, 0x89, 0x67, 0x4a, 0x6e, 0xb8, 0x03, 0x78, 0xff, 0xd2, 0x55, 0xcf, 0xe5, 0x23, 0x23, 0x64, 0x5c, 0xdf, 0xe9, 0xa1, 0x0a, 0x96, 0x53, 0x41, 0xb4, 0xe4, 0x7f, 0xc0, 0xdd, 0x08, 0x2e, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2555 = { .name = "ecdsa_brainpoolp512r1_sha512_2555", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2555_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2555_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2555_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 435 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2556 for ECDSA, tcId is 436 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2556_pubkey[] = { 0x24, 0xc1, 0x04, 0x40, 0xe3, 0x7a, 0x15, 0xd7, 0xec, 0x9a, 0x3a, 0x48, 0x96, 0x5a, 0x9c, 0xe9, 0x38, 0x02, 0x21, 0xfc, 0x51, 0x15, 0x5f, 0x1e, 0x99, 0x27, 0x16, 0xcd, 0x99, 0x33, 0xd0, 0x9c, 0xe0, 0xa5, 0x42, 0x44, 0x71, 0x87, 0x7e, 0x89, 0x94, 0x49, 0x4a, 0x4c, 0x2a, 0xde, 0x0a, 0x81, 0xef, 0x52, 0x95, 0x2e, 0x39, 0x56, 0x55, 0x15, 0x7f, 0x0b, 0x74, 0x3b, 0x3b, 0x21, 0x9e, 0x2d, 0x62, 0x8f, 0xd5, 0xba, 0x51, 0x0f, 0x61, 0x0e, 0xe6, 0x93, 0xa1, 0xe0, 0xd3, 0x9e, 0xf3, 0x9d, 0x91, 0xa6, 0x24, 0x83, 0x79, 0xc6, 0x22, 0xa1, 0x75, 0xa2, 0x3a, 0x53, 0x30, 0xa8, 0x8b, 0x2d, 0x5a, 0x60, 0xdb, 0xf6, 0xd2, 0x49, 0x70, 0x2c, 0xd1, 0x50, 0x45, 0x61, 0x53, 0x5e, 0xa1, 0x7e, 0x1b, 0xe1, 0xb7, 0x0a, 0x41, 0xdc, 0x46, 0x3e, 0x8e, 0x1a, 0x1a, 0xf0, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2556_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2556_sig[] = { 0x42, 0x2f, 0xb1, 0x8c, 0xde, 0xc9, 0x66, 0x93, 0x71, 0x45, 0xb0, 0xf1, 0x60, 0xb8, 0xce, 0x22, 0x2b, 0x0b, 0xa1, 0x6f, 0xab, 0x07, 0x5e, 0x16, 0xf1, 0xda, 0xc8, 0x39, 0xb8, 0xd7, 0x77, 0x2f, 0xee, 0x27, 0xa2, 0x83, 0xad, 0x72, 0x22, 0x25, 0xbe, 0xbe, 0x83, 0xdb, 0x2d, 0x5a, 0x8b, 0x25, 0xcb, 0x2c, 0xbe, 0x45, 0x24, 0x8b, 0x3a, 0xa8, 0x76, 0x55, 0x4c, 0x6a, 0x37, 0xf8, 0x13, 0x75, 0x7a, 0x38, 0x89, 0xd5, 0x3b, 0xb4, 0x2a, 0x6d, 0x41, 0xf3, 0x93, 0xeb, 0x00, 0xc4, 0x36, 0x23, 0x93, 0x70, 0x29, 0xd4, 0xcc, 0x1d, 0x36, 0x74, 0x69, 0xf6, 0xea, 0x4e, 0xc1, 0x66, 0x58, 0x61, 0x9d, 0x29, 0x35, 0xde, 0x0a, 0x65, 0x5a, 0xda, 0xe4, 0xcb, 0xb6, 0x24, 0xf2, 0xff, 0xe3, 0xce, 0x41, 0xf0, 0x24, 0x26, 0x9d, 0x91, 0x49, 0xdb, 0xd8, 0x3c, 0xb1, 0xc9, 0x7a, 0xed, 0x41, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2556 = { .name = "ecdsa_brainpoolp512r1_sha512_2556", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2556_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2556_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2556_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 436 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2557 for ECDSA, tcId is 437 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2557_pubkey[] = { 0x24, 0xc1, 0x04, 0x40, 0xe3, 0x7a, 0x15, 0xd7, 0xec, 0x9a, 0x3a, 0x48, 0x96, 0x5a, 0x9c, 0xe9, 0x38, 0x02, 0x21, 0xfc, 0x51, 0x15, 0x5f, 0x1e, 0x99, 0x27, 0x16, 0xcd, 0x99, 0x33, 0xd0, 0x9c, 0xe0, 0xa5, 0x42, 0x44, 0x71, 0x87, 0x7e, 0x89, 0x94, 0x49, 0x4a, 0x4c, 0x2a, 0xde, 0x0a, 0x81, 0xef, 0x52, 0x95, 0x2e, 0x39, 0x56, 0x55, 0x15, 0x7f, 0x0b, 0x74, 0x3b, 0x3b, 0x21, 0x9e, 0x2d, 0x62, 0x8f, 0xd5, 0xba, 0x51, 0x0f, 0x61, 0x0e, 0xe6, 0x93, 0xa1, 0xe0, 0xd3, 0x9e, 0xf3, 0x9d, 0x91, 0xa6, 0x24, 0x83, 0x79, 0xc6, 0x22, 0xa1, 0x75, 0xa2, 0x3a, 0x53, 0x30, 0xa8, 0x8b, 0x2d, 0x5a, 0x60, 0xdb, 0xf6, 0xd2, 0x49, 0x70, 0x2c, 0xd1, 0x50, 0x45, 0x61, 0x53, 0x5e, 0xa1, 0x7e, 0x1b, 0xe1, 0xb7, 0x0a, 0x41, 0xdc, 0x46, 0x3e, 0x8e, 0x1a, 0x1a, 0xf0, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2557_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2557_sig[] = { 0x98, 0x36, 0xee, 0x7a, 0xe0, 0x44, 0x7e, 0xc0, 0x7a, 0x6a, 0x21, 0x66, 0x33, 0xe0, 0xa9, 0x7d, 0xe8, 0x31, 0xfa, 0x04, 0xfc, 0xd7, 0x60, 0xab, 0xe3, 0x9e, 0x8f, 0x45, 0x77, 0x96, 0xfd, 0xfc, 0xe9, 0xc6, 0x9e, 0xd1, 0x3c, 0x82, 0x7d, 0xe0, 0xca, 0x6b, 0x60, 0xd8, 0x49, 0xed, 0x69, 0x76, 0xac, 0x09, 0x1b, 0x7d, 0x90, 0xce, 0x3e, 0x98, 0xd3, 0xc9, 0x14, 0x4a, 0xfe, 0x63, 0x8d, 0x42, 0x1c, 0x9d, 0x8e, 0x14, 0x2b, 0xae, 0xe8, 0x57, 0xd6, 0xad, 0xec, 0x8e, 0xff, 0x84, 0xea, 0x1d, 0x23, 0xb0, 0x5f, 0x54, 0x82, 0xcc, 0x29, 0x50, 0x45, 0x15, 0x86, 0xcf, 0x5d, 0xe0, 0xcb, 0xf9, 0xe3, 0xa7, 0x27, 0xa4, 0xa4, 0xe9, 0x3e, 0x15, 0xb6, 0xcc, 0x01, 0x25, 0xe5, 0xfc, 0xd1, 0x91, 0x06, 0x36, 0x89, 0x80, 0x64, 0xa6, 0x38, 0x13, 0xa0, 0xc7, 0x5f, 0xee, 0x28, 0x04, 0x1b, 0x88, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2557 = { .name = "ecdsa_brainpoolp512r1_sha512_2557", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2557_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2557_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2557_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 437 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2558 for ECDSA, tcId is 438 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2558_pubkey[] = { 0x24, 0xc1, 0x04, 0x40, 0xe3, 0x7a, 0x15, 0xd7, 0xec, 0x9a, 0x3a, 0x48, 0x96, 0x5a, 0x9c, 0xe9, 0x38, 0x02, 0x21, 0xfc, 0x51, 0x15, 0x5f, 0x1e, 0x99, 0x27, 0x16, 0xcd, 0x99, 0x33, 0xd0, 0x9c, 0xe0, 0xa5, 0x42, 0x44, 0x71, 0x87, 0x7e, 0x89, 0x94, 0x49, 0x4a, 0x4c, 0x2a, 0xde, 0x0a, 0x81, 0xef, 0x52, 0x95, 0x2e, 0x39, 0x56, 0x55, 0x15, 0x7f, 0x0b, 0x74, 0x3b, 0x3b, 0x21, 0x9e, 0x2d, 0x62, 0x8f, 0xd5, 0xba, 0x51, 0x0f, 0x61, 0x0e, 0xe6, 0x93, 0xa1, 0xe0, 0xd3, 0x9e, 0xf3, 0x9d, 0x91, 0xa6, 0x24, 0x83, 0x79, 0xc6, 0x22, 0xa1, 0x75, 0xa2, 0x3a, 0x53, 0x30, 0xa8, 0x8b, 0x2d, 0x5a, 0x60, 0xdb, 0xf6, 0xd2, 0x49, 0x70, 0x2c, 0xd1, 0x50, 0x45, 0x61, 0x53, 0x5e, 0xa1, 0x7e, 0x1b, 0xe1, 0xb7, 0x0a, 0x41, 0xdc, 0x46, 0x3e, 0x8e, 0x1a, 0x1a, 0xf0, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2558_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2558_sig[] = { 0x08, 0x77, 0xd7, 0xa3, 0xff, 0xac, 0xf4, 0xef, 0x36, 0xcb, 0xed, 0xfd, 0x44, 0xe4, 0xcc, 0x02, 0x37, 0xbd, 0xee, 0xde, 0x8c, 0xe0, 0xbd, 0xfb, 0x33, 0x0b, 0xb7, 0x3b, 0x31, 0x7b, 0x7d, 0x16, 0x1c, 0x45, 0xbd, 0x14, 0x96, 0xe1, 0x23, 0x3c, 0xed, 0x8f, 0x7d, 0xcf, 0xd0, 0x5e, 0x0e, 0x1c, 0xc6, 0x65, 0xfb, 0x1d, 0xc9, 0x2b, 0x54, 0xfc, 0xbe, 0x9b, 0x0e, 0x55, 0xd9, 0xba, 0x1b, 0xe4, 0x0f, 0x7a, 0xb8, 0x71, 0x74, 0x2e, 0xbf, 0x22, 0xe0, 0xb7, 0x67, 0x46, 0x14, 0xd7, 0x15, 0x69, 0xd5, 0x08, 0x4c, 0xcc, 0x0c, 0x98, 0xc2, 0xe4, 0x0d, 0x08, 0x8a, 0xe8, 0x8e, 0xab, 0x37, 0x82, 0x0a, 0x89, 0xa2, 0xdb, 0xe4, 0x9e, 0x1b, 0x67, 0xec, 0x55, 0xae, 0x1a, 0x34, 0xfe, 0x48, 0x22, 0xd6, 0x91, 0xbb, 0xf5, 0x49, 0x0f, 0xcc, 0x2c, 0x47, 0xe7, 0xc1, 0xba, 0x4d, 0xc5, 0x6e, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2558 = { .name = "ecdsa_brainpoolp512r1_sha512_2558", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2558_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2558_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2558_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 438 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2559 for ECDSA, tcId is 439 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2559_pubkey[] = { 0x0b, 0xa1, 0x8c, 0xc0, 0x55, 0x72, 0x42, 0x4a, 0x7a, 0x39, 0x1f, 0x4b, 0x48, 0x25, 0x8a, 0x87, 0x1a, 0x0f, 0x6d, 0x82, 0x16, 0xc5, 0xcf, 0x82, 0x44, 0x6c, 0x2d, 0x15, 0x6d, 0x55, 0x86, 0xb4, 0xc1, 0x96, 0xda, 0x0b, 0x2f, 0x3a, 0x23, 0x51, 0x1b, 0x89, 0xef, 0xf3, 0x1d, 0xd4, 0xf0, 0xc8, 0x8d, 0xbb, 0x1a, 0x76, 0xc5, 0xe4, 0xb2, 0x7c, 0x42, 0x76, 0xf8, 0xfb, 0xc7, 0x4a, 0x1b, 0x9d, 0xa2, 0x8c, 0xc8, 0xc3, 0x41, 0xea, 0x2e, 0x39, 0x08, 0xae, 0x6a, 0xb6, 0x82, 0x5f, 0x95, 0x60, 0x32, 0xc5, 0x3e, 0x62, 0x56, 0x97, 0xf8, 0x0b, 0x7b, 0x4e, 0xe7, 0x2d, 0xcc, 0x9f, 0x3c, 0xff, 0x73, 0x03, 0x49, 0xe0, 0xd3, 0x0d, 0xe4, 0x10, 0x91, 0x7f, 0x3d, 0x0d, 0x1c, 0x89, 0x88, 0x56, 0x2c, 0x1d, 0x55, 0x58, 0x3b, 0x47, 0xf0, 0xde, 0xc2, 0x34, 0xfd, 0xa2, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2559_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2559_sig[] = { 0xa7, 0x32, 0x20, 0x46, 0xba, 0x74, 0x73, 0x71, 0x6d, 0x35, 0x74, 0x2d, 0x96, 0x1a, 0xc5, 0xf2, 0xfe, 0x2e, 0x1d, 0xd5, 0x74, 0xec, 0xe7, 0xbd, 0x15, 0xda, 0x8c, 0x66, 0xa2, 0x62, 0xb2, 0xe7, 0x9b, 0x0d, 0x1d, 0xf2, 0x76, 0x19, 0xfd, 0xeb, 0xbb, 0x41, 0xda, 0x1b, 0x27, 0xba, 0x7c, 0x9a, 0x03, 0x70, 0xef, 0x96, 0x2e, 0xe8, 0xa4, 0x51, 0x05, 0xf4, 0x41, 0x6d, 0x16, 0xeb, 0xf1, 0x3e, 0x84, 0x18, 0xe4, 0x45, 0xdb, 0x45, 0xcf, 0xbd, 0xc8, 0x45, 0x80, 0x55, 0x38, 0x6d, 0x65, 0xe9, 0xbc, 0x07, 0xb4, 0x97, 0xb8, 0xd4, 0xbe, 0xf5, 0xf5, 0x15, 0xe7, 0x94, 0x70, 0x50, 0xd9, 0xab, 0x97, 0x99, 0xfb, 0x52, 0x0f, 0x32, 0x2b, 0xf0, 0x0f, 0xae, 0x4f, 0xae, 0x03, 0xc1, 0x26, 0x95, 0x10, 0xeb, 0xb3, 0xe1, 0xdc, 0x8c, 0xca, 0x59, 0x29, 0x8e, 0x26, 0x94, 0x58, 0x62, 0xe9, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2559 = { .name = "ecdsa_brainpoolp512r1_sha512_2559", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2559_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2559_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2559_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 439 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2560 for ECDSA, tcId is 440 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2560_pubkey[] = { 0x0b, 0xa1, 0x8c, 0xc0, 0x55, 0x72, 0x42, 0x4a, 0x7a, 0x39, 0x1f, 0x4b, 0x48, 0x25, 0x8a, 0x87, 0x1a, 0x0f, 0x6d, 0x82, 0x16, 0xc5, 0xcf, 0x82, 0x44, 0x6c, 0x2d, 0x15, 0x6d, 0x55, 0x86, 0xb4, 0xc1, 0x96, 0xda, 0x0b, 0x2f, 0x3a, 0x23, 0x51, 0x1b, 0x89, 0xef, 0xf3, 0x1d, 0xd4, 0xf0, 0xc8, 0x8d, 0xbb, 0x1a, 0x76, 0xc5, 0xe4, 0xb2, 0x7c, 0x42, 0x76, 0xf8, 0xfb, 0xc7, 0x4a, 0x1b, 0x9d, 0xa2, 0x8c, 0xc8, 0xc3, 0x41, 0xea, 0x2e, 0x39, 0x08, 0xae, 0x6a, 0xb6, 0x82, 0x5f, 0x95, 0x60, 0x32, 0xc5, 0x3e, 0x62, 0x56, 0x97, 0xf8, 0x0b, 0x7b, 0x4e, 0xe7, 0x2d, 0xcc, 0x9f, 0x3c, 0xff, 0x73, 0x03, 0x49, 0xe0, 0xd3, 0x0d, 0xe4, 0x10, 0x91, 0x7f, 0x3d, 0x0d, 0x1c, 0x89, 0x88, 0x56, 0x2c, 0x1d, 0x55, 0x58, 0x3b, 0x47, 0xf0, 0xde, 0xc2, 0x34, 0xfd, 0xa2, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2560_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2560_sig[] = { 0x1b, 0xb4, 0x60, 0xac, 0x42, 0xbb, 0x36, 0x40, 0xbf, 0xc7, 0x39, 0xa0, 0x18, 0x6e, 0xf3, 0x36, 0x2e, 0xd2, 0x7b, 0x25, 0x4f, 0x54, 0x8c, 0x07, 0x39, 0x35, 0xca, 0xa2, 0x11, 0xa1, 0xaa, 0x30, 0x2e, 0x79, 0xa9, 0x46, 0x6d, 0x7f, 0xec, 0xe7, 0x74, 0xd2, 0x50, 0xc1, 0xae, 0xae, 0xf9, 0x64, 0x1b, 0x9a, 0x2f, 0x25, 0xe6, 0x1c, 0xa3, 0x7f, 0xad, 0xa8, 0xee, 0x07, 0xf4, 0x9f, 0xd5, 0x1e, 0x3d, 0x91, 0x8a, 0x07, 0xa3, 0x6f, 0x57, 0x8d, 0xa8, 0xb0, 0xd4, 0x2d, 0x30, 0xba, 0xd6, 0x0e, 0xcf, 0xbd, 0x60, 0x3a, 0x45, 0xd0, 0xc1, 0xa7, 0x1b, 0xb0, 0x14, 0x47, 0xea, 0xd8, 0x1a, 0x53, 0x13, 0x26, 0x5c, 0xc9, 0xb5, 0x86, 0x0a, 0xba, 0x03, 0xf1, 0xc9, 0x3a, 0x9c, 0xb9, 0xf3, 0xbd, 0xd9, 0xa8, 0x5f, 0x27, 0x0d, 0xd3, 0x69, 0x14, 0x65, 0x94, 0x1d, 0x2b, 0x80, 0x98, 0xf9, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2560 = { .name = "ecdsa_brainpoolp512r1_sha512_2560", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2560_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2560_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2560_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 440 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2561 for ECDSA, tcId is 441 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2561_pubkey[] = { 0x0b, 0xa1, 0x8c, 0xc0, 0x55, 0x72, 0x42, 0x4a, 0x7a, 0x39, 0x1f, 0x4b, 0x48, 0x25, 0x8a, 0x87, 0x1a, 0x0f, 0x6d, 0x82, 0x16, 0xc5, 0xcf, 0x82, 0x44, 0x6c, 0x2d, 0x15, 0x6d, 0x55, 0x86, 0xb4, 0xc1, 0x96, 0xda, 0x0b, 0x2f, 0x3a, 0x23, 0x51, 0x1b, 0x89, 0xef, 0xf3, 0x1d, 0xd4, 0xf0, 0xc8, 0x8d, 0xbb, 0x1a, 0x76, 0xc5, 0xe4, 0xb2, 0x7c, 0x42, 0x76, 0xf8, 0xfb, 0xc7, 0x4a, 0x1b, 0x9d, 0xa2, 0x8c, 0xc8, 0xc3, 0x41, 0xea, 0x2e, 0x39, 0x08, 0xae, 0x6a, 0xb6, 0x82, 0x5f, 0x95, 0x60, 0x32, 0xc5, 0x3e, 0x62, 0x56, 0x97, 0xf8, 0x0b, 0x7b, 0x4e, 0xe7, 0x2d, 0xcc, 0x9f, 0x3c, 0xff, 0x73, 0x03, 0x49, 0xe0, 0xd3, 0x0d, 0xe4, 0x10, 0x91, 0x7f, 0x3d, 0x0d, 0x1c, 0x89, 0x88, 0x56, 0x2c, 0x1d, 0x55, 0x58, 0x3b, 0x47, 0xf0, 0xde, 0xc2, 0x34, 0xfd, 0xa2, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2561_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2561_sig[] = { 0x5b, 0x44, 0xe4, 0xfd, 0x49, 0x96, 0xf2, 0x7a, 0x7d, 0xcf, 0x30, 0x6b, 0xc9, 0xff, 0xf4, 0xa9, 0xc3, 0x6e, 0x3f, 0xe0, 0x90, 0x26, 0xfa, 0x72, 0x12, 0x2b, 0x64, 0xa4, 0xff, 0x65, 0xf8, 0x61, 0xa5, 0x95, 0x4c, 0xe8, 0xa4, 0x1f, 0x69, 0xa3, 0x91, 0x5c, 0x84, 0xa6, 0x3d, 0xb0, 0xc5, 0x7c, 0x6d, 0xfe, 0xcb, 0xac, 0x4f, 0xde, 0x99, 0xea, 0x5f, 0xcb, 0x10, 0x4d, 0x69, 0x67, 0xd6, 0x13, 0x08, 0x8e, 0x7b, 0x84, 0x6d, 0x6c, 0x5e, 0x09, 0x3a, 0x7b, 0xa1, 0x74, 0x27, 0xbc, 0xba, 0x0e, 0x92, 0x5a, 0xcb, 0x82, 0x6e, 0x4e, 0x9b, 0x97, 0x2b, 0x2d, 0x8a, 0x6d, 0x23, 0x2f, 0x63, 0x5c, 0xbe, 0x96, 0xbf, 0x6f, 0x16, 0x31, 0x74, 0xdb, 0x64, 0x6c, 0x2f, 0x66, 0x23, 0xc8, 0x9d, 0xc6, 0xe4, 0xa8, 0x28, 0xd4, 0xe2, 0xe2, 0xfc, 0xf3, 0xc4, 0x27, 0xc4, 0x2b, 0xdb, 0x72, 0xef, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2561 = { .name = "ecdsa_brainpoolp512r1_sha512_2561", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2561_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2561_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2561_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 441 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2562 for ECDSA, tcId is 442 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2562_pubkey[] = { 0x7f, 0x33, 0x27, 0xe3, 0x46, 0x62, 0x27, 0x4a, 0xa1, 0x47, 0x95, 0x3a, 0x00, 0x7f, 0x30, 0xc2, 0xee, 0x1b, 0x06, 0xd7, 0xbb, 0x05, 0x3e, 0x8c, 0xe1, 0xc9, 0xb6, 0x83, 0xf0, 0xf4, 0x65, 0x63, 0xdd, 0x38, 0xdb, 0x07, 0x1d, 0x87, 0x43, 0x3b, 0x30, 0x38, 0x04, 0x34, 0xc9, 0x2e, 0x8c, 0xb7, 0x6d, 0x60, 0x3d, 0x19, 0x36, 0xfb, 0xa1, 0xe9, 0x31, 0x7a, 0x06, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x52, 0xca, 0x47, 0x8f, 0x03, 0x67, 0xab, 0x24, 0x85, 0x7e, 0x78, 0x85, 0x76, 0xf1, 0x7b, 0xfc, 0xd0, 0x5e, 0x62, 0xd2, 0x0d, 0x0f, 0xbe, 0xfd, 0x1b, 0x2d, 0x95, 0x4b, 0x99, 0x6e, 0xab, 0xa6, 0x78, 0x19, 0x02, 0x36, 0x35, 0xe3, 0x14, 0x83, 0xf5, 0xb0, 0x25, 0x7f, 0x89, 0xb4, 0x6a, 0x1d, 0x2b, 0x9c, 0xb2, 0x42, 0x0e, 0x1c, 0xdb, 0x94, 0x0c, 0xea, 0xff, 0x54, 0x29, 0xdd, 0x80, 0x13, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2562_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2562_sig[] = { 0x73, 0x96, 0x7e, 0xb2, 0x4e, 0x20, 0xf0, 0xd4, 0xba, 0x58, 0x89, 0x5a, 0x49, 0xf8, 0x12, 0xc2, 0x8d, 0x24, 0xe5, 0xf0, 0xfd, 0x5e, 0x35, 0xf1, 0x07, 0x58, 0x10, 0xa4, 0x78, 0xd9, 0x37, 0x17, 0xc8, 0xaa, 0x26, 0x05, 0xac, 0x84, 0x22, 0x6d, 0xd3, 0xd5, 0x3c, 0x39, 0xc0, 0xd8, 0xc5, 0x2e, 0xea, 0xc8, 0xe9, 0x98, 0xba, 0xd9, 0x31, 0xf5, 0xef, 0xdd, 0x66, 0x4b, 0x57, 0xce, 0xe5, 0x55, 0x05, 0xb0, 0x03, 0x1f, 0xb1, 0x0d, 0xfc, 0x7c, 0x36, 0xed, 0x89, 0xaa, 0xfe, 0x66, 0x44, 0x48, 0x35, 0xcd, 0x9c, 0x53, 0xe1, 0xc8, 0x50, 0xaf, 0x5f, 0x05, 0x5e, 0x2b, 0x26, 0x3d, 0x3e, 0x73, 0x7a, 0x4e, 0x6a, 0x83, 0xca, 0xdb, 0x9d, 0x76, 0xdd, 0xe5, 0x35, 0xe8, 0x09, 0xf4, 0x47, 0x45, 0x53, 0x24, 0xd4, 0xae, 0xe6, 0xf0, 0x36, 0x48, 0x5d, 0x41, 0x67, 0xa6, 0xe6, 0x0e, 0xed, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2562 = { .name = "ecdsa_brainpoolp512r1_sha512_2562", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2562_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2562_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2562_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 442 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2563 for ECDSA, tcId is 443 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2563_pubkey[] = { 0x7f, 0x33, 0x27, 0xe3, 0x46, 0x62, 0x27, 0x4a, 0xa1, 0x47, 0x95, 0x3a, 0x00, 0x7f, 0x30, 0xc2, 0xee, 0x1b, 0x06, 0xd7, 0xbb, 0x05, 0x3e, 0x8c, 0xe1, 0xc9, 0xb6, 0x83, 0xf0, 0xf4, 0x65, 0x63, 0xdd, 0x38, 0xdb, 0x07, 0x1d, 0x87, 0x43, 0x3b, 0x30, 0x38, 0x04, 0x34, 0xc9, 0x2e, 0x8c, 0xb7, 0x6d, 0x60, 0x3d, 0x19, 0x36, 0xfb, 0xa1, 0xe9, 0x31, 0x7a, 0x06, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x52, 0xca, 0x47, 0x8f, 0x03, 0x67, 0xab, 0x24, 0x85, 0x7e, 0x78, 0x85, 0x76, 0xf1, 0x7b, 0xfc, 0xd0, 0x5e, 0x62, 0xd2, 0x0d, 0x0f, 0xbe, 0xfd, 0x1b, 0x2d, 0x95, 0x4b, 0x99, 0x6e, 0xab, 0xa6, 0x78, 0x19, 0x02, 0x36, 0x35, 0xe3, 0x14, 0x83, 0xf5, 0xb0, 0x25, 0x7f, 0x89, 0xb4, 0x6a, 0x1d, 0x2b, 0x9c, 0xb2, 0x42, 0x0e, 0x1c, 0xdb, 0x94, 0x0c, 0xea, 0xff, 0x54, 0x29, 0xdd, 0x80, 0x13, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2563_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2563_sig[] = { 0x63, 0x3f, 0x45, 0x69, 0x14, 0x70, 0x79, 0x23, 0xf4, 0xb0, 0x08, 0x6e, 0xa3, 0x18, 0xb8, 0xce, 0xbd, 0xba, 0x5f, 0xa1, 0x43, 0x52, 0xe3, 0xd9, 0xc6, 0x06, 0xbd, 0x8d, 0xab, 0xf0, 0x32, 0x83, 0x5b, 0xbd, 0xa7, 0x6a, 0xa5, 0x14, 0xc1, 0xa6, 0xdd, 0xe1, 0xb3, 0x21, 0x80, 0x3d, 0x27, 0xf2, 0x53, 0xdf, 0xe1, 0xca, 0xe5, 0x32, 0xa5, 0xbd, 0xcd, 0x9e, 0x93, 0xe5, 0xf9, 0x45, 0x96, 0xd1, 0x9b, 0x9c, 0x8b, 0xa0, 0x74, 0xde, 0xeb, 0x03, 0x74, 0x5d, 0x8a, 0xe3, 0x7c, 0x73, 0xe0, 0x22, 0x73, 0x07, 0x1a, 0x35, 0xdc, 0xfe, 0x0f, 0x65, 0xe4, 0x63, 0xe2, 0x08, 0xbd, 0x11, 0xc6, 0xcc, 0xb3, 0xad, 0xed, 0x6b, 0xe7, 0x31, 0x3d, 0x7a, 0x65, 0x6d, 0x5e, 0x87, 0x1b, 0x8e, 0xa4, 0xd1, 0xd5, 0x1b, 0x77, 0x84, 0x67, 0xb6, 0xdd, 0xe6, 0x57, 0x8e, 0x10, 0x5d, 0x56, 0xb6, 0x17, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2563 = { .name = "ecdsa_brainpoolp512r1_sha512_2563", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2563_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2563_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2563_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 443 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2564 for ECDSA, tcId is 444 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2564_pubkey[] = { 0x7f, 0x33, 0x27, 0xe3, 0x46, 0x62, 0x27, 0x4a, 0xa1, 0x47, 0x95, 0x3a, 0x00, 0x7f, 0x30, 0xc2, 0xee, 0x1b, 0x06, 0xd7, 0xbb, 0x05, 0x3e, 0x8c, 0xe1, 0xc9, 0xb6, 0x83, 0xf0, 0xf4, 0x65, 0x63, 0xdd, 0x38, 0xdb, 0x07, 0x1d, 0x87, 0x43, 0x3b, 0x30, 0x38, 0x04, 0x34, 0xc9, 0x2e, 0x8c, 0xb7, 0x6d, 0x60, 0x3d, 0x19, 0x36, 0xfb, 0xa1, 0xe9, 0x31, 0x7a, 0x06, 0xe2, 0x00, 0x00, 0x00, 0x00, 0x52, 0xca, 0x47, 0x8f, 0x03, 0x67, 0xab, 0x24, 0x85, 0x7e, 0x78, 0x85, 0x76, 0xf1, 0x7b, 0xfc, 0xd0, 0x5e, 0x62, 0xd2, 0x0d, 0x0f, 0xbe, 0xfd, 0x1b, 0x2d, 0x95, 0x4b, 0x99, 0x6e, 0xab, 0xa6, 0x78, 0x19, 0x02, 0x36, 0x35, 0xe3, 0x14, 0x83, 0xf5, 0xb0, 0x25, 0x7f, 0x89, 0xb4, 0x6a, 0x1d, 0x2b, 0x9c, 0xb2, 0x42, 0x0e, 0x1c, 0xdb, 0x94, 0x0c, 0xea, 0xff, 0x54, 0x29, 0xdd, 0x80, 0x13, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2564_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2564_sig[] = { 0x40, 0x89, 0x1a, 0x57, 0xb9, 0xb8, 0xf0, 0xbc, 0x6a, 0x87, 0x61, 0xd2, 0x42, 0x4c, 0xb6, 0x0b, 0x3f, 0x39, 0xde, 0x4e, 0x60, 0x1b, 0xc8, 0xda, 0xf1, 0x5a, 0xb3, 0x21, 0x6c, 0x2c, 0x56, 0xeb, 0xcc, 0x76, 0x0d, 0xe3, 0x09, 0x07, 0xe8, 0x92, 0x94, 0xaf, 0x58, 0x18, 0xf5, 0xa7, 0x2a, 0x2d, 0xf4, 0x09, 0xbb, 0x69, 0x18, 0xf3, 0xd6, 0xe5, 0x06, 0xce, 0x53, 0x14, 0x60, 0x2e, 0x50, 0xc1, 0x68, 0x62, 0x07, 0x56, 0xee, 0x2a, 0x60, 0x0a, 0x14, 0x67, 0xf2, 0x96, 0x08, 0xea, 0xd0, 0x19, 0xd0, 0xd5, 0x16, 0xb7, 0x9c, 0x8a, 0x75, 0x6f, 0xc5, 0x37, 0xa9, 0xfc, 0x73, 0x46, 0x16, 0xbf, 0xec, 0x13, 0x38, 0x39, 0xbe, 0xb4, 0x77, 0x8f, 0xdf, 0xfd, 0x3f, 0xb4, 0x22, 0x6e, 0x51, 0xce, 0x4b, 0xc0, 0x96, 0x27, 0x33, 0x1c, 0x8d, 0xae, 0xf1, 0xf7, 0x11, 0x64, 0x8a, 0x30, 0xfb, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2564 = { .name = "ecdsa_brainpoolp512r1_sha512_2564", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2564_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2564_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2564_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 444 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2565 for ECDSA, tcId is 445 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2565_pubkey[] = { 0x12, 0x48, 0x2f, 0x15, 0x8e, 0x62, 0xe8, 0x34, 0x67, 0x29, 0x7b, 0x4e, 0xda, 0xd9, 0x30, 0xad, 0x31, 0x90, 0x48, 0x28, 0x3f, 0x09, 0x49, 0x30, 0x06, 0x05, 0xa4, 0xa2, 0xd1, 0x9f, 0x72, 0xf9, 0x24, 0xd4, 0x1e, 0x1c, 0xc3, 0xad, 0x2c, 0x24, 0x65, 0x74, 0xf4, 0xa0, 0xeb, 0x63, 0x7c, 0xdd, 0x38, 0x6c, 0x1e, 0xbf, 0x4a, 0x00, 0x70, 0x7b, 0x71, 0xa6, 0x46, 0xdc, 0xff, 0xff, 0xff, 0xff, 0x18, 0xd8, 0x51, 0xef, 0x92, 0x83, 0x5f, 0x7b, 0xe9, 0x2a, 0x25, 0xb9, 0x88, 0xae, 0x8d, 0x5f, 0x7e, 0xd4, 0x2f, 0x31, 0x2f, 0x7c, 0x89, 0x68, 0x50, 0xa5, 0x89, 0xf7, 0xbb, 0x75, 0x00, 0x33, 0x0d, 0x13, 0x8c, 0xc2, 0x0d, 0xc5, 0x63, 0x0a, 0x7d, 0x52, 0x59, 0x26, 0xe8, 0xf7, 0x17, 0x63, 0x5e, 0xe7, 0x29, 0x37, 0x03, 0x57, 0x36, 0xac, 0xe8, 0x8f, 0x0c, 0x49, 0x1f, 0x31, 0x93, 0x0d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2565_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2565_sig[] = { 0x4d, 0xeb, 0xd0, 0x68, 0x30, 0x28, 0xf2, 0x33, 0x5b, 0x23, 0x3c, 0x49, 0x53, 0x1b, 0x60, 0x96, 0xe7, 0xc5, 0x52, 0x1f, 0x75, 0xfc, 0xb4, 0xb5, 0xf5, 0xe3, 0x22, 0x41, 0xbe, 0x08, 0x1f, 0x3c, 0x2b, 0x85, 0x49, 0xb5, 0x7f, 0x31, 0x21, 0x7b, 0xe9, 0xb7, 0xaa, 0x1a, 0x46, 0x87, 0xa7, 0x2e, 0xc9, 0xa5, 0xd3, 0x76, 0x30, 0x72, 0x52, 0xca, 0x7c, 0x1b, 0x9b, 0x61, 0x0d, 0x25, 0xb4, 0xd0, 0x04, 0xd1, 0x30, 0x3f, 0x6b, 0x91, 0xac, 0x01, 0xc9, 0x14, 0x11, 0xa9, 0x83, 0xf3, 0xab, 0xb0, 0x4f, 0x36, 0x98, 0xb1, 0x69, 0xf8, 0xa3, 0x9f, 0xfd, 0x19, 0x31, 0xc0, 0x61, 0xe6, 0x6f, 0x43, 0x48, 0x2f, 0xec, 0x79, 0x5d, 0xfd, 0x0d, 0x0a, 0xbe, 0x87, 0x9f, 0xa8, 0xdb, 0x88, 0x5b, 0x61, 0x8a, 0xca, 0x2a, 0xe0, 0x13, 0xe6, 0x93, 0xf1, 0x54, 0xbb, 0x9d, 0x0a, 0x77, 0xad, 0xef, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2565 = { .name = "ecdsa_brainpoolp512r1_sha512_2565", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2565_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2565_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2565_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 445 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2566 for ECDSA, tcId is 446 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2566_pubkey[] = { 0x12, 0x48, 0x2f, 0x15, 0x8e, 0x62, 0xe8, 0x34, 0x67, 0x29, 0x7b, 0x4e, 0xda, 0xd9, 0x30, 0xad, 0x31, 0x90, 0x48, 0x28, 0x3f, 0x09, 0x49, 0x30, 0x06, 0x05, 0xa4, 0xa2, 0xd1, 0x9f, 0x72, 0xf9, 0x24, 0xd4, 0x1e, 0x1c, 0xc3, 0xad, 0x2c, 0x24, 0x65, 0x74, 0xf4, 0xa0, 0xeb, 0x63, 0x7c, 0xdd, 0x38, 0x6c, 0x1e, 0xbf, 0x4a, 0x00, 0x70, 0x7b, 0x71, 0xa6, 0x46, 0xdc, 0xff, 0xff, 0xff, 0xff, 0x18, 0xd8, 0x51, 0xef, 0x92, 0x83, 0x5f, 0x7b, 0xe9, 0x2a, 0x25, 0xb9, 0x88, 0xae, 0x8d, 0x5f, 0x7e, 0xd4, 0x2f, 0x31, 0x2f, 0x7c, 0x89, 0x68, 0x50, 0xa5, 0x89, 0xf7, 0xbb, 0x75, 0x00, 0x33, 0x0d, 0x13, 0x8c, 0xc2, 0x0d, 0xc5, 0x63, 0x0a, 0x7d, 0x52, 0x59, 0x26, 0xe8, 0xf7, 0x17, 0x63, 0x5e, 0xe7, 0x29, 0x37, 0x03, 0x57, 0x36, 0xac, 0xe8, 0x8f, 0x0c, 0x49, 0x1f, 0x31, 0x93, 0x0d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2566_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2566_sig[] = { 0x34, 0xac, 0x9a, 0x4e, 0x6f, 0xb1, 0x71, 0xf4, 0x24, 0xbb, 0x59, 0x2d, 0x1b, 0x84, 0x5b, 0xee, 0x55, 0x17, 0x3b, 0x42, 0x42, 0x2f, 0xd5, 0xb5, 0x13, 0x2f, 0x85, 0x9a, 0x27, 0xdd, 0xcd, 0xa5, 0x53, 0x2f, 0xd3, 0x81, 0x16, 0xe6, 0x27, 0x7d, 0x93, 0x75, 0x63, 0x9f, 0xb2, 0x5b, 0x0f, 0x66, 0xf1, 0xe8, 0xa1, 0xac, 0xca, 0xa7, 0x80, 0x0c, 0x91, 0xc8, 0x7e, 0x74, 0x39, 0x98, 0x7d, 0x58, 0x75, 0x89, 0x2b, 0xe8, 0xe1, 0x1d, 0x9b, 0xf3, 0xe8, 0x1e, 0x83, 0x70, 0xaf, 0x02, 0xd8, 0x8b, 0xda, 0x83, 0xce, 0x0a, 0xe9, 0xc2, 0x1a, 0xeb, 0x48, 0x7e, 0xef, 0x4c, 0x4c, 0x54, 0x58, 0xe5, 0x1a, 0x99, 0xe4, 0xd7, 0x88, 0xdb, 0x84, 0x06, 0x4c, 0xfb, 0xc4, 0x82, 0x40, 0xf5, 0x66, 0x12, 0x07, 0x87, 0x69, 0xfd, 0xe0, 0xe3, 0xb7, 0x06, 0x12, 0x5f, 0x46, 0xe2, 0xf2, 0x6a, 0x35, 0x08, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2566 = { .name = "ecdsa_brainpoolp512r1_sha512_2566", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2566_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2566_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2566_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 446 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2567 for ECDSA, tcId is 447 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2567_pubkey[] = { 0x12, 0x48, 0x2f, 0x15, 0x8e, 0x62, 0xe8, 0x34, 0x67, 0x29, 0x7b, 0x4e, 0xda, 0xd9, 0x30, 0xad, 0x31, 0x90, 0x48, 0x28, 0x3f, 0x09, 0x49, 0x30, 0x06, 0x05, 0xa4, 0xa2, 0xd1, 0x9f, 0x72, 0xf9, 0x24, 0xd4, 0x1e, 0x1c, 0xc3, 0xad, 0x2c, 0x24, 0x65, 0x74, 0xf4, 0xa0, 0xeb, 0x63, 0x7c, 0xdd, 0x38, 0x6c, 0x1e, 0xbf, 0x4a, 0x00, 0x70, 0x7b, 0x71, 0xa6, 0x46, 0xdc, 0xff, 0xff, 0xff, 0xff, 0x18, 0xd8, 0x51, 0xef, 0x92, 0x83, 0x5f, 0x7b, 0xe9, 0x2a, 0x25, 0xb9, 0x88, 0xae, 0x8d, 0x5f, 0x7e, 0xd4, 0x2f, 0x31, 0x2f, 0x7c, 0x89, 0x68, 0x50, 0xa5, 0x89, 0xf7, 0xbb, 0x75, 0x00, 0x33, 0x0d, 0x13, 0x8c, 0xc2, 0x0d, 0xc5, 0x63, 0x0a, 0x7d, 0x52, 0x59, 0x26, 0xe8, 0xf7, 0x17, 0x63, 0x5e, 0xe7, 0x29, 0x37, 0x03, 0x57, 0x36, 0xac, 0xe8, 0x8f, 0x0c, 0x49, 0x1f, 0x31, 0x93, 0x0d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2567_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2567_sig[] = { 0x36, 0xb6, 0x8b, 0x5c, 0xad, 0x74, 0x28, 0x80, 0x3f, 0x60, 0x66, 0x15, 0x50, 0x58, 0x57, 0xaa, 0x7c, 0xfb, 0x68, 0x3d, 0x1e, 0x9c, 0xe8, 0x56, 0xd4, 0x99, 0xfa, 0x6e, 0x13, 0xee, 0x6a, 0x4f, 0x23, 0x5e, 0xdd, 0x00, 0x40, 0x34, 0x29, 0xff, 0x14, 0xbc, 0x57, 0x8d, 0xd1, 0x21, 0xfd, 0x25, 0x60, 0x04, 0x79, 0x4a, 0xdd, 0x4f, 0xb8, 0x19, 0x5b, 0x43, 0xa9, 0xe1, 0xee, 0xfb, 0xd3, 0xa1, 0x45, 0xc6, 0xaf, 0xfd, 0x60, 0x7f, 0x54, 0x24, 0xa0, 0xe4, 0x9c, 0x0f, 0x1a, 0x72, 0xeb, 0xf7, 0x94, 0x8a, 0x80, 0xb4, 0x82, 0xef, 0x17, 0x1e, 0xe1, 0x61, 0xdc, 0x36, 0x51, 0x56, 0x79, 0xe3, 0x2f, 0xa9, 0xed, 0xaa, 0x92, 0xc5, 0x74, 0x03, 0xe6, 0xe1, 0x02, 0x64, 0x3b, 0x77, 0x39, 0x1a, 0xed, 0xee, 0xc2, 0xb0, 0x54, 0x96, 0x43, 0x15, 0xde, 0xdd, 0x4c, 0xc3, 0x69, 0xf2, 0x3f, 0x03, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2567 = { .name = "ecdsa_brainpoolp512r1_sha512_2567", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2567_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2567_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2567_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 447 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2568 for ECDSA, tcId is 448 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2568_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x37, 0xf7, 0x89, 0x18, 0x50, 0x6e, 0xa9, 0xcc, 0x14, 0xf1, 0x49, 0x2e, 0xb6, 0x6c, 0x9e, 0x1c, 0x4e, 0x27, 0xf3, 0xcb, 0x00, 0xbb, 0x51, 0x1d, 0x5d, 0xfd, 0xbe, 0xa6, 0xf8, 0x17, 0xa8, 0x7b, 0xfd, 0x81, 0xde, 0x29, 0x55, 0xfa, 0x03, 0x2f, 0x52, 0x87, 0x3f, 0x79, 0x91, 0x69, 0xcc, 0x44, 0x5c, 0xb0, 0x39, 0x1e, 0x46, 0xe5, 0x71, 0x79, 0xef, 0x84, 0xd5, 0x0c, 0x85, 0xdb, 0x5c, 0x97, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2568_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2568_sig[] = { 0x5e, 0x1b, 0xf4, 0xb1, 0xde, 0xba, 0xcb, 0xa4, 0x72, 0x5f, 0xc3, 0xcc, 0x82, 0x14, 0x53, 0x4d, 0xe5, 0xf6, 0xe5, 0x92, 0x64, 0x5b, 0x60, 0xf4, 0xc4, 0xa1, 0xdd, 0x22, 0x60, 0xd3, 0x35, 0x7d, 0x8f, 0xb2, 0xad, 0xa7, 0xf7, 0x2a, 0x48, 0x34, 0x6a, 0x7e, 0x34, 0x39, 0x5a, 0x6a, 0x18, 0x1c, 0x69, 0x40, 0x48, 0xae, 0x82, 0x58, 0xf1, 0xcb, 0x3b, 0x6f, 0x63, 0xf4, 0x93, 0x28, 0x29, 0xeb, 0x5e, 0x3d, 0xf0, 0xbe, 0xee, 0x22, 0xfa, 0x96, 0xd4, 0x65, 0x58, 0x33, 0x86, 0x2f, 0x73, 0xb5, 0x2f, 0x12, 0xe4, 0xc4, 0xc7, 0xd8, 0x18, 0xb2, 0x18, 0x46, 0xef, 0xfb, 0x39, 0xd6, 0xf0, 0x9f, 0xc3, 0x5b, 0x2d, 0x0f, 0xac, 0x8f, 0x5c, 0xb3, 0xc4, 0x05, 0x1f, 0xf4, 0x5f, 0x53, 0x05, 0xe9, 0x3b, 0x24, 0x13, 0x8a, 0x0f, 0x95, 0xfa, 0xd2, 0xfe, 0xf1, 0xc1, 0x0c, 0xd1, 0xdc, 0xf2, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2568 = { .name = "ecdsa_brainpoolp512r1_sha512_2568", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2568_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2568_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2568_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP512t1, tcId is 448 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2569 for ECDSA, tcId is 449 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2569_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x37, 0xf7, 0x89, 0x18, 0x50, 0x6e, 0xa9, 0xcc, 0x14, 0xf1, 0x49, 0x2e, 0xb6, 0x6c, 0x9e, 0x1c, 0x4e, 0x27, 0xf3, 0xcb, 0x00, 0xbb, 0x51, 0x1d, 0x5d, 0xfd, 0xbe, 0xa6, 0xf8, 0x17, 0xa8, 0x7b, 0xfd, 0x81, 0xde, 0x29, 0x55, 0xfa, 0x03, 0x2f, 0x52, 0x87, 0x3f, 0x79, 0x91, 0x69, 0xcc, 0x44, 0x5c, 0xb0, 0x39, 0x1e, 0x46, 0xe5, 0x71, 0x79, 0xef, 0x84, 0xd5, 0x0c, 0x85, 0xdb, 0x5c, 0x97, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2569_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2569_sig[] = { 0x80, 0x40, 0x0b, 0xee, 0x9a, 0x34, 0x2f, 0x3a, 0xfb, 0xa2, 0xdb, 0xb0, 0x29, 0x23, 0x5a, 0xd5, 0x11, 0xae, 0xdb, 0x30, 0x96, 0x0c, 0x53, 0xba, 0xd6, 0x70, 0x46, 0x0b, 0x38, 0x30, 0x4d, 0x7c, 0xbd, 0x70, 0x6f, 0xf9, 0x8f, 0x12, 0x96, 0xcb, 0x7e, 0x74, 0x6f, 0x8c, 0xa3, 0xa4, 0x39, 0x37, 0xa5, 0xcd, 0x03, 0x5a, 0x00, 0xc6, 0x38, 0x68, 0x00, 0x1f, 0xa4, 0x29, 0xb4, 0x91, 0xbd, 0x8e, 0x5c, 0x66, 0x94, 0x1e, 0xdc, 0xda, 0x56, 0x22, 0x8e, 0xdc, 0xe7, 0x73, 0x73, 0xa7, 0xb9, 0xdc, 0xdd, 0x46, 0x4e, 0xd1, 0x80, 0x75, 0xe7, 0xda, 0x14, 0x27, 0x91, 0x17, 0x78, 0x78, 0x4f, 0x80, 0x17, 0xbe, 0xf6, 0xf1, 0x87, 0x51, 0xcb, 0xa1, 0x23, 0x55, 0xbd, 0x90, 0xba, 0x63, 0xb8, 0xd3, 0x1e, 0xa3, 0x73, 0x38, 0x7f, 0x36, 0x49, 0x4e, 0x36, 0x42, 0x00, 0x80, 0x82, 0xd3, 0x49, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2569 = { .name = "ecdsa_brainpoolp512r1_sha512_2569", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2569_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2569_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2569_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP512t1, tcId is 449 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2570 for ECDSA, tcId is 450 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2570_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x37, 0xf7, 0x89, 0x18, 0x50, 0x6e, 0xa9, 0xcc, 0x14, 0xf1, 0x49, 0x2e, 0xb6, 0x6c, 0x9e, 0x1c, 0x4e, 0x27, 0xf3, 0xcb, 0x00, 0xbb, 0x51, 0x1d, 0x5d, 0xfd, 0xbe, 0xa6, 0xf8, 0x17, 0xa8, 0x7b, 0xfd, 0x81, 0xde, 0x29, 0x55, 0xfa, 0x03, 0x2f, 0x52, 0x87, 0x3f, 0x79, 0x91, 0x69, 0xcc, 0x44, 0x5c, 0xb0, 0x39, 0x1e, 0x46, 0xe5, 0x71, 0x79, 0xef, 0x84, 0xd5, 0x0c, 0x85, 0xdb, 0x5c, 0x97, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2570_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2570_sig[] = { 0x47, 0x68, 0xdf, 0xdd, 0xae, 0x4c, 0xb8, 0x35, 0x66, 0xf2, 0xc3, 0xa9, 0x34, 0x00, 0x91, 0xc2, 0x60, 0x8e, 0x0e, 0x27, 0x0a, 0x4b, 0x3f, 0x48, 0xde, 0xd7, 0xc7, 0x5b, 0x4a, 0xa1, 0x5a, 0xb6, 0x5c, 0xb0, 0x50, 0xcf, 0xdb, 0x31, 0x2c, 0x32, 0xbf, 0xaa, 0x77, 0x59, 0x86, 0x9c, 0x9c, 0x0c, 0xe2, 0x7f, 0x6c, 0xdf, 0x1f, 0xb5, 0x84, 0x37, 0x9f, 0x63, 0x98, 0xc9, 0x5e, 0xbf, 0x86, 0x44, 0x7e, 0x1a, 0x3a, 0xac, 0xd8, 0xd6, 0x03, 0xfa, 0xec, 0xf8, 0x79, 0x02, 0x14, 0x7b, 0x67, 0x43, 0x5d, 0x99, 0x2e, 0xe9, 0xe5, 0x43, 0xf9, 0x34, 0xdd, 0x4c, 0x40, 0xd8, 0xa1, 0x2c, 0xd1, 0xe1, 0x03, 0x66, 0xd0, 0x74, 0x3d, 0x78, 0x62, 0xb9, 0xc8, 0xba, 0x8b, 0x68, 0x16, 0x63, 0x9c, 0x35, 0x09, 0xb5, 0xca, 0xa2, 0xa9, 0x15, 0x33, 0xc0, 0xaf, 0x50, 0xec, 0xe2, 0xfd, 0x2c, 0x53, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2570 = { .name = "ecdsa_brainpoolp512r1_sha512_2570", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2570_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2570_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2570_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is small on brainpoolP512t1, tcId is 450 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2571 for ECDSA, tcId is 451 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2571_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x72, 0xe6, 0x14, 0xa0, 0x8b, 0x7b, 0x1a, 0xbf, 0x2a, 0xe3, 0x9d, 0x7f, 0x7d, 0x5d, 0x5d, 0xeb, 0x7d, 0x08, 0x99, 0xe8, 0xb3, 0x0e, 0x80, 0xf1, 0x78, 0x65, 0xde, 0x23, 0x78, 0x1b, 0x5f, 0xf5, 0x7f, 0xcb, 0xbc, 0xd7, 0x45, 0xcc, 0x65, 0x13, 0x5c, 0x46, 0x61, 0xb1, 0x55, 0x39, 0xb4, 0xa1, 0xcb, 0xd1, 0xc6, 0x10, 0xe6, 0x9d, 0x55, 0x0b, 0x39, 0x25, 0x8b, 0x49, 0xd2, 0x5e, 0xec, 0x5c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2571_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2571_sig[] = { 0x27, 0xd9, 0xc6, 0xc4, 0xdb, 0x31, 0xaf, 0xf2, 0x88, 0xfa, 0x4e, 0x40, 0x15, 0x9d, 0x6e, 0xe1, 0x8c, 0x98, 0x13, 0x94, 0x27, 0x48, 0x47, 0x96, 0xf1, 0xf8, 0x74, 0x5c, 0x98, 0x27, 0xdf, 0xc0, 0x8d, 0x39, 0x3a, 0xbe, 0x14, 0x4d, 0xf6, 0xb7, 0xc1, 0x2d, 0x48, 0x97, 0x1f, 0xdd, 0x28, 0x4b, 0x81, 0xe6, 0xe1, 0x08, 0x60, 0x35, 0x9e, 0xf7, 0x14, 0x73, 0xb9, 0xe6, 0xbb, 0x84, 0xcb, 0x1e, 0x07, 0xa0, 0x42, 0x0c, 0x8a, 0x9b, 0x26, 0x91, 0x1b, 0x63, 0x62, 0x65, 0x40, 0xa8, 0x5f, 0x60, 0xaa, 0x27, 0x7a, 0xfd, 0xef, 0x99, 0x90, 0xfc, 0x8d, 0xc1, 0xd3, 0xf1, 0xf2, 0xc5, 0xa9, 0x27, 0xe1, 0xe4, 0xa2, 0x9d, 0x81, 0xa7, 0x01, 0xb4, 0x8b, 0x36, 0x6f, 0x00, 0x0f, 0x96, 0x26, 0x14, 0x89, 0x9c, 0xbf, 0x19, 0x38, 0x26, 0xca, 0x8d, 0xe4, 0xa4, 0x25, 0x53, 0x8d, 0xe5, 0xac, 0x62, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2571 = { .name = "ecdsa_brainpoolp512r1_sha512_2571", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2571_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2571_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2571_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP512t1, tcId is 451 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2572 for ECDSA, tcId is 452 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2572_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x72, 0xe6, 0x14, 0xa0, 0x8b, 0x7b, 0x1a, 0xbf, 0x2a, 0xe3, 0x9d, 0x7f, 0x7d, 0x5d, 0x5d, 0xeb, 0x7d, 0x08, 0x99, 0xe8, 0xb3, 0x0e, 0x80, 0xf1, 0x78, 0x65, 0xde, 0x23, 0x78, 0x1b, 0x5f, 0xf5, 0x7f, 0xcb, 0xbc, 0xd7, 0x45, 0xcc, 0x65, 0x13, 0x5c, 0x46, 0x61, 0xb1, 0x55, 0x39, 0xb4, 0xa1, 0xcb, 0xd1, 0xc6, 0x10, 0xe6, 0x9d, 0x55, 0x0b, 0x39, 0x25, 0x8b, 0x49, 0xd2, 0x5e, 0xec, 0x5c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2572_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2572_sig[] = { 0x49, 0x54, 0x2e, 0xec, 0x3b, 0x96, 0xc4, 0x76, 0xb5, 0x9b, 0x2b, 0x94, 0xd5, 0xfc, 0x7e, 0xe0, 0x8f, 0xd2, 0xa1, 0xb1, 0xe7, 0x32, 0xe6, 0x60, 0x90, 0x98, 0xab, 0x2a, 0x7f, 0x25, 0x04, 0x52, 0xfb, 0xc1, 0x05, 0x7a, 0x6d, 0x3f, 0xec, 0xcb, 0xca, 0xeb, 0x00, 0x46, 0x8b, 0x26, 0x22, 0x2e, 0xb4, 0x80, 0x65, 0xfc, 0xaa, 0xd7, 0x64, 0x76, 0x81, 0x82, 0x38, 0x60, 0x45, 0x1e, 0x1e, 0x91, 0x37, 0xdb, 0x33, 0x6d, 0xee, 0x1e, 0x45, 0xd9, 0xac, 0xe5, 0x50, 0x05, 0x35, 0x11, 0xc9, 0xc3, 0x75, 0x56, 0x57, 0xe7, 0x8e, 0xca, 0x10, 0x8d, 0x3d, 0xfd, 0x1e, 0x68, 0xfe, 0x83, 0xda, 0x62, 0x6b, 0x8d, 0xac, 0xbb, 0x19, 0xf0, 0xee, 0x23, 0x2b, 0x0f, 0x8b, 0xfe, 0x8d, 0xdb, 0xe7, 0xd5, 0xe9, 0x8b, 0x7a, 0x2e, 0xcc, 0xd0, 0x3f, 0x37, 0x5d, 0x16, 0x4c, 0xe8, 0x28, 0x63, 0x18, 0x96, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2572 = { .name = "ecdsa_brainpoolp512r1_sha512_2572", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2572_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2572_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2572_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP512t1, tcId is 452 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2573 for ECDSA, tcId is 453 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2573_pubkey[] = { 0x72, 0x7e, 0x75, 0xd6, 0x3d, 0xce, 0xb1, 0xa8, 0x4a, 0x71, 0x06, 0xd8, 0x02, 0xe8, 0xeb, 0x34, 0xa2, 0x04, 0xbc, 0x05, 0x35, 0x35, 0x67, 0xa2, 0x3b, 0xa8, 0xb6, 0xf5, 0x4e, 0x50, 0xd2, 0xd8, 0x22, 0x1c, 0x87, 0xfd, 0x8e, 0x52, 0x38, 0xa3, 0x37, 0x4d, 0xf9, 0x58, 0xb3, 0xcf, 0x3e, 0x3f, 0x38, 0xc6, 0x18, 0xc1, 0xcc, 0x8c, 0x5b, 0x95, 0x74, 0xb5, 0x0e, 0x40, 0x5d, 0x69, 0x12, 0x18, 0x72, 0xe6, 0x14, 0xa0, 0x8b, 0x7b, 0x1a, 0xbf, 0x2a, 0xe3, 0x9d, 0x7f, 0x7d, 0x5d, 0x5d, 0xeb, 0x7d, 0x08, 0x99, 0xe8, 0xb3, 0x0e, 0x80, 0xf1, 0x78, 0x65, 0xde, 0x23, 0x78, 0x1b, 0x5f, 0xf5, 0x7f, 0xcb, 0xbc, 0xd7, 0x45, 0xcc, 0x65, 0x13, 0x5c, 0x46, 0x61, 0xb1, 0x55, 0x39, 0xb4, 0xa1, 0xcb, 0xd1, 0xc6, 0x10, 0xe6, 0x9d, 0x55, 0x0b, 0x39, 0x25, 0x8b, 0x49, 0xd2, 0x5e, 0xec, 0x5c, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2573_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2573_sig[] = { 0x4f, 0x90, 0xce, 0xb7, 0x6b, 0xc7, 0x2f, 0x0c, 0xca, 0x10, 0x70, 0x5d, 0x3b, 0xad, 0xab, 0x6c, 0xaa, 0x60, 0x19, 0xef, 0x6b, 0xfe, 0x7d, 0xe1, 0xb7, 0x59, 0x51, 0xd5, 0x17, 0xd2, 0xb1, 0x61, 0x68, 0x51, 0x5b, 0xf3, 0x05, 0xf0, 0x00, 0x62, 0x92, 0xe4, 0x90, 0x05, 0x98, 0x25, 0x61, 0x41, 0xe4, 0x5c, 0x19, 0x07, 0x7f, 0xa4, 0x47, 0xdd, 0x5f, 0x32, 0xda, 0xa6, 0x2c, 0x25, 0x08, 0x15, 0x67, 0x12, 0xa7, 0x84, 0x10, 0x28, 0x02, 0x82, 0x1e, 0x97, 0x08, 0xe3, 0x49, 0xd0, 0x3a, 0x88, 0x29, 0x7b, 0x37, 0x4e, 0xf8, 0x1a, 0x4e, 0xdc, 0x35, 0x01, 0x65, 0x24, 0xcd, 0x2a, 0x22, 0xaf, 0xea, 0x7b, 0x8b, 0x31, 0x71, 0xde, 0x60, 0xac, 0x1b, 0x38, 0x82, 0x53, 0x36, 0x50, 0x58, 0x6d, 0xca, 0xd3, 0x38, 0xea, 0x48, 0x23, 0x14, 0x86, 0xe1, 0x0e, 0x31, 0x20, 0xce, 0x3d, 0x2a, 0x59, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2573 = { .name = "ecdsa_brainpoolp512r1_sha512_2573", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2573_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2573_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2573_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key is large on brainpoolP512t1, tcId is 453 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2574 for ECDSA, tcId is 454 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2574_pubkey[] = { 0x05, 0x18, 0xff, 0x14, 0xba, 0x05, 0x18, 0x8a, 0xbe, 0xd0, 0xa8, 0xc8, 0x8d, 0xb0, 0xf0, 0x97, 0xb5, 0x66, 0x0a, 0xac, 0x57, 0xe9, 0xa3, 0xcd, 0xbb, 0x9c, 0x83, 0x3e, 0x2a, 0x7f, 0x9f, 0x61, 0x3e, 0x49, 0x95, 0x6b, 0x53, 0xa6, 0x35, 0x95, 0x2e, 0x29, 0x81, 0x8e, 0x4a, 0x80, 0x15, 0xcb, 0x6a, 0x15, 0x0c, 0xed, 0xe6, 0x36, 0xc2, 0x55, 0x8f, 0x2d, 0x36, 0x02, 0x48, 0x39, 0x63, 0xb9, 0x9e, 0xd9, 0xfe, 0x84, 0x2f, 0x3e, 0xd4, 0x18, 0x46, 0x2c, 0x63, 0xe2, 0x66, 0x94, 0x4c, 0xa2, 0x74, 0x7e, 0x15, 0xbd, 0x8f, 0x52, 0x84, 0x4d, 0x6a, 0x1c, 0xe9, 0x81, 0x52, 0x10, 0x42, 0x12, 0x06, 0x80, 0x5c, 0x6e, 0xd7, 0x92, 0x35, 0x6e, 0xc5, 0x7d, 0x79, 0xfa, 0x3e, 0x36, 0xff, 0xf2, 0x3e, 0x2f, 0xc6, 0x37, 0x0c, 0x67, 0xbc, 0x51, 0xd3, 0xf8, 0xb5, 0x55, 0xc9, 0x04, 0x8d, 0x6d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2574_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2574_sig[] = { 0x45, 0x9e, 0x3e, 0x6e, 0x67, 0x1a, 0x6c, 0x34, 0x2d, 0x58, 0x5d, 0xb6, 0x89, 0x04, 0x3d, 0x32, 0xa4, 0x94, 0xce, 0x00, 0x39, 0xee, 0x71, 0xac, 0x67, 0xed, 0x6e, 0xc0, 0x86, 0x19, 0x08, 0xeb, 0xae, 0x6b, 0x2d, 0x6e, 0x4a, 0x67, 0xca, 0xa7, 0xa8, 0xf0, 0x57, 0x6a, 0x49, 0x88, 0x9a, 0x4a, 0x63, 0xd4, 0xb0, 0xb8, 0xaa, 0x88, 0x45, 0xc9, 0xcf, 0x78, 0x5b, 0x49, 0x41, 0x2a, 0x70, 0x71, 0xa5, 0xed, 0xd7, 0xab, 0xfc, 0xe9, 0xd4, 0x41, 0x3b, 0x22, 0x28, 0x93, 0x97, 0x78, 0x5b, 0x3d, 0x84, 0xb2, 0xc0, 0xd3, 0x71, 0x94, 0x09, 0x25, 0x5b, 0xb7, 0x12, 0x82, 0x68, 0xe0, 0xbc, 0xd3, 0x7d, 0x92, 0x8b, 0xea, 0x54, 0x86, 0xbf, 0x56, 0xff, 0xe2, 0x59, 0xc7, 0xec, 0x9f, 0x50, 0xb8, 0x78, 0xe0, 0x15, 0x5d, 0x73, 0xe3, 0xbd, 0xe5, 0xcf, 0xfe, 0x55, 0xe6, 0x12, 0xf8, 0xd7, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2574 = { .name = "ecdsa_brainpoolp512r1_sha512_2574", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2574_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2574_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2574_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 454 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2575 for ECDSA, tcId is 455 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2575_pubkey[] = { 0x05, 0x18, 0xff, 0x14, 0xba, 0x05, 0x18, 0x8a, 0xbe, 0xd0, 0xa8, 0xc8, 0x8d, 0xb0, 0xf0, 0x97, 0xb5, 0x66, 0x0a, 0xac, 0x57, 0xe9, 0xa3, 0xcd, 0xbb, 0x9c, 0x83, 0x3e, 0x2a, 0x7f, 0x9f, 0x61, 0x3e, 0x49, 0x95, 0x6b, 0x53, 0xa6, 0x35, 0x95, 0x2e, 0x29, 0x81, 0x8e, 0x4a, 0x80, 0x15, 0xcb, 0x6a, 0x15, 0x0c, 0xed, 0xe6, 0x36, 0xc2, 0x55, 0x8f, 0x2d, 0x36, 0x02, 0x48, 0x39, 0x63, 0xb9, 0x9e, 0xd9, 0xfe, 0x84, 0x2f, 0x3e, 0xd4, 0x18, 0x46, 0x2c, 0x63, 0xe2, 0x66, 0x94, 0x4c, 0xa2, 0x74, 0x7e, 0x15, 0xbd, 0x8f, 0x52, 0x84, 0x4d, 0x6a, 0x1c, 0xe9, 0x81, 0x52, 0x10, 0x42, 0x12, 0x06, 0x80, 0x5c, 0x6e, 0xd7, 0x92, 0x35, 0x6e, 0xc5, 0x7d, 0x79, 0xfa, 0x3e, 0x36, 0xff, 0xf2, 0x3e, 0x2f, 0xc6, 0x37, 0x0c, 0x67, 0xbc, 0x51, 0xd3, 0xf8, 0xb5, 0x55, 0xc9, 0x04, 0x8d, 0x6d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2575_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2575_sig[] = { 0x1b, 0x2f, 0x7e, 0xa4, 0x09, 0x60, 0xe3, 0x7e, 0x28, 0xb5, 0x56, 0xb7, 0xe4, 0x46, 0xc4, 0x64, 0x1e, 0x2f, 0x3d, 0x8a, 0x82, 0x9d, 0xcc, 0x4a, 0x34, 0x95, 0x53, 0xe4, 0x2c, 0xf9, 0xce, 0x62, 0x72, 0xdc, 0x9c, 0xdc, 0xda, 0x01, 0x3e, 0x39, 0x81, 0xcb, 0x73, 0xb1, 0x0d, 0x46, 0x32, 0x1c, 0x80, 0x50, 0x1d, 0x6a, 0x34, 0xad, 0x7f, 0xd9, 0x59, 0xa0, 0xc7, 0x8f, 0x89, 0x1f, 0x33, 0xf0, 0x7f, 0x19, 0x5b, 0x76, 0x96, 0xed, 0xfc, 0x76, 0x87, 0xff, 0x01, 0x26, 0xea, 0xba, 0x13, 0xda, 0xd1, 0xe1, 0x95, 0x63, 0xe8, 0xd3, 0x95, 0xaf, 0x32, 0xdb, 0x3d, 0x6a, 0x7b, 0x4e, 0x82, 0xf2, 0x80, 0x04, 0x50, 0x1d, 0x92, 0xb7, 0x53, 0x7d, 0xa3, 0x97, 0x84, 0x5b, 0x7a, 0xa3, 0x98, 0xa1, 0x10, 0x51, 0x05, 0x2e, 0x52, 0x26, 0x4b, 0xd8, 0xcb, 0xcb, 0xa9, 0x98, 0x7e, 0xc6, 0x74, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2575 = { .name = "ecdsa_brainpoolp512r1_sha512_2575", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2575_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2575_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2575_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 455 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2576 for ECDSA, tcId is 456 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2576_pubkey[] = { 0x05, 0x18, 0xff, 0x14, 0xba, 0x05, 0x18, 0x8a, 0xbe, 0xd0, 0xa8, 0xc8, 0x8d, 0xb0, 0xf0, 0x97, 0xb5, 0x66, 0x0a, 0xac, 0x57, 0xe9, 0xa3, 0xcd, 0xbb, 0x9c, 0x83, 0x3e, 0x2a, 0x7f, 0x9f, 0x61, 0x3e, 0x49, 0x95, 0x6b, 0x53, 0xa6, 0x35, 0x95, 0x2e, 0x29, 0x81, 0x8e, 0x4a, 0x80, 0x15, 0xcb, 0x6a, 0x15, 0x0c, 0xed, 0xe6, 0x36, 0xc2, 0x55, 0x8f, 0x2d, 0x36, 0x02, 0x48, 0x39, 0x63, 0xb9, 0x9e, 0xd9, 0xfe, 0x84, 0x2f, 0x3e, 0xd4, 0x18, 0x46, 0x2c, 0x63, 0xe2, 0x66, 0x94, 0x4c, 0xa2, 0x74, 0x7e, 0x15, 0xbd, 0x8f, 0x52, 0x84, 0x4d, 0x6a, 0x1c, 0xe9, 0x81, 0x52, 0x10, 0x42, 0x12, 0x06, 0x80, 0x5c, 0x6e, 0xd7, 0x92, 0x35, 0x6e, 0xc5, 0x7d, 0x79, 0xfa, 0x3e, 0x36, 0xff, 0xf2, 0x3e, 0x2f, 0xc6, 0x37, 0x0c, 0x67, 0xbc, 0x51, 0xd3, 0xf8, 0xb5, 0x55, 0xc9, 0x04, 0x8d, 0x6d, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2576_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2576_sig[] = { 0x1b, 0x5c, 0x1d, 0x2b, 0x2b, 0x06, 0x59, 0x1a, 0x1f, 0xa5, 0x16, 0xcf, 0xfa, 0x9c, 0x8a, 0x57, 0xcf, 0x1f, 0xff, 0xc2, 0x2c, 0xec, 0xb7, 0x24, 0x92, 0x81, 0x67, 0x0b, 0xc2, 0x38, 0x83, 0xa6, 0x85, 0x53, 0xe0, 0xca, 0xf1, 0xed, 0xd9, 0xf1, 0x70, 0x3a, 0x25, 0xb7, 0x4e, 0x00, 0x00, 0xa3, 0x7e, 0x32, 0xe6, 0xcc, 0x35, 0x76, 0x93, 0x9f, 0x45, 0x8c, 0x3d, 0xd5, 0xc4, 0xdb, 0xcc, 0x9c, 0x4b, 0x23, 0xd7, 0xed, 0x7f, 0x8a, 0x6b, 0x7b, 0xa7, 0xd2, 0x2a, 0xef, 0xa8, 0xfd, 0xe0, 0x30, 0xec, 0xb3, 0xf2, 0xfe, 0xd4, 0xa5, 0xf2, 0x6f, 0x12, 0xd5, 0x9a, 0x29, 0xd6, 0x3c, 0xdd, 0x0e, 0xc0, 0x3f, 0xae, 0x55, 0x7d, 0x14, 0x1c, 0x7b, 0x0e, 0x87, 0x12, 0xc3, 0x06, 0xb0, 0xee, 0xbb, 0xd0, 0xca, 0xb2, 0x76, 0x96, 0x01, 0x20, 0x62, 0x62, 0x2b, 0xb1, 0x80, 0x04, 0x30, 0x34, 0xba, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2576 = { .name = "ecdsa_brainpoolp512r1_sha512_2576", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2576_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2576_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2576_sig, .siglen = 128, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 456 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2577 for ECDSA, tcId is 457 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2577_pubkey[] = { 0x3f, 0x89, 0xe7, 0x87, 0xb4, 0xd5, 0xd2, 0x59, 0x96, 0x24, 0x51, 0x35, 0x30, 0xe7, 0x50, 0xab, 0x3c, 0x59, 0x57, 0xdc, 0x9a, 0xa0, 0xe7, 0xb0, 0x8a, 0x3e, 0x25, 0x35, 0x68, 0x18, 0xe2, 0x03, 0x7d, 0x06, 0x2f, 0x33, 0x6d, 0x4e, 0xed, 0x41, 0x7c, 0x91, 0xbc, 0xb1, 0x1b, 0x54, 0xb5, 0x7d, 0x54, 0xa4, 0xf0, 0x2a, 0x72, 0xfb, 0x74, 0x26, 0x2f, 0x74, 0x2c, 0xc6, 0xf3, 0x40, 0x44, 0x01, 0x3a, 0x44, 0x8b, 0x8e, 0x2d, 0x0d, 0x5a, 0x7c, 0x5b, 0x4f, 0x1b, 0x9f, 0x5b, 0x70, 0x1a, 0x9d, 0x21, 0xff, 0x55, 0xe3, 0x67, 0x8c, 0xa1, 0x19, 0xb6, 0xd7, 0xc5, 0x11, 0xba, 0x0a, 0xef, 0x89, 0xf3, 0x1a, 0xeb, 0x19, 0x5d, 0xb0, 0x0f, 0x24, 0x83, 0x59, 0xae, 0xe9, 0x24, 0xe7, 0xc8, 0x60, 0xb7, 0x68, 0x45, 0xf6, 0x51, 0x2a, 0x2a, 0x4a, 0xad, 0xc1, 0x28, 0x7a, 0x15, 0x09, 0x52, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2577_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2577_sig[] = { 0xa9, 0x52, 0x84, 0x7a, 0xcf, 0x21, 0x3c, 0x86, 0xe2, 0x31, 0x31, 0x6d, 0x8f, 0x91, 0x30, 0xf7, 0xcb, 0xdf, 0x7f, 0x39, 0x52, 0x30, 0x7a, 0x57, 0x70, 0x76, 0x34, 0x2d, 0x13, 0x93, 0x9b, 0x4a, 0xb5, 0xa1, 0x31, 0x3b, 0x34, 0xab, 0xb8, 0x92, 0x04, 0xd3, 0xfd, 0x1f, 0x87, 0x38, 0x85, 0xff, 0xfa, 0x68, 0x3c, 0x5a, 0x49, 0x3e, 0x54, 0x61, 0xc7, 0xf1, 0x40, 0x0a, 0xf8, 0x6a, 0xe7, 0xfe, 0x9a, 0x65, 0xa8, 0xa4, 0x15, 0x0d, 0xe5, 0x93, 0xb2, 0x96, 0x42, 0xb9, 0x88, 0xb2, 0xec, 0x2e, 0x23, 0xe1, 0x5e, 0x15, 0x6e, 0xcf, 0x0a, 0xf5, 0xfd, 0xe2, 0xfb, 0xd7, 0x32, 0x08, 0xf6, 0x9f, 0x25, 0x06, 0xd1, 0x41, 0xe0, 0xb4, 0x7c, 0x0e, 0x1f, 0x2f, 0xa0, 0x9e, 0xf2, 0x6b, 0x38, 0x9a, 0x6b, 0xd2, 0xb0, 0x23, 0x09, 0x30, 0xa1, 0x6f, 0xd1, 0x19, 0x76, 0x7e, 0x38, 0x27, 0x24, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2577 = { .name = "ecdsa_brainpoolp512r1_sha512_2577", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2577_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2577_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2577_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP512t1, tcId is 457 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2578 for ECDSA, tcId is 458 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2578_pubkey[] = { 0x3f, 0x89, 0xe7, 0x87, 0xb4, 0xd5, 0xd2, 0x59, 0x96, 0x24, 0x51, 0x35, 0x30, 0xe7, 0x50, 0xab, 0x3c, 0x59, 0x57, 0xdc, 0x9a, 0xa0, 0xe7, 0xb0, 0x8a, 0x3e, 0x25, 0x35, 0x68, 0x18, 0xe2, 0x03, 0x7d, 0x06, 0x2f, 0x33, 0x6d, 0x4e, 0xed, 0x41, 0x7c, 0x91, 0xbc, 0xb1, 0x1b, 0x54, 0xb5, 0x7d, 0x54, 0xa4, 0xf0, 0x2a, 0x72, 0xfb, 0x74, 0x26, 0x2f, 0x74, 0x2c, 0xc6, 0xf3, 0x40, 0x44, 0x01, 0x3a, 0x44, 0x8b, 0x8e, 0x2d, 0x0d, 0x5a, 0x7c, 0x5b, 0x4f, 0x1b, 0x9f, 0x5b, 0x70, 0x1a, 0x9d, 0x21, 0xff, 0x55, 0xe3, 0x67, 0x8c, 0xa1, 0x19, 0xb6, 0xd7, 0xc5, 0x11, 0xba, 0x0a, 0xef, 0x89, 0xf3, 0x1a, 0xeb, 0x19, 0x5d, 0xb0, 0x0f, 0x24, 0x83, 0x59, 0xae, 0xe9, 0x24, 0xe7, 0xc8, 0x60, 0xb7, 0x68, 0x45, 0xf6, 0x51, 0x2a, 0x2a, 0x4a, 0xad, 0xc1, 0x28, 0x7a, 0x15, 0x09, 0x52, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2578_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2578_sig[] = { 0x51, 0xbf, 0xb8, 0x0a, 0xae, 0x30, 0x26, 0x2a, 0x67, 0xbf, 0x07, 0x71, 0xa6, 0xb8, 0xd1, 0x95, 0xe5, 0x9a, 0xa0, 0x4e, 0x87, 0xbd, 0x06, 0x0f, 0xe5, 0xa9, 0xbd, 0x56, 0xd3, 0x53, 0x85, 0xa5, 0xfc, 0x3d, 0xa5, 0xdf, 0xc3, 0xae, 0x8c, 0x67, 0xdb, 0xd4, 0x08, 0x18, 0x44, 0x82, 0x85, 0x5e, 0x35, 0x63, 0xde, 0xde, 0xe7, 0x2a, 0x21, 0xb6, 0x0f, 0xaf, 0xd7, 0x38, 0x19, 0xaa, 0x83, 0x7c, 0x80, 0x7f, 0x0d, 0x69, 0x38, 0x54, 0x67, 0xad, 0x6c, 0xd8, 0xa4, 0x4d, 0x48, 0x2c, 0xa3, 0xb6, 0xe1, 0x8f, 0x7b, 0x35, 0x2e, 0xf1, 0x9a, 0x2b, 0xc9, 0x80, 0x50, 0x0b, 0x6d, 0x59, 0x04, 0x5f, 0x0d, 0x6f, 0x7a, 0xb7, 0xe4, 0x14, 0xc5, 0x0d, 0x2b, 0x68, 0xd7, 0xf6, 0xe6, 0xc0, 0x1d, 0x3e, 0x83, 0x53, 0xcd, 0xfd, 0x47, 0x5f, 0x24, 0x9b, 0x31, 0x84, 0x2f, 0xe5, 0x99, 0x55, 0xf4, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2578 = { .name = "ecdsa_brainpoolp512r1_sha512_2578", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2578_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2578_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2578_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP512t1, tcId is 458 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2579 for ECDSA, tcId is 459 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2579_pubkey[] = { 0x3f, 0x89, 0xe7, 0x87, 0xb4, 0xd5, 0xd2, 0x59, 0x96, 0x24, 0x51, 0x35, 0x30, 0xe7, 0x50, 0xab, 0x3c, 0x59, 0x57, 0xdc, 0x9a, 0xa0, 0xe7, 0xb0, 0x8a, 0x3e, 0x25, 0x35, 0x68, 0x18, 0xe2, 0x03, 0x7d, 0x06, 0x2f, 0x33, 0x6d, 0x4e, 0xed, 0x41, 0x7c, 0x91, 0xbc, 0xb1, 0x1b, 0x54, 0xb5, 0x7d, 0x54, 0xa4, 0xf0, 0x2a, 0x72, 0xfb, 0x74, 0x26, 0x2f, 0x74, 0x2c, 0xc6, 0xf3, 0x40, 0x44, 0x01, 0x3a, 0x44, 0x8b, 0x8e, 0x2d, 0x0d, 0x5a, 0x7c, 0x5b, 0x4f, 0x1b, 0x9f, 0x5b, 0x70, 0x1a, 0x9d, 0x21, 0xff, 0x55, 0xe3, 0x67, 0x8c, 0xa1, 0x19, 0xb6, 0xd7, 0xc5, 0x11, 0xba, 0x0a, 0xef, 0x89, 0xf3, 0x1a, 0xeb, 0x19, 0x5d, 0xb0, 0x0f, 0x24, 0x83, 0x59, 0xae, 0xe9, 0x24, 0xe7, 0xc8, 0x60, 0xb7, 0x68, 0x45, 0xf6, 0x51, 0x2a, 0x2a, 0x4a, 0xad, 0xc1, 0x28, 0x7a, 0x15, 0x09, 0x52, 0x20, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2579_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2579_sig[] = { 0x4e, 0x87, 0x11, 0xb0, 0x0d, 0xe3, 0x55, 0xf1, 0x4c, 0x8e, 0xb9, 0x19, 0x59, 0xc1, 0x3c, 0x77, 0xf9, 0x15, 0x57, 0x54, 0x76, 0x5f, 0x10, 0xf2, 0xaa, 0xa8, 0xfd, 0xad, 0x6a, 0x14, 0xc6, 0xa4, 0xe6, 0x2c, 0x5e, 0xd4, 0x8a, 0x9d, 0x8c, 0xa4, 0x03, 0xc9, 0x02, 0xdb, 0x0c, 0x2c, 0x07, 0x35, 0x42, 0x6b, 0x33, 0xe6, 0x78, 0x28, 0xac, 0x32, 0xae, 0x19, 0xb8, 0x4e, 0x65, 0x98, 0x68, 0x19, 0x7d, 0x10, 0x4a, 0xe5, 0xe5, 0xd0, 0xda, 0x26, 0xcb, 0x42, 0x7d, 0x79, 0x51, 0xd4, 0x0d, 0xf4, 0x29, 0xb4, 0x20, 0x50, 0x86, 0xe6, 0x33, 0xb8, 0x00, 0xd7, 0xd7, 0xb8, 0xbd, 0xe4, 0x8a, 0x9b, 0xec, 0x4e, 0x43, 0xdd, 0xeb, 0x42, 0x26, 0x19, 0x2b, 0x5c, 0x9b, 0x30, 0xff, 0xa3, 0xef, 0xa7, 0xd2, 0x38, 0x5a, 0xb2, 0x8a, 0x19, 0x0c, 0x16, 0x5f, 0xb2, 0xa2, 0xc5, 0x85, 0x72, 0xc2, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2579 = { .name = "ecdsa_brainpoolp512r1_sha512_2579", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2579_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2579_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2579_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's on brainpoolP512t1, tcId is 459 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2580 for ECDSA, tcId is 460 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2580_pubkey[] = { 0x78, 0x60, 0xa4, 0x74, 0x3b, 0xb4, 0x8e, 0x77, 0x93, 0xc7, 0xf1, 0x41, 0x6f, 0xba, 0xc6, 0xca, 0x0b, 0x53, 0x82, 0x10, 0xd7, 0x43, 0xf2, 0x49, 0x76, 0xaf, 0x3e, 0xfd, 0xa9, 0x7f, 0x28, 0xbc, 0x95, 0x91, 0x34, 0x01, 0xec, 0x4c, 0xa5, 0xe7, 0x44, 0xa2, 0x3d, 0x1a, 0x55, 0x26, 0x53, 0xff, 0x11, 0x0e, 0xc8, 0x42, 0x1b, 0x3d, 0xe5, 0x31, 0xf3, 0xba, 0xcd, 0xa0, 0x7b, 0xfb, 0x09, 0xd6, 0x03, 0x66, 0x2f, 0x2f, 0x24, 0x75, 0xbb, 0xf5, 0xe2, 0x0d, 0xa4, 0x8b, 0x50, 0x16, 0x9d, 0x28, 0x9c, 0x89, 0xc5, 0x4e, 0xd0, 0xf9, 0x7b, 0xbb, 0xc7, 0xf3, 0x80, 0x16, 0xf1, 0xa9, 0x55, 0xcb, 0x74, 0xc5, 0x27, 0x27, 0xef, 0x80, 0x20, 0x55, 0xea, 0x09, 0x0f, 0xe1, 0xa4, 0x9b, 0xe5, 0x8d, 0xdc, 0x60, 0x83, 0xbc, 0xa3, 0xf7, 0xc0, 0x2f, 0xf6, 0x44, 0x77, 0x5c, 0xd0, 0x02, 0x7f, 0x06, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2580_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2580_sig[] = { 0x4c, 0xd6, 0x17, 0x54, 0x21, 0x1d, 0x22, 0x23, 0x71, 0xe5, 0x52, 0x57, 0x8f, 0xf7, 0x05, 0xcc, 0x81, 0x9a, 0x2f, 0x9f, 0xb2, 0x72, 0x9f, 0x05, 0xd8, 0x48, 0xca, 0xab, 0xf4, 0x4a, 0x31, 0xfd, 0xa1, 0xbd, 0x03, 0x8f, 0x1b, 0x87, 0xef, 0xd2, 0x8a, 0x8c, 0xe5, 0x32, 0x22, 0xfd, 0xfe, 0xc1, 0x8d, 0x59, 0x29, 0xdf, 0x92, 0x6d, 0xf2, 0x7c, 0x2c, 0x7e, 0x73, 0x60, 0xbc, 0x5c, 0x0c, 0x70, 0x5c, 0xe9, 0x4c, 0x85, 0x1d, 0xb1, 0x80, 0x7d, 0xc7, 0x9d, 0xcc, 0x08, 0x7c, 0x08, 0x30, 0xd7, 0x0a, 0x00, 0x69, 0xcf, 0x52, 0xba, 0xff, 0xaf, 0x34, 0x7a, 0xef, 0xa1, 0xdd, 0xba, 0x77, 0xf6, 0xf7, 0x70, 0xc1, 0x48, 0x3f, 0xdd, 0xe3, 0x8f, 0x5d, 0x74, 0xbd, 0xb3, 0x23, 0x72, 0xe1, 0x2f, 0xee, 0x84, 0x3e, 0xff, 0xf0, 0xf2, 0xdc, 0x93, 0x44, 0xca, 0x1e, 0x3b, 0x26, 0xb9, 0xb0, 0x51, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2580 = { .name = "ecdsa_brainpoolp512r1_sha512_2580", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2580_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2580_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2580_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 460 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2581 for ECDSA, tcId is 461 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2581_pubkey[] = { 0x78, 0x60, 0xa4, 0x74, 0x3b, 0xb4, 0x8e, 0x77, 0x93, 0xc7, 0xf1, 0x41, 0x6f, 0xba, 0xc6, 0xca, 0x0b, 0x53, 0x82, 0x10, 0xd7, 0x43, 0xf2, 0x49, 0x76, 0xaf, 0x3e, 0xfd, 0xa9, 0x7f, 0x28, 0xbc, 0x95, 0x91, 0x34, 0x01, 0xec, 0x4c, 0xa5, 0xe7, 0x44, 0xa2, 0x3d, 0x1a, 0x55, 0x26, 0x53, 0xff, 0x11, 0x0e, 0xc8, 0x42, 0x1b, 0x3d, 0xe5, 0x31, 0xf3, 0xba, 0xcd, 0xa0, 0x7b, 0xfb, 0x09, 0xd6, 0x03, 0x66, 0x2f, 0x2f, 0x24, 0x75, 0xbb, 0xf5, 0xe2, 0x0d, 0xa4, 0x8b, 0x50, 0x16, 0x9d, 0x28, 0x9c, 0x89, 0xc5, 0x4e, 0xd0, 0xf9, 0x7b, 0xbb, 0xc7, 0xf3, 0x80, 0x16, 0xf1, 0xa9, 0x55, 0xcb, 0x74, 0xc5, 0x27, 0x27, 0xef, 0x80, 0x20, 0x55, 0xea, 0x09, 0x0f, 0xe1, 0xa4, 0x9b, 0xe5, 0x8d, 0xdc, 0x60, 0x83, 0xbc, 0xa3, 0xf7, 0xc0, 0x2f, 0xf6, 0x44, 0x77, 0x5c, 0xd0, 0x02, 0x7f, 0x06, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2581_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2581_sig[] = { 0x48, 0xb4, 0xbd, 0xe7, 0xbe, 0xfb, 0x1b, 0x1c, 0xad, 0x50, 0xce, 0xe6, 0x23, 0x3c, 0xbf, 0x32, 0x81, 0x28, 0x60, 0xc8, 0x1d, 0x7a, 0xd5, 0xb0, 0xe9, 0xd6, 0x37, 0x72, 0x02, 0xbc, 0xd3, 0x48, 0x27, 0xc5, 0x34, 0xda, 0x0a, 0xc9, 0x64, 0x6a, 0xe0, 0x15, 0x46, 0x89, 0xe3, 0x8c, 0x60, 0x88, 0x94, 0xbb, 0x31, 0x26, 0xe1, 0x02, 0x5f, 0x69, 0xc8, 0x24, 0xc6, 0x9a, 0xb8, 0x21, 0x27, 0x4a, 0x83, 0x69, 0xf5, 0x84, 0x0f, 0x77, 0x66, 0x68, 0xeb, 0xb4, 0x35, 0xb3, 0x3b, 0xe0, 0x5d, 0xce, 0x4a, 0xdf, 0xab, 0xb8, 0x86, 0x0c, 0xcc, 0x90, 0x0d, 0x07, 0xdb, 0x00, 0x6a, 0x50, 0x19, 0x5f, 0xd4, 0xde, 0x98, 0x63, 0x21, 0x92, 0xfb, 0xe7, 0x31, 0x9c, 0xed, 0xff, 0x26, 0xaa, 0x86, 0x82, 0xcf, 0x7b, 0xf5, 0xf1, 0xc0, 0x2e, 0x58, 0xb9, 0xc1, 0x63, 0x23, 0x61, 0x03, 0xd9, 0xb3, 0x14, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2581 = { .name = "ecdsa_brainpoolp512r1_sha512_2581", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2581_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2581_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2581_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 461 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2582 for ECDSA, tcId is 462 in file ecdsa_brainpoolP512r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_brainpoolp512r1_sha512_2582_pubkey[] = { 0x78, 0x60, 0xa4, 0x74, 0x3b, 0xb4, 0x8e, 0x77, 0x93, 0xc7, 0xf1, 0x41, 0x6f, 0xba, 0xc6, 0xca, 0x0b, 0x53, 0x82, 0x10, 0xd7, 0x43, 0xf2, 0x49, 0x76, 0xaf, 0x3e, 0xfd, 0xa9, 0x7f, 0x28, 0xbc, 0x95, 0x91, 0x34, 0x01, 0xec, 0x4c, 0xa5, 0xe7, 0x44, 0xa2, 0x3d, 0x1a, 0x55, 0x26, 0x53, 0xff, 0x11, 0x0e, 0xc8, 0x42, 0x1b, 0x3d, 0xe5, 0x31, 0xf3, 0xba, 0xcd, 0xa0, 0x7b, 0xfb, 0x09, 0xd6, 0x03, 0x66, 0x2f, 0x2f, 0x24, 0x75, 0xbb, 0xf5, 0xe2, 0x0d, 0xa4, 0x8b, 0x50, 0x16, 0x9d, 0x28, 0x9c, 0x89, 0xc5, 0x4e, 0xd0, 0xf9, 0x7b, 0xbb, 0xc7, 0xf3, 0x80, 0x16, 0xf1, 0xa9, 0x55, 0xcb, 0x74, 0xc5, 0x27, 0x27, 0xef, 0x80, 0x20, 0x55, 0xea, 0x09, 0x0f, 0xe1, 0xa4, 0x9b, 0xe5, 0x8d, 0xdc, 0x60, 0x83, 0xbc, 0xa3, 0xf7, 0xc0, 0x2f, 0xf6, 0x44, 0x77, 0x5c, 0xd0, 0x02, 0x7f, 0x06, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2582_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_brainpoolp512r1_sha512_2582_sig[] = { 0x19, 0x52, 0x4b, 0x15, 0xcf, 0x4e, 0xcb, 0x40, 0x0b, 0x93, 0x8e, 0xf5, 0xf7, 0x52, 0xb8, 0x6e, 0xc8, 0xf0, 0x7c, 0x59, 0x03, 0xda, 0x5d, 0xba, 0x9c, 0x91, 0xab, 0x79, 0x65, 0xb1, 0x22, 0x3a, 0x8e, 0x26, 0x2b, 0xef, 0x8c, 0xca, 0x89, 0x73, 0xed, 0x98, 0x79, 0x7f, 0x37, 0xa3, 0x5e, 0x1c, 0x59, 0x99, 0xcf, 0x20, 0x3e, 0x61, 0x0e, 0xf7, 0x73, 0xc6, 0xaa, 0x27, 0x86, 0xbb, 0xa0, 0x64, 0x98, 0xcf, 0x75, 0x26, 0xf5, 0xa2, 0x4a, 0x0e, 0x2f, 0x22, 0xf9, 0x09, 0xf8, 0x19, 0x0b, 0x13, 0x13, 0x04, 0x51, 0xb1, 0x5d, 0xd6, 0x77, 0x4b, 0xde, 0xa9, 0xd9, 0x29, 0x34, 0x2d, 0x92, 0x4b, 0xc7, 0xeb, 0xa1, 0xdf, 0x89, 0x91, 0x9c, 0x1b, 0x9a, 0xee, 0x8d, 0x09, 0x20, 0x36, 0x06, 0xd1, 0x0c, 0xeb, 0xff, 0x89, 0x90, 0x4c, 0xb7, 0xe7, 0x1a, 0x82, 0xd8, 0x97, 0x2d, 0x75, 0x53, 0x06, }; static const wycheproof_ecdsa_test ecdsa_brainpoolp512r1_sha512_2582 = { .name = "ecdsa_brainpoolp512r1_sha512_2582", .sig_alg = ECDSA, .hash = SHA512, .curve = &brainpoolp512r1_str_params, .pubkey = ecdsa_brainpoolp512r1_sha512_2582_pubkey, .pubkeylen = 128, .msg = ecdsa_brainpoolp512r1_sha512_2582_msg, .msglen = 7, .sig = ecdsa_brainpoolp512r1_sha512_2582_sig, .siglen = 128, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's on brainpoolP512t1, tcId is 462 in file ecdsa_brainpoolP512r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_BRAINPOOLP512R1) && defined(WITH_HASH_SHA512) */ /* Test 2583 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2583_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2583_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2583_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x28, 0x40, 0xbf, 0x24, 0xf6, 0xf6, 0x6b, 0xe2, 0x87, 0x06, 0x6b, 0x7c, 0xbf, 0x38, 0x78, 0x8e, 0x1b, 0x77, 0x70, 0xb1, 0x8f, 0xd1, 0xaa, 0x6a, 0x26, 0xd7, 0xc6, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2583 = { .name = "ecdsa_secp224r1_sha224_2583", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2583_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2583_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2583_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2584 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2584_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2584_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2584_sig[] = { 0x01, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x26, 0xfc, 0x2a, 0x84, 0xbb, 0xe2, 0xe2, 0xa2, 0xe8, 0x4a, 0xec, 0xed, 0x76, 0x72, 0x47, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2584 = { .name = "ecdsa_secp224r1_sha224_2584", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2584_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2584_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2584_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2585 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2585_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2585_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2585_sig[] = { 0x8f, 0xfb, 0x65, 0x0c, 0xe0, 0x7c, 0xb7, 0x98, 0xc2, 0xa9, 0x31, 0x31, 0xd4, 0xd7, 0x31, 0x1b, 0x3c, 0xb5, 0xfd, 0x99, 0x84, 0xd2, 0x07, 0x9d, 0xcb, 0x41, 0xe2, 0x33, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2585 = { .name = "ecdsa_secp224r1_sha224_2585", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2585_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2585_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2585_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2586 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2586_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2586_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2586_sig[] = { 0x01, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2586 = { .name = "ecdsa_secp224r1_sha224_2586", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2586_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2586_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2586_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2587 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2587_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2587_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2587_sig[] = { 0x8f, 0xfb, 0x65, 0x0c, 0xe0, 0x7c, 0xb7, 0x98, 0xc2, 0xa9, 0x31, 0x31, 0xd4, 0xd8, 0x1a, 0x78, 0x5b, 0xfd, 0x0d, 0x5b, 0x70, 0xf4, 0xde, 0x58, 0x6e, 0xe5, 0xb7, 0xf6, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2587 = { .name = "ecdsa_secp224r1_sha224_2587", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2587_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2587_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2587_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2588 for ECDSA, tcId is 6 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2588_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2588_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2588_sig[] = { 0x00, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x01, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc5, 0xb4, 0xb7, 0xa5, 0xfa, 0x6f, 0xca, 0x97, 0xe8, 0xa8, 0x20, 0x91, 0xe0, 0x8d, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2588 = { .name = "ecdsa_secp224r1_sha224_2588", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2588_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2588_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2588_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2589 for ECDSA, tcId is 7 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2589_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2589_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2589_sig[] = { 0x00, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x01, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2589 = { .name = "ecdsa_secp224r1_sha224_2589", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2589_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2589_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2589_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2590 for ECDSA, tcId is 8 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2590_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2590_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2590_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x28, 0x40, 0xbf, 0x24, 0xf6, 0xf6, 0x6b, 0xe2, 0x87, 0x06, 0x6b, 0x7c, 0xbf, 0x39, 0x61, 0xeb, 0x3a, 0xbe, 0x80, 0x73, 0x7b, 0xf4, 0x81, 0x24, 0xca, 0x7b, 0x9c, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2590 = { .name = "ecdsa_secp224r1_sha224_2590", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2590_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2590_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2590_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2591 for ECDSA, tcId is 9 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2591_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2591_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2591_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2591 = { .name = "ecdsa_secp224r1_sha224_2591", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2591_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2591_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2591_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2592 for ECDSA, tcId is 10 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2592_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2592_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2592_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2592 = { .name = "ecdsa_secp224r1_sha224_2592", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2592_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2592_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2592_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2593 for ECDSA, tcId is 11 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2593_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2593_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2593_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2593 = { .name = "ecdsa_secp224r1_sha224_2593", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2593_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2593_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2593_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2594 for ECDSA, tcId is 12 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2594_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2594_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2594_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2594 = { .name = "ecdsa_secp224r1_sha224_2594", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2594_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2594_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2594_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2595 for ECDSA, tcId is 13 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2595_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2595_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2595_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2595 = { .name = "ecdsa_secp224r1_sha224_2595", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2595_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2595_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2595_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2596 for ECDSA, tcId is 14 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2596_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2596_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2596_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2596 = { .name = "ecdsa_secp224r1_sha224_2596", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2596_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2596_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2596_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2597 for ECDSA, tcId is 15 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2597_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2597_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2597_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2597 = { .name = "ecdsa_secp224r1_sha224_2597", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2597_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2597_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2597_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2598 for ECDSA, tcId is 16 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2598_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2598_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2598_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2598 = { .name = "ecdsa_secp224r1_sha224_2598", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2598_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2598_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2598_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2599 for ECDSA, tcId is 17 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2599_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2599_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2599_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2599 = { .name = "ecdsa_secp224r1_sha224_2599", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2599_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2599_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2599_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2600 for ECDSA, tcId is 18 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2600_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2600_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2600_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2600 = { .name = "ecdsa_secp224r1_sha224_2600", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2600_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2600_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2600_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2601 for ECDSA, tcId is 19 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2601_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2601_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2601_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2601 = { .name = "ecdsa_secp224r1_sha224_2601", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2601_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2601_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2601_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2602 for ECDSA, tcId is 20 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2602_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2602_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2602_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2602 = { .name = "ecdsa_secp224r1_sha224_2602", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2602_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2602_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2602_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2603 for ECDSA, tcId is 21 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2603_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2603_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2603_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2603 = { .name = "ecdsa_secp224r1_sha224_2603", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2603_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2603_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2603_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2604 for ECDSA, tcId is 22 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2604_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2604_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2604_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2604 = { .name = "ecdsa_secp224r1_sha224_2604", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2604_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2604_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2604_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2605 for ECDSA, tcId is 23 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2605_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2605_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2605_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2605 = { .name = "ecdsa_secp224r1_sha224_2605", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2605_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2605_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2605_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2606 for ECDSA, tcId is 24 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2606_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2606_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2606_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2606 = { .name = "ecdsa_secp224r1_sha224_2606", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2606_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2606_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2606_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2607 for ECDSA, tcId is 25 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2607_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2607_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2607_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2607 = { .name = "ecdsa_secp224r1_sha224_2607", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2607_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2607_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2607_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2608 for ECDSA, tcId is 26 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2608_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2608_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2608_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2608 = { .name = "ecdsa_secp224r1_sha224_2608", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2608_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2608_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2608_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2609 for ECDSA, tcId is 27 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2609_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2609_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2609_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2609 = { .name = "ecdsa_secp224r1_sha224_2609", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2609_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2609_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2609_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2610 for ECDSA, tcId is 28 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2610_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2610_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2610_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2610 = { .name = "ecdsa_secp224r1_sha224_2610", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2610_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2610_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2610_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2611 for ECDSA, tcId is 29 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2611_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2611_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2611_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2611 = { .name = "ecdsa_secp224r1_sha224_2611", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2611_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2611_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2611_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2612 for ECDSA, tcId is 30 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2612_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2612_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2612_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2612 = { .name = "ecdsa_secp224r1_sha224_2612", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2612_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2612_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2612_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2613 for ECDSA, tcId is 31 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2613_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2613_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2613_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2613 = { .name = "ecdsa_secp224r1_sha224_2613", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2613_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2613_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2613_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2614 for ECDSA, tcId is 32 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2614_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2614_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2614_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2614 = { .name = "ecdsa_secp224r1_sha224_2614", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2614_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2614_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2614_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2615 for ECDSA, tcId is 33 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2615_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2615_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2615_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2615 = { .name = "ecdsa_secp224r1_sha224_2615", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2615_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2615_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2615_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2616 for ECDSA, tcId is 34 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2616_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2616_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2616_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2616 = { .name = "ecdsa_secp224r1_sha224_2616", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2616_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2616_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2616_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2617 for ECDSA, tcId is 35 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2617_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2617_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2617_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2617 = { .name = "ecdsa_secp224r1_sha224_2617", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2617_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2617_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2617_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2618 for ECDSA, tcId is 36 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2618_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2618_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2618_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2618 = { .name = "ecdsa_secp224r1_sha224_2618", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2618_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2618_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2618_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2619 for ECDSA, tcId is 37 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2619_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2619_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2619_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2619 = { .name = "ecdsa_secp224r1_sha224_2619", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2619_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2619_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2619_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2620 for ECDSA, tcId is 38 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2620_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2620_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2620_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2620 = { .name = "ecdsa_secp224r1_sha224_2620", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2620_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2620_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2620_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2621 for ECDSA, tcId is 39 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2621_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2621_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2621_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2621 = { .name = "ecdsa_secp224r1_sha224_2621", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2621_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2621_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2621_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2622 for ECDSA, tcId is 40 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2622_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2622_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2622_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2622 = { .name = "ecdsa_secp224r1_sha224_2622", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2622_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2622_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2622_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2623 for ECDSA, tcId is 41 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2623_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2623_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2623_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2623 = { .name = "ecdsa_secp224r1_sha224_2623", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2623_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2623_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2623_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2624 for ECDSA, tcId is 42 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2624_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2624_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2624_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2624 = { .name = "ecdsa_secp224r1_sha224_2624", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2624_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2624_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2624_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2625 for ECDSA, tcId is 43 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2625_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2625_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2625_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2625 = { .name = "ecdsa_secp224r1_sha224_2625", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2625_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2625_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2625_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2626 for ECDSA, tcId is 44 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2626_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2626_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2626_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2626 = { .name = "ecdsa_secp224r1_sha224_2626", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2626_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2626_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2626_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2627 for ECDSA, tcId is 45 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2627_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2627_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2627_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2627 = { .name = "ecdsa_secp224r1_sha224_2627", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2627_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2627_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2627_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2628 for ECDSA, tcId is 46 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2628_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2628_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2628_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2628 = { .name = "ecdsa_secp224r1_sha224_2628", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2628_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2628_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2628_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2629 for ECDSA, tcId is 47 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2629_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2629_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2629_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2629 = { .name = "ecdsa_secp224r1_sha224_2629", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2629_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2629_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2629_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2630 for ECDSA, tcId is 48 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2630_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2630_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2630_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2630 = { .name = "ecdsa_secp224r1_sha224_2630", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2630_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2630_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2630_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2631 for ECDSA, tcId is 49 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2631_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2631_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2631_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2631 = { .name = "ecdsa_secp224r1_sha224_2631", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2631_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2631_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2631_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2632 for ECDSA, tcId is 50 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2632_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2632_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2632_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2632 = { .name = "ecdsa_secp224r1_sha224_2632", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2632_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2632_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2632_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2633 for ECDSA, tcId is 51 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2633_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2633_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2633_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2633 = { .name = "ecdsa_secp224r1_sha224_2633", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2633_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2633_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2633_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2634 for ECDSA, tcId is 52 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2634_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2634_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2634_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2634 = { .name = "ecdsa_secp224r1_sha224_2634", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2634_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2634_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2634_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2635 for ECDSA, tcId is 53 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2635_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2635_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2635_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2635 = { .name = "ecdsa_secp224r1_sha224_2635", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2635_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2635_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2635_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2636 for ECDSA, tcId is 54 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2636_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2636_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2636_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2636 = { .name = "ecdsa_secp224r1_sha224_2636", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2636_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2636_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2636_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2637 for ECDSA, tcId is 55 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2637_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2637_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2637_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2637 = { .name = "ecdsa_secp224r1_sha224_2637", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2637_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2637_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2637_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2638 for ECDSA, tcId is 56 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2638_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2638_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2638_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2638 = { .name = "ecdsa_secp224r1_sha224_2638", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2638_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2638_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2638_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2639 for ECDSA, tcId is 57 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2639_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2639_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2639_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2639 = { .name = "ecdsa_secp224r1_sha224_2639", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2639_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2639_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2639_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2640 for ECDSA, tcId is 58 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2640_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2640_msg[] = { 0x31, 0x37, 0x35, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2640_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x31, 0x16, 0xe1, 0xa3, 0x8e, 0x4a, 0xb2, 0x00, 0x8e, 0xca, 0x03, 0x2f, 0xb2, 0xd1, 0x85, 0xe5, 0xc2, 0x1a, 0x23, 0x2e, 0xaf, 0x45, 0x07, 0xae, 0x56, 0x17, 0x7f, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2640 = { .name = "ecdsa_secp224r1_sha224_2640", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2640_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2640_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha224_2640_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2641 for ECDSA, tcId is 59 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2641_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2641_msg[] = { 0x32, 0x32, 0x35, 0x34, 0x36, 0x32, 0x38, 0x39, 0x38, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2641_sig[] = { 0x8c, 0xe2, 0xaf, 0xe2, 0x0b, 0x68, 0x45, 0x76, 0xfd, 0xd9, 0x1b, 0x4b, 0x34, 0x16, 0x8c, 0x9c, 0x01, 0x19, 0x96, 0xaf, 0x5b, 0x0e, 0xb8, 0x5f, 0xa9, 0x29, 0xf3, 0x81, 0x66, 0x2a, 0xf5, 0xca, 0x65, 0x1b, 0xff, 0xbc, 0x62, 0x3c, 0x3a, 0x3b, 0x37, 0x27, 0x79, 0xbd, 0x09, 0xe1, 0x94, 0x8c, 0xd1, 0x91, 0x88, 0xf5, 0x33, 0x9a, 0x97, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2641 = { .name = "ecdsa_secp224r1_sha224_2641", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2641_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2641_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2641_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2642 for ECDSA, tcId is 60 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2642_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2642_msg[] = { 0x31, 0x38, 0x32, 0x37, 0x38, 0x37, 0x38, 0x36, 0x31, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2642_sig[] = { 0xda, 0x57, 0x3c, 0xf7, 0x3a, 0xed, 0x17, 0x47, 0x10, 0xc2, 0x32, 0x15, 0x57, 0x35, 0x24, 0x8f, 0x8e, 0xbe, 0xf6, 0x96, 0x37, 0x46, 0x47, 0x52, 0x7d, 0xa5, 0x22, 0x58, 0xb2, 0x51, 0x85, 0x6b, 0x66, 0xa8, 0x3c, 0x32, 0xbf, 0x0b, 0x7b, 0x81, 0xa0, 0x1f, 0x1d, 0xb4, 0x50, 0x7e, 0x62, 0x21, 0x25, 0xf3, 0x01, 0xbd, 0x83, 0x2a, 0x5c, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2642 = { .name = "ecdsa_secp224r1_sha224_2642", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2642_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2642_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2642_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2643 for ECDSA, tcId is 61 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2643_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2643_msg[] = { 0x31, 0x35, 0x31, 0x38, 0x38, 0x36, 0x31, 0x37, 0x30, 0x39, }; static const unsigned char ecdsa_secp224r1_sha224_2643_sig[] = { 0xc3, 0x68, 0xda, 0x86, 0x58, 0x2b, 0x2c, 0x82, 0xb6, 0x96, 0xb2, 0xf7, 0xc7, 0x90, 0x27, 0x96, 0x8f, 0x3f, 0xd2, 0x5c, 0xbb, 0xa9, 0x68, 0x8c, 0xdc, 0x67, 0xb1, 0x7a, 0xab, 0xa8, 0xe3, 0xc2, 0xff, 0x1a, 0xf9, 0xbb, 0x9c, 0x66, 0xca, 0x88, 0xa3, 0x82, 0x5a, 0x19, 0xce, 0x17, 0x20, 0x6e, 0x7a, 0x65, 0x8f, 0xf4, 0x70, 0x25, 0x89, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2643 = { .name = "ecdsa_secp224r1_sha224_2643", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2643_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2643_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2643_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2644 for ECDSA, tcId is 62 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2644_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2644_msg[] = { 0x32, 0x31, 0x32, 0x39, 0x32, 0x33, 0x33, 0x34, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2644_sig[] = { 0xff, 0xce, 0xfc, 0xb5, 0x71, 0x90, 0xd0, 0xb8, 0x7e, 0xfb, 0x78, 0x9f, 0xb5, 0x34, 0x07, 0xfd, 0x2c, 0x65, 0xc5, 0xae, 0x35, 0x51, 0xda, 0x3e, 0xcc, 0xf8, 0xdd, 0xd5, 0x05, 0xc8, 0x9b, 0x41, 0x23, 0x8f, 0x1e, 0x1d, 0xef, 0x8f, 0xbe, 0x8d, 0x4a, 0xfe, 0xbf, 0x20, 0xbe, 0x07, 0x7e, 0x82, 0x97, 0x2f, 0x91, 0x29, 0x74, 0x87, 0xe1, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2644 = { .name = "ecdsa_secp224r1_sha224_2644", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2644_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2644_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2644_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2645 for ECDSA, tcId is 63 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2645_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2645_msg[] = { 0x31, 0x32, 0x32, 0x31, 0x39, 0x37, 0x39, 0x30, 0x35, 0x39, }; static const unsigned char ecdsa_secp224r1_sha224_2645_sig[] = { 0x2b, 0x98, 0xc6, 0x7e, 0xbf, 0x65, 0x97, 0xb0, 0x8b, 0xc7, 0xf1, 0xb7, 0x3f, 0xf8, 0x66, 0x2c, 0xf1, 0x25, 0xe9, 0x70, 0x0e, 0xc9, 0x73, 0xec, 0xe9, 0xc6, 0xff, 0x48, 0x2e, 0x3f, 0x72, 0xa8, 0xf7, 0x6e, 0x12, 0xc8, 0xcd, 0xf4, 0x48, 0x7e, 0x09, 0x56, 0xc1, 0xef, 0x45, 0x78, 0xe1, 0xda, 0x4d, 0x29, 0xd8, 0xdb, 0x82, 0x4d, 0x41, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2645 = { .name = "ecdsa_secp224r1_sha224_2645", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2645_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2645_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2645_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2646 for ECDSA, tcId is 64 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2646_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2646_msg[] = { 0x32, 0x33, 0x30, 0x32, 0x35, 0x36, 0x37, 0x36, 0x31, 0x31, }; static const unsigned char ecdsa_secp224r1_sha224_2646_sig[] = { 0x57, 0x94, 0xd7, 0x04, 0x40, 0xf1, 0x66, 0x90, 0x4d, 0x24, 0xd0, 0xb9, 0x10, 0xcd, 0x12, 0x7c, 0x63, 0xa9, 0xed, 0xdc, 0xa4, 0x5a, 0x4d, 0x90, 0x32, 0xdb, 0x47, 0xe8, 0x8b, 0xa5, 0xd2, 0x90, 0x83, 0x4d, 0x9a, 0x09, 0x63, 0x12, 0x2d, 0x92, 0x8d, 0xa9, 0x02, 0xf7, 0xb0, 0x34, 0x67, 0x39, 0x60, 0x72, 0x18, 0x0b, 0xb1, 0x80, 0x1b, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2646 = { .name = "ecdsa_secp224r1_sha224_2646", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2646_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2646_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2646_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2647 for ECDSA, tcId is 65 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2647_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2647_msg[] = { 0x31, 0x31, 0x30, 0x35, 0x38, 0x36, 0x38, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2647_sig[] = { 0xc2, 0x9c, 0x70, 0xb0, 0xb2, 0x17, 0x82, 0xd1, 0xc7, 0x27, 0xf4, 0x90, 0x7a, 0xef, 0x56, 0x41, 0xb6, 0xd6, 0xc6, 0xe7, 0xb2, 0xa1, 0xeb, 0xfa, 0x57, 0x79, 0x42, 0x23, 0xaa, 0xc2, 0xd3, 0xa0, 0x25, 0x92, 0xf2, 0x98, 0xdd, 0x31, 0x98, 0xe3, 0x88, 0x42, 0x5e, 0xc7, 0xa9, 0x1d, 0x7e, 0x6b, 0xe4, 0x82, 0x48, 0xa6, 0x47, 0x73, 0x61, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2647 = { .name = "ecdsa_secp224r1_sha224_2647", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2647_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2647_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2647_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2648 for ECDSA, tcId is 66 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2648_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2648_msg[] = { 0x31, 0x34, 0x36, 0x36, 0x36, 0x31, 0x34, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2648_sig[] = { 0x5c, 0x3e, 0xf3, 0x77, 0x8c, 0x81, 0x1e, 0x69, 0xef, 0x0b, 0x0e, 0x37, 0x0e, 0x45, 0xec, 0x0d, 0x7e, 0xb8, 0x85, 0x05, 0xc3, 0xe8, 0xff, 0xb8, 0xc5, 0x0b, 0x99, 0x93, 0xe0, 0x6b, 0x5c, 0x6e, 0x47, 0xdc, 0x4d, 0xa9, 0xe6, 0x4f, 0xd2, 0x1b, 0xc3, 0xe1, 0xda, 0x13, 0xcf, 0x7c, 0x26, 0x4f, 0xa6, 0x4c, 0xcb, 0x89, 0xda, 0x87, 0x38, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2648 = { .name = "ecdsa_secp224r1_sha224_2648", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2648_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2648_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2648_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2649 for ECDSA, tcId is 67 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2649_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2649_msg[] = { 0x34, 0x34, 0x31, 0x39, 0x35, 0x36, 0x34, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2649_sig[] = { 0xed, 0x8f, 0x58, 0x65, 0x63, 0x23, 0x2c, 0xf1, 0x5e, 0xbd, 0x01, 0x4b, 0xd4, 0xf9, 0x97, 0x27, 0xe3, 0x37, 0xcf, 0xe4, 0xce, 0x48, 0x69, 0x4f, 0xe6, 0x74, 0x8e, 0xc2, 0xff, 0xf7, 0x79, 0xa3, 0xec, 0xa9, 0x51, 0x35, 0x22, 0x90, 0x8e, 0x25, 0x2a, 0x2b, 0x4a, 0xab, 0x20, 0x60, 0x60, 0x8e, 0x6c, 0xd2, 0xd4, 0xf1, 0xb8, 0xc6, 0x96, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2649 = { .name = "ecdsa_secp224r1_sha224_2649", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2649_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2649_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha224_2649_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2650 for ECDSA, tcId is 68 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2650_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2650_msg[] = { 0x31, 0x39, 0x36, 0x39, 0x34, 0x38, 0x36, 0x30, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2650_sig[] = { 0x64, 0xc0, 0x84, 0xf6, 0xb7, 0x75, 0xbb, 0xf7, 0x91, 0x5c, 0x19, 0x64, 0xa6, 0x8b, 0x02, 0x59, 0x62, 0x93, 0x28, 0x59, 0x8f, 0x13, 0x55, 0x78, 0x72, 0x86, 0x78, 0x30, 0x2a, 0x6f, 0x3b, 0x28, 0x9d, 0x13, 0x0e, 0xc3, 0xd9, 0x9e, 0x4c, 0xaa, 0xf6, 0x01, 0x49, 0x78, 0x95, 0xa0, 0x69, 0xc1, 0xa5, 0xa7, 0x5b, 0x55, 0x9a, 0xd2, 0x84, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2650 = { .name = "ecdsa_secp224r1_sha224_2650", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2650_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2650_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2650_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2651 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2651_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2651_msg[] = { 0x32, 0x32, 0x33, 0x35, 0x36, 0x37, 0x32, 0x38, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2651_sig[] = { 0x2b, 0x51, 0x4e, 0x9b, 0x0e, 0x0e, 0xb6, 0x8a, 0xdc, 0x01, 0x91, 0x5a, 0xbb, 0xee, 0x9f, 0xa2, 0x1f, 0x30, 0x34, 0xbe, 0x55, 0x81, 0xde, 0xda, 0xa6, 0xb1, 0x59, 0x82, 0xb8, 0xf7, 0x1c, 0x5f, 0xdc, 0x68, 0xd6, 0x98, 0x71, 0x6b, 0xfc, 0x62, 0x3b, 0x27, 0x82, 0x16, 0xc0, 0xfc, 0xc0, 0x29, 0x84, 0x97, 0xfc, 0x9c, 0x03, 0xdb, 0x44, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2651 = { .name = "ecdsa_secp224r1_sha224_2651", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2651_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2651_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2651_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2652 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2652_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2652_msg[] = { 0x32, 0x32, 0x35, 0x37, 0x38, 0x34, 0x33, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2652_sig[] = { 0xe4, 0x10, 0x3f, 0x4a, 0x8a, 0x81, 0x44, 0x85, 0xb6, 0xb4, 0x06, 0xfe, 0x8d, 0xd7, 0x22, 0x06, 0xba, 0xd6, 0xa5, 0x0e, 0x71, 0x26, 0xbc, 0x65, 0x5c, 0x3d, 0x22, 0x85, 0x9b, 0xcb, 0x99, 0x69, 0x32, 0x84, 0xca, 0xc2, 0x6e, 0x66, 0x41, 0xa8, 0x61, 0xdb, 0xec, 0x24, 0xf9, 0xcc, 0x5d, 0xd7, 0xbb, 0x53, 0x53, 0x39, 0xd0, 0x9a, 0xc9, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2652 = { .name = "ecdsa_secp224r1_sha224_2652", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2652_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2652_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2652_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2653 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2653_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2653_msg[] = { 0x39, 0x34, 0x34, 0x35, 0x30, 0x30, 0x39, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha224_2653_sig[] = { 0x9e, 0xdf, 0xb8, 0x33, 0x44, 0x6e, 0xc8, 0xb6, 0xfc, 0x84, 0xee, 0xa3, 0x4e, 0xe4, 0x0a, 0x85, 0xb7, 0x32, 0xe5, 0xc9, 0x9d, 0xa8, 0xab, 0xc8, 0xba, 0xfc, 0xc5, 0x15, 0x50, 0x52, 0xb4, 0x0f, 0x9d, 0x40, 0x7a, 0xe9, 0x00, 0x03, 0x29, 0x9c, 0xab, 0xe3, 0xe1, 0xa5, 0x87, 0xb0, 0x55, 0x81, 0x27, 0xca, 0xfb, 0x31, 0xde, 0x6b, 0x26, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2653 = { .name = "ecdsa_secp224r1_sha224_2653", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2653_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2653_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha224_2653_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2654 for ECDSA, tcId is 72 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2654_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2654_msg[] = { 0x31, 0x36, 0x38, 0x37, 0x37, 0x38, 0x39, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2654_sig[] = { 0xad, 0x26, 0x47, 0xc8, 0xff, 0x37, 0x77, 0x98, 0xa6, 0xae, 0xae, 0xd4, 0x36, 0xd3, 0x0c, 0x7b, 0x25, 0xfb, 0x52, 0x42, 0x88, 0x29, 0xce, 0x64, 0x24, 0xdd, 0x34, 0xe8, 0x28, 0xf5, 0x86, 0x71, 0xd7, 0x7c, 0x86, 0xda, 0x30, 0x24, 0x18, 0xc5, 0x1e, 0x5a, 0xb8, 0x6d, 0x13, 0x7b, 0xa6, 0xef, 0x43, 0x89, 0x72, 0x2b, 0xc7, 0x9b, 0x87, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2654 = { .name = "ecdsa_secp224r1_sha224_2654", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2654_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2654_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2654_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2655 for ECDSA, tcId is 73 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2655_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2655_msg[] = { 0x33, 0x39, 0x33, 0x32, 0x36, 0x31, 0x32, 0x32, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2655_sig[] = { 0x5d, 0xfc, 0x6f, 0xad, 0x38, 0x5b, 0xdb, 0x24, 0xb2, 0xb7, 0x0a, 0x64, 0xfd, 0x42, 0x53, 0x40, 0x5c, 0x00, 0x28, 0xbb, 0x36, 0xf4, 0x79, 0x3a, 0xa3, 0xbd, 0x31, 0xfe, 0x1c, 0x21, 0x0b, 0x74, 0x92, 0x41, 0x71, 0x37, 0x89, 0x92, 0xb0, 0x3b, 0xb1, 0xbd, 0x78, 0xc5, 0xcf, 0xcf, 0xc8, 0x79, 0xd2, 0xe5, 0xc7, 0x36, 0xd3, 0x55, 0x16, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2655 = { .name = "ecdsa_secp224r1_sha224_2655", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2655_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2655_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha224_2655_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2656 for ECDSA, tcId is 74 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2656_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2656_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x35, 0x37, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha224_2656_sig[] = { 0x76, 0x6b, 0xef, 0x46, 0x22, 0x96, 0x95, 0xe6, 0x82, 0x9d, 0xd1, 0x2c, 0xd5, 0x58, 0x36, 0x9e, 0xc3, 0x45, 0x19, 0xba, 0x4a, 0x72, 0xdc, 0xaf, 0x6f, 0x73, 0xf7, 0xb0, 0xfc, 0x01, 0x5c, 0xcd, 0xd1, 0xe9, 0x43, 0xb9, 0x10, 0x10, 0x16, 0x07, 0xd8, 0x1f, 0xf1, 0x39, 0x8c, 0xa6, 0xa4, 0xd7, 0x0c, 0x25, 0x83, 0x2b, 0x02, 0xb2, 0x21, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2656 = { .name = "ecdsa_secp224r1_sha224_2656", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2656_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2656_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2656_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2657 for ECDSA, tcId is 75 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2657_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2657_msg[] = { 0x36, 0x30, 0x38, 0x38, 0x37, 0x34, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2657_sig[] = { 0x12, 0x00, 0x55, 0xf9, 0x0a, 0xd1, 0x29, 0x0c, 0x4c, 0x5f, 0xc5, 0xfa, 0xf6, 0x9b, 0x21, 0x51, 0x39, 0x18, 0x2c, 0x77, 0x0d, 0x2b, 0x55, 0xe9, 0x57, 0x12, 0x44, 0x2f, 0x01, 0xac, 0x47, 0xf7, 0x44, 0x65, 0x43, 0xd4, 0x00, 0x3b, 0x03, 0x9d, 0x9f, 0x54, 0xda, 0xa9, 0xd0, 0x79, 0x9f, 0x98, 0x29, 0x1a, 0x32, 0xdf, 0x4f, 0xcd, 0x47, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2657 = { .name = "ecdsa_secp224r1_sha224_2657", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2657_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2657_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha224_2657_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2658 for ECDSA, tcId is 76 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2658_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2658_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x35, 0x36, 0x39, 0x39, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2658_sig[] = { 0xf4, 0x80, 0x59, 0x1f, 0x6f, 0x40, 0xa2, 0x5b, 0x37, 0xa0, 0x35, 0xfd, 0x91, 0x95, 0x41, 0x45, 0xec, 0x34, 0x2e, 0x59, 0x3d, 0x09, 0xe1, 0x42, 0xf2, 0x5d, 0xa4, 0x08, 0x5c, 0x6b, 0xa4, 0x4f, 0xf5, 0x2f, 0x52, 0xc5, 0x14, 0x90, 0x74, 0x3d, 0x9b, 0x65, 0x09, 0x16, 0xbe, 0x58, 0xd0, 0x6d, 0x7c, 0x1f, 0xd9, 0x9d, 0xfa, 0x2e, 0xab, 0x58, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2658 = { .name = "ecdsa_secp224r1_sha224_2658", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2658_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2658_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2658_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2659 for ECDSA, tcId is 77 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2659_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2659_msg[] = { 0x39, 0x30, 0x30, 0x37, 0x36, 0x30, 0x39, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2659_sig[] = { 0x57, 0xda, 0xdd, 0xb0, 0xcb, 0x6a, 0xf9, 0x39, 0xb1, 0xea, 0x1a, 0xaf, 0x4b, 0xc7, 0x2e, 0x56, 0x15, 0x0c, 0x0c, 0x46, 0xa5, 0x81, 0x82, 0x71, 0x93, 0xe6, 0x5d, 0x17, 0x3b, 0xc3, 0x7b, 0xde, 0x4e, 0x60, 0xb7, 0x89, 0xba, 0x86, 0xa0, 0x54, 0xd3, 0x7f, 0x11, 0x91, 0xe0, 0x81, 0x49, 0x26, 0xc1, 0xa0, 0x10, 0x01, 0x68, 0xd1, 0x6c, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2659 = { .name = "ecdsa_secp224r1_sha224_2659", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2659_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2659_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha224_2659_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2660 for ECDSA, tcId is 78 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2660_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2660_msg[] = { 0x31, 0x36, 0x30, 0x32, 0x38, 0x33, 0x36, 0x31, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha224_2660_sig[] = { 0x3a, 0x74, 0x10, 0x2b, 0xd1, 0xfc, 0x61, 0x70, 0x18, 0xef, 0xc4, 0xfb, 0xc0, 0x42, 0xe7, 0x19, 0xa8, 0x1b, 0x55, 0x83, 0x0a, 0xac, 0x1f, 0x1d, 0xcd, 0xed, 0xec, 0x65, 0x4b, 0xb9, 0xfe, 0x90, 0x01, 0x5a, 0x45, 0xf3, 0x1c, 0x8c, 0x95, 0xdd, 0xa2, 0x4f, 0x54, 0xfc, 0xdb, 0x64, 0x68, 0x2c, 0x13, 0xf6, 0x8d, 0x4d, 0xa3, 0xd1, 0xab, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2660 = { .name = "ecdsa_secp224r1_sha224_2660", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2660_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2660_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2660_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2661 for ECDSA, tcId is 79 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2661_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2661_msg[] = { 0x32, 0x30, 0x38, 0x30, 0x32, 0x34, 0x35, 0x36, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2661_sig[] = { 0xe3, 0xb6, 0xbb, 0x1b, 0x5b, 0xee, 0xd0, 0x48, 0xe0, 0x17, 0x7e, 0x3e, 0x31, 0x0f, 0xa1, 0x4e, 0xb9, 0x23, 0xa1, 0xe3, 0x27, 0x4c, 0x09, 0x46, 0xf9, 0x27, 0x54, 0x54, 0xe0, 0x44, 0xe0, 0x49, 0x4f, 0xf4, 0x65, 0x73, 0xc3, 0x70, 0x07, 0xe3, 0xef, 0xa3, 0x23, 0x35, 0x88, 0xf1, 0xd1, 0x03, 0xce, 0xd1, 0x82, 0x3c, 0x7e, 0x87, 0xe7, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2661 = { .name = "ecdsa_secp224r1_sha224_2661", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2661_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2661_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2661_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2662 for ECDSA, tcId is 80 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2662_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2662_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x37, 0x34, 0x36, 0x35, 0x39, }; static const unsigned char ecdsa_secp224r1_sha224_2662_sig[] = { 0x3c, 0x21, 0x2b, 0x5a, 0x7e, 0x65, 0xd9, 0xaf, 0x44, 0x64, 0x3b, 0xd6, 0x2f, 0xa4, 0x2a, 0x9b, 0x9c, 0xff, 0xe6, 0xbd, 0xb6, 0x23, 0xe9, 0xb9, 0xe4, 0x33, 0x71, 0x56, 0x29, 0xc8, 0x12, 0x1a, 0x12, 0x42, 0x7a, 0x32, 0x4e, 0x5d, 0x55, 0x1f, 0xf5, 0xa8, 0x3d, 0x3c, 0x25, 0x2e, 0x32, 0x25, 0x7a, 0xf2, 0x80, 0x0d, 0x08, 0x08, 0x17, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2662 = { .name = "ecdsa_secp224r1_sha224_2662", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2662_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2662_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2662_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2663 for ECDSA, tcId is 81 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2663_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2663_msg[] = { 0x31, 0x31, 0x35, 0x35, 0x35, 0x37, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2663_sig[] = { 0x16, 0x30, 0x55, 0x49, 0x89, 0xff, 0xfd, 0x0e, 0x35, 0xf2, 0xd9, 0x10, 0x56, 0x23, 0xd7, 0x3a, 0x54, 0x36, 0x34, 0xc4, 0x80, 0x00, 0x48, 0x4c, 0x42, 0x22, 0x72, 0xca, 0x21, 0x4d, 0xa4, 0x87, 0xd5, 0xe5, 0x1f, 0x73, 0x81, 0x4d, 0xff, 0x80, 0xa0, 0x8c, 0x77, 0xbd, 0x8a, 0x83, 0xa9, 0x88, 0x9a, 0x1b, 0x26, 0xa5, 0x57, 0x8b, 0xa9, 0x54, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2663 = { .name = "ecdsa_secp224r1_sha224_2663", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2663_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2663_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2663_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2664 for ECDSA, tcId is 82 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2664_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2664_msg[] = { 0x32, 0x34, 0x33, 0x32, 0x34, 0x37, 0x34, 0x36, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2664_sig[] = { 0x0a, 0x46, 0x09, 0x24, 0x2f, 0x21, 0x93, 0xb9, 0x4b, 0xc5, 0x4f, 0x49, 0xbc, 0xf5, 0x32, 0xa5, 0x76, 0xe0, 0x35, 0xce, 0xc5, 0x0e, 0x04, 0x36, 0x68, 0x57, 0x4b, 0xef, 0xaa, 0x68, 0xbd, 0x67, 0x62, 0x4d, 0x88, 0x12, 0x00, 0x2b, 0xbb, 0x3a, 0x5f, 0x53, 0x05, 0x94, 0x45, 0x13, 0x72, 0xd4, 0xab, 0x36, 0x89, 0x6a, 0x29, 0x29, 0xc3, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2664 = { .name = "ecdsa_secp224r1_sha224_2664", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2664_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2664_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2664_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2665 for ECDSA, tcId is 83 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2665_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2665_msg[] = { 0x32, 0x34, 0x31, 0x37, 0x32, 0x38, 0x32, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha224_2665_sig[] = { 0xef, 0x9f, 0xf4, 0x46, 0xe8, 0xee, 0xf3, 0xe9, 0x48, 0xf4, 0x12, 0x9f, 0xe8, 0x80, 0x4f, 0x81, 0xf5, 0xb7, 0xf1, 0x16, 0xa5, 0x38, 0x3f, 0x9e, 0x8b, 0xc3, 0x59, 0xe4, 0xf4, 0xc7, 0x05, 0x5b, 0xd9, 0x8f, 0x4a, 0x7e, 0xa4, 0x9d, 0x95, 0x74, 0x16, 0x0e, 0xac, 0x16, 0x78, 0x09, 0xf6, 0xa7, 0x8b, 0x9d, 0xd2, 0x20, 0x95, 0x8d, 0xd0, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2665 = { .name = "ecdsa_secp224r1_sha224_2665", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2665_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2665_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2665_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2666 for ECDSA, tcId is 84 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2666_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2666_msg[] = { 0x37, 0x37, 0x38, 0x37, 0x34, 0x37, 0x37, 0x31, }; static const unsigned char ecdsa_secp224r1_sha224_2666_sig[] = { 0x1a, 0x6c, 0x59, 0xd8, 0x5d, 0x5b, 0x31, 0x20, 0xb2, 0x8c, 0x0d, 0x30, 0xbc, 0x05, 0x8a, 0x92, 0xdc, 0x72, 0x5d, 0x8e, 0xf4, 0x50, 0xc1, 0x98, 0xcc, 0x3c, 0xa5, 0x22, 0x8b, 0x17, 0xfe, 0xfc, 0x8a, 0xb1, 0xff, 0x0b, 0xb3, 0x7a, 0x93, 0x44, 0x64, 0x53, 0xd4, 0x0f, 0x65, 0xbc, 0x2c, 0xb9, 0x63, 0x6b, 0x11, 0x20, 0x7f, 0x5c, 0x90, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2666 = { .name = "ecdsa_secp224r1_sha224_2666", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2666_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2666_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha224_2666_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2667 for ECDSA, tcId is 85 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2667_pubkey[] = { 0x8b, 0xf7, 0xe7, 0x92, 0xf7, 0xc8, 0x68, 0x77, 0xf1, 0xfd, 0x05, 0x52, 0xe4, 0x2d, 0x80, 0x65, 0x3b, 0x59, 0xe3, 0xa2, 0x9e, 0x76, 0x2a, 0x22, 0x81, 0x0d, 0xaa, 0xc7, 0xee, 0xc6, 0x15, 0xbb, 0xad, 0x04, 0xb5, 0x8d, 0xc2, 0xa7, 0x95, 0x60, 0x90, 0xb8, 0x04, 0x0b, 0xb5, 0x05, 0x53, 0x25, 0xbb, 0xa0, 0xaa, 0x8b, 0x3a, 0x5c, 0xaa, 0x6f, }; static const unsigned char ecdsa_secp224r1_sha224_2667_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2667_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2667 = { .name = "ecdsa_secp224r1_sha224_2667", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2667_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2667_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2667_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 85 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2668 for ECDSA, tcId is 86 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2668_pubkey[] = { 0x8b, 0xf7, 0xe7, 0x92, 0xf7, 0xc8, 0x68, 0x77, 0xf1, 0xfd, 0x05, 0x52, 0xe4, 0x2d, 0x80, 0x65, 0x3b, 0x59, 0xe3, 0xa2, 0x9e, 0x76, 0x2a, 0x22, 0x81, 0x0d, 0xaa, 0xc7, 0xee, 0xc6, 0x15, 0xbb, 0xad, 0x04, 0xb5, 0x8d, 0xc2, 0xa7, 0x95, 0x60, 0x90, 0xb8, 0x04, 0x0b, 0xb5, 0x05, 0x53, 0x25, 0xbb, 0xa0, 0xaa, 0x8b, 0x3a, 0x5c, 0xaa, 0x6f, }; static const unsigned char ecdsa_secp224r1_sha224_2668_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2668_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2668 = { .name = "ecdsa_secp224r1_sha224_2668", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2668_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2668_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2668_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 86 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2669 for ECDSA, tcId is 87 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2669_pubkey[] = { 0x26, 0x46, 0xff, 0x36, 0xd9, 0x69, 0x7a, 0xaa, 0xed, 0x0d, 0x64, 0x11, 0x17, 0xf9, 0x4f, 0x60, 0xe1, 0x38, 0xba, 0xb8, 0xe9, 0x91, 0x2b, 0x55, 0x8a, 0xe0, 0xa8, 0x18, 0xca, 0x48, 0xe4, 0x5a, 0x33, 0x55, 0x0c, 0x1b, 0x5b, 0xd2, 0x0a, 0x00, 0xe4, 0xd9, 0xdf, 0x30, 0x33, 0xc0, 0x32, 0x22, 0xe8, 0x7b, 0xd9, 0x6a, 0x81, 0x97, 0xf2, 0xdd, }; static const unsigned char ecdsa_secp224r1_sha224_2669_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2669_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2669 = { .name = "ecdsa_secp224r1_sha224_2669", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2669_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2669_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2669_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 87 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2670 for ECDSA, tcId is 88 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2670_pubkey[] = { 0xea, 0x3e, 0xa2, 0x87, 0x3b, 0x6f, 0xc0, 0x99, 0xbf, 0xd7, 0x79, 0xb0, 0xa2, 0xc2, 0x3c, 0x2c, 0x43, 0x54, 0xe2, 0xfe, 0xc4, 0x53, 0x6f, 0x3b, 0x8e, 0x42, 0x09, 0x88, 0xf9, 0x7e, 0x1c, 0x76, 0x46, 0xb4, 0xeb, 0x3d, 0xe6, 0x16, 0x75, 0x2f, 0x41, 0x5a, 0xb3, 0xa6, 0xf6, 0x96, 0xd1, 0xd6, 0x74, 0xfb, 0x4b, 0x67, 0x32, 0x25, 0x23, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2670_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2670_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2670 = { .name = "ecdsa_secp224r1_sha224_2670", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2670_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2670_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2670_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 88 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2671 for ECDSA, tcId is 89 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2671_pubkey[] = { 0x92, 0xae, 0x54, 0xe3, 0x8b, 0x4e, 0x9c, 0x6a, 0xe9, 0x94, 0x31, 0x93, 0x74, 0x7c, 0x4c, 0x8a, 0xcc, 0x6c, 0x96, 0xf4, 0x22, 0x51, 0x52, 0x88, 0xe9, 0x69, 0x8a, 0x13, 0xe8, 0xf3, 0xa7, 0x59, 0xa1, 0xa8, 0x27, 0x3c, 0x53, 0xf4, 0xb4, 0xb1, 0x8b, 0xfc, 0xf7, 0x8d, 0x9b, 0xb9, 0x88, 0xad, 0xb3, 0xb0, 0x05, 0x00, 0x2d, 0xbe, 0x43, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha224_2671_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2671_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2671 = { .name = "ecdsa_secp224r1_sha224_2671", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2671_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2671_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2671_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 89 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2672 for ECDSA, tcId is 90 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2672_pubkey[] = { 0xb1, 0x57, 0x31, 0x5c, 0xc1, 0xaa, 0xea, 0xe6, 0x4e, 0xb5, 0xb3, 0x84, 0x52, 0x88, 0x41, 0x95, 0xfd, 0xfe, 0x8a, 0x15, 0xfb, 0x56, 0x18, 0x28, 0x4f, 0x48, 0xaf, 0xe5, 0xe1, 0xfb, 0xba, 0xad, 0x72, 0x94, 0x77, 0xa4, 0x5f, 0x37, 0x52, 0xb7, 0xf7, 0x2a, 0xd2, 0xf9, 0xcd, 0x7d, 0xce, 0x41, 0x58, 0xa8, 0xe2, 0x1b, 0x81, 0x27, 0xe8, 0xa7, }; static const unsigned char ecdsa_secp224r1_sha224_2672_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2672_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2672 = { .name = "ecdsa_secp224r1_sha224_2672", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2672_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2672_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2672_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 90 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2673 for ECDSA, tcId is 91 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2673_pubkey[] = { 0xb1, 0x57, 0x31, 0x5c, 0xc1, 0xaa, 0xea, 0xe6, 0x4e, 0xb5, 0xb3, 0x84, 0x52, 0x88, 0x41, 0x95, 0xfd, 0xfe, 0x8a, 0x15, 0xfb, 0x56, 0x18, 0x28, 0x4f, 0x48, 0xaf, 0xe5, 0xe1, 0xfb, 0xba, 0xad, 0x72, 0x94, 0x77, 0xa4, 0x5f, 0x37, 0x52, 0xb7, 0xf7, 0x2a, 0xd2, 0xf9, 0xcd, 0x7d, 0xce, 0x41, 0x58, 0xa8, 0xe2, 0x1b, 0x81, 0x27, 0xe8, 0xa7, }; static const unsigned char ecdsa_secp224r1_sha224_2673_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2673_sig[] = { 0x03, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2673 = { .name = "ecdsa_secp224r1_sha224_2673", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2673_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2673_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2673_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 91 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2674 for ECDSA, tcId is 92 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2674_pubkey[] = { 0x87, 0xd9, 0xd9, 0x64, 0x04, 0x4b, 0x5b, 0x16, 0x80, 0x1f, 0x32, 0xde, 0x9f, 0x3f, 0x90, 0x66, 0x19, 0x4e, 0x8b, 0xf8, 0x0a, 0xff, 0xa3, 0xcb, 0x0d, 0x4d, 0xdb, 0x1d, 0xb5, 0xeb, 0x9b, 0x65, 0x94, 0xe6, 0xd1, 0xbc, 0xac, 0xd0, 0xfd, 0x9d, 0x67, 0xc4, 0x08, 0xf7, 0x89, 0xdf, 0xb9, 0x5f, 0xeb, 0x79, 0xa6, 0xe2, 0xfb, 0x9c, 0x4c, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2674_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2674_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2674 = { .name = "ecdsa_secp224r1_sha224_2674", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2674_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2674_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2674_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 92 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2675 for ECDSA, tcId is 93 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2675_pubkey[] = { 0x87, 0xd9, 0xd9, 0x64, 0x04, 0x4b, 0x5b, 0x16, 0x80, 0x1f, 0x32, 0xde, 0x9f, 0x3f, 0x90, 0x66, 0x19, 0x4e, 0x8b, 0xf8, 0x0a, 0xff, 0xa3, 0xcb, 0x0d, 0x4d, 0xdb, 0x1d, 0xb5, 0xeb, 0x9b, 0x65, 0x94, 0xe6, 0xd1, 0xbc, 0xac, 0xd0, 0xfd, 0x9d, 0x67, 0xc4, 0x08, 0xf7, 0x89, 0xdf, 0xb9, 0x5f, 0xeb, 0x79, 0xa6, 0xe2, 0xfb, 0x9c, 0x4c, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2675_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2675_sig[] = { 0x03, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2675 = { .name = "ecdsa_secp224r1_sha224_2675", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2675_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2675_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2675_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 93 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2676 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2676_pubkey[] = { 0x46, 0x1b, 0x43, 0x5a, 0xf0, 0x9e, 0xde, 0x35, 0xe7, 0x4d, 0xac, 0x21, 0xf9, 0xaf, 0x7b, 0x1b, 0x99, 0x98, 0x21, 0x30, 0x39, 0xf8, 0x78, 0x5d, 0x4a, 0x49, 0x05, 0xf5, 0x18, 0xb8, 0x9b, 0xde, 0x69, 0xde, 0x34, 0xa4, 0x82, 0x63, 0x84, 0x61, 0xd0, 0x93, 0x86, 0xe7, 0x19, 0x3c, 0xa9, 0x0c, 0xa5, 0xb3, 0x03, 0x8e, 0x2a, 0x38, 0x85, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha224_2676_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2676_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2676 = { .name = "ecdsa_secp224r1_sha224_2676", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2676_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2676_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2676_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 94 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2677 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2677_pubkey[] = { 0x46, 0x1b, 0x43, 0x5a, 0xf0, 0x9e, 0xde, 0x35, 0xe7, 0x4d, 0xac, 0x21, 0xf9, 0xaf, 0x7b, 0x1b, 0x99, 0x98, 0x21, 0x30, 0x39, 0xf8, 0x78, 0x5d, 0x4a, 0x49, 0x05, 0xf5, 0x18, 0xb8, 0x9b, 0xde, 0x69, 0xde, 0x34, 0xa4, 0x82, 0x63, 0x84, 0x61, 0xd0, 0x93, 0x86, 0xe7, 0x19, 0x3c, 0xa9, 0x0c, 0xa5, 0xb3, 0x03, 0x8e, 0x2a, 0x38, 0x85, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha224_2677_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2677_sig[] = { 0x03, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2677 = { .name = "ecdsa_secp224r1_sha224_2677", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2677_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2677_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2677_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 95 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2678 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2678_pubkey[] = { 0x46, 0x1b, 0x43, 0x5a, 0xf0, 0x9e, 0xde, 0x35, 0xe7, 0x4d, 0xac, 0x21, 0xf9, 0xaf, 0x7b, 0x1b, 0x99, 0x98, 0x21, 0x30, 0x39, 0xf8, 0x78, 0x5d, 0x4a, 0x49, 0x05, 0xf5, 0x18, 0xb8, 0x9b, 0xde, 0x69, 0xde, 0x34, 0xa4, 0x82, 0x63, 0x84, 0x61, 0xd0, 0x93, 0x86, 0xe7, 0x19, 0x3c, 0xa9, 0x0c, 0xa5, 0xb3, 0x03, 0x8e, 0x2a, 0x38, 0x85, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha224_2678_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2678_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2678 = { .name = "ecdsa_secp224r1_sha224_2678", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2678_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2678_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2678_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 96 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2679 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2679_pubkey[] = { 0x80, 0x93, 0xaf, 0x8d, 0xb0, 0x4b, 0x3d, 0xd2, 0xe7, 0xc3, 0xc5, 0x9b, 0xb6, 0x4a, 0x83, 0x2c, 0x2f, 0xb8, 0xe8, 0xe1, 0x41, 0xba, 0xe7, 0xba, 0x15, 0x34, 0x95, 0x0a, 0x10, 0xc5, 0xe8, 0x7a, 0xec, 0xbd, 0x1f, 0xcd, 0xfc, 0x36, 0xcd, 0x18, 0xd4, 0x1b, 0x32, 0x38, 0xb2, 0xac, 0x61, 0x3e, 0xb7, 0xc9, 0xde, 0x98, 0x8d, 0x88, 0x18, 0x16, }; static const unsigned char ecdsa_secp224r1_sha224_2679_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2679_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2679 = { .name = "ecdsa_secp224r1_sha224_2679", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2679_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2679_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2679_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 97 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2680 for ECDSA, tcId is 98 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2680_pubkey[] = { 0xc6, 0xd7, 0x1f, 0x4b, 0xa0, 0x93, 0x3f, 0x12, 0x69, 0xf7, 0xd6, 0xdf, 0x83, 0xfd, 0x0c, 0x9c, 0x67, 0x25, 0x4f, 0x10, 0x1d, 0xcc, 0x12, 0x6d, 0xc1, 0x5f, 0xaa, 0x3e, 0x3c, 0x45, 0xdc, 0x9f, 0xed, 0xc7, 0x1c, 0x9f, 0x2b, 0x0d, 0xd1, 0xb1, 0x2b, 0x65, 0x62, 0x41, 0xf5, 0xe3, 0x35, 0x06, 0x6f, 0x3f, 0x92, 0x5b, 0xdb, 0xcf, 0xe9, 0x8f, }; static const unsigned char ecdsa_secp224r1_sha224_2680_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2680_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2680 = { .name = "ecdsa_secp224r1_sha224_2680", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2680_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2680_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2680_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 98 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2681 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2681_pubkey[] = { 0xbe, 0xb9, 0xd8, 0xdc, 0xba, 0x48, 0x14, 0x6b, 0x90, 0x32, 0x68, 0x8e, 0xce, 0xa9, 0x47, 0xa2, 0x31, 0xe7, 0xd0, 0xe6, 0xce, 0x17, 0xd7, 0x6b, 0x56, 0xed, 0x63, 0x48, 0x35, 0x50, 0x3f, 0x3b, 0x4a, 0xf4, 0x14, 0x87, 0x0e, 0xf0, 0x33, 0x83, 0x78, 0x4b, 0x1d, 0x84, 0x6b, 0x3e, 0x07, 0xb8, 0xe9, 0xfc, 0x2d, 0x61, 0x90, 0xa3, 0xbf, 0xda, }; static const unsigned char ecdsa_secp224r1_sha224_2681_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2681_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2681 = { .name = "ecdsa_secp224r1_sha224_2681", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2681_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2681_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2681_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 99 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2682 for ECDSA, tcId is 100 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2682_pubkey[] = { 0x19, 0x55, 0xba, 0x3f, 0x90, 0xe7, 0xa7, 0x39, 0x47, 0x1a, 0x5d, 0x18, 0x2b, 0x59, 0x4c, 0x97, 0x47, 0xeb, 0x49, 0xd5, 0x35, 0x62, 0x03, 0xf3, 0xbb, 0x8b, 0x93, 0x9c, 0x80, 0x7d, 0x88, 0xce, 0x3a, 0x08, 0x85, 0xbf, 0xa5, 0xb5, 0xb7, 0xf6, 0xe9, 0xbe, 0xb1, 0x82, 0x85, 0xe7, 0x13, 0x05, 0x24, 0xb6, 0xc1, 0x49, 0x8b, 0x32, 0x69, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2682_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2682_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2682 = { .name = "ecdsa_secp224r1_sha224_2682", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2682_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2682_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2682_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 100 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2683 for ECDSA, tcId is 101 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2683_pubkey[] = { 0x5c, 0xb9, 0xe5, 0xa5, 0x07, 0x1f, 0x2b, 0x37, 0xaa, 0x3a, 0x5e, 0x5f, 0x38, 0x9f, 0x54, 0xf9, 0x96, 0xb0, 0xbc, 0x8a, 0x13, 0x2e, 0xcb, 0x68, 0x85, 0x31, 0x8f, 0xbf, 0x4e, 0xc5, 0xf8, 0xb9, 0x3d, 0x8b, 0xf2, 0xa3, 0xb6, 0x4f, 0xa7, 0xca, 0xc3, 0x16, 0x39, 0x25, 0x62, 0xc4, 0x65, 0x67, 0x96, 0x3c, 0x43, 0xa6, 0x9f, 0x7a, 0x37, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2683_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2683_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2683 = { .name = "ecdsa_secp224r1_sha224_2683", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2683_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2683_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2683_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 101 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2684 for ECDSA, tcId is 102 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2684_pubkey[] = { 0x7b, 0x34, 0xef, 0x87, 0x23, 0xa4, 0x30, 0x9c, 0x0f, 0xa8, 0xa7, 0xec, 0x3a, 0x78, 0x34, 0x77, 0x65, 0x2a, 0x82, 0x89, 0x23, 0x70, 0xf6, 0x76, 0x33, 0x14, 0xfe, 0x7b, 0xde, 0xe6, 0x63, 0x85, 0x30, 0x71, 0xe3, 0x5f, 0xd3, 0xc7, 0x6f, 0x99, 0x1d, 0x78, 0x43, 0xc5, 0xe1, 0x68, 0xca, 0x65, 0x9b, 0x93, 0xbd, 0x60, 0x15, 0x51, 0x8f, 0xba, }; static const unsigned char ecdsa_secp224r1_sha224_2684_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2684_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2684 = { .name = "ecdsa_secp224r1_sha224_2684", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2684_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2684_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2684_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 102 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2685 for ECDSA, tcId is 103 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2685_pubkey[] = { 0x03, 0xf2, 0x6a, 0x9c, 0x13, 0x97, 0x9c, 0xf5, 0xd0, 0x90, 0xea, 0x25, 0xdc, 0x96, 0x63, 0x98, 0x02, 0x2c, 0xee, 0xc3, 0x15, 0x04, 0xab, 0xc4, 0xb1, 0x0f, 0x76, 0x76, 0x7d, 0x57, 0x7d, 0xcf, 0x47, 0xe1, 0x0e, 0x38, 0x4c, 0x6b, 0x9a, 0x22, 0x9a, 0x45, 0x5a, 0x9f, 0xd3, 0x3e, 0x54, 0xfe, 0x79, 0x60, 0xb8, 0xb0, 0x16, 0x0a, 0xef, 0x16, }; static const unsigned char ecdsa_secp224r1_sha224_2685_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2685_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2685 = { .name = "ecdsa_secp224r1_sha224_2685", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2685_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2685_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2685_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 103 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2686 for ECDSA, tcId is 104 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2686_pubkey[] = { 0xb6, 0x71, 0x29, 0x6d, 0xd5, 0xf6, 0x90, 0x50, 0x2e, 0x4b, 0x15, 0x00, 0xe4, 0xac, 0xb4, 0xc8, 0x2d, 0x3a, 0xa8, 0xdf, 0xbc, 0x58, 0x68, 0xa6, 0x43, 0xf8, 0x6a, 0x3c, 0xa4, 0x6b, 0xa8, 0xc3, 0xa7, 0xb8, 0x23, 0x25, 0x95, 0x22, 0x29, 0x1e, 0x24, 0x16, 0x23, 0x22, 0x76, 0xcc, 0xa8, 0x50, 0x3c, 0xc8, 0xdb, 0xf9, 0x41, 0xf1, 0xd9, 0x3d, }; static const unsigned char ecdsa_secp224r1_sha224_2686_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2686_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2686 = { .name = "ecdsa_secp224r1_sha224_2686", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2686_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2686_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2686_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 104 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2687 for ECDSA, tcId is 105 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2687_pubkey[] = { 0xb6, 0x71, 0x29, 0x6d, 0xd5, 0xf6, 0x90, 0x50, 0x2e, 0x4b, 0x15, 0x00, 0xe4, 0xac, 0xb4, 0xc8, 0x2d, 0x3a, 0xa8, 0xdf, 0xbc, 0x58, 0x68, 0xa6, 0x43, 0xf8, 0x6a, 0x3c, 0xa4, 0x6b, 0xa8, 0xc3, 0xa7, 0xb8, 0x23, 0x25, 0x95, 0x22, 0x29, 0x1e, 0x24, 0x16, 0x23, 0x22, 0x76, 0xcc, 0xa8, 0x50, 0x3c, 0xc8, 0xdb, 0xf9, 0x41, 0xf1, 0xd9, 0x3d, }; static const unsigned char ecdsa_secp224r1_sha224_2687_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2687_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2687 = { .name = "ecdsa_secp224r1_sha224_2687", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2687_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2687_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2687_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 105 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2688 for ECDSA, tcId is 106 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2688_pubkey[] = { 0x76, 0xe3, 0x4b, 0x57, 0xa8, 0xc6, 0x1d, 0xf5, 0x9c, 0xb0, 0xb7, 0x92, 0x1c, 0xec, 0x6e, 0x54, 0x22, 0x34, 0x40, 0x33, 0xf7, 0xac, 0xcb, 0x7b, 0x31, 0x79, 0xe6, 0x82, 0xce, 0xfd, 0x0a, 0x84, 0x83, 0x09, 0xd1, 0xde, 0xcf, 0x98, 0xa3, 0xb9, 0xe3, 0x33, 0x69, 0x1b, 0x95, 0xc1, 0x78, 0x21, 0xcb, 0x68, 0x11, 0x37, 0x63, 0x0c, 0x02, 0xe2, }; static const unsigned char ecdsa_secp224r1_sha224_2688_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2688_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2688 = { .name = "ecdsa_secp224r1_sha224_2688", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2688_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2688_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2688_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 106 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2689 for ECDSA, tcId is 107 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2689_pubkey[] = { 0x51, 0x83, 0x9e, 0x54, 0x5c, 0x87, 0x2f, 0x4a, 0x38, 0x1f, 0x27, 0x8e, 0xd5, 0xb4, 0xc2, 0x4c, 0xf3, 0x8a, 0xac, 0x77, 0xb0, 0x29, 0x53, 0x40, 0x56, 0x18, 0xbf, 0x27, 0x39, 0x4e, 0x41, 0x22, 0x65, 0x94, 0xc4, 0x99, 0xdb, 0x6a, 0x7d, 0xd7, 0xa6, 0x90, 0x1b, 0xda, 0x5e, 0x64, 0x74, 0xb1, 0xff, 0xa1, 0x0a, 0x65, 0x67, 0x21, 0x00, 0x10, }; static const unsigned char ecdsa_secp224r1_sha224_2689_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2689_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2689 = { .name = "ecdsa_secp224r1_sha224_2689", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2689_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2689_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2689_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 107 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2690 for ECDSA, tcId is 108 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2690_pubkey[] = { 0xa3, 0xec, 0x90, 0x05, 0x3d, 0x1e, 0x10, 0x08, 0x15, 0xd1, 0xbe, 0xcf, 0xe9, 0x6c, 0x9b, 0x36, 0x46, 0xe5, 0x2d, 0xf7, 0x94, 0xf6, 0xb0, 0x3b, 0x76, 0x6a, 0x75, 0x74, 0xc3, 0xb7, 0xe1, 0x7e, 0x73, 0xac, 0xc8, 0xce, 0xfe, 0x71, 0xb6, 0xeb, 0x13, 0xd4, 0xf1, 0xc9, 0x4c, 0x57, 0xe5, 0x8b, 0xee, 0x43, 0xc6, 0x9d, 0x9d, 0x41, 0xa9, 0x64, }; static const unsigned char ecdsa_secp224r1_sha224_2690_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2690_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2690 = { .name = "ecdsa_secp224r1_sha224_2690", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2690_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2690_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2690_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 108 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2691 for ECDSA, tcId is 109 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2691_pubkey[] = { 0xb5, 0xc0, 0x9b, 0x48, 0x51, 0xa6, 0x73, 0x71, 0xee, 0xe7, 0xbb, 0xf0, 0x24, 0x51, 0xe5, 0x20, 0x8c, 0x40, 0xde, 0x61, 0xbc, 0x1a, 0x33, 0xdf, 0x27, 0x10, 0xb3, 0x84, 0xdc, 0xce, 0x4e, 0x5b, 0x83, 0xc3, 0x2a, 0x80, 0x0e, 0x8d, 0xe2, 0x8f, 0xa9, 0x36, 0xd5, 0x82, 0xcd, 0xca, 0xd1, 0x85, 0xe8, 0x94, 0xca, 0xac, 0x79, 0x7f, 0x1d, 0x14, }; static const unsigned char ecdsa_secp224r1_sha224_2691_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2691_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2691 = { .name = "ecdsa_secp224r1_sha224_2691", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2691_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2691_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2691_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 109 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2692 for ECDSA, tcId is 110 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2692_pubkey[] = { 0x94, 0x1e, 0x28, 0x3b, 0xe3, 0x13, 0x00, 0xbf, 0xd4, 0xf6, 0xa1, 0x2b, 0x87, 0x6f, 0xd3, 0x26, 0x73, 0x52, 0x55, 0x1c, 0xc4, 0x9e, 0x9e, 0xef, 0x73, 0xf7, 0x65, 0x38, 0xc1, 0x15, 0xe5, 0xfe, 0x3b, 0x92, 0xf6, 0x43, 0xc6, 0xce, 0xf1, 0xc5, 0x8f, 0x3f, 0x86, 0x57, 0x57, 0x4d, 0x1f, 0x64, 0x95, 0x7d, 0x48, 0x80, 0x99, 0x5c, 0xde, 0x83, }; static const unsigned char ecdsa_secp224r1_sha224_2692_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2692_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0xee, 0xc1, 0x3b, 0x63, 0xfc, 0xb3, 0xd6, 0xe7, 0x36, 0x0a, 0xca, 0x56, 0x98, 0xf3, 0xef, 0x0f, 0x18, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2692 = { .name = "ecdsa_secp224r1_sha224_2692", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2692_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2692_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2692_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 110 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2693 for ECDSA, tcId is 111 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2693_pubkey[] = { 0x43, 0xc9, 0xcc, 0xd0, 0x8a, 0x80, 0xbc, 0xa1, 0x80, 0x22, 0x72, 0x2b, 0x0b, 0xdc, 0xd7, 0x90, 0xd8, 0x2a, 0x3e, 0xf8, 0xb6, 0x5c, 0x3f, 0x34, 0x20, 0x4b, 0xb4, 0x72, 0x9e, 0xe1, 0xc1, 0xf0, 0x05, 0x98, 0x13, 0x0b, 0x23, 0x13, 0xa3, 0xe3, 0x8a, 0x37, 0x98, 0xd0, 0x3d, 0xac, 0x66, 0x5c, 0xff, 0x20, 0xf3, 0x6c, 0xe8, 0xa2, 0x02, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha224_2693_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2693_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2693 = { .name = "ecdsa_secp224r1_sha224_2693", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2693_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2693_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2693_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 111 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2694 for ECDSA, tcId is 112 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2694_pubkey[] = { 0xd9, 0x58, 0xe4, 0x18, 0xfa, 0xd1, 0xc5, 0xea, 0x5c, 0x92, 0x3e, 0x61, 0x85, 0xe0, 0x3e, 0xd5, 0x53, 0x9d, 0x3f, 0x5f, 0x58, 0xdf, 0xac, 0x8b, 0xb9, 0xf1, 0x04, 0x59, 0x69, 0x97, 0xe4, 0x08, 0xc9, 0x7b, 0xe5, 0xfd, 0xc0, 0x37, 0xa5, 0xc0, 0x04, 0x38, 0x9d, 0x4b, 0x97, 0xeb, 0x1f, 0x54, 0x63, 0x5e, 0x98, 0x58, 0x53, 0xc1, 0xf0, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2694_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2694_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2694 = { .name = "ecdsa_secp224r1_sha224_2694", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2694_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2694_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2694_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 112 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2695 for ECDSA, tcId is 113 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2695_pubkey[] = { 0xd6, 0x29, 0xb4, 0x34, 0xc9, 0xb5, 0xd1, 0x57, 0xbd, 0x72, 0xe1, 0x14, 0xfd, 0x83, 0x95, 0x53, 0xf7, 0xf0, 0xe9, 0x46, 0x00, 0x93, 0x4a, 0x0a, 0x49, 0xe5, 0x9a, 0xa4, 0x71, 0x3a, 0x13, 0xc0, 0x17, 0x75, 0xe7, 0x5e, 0x2e, 0xba, 0xe7, 0x5d, 0x9e, 0x29, 0xd2, 0x50, 0x61, 0x84, 0x17, 0x7b, 0x7d, 0xd0, 0x86, 0x86, 0x93, 0x87, 0x35, 0x96, }; static const unsigned char ecdsa_secp224r1_sha224_2695_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2695_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd1, 0xbe, 0x91, 0x55, 0x7d, 0x86, 0x6a, 0xd5, 0xf2, 0x94, 0x5b, 0x14, 0xec, 0x33, 0x17, 0xbc, 0x43, 0xc1, 0x33, 0x8f, 0xd0, 0x6a, 0xf6, 0x49, 0x62, 0x01, 0xcc, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2695 = { .name = "ecdsa_secp224r1_sha224_2695", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2695_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2695_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2695_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 113 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2696 for ECDSA, tcId is 114 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2696_pubkey[] = { 0x3d, 0x2e, 0x9b, 0xb9, 0xa7, 0x12, 0xbf, 0x3a, 0xd4, 0x2a, 0xc3, 0x06, 0x59, 0xfd, 0xbd, 0xa9, 0xbe, 0x99, 0x56, 0x53, 0x7f, 0x9f, 0x37, 0xcd, 0x05, 0xf0, 0xff, 0x37, 0x7d, 0x59, 0x82, 0xd6, 0xd9, 0x26, 0x6d, 0x77, 0x49, 0x42, 0xc4, 0x4d, 0x9e, 0xb3, 0x50, 0x10, 0x51, 0xd3, 0xb9, 0x68, 0x86, 0x10, 0x13, 0x1e, 0x78, 0x56, 0xef, 0x36, }; static const unsigned char ecdsa_secp224r1_sha224_2696_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2696_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7a, 0xc5, 0x4a, 0x38, 0x1d, 0x9b, 0xd3, 0xf2, 0x69, 0x83, 0x59, 0xd6, 0xf6, 0x58, 0xb5, 0xe4, 0x16, 0x7d, 0x15, 0xa7, 0x5b, 0x57, 0x6e, 0x82, 0xd2, 0xef, 0xbd, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2696 = { .name = "ecdsa_secp224r1_sha224_2696", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2696_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2696_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2696_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 114 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2697 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2697_pubkey[] = { 0xa0, 0xbe, 0x2f, 0x10, 0x14, 0x4b, 0x9b, 0x42, 0xb0, 0x16, 0xf1, 0xbd, 0x9f, 0xca, 0x30, 0xe4, 0xc2, 0x4a, 0xae, 0x47, 0x75, 0x59, 0x6c, 0x7c, 0xdb, 0x07, 0xae, 0x60, 0xd6, 0x0f, 0xf3, 0xa7, 0x0f, 0x15, 0x41, 0x63, 0x1f, 0x60, 0x87, 0xd3, 0xf3, 0xb3, 0xfe, 0x37, 0x6d, 0x23, 0x05, 0xb5, 0x0b, 0x94, 0x82, 0x11, 0x06, 0x41, 0x24, 0x79, }; static const unsigned char ecdsa_secp224r1_sha224_2697_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2697_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4f, 0xbb, 0x06, 0x3e, 0x82, 0x40, 0x2e, 0x16, 0xfe, 0x14, 0xed, 0xda, 0x4d, 0x79, 0x86, 0xb0, 0xb8, 0x83, 0x44, 0xa1, 0xf5, 0x3b, 0x0e, 0x26, 0x84, 0xee, 0x7e, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2697 = { .name = "ecdsa_secp224r1_sha224_2697", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2697_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2697_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2697_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 115 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2698 for ECDSA, tcId is 116 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2698_pubkey[] = { 0x4d, 0x74, 0x39, 0x7a, 0x58, 0x6c, 0x8a, 0xc5, 0xe3, 0x26, 0xbe, 0xd0, 0x37, 0x20, 0xbd, 0xe7, 0x03, 0x7e, 0x4a, 0x07, 0xae, 0xe7, 0x20, 0x9f, 0x70, 0x49, 0x3c, 0xab, 0x10, 0x67, 0x78, 0xbf, 0xd0, 0x81, 0xd1, 0x7a, 0xb6, 0xdc, 0xb8, 0xfd, 0x8a, 0x45, 0x49, 0x62, 0x94, 0x1c, 0x26, 0xec, 0xc1, 0x9c, 0xda, 0x9f, 0xb7, 0x77, 0x19, 0xdb, }; static const unsigned char ecdsa_secp224r1_sha224_2698_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2698_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd3, 0xbe, 0x5f, 0x50, 0xd7, 0x26, 0xf9, 0x9b, 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6b, 0xfe, 0x78, 0xdd, 0x7a, 0xe6, 0x30, 0xd2, 0x27, 0xef, 0x0b, 0xa8, 0x7a, 0xe3, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2698 = { .name = "ecdsa_secp224r1_sha224_2698", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2698_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2698_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2698_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 116 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2699 for ECDSA, tcId is 117 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2699_pubkey[] = { 0x8c, 0x2f, 0x14, 0x9b, 0x17, 0x38, 0x24, 0x3f, 0x81, 0xa6, 0xf1, 0x21, 0x35, 0x39, 0x5a, 0x2b, 0xa2, 0x71, 0x88, 0x63, 0x62, 0x2e, 0x66, 0xe3, 0x3e, 0xfc, 0x24, 0x1f, 0x56, 0x38, 0xcf, 0x6a, 0xe9, 0xcf, 0xb3, 0x95, 0x78, 0xcf, 0x3a, 0x71, 0x97, 0x02, 0x05, 0x2e, 0x5e, 0x9e, 0x94, 0x02, 0x16, 0xc5, 0x13, 0x6d, 0xcb, 0x6e, 0xf0, 0x85, }; static const unsigned char ecdsa_secp224r1_sha224_2699_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2699_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xe5, 0xf5, 0x0d, 0x72, 0x6f, 0x99, 0xb8, 0xac, 0x44, 0xbf, 0xf8, 0x76, 0xcb, 0xf7, 0x10, 0xe4, 0x7f, 0x90, 0x87, 0xd1, 0xaf, 0xdf, 0xb1, 0xda, 0xb6, 0xd6, 0xda, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2699 = { .name = "ecdsa_secp224r1_sha224_2699", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2699_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2699_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2699_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 117 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2700 for ECDSA, tcId is 118 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2700_pubkey[] = { 0xad, 0x52, 0x27, 0xe4, 0x8a, 0xfa, 0xa1, 0x65, 0xe7, 0xb9, 0x7e, 0xf8, 0x21, 0x06, 0x87, 0x55, 0x6e, 0x10, 0x64, 0x3f, 0xda, 0x8a, 0x37, 0x7a, 0xaf, 0x4f, 0x5b, 0xf4, 0x12, 0xe8, 0x6d, 0x4a, 0xe5, 0x5f, 0x44, 0x60, 0xab, 0xa6, 0xa9, 0x32, 0xf3, 0x07, 0xee, 0x78, 0xef, 0xdc, 0x13, 0x6e, 0x9a, 0x3d, 0xf6, 0x31, 0x31, 0x00, 0xbf, 0x4f, }; static const unsigned char ecdsa_secp224r1_sha224_2700_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2700_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xcb, 0xea, 0x1a, 0xe4, 0xdf, 0x33, 0x71, 0x58, 0x89, 0x7f, 0xf0, 0xed, 0x97, 0xef, 0x0b, 0x26, 0x1e, 0x68, 0x1f, 0x65, 0x4b, 0xe2, 0x3a, 0x70, 0x11, 0x51, 0x8b, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2700 = { .name = "ecdsa_secp224r1_sha224_2700", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2700_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2700_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2700_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 118 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2701 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2701_pubkey[] = { 0x3f, 0xb9, 0x4a, 0x31, 0x65, 0xec, 0xde, 0xf4, 0x3f, 0xa2, 0x79, 0x07, 0xed, 0x07, 0x5c, 0xaf, 0x52, 0xc2, 0x54, 0x20, 0xac, 0x7b, 0xc7, 0xbb, 0x90, 0x40, 0x89, 0x92, 0x02, 0x3c, 0x4d, 0x7b, 0x47, 0x75, 0xb5, 0x91, 0xae, 0x22, 0x3d, 0xd4, 0xda, 0x9c, 0xea, 0xab, 0xd7, 0x3b, 0x97, 0x43, 0xdd, 0xab, 0x8b, 0x40, 0x57, 0x6e, 0x39, 0x3f, }; static const unsigned char ecdsa_secp224r1_sha224_2701_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2701_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd7, 0x26, 0xf9, 0x9b, 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0x2a, 0xa0, 0x7e, 0xc3, 0xcb, 0x1d, 0x94, 0x72, 0xbd, 0x70, 0x4f, 0x40, 0x29, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2701 = { .name = "ecdsa_secp224r1_sha224_2701", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2701_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2701_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2701_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 119 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2702 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2702_pubkey[] = { 0xe4, 0x5f, 0xcf, 0x0a, 0x7f, 0x4d, 0xc2, 0xa3, 0x08, 0xdc, 0x78, 0x68, 0x25, 0x14, 0x23, 0xfb, 0xf7, 0x1a, 0x20, 0x5a, 0x95, 0x46, 0x85, 0x0a, 0x01, 0xa7, 0x32, 0xfc, 0x9a, 0x73, 0xca, 0x4d, 0x41, 0x17, 0x50, 0x76, 0xf2, 0xf3, 0x62, 0xb2, 0x76, 0xec, 0xb0, 0xcc, 0xdb, 0x6e, 0x0b, 0xb3, 0x0c, 0x4a, 0x1b, 0x35, 0xc2, 0xe3, 0xed, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2702_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2702_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x97, 0x20, 0xb7, 0x55, 0x41, 0x3c, 0xca, 0x95, 0x06, 0xb5, 0xd2, 0x75, 0x89, 0xe5, 0x8a, 0xc4, 0xbe, 0xd8, 0x56, 0x76, 0x2b, 0xa7, 0xae, 0x20, 0xab, 0x5b, 0x43, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2702 = { .name = "ecdsa_secp224r1_sha224_2702", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2702_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2702_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2702_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 120 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2703 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2703_pubkey[] = { 0x3c, 0x59, 0xe1, 0x39, 0x82, 0xfd, 0x9c, 0x1a, 0x45, 0x99, 0x1b, 0x1e, 0x9d, 0x79, 0xe9, 0x39, 0xa5, 0x2a, 0x62, 0xca, 0x47, 0x97, 0x64, 0xf1, 0x47, 0x7e, 0x28, 0x13, 0x1b, 0x00, 0x4c, 0x9b, 0xff, 0xd7, 0xf0, 0x0c, 0x05, 0xe3, 0x16, 0x8c, 0x62, 0x5c, 0xc9, 0x3a, 0xb7, 0xa0, 0xf1, 0xba, 0x8d, 0x6f, 0xa2, 0x6a, 0x4d, 0x51, 0x62, 0xcb, }; static const unsigned char ecdsa_secp224r1_sha224_2703_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2703_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2e, 0x41, 0x6e, 0xaa, 0x82, 0x79, 0x95, 0x2a, 0x0d, 0x6b, 0xa4, 0xeb, 0x13, 0xcb, 0xfe, 0xe6, 0x9c, 0xf7, 0xbc, 0xae, 0x43, 0x72, 0x32, 0xfb, 0xfa, 0x5a, 0x5d, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2703 = { .name = "ecdsa_secp224r1_sha224_2703", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2703_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2703_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2703_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 121 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2704 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2704_pubkey[] = { 0xc6, 0xb8, 0xff, 0x15, 0x2d, 0x7a, 0x1b, 0x7a, 0x99, 0xce, 0x34, 0x83, 0xbd, 0xea, 0xaf, 0x5b, 0xd2, 0xce, 0x64, 0xdc, 0x6b, 0x0f, 0x89, 0xcf, 0x35, 0x44, 0xb8, 0x7c, 0x05, 0x3a, 0xb6, 0xcf, 0x9c, 0xb5, 0x10, 0xdc, 0x14, 0x40, 0xab, 0x4e, 0x41, 0x2a, 0x16, 0x7f, 0x4c, 0x69, 0x36, 0x5f, 0xcf, 0xc9, 0x7f, 0x31, 0xd5, 0xba, 0x45, 0x81, }; static const unsigned char ecdsa_secp224r1_sha224_2704_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2704_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc5, 0x62, 0x25, 0xff, 0xc3, 0xb6, 0x5f, 0xbf, 0x14, 0x21, 0x77, 0x60, 0x9d, 0xb1, 0x89, 0xab, 0x5b, 0xd0, 0x13, 0x24, 0x6f, 0x19, 0xe1, 0x1c, 0xa5, 0xb5, 0xa1, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2704 = { .name = "ecdsa_secp224r1_sha224_2704", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2704_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2704_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2704_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 122 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2705 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2705_pubkey[] = { 0x7c, 0x07, 0x72, 0xfb, 0x65, 0x53, 0xc0, 0xec, 0x0d, 0xd1, 0xf7, 0x3b, 0x5d, 0xb3, 0x80, 0x76, 0x4d, 0x9f, 0x2f, 0x7a, 0xfb, 0x4e, 0xac, 0x1e, 0x77, 0x4d, 0xac, 0xd5, 0x6e, 0x2e, 0x5d, 0xe0, 0xdb, 0x63, 0xbf, 0x03, 0xcf, 0x96, 0x75, 0xea, 0xe6, 0xd2, 0xdf, 0xe5, 0x42, 0x4e, 0x79, 0xab, 0x39, 0x49, 0x51, 0xc9, 0xb6, 0x0a, 0xd5, 0xdf, }; static const unsigned char ecdsa_secp224r1_sha224_2705_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2705_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa7, 0xdd, 0x83, 0x1f, 0x41, 0x20, 0x17, 0x0b, 0x7f, 0x0a, 0x76, 0xed, 0x26, 0xbc, 0x4e, 0xa9, 0xcc, 0x9e, 0x1a, 0x70, 0x04, 0x8c, 0x1b, 0xb5, 0xf0, 0xa5, 0x54, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2705 = { .name = "ecdsa_secp224r1_sha224_2705", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2705_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2705_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2705_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 123 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2706 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2706_pubkey[] = { 0x41, 0x08, 0xe0, 0xcc, 0xd4, 0x7c, 0xba, 0x09, 0xfb, 0x7e, 0xd4, 0xd9, 0xf3, 0x45, 0x58, 0x23, 0x78, 0x09, 0x65, 0x15, 0x78, 0x61, 0xc1, 0xbf, 0x8f, 0x93, 0xd3, 0x4b, 0x46, 0xd6, 0xfd, 0xb7, 0x1e, 0x9e, 0x89, 0xad, 0xaa, 0xe7, 0x13, 0x76, 0xb1, 0x3f, 0xd1, 0x76, 0x44, 0xb1, 0x1e, 0xed, 0x00, 0xd4, 0x98, 0x78, 0x3d, 0xa0, 0xba, 0x1a, }; static const unsigned char ecdsa_secp224r1_sha224_2706_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2706_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2706 = { .name = "ecdsa_secp224r1_sha224_2706", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2706_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2706_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2706_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 124 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2707 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2707_pubkey[] = { 0x2f, 0x2d, 0xa4, 0x0a, 0x1b, 0x72, 0xf6, 0x7b, 0xa6, 0x36, 0x13, 0xa2, 0x43, 0x11, 0x9c, 0x41, 0xc7, 0x25, 0x28, 0x39, 0xcf, 0x10, 0x6e, 0x86, 0xb5, 0xd8, 0xe6, 0xe3, 0x5a, 0x1e, 0x0e, 0x2f, 0xc4, 0x9b, 0x4f, 0x31, 0x6f, 0x0c, 0x0e, 0x72, 0x36, 0x78, 0x57, 0x49, 0xeb, 0x34, 0xce, 0x92, 0x3c, 0x23, 0xae, 0xf3, 0x30, 0xaf, 0x87, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2707_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2707_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2707 = { .name = "ecdsa_secp224r1_sha224_2707", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2707_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2707_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2707_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 125 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2708 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2708_pubkey[] = { 0x7d, 0xc0, 0x97, 0x10, 0xf4, 0xf5, 0x86, 0xaf, 0x05, 0xb0, 0x8f, 0x0c, 0x9d, 0xcd, 0x48, 0xb1, 0x30, 0x87, 0x33, 0xc9, 0x77, 0x67, 0xfc, 0x28, 0x6d, 0x1c, 0x72, 0x83, 0x43, 0x53, 0xa7, 0x04, 0xc7, 0x95, 0x0b, 0x8f, 0x4a, 0x11, 0x39, 0x4b, 0xc8, 0xdb, 0x06, 0xad, 0xcc, 0xf1, 0x9d, 0x8e, 0xd9, 0x5c, 0x7f, 0x21, 0x4a, 0x17, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha224_2708_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2708_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2708 = { .name = "ecdsa_secp224r1_sha224_2708", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2708_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2708_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2708_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 126 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2709 for ECDSA, tcId is 127 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2709_pubkey[] = { 0xdb, 0xb4, 0x39, 0xe2, 0xc3, 0xe9, 0xd1, 0x82, 0x2b, 0x94, 0xcc, 0xc7, 0xd9, 0x8c, 0x9f, 0xcb, 0x66, 0x8e, 0x65, 0xdd, 0x6a, 0x75, 0x9a, 0xd2, 0xdf, 0xdc, 0xd3, 0x28, 0x82, 0x66, 0x32, 0x34, 0xe6, 0xda, 0x51, 0x2d, 0x7d, 0x7d, 0x5f, 0xe7, 0x91, 0x56, 0xad, 0x0e, 0x19, 0xff, 0xc6, 0x2d, 0x61, 0x8e, 0x3c, 0xf4, 0x82, 0x76, 0x10, 0x6d, }; static const unsigned char ecdsa_secp224r1_sha224_2709_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2709_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2709 = { .name = "ecdsa_secp224r1_sha224_2709", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2709_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2709_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2709_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 127 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2710 for ECDSA, tcId is 128 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2710_pubkey[] = { 0xe0, 0x12, 0xdc, 0x20, 0xcc, 0xa5, 0xbd, 0x2a, 0xdf, 0xaa, 0x27, 0xf5, 0x74, 0x19, 0x59, 0x6c, 0xe0, 0x9e, 0xd0, 0xf1, 0x8a, 0x91, 0x48, 0xe3, 0x0a, 0x0f, 0x6e, 0xd2, 0x55, 0xbe, 0xca, 0x1b, 0x5e, 0x3e, 0x24, 0x85, 0xef, 0x95, 0x37, 0xae, 0x48, 0xa6, 0x7b, 0x72, 0xdb, 0xcf, 0x6d, 0x7b, 0x33, 0x37, 0x20, 0x23, 0xa5, 0xc4, 0x43, 0xe8, }; static const unsigned char ecdsa_secp224r1_sha224_2710_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2710_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2710 = { .name = "ecdsa_secp224r1_sha224_2710", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2710_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2710_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2710_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 128 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2711 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2711_pubkey[] = { 0xc5, 0x10, 0xab, 0x34, 0xab, 0xd4, 0x85, 0x5c, 0x54, 0xd6, 0x24, 0x07, 0xab, 0xe6, 0xca, 0x09, 0x0c, 0x73, 0xba, 0x49, 0xac, 0xa9, 0xde, 0x9b, 0xf1, 0x17, 0xbc, 0xa2, 0x42, 0xb3, 0xb0, 0x0c, 0x27, 0x2c, 0x22, 0x68, 0x1a, 0xf7, 0xc2, 0x55, 0x12, 0x0f, 0xac, 0x14, 0x8a, 0xd7, 0x3c, 0x81, 0xb4, 0x78, 0x46, 0xe4, 0xad, 0x2f, 0x56, 0x27, }; static const unsigned char ecdsa_secp224r1_sha224_2711_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2711_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2711 = { .name = "ecdsa_secp224r1_sha224_2711", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2711_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2711_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2711_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 129 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2712 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2712_pubkey[] = { 0x08, 0xa6, 0xe1, 0x67, 0x53, 0x6a, 0x47, 0xaa, 0xa2, 0x24, 0xfe, 0xc2, 0x1c, 0xe0, 0x77, 0x64, 0x2e, 0xfd, 0xb9, 0x7d, 0x93, 0xae, 0x16, 0xb9, 0x67, 0x22, 0x79, 0xf4, 0x33, 0xfb, 0x9f, 0x1a, 0xbb, 0x25, 0xf2, 0xc0, 0xc3, 0xe6, 0x00, 0x8a, 0xc8, 0x57, 0xed, 0xe4, 0xa8, 0x9c, 0xa8, 0xd9, 0xd0, 0x8b, 0x89, 0x96, 0x61, 0x49, 0x69, 0xac, }; static const unsigned char ecdsa_secp224r1_sha224_2712_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2712_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2712 = { .name = "ecdsa_secp224r1_sha224_2712", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2712_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2712_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2712_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 130 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2713 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2713_pubkey[] = { 0x1a, 0x83, 0xe1, 0x85, 0xfc, 0xf3, 0x0e, 0x6c, 0x69, 0xcf, 0x29, 0x2e, 0x49, 0x7d, 0x63, 0xcc, 0x04, 0xe6, 0xfd, 0x07, 0xcb, 0x93, 0x65, 0xa7, 0x4b, 0xe3, 0xc3, 0x9c, 0x6b, 0x2d, 0x56, 0x24, 0x7d, 0xf4, 0x9c, 0xf9, 0x41, 0x76, 0xc4, 0xe8, 0xef, 0xc8, 0x4e, 0xc7, 0x10, 0xcd, 0x0d, 0x61, 0x4d, 0xd0, 0x66, 0xc1, 0x6f, 0x6a, 0xd3, 0xe0, }; static const unsigned char ecdsa_secp224r1_sha224_2713_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2713_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2713 = { .name = "ecdsa_secp224r1_sha224_2713", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2713_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2713_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2713_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 131 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2714 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2714_pubkey[] = { 0x2d, 0x59, 0xef, 0xd8, 0x41, 0xa4, 0x4b, 0x83, 0xfd, 0x42, 0xe6, 0xa2, 0x98, 0x4a, 0x53, 0xfa, 0x93, 0xad, 0x24, 0x2c, 0x11, 0x67, 0x8f, 0x92, 0x20, 0x2c, 0xcc, 0xfb, 0x95, 0xbc, 0xaf, 0x0b, 0x2f, 0x6e, 0xb0, 0xe6, 0xd4, 0xd8, 0x3e, 0x32, 0x60, 0xe0, 0x37, 0xd3, 0xdc, 0x0e, 0x48, 0xab, 0x6c, 0x41, 0x41, 0xce, 0x6b, 0x56, 0xca, 0xd0, }; static const unsigned char ecdsa_secp224r1_sha224_2714_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2714_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2714 = { .name = "ecdsa_secp224r1_sha224_2714", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2714_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2714_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2714_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 132 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2715 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2715_pubkey[] = { 0x11, 0x61, 0xc7, 0xad, 0xd6, 0xf6, 0x7f, 0x99, 0x5b, 0x93, 0xe1, 0x9e, 0xb1, 0x8b, 0xd5, 0xe7, 0x3f, 0xd7, 0x1d, 0x6b, 0xb1, 0x0d, 0xce, 0xef, 0x0b, 0x79, 0x2e, 0x9c, 0x08, 0xc4, 0x4c, 0xef, 0x98, 0x26, 0xb4, 0xed, 0x67, 0x50, 0x8c, 0x09, 0xd0, 0x7e, 0xc8, 0x57, 0xa0, 0xea, 0x49, 0xed, 0x1a, 0x7f, 0x1f, 0xa2, 0xc7, 0x4c, 0xb8, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2715_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2715_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2715 = { .name = "ecdsa_secp224r1_sha224_2715", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2715_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2715_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2715_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 133 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2716 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2716_pubkey[] = { 0x84, 0xdc, 0x3d, 0x2e, 0xbf, 0xcf, 0x34, 0x80, 0x71, 0x3b, 0xae, 0xff, 0x30, 0xad, 0x07, 0x81, 0xbc, 0x8c, 0x4d, 0x06, 0xab, 0x6d, 0xdd, 0x4f, 0x7f, 0x10, 0x45, 0xaf, 0x75, 0x70, 0x53, 0x7c, 0x5d, 0x71, 0xa7, 0x8b, 0x1a, 0x04, 0x1a, 0xca, 0x0f, 0xe3, 0x5f, 0x64, 0x28, 0x24, 0xab, 0xda, 0x8c, 0x3f, 0xf2, 0xe9, 0xfc, 0xf5, 0xc8, 0xcb, }; static const unsigned char ecdsa_secp224r1_sha224_2716_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2716_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2716 = { .name = "ecdsa_secp224r1_sha224_2716", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2716_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2716_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2716_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 134 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2717 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2717_pubkey[] = { 0x17, 0x67, 0x57, 0x4e, 0x64, 0x5c, 0x55, 0x0e, 0xf3, 0xd3, 0x53, 0xf7, 0x6d, 0x44, 0x28, 0xf9, 0x61, 0x6a, 0xc2, 0x88, 0xb3, 0x63, 0x78, 0x85, 0x7d, 0xe3, 0x32, 0x62, 0x9f, 0xe0, 0x98, 0x25, 0xa5, 0x7f, 0x3a, 0x0e, 0xc1, 0x11, 0x89, 0xf4, 0x56, 0x02, 0x72, 0x29, 0x7a, 0xb6, 0xd5, 0xe0, 0x95, 0x40, 0x1f, 0xeb, 0xb6, 0x0d, 0x0d, 0xc9, }; static const unsigned char ecdsa_secp224r1_sha224_2717_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2717_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x1e, 0xf3, 0x59, 0xe4, 0xbd, 0x14, 0x6f, 0x63, 0xd8, 0x15, 0x5c, 0x5c, 0x25, 0x23, 0xfa, 0x33, 0x53, 0xc9, 0x82, 0x0f, 0x84, 0xf2, 0x81, 0x50, 0xba, 0xd3, 0x81, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2717 = { .name = "ecdsa_secp224r1_sha224_2717", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2717_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2717_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2717_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 135 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2718 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2718_pubkey[] = { 0x17, 0x67, 0x57, 0x4e, 0x64, 0x5c, 0x55, 0x0e, 0xf3, 0xd3, 0x53, 0xf7, 0x6d, 0x44, 0x28, 0xf9, 0x61, 0x6a, 0xc2, 0x88, 0xb3, 0x63, 0x78, 0x85, 0x7d, 0xe3, 0x32, 0x62, 0x60, 0x1f, 0x67, 0xda, 0x5a, 0x80, 0xc5, 0xf1, 0x3e, 0xee, 0x76, 0x0b, 0xa9, 0xfd, 0x8d, 0xd5, 0x85, 0x49, 0x2a, 0x1f, 0x6a, 0xbf, 0xe0, 0x14, 0x49, 0xf2, 0xf2, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2718_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2718_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x1e, 0xf3, 0x59, 0xe4, 0xbd, 0x14, 0x6f, 0x63, 0xd8, 0x15, 0x5c, 0x5c, 0x25, 0x23, 0xfa, 0x33, 0x53, 0xc9, 0x82, 0x0f, 0x84, 0xf2, 0x81, 0x50, 0xba, 0xd3, 0x81, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2718 = { .name = "ecdsa_secp224r1_sha224_2718", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2718_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2718_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2718_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 136 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2719 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2719_pubkey[] = { 0xe2, 0xef, 0x8c, 0x8c, 0xcb, 0x58, 0xeb, 0xa2, 0x87, 0xd9, 0x27, 0x9b, 0x34, 0x9e, 0x76, 0x52, 0xcc, 0xa3, 0xe7, 0xcd, 0xa1, 0x88, 0xa5, 0xf1, 0x79, 0xd7, 0x71, 0x42, 0xf8, 0x75, 0x94, 0xf3, 0x66, 0x4c, 0x0f, 0xaf, 0x7b, 0x59, 0x67, 0x0e, 0x35, 0x3a, 0x37, 0x0d, 0x1d, 0x68, 0xad, 0x89, 0xd6, 0xa1, 0xe2, 0x46, 0xb4, 0xd0, 0x3b, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2719_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2719_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2719 = { .name = "ecdsa_secp224r1_sha224_2719", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2719_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2719_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2719_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 137 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2720 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2720_pubkey[] = { 0xb8, 0xbf, 0x3e, 0xf9, 0x64, 0x6a, 0xbf, 0xff, 0xb8, 0x42, 0x20, 0x10, 0x4e, 0xc9, 0x96, 0xa9, 0x2c, 0xef, 0x33, 0xf9, 0x32, 0x8e, 0xc4, 0xcb, 0x1e, 0xa6, 0x99, 0x48, 0x4f, 0xea, 0x51, 0xa0, 0xde, 0x9e, 0x9d, 0x80, 0x1b, 0xab, 0xd4, 0x2c, 0xa0, 0x92, 0x4b, 0x36, 0x49, 0x8b, 0xc5, 0x90, 0x0f, 0xbe, 0xb9, 0xcb, 0xd5, 0xad, 0x9c, 0x1a, }; static const unsigned char ecdsa_secp224r1_sha224_2720_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2720_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2720 = { .name = "ecdsa_secp224r1_sha224_2720", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2720_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2720_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2720_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 138 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2721 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2721_pubkey[] = { 0x28, 0x6e, 0x80, 0x42, 0x9c, 0x87, 0x96, 0xdc, 0xd8, 0x85, 0xd9, 0x5f, 0x96, 0x0d, 0x20, 0x9f, 0xed, 0x19, 0xf8, 0x7e, 0x2c, 0xe4, 0x23, 0xd1, 0x66, 0xc8, 0xe2, 0x20, 0x2e, 0x30, 0x88, 0x2c, 0x09, 0x97, 0x0d, 0x5d, 0xd5, 0x8b, 0x67, 0xe5, 0xbb, 0x80, 0xaf, 0xfe, 0xc7, 0x42, 0x48, 0xa9, 0xcb, 0x4a, 0x78, 0x33, 0x84, 0xc8, 0xb6, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha224_2721_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2721_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2721 = { .name = "ecdsa_secp224r1_sha224_2721", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2721_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2721_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2721_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 139 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2722 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2722_pubkey[] = { 0x55, 0x99, 0xa3, 0xfa, 0xf9, 0x6a, 0xba, 0x73, 0x02, 0xbd, 0x3d, 0x98, 0xcf, 0xde, 0x69, 0x52, 0x5b, 0x72, 0x92, 0x76, 0x23, 0x83, 0xf4, 0xa0, 0xb5, 0xc3, 0x10, 0x39, 0x3f, 0xaa, 0x45, 0xfe, 0xb6, 0xc3, 0x5d, 0x2b, 0x7b, 0xf2, 0x5f, 0xfc, 0x63, 0x3c, 0x42, 0x0e, 0xbf, 0xc4, 0xe7, 0x15, 0x76, 0x53, 0x02, 0xc5, 0xa1, 0x1a, 0xc7, 0x93, }; static const unsigned char ecdsa_secp224r1_sha224_2722_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2722_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2722 = { .name = "ecdsa_secp224r1_sha224_2722", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2722_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2722_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2722_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 140 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2723 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2723_pubkey[] = { 0x5b, 0x52, 0x34, 0xb8, 0xdb, 0x6b, 0xbd, 0x39, 0x6e, 0xae, 0x7d, 0x1c, 0xa4, 0xe6, 0xd8, 0x77, 0x82, 0x4c, 0x98, 0xcd, 0xe9, 0xfb, 0xfa, 0xb3, 0x4b, 0x6b, 0x8c, 0xcb, 0x1f, 0x38, 0xae, 0x9f, 0x87, 0xad, 0xc3, 0xe6, 0xd2, 0x47, 0x4e, 0xb5, 0xe3, 0xcd, 0x9a, 0xef, 0xf0, 0x92, 0x73, 0x20, 0x21, 0x4b, 0xe5, 0x50, 0xf5, 0xe6, 0x2e, 0xd4, }; static const unsigned char ecdsa_secp224r1_sha224_2723_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2723_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2723 = { .name = "ecdsa_secp224r1_sha224_2723", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2723_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2723_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2723_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 141 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2724 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2724_pubkey[] = { 0xac, 0xed, 0x4e, 0xa8, 0x94, 0x9e, 0x5a, 0xe3, 0x7e, 0xf2, 0xf5, 0xeb, 0x5e, 0x00, 0x67, 0x5d, 0x08, 0xe1, 0x7c, 0x34, 0xbe, 0x66, 0x77, 0xb0, 0xf2, 0x69, 0xb6, 0x72, 0x5e, 0x3a, 0xd0, 0xaf, 0x49, 0xeb, 0xff, 0xf4, 0x15, 0xee, 0x4f, 0x2a, 0x83, 0x8e, 0xad, 0x1f, 0x84, 0xca, 0xfa, 0xa6, 0x52, 0xc1, 0x7a, 0xcc, 0x26, 0x13, 0x07, 0x25, }; static const unsigned char ecdsa_secp224r1_sha224_2724_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2724_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2724 = { .name = "ecdsa_secp224r1_sha224_2724", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2724_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2724_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2724_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 142 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2725 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2725_pubkey[] = { 0x3e, 0x8c, 0x1b, 0xcc, 0x16, 0x19, 0x5e, 0x87, 0x69, 0xe2, 0x5d, 0x4c, 0x85, 0x98, 0x07, 0xdf, 0xfe, 0x17, 0x8b, 0xed, 0x5b, 0xca, 0x9d, 0xb0, 0x6e, 0xfa, 0x15, 0x32, 0x4e, 0x3b, 0x53, 0xb3, 0x04, 0x8b, 0x8c, 0xcd, 0x8c, 0xdc, 0x12, 0x65, 0xbe, 0x24, 0x0c, 0x8e, 0xe2, 0x04, 0x06, 0x04, 0x86, 0xa9, 0x9a, 0xd3, 0x1e, 0xaa, 0xd3, 0xa4, }; static const unsigned char ecdsa_secp224r1_sha224_2725_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2725_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2725 = { .name = "ecdsa_secp224r1_sha224_2725", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2725_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2725_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2725_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 143 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2726 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2726_pubkey[] = { 0x24, 0x81, 0x93, 0x23, 0xb7, 0xbe, 0x8a, 0xb0, 0x91, 0x0f, 0x7f, 0x33, 0xbd, 0x2f, 0x76, 0x69, 0xc4, 0x4b, 0x13, 0xf0, 0x94, 0x79, 0x96, 0x5e, 0x95, 0x28, 0x7d, 0x13, 0xb0, 0x59, 0x23, 0x45, 0xbe, 0xaf, 0xbf, 0xdb, 0x8c, 0xf3, 0x62, 0x92, 0x69, 0xbd, 0xd8, 0x17, 0x72, 0x8d, 0x5d, 0x5c, 0xd3, 0xc2, 0x8b, 0xc6, 0xc6, 0x41, 0x4a, 0x70, }; static const unsigned char ecdsa_secp224r1_sha224_2726_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2726_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2726 = { .name = "ecdsa_secp224r1_sha224_2726", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2726_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2726_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2726_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 144 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2727 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2727_pubkey[] = { 0x44, 0xcf, 0x57, 0xba, 0xc3, 0x0a, 0x83, 0xda, 0x39, 0xf9, 0x0b, 0xf3, 0xfa, 0xac, 0xd5, 0x22, 0x11, 0xa7, 0x0f, 0xb9, 0x25, 0x47, 0xdb, 0x77, 0x78, 0xea, 0x6c, 0x81, 0x2b, 0x3f, 0xd1, 0xbf, 0x14, 0x68, 0x8d, 0x27, 0x70, 0xc5, 0x0c, 0xd5, 0xa8, 0x90, 0xa3, 0x80, 0x7b, 0xa0, 0xe8, 0x61, 0x21, 0x36, 0xa1, 0xb1, 0x1e, 0x03, 0x0f, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2727_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2727_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2727 = { .name = "ecdsa_secp224r1_sha224_2727", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2727_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2727_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2727_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 145 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2728 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2728_pubkey[] = { 0xdc, 0x17, 0xf1, 0x00, 0x1d, 0x32, 0x61, 0x27, 0xf7, 0x37, 0x5c, 0xff, 0xa7, 0x0b, 0x75, 0x30, 0xbc, 0xa4, 0xda, 0x10, 0x40, 0xdc, 0x43, 0xd0, 0x04, 0x4a, 0xac, 0xa0, 0x7a, 0x14, 0x6f, 0x04, 0xc5, 0x29, 0x4c, 0xfe, 0x7e, 0x1e, 0xd5, 0x87, 0xda, 0x55, 0xba, 0xe7, 0x0b, 0x7f, 0xa8, 0xe3, 0x2f, 0x6a, 0xa8, 0x00, 0x31, 0x4d, 0x01, 0xdd, }; static const unsigned char ecdsa_secp224r1_sha224_2728_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2728_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2728 = { .name = "ecdsa_secp224r1_sha224_2728", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2728_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2728_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2728_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 146 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2729 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2729_pubkey[] = { 0x68, 0xe2, 0xd7, 0x08, 0x8e, 0xac, 0x18, 0xba, 0x77, 0x5b, 0xf6, 0x8c, 0x5c, 0x50, 0x9e, 0x86, 0xaf, 0xd6, 0xf9, 0x34, 0x51, 0xb4, 0xe4, 0xee, 0x1d, 0x73, 0xe2, 0x77, 0xe2, 0x4f, 0xf4, 0xe2, 0x7e, 0xf6, 0xc5, 0x19, 0xdb, 0x67, 0x6d, 0x82, 0x2c, 0x5d, 0xb0, 0x40, 0x48, 0x28, 0x88, 0x01, 0x3c, 0x8f, 0x38, 0x81, 0xbc, 0x9a, 0xc6, 0x5a, }; static const unsigned char ecdsa_secp224r1_sha224_2729_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2729_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2729 = { .name = "ecdsa_secp224r1_sha224_2729", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2729_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2729_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2729_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 147 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2730 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2730_pubkey[] = { 0xcd, 0x41, 0x71, 0xad, 0xcb, 0x8b, 0xe7, 0x5e, 0x77, 0x34, 0x06, 0x1a, 0x04, 0x8b, 0x2b, 0xf2, 0x28, 0xd1, 0x67, 0xc2, 0x74, 0x2d, 0x27, 0xf8, 0x54, 0x39, 0x20, 0x46, 0x86, 0x5e, 0xb9, 0x58, 0xeb, 0xd3, 0x20, 0xba, 0x87, 0x66, 0x2a, 0xd3, 0xac, 0x7a, 0xf5, 0x68, 0xc6, 0xbe, 0x0f, 0x09, 0xbe, 0x09, 0x0b, 0xcf, 0xe0, 0x83, 0xb3, 0xe5, }; static const unsigned char ecdsa_secp224r1_sha224_2730_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2730_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2730 = { .name = "ecdsa_secp224r1_sha224_2730", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2730_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2730_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2730_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 148 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2731 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2731_pubkey[] = { 0xee, 0xfd, 0xf9, 0x9a, 0xb6, 0x9d, 0x18, 0x88, 0x77, 0x2c, 0xab, 0xe2, 0x1d, 0x40, 0x60, 0x45, 0xe1, 0xbe, 0xab, 0x82, 0x76, 0x1a, 0x70, 0x40, 0xbe, 0xeb, 0x7e, 0xd3, 0x59, 0x71, 0x8c, 0x88, 0x9a, 0xf8, 0x0f, 0x22, 0xf3, 0x20, 0xfb, 0xe6, 0x62, 0xd5, 0xea, 0x0f, 0x65, 0xdf, 0xb4, 0xa5, 0x58, 0x9c, 0x29, 0x4c, 0xe5, 0xb7, 0x33, 0x59, }; static const unsigned char ecdsa_secp224r1_sha224_2731_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2731_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2731 = { .name = "ecdsa_secp224r1_sha224_2731", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2731_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2731_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2731_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 149 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2732 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2732_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2732_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2732_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2732 = { .name = "ecdsa_secp224r1_sha224_2732", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2732_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2732_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2732_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 150 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2733 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2733_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2733_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2733_sig[] = { 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0xee, 0xc1, 0x3b, 0x63, 0xfc, 0xb3, 0xd6, 0xe7, 0x36, 0x0a, 0xca, 0x56, 0x98, 0xf3, 0xef, 0x0f, 0x18, 0x11, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2733 = { .name = "ecdsa_secp224r1_sha224_2733", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2733_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2733_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2733_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 151 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2734 for ECDSA, tcId is 152 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2734_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha224_2734_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2734_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2734 = { .name = "ecdsa_secp224r1_sha224_2734", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2734_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2734_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2734_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 152 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2735 for ECDSA, tcId is 153 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2735_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha224_2735_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2735_sig[] = { 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0xee, 0xc1, 0x3b, 0x63, 0xfc, 0xb3, 0xd6, 0xe7, 0x36, 0x0a, 0xca, 0x56, 0x98, 0xf3, 0xef, 0x0f, 0x18, 0x11, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2735 = { .name = "ecdsa_secp224r1_sha224_2735", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2735_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2735_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2735_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 153 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2736 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2736_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2736_sig[] = { 0x27, 0x70, 0x40, 0x3d, 0x42, 0xb7, 0xb4, 0x5e, 0x55, 0x33, 0x08, 0xd1, 0xf6, 0xa4, 0x80, 0x64, 0x0b, 0x61, 0xca, 0xc0, 0xae, 0x36, 0x66, 0x5d, 0x6f, 0x14, 0xd3, 0x4e, 0x85, 0x50, 0x6b, 0x04, 0x04, 0x26, 0x5e, 0xde, 0xdf, 0x9a, 0x89, 0xfc, 0x7c, 0x9c, 0x7a, 0x55, 0xc1, 0x6c, 0x5b, 0x0d, 0x78, 0x1f, 0x77, 0x4d, 0xe8, 0xf4, 0x6f, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2736 = { .name = "ecdsa_secp224r1_sha224_2736", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2736_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha224_2736_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 154 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2737 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2737_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2737_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha224_2737_sig[] = { 0xb6, 0x8d, 0xa7, 0x22, 0xbb, 0xba, 0x7f, 0x6a, 0x58, 0x41, 0x7b, 0xb5, 0xd0, 0xdd, 0x88, 0xf4, 0x03, 0x16, 0xfc, 0x62, 0x8b, 0x0e, 0xdf, 0xcb, 0x0f, 0x02, 0xb0, 0x62, 0x5c, 0x74, 0x2e, 0x33, 0x0b, 0x6f, 0xeb, 0xad, 0xf9, 0xa1, 0x2d, 0x58, 0xba, 0x2a, 0x71, 0x99, 0x62, 0x94, 0x57, 0xef, 0x2e, 0x9e, 0x4c, 0xec, 0xd2, 0xf0, 0x9f, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2737 = { .name = "ecdsa_secp224r1_sha224_2737", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2737_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2737_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha224_2737_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 155 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2738 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2738_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2738_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2738_sig[] = { 0x01, 0xec, 0x1f, 0xf1, 0x5c, 0x8a, 0x55, 0xd6, 0x97, 0xa5, 0x42, 0x4d, 0x67, 0x47, 0x53, 0xf8, 0x2f, 0x71, 0x15, 0x93, 0x82, 0x83, 0x68, 0xd2, 0xfb, 0xb4, 0x1a, 0x17, 0x20, 0xd9, 0x08, 0x9d, 0xb7, 0xba, 0xf4, 0x6b, 0x81, 0x35, 0xe1, 0x7e, 0x01, 0x64, 0x5e, 0x73, 0x2d, 0x22, 0xd5, 0xad, 0xb2, 0x0e, 0x37, 0x72, 0xda, 0x74, 0x0e, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2738 = { .name = "ecdsa_secp224r1_sha224_2738", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2738_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2738_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2738_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 156 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2739 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2739_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2739_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2739_sig[] = { 0x3e, 0x46, 0xe9, 0xba, 0x4d, 0xc0, 0x89, 0xff, 0x30, 0xfa, 0x8c, 0x02, 0x09, 0xc3, 0x1b, 0x11, 0xff, 0x49, 0xdb, 0xee, 0xc0, 0x90, 0xf9, 0xf5, 0x3c, 0x00, 0x0c, 0x75, 0x6f, 0x2e, 0x3b, 0x36, 0x36, 0x94, 0x16, 0x60, 0x2b, 0xca, 0x83, 0x20, 0x68, 0x09, 0xed, 0x89, 0x8f, 0xcf, 0x15, 0x8a, 0x56, 0xc2, 0x5a, 0x54, 0x74, 0x14, 0x3f, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2739 = { .name = "ecdsa_secp224r1_sha224_2739", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2739_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2739_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha224_2739_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 157 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2740 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2740_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2740_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2740_sig[] = { 0x77, 0xb3, 0x8d, 0xa3, 0x70, 0x79, 0xd2, 0x7b, 0x83, 0x76, 0x13, 0xac, 0x3e, 0x82, 0x48, 0xd6, 0x6e, 0xab, 0xd5, 0xd6, 0x37, 0x07, 0x6c, 0x8e, 0x62, 0xc7, 0x99, 0x1e, 0xd4, 0x0c, 0xd9, 0xf8, 0x1e, 0xfc, 0x52, 0xdb, 0x44, 0x29, 0xc0, 0xc1, 0xaf, 0x7c, 0x1d, 0x8a, 0x22, 0xb6, 0xc7, 0xba, 0xbb, 0xe7, 0xfb, 0xd8, 0xb5, 0xb3, 0xf0, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2740 = { .name = "ecdsa_secp224r1_sha224_2740", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2740_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2740_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2740_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 158 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2741 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2741_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2741_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2741_sig[] = { 0x8c, 0x03, 0xb3, 0x2c, 0x16, 0x6c, 0x0c, 0x8b, 0x99, 0xd7, 0xf8, 0x76, 0xac, 0xd1, 0x09, 0x44, 0x7e, 0xfb, 0x13, 0xf6, 0xb8, 0x29, 0x45, 0xe7, 0x8d, 0x51, 0xa2, 0x69, 0x65, 0x75, 0x68, 0xf1, 0xa0, 0xa8, 0xbd, 0x7d, 0xf5, 0xff, 0xa4, 0x30, 0x97, 0xeb, 0xb2, 0xb6, 0x44, 0x35, 0xc8, 0xe3, 0x33, 0x5b, 0xca, 0xaf, 0xc6, 0x3f, 0x9e, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2741 = { .name = "ecdsa_secp224r1_sha224_2741", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2741_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2741_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2741_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 159 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2742 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2742_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2742_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2742_sig[] = { 0xd1, 0x99, 0xa3, 0x75, 0x25, 0x3d, 0x30, 0xf1, 0xd2, 0xb4, 0x49, 0x35, 0x42, 0xe9, 0x93, 0x4f, 0x9f, 0x1f, 0x8b, 0x06, 0x80, 0x11, 0x76, 0x79, 0xf5, 0xbc, 0x4a, 0xd2, 0x11, 0x41, 0x9d, 0xdb, 0xf0, 0x2c, 0x8a, 0xd5, 0xf5, 0x18, 0xf8, 0xda, 0xc3, 0x3f, 0x86, 0xa8, 0x5e, 0x77, 0x7a, 0xf5, 0x1a, 0x03, 0x41, 0x32, 0xe2, 0x76, 0x7a, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2742 = { .name = "ecdsa_secp224r1_sha224_2742", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2742_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2742_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2742_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 160 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2743 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2743_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha224_2743_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2743_sig[] = { 0x8f, 0xf8, 0x26, 0x99, 0xe2, 0xe8, 0x28, 0x70, 0xbe, 0x9c, 0xfd, 0xd8, 0xa4, 0x08, 0xbb, 0x34, 0xf8, 0xf3, 0x8a, 0x83, 0xa4, 0xac, 0x83, 0x70, 0xf1, 0x8f, 0x2b, 0xc8, 0x7e, 0x50, 0x08, 0xfa, 0xb6, 0xa0, 0xd4, 0x15, 0x92, 0x00, 0x07, 0x7e, 0xf9, 0x91, 0x8d, 0xad, 0x65, 0x92, 0xcd, 0x83, 0x59, 0x83, 0x88, 0x52, 0xc6, 0x36, 0xac, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2743 = { .name = "ecdsa_secp224r1_sha224_2743", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2743_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2743_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2743_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 161 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2744 for ECDSA, tcId is 162 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2744_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha224_2744_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2744_sig[] = { 0x3f, 0x3b, 0x60, 0xb5, 0x29, 0xae, 0x0f, 0x95, 0x0c, 0x51, 0x72, 0x64, 0xad, 0xf2, 0xe4, 0x81, 0x61, 0x6b, 0xc4, 0x74, 0x16, 0x74, 0x2d, 0x51, 0x03, 0x58, 0x96, 0x60, 0xf7, 0x31, 0xeb, 0xe9, 0x8e, 0x58, 0x38, 0x4b, 0x3a, 0x64, 0xb4, 0x69, 0x6d, 0x4c, 0xc9, 0x61, 0x98, 0x28, 0xad, 0x51, 0xd7, 0xc3, 0x99, 0x80, 0x74, 0x97, 0x09, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2744 = { .name = "ecdsa_secp224r1_sha224_2744", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2744_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2744_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2744_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 162 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2745 for ECDSA, tcId is 163 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2745_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha224_2745_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2745_sig[] = { 0xdc, 0x11, 0xff, 0xdc, 0x6b, 0x78, 0x75, 0x4a, 0x33, 0x5f, 0x16, 0x8c, 0x40, 0x33, 0x91, 0x6a, 0x21, 0x58, 0xd1, 0x25, 0xa3, 0xf4, 0xfe, 0xd9, 0xdc, 0x73, 0x66, 0x61, 0x6d, 0xd8, 0x43, 0x64, 0x71, 0x7d, 0x9f, 0x4b, 0x07, 0x90, 0xf2, 0xb2, 0x82, 0xf9, 0x24, 0x5e, 0xcb, 0x31, 0x68, 0x74, 0xea, 0xc0, 0x25, 0x60, 0x03, 0x97, 0xf1, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2745 = { .name = "ecdsa_secp224r1_sha224_2745", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2745_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2745_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2745_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 163 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2746 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2746_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha224_2746_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2746_sig[] = { 0xa5, 0x9b, 0x25, 0xb7, 0x86, 0xd5, 0x5f, 0x26, 0xb0, 0x4d, 0xfe, 0x90, 0xee, 0x02, 0xa6, 0xbd, 0xe6, 0x4e, 0xd6, 0xe4, 0x31, 0xdc, 0x9f, 0xbd, 0xc3, 0xab, 0x36, 0x0e, 0xfc, 0x14, 0xb5, 0xad, 0x20, 0xf3, 0x9d, 0xa9, 0x90, 0x0e, 0x35, 0x43, 0x79, 0x36, 0xc8, 0x62, 0x6f, 0xcc, 0xf6, 0x63, 0x2e, 0x7a, 0x3d, 0x9e, 0x58, 0x7e, 0x33, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2746 = { .name = "ecdsa_secp224r1_sha224_2746", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2746_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2746_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2746_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 164 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2747 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2747_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha224_2747_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2747_sig[] = { 0x2e, 0xda, 0x1f, 0x96, 0xc1, 0xa6, 0xe3, 0xad, 0x8a, 0x33, 0x21, 0xce, 0x82, 0xcb, 0xb1, 0x3a, 0x5b, 0x93, 0x5b, 0x50, 0x1a, 0xbf, 0x6c, 0x06, 0xf7, 0xfd, 0x2b, 0x3f, 0xe8, 0x10, 0x50, 0xc3, 0xe5, 0xf5, 0x3a, 0x3c, 0x7b, 0x9d, 0x0b, 0xdb, 0x9e, 0xd9, 0x2a, 0x32, 0x6d, 0xfe, 0xac, 0x44, 0x79, 0x1b, 0xa1, 0xab, 0xe4, 0xd6, 0xe9, 0x73, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2747 = { .name = "ecdsa_secp224r1_sha224_2747", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2747_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2747_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2747_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 165 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2748 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2748_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha224_2748_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2748_sig[] = { 0x60, 0xf5, 0xe0, 0x93, 0xfd, 0xa0, 0x8f, 0xc1, 0x4a, 0xc9, 0x9d, 0x82, 0x0a, 0x18, 0xad, 0x13, 0x70, 0xc5, 0x81, 0x50, 0xbe, 0xa0, 0xac, 0xa2, 0x4f, 0xc6, 0xdb, 0x9d, 0xc2, 0x22, 0x0a, 0x0e, 0xbb, 0xf4, 0x89, 0x6e, 0x68, 0xfd, 0xb5, 0xbd, 0x82, 0x4f, 0x88, 0x29, 0x1c, 0x1c, 0x86, 0x2b, 0x91, 0x6f, 0x9c, 0x4a, 0xf8, 0x7f, 0x8f, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2748 = { .name = "ecdsa_secp224r1_sha224_2748", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2748_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2748_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2748_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 166 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2749 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2749_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2749_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2749_sig[] = { 0x2e, 0xad, 0x37, 0x84, 0x6a, 0x5e, 0x36, 0xa4, 0x90, 0xb7, 0x51, 0x40, 0xbd, 0xc7, 0xb6, 0x36, 0xc6, 0xe9, 0xf6, 0xd8, 0xf9, 0x80, 0xf6, 0xfa, 0xdb, 0x08, 0xf7, 0x69, 0xe1, 0xfe, 0x13, 0x0a, 0xe1, 0x79, 0x8c, 0x19, 0x6d, 0x7b, 0xe6, 0x2c, 0x7a, 0x5d, 0xdb, 0x31, 0x68, 0xcf, 0x4b, 0x8d, 0x48, 0xb6, 0xb6, 0xb4, 0xdc, 0x94, 0xab, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2749 = { .name = "ecdsa_secp224r1_sha224_2749", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2749_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2749_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2749_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 167 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2750 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2750_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2750_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2750_sig[] = { 0xa8, 0xa4, 0xc9, 0x41, 0x6d, 0x72, 0xc8, 0x60, 0x57, 0x3d, 0x07, 0x32, 0x81, 0xcb, 0x08, 0xc8, 0x6a, 0xd6, 0x53, 0x13, 0xf0, 0x6b, 0x15, 0xa3, 0x29, 0xe8, 0x2e, 0xb2, 0x5a, 0x6e, 0xdd, 0x2f, 0x08, 0x16, 0xb7, 0x26, 0x3d, 0x91, 0x5d, 0x72, 0xc6, 0x7d, 0x50, 0xa8, 0x54, 0xe3, 0xab, 0xee, 0x5c, 0xde, 0x1b, 0x67, 0x9a, 0x0c, 0xef, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2750 = { .name = "ecdsa_secp224r1_sha224_2750", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2750_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2750_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2750_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 168 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2751 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2751_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2751_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2751_sig[] = { 0x57, 0x6b, 0xb8, 0x6c, 0x51, 0x7b, 0xfe, 0xcd, 0xc9, 0x30, 0xa4, 0xc8, 0x50, 0x17, 0x25, 0x54, 0x8d, 0x42, 0x5a, 0xfb, 0xb9, 0x6d, 0x93, 0xf5, 0xc1, 0xe2, 0xa0, 0xe1, 0x77, 0x24, 0x8c, 0x5e, 0xcd, 0x62, 0x0c, 0x43, 0x14, 0x38, 0xc5, 0x0e, 0x6b, 0xee, 0x68, 0x58, 0x09, 0x1b, 0x54, 0xa8, 0x7f, 0x85, 0x48, 0xae, 0x35, 0xc2, 0x10, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2751 = { .name = "ecdsa_secp224r1_sha224_2751", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2751_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2751_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2751_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 169 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2752 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2752_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha224_2752_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2752_sig[] = { 0x34, 0xe4, 0x1c, 0xba, 0x62, 0x8f, 0xd8, 0x78, 0x7b, 0xa1, 0xa5, 0x28, 0xf6, 0x01, 0x5d, 0x2c, 0xae, 0x01, 0x5c, 0x1c, 0x9a, 0x86, 0x6e, 0x08, 0xa7, 0x13, 0x38, 0x01, 0x83, 0xd4, 0x22, 0xff, 0xdd, 0x99, 0xcc, 0x3c, 0x6d, 0x70, 0x96, 0xef, 0x92, 0x7f, 0x0b, 0x11, 0x98, 0x8d, 0x18, 0x24, 0xe6, 0xe9, 0x38, 0x40, 0xff, 0x66, 0x6c, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2752 = { .name = "ecdsa_secp224r1_sha224_2752", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2752_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2752_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2752_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 170 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2753 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2753_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha224_2753_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2753_sig[] = { 0x25, 0x58, 0xa4, 0x2e, 0x79, 0x68, 0x92, 0x44, 0xbc, 0xcd, 0x5e, 0x85, 0x5f, 0x6a, 0x1e, 0x42, 0xb4, 0xff, 0x72, 0x68, 0x73, 0xf3, 0x0b, 0x53, 0x2b, 0x89, 0xef, 0x53, 0x07, 0xf9, 0xbd, 0x94, 0x77, 0x85, 0x18, 0x71, 0x75, 0xd8, 0x48, 0xb6, 0xe2, 0xd7, 0x9f, 0x7a, 0xb3, 0xbb, 0xc1, 0x08, 0x7b, 0x42, 0x59, 0x0b, 0x0c, 0xfb, 0x25, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2753 = { .name = "ecdsa_secp224r1_sha224_2753", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2753_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2753_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2753_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 171 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2754 for ECDSA, tcId is 172 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2754_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha224_2754_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2754_sig[] = { 0xd5, 0xfe, 0x7d, 0xd5, 0xfb, 0x4f, 0xd1, 0xea, 0x5c, 0xe6, 0x6c, 0x08, 0x24, 0xf5, 0x3f, 0x96, 0xce, 0x47, 0xfd, 0x9b, 0x6c, 0x63, 0xb4, 0xd5, 0x78, 0x27, 0xfd, 0x17, 0xbc, 0xe5, 0xbc, 0x3a, 0xf7, 0x05, 0xaf, 0xaa, 0xcb, 0x81, 0xbf, 0xa6, 0xd5, 0x52, 0xd6, 0x19, 0x89, 0x62, 0xfe, 0xce, 0x9f, 0xba, 0x41, 0x54, 0x6c, 0x60, 0x2d, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2754 = { .name = "ecdsa_secp224r1_sha224_2754", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2754_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2754_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2754_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 172 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2755 for ECDSA, tcId is 173 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2755_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha224_2755_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2755_sig[] = { 0x8c, 0x1d, 0xa2, 0xf0, 0x7c, 0xdc, 0xbc, 0xe4, 0xdb, 0x80, 0x67, 0xb8, 0x63, 0x46, 0x8c, 0xfc, 0x72, 0x8d, 0xf5, 0x29, 0x80, 0x22, 0x90, 0x28, 0x68, 0x9e, 0x57, 0xb6, 0x32, 0x17, 0x5c, 0x13, 0x90, 0xa4, 0xb2, 0xca, 0xb6, 0x35, 0x9b, 0xab, 0x9f, 0x85, 0x49, 0x57, 0xd4, 0xfd, 0x79, 0x76, 0xc9, 0xc6, 0xd9, 0x20, 0xc8, 0x71, 0xc0, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2755 = { .name = "ecdsa_secp224r1_sha224_2755", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2755_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2755_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2755_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 173 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2756 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2756_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha224_2756_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2756_sig[] = { 0xe4, 0x6d, 0x4f, 0x11, 0xb8, 0x6b, 0x5a, 0x12, 0xf6, 0xfe, 0x78, 0x1d, 0x1f, 0x93, 0x4e, 0xf2, 0xb3, 0x0e, 0x78, 0xf6, 0xf9, 0xcc, 0x86, 0xa9, 0x99, 0x6e, 0x20, 0xc0, 0x83, 0x51, 0x97, 0x4b, 0x96, 0x55, 0x26, 0x03, 0x4a, 0x0c, 0xce, 0xf0, 0xe7, 0xd3, 0xbc, 0x13, 0xd9, 0x17, 0x98, 0x15, 0x14, 0x88, 0xc9, 0x15, 0x33, 0x14, 0x3f, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2756 = { .name = "ecdsa_secp224r1_sha224_2756", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2756_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2756_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2756_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 174 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2757 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2757_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha224_2757_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2757_sig[] = { 0x30, 0x5c, 0xcf, 0x0b, 0x5d, 0x0c, 0xf3, 0x3d, 0xc7, 0x45, 0xbb, 0x7c, 0x79, 0x64, 0xc2, 0x33, 0xf6, 0xcf, 0xd8, 0x89, 0x2a, 0x1c, 0x1a, 0xe9, 0xf5, 0x0b, 0x2f, 0x3f, 0x78, 0x5f, 0x6e, 0x85, 0xf5, 0xe6, 0x52, 0x58, 0x7c, 0x6e, 0x15, 0xd0, 0xc4, 0x5c, 0x42, 0x72, 0x78, 0xcf, 0x65, 0xbb, 0x14, 0x29, 0xa5, 0x7d, 0x88, 0x26, 0xca, 0x39, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2757 = { .name = "ecdsa_secp224r1_sha224_2757", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2757_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2757_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2757_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 175 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2758 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2758_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha224_2758_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2758_sig[] = { 0x0e, 0x4f, 0xde, 0x0a, 0xc8, 0xd3, 0x75, 0x36, 0x50, 0x5f, 0x7b, 0x8b, 0xdc, 0x2d, 0x22, 0xc5, 0xc3, 0x34, 0xb0, 0x64, 0xac, 0x5e, 0xd2, 0x7b, 0xea, 0x9c, 0x17, 0x9e, 0xc4, 0xd6, 0xbf, 0x82, 0x9d, 0xd5, 0x47, 0x00, 0x0d, 0x6f, 0x70, 0xb9, 0xad, 0x9e, 0x9c, 0x15, 0x03, 0xbe, 0xbc, 0xf1, 0xd9, 0x5c, 0x26, 0x08, 0x94, 0x2c, 0xa1, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2758 = { .name = "ecdsa_secp224r1_sha224_2758", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2758_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2758_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2758_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 176 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2759 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2759_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha224_2759_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2759_sig[] = { 0x81, 0x8a, 0xfc, 0xaf, 0x49, 0x1d, 0xa9, 0xd0, 0x8a, 0x7c, 0xc2, 0x93, 0x18, 0xd5, 0xe8, 0x5d, 0xce, 0x56, 0x8d, 0xcc, 0xa7, 0x01, 0x80, 0x59, 0xf4, 0x4e, 0x9b, 0x7e, 0xbf, 0x32, 0xa2, 0x33, 0xd5, 0xfc, 0x6e, 0xd8, 0xe2, 0xd9, 0x27, 0x0b, 0x1b, 0xda, 0xd4, 0xbb, 0xd2, 0xa0, 0xf2, 0xc2, 0x93, 0xd2, 0x89, 0xbd, 0x91, 0xff, 0xbc, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2759 = { .name = "ecdsa_secp224r1_sha224_2759", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2759_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2759_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2759_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 177 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2760 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2760_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha224_2760_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2760_sig[] = { 0x0e, 0x05, 0xed, 0x67, 0x5c, 0x67, 0x3e, 0x5e, 0x70, 0xa4, 0xfd, 0xd5, 0xa4, 0x7b, 0x11, 0x4c, 0x5d, 0x54, 0x2d, 0x4f, 0x6d, 0x7a, 0x36, 0x75, 0x97, 0xd7, 0x13, 0xea, 0x26, 0xd7, 0x0d, 0x65, 0xc4, 0x84, 0x30, 0x37, 0x33, 0x63, 0x98, 0x78, 0x10, 0xbd, 0xcc, 0x55, 0x6e, 0x02, 0x71, 0x8e, 0xab, 0x21, 0x44, 0x03, 0xae, 0x00, 0x8d, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2760 = { .name = "ecdsa_secp224r1_sha224_2760", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2760_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2760_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2760_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 178 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2761 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2761_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha224_2761_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2761_sig[] = { 0xab, 0x7a, 0x19, 0xee, 0xcf, 0x63, 0xe9, 0x66, 0x82, 0x78, 0x96, 0x3b, 0x65, 0x23, 0x6b, 0x27, 0x68, 0xe5, 0x7c, 0xae, 0x0e, 0x26, 0x8c, 0xb8, 0x6a, 0x0d, 0xdd, 0xa1, 0x88, 0x29, 0xf5, 0xd3, 0xa3, 0x39, 0x4f, 0x94, 0x67, 0xba, 0x62, 0xe6, 0x6e, 0xf1, 0x76, 0x8e, 0x3e, 0x54, 0xf9, 0x3e, 0xd2, 0x3e, 0xc9, 0x62, 0xbc, 0x44, 0x3c, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2761 = { .name = "ecdsa_secp224r1_sha224_2761", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2761_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2761_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2761_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 179 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2762 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2762_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha224_2762_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2762_sig[] = { 0x17, 0x11, 0x1a, 0x77, 0xcf, 0x79, 0xbe, 0xad, 0x45, 0x6e, 0xd8, 0x6a, 0x7d, 0x8a, 0x93, 0x55, 0x31, 0x44, 0x02, 0x81, 0xeb, 0x8b, 0x15, 0xa8, 0x85, 0xe3, 0x41, 0xc0, 0xfd, 0xc3, 0x95, 0x8d, 0x04, 0xf0, 0x37, 0xb1, 0xd4, 0xbb, 0x2c, 0xee, 0x30, 0x7b, 0x52, 0x01, 0xbe, 0x06, 0x2e, 0x0d, 0x4e, 0x08, 0x9d, 0xf1, 0xc1, 0x91, 0x76, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2762 = { .name = "ecdsa_secp224r1_sha224_2762", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2762_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2762_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2762_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 180 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2763 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2763_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha224_2763_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2763_sig[] = { 0xac, 0xaf, 0xa1, 0xe3, 0x33, 0x45, 0xee, 0xba, 0x0c, 0x33, 0x8c, 0x22, 0x04, 0xb4, 0xcd, 0x8b, 0xa2, 0x1d, 0xe7, 0xec, 0x3e, 0x12, 0x13, 0x31, 0x70, 0x38, 0xe9, 0x68, 0x0b, 0x42, 0xfb, 0xba, 0xed, 0xa9, 0x8a, 0x35, 0xda, 0x0d, 0xe4, 0xc7, 0x95, 0x46, 0xf3, 0xa0, 0xf7, 0xd9, 0xde, 0xc2, 0x75, 0xd2, 0xcd, 0x67, 0x1f, 0x93, 0xc8, 0x74, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2763 = { .name = "ecdsa_secp224r1_sha224_2763", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2763_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2763_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2763_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 181 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2764 for ECDSA, tcId is 182 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2764_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha224_2764_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2764_sig[] = { 0xa3, 0xfe, 0x71, 0xa2, 0xa5, 0x6f, 0x55, 0x4e, 0x98, 0xfd, 0x10, 0xa8, 0x09, 0x8c, 0x2a, 0x54, 0x3c, 0x98, 0xbc, 0x6b, 0x36, 0x02, 0xef, 0x39, 0xf2, 0x41, 0x23, 0x08, 0x5d, 0x1d, 0x68, 0xf9, 0xa8, 0x70, 0xef, 0x2b, 0xc8, 0x74, 0x84, 0xb3, 0x38, 0x65, 0x49, 0xfa, 0xe9, 0x58, 0x11, 0xab, 0x72, 0xbc, 0x0e, 0x3a, 0x51, 0x47, 0x20, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2764 = { .name = "ecdsa_secp224r1_sha224_2764", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2764_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2764_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2764_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 182 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2765 for ECDSA, tcId is 183 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2765_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha224_2765_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2765_sig[] = { 0x13, 0x2f, 0x76, 0x25, 0x70, 0x47, 0x56, 0xc1, 0x3f, 0x2b, 0xfa, 0x44, 0x9e, 0x60, 0x95, 0x2f, 0x83, 0x6f, 0x49, 0x04, 0x66, 0x0b, 0x5b, 0x1d, 0xa0, 0x7e, 0x5a, 0x9f, 0x82, 0xb4, 0xab, 0xaf, 0xc4, 0x0e, 0x8f, 0xd1, 0x9b, 0x0c, 0x96, 0x7f, 0x02, 0xff, 0xf1, 0x52, 0x73, 0x7c, 0xe0, 0x11, 0x53, 0x65, 0x8d, 0xf4, 0x45, 0xc4, 0xd7, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2765 = { .name = "ecdsa_secp224r1_sha224_2765", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2765_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2765_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2765_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 183 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2766 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2766_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha224_2766_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2766_sig[] = { 0xf3, 0x6a, 0x83, 0x47, 0xc6, 0xfe, 0x03, 0x97, 0xa1, 0x16, 0x1a, 0x36, 0x4c, 0xbc, 0x4b, 0xdf, 0xb4, 0xd8, 0xb7, 0x89, 0x4c, 0xba, 0xa6, 0xed, 0xc5, 0x5a, 0x4f, 0xf7, 0x9c, 0x9c, 0x90, 0x51, 0x5d, 0xa5, 0xe6, 0x02, 0xd6, 0x2e, 0x99, 0xf4, 0x8e, 0xac, 0x41, 0x4e, 0x91, 0x3d, 0xd0, 0xb7, 0xcb, 0xf6, 0x80, 0xc1, 0xa5, 0x39, 0x99, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2766 = { .name = "ecdsa_secp224r1_sha224_2766", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2766_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2766_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2766_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 184 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2767 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2767_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha224_2767_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2767_sig[] = { 0x21, 0x25, 0xec, 0xc0, 0x8e, 0x52, 0xe9, 0xe3, 0x9e, 0x59, 0x01, 0x17, 0xde, 0x21, 0x45, 0xbd, 0x87, 0x96, 0x26, 0xcb, 0x87, 0x18, 0x0e, 0x52, 0xe9, 0xd3, 0xce, 0x03, 0x8f, 0x7e, 0x83, 0x8d, 0x0e, 0x8f, 0xb8, 0x00, 0x05, 0xfe, 0x3c, 0x72, 0xfc, 0xa1, 0xb7, 0xcc, 0x08, 0xed, 0x32, 0x1a, 0x34, 0x48, 0x78, 0x96, 0xb0, 0xc9, 0x0b, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2767 = { .name = "ecdsa_secp224r1_sha224_2767", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2767_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2767_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2767_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 185 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2768 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2768_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha224_2768_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2768_sig[] = { 0xe4, 0x85, 0x74, 0x7a, 0xc2, 0xf3, 0xd0, 0x45, 0xe0, 0x10, 0xcd, 0xad, 0xab, 0x4f, 0xd5, 0xdb, 0xd5, 0x55, 0x6c, 0x00, 0x08, 0x44, 0x5f, 0xb7, 0x3e, 0x07, 0xcd, 0x90, 0xe2, 0x13, 0x3a, 0x79, 0x06, 0xae, 0xac, 0x50, 0x48, 0x52, 0xe0, 0x9e, 0x6d, 0x05, 0x7f, 0x29, 0xab, 0x21, 0x36, 0x8c, 0xfc, 0x4e, 0x23, 0x94, 0xbe, 0x56, 0x5e, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2768 = { .name = "ecdsa_secp224r1_sha224_2768", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2768_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2768_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2768_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 186 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2769 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha224_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2769_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha224_2769_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2769_sig[] = { 0xa4, 0xde, 0x0d, 0x93, 0x1d, 0xda, 0xb9, 0x0e, 0x66, 0x7e, 0xbc, 0x0a, 0xd8, 0x00, 0xce, 0x49, 0xe9, 0x71, 0xc6, 0x05, 0x43, 0xab, 0xdc, 0x46, 0xce, 0xff, 0xf9, 0x26, 0x55, 0x08, 0x16, 0x17, 0x0b, 0xd8, 0x75, 0x93, 0xb9, 0xfb, 0x8a, 0xd5, 0xed, 0x9a, 0xb4, 0xdd, 0xb1, 0x24, 0x03, 0xff, 0x6f, 0xe0, 0x32, 0x25, 0x28, 0x33, 0xba, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2769 = { .name = "ecdsa_secp224r1_sha224_2769", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2769_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2769_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2769_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 187 in file ecdsa_secp224r1_sha224_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2770 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2770_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2770_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2770_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x28, 0x40, 0xbf, 0x24, 0xf6, 0xf6, 0x6b, 0xe2, 0x87, 0x06, 0x6b, 0x7c, 0xbf, 0x38, 0x78, 0x8e, 0x1b, 0x77, 0x70, 0xb1, 0x8f, 0xd1, 0xaa, 0x6a, 0x26, 0xd7, 0xc6, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2770 = { .name = "ecdsa_secp224r1_sha224_2770", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2770_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2770_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2770_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2771 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2771_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2771_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2771_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2771 = { .name = "ecdsa_secp224r1_sha224_2771", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2771_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2771_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2771_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of s misses leading 0, tcId is 2 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2772 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2772_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2772_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2772_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2772 = { .name = "ecdsa_secp224r1_sha224_2772", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2772_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2772_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2772_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 3 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2773 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2773_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2773_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2773_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2773 = { .name = "ecdsa_secp224r1_sha224_2773", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2773_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2773_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2773_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 4 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2774 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2774_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2774_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2774_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2774 = { .name = "ecdsa_secp224r1_sha224_2774", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2774_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2774_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2774_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 5 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2775 for ECDSA, tcId is 68 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2775_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2775_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2775_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2775 = { .name = "ecdsa_secp224r1_sha224_2775", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2775_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2775_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2775_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2776 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2776_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2776_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2776_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2776 = { .name = "ecdsa_secp224r1_sha224_2776", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2776_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2776_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2776_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2777 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2777_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2777_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2777_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2777 = { .name = "ecdsa_secp224r1_sha224_2777", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2777_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2777_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2777_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2778 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2778_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2778_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2778_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2778 = { .name = "ecdsa_secp224r1_sha224_2778", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2778_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2778_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2778_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2779 for ECDSA, tcId is 93 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2779_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2779_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2779_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x00, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2779 = { .name = "ecdsa_secp224r1_sha224_2779", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2779_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2779_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2779_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2780 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2780_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2780_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2780_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2780 = { .name = "ecdsa_secp224r1_sha224_2780", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2780_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2780_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2780_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2781 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2781_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2781_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2781_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2781 = { .name = "ecdsa_secp224r1_sha224_2781", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2781_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2781_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2781_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2782 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2782_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2782_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2782_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2782 = { .name = "ecdsa_secp224r1_sha224_2782", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2782_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2782_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2782_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2783 for ECDSA, tcId is 98 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2783_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2783_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2783_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x05, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2783 = { .name = "ecdsa_secp224r1_sha224_2783", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2783_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2783_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2783_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2784 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2784_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2784_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2784_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2784 = { .name = "ecdsa_secp224r1_sha224_2784", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2784_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2784_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2784_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2785 for ECDSA, tcId is 114 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2785_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2785_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2785_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2785 = { .name = "ecdsa_secp224r1_sha224_2785", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2785_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2785_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2785_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2786 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2786_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2786_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2786_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2786 = { .name = "ecdsa_secp224r1_sha224_2786", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2786_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2786_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2786_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2787 for ECDSA, tcId is 118 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2787_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2787_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2787_sig[] = { 0x72, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2787 = { .name = "ecdsa_secp224r1_sha224_2787", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2787_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2787_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2787_sig, .siglen = 56, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2788 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2788_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2788_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2788_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x02, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2788 = { .name = "ecdsa_secp224r1_sha224_2788", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2788_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2788_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2788_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2789 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2789_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2789_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2789_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x8a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2789 = { .name = "ecdsa_secp224r1_sha224_2789", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2789_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2789_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2789_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2790 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2790_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2790_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2790_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2790 = { .name = "ecdsa_secp224r1_sha224_2790", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2790_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2790_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2790_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2791 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2791_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2791_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2791_sig[] = { 0x00, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2791 = { .name = "ecdsa_secp224r1_sha224_2791", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2791_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2791_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2791_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2792 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2792_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2792_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2792_sig[] = { 0x00, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2792 = { .name = "ecdsa_secp224r1_sha224_2792", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2792_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2792_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2792_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2793 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2793_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2793_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2793_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2793 = { .name = "ecdsa_secp224r1_sha224_2793", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2793_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2793_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2793_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2794 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2794_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2794_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2794_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2794 = { .name = "ecdsa_secp224r1_sha224_2794", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2794_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2794_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2794_sig, .siglen = 56, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2795 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2795_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2795_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2795_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2795 = { .name = "ecdsa_secp224r1_sha224_2795", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2795_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2795_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2795_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp224r1_sha224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2796 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2796_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2796_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2796_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2796 = { .name = "ecdsa_secp224r1_sha224_2796", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2796_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2796_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2796_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2797 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2797_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2797_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2797_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2797 = { .name = "ecdsa_secp224r1_sha224_2797", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2797_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2797_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2797_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2798 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2798_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2798_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2798_sig[] = { 0x01, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x26, 0xfc, 0x2a, 0x84, 0xbb, 0xe2, 0xe2, 0xa2, 0xe8, 0x4a, 0xec, 0xed, 0x76, 0x72, 0x47, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2798 = { .name = "ecdsa_secp224r1_sha224_2798", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2798_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2798_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2798_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2799 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2799_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2799_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2799_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x28, 0xce, 0xe4, 0xc3, 0x4a, 0x02, 0x66, 0x7b, 0x2d, 0xf8, 0x62, 0x34, 0xbe, 0x1d, 0xcd, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2799 = { .name = "ecdsa_secp224r1_sha224_2799", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2799_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2799_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2799_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2800 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2800_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2800_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2800_sig[] = { 0x8f, 0xfb, 0x65, 0x0c, 0xe0, 0x7c, 0xb7, 0x98, 0xc2, 0xa9, 0x31, 0x31, 0xd4, 0xd8, 0x1a, 0x78, 0x5b, 0xfd, 0x0d, 0x5b, 0x70, 0xf4, 0xde, 0x58, 0x6e, 0xe5, 0xb7, 0xf6, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2800 = { .name = "ecdsa_secp224r1_sha224_2800", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2800_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2800_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2800_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2801 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2801_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2801_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2801_sig[] = { 0x8f, 0xfb, 0x65, 0x0c, 0xe0, 0x7c, 0xb7, 0x98, 0xc2, 0xa9, 0x31, 0x31, 0xd4, 0xd7, 0x31, 0x1b, 0x3c, 0xb5, 0xfd, 0x99, 0x84, 0xd2, 0x07, 0x9d, 0xcb, 0x41, 0xe2, 0x33, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2801 = { .name = "ecdsa_secp224r1_sha224_2801", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2801_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2801_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2801_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2802 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2802_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2802_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2802_sig[] = { 0xfe, 0x8f, 0xfb, 0x65, 0x0c, 0xe0, 0x7c, 0xb7, 0x98, 0xc2, 0xa9, 0x31, 0x31, 0xd4, 0xd9, 0x03, 0xd5, 0x7b, 0x44, 0x1d, 0x1d, 0x5d, 0x17, 0xb5, 0x13, 0x12, 0x89, 0x8d, 0xb9, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2802 = { .name = "ecdsa_secp224r1_sha224_2802", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2802_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2802_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2802_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2803 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2803_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2803_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2803_sig[] = { 0x01, 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2803 = { .name = "ecdsa_secp224r1_sha224_2803", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2803_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2803_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2803_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2804 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2804_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2804_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2804_sig[] = { 0x8f, 0xfb, 0x65, 0x0c, 0xe0, 0x7c, 0xb7, 0x98, 0xc2, 0xa9, 0x31, 0x31, 0xd4, 0xd8, 0x1a, 0x78, 0x5b, 0xfd, 0x0d, 0x5b, 0x70, 0xf4, 0xde, 0x58, 0x6e, 0xe5, 0xb7, 0xf6, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2804 = { .name = "ecdsa_secp224r1_sha224_2804", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2804_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2804_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2804_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2805 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2805_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2805_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2805_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x01, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc5, 0xb4, 0xb7, 0xa5, 0xfa, 0x6f, 0xca, 0x97, 0xe8, 0xa8, 0x20, 0x91, 0xe0, 0x8d, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2805 = { .name = "ecdsa_secp224r1_sha224_2805", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2805_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2805_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2805_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2806 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2806_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2806_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2806_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc7, 0x87, 0x71, 0xe4, 0x88, 0x8f, 0x4e, 0x70, 0x2e, 0x55, 0x95, 0xd9, 0x28, 0x39, 0x24, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2806 = { .name = "ecdsa_secp224r1_sha224_2806", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2806_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2806_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2806_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2807 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2807_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2807_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2807_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x28, 0x40, 0xbf, 0x24, 0xf6, 0xf6, 0x6b, 0xe2, 0x87, 0x06, 0x6b, 0x7c, 0xbf, 0x39, 0x61, 0xeb, 0x3a, 0xbe, 0x80, 0x73, 0x7b, 0xf4, 0x81, 0x24, 0xca, 0x7b, 0x9c, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2807 = { .name = "ecdsa_secp224r1_sha224_2807", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2807_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2807_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2807_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2808 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2808_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2808_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2808_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0xfe, 0x28, 0x40, 0xbf, 0x24, 0xf6, 0xf6, 0x6b, 0xe2, 0x87, 0x06, 0x6b, 0x7c, 0xbf, 0x3a, 0x4b, 0x48, 0x5a, 0x05, 0x90, 0x35, 0x68, 0x17, 0x57, 0xdf, 0x6e, 0x1f, 0x72, 0x62, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2808 = { .name = "ecdsa_secp224r1_sha224_2808", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2808_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2808_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2808_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2809 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2809_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2809_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2809_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x01, 0xd7, 0xbf, 0x40, 0xdb, 0x09, 0x09, 0x94, 0x1d, 0x78, 0xf9, 0x94, 0x83, 0x40, 0xc6, 0x9e, 0x14, 0xc5, 0x41, 0x7f, 0x8c, 0x84, 0x0b, 0x7e, 0xdb, 0x35, 0x84, 0x63, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2809 = { .name = "ecdsa_secp224r1_sha224_2809", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2809_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2809_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2809_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2810 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2810_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2810_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2810_sig[] = { 0x70, 0x04, 0x9a, 0xf3, 0x1f, 0x83, 0x48, 0x67, 0x3d, 0x56, 0xce, 0xce, 0x2b, 0x27, 0xe5, 0x87, 0xa4, 0x02, 0xf2, 0xa4, 0x8f, 0x0b, 0x21, 0xa7, 0x91, 0x1a, 0x48, 0x0a, 0x28, 0x40, 0xbf, 0x24, 0xf6, 0xf6, 0x6b, 0xe2, 0x87, 0x06, 0x6b, 0x7c, 0xbf, 0x39, 0x61, 0xeb, 0x3a, 0xbe, 0x80, 0x73, 0x7b, 0xf4, 0x81, 0x24, 0xca, 0x7b, 0x9c, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2810 = { .name = "ecdsa_secp224r1_sha224_2810", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2810_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2810_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2810_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2811 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2811_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2811_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2811_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2811 = { .name = "ecdsa_secp224r1_sha224_2811", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2811_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2811_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2811_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2812 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2812_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2812_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2812_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2812 = { .name = "ecdsa_secp224r1_sha224_2812", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2812_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2812_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2812_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2813 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2813_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2813_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2813_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2813 = { .name = "ecdsa_secp224r1_sha224_2813", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2813_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2813_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2813_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2814 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2814_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2814_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2814_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2814 = { .name = "ecdsa_secp224r1_sha224_2814", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2814_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2814_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2814_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2815 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2815_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2815_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2815_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2815 = { .name = "ecdsa_secp224r1_sha224_2815", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2815_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2815_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2815_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2816 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2816_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2816_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2816_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2816 = { .name = "ecdsa_secp224r1_sha224_2816", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2816_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2816_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2816_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2817 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2817_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2817_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2817_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2817 = { .name = "ecdsa_secp224r1_sha224_2817", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2817_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2817_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2817_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2818 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2818_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2818_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2818_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2818 = { .name = "ecdsa_secp224r1_sha224_2818", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2818_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2818_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2818_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2819 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2819_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2819_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2819_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2819 = { .name = "ecdsa_secp224r1_sha224_2819", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2819_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2819_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2819_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2820 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2820_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2820_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2820_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2820 = { .name = "ecdsa_secp224r1_sha224_2820", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2820_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2820_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2820_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2821 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2821_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2821_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2821_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2821 = { .name = "ecdsa_secp224r1_sha224_2821", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2821_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2821_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2821_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2822 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2822_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2822_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2822_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2822 = { .name = "ecdsa_secp224r1_sha224_2822", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2822_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2822_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2822_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2823 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2823_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2823_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2823_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2823 = { .name = "ecdsa_secp224r1_sha224_2823", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2823_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2823_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2823_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2824 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2824_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2824_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2824_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2824 = { .name = "ecdsa_secp224r1_sha224_2824", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2824_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2824_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2824_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2825 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2825_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2825_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2825_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2825 = { .name = "ecdsa_secp224r1_sha224_2825", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2825_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2825_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2825_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2826 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2826_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2826_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2826_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2826 = { .name = "ecdsa_secp224r1_sha224_2826", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2826_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2826_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2826_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2827 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2827_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2827_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2827_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2827 = { .name = "ecdsa_secp224r1_sha224_2827", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2827_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2827_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2827_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2828 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2828_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2828_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2828_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2828 = { .name = "ecdsa_secp224r1_sha224_2828", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2828_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2828_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2828_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2829 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2829_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2829_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2829_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2829 = { .name = "ecdsa_secp224r1_sha224_2829", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2829_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2829_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2829_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2830 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2830_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2830_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2830_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2830 = { .name = "ecdsa_secp224r1_sha224_2830", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2830_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2830_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2830_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2831 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2831_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2831_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2831_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2831 = { .name = "ecdsa_secp224r1_sha224_2831", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2831_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2831_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2831_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2832 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2832_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2832_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2832_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2832 = { .name = "ecdsa_secp224r1_sha224_2832", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2832_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2832_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2832_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2833 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2833_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2833_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2833_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2833 = { .name = "ecdsa_secp224r1_sha224_2833", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2833_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2833_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2833_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2834 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2834_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2834_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2834_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2834 = { .name = "ecdsa_secp224r1_sha224_2834", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2834_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2834_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2834_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2835 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2835_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2835_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2835_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2835 = { .name = "ecdsa_secp224r1_sha224_2835", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2835_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2835_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2835_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2836 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2836_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2836_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2836_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2836 = { .name = "ecdsa_secp224r1_sha224_2836", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2836_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2836_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2836_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2837 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2837_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2837_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2837_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2837 = { .name = "ecdsa_secp224r1_sha224_2837", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2837_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2837_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2837_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2838 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2838_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2838_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2838_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2838 = { .name = "ecdsa_secp224r1_sha224_2838", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2838_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2838_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2838_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2839 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2839_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2839_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2839_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2839 = { .name = "ecdsa_secp224r1_sha224_2839", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2839_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2839_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2839_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2840 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2840_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2840_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2840_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2840 = { .name = "ecdsa_secp224r1_sha224_2840", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2840_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2840_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2840_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2841 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2841_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2841_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2841_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2841 = { .name = "ecdsa_secp224r1_sha224_2841", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2841_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2841_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2841_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2842 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2842_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2842_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2842_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2842 = { .name = "ecdsa_secp224r1_sha224_2842", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2842_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2842_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2842_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2843 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2843_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2843_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2843_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2843 = { .name = "ecdsa_secp224r1_sha224_2843", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2843_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2843_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2843_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2844 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2844_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2844_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2844_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2844 = { .name = "ecdsa_secp224r1_sha224_2844", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2844_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2844_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2844_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2845 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2845_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2845_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2845_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2845 = { .name = "ecdsa_secp224r1_sha224_2845", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2845_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2845_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2845_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2846 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2846_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2846_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2846_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2846 = { .name = "ecdsa_secp224r1_sha224_2846", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2846_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2846_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2846_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2847 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2847_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2847_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2847_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2847 = { .name = "ecdsa_secp224r1_sha224_2847", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2847_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2847_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2847_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2848 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2848_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2848_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2848_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2848 = { .name = "ecdsa_secp224r1_sha224_2848", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2848_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2848_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2848_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2849 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2849_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2849_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2849_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2849 = { .name = "ecdsa_secp224r1_sha224_2849", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2849_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2849_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2849_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2850 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2850_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2850_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2850_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2850 = { .name = "ecdsa_secp224r1_sha224_2850", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2850_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2850_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2850_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2851 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2851_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2851_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2851_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2851 = { .name = "ecdsa_secp224r1_sha224_2851", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2851_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2851_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2851_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2852 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2852_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2852_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2852_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2852 = { .name = "ecdsa_secp224r1_sha224_2852", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2852_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2852_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2852_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2853 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2853_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2853_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2853_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2853 = { .name = "ecdsa_secp224r1_sha224_2853", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2853_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2853_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2853_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2854 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2854_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2854_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2854_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2854 = { .name = "ecdsa_secp224r1_sha224_2854", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2854_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2854_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2854_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2855 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2855_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2855_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2855_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2855 = { .name = "ecdsa_secp224r1_sha224_2855", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2855_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2855_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2855_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2856 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2856_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2856_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2856_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2856 = { .name = "ecdsa_secp224r1_sha224_2856", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2856_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2856_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2856_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2857 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2857_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2857_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2857_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2857 = { .name = "ecdsa_secp224r1_sha224_2857", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2857_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2857_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2857_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2858 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2858_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2858_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2858_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2858 = { .name = "ecdsa_secp224r1_sha224_2858", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2858_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2858_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2858_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2859 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2859_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2859_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2859_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2859 = { .name = "ecdsa_secp224r1_sha224_2859", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2859_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2859_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2859_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2860 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2860_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2860_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2860_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2860 = { .name = "ecdsa_secp224r1_sha224_2860", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2860_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2860_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2860_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2861 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2861_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2861_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2861_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2861 = { .name = "ecdsa_secp224r1_sha224_2861", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2861_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2861_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2861_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2862 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2862_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2862_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2862_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2862 = { .name = "ecdsa_secp224r1_sha224_2862", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2862_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2862_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2862_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2863 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2863_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2863_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2863_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2863 = { .name = "ecdsa_secp224r1_sha224_2863", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2863_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2863_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2863_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2864 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2864_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2864_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2864_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2864 = { .name = "ecdsa_secp224r1_sha224_2864", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2864_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2864_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2864_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2865 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2865_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2865_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2865_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2865 = { .name = "ecdsa_secp224r1_sha224_2865", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2865_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2865_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2865_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2866 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2866_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2866_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2866_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2866 = { .name = "ecdsa_secp224r1_sha224_2866", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2866_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2866_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2866_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2867 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2867_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2867_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2867_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2867 = { .name = "ecdsa_secp224r1_sha224_2867", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2867_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2867_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2867_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2868 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2868_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2868_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2868_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2868 = { .name = "ecdsa_secp224r1_sha224_2868", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2868_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2868_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2868_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2869 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2869_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2869_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2869_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2869 = { .name = "ecdsa_secp224r1_sha224_2869", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2869_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2869_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2869_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2870 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2870_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2870_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2870_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2870 = { .name = "ecdsa_secp224r1_sha224_2870", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2870_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2870_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2870_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2871 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2871_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2871_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2871_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2871 = { .name = "ecdsa_secp224r1_sha224_2871", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2871_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2871_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2871_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2872 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2872_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2872_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2872_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2872 = { .name = "ecdsa_secp224r1_sha224_2872", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2872_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2872_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2872_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2873 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2873_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2873_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2873_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2873 = { .name = "ecdsa_secp224r1_sha224_2873", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2873_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2873_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2873_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2874 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2874_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2874_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2874_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2874 = { .name = "ecdsa_secp224r1_sha224_2874", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2874_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2874_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2874_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2875 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2875_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2875_msg[] = { 0x31, 0x37, 0x35, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2875_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x31, 0x16, 0xe1, 0xa3, 0x8e, 0x4a, 0xb2, 0x00, 0x8e, 0xca, 0x03, 0x2f, 0xb2, 0xd1, 0x85, 0xe5, 0xc2, 0x1a, 0x23, 0x2e, 0xaf, 0x45, 0x07, 0xae, 0x56, 0x17, 0x7f, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2875 = { .name = "ecdsa_secp224r1_sha224_2875", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2875_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2875_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha224_2875_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2876 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2876_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2876_msg[] = { 0x32, 0x32, 0x35, 0x34, 0x36, 0x32, 0x38, 0x39, 0x38, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2876_sig[] = { 0x8c, 0xe2, 0xaf, 0xe2, 0x0b, 0x68, 0x45, 0x76, 0xfd, 0xd9, 0x1b, 0x4b, 0x34, 0x16, 0x8c, 0x9c, 0x01, 0x19, 0x96, 0xaf, 0x5b, 0x0e, 0xb8, 0x5f, 0xa9, 0x29, 0xf3, 0x81, 0x66, 0x2a, 0xf5, 0xca, 0x65, 0x1b, 0xff, 0xbc, 0x62, 0x3c, 0x3a, 0x3b, 0x37, 0x27, 0x79, 0xbd, 0x09, 0xe1, 0x94, 0x8c, 0xd1, 0x91, 0x88, 0xf5, 0x33, 0x9a, 0x97, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2876 = { .name = "ecdsa_secp224r1_sha224_2876", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2876_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2876_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2876_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2877 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2877_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2877_msg[] = { 0x31, 0x38, 0x32, 0x37, 0x38, 0x37, 0x38, 0x36, 0x31, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2877_sig[] = { 0xda, 0x57, 0x3c, 0xf7, 0x3a, 0xed, 0x17, 0x47, 0x10, 0xc2, 0x32, 0x15, 0x57, 0x35, 0x24, 0x8f, 0x8e, 0xbe, 0xf6, 0x96, 0x37, 0x46, 0x47, 0x52, 0x7d, 0xa5, 0x22, 0x58, 0xb2, 0x51, 0x85, 0x6b, 0x66, 0xa8, 0x3c, 0x32, 0xbf, 0x0b, 0x7b, 0x81, 0xa0, 0x1f, 0x1d, 0xb4, 0x50, 0x7e, 0x62, 0x21, 0x25, 0xf3, 0x01, 0xbd, 0x83, 0x2a, 0x5c, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2877 = { .name = "ecdsa_secp224r1_sha224_2877", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2877_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2877_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2877_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2878 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2878_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2878_msg[] = { 0x31, 0x35, 0x31, 0x38, 0x38, 0x36, 0x31, 0x37, 0x30, 0x39, }; static const unsigned char ecdsa_secp224r1_sha224_2878_sig[] = { 0xc3, 0x68, 0xda, 0x86, 0x58, 0x2b, 0x2c, 0x82, 0xb6, 0x96, 0xb2, 0xf7, 0xc7, 0x90, 0x27, 0x96, 0x8f, 0x3f, 0xd2, 0x5c, 0xbb, 0xa9, 0x68, 0x8c, 0xdc, 0x67, 0xb1, 0x7a, 0xab, 0xa8, 0xe3, 0xc2, 0xff, 0x1a, 0xf9, 0xbb, 0x9c, 0x66, 0xca, 0x88, 0xa3, 0x82, 0x5a, 0x19, 0xce, 0x17, 0x20, 0x6e, 0x7a, 0x65, 0x8f, 0xf4, 0x70, 0x25, 0x89, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2878 = { .name = "ecdsa_secp224r1_sha224_2878", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2878_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2878_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2878_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2879 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2879_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2879_msg[] = { 0x32, 0x31, 0x32, 0x39, 0x32, 0x33, 0x33, 0x34, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2879_sig[] = { 0xff, 0xce, 0xfc, 0xb5, 0x71, 0x90, 0xd0, 0xb8, 0x7e, 0xfb, 0x78, 0x9f, 0xb5, 0x34, 0x07, 0xfd, 0x2c, 0x65, 0xc5, 0xae, 0x35, 0x51, 0xda, 0x3e, 0xcc, 0xf8, 0xdd, 0xd5, 0x05, 0xc8, 0x9b, 0x41, 0x23, 0x8f, 0x1e, 0x1d, 0xef, 0x8f, 0xbe, 0x8d, 0x4a, 0xfe, 0xbf, 0x20, 0xbe, 0x07, 0x7e, 0x82, 0x97, 0x2f, 0x91, 0x29, 0x74, 0x87, 0xe1, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2879 = { .name = "ecdsa_secp224r1_sha224_2879", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2879_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2879_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2879_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2880 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2880_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2880_msg[] = { 0x31, 0x32, 0x32, 0x31, 0x39, 0x37, 0x39, 0x30, 0x35, 0x39, }; static const unsigned char ecdsa_secp224r1_sha224_2880_sig[] = { 0x2b, 0x98, 0xc6, 0x7e, 0xbf, 0x65, 0x97, 0xb0, 0x8b, 0xc7, 0xf1, 0xb7, 0x3f, 0xf8, 0x66, 0x2c, 0xf1, 0x25, 0xe9, 0x70, 0x0e, 0xc9, 0x73, 0xec, 0xe9, 0xc6, 0xff, 0x48, 0x2e, 0x3f, 0x72, 0xa8, 0xf7, 0x6e, 0x12, 0xc8, 0xcd, 0xf4, 0x48, 0x7e, 0x09, 0x56, 0xc1, 0xef, 0x45, 0x78, 0xe1, 0xda, 0x4d, 0x29, 0xd8, 0xdb, 0x82, 0x4d, 0x41, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2880 = { .name = "ecdsa_secp224r1_sha224_2880", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2880_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2880_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2880_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2881 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2881_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2881_msg[] = { 0x32, 0x33, 0x30, 0x32, 0x35, 0x36, 0x37, 0x36, 0x31, 0x31, }; static const unsigned char ecdsa_secp224r1_sha224_2881_sig[] = { 0x57, 0x94, 0xd7, 0x04, 0x40, 0xf1, 0x66, 0x90, 0x4d, 0x24, 0xd0, 0xb9, 0x10, 0xcd, 0x12, 0x7c, 0x63, 0xa9, 0xed, 0xdc, 0xa4, 0x5a, 0x4d, 0x90, 0x32, 0xdb, 0x47, 0xe8, 0x8b, 0xa5, 0xd2, 0x90, 0x83, 0x4d, 0x9a, 0x09, 0x63, 0x12, 0x2d, 0x92, 0x8d, 0xa9, 0x02, 0xf7, 0xb0, 0x34, 0x67, 0x39, 0x60, 0x72, 0x18, 0x0b, 0xb1, 0x80, 0x1b, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2881 = { .name = "ecdsa_secp224r1_sha224_2881", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2881_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2881_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2881_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2882 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2882_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2882_msg[] = { 0x31, 0x31, 0x30, 0x35, 0x38, 0x36, 0x38, 0x34, 0x37, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2882_sig[] = { 0xc2, 0x9c, 0x70, 0xb0, 0xb2, 0x17, 0x82, 0xd1, 0xc7, 0x27, 0xf4, 0x90, 0x7a, 0xef, 0x56, 0x41, 0xb6, 0xd6, 0xc6, 0xe7, 0xb2, 0xa1, 0xeb, 0xfa, 0x57, 0x79, 0x42, 0x23, 0xaa, 0xc2, 0xd3, 0xa0, 0x25, 0x92, 0xf2, 0x98, 0xdd, 0x31, 0x98, 0xe3, 0x88, 0x42, 0x5e, 0xc7, 0xa9, 0x1d, 0x7e, 0x6b, 0xe4, 0x82, 0x48, 0xa6, 0x47, 0x73, 0x61, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2882 = { .name = "ecdsa_secp224r1_sha224_2882", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2882_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2882_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2882_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2883 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2883_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2883_msg[] = { 0x31, 0x34, 0x36, 0x36, 0x36, 0x31, 0x34, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2883_sig[] = { 0x5c, 0x3e, 0xf3, 0x77, 0x8c, 0x81, 0x1e, 0x69, 0xef, 0x0b, 0x0e, 0x37, 0x0e, 0x45, 0xec, 0x0d, 0x7e, 0xb8, 0x85, 0x05, 0xc3, 0xe8, 0xff, 0xb8, 0xc5, 0x0b, 0x99, 0x93, 0xe0, 0x6b, 0x5c, 0x6e, 0x47, 0xdc, 0x4d, 0xa9, 0xe6, 0x4f, 0xd2, 0x1b, 0xc3, 0xe1, 0xda, 0x13, 0xcf, 0x7c, 0x26, 0x4f, 0xa6, 0x4c, 0xcb, 0x89, 0xda, 0x87, 0x38, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2883 = { .name = "ecdsa_secp224r1_sha224_2883", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2883_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2883_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2883_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2884 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2884_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2884_msg[] = { 0x34, 0x34, 0x31, 0x39, 0x35, 0x36, 0x34, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2884_sig[] = { 0xed, 0x8f, 0x58, 0x65, 0x63, 0x23, 0x2c, 0xf1, 0x5e, 0xbd, 0x01, 0x4b, 0xd4, 0xf9, 0x97, 0x27, 0xe3, 0x37, 0xcf, 0xe4, 0xce, 0x48, 0x69, 0x4f, 0xe6, 0x74, 0x8e, 0xc2, 0xff, 0xf7, 0x79, 0xa3, 0xec, 0xa9, 0x51, 0x35, 0x22, 0x90, 0x8e, 0x25, 0x2a, 0x2b, 0x4a, 0xab, 0x20, 0x60, 0x60, 0x8e, 0x6c, 0xd2, 0xd4, 0xf1, 0xb8, 0xc6, 0x96, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2884 = { .name = "ecdsa_secp224r1_sha224_2884", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2884_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2884_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha224_2884_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2885 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2885_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2885_msg[] = { 0x31, 0x39, 0x36, 0x39, 0x34, 0x38, 0x36, 0x30, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2885_sig[] = { 0x64, 0xc0, 0x84, 0xf6, 0xb7, 0x75, 0xbb, 0xf7, 0x91, 0x5c, 0x19, 0x64, 0xa6, 0x8b, 0x02, 0x59, 0x62, 0x93, 0x28, 0x59, 0x8f, 0x13, 0x55, 0x78, 0x72, 0x86, 0x78, 0x30, 0x2a, 0x6f, 0x3b, 0x28, 0x9d, 0x13, 0x0e, 0xc3, 0xd9, 0x9e, 0x4c, 0xaa, 0xf6, 0x01, 0x49, 0x78, 0x95, 0xa0, 0x69, 0xc1, 0xa5, 0xa7, 0x5b, 0x55, 0x9a, 0xd2, 0x84, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2885 = { .name = "ecdsa_secp224r1_sha224_2885", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2885_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2885_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2885_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2886 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2886_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2886_msg[] = { 0x32, 0x32, 0x33, 0x35, 0x36, 0x37, 0x32, 0x38, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2886_sig[] = { 0x2b, 0x51, 0x4e, 0x9b, 0x0e, 0x0e, 0xb6, 0x8a, 0xdc, 0x01, 0x91, 0x5a, 0xbb, 0xee, 0x9f, 0xa2, 0x1f, 0x30, 0x34, 0xbe, 0x55, 0x81, 0xde, 0xda, 0xa6, 0xb1, 0x59, 0x82, 0xb8, 0xf7, 0x1c, 0x5f, 0xdc, 0x68, 0xd6, 0x98, 0x71, 0x6b, 0xfc, 0x62, 0x3b, 0x27, 0x82, 0x16, 0xc0, 0xfc, 0xc0, 0x29, 0x84, 0x97, 0xfc, 0x9c, 0x03, 0xdb, 0x44, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2886 = { .name = "ecdsa_secp224r1_sha224_2886", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2886_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2886_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2886_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2887 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2887_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2887_msg[] = { 0x32, 0x32, 0x35, 0x37, 0x38, 0x34, 0x33, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2887_sig[] = { 0xe4, 0x10, 0x3f, 0x4a, 0x8a, 0x81, 0x44, 0x85, 0xb6, 0xb4, 0x06, 0xfe, 0x8d, 0xd7, 0x22, 0x06, 0xba, 0xd6, 0xa5, 0x0e, 0x71, 0x26, 0xbc, 0x65, 0x5c, 0x3d, 0x22, 0x85, 0x9b, 0xcb, 0x99, 0x69, 0x32, 0x84, 0xca, 0xc2, 0x6e, 0x66, 0x41, 0xa8, 0x61, 0xdb, 0xec, 0x24, 0xf9, 0xcc, 0x5d, 0xd7, 0xbb, 0x53, 0x53, 0x39, 0xd0, 0x9a, 0xc9, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2887 = { .name = "ecdsa_secp224r1_sha224_2887", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2887_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2887_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2887_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2888 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2888_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2888_msg[] = { 0x39, 0x34, 0x34, 0x35, 0x30, 0x30, 0x39, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha224_2888_sig[] = { 0x9e, 0xdf, 0xb8, 0x33, 0x44, 0x6e, 0xc8, 0xb6, 0xfc, 0x84, 0xee, 0xa3, 0x4e, 0xe4, 0x0a, 0x85, 0xb7, 0x32, 0xe5, 0xc9, 0x9d, 0xa8, 0xab, 0xc8, 0xba, 0xfc, 0xc5, 0x15, 0x50, 0x52, 0xb4, 0x0f, 0x9d, 0x40, 0x7a, 0xe9, 0x00, 0x03, 0x29, 0x9c, 0xab, 0xe3, 0xe1, 0xa5, 0x87, 0xb0, 0x55, 0x81, 0x27, 0xca, 0xfb, 0x31, 0xde, 0x6b, 0x26, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2888 = { .name = "ecdsa_secp224r1_sha224_2888", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2888_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2888_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha224_2888_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2889 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2889_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2889_msg[] = { 0x31, 0x36, 0x38, 0x37, 0x37, 0x38, 0x39, 0x34, 0x31, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2889_sig[] = { 0xad, 0x26, 0x47, 0xc8, 0xff, 0x37, 0x77, 0x98, 0xa6, 0xae, 0xae, 0xd4, 0x36, 0xd3, 0x0c, 0x7b, 0x25, 0xfb, 0x52, 0x42, 0x88, 0x29, 0xce, 0x64, 0x24, 0xdd, 0x34, 0xe8, 0x28, 0xf5, 0x86, 0x71, 0xd7, 0x7c, 0x86, 0xda, 0x30, 0x24, 0x18, 0xc5, 0x1e, 0x5a, 0xb8, 0x6d, 0x13, 0x7b, 0xa6, 0xef, 0x43, 0x89, 0x72, 0x2b, 0xc7, 0x9b, 0x87, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2889 = { .name = "ecdsa_secp224r1_sha224_2889", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2889_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2889_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2889_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2890 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2890_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2890_msg[] = { 0x33, 0x39, 0x33, 0x32, 0x36, 0x31, 0x32, 0x32, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2890_sig[] = { 0x5d, 0xfc, 0x6f, 0xad, 0x38, 0x5b, 0xdb, 0x24, 0xb2, 0xb7, 0x0a, 0x64, 0xfd, 0x42, 0x53, 0x40, 0x5c, 0x00, 0x28, 0xbb, 0x36, 0xf4, 0x79, 0x3a, 0xa3, 0xbd, 0x31, 0xfe, 0x1c, 0x21, 0x0b, 0x74, 0x92, 0x41, 0x71, 0x37, 0x89, 0x92, 0xb0, 0x3b, 0xb1, 0xbd, 0x78, 0xc5, 0xcf, 0xcf, 0xc8, 0x79, 0xd2, 0xe5, 0xc7, 0x36, 0xd3, 0x55, 0x16, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2890 = { .name = "ecdsa_secp224r1_sha224_2890", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2890_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2890_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha224_2890_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2891 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2891_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2891_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x35, 0x37, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha224_2891_sig[] = { 0x76, 0x6b, 0xef, 0x46, 0x22, 0x96, 0x95, 0xe6, 0x82, 0x9d, 0xd1, 0x2c, 0xd5, 0x58, 0x36, 0x9e, 0xc3, 0x45, 0x19, 0xba, 0x4a, 0x72, 0xdc, 0xaf, 0x6f, 0x73, 0xf7, 0xb0, 0xfc, 0x01, 0x5c, 0xcd, 0xd1, 0xe9, 0x43, 0xb9, 0x10, 0x10, 0x16, 0x07, 0xd8, 0x1f, 0xf1, 0x39, 0x8c, 0xa6, 0xa4, 0xd7, 0x0c, 0x25, 0x83, 0x2b, 0x02, 0xb2, 0x21, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2891 = { .name = "ecdsa_secp224r1_sha224_2891", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2891_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2891_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2891_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2892 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2892_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2892_msg[] = { 0x36, 0x30, 0x38, 0x38, 0x37, 0x34, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2892_sig[] = { 0x12, 0x00, 0x55, 0xf9, 0x0a, 0xd1, 0x29, 0x0c, 0x4c, 0x5f, 0xc5, 0xfa, 0xf6, 0x9b, 0x21, 0x51, 0x39, 0x18, 0x2c, 0x77, 0x0d, 0x2b, 0x55, 0xe9, 0x57, 0x12, 0x44, 0x2f, 0x01, 0xac, 0x47, 0xf7, 0x44, 0x65, 0x43, 0xd4, 0x00, 0x3b, 0x03, 0x9d, 0x9f, 0x54, 0xda, 0xa9, 0xd0, 0x79, 0x9f, 0x98, 0x29, 0x1a, 0x32, 0xdf, 0x4f, 0xcd, 0x47, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2892 = { .name = "ecdsa_secp224r1_sha224_2892", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2892_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2892_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha224_2892_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2893 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2893_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2893_msg[] = { 0x31, 0x31, 0x39, 0x32, 0x35, 0x36, 0x39, 0x39, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha224_2893_sig[] = { 0xf4, 0x80, 0x59, 0x1f, 0x6f, 0x40, 0xa2, 0x5b, 0x37, 0xa0, 0x35, 0xfd, 0x91, 0x95, 0x41, 0x45, 0xec, 0x34, 0x2e, 0x59, 0x3d, 0x09, 0xe1, 0x42, 0xf2, 0x5d, 0xa4, 0x08, 0x5c, 0x6b, 0xa4, 0x4f, 0xf5, 0x2f, 0x52, 0xc5, 0x14, 0x90, 0x74, 0x3d, 0x9b, 0x65, 0x09, 0x16, 0xbe, 0x58, 0xd0, 0x6d, 0x7c, 0x1f, 0xd9, 0x9d, 0xfa, 0x2e, 0xab, 0x58, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2893 = { .name = "ecdsa_secp224r1_sha224_2893", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2893_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2893_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2893_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2894 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2894_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2894_msg[] = { 0x39, 0x30, 0x30, 0x37, 0x36, 0x30, 0x39, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2894_sig[] = { 0x57, 0xda, 0xdd, 0xb0, 0xcb, 0x6a, 0xf9, 0x39, 0xb1, 0xea, 0x1a, 0xaf, 0x4b, 0xc7, 0x2e, 0x56, 0x15, 0x0c, 0x0c, 0x46, 0xa5, 0x81, 0x82, 0x71, 0x93, 0xe6, 0x5d, 0x17, 0x3b, 0xc3, 0x7b, 0xde, 0x4e, 0x60, 0xb7, 0x89, 0xba, 0x86, 0xa0, 0x54, 0xd3, 0x7f, 0x11, 0x91, 0xe0, 0x81, 0x49, 0x26, 0xc1, 0xa0, 0x10, 0x01, 0x68, 0xd1, 0x6c, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2894 = { .name = "ecdsa_secp224r1_sha224_2894", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2894_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2894_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha224_2894_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2895 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2895_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2895_msg[] = { 0x31, 0x36, 0x30, 0x32, 0x38, 0x33, 0x36, 0x31, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha224_2895_sig[] = { 0x3a, 0x74, 0x10, 0x2b, 0xd1, 0xfc, 0x61, 0x70, 0x18, 0xef, 0xc4, 0xfb, 0xc0, 0x42, 0xe7, 0x19, 0xa8, 0x1b, 0x55, 0x83, 0x0a, 0xac, 0x1f, 0x1d, 0xcd, 0xed, 0xec, 0x65, 0x4b, 0xb9, 0xfe, 0x90, 0x01, 0x5a, 0x45, 0xf3, 0x1c, 0x8c, 0x95, 0xdd, 0xa2, 0x4f, 0x54, 0xfc, 0xdb, 0x64, 0x68, 0x2c, 0x13, 0xf6, 0x8d, 0x4d, 0xa3, 0xd1, 0xab, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2895 = { .name = "ecdsa_secp224r1_sha224_2895", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2895_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2895_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2895_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2896 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2896_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2896_msg[] = { 0x32, 0x30, 0x38, 0x30, 0x32, 0x34, 0x35, 0x36, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2896_sig[] = { 0xe3, 0xb6, 0xbb, 0x1b, 0x5b, 0xee, 0xd0, 0x48, 0xe0, 0x17, 0x7e, 0x3e, 0x31, 0x0f, 0xa1, 0x4e, 0xb9, 0x23, 0xa1, 0xe3, 0x27, 0x4c, 0x09, 0x46, 0xf9, 0x27, 0x54, 0x54, 0xe0, 0x44, 0xe0, 0x49, 0x4f, 0xf4, 0x65, 0x73, 0xc3, 0x70, 0x07, 0xe3, 0xef, 0xa3, 0x23, 0x35, 0x88, 0xf1, 0xd1, 0x03, 0xce, 0xd1, 0x82, 0x3c, 0x7e, 0x87, 0xe7, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2896 = { .name = "ecdsa_secp224r1_sha224_2896", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2896_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2896_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2896_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2897 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2897_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2897_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x37, 0x34, 0x36, 0x35, 0x39, }; static const unsigned char ecdsa_secp224r1_sha224_2897_sig[] = { 0x3c, 0x21, 0x2b, 0x5a, 0x7e, 0x65, 0xd9, 0xaf, 0x44, 0x64, 0x3b, 0xd6, 0x2f, 0xa4, 0x2a, 0x9b, 0x9c, 0xff, 0xe6, 0xbd, 0xb6, 0x23, 0xe9, 0xb9, 0xe4, 0x33, 0x71, 0x56, 0x29, 0xc8, 0x12, 0x1a, 0x12, 0x42, 0x7a, 0x32, 0x4e, 0x5d, 0x55, 0x1f, 0xf5, 0xa8, 0x3d, 0x3c, 0x25, 0x2e, 0x32, 0x25, 0x7a, 0xf2, 0x80, 0x0d, 0x08, 0x08, 0x17, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2897 = { .name = "ecdsa_secp224r1_sha224_2897", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2897_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2897_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2897_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2898 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2898_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2898_msg[] = { 0x31, 0x31, 0x35, 0x35, 0x35, 0x37, 0x37, 0x37, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2898_sig[] = { 0x16, 0x30, 0x55, 0x49, 0x89, 0xff, 0xfd, 0x0e, 0x35, 0xf2, 0xd9, 0x10, 0x56, 0x23, 0xd7, 0x3a, 0x54, 0x36, 0x34, 0xc4, 0x80, 0x00, 0x48, 0x4c, 0x42, 0x22, 0x72, 0xca, 0x21, 0x4d, 0xa4, 0x87, 0xd5, 0xe5, 0x1f, 0x73, 0x81, 0x4d, 0xff, 0x80, 0xa0, 0x8c, 0x77, 0xbd, 0x8a, 0x83, 0xa9, 0x88, 0x9a, 0x1b, 0x26, 0xa5, 0x57, 0x8b, 0xa9, 0x54, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2898 = { .name = "ecdsa_secp224r1_sha224_2898", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2898_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2898_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2898_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2899 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2899_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2899_msg[] = { 0x32, 0x34, 0x33, 0x32, 0x34, 0x37, 0x34, 0x36, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2899_sig[] = { 0x0a, 0x46, 0x09, 0x24, 0x2f, 0x21, 0x93, 0xb9, 0x4b, 0xc5, 0x4f, 0x49, 0xbc, 0xf5, 0x32, 0xa5, 0x76, 0xe0, 0x35, 0xce, 0xc5, 0x0e, 0x04, 0x36, 0x68, 0x57, 0x4b, 0xef, 0xaa, 0x68, 0xbd, 0x67, 0x62, 0x4d, 0x88, 0x12, 0x00, 0x2b, 0xbb, 0x3a, 0x5f, 0x53, 0x05, 0x94, 0x45, 0x13, 0x72, 0xd4, 0xab, 0x36, 0x89, 0x6a, 0x29, 0x29, 0xc3, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2899 = { .name = "ecdsa_secp224r1_sha224_2899", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2899_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2899_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2899_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2900 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2900_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2900_msg[] = { 0x32, 0x34, 0x31, 0x37, 0x32, 0x38, 0x32, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha224_2900_sig[] = { 0xef, 0x9f, 0xf4, 0x46, 0xe8, 0xee, 0xf3, 0xe9, 0x48, 0xf4, 0x12, 0x9f, 0xe8, 0x80, 0x4f, 0x81, 0xf5, 0xb7, 0xf1, 0x16, 0xa5, 0x38, 0x3f, 0x9e, 0x8b, 0xc3, 0x59, 0xe4, 0xf4, 0xc7, 0x05, 0x5b, 0xd9, 0x8f, 0x4a, 0x7e, 0xa4, 0x9d, 0x95, 0x74, 0x16, 0x0e, 0xac, 0x16, 0x78, 0x09, 0xf6, 0xa7, 0x8b, 0x9d, 0xd2, 0x20, 0x95, 0x8d, 0xd0, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2900 = { .name = "ecdsa_secp224r1_sha224_2900", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2900_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2900_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha224_2900_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2901 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2901_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha224_2901_msg[] = { 0x37, 0x37, 0x38, 0x37, 0x34, 0x37, 0x37, 0x31, }; static const unsigned char ecdsa_secp224r1_sha224_2901_sig[] = { 0x1a, 0x6c, 0x59, 0xd8, 0x5d, 0x5b, 0x31, 0x20, 0xb2, 0x8c, 0x0d, 0x30, 0xbc, 0x05, 0x8a, 0x92, 0xdc, 0x72, 0x5d, 0x8e, 0xf4, 0x50, 0xc1, 0x98, 0xcc, 0x3c, 0xa5, 0x22, 0x8b, 0x17, 0xfe, 0xfc, 0x8a, 0xb1, 0xff, 0x0b, 0xb3, 0x7a, 0x93, 0x44, 0x64, 0x53, 0xd4, 0x0f, 0x65, 0xbc, 0x2c, 0xb9, 0x63, 0x6b, 0x11, 0x20, 0x7f, 0x5c, 0x90, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2901 = { .name = "ecdsa_secp224r1_sha224_2901", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2901_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2901_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha224_2901_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2902 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2902_pubkey[] = { 0x8b, 0xf7, 0xe7, 0x92, 0xf7, 0xc8, 0x68, 0x77, 0xf1, 0xfd, 0x05, 0x52, 0xe4, 0x2d, 0x80, 0x65, 0x3b, 0x59, 0xe3, 0xa2, 0x9e, 0x76, 0x2a, 0x22, 0x81, 0x0d, 0xaa, 0xc7, 0xee, 0xc6, 0x15, 0xbb, 0xad, 0x04, 0xb5, 0x8d, 0xc2, 0xa7, 0x95, 0x60, 0x90, 0xb8, 0x04, 0x0b, 0xb5, 0x05, 0x53, 0x25, 0xbb, 0xa0, 0xaa, 0x8b, 0x3a, 0x5c, 0xaa, 0x6f, }; static const unsigned char ecdsa_secp224r1_sha224_2902_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2902_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2902 = { .name = "ecdsa_secp224r1_sha224_2902", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2902_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2902_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2902_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 257 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2903 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2903_pubkey[] = { 0x8b, 0xf7, 0xe7, 0x92, 0xf7, 0xc8, 0x68, 0x77, 0xf1, 0xfd, 0x05, 0x52, 0xe4, 0x2d, 0x80, 0x65, 0x3b, 0x59, 0xe3, 0xa2, 0x9e, 0x76, 0x2a, 0x22, 0x81, 0x0d, 0xaa, 0xc7, 0xee, 0xc6, 0x15, 0xbb, 0xad, 0x04, 0xb5, 0x8d, 0xc2, 0xa7, 0x95, 0x60, 0x90, 0xb8, 0x04, 0x0b, 0xb5, 0x05, 0x53, 0x25, 0xbb, 0xa0, 0xaa, 0x8b, 0x3a, 0x5c, 0xaa, 0x6f, }; static const unsigned char ecdsa_secp224r1_sha224_2903_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2903_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2903 = { .name = "ecdsa_secp224r1_sha224_2903", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2903_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2903_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2903_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 258 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2904 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2904_pubkey[] = { 0x26, 0x46, 0xff, 0x36, 0xd9, 0x69, 0x7a, 0xaa, 0xed, 0x0d, 0x64, 0x11, 0x17, 0xf9, 0x4f, 0x60, 0xe1, 0x38, 0xba, 0xb8, 0xe9, 0x91, 0x2b, 0x55, 0x8a, 0xe0, 0xa8, 0x18, 0xca, 0x48, 0xe4, 0x5a, 0x33, 0x55, 0x0c, 0x1b, 0x5b, 0xd2, 0x0a, 0x00, 0xe4, 0xd9, 0xdf, 0x30, 0x33, 0xc0, 0x32, 0x22, 0xe8, 0x7b, 0xd9, 0x6a, 0x81, 0x97, 0xf2, 0xdd, }; static const unsigned char ecdsa_secp224r1_sha224_2904_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2904_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2904 = { .name = "ecdsa_secp224r1_sha224_2904", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2904_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2904_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2904_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 259 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2905 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2905_pubkey[] = { 0xea, 0x3e, 0xa2, 0x87, 0x3b, 0x6f, 0xc0, 0x99, 0xbf, 0xd7, 0x79, 0xb0, 0xa2, 0xc2, 0x3c, 0x2c, 0x43, 0x54, 0xe2, 0xfe, 0xc4, 0x53, 0x6f, 0x3b, 0x8e, 0x42, 0x09, 0x88, 0xf9, 0x7e, 0x1c, 0x76, 0x46, 0xb4, 0xeb, 0x3d, 0xe6, 0x16, 0x75, 0x2f, 0x41, 0x5a, 0xb3, 0xa6, 0xf6, 0x96, 0xd1, 0xd6, 0x74, 0xfb, 0x4b, 0x67, 0x32, 0x25, 0x23, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2905_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2905_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2905 = { .name = "ecdsa_secp224r1_sha224_2905", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2905_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2905_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2905_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 260 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2906 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2906_pubkey[] = { 0x92, 0xae, 0x54, 0xe3, 0x8b, 0x4e, 0x9c, 0x6a, 0xe9, 0x94, 0x31, 0x93, 0x74, 0x7c, 0x4c, 0x8a, 0xcc, 0x6c, 0x96, 0xf4, 0x22, 0x51, 0x52, 0x88, 0xe9, 0x69, 0x8a, 0x13, 0xe8, 0xf3, 0xa7, 0x59, 0xa1, 0xa8, 0x27, 0x3c, 0x53, 0xf4, 0xb4, 0xb1, 0x8b, 0xfc, 0xf7, 0x8d, 0x9b, 0xb9, 0x88, 0xad, 0xb3, 0xb0, 0x05, 0x00, 0x2d, 0xbe, 0x43, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha224_2906_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2906_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2906 = { .name = "ecdsa_secp224r1_sha224_2906", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2906_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2906_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2906_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 261 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2907 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2907_pubkey[] = { 0xb1, 0x57, 0x31, 0x5c, 0xc1, 0xaa, 0xea, 0xe6, 0x4e, 0xb5, 0xb3, 0x84, 0x52, 0x88, 0x41, 0x95, 0xfd, 0xfe, 0x8a, 0x15, 0xfb, 0x56, 0x18, 0x28, 0x4f, 0x48, 0xaf, 0xe5, 0xe1, 0xfb, 0xba, 0xad, 0x72, 0x94, 0x77, 0xa4, 0x5f, 0x37, 0x52, 0xb7, 0xf7, 0x2a, 0xd2, 0xf9, 0xcd, 0x7d, 0xce, 0x41, 0x58, 0xa8, 0xe2, 0x1b, 0x81, 0x27, 0xe8, 0xa7, }; static const unsigned char ecdsa_secp224r1_sha224_2907_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2907_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2907 = { .name = "ecdsa_secp224r1_sha224_2907", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2907_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2907_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2907_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 262 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2908 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2908_pubkey[] = { 0x87, 0xd9, 0xd9, 0x64, 0x04, 0x4b, 0x5b, 0x16, 0x80, 0x1f, 0x32, 0xde, 0x9f, 0x3f, 0x90, 0x66, 0x19, 0x4e, 0x8b, 0xf8, 0x0a, 0xff, 0xa3, 0xcb, 0x0d, 0x4d, 0xdb, 0x1d, 0xb5, 0xeb, 0x9b, 0x65, 0x94, 0xe6, 0xd1, 0xbc, 0xac, 0xd0, 0xfd, 0x9d, 0x67, 0xc4, 0x08, 0xf7, 0x89, 0xdf, 0xb9, 0x5f, 0xeb, 0x79, 0xa6, 0xe2, 0xfb, 0x9c, 0x4c, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2908_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2908_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2908 = { .name = "ecdsa_secp224r1_sha224_2908", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2908_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2908_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2908_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 263 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2909 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2909_pubkey[] = { 0x46, 0x1b, 0x43, 0x5a, 0xf0, 0x9e, 0xde, 0x35, 0xe7, 0x4d, 0xac, 0x21, 0xf9, 0xaf, 0x7b, 0x1b, 0x99, 0x98, 0x21, 0x30, 0x39, 0xf8, 0x78, 0x5d, 0x4a, 0x49, 0x05, 0xf5, 0x18, 0xb8, 0x9b, 0xde, 0x69, 0xde, 0x34, 0xa4, 0x82, 0x63, 0x84, 0x61, 0xd0, 0x93, 0x86, 0xe7, 0x19, 0x3c, 0xa9, 0x0c, 0xa5, 0xb3, 0x03, 0x8e, 0x2a, 0x38, 0x85, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha224_2909_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2909_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2909 = { .name = "ecdsa_secp224r1_sha224_2909", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2909_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2909_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2909_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 264 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2910 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2910_pubkey[] = { 0x46, 0x1b, 0x43, 0x5a, 0xf0, 0x9e, 0xde, 0x35, 0xe7, 0x4d, 0xac, 0x21, 0xf9, 0xaf, 0x7b, 0x1b, 0x99, 0x98, 0x21, 0x30, 0x39, 0xf8, 0x78, 0x5d, 0x4a, 0x49, 0x05, 0xf5, 0x18, 0xb8, 0x9b, 0xde, 0x69, 0xde, 0x34, 0xa4, 0x82, 0x63, 0x84, 0x61, 0xd0, 0x93, 0x86, 0xe7, 0x19, 0x3c, 0xa9, 0x0c, 0xa5, 0xb3, 0x03, 0x8e, 0x2a, 0x38, 0x85, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha224_2910_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2910_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2910 = { .name = "ecdsa_secp224r1_sha224_2910", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2910_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2910_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2910_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 265 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2911 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2911_pubkey[] = { 0x80, 0x93, 0xaf, 0x8d, 0xb0, 0x4b, 0x3d, 0xd2, 0xe7, 0xc3, 0xc5, 0x9b, 0xb6, 0x4a, 0x83, 0x2c, 0x2f, 0xb8, 0xe8, 0xe1, 0x41, 0xba, 0xe7, 0xba, 0x15, 0x34, 0x95, 0x0a, 0x10, 0xc5, 0xe8, 0x7a, 0xec, 0xbd, 0x1f, 0xcd, 0xfc, 0x36, 0xcd, 0x18, 0xd4, 0x1b, 0x32, 0x38, 0xb2, 0xac, 0x61, 0x3e, 0xb7, 0xc9, 0xde, 0x98, 0x8d, 0x88, 0x18, 0x16, }; static const unsigned char ecdsa_secp224r1_sha224_2911_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2911_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2911 = { .name = "ecdsa_secp224r1_sha224_2911", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2911_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2911_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2911_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 266 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2912 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2912_pubkey[] = { 0xc6, 0xd7, 0x1f, 0x4b, 0xa0, 0x93, 0x3f, 0x12, 0x69, 0xf7, 0xd6, 0xdf, 0x83, 0xfd, 0x0c, 0x9c, 0x67, 0x25, 0x4f, 0x10, 0x1d, 0xcc, 0x12, 0x6d, 0xc1, 0x5f, 0xaa, 0x3e, 0x3c, 0x45, 0xdc, 0x9f, 0xed, 0xc7, 0x1c, 0x9f, 0x2b, 0x0d, 0xd1, 0xb1, 0x2b, 0x65, 0x62, 0x41, 0xf5, 0xe3, 0x35, 0x06, 0x6f, 0x3f, 0x92, 0x5b, 0xdb, 0xcf, 0xe9, 0x8f, }; static const unsigned char ecdsa_secp224r1_sha224_2912_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2912_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2912 = { .name = "ecdsa_secp224r1_sha224_2912", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2912_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2912_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2912_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 267 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2913 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2913_pubkey[] = { 0xbe, 0xb9, 0xd8, 0xdc, 0xba, 0x48, 0x14, 0x6b, 0x90, 0x32, 0x68, 0x8e, 0xce, 0xa9, 0x47, 0xa2, 0x31, 0xe7, 0xd0, 0xe6, 0xce, 0x17, 0xd7, 0x6b, 0x56, 0xed, 0x63, 0x48, 0x35, 0x50, 0x3f, 0x3b, 0x4a, 0xf4, 0x14, 0x87, 0x0e, 0xf0, 0x33, 0x83, 0x78, 0x4b, 0x1d, 0x84, 0x6b, 0x3e, 0x07, 0xb8, 0xe9, 0xfc, 0x2d, 0x61, 0x90, 0xa3, 0xbf, 0xda, }; static const unsigned char ecdsa_secp224r1_sha224_2913_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2913_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2913 = { .name = "ecdsa_secp224r1_sha224_2913", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2913_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2913_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2913_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 268 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2914 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2914_pubkey[] = { 0x19, 0x55, 0xba, 0x3f, 0x90, 0xe7, 0xa7, 0x39, 0x47, 0x1a, 0x5d, 0x18, 0x2b, 0x59, 0x4c, 0x97, 0x47, 0xeb, 0x49, 0xd5, 0x35, 0x62, 0x03, 0xf3, 0xbb, 0x8b, 0x93, 0x9c, 0x80, 0x7d, 0x88, 0xce, 0x3a, 0x08, 0x85, 0xbf, 0xa5, 0xb5, 0xb7, 0xf6, 0xe9, 0xbe, 0xb1, 0x82, 0x85, 0xe7, 0x13, 0x05, 0x24, 0xb6, 0xc1, 0x49, 0x8b, 0x32, 0x69, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2914_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2914_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2914 = { .name = "ecdsa_secp224r1_sha224_2914", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2914_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2914_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2914_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 269 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2915 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2915_pubkey[] = { 0x5c, 0xb9, 0xe5, 0xa5, 0x07, 0x1f, 0x2b, 0x37, 0xaa, 0x3a, 0x5e, 0x5f, 0x38, 0x9f, 0x54, 0xf9, 0x96, 0xb0, 0xbc, 0x8a, 0x13, 0x2e, 0xcb, 0x68, 0x85, 0x31, 0x8f, 0xbf, 0x4e, 0xc5, 0xf8, 0xb9, 0x3d, 0x8b, 0xf2, 0xa3, 0xb6, 0x4f, 0xa7, 0xca, 0xc3, 0x16, 0x39, 0x25, 0x62, 0xc4, 0x65, 0x67, 0x96, 0x3c, 0x43, 0xa6, 0x9f, 0x7a, 0x37, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2915_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2915_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2915 = { .name = "ecdsa_secp224r1_sha224_2915", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2915_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2915_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2915_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 270 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2916 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2916_pubkey[] = { 0x7b, 0x34, 0xef, 0x87, 0x23, 0xa4, 0x30, 0x9c, 0x0f, 0xa8, 0xa7, 0xec, 0x3a, 0x78, 0x34, 0x77, 0x65, 0x2a, 0x82, 0x89, 0x23, 0x70, 0xf6, 0x76, 0x33, 0x14, 0xfe, 0x7b, 0xde, 0xe6, 0x63, 0x85, 0x30, 0x71, 0xe3, 0x5f, 0xd3, 0xc7, 0x6f, 0x99, 0x1d, 0x78, 0x43, 0xc5, 0xe1, 0x68, 0xca, 0x65, 0x9b, 0x93, 0xbd, 0x60, 0x15, 0x51, 0x8f, 0xba, }; static const unsigned char ecdsa_secp224r1_sha224_2916_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2916_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2916 = { .name = "ecdsa_secp224r1_sha224_2916", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2916_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2916_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2916_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 271 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2917 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2917_pubkey[] = { 0x03, 0xf2, 0x6a, 0x9c, 0x13, 0x97, 0x9c, 0xf5, 0xd0, 0x90, 0xea, 0x25, 0xdc, 0x96, 0x63, 0x98, 0x02, 0x2c, 0xee, 0xc3, 0x15, 0x04, 0xab, 0xc4, 0xb1, 0x0f, 0x76, 0x76, 0x7d, 0x57, 0x7d, 0xcf, 0x47, 0xe1, 0x0e, 0x38, 0x4c, 0x6b, 0x9a, 0x22, 0x9a, 0x45, 0x5a, 0x9f, 0xd3, 0x3e, 0x54, 0xfe, 0x79, 0x60, 0xb8, 0xb0, 0x16, 0x0a, 0xef, 0x16, }; static const unsigned char ecdsa_secp224r1_sha224_2917_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2917_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2917 = { .name = "ecdsa_secp224r1_sha224_2917", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2917_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2917_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2917_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 272 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2918 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2918_pubkey[] = { 0xb6, 0x71, 0x29, 0x6d, 0xd5, 0xf6, 0x90, 0x50, 0x2e, 0x4b, 0x15, 0x00, 0xe4, 0xac, 0xb4, 0xc8, 0x2d, 0x3a, 0xa8, 0xdf, 0xbc, 0x58, 0x68, 0xa6, 0x43, 0xf8, 0x6a, 0x3c, 0xa4, 0x6b, 0xa8, 0xc3, 0xa7, 0xb8, 0x23, 0x25, 0x95, 0x22, 0x29, 0x1e, 0x24, 0x16, 0x23, 0x22, 0x76, 0xcc, 0xa8, 0x50, 0x3c, 0xc8, 0xdb, 0xf9, 0x41, 0xf1, 0xd9, 0x3d, }; static const unsigned char ecdsa_secp224r1_sha224_2918_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2918_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2918 = { .name = "ecdsa_secp224r1_sha224_2918", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2918_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2918_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2918_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 273 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2919 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2919_pubkey[] = { 0xb6, 0x71, 0x29, 0x6d, 0xd5, 0xf6, 0x90, 0x50, 0x2e, 0x4b, 0x15, 0x00, 0xe4, 0xac, 0xb4, 0xc8, 0x2d, 0x3a, 0xa8, 0xdf, 0xbc, 0x58, 0x68, 0xa6, 0x43, 0xf8, 0x6a, 0x3c, 0xa4, 0x6b, 0xa8, 0xc3, 0xa7, 0xb8, 0x23, 0x25, 0x95, 0x22, 0x29, 0x1e, 0x24, 0x16, 0x23, 0x22, 0x76, 0xcc, 0xa8, 0x50, 0x3c, 0xc8, 0xdb, 0xf9, 0x41, 0xf1, 0xd9, 0x3d, }; static const unsigned char ecdsa_secp224r1_sha224_2919_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2919_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2919 = { .name = "ecdsa_secp224r1_sha224_2919", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2919_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2919_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2919_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 274 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2920 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2920_pubkey[] = { 0x76, 0xe3, 0x4b, 0x57, 0xa8, 0xc6, 0x1d, 0xf5, 0x9c, 0xb0, 0xb7, 0x92, 0x1c, 0xec, 0x6e, 0x54, 0x22, 0x34, 0x40, 0x33, 0xf7, 0xac, 0xcb, 0x7b, 0x31, 0x79, 0xe6, 0x82, 0xce, 0xfd, 0x0a, 0x84, 0x83, 0x09, 0xd1, 0xde, 0xcf, 0x98, 0xa3, 0xb9, 0xe3, 0x33, 0x69, 0x1b, 0x95, 0xc1, 0x78, 0x21, 0xcb, 0x68, 0x11, 0x37, 0x63, 0x0c, 0x02, 0xe2, }; static const unsigned char ecdsa_secp224r1_sha224_2920_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2920_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2920 = { .name = "ecdsa_secp224r1_sha224_2920", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2920_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2920_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2920_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 275 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2921 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2921_pubkey[] = { 0x51, 0x83, 0x9e, 0x54, 0x5c, 0x87, 0x2f, 0x4a, 0x38, 0x1f, 0x27, 0x8e, 0xd5, 0xb4, 0xc2, 0x4c, 0xf3, 0x8a, 0xac, 0x77, 0xb0, 0x29, 0x53, 0x40, 0x56, 0x18, 0xbf, 0x27, 0x39, 0x4e, 0x41, 0x22, 0x65, 0x94, 0xc4, 0x99, 0xdb, 0x6a, 0x7d, 0xd7, 0xa6, 0x90, 0x1b, 0xda, 0x5e, 0x64, 0x74, 0xb1, 0xff, 0xa1, 0x0a, 0x65, 0x67, 0x21, 0x00, 0x10, }; static const unsigned char ecdsa_secp224r1_sha224_2921_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2921_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2921 = { .name = "ecdsa_secp224r1_sha224_2921", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2921_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2921_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2921_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 276 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2922 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2922_pubkey[] = { 0xa3, 0xec, 0x90, 0x05, 0x3d, 0x1e, 0x10, 0x08, 0x15, 0xd1, 0xbe, 0xcf, 0xe9, 0x6c, 0x9b, 0x36, 0x46, 0xe5, 0x2d, 0xf7, 0x94, 0xf6, 0xb0, 0x3b, 0x76, 0x6a, 0x75, 0x74, 0xc3, 0xb7, 0xe1, 0x7e, 0x73, 0xac, 0xc8, 0xce, 0xfe, 0x71, 0xb6, 0xeb, 0x13, 0xd4, 0xf1, 0xc9, 0x4c, 0x57, 0xe5, 0x8b, 0xee, 0x43, 0xc6, 0x9d, 0x9d, 0x41, 0xa9, 0x64, }; static const unsigned char ecdsa_secp224r1_sha224_2922_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2922_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2922 = { .name = "ecdsa_secp224r1_sha224_2922", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2922_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2922_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2922_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 277 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2923 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2923_pubkey[] = { 0xb5, 0xc0, 0x9b, 0x48, 0x51, 0xa6, 0x73, 0x71, 0xee, 0xe7, 0xbb, 0xf0, 0x24, 0x51, 0xe5, 0x20, 0x8c, 0x40, 0xde, 0x61, 0xbc, 0x1a, 0x33, 0xdf, 0x27, 0x10, 0xb3, 0x84, 0xdc, 0xce, 0x4e, 0x5b, 0x83, 0xc3, 0x2a, 0x80, 0x0e, 0x8d, 0xe2, 0x8f, 0xa9, 0x36, 0xd5, 0x82, 0xcd, 0xca, 0xd1, 0x85, 0xe8, 0x94, 0xca, 0xac, 0x79, 0x7f, 0x1d, 0x14, }; static const unsigned char ecdsa_secp224r1_sha224_2923_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2923_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2923 = { .name = "ecdsa_secp224r1_sha224_2923", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2923_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2923_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2923_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 278 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2924 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2924_pubkey[] = { 0x94, 0x1e, 0x28, 0x3b, 0xe3, 0x13, 0x00, 0xbf, 0xd4, 0xf6, 0xa1, 0x2b, 0x87, 0x6f, 0xd3, 0x26, 0x73, 0x52, 0x55, 0x1c, 0xc4, 0x9e, 0x9e, 0xef, 0x73, 0xf7, 0x65, 0x38, 0xc1, 0x15, 0xe5, 0xfe, 0x3b, 0x92, 0xf6, 0x43, 0xc6, 0xce, 0xf1, 0xc5, 0x8f, 0x3f, 0x86, 0x57, 0x57, 0x4d, 0x1f, 0x64, 0x95, 0x7d, 0x48, 0x80, 0x99, 0x5c, 0xde, 0x83, }; static const unsigned char ecdsa_secp224r1_sha224_2924_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2924_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0xee, 0xc1, 0x3b, 0x63, 0xfc, 0xb3, 0xd6, 0xe7, 0x36, 0x0a, 0xca, 0x56, 0x98, 0xf3, 0xef, 0x0f, 0x18, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2924 = { .name = "ecdsa_secp224r1_sha224_2924", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2924_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2924_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2924_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 279 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2925 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2925_pubkey[] = { 0x43, 0xc9, 0xcc, 0xd0, 0x8a, 0x80, 0xbc, 0xa1, 0x80, 0x22, 0x72, 0x2b, 0x0b, 0xdc, 0xd7, 0x90, 0xd8, 0x2a, 0x3e, 0xf8, 0xb6, 0x5c, 0x3f, 0x34, 0x20, 0x4b, 0xb4, 0x72, 0x9e, 0xe1, 0xc1, 0xf0, 0x05, 0x98, 0x13, 0x0b, 0x23, 0x13, 0xa3, 0xe3, 0x8a, 0x37, 0x98, 0xd0, 0x3d, 0xac, 0x66, 0x5c, 0xff, 0x20, 0xf3, 0x6c, 0xe8, 0xa2, 0x02, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha224_2925_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2925_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2925 = { .name = "ecdsa_secp224r1_sha224_2925", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2925_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2925_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2925_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 280 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2926 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2926_pubkey[] = { 0xd9, 0x58, 0xe4, 0x18, 0xfa, 0xd1, 0xc5, 0xea, 0x5c, 0x92, 0x3e, 0x61, 0x85, 0xe0, 0x3e, 0xd5, 0x53, 0x9d, 0x3f, 0x5f, 0x58, 0xdf, 0xac, 0x8b, 0xb9, 0xf1, 0x04, 0x59, 0x69, 0x97, 0xe4, 0x08, 0xc9, 0x7b, 0xe5, 0xfd, 0xc0, 0x37, 0xa5, 0xc0, 0x04, 0x38, 0x9d, 0x4b, 0x97, 0xeb, 0x1f, 0x54, 0x63, 0x5e, 0x98, 0x58, 0x53, 0xc1, 0xf0, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2926_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2926_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2926 = { .name = "ecdsa_secp224r1_sha224_2926", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2926_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2926_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2926_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 281 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2927 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2927_pubkey[] = { 0xd6, 0x29, 0xb4, 0x34, 0xc9, 0xb5, 0xd1, 0x57, 0xbd, 0x72, 0xe1, 0x14, 0xfd, 0x83, 0x95, 0x53, 0xf7, 0xf0, 0xe9, 0x46, 0x00, 0x93, 0x4a, 0x0a, 0x49, 0xe5, 0x9a, 0xa4, 0x71, 0x3a, 0x13, 0xc0, 0x17, 0x75, 0xe7, 0x5e, 0x2e, 0xba, 0xe7, 0x5d, 0x9e, 0x29, 0xd2, 0x50, 0x61, 0x84, 0x17, 0x7b, 0x7d, 0xd0, 0x86, 0x86, 0x93, 0x87, 0x35, 0x96, }; static const unsigned char ecdsa_secp224r1_sha224_2927_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2927_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd1, 0xbe, 0x91, 0x55, 0x7d, 0x86, 0x6a, 0xd5, 0xf2, 0x94, 0x5b, 0x14, 0xec, 0x33, 0x17, 0xbc, 0x43, 0xc1, 0x33, 0x8f, 0xd0, 0x6a, 0xf6, 0x49, 0x62, 0x01, 0xcc, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2927 = { .name = "ecdsa_secp224r1_sha224_2927", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2927_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2927_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2927_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 282 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2928 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2928_pubkey[] = { 0x3d, 0x2e, 0x9b, 0xb9, 0xa7, 0x12, 0xbf, 0x3a, 0xd4, 0x2a, 0xc3, 0x06, 0x59, 0xfd, 0xbd, 0xa9, 0xbe, 0x99, 0x56, 0x53, 0x7f, 0x9f, 0x37, 0xcd, 0x05, 0xf0, 0xff, 0x37, 0x7d, 0x59, 0x82, 0xd6, 0xd9, 0x26, 0x6d, 0x77, 0x49, 0x42, 0xc4, 0x4d, 0x9e, 0xb3, 0x50, 0x10, 0x51, 0xd3, 0xb9, 0x68, 0x86, 0x10, 0x13, 0x1e, 0x78, 0x56, 0xef, 0x36, }; static const unsigned char ecdsa_secp224r1_sha224_2928_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2928_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7a, 0xc5, 0x4a, 0x38, 0x1d, 0x9b, 0xd3, 0xf2, 0x69, 0x83, 0x59, 0xd6, 0xf6, 0x58, 0xb5, 0xe4, 0x16, 0x7d, 0x15, 0xa7, 0x5b, 0x57, 0x6e, 0x82, 0xd2, 0xef, 0xbd, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2928 = { .name = "ecdsa_secp224r1_sha224_2928", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2928_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2928_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2928_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 283 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2929 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2929_pubkey[] = { 0xa0, 0xbe, 0x2f, 0x10, 0x14, 0x4b, 0x9b, 0x42, 0xb0, 0x16, 0xf1, 0xbd, 0x9f, 0xca, 0x30, 0xe4, 0xc2, 0x4a, 0xae, 0x47, 0x75, 0x59, 0x6c, 0x7c, 0xdb, 0x07, 0xae, 0x60, 0xd6, 0x0f, 0xf3, 0xa7, 0x0f, 0x15, 0x41, 0x63, 0x1f, 0x60, 0x87, 0xd3, 0xf3, 0xb3, 0xfe, 0x37, 0x6d, 0x23, 0x05, 0xb5, 0x0b, 0x94, 0x82, 0x11, 0x06, 0x41, 0x24, 0x79, }; static const unsigned char ecdsa_secp224r1_sha224_2929_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2929_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4f, 0xbb, 0x06, 0x3e, 0x82, 0x40, 0x2e, 0x16, 0xfe, 0x14, 0xed, 0xda, 0x4d, 0x79, 0x86, 0xb0, 0xb8, 0x83, 0x44, 0xa1, 0xf5, 0x3b, 0x0e, 0x26, 0x84, 0xee, 0x7e, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2929 = { .name = "ecdsa_secp224r1_sha224_2929", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2929_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2929_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2929_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 284 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2930 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2930_pubkey[] = { 0x4d, 0x74, 0x39, 0x7a, 0x58, 0x6c, 0x8a, 0xc5, 0xe3, 0x26, 0xbe, 0xd0, 0x37, 0x20, 0xbd, 0xe7, 0x03, 0x7e, 0x4a, 0x07, 0xae, 0xe7, 0x20, 0x9f, 0x70, 0x49, 0x3c, 0xab, 0x10, 0x67, 0x78, 0xbf, 0xd0, 0x81, 0xd1, 0x7a, 0xb6, 0xdc, 0xb8, 0xfd, 0x8a, 0x45, 0x49, 0x62, 0x94, 0x1c, 0x26, 0xec, 0xc1, 0x9c, 0xda, 0x9f, 0xb7, 0x77, 0x19, 0xdb, }; static const unsigned char ecdsa_secp224r1_sha224_2930_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2930_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd3, 0xbe, 0x5f, 0x50, 0xd7, 0x26, 0xf9, 0x9b, 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6b, 0xfe, 0x78, 0xdd, 0x7a, 0xe6, 0x30, 0xd2, 0x27, 0xef, 0x0b, 0xa8, 0x7a, 0xe3, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2930 = { .name = "ecdsa_secp224r1_sha224_2930", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2930_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2930_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2930_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 285 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2931 for ECDSA, tcId is 286 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2931_pubkey[] = { 0x8c, 0x2f, 0x14, 0x9b, 0x17, 0x38, 0x24, 0x3f, 0x81, 0xa6, 0xf1, 0x21, 0x35, 0x39, 0x5a, 0x2b, 0xa2, 0x71, 0x88, 0x63, 0x62, 0x2e, 0x66, 0xe3, 0x3e, 0xfc, 0x24, 0x1f, 0x56, 0x38, 0xcf, 0x6a, 0xe9, 0xcf, 0xb3, 0x95, 0x78, 0xcf, 0x3a, 0x71, 0x97, 0x02, 0x05, 0x2e, 0x5e, 0x9e, 0x94, 0x02, 0x16, 0xc5, 0x13, 0x6d, 0xcb, 0x6e, 0xf0, 0x85, }; static const unsigned char ecdsa_secp224r1_sha224_2931_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2931_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xe5, 0xf5, 0x0d, 0x72, 0x6f, 0x99, 0xb8, 0xac, 0x44, 0xbf, 0xf8, 0x76, 0xcb, 0xf7, 0x10, 0xe4, 0x7f, 0x90, 0x87, 0xd1, 0xaf, 0xdf, 0xb1, 0xda, 0xb6, 0xd6, 0xda, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2931 = { .name = "ecdsa_secp224r1_sha224_2931", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2931_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2931_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2931_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 286 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2932 for ECDSA, tcId is 287 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2932_pubkey[] = { 0xad, 0x52, 0x27, 0xe4, 0x8a, 0xfa, 0xa1, 0x65, 0xe7, 0xb9, 0x7e, 0xf8, 0x21, 0x06, 0x87, 0x55, 0x6e, 0x10, 0x64, 0x3f, 0xda, 0x8a, 0x37, 0x7a, 0xaf, 0x4f, 0x5b, 0xf4, 0x12, 0xe8, 0x6d, 0x4a, 0xe5, 0x5f, 0x44, 0x60, 0xab, 0xa6, 0xa9, 0x32, 0xf3, 0x07, 0xee, 0x78, 0xef, 0xdc, 0x13, 0x6e, 0x9a, 0x3d, 0xf6, 0x31, 0x31, 0x00, 0xbf, 0x4f, }; static const unsigned char ecdsa_secp224r1_sha224_2932_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2932_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xcb, 0xea, 0x1a, 0xe4, 0xdf, 0x33, 0x71, 0x58, 0x89, 0x7f, 0xf0, 0xed, 0x97, 0xef, 0x0b, 0x26, 0x1e, 0x68, 0x1f, 0x65, 0x4b, 0xe2, 0x3a, 0x70, 0x11, 0x51, 0x8b, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2932 = { .name = "ecdsa_secp224r1_sha224_2932", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2932_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2932_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2932_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 287 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2933 for ECDSA, tcId is 288 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2933_pubkey[] = { 0x3f, 0xb9, 0x4a, 0x31, 0x65, 0xec, 0xde, 0xf4, 0x3f, 0xa2, 0x79, 0x07, 0xed, 0x07, 0x5c, 0xaf, 0x52, 0xc2, 0x54, 0x20, 0xac, 0x7b, 0xc7, 0xbb, 0x90, 0x40, 0x89, 0x92, 0x02, 0x3c, 0x4d, 0x7b, 0x47, 0x75, 0xb5, 0x91, 0xae, 0x22, 0x3d, 0xd4, 0xda, 0x9c, 0xea, 0xab, 0xd7, 0x3b, 0x97, 0x43, 0xdd, 0xab, 0x8b, 0x40, 0x57, 0x6e, 0x39, 0x3f, }; static const unsigned char ecdsa_secp224r1_sha224_2933_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2933_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd7, 0x26, 0xf9, 0x9b, 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0x2a, 0xa0, 0x7e, 0xc3, 0xcb, 0x1d, 0x94, 0x72, 0xbd, 0x70, 0x4f, 0x40, 0x29, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2933 = { .name = "ecdsa_secp224r1_sha224_2933", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2933_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2933_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2933_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 288 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2934 for ECDSA, tcId is 289 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2934_pubkey[] = { 0xe4, 0x5f, 0xcf, 0x0a, 0x7f, 0x4d, 0xc2, 0xa3, 0x08, 0xdc, 0x78, 0x68, 0x25, 0x14, 0x23, 0xfb, 0xf7, 0x1a, 0x20, 0x5a, 0x95, 0x46, 0x85, 0x0a, 0x01, 0xa7, 0x32, 0xfc, 0x9a, 0x73, 0xca, 0x4d, 0x41, 0x17, 0x50, 0x76, 0xf2, 0xf3, 0x62, 0xb2, 0x76, 0xec, 0xb0, 0xcc, 0xdb, 0x6e, 0x0b, 0xb3, 0x0c, 0x4a, 0x1b, 0x35, 0xc2, 0xe3, 0xed, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2934_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2934_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x97, 0x20, 0xb7, 0x55, 0x41, 0x3c, 0xca, 0x95, 0x06, 0xb5, 0xd2, 0x75, 0x89, 0xe5, 0x8a, 0xc4, 0xbe, 0xd8, 0x56, 0x76, 0x2b, 0xa7, 0xae, 0x20, 0xab, 0x5b, 0x43, 0xcc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2934 = { .name = "ecdsa_secp224r1_sha224_2934", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2934_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2934_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2934_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 289 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2935 for ECDSA, tcId is 290 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2935_pubkey[] = { 0x3c, 0x59, 0xe1, 0x39, 0x82, 0xfd, 0x9c, 0x1a, 0x45, 0x99, 0x1b, 0x1e, 0x9d, 0x79, 0xe9, 0x39, 0xa5, 0x2a, 0x62, 0xca, 0x47, 0x97, 0x64, 0xf1, 0x47, 0x7e, 0x28, 0x13, 0x1b, 0x00, 0x4c, 0x9b, 0xff, 0xd7, 0xf0, 0x0c, 0x05, 0xe3, 0x16, 0x8c, 0x62, 0x5c, 0xc9, 0x3a, 0xb7, 0xa0, 0xf1, 0xba, 0x8d, 0x6f, 0xa2, 0x6a, 0x4d, 0x51, 0x62, 0xcb, }; static const unsigned char ecdsa_secp224r1_sha224_2935_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2935_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2e, 0x41, 0x6e, 0xaa, 0x82, 0x79, 0x95, 0x2a, 0x0d, 0x6b, 0xa4, 0xeb, 0x13, 0xcb, 0xfe, 0xe6, 0x9c, 0xf7, 0xbc, 0xae, 0x43, 0x72, 0x32, 0xfb, 0xfa, 0x5a, 0x5d, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2935 = { .name = "ecdsa_secp224r1_sha224_2935", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2935_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2935_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2935_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 290 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2936 for ECDSA, tcId is 291 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2936_pubkey[] = { 0xc6, 0xb8, 0xff, 0x15, 0x2d, 0x7a, 0x1b, 0x7a, 0x99, 0xce, 0x34, 0x83, 0xbd, 0xea, 0xaf, 0x5b, 0xd2, 0xce, 0x64, 0xdc, 0x6b, 0x0f, 0x89, 0xcf, 0x35, 0x44, 0xb8, 0x7c, 0x05, 0x3a, 0xb6, 0xcf, 0x9c, 0xb5, 0x10, 0xdc, 0x14, 0x40, 0xab, 0x4e, 0x41, 0x2a, 0x16, 0x7f, 0x4c, 0x69, 0x36, 0x5f, 0xcf, 0xc9, 0x7f, 0x31, 0xd5, 0xba, 0x45, 0x81, }; static const unsigned char ecdsa_secp224r1_sha224_2936_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2936_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc5, 0x62, 0x25, 0xff, 0xc3, 0xb6, 0x5f, 0xbf, 0x14, 0x21, 0x77, 0x60, 0x9d, 0xb1, 0x89, 0xab, 0x5b, 0xd0, 0x13, 0x24, 0x6f, 0x19, 0xe1, 0x1c, 0xa5, 0xb5, 0xa1, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2936 = { .name = "ecdsa_secp224r1_sha224_2936", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2936_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2936_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2936_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 291 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2937 for ECDSA, tcId is 292 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2937_pubkey[] = { 0x7c, 0x07, 0x72, 0xfb, 0x65, 0x53, 0xc0, 0xec, 0x0d, 0xd1, 0xf7, 0x3b, 0x5d, 0xb3, 0x80, 0x76, 0x4d, 0x9f, 0x2f, 0x7a, 0xfb, 0x4e, 0xac, 0x1e, 0x77, 0x4d, 0xac, 0xd5, 0x6e, 0x2e, 0x5d, 0xe0, 0xdb, 0x63, 0xbf, 0x03, 0xcf, 0x96, 0x75, 0xea, 0xe6, 0xd2, 0xdf, 0xe5, 0x42, 0x4e, 0x79, 0xab, 0x39, 0x49, 0x51, 0xc9, 0xb6, 0x0a, 0xd5, 0xdf, }; static const unsigned char ecdsa_secp224r1_sha224_2937_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2937_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa7, 0xdd, 0x83, 0x1f, 0x41, 0x20, 0x17, 0x0b, 0x7f, 0x0a, 0x76, 0xed, 0x26, 0xbc, 0x4e, 0xa9, 0xcc, 0x9e, 0x1a, 0x70, 0x04, 0x8c, 0x1b, 0xb5, 0xf0, 0xa5, 0x54, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2937 = { .name = "ecdsa_secp224r1_sha224_2937", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2937_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2937_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2937_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 292 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2938 for ECDSA, tcId is 293 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2938_pubkey[] = { 0x41, 0x08, 0xe0, 0xcc, 0xd4, 0x7c, 0xba, 0x09, 0xfb, 0x7e, 0xd4, 0xd9, 0xf3, 0x45, 0x58, 0x23, 0x78, 0x09, 0x65, 0x15, 0x78, 0x61, 0xc1, 0xbf, 0x8f, 0x93, 0xd3, 0x4b, 0x46, 0xd6, 0xfd, 0xb7, 0x1e, 0x9e, 0x89, 0xad, 0xaa, 0xe7, 0x13, 0x76, 0xb1, 0x3f, 0xd1, 0x76, 0x44, 0xb1, 0x1e, 0xed, 0x00, 0xd4, 0x98, 0x78, 0x3d, 0xa0, 0xba, 0x1a, }; static const unsigned char ecdsa_secp224r1_sha224_2938_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2938_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2938 = { .name = "ecdsa_secp224r1_sha224_2938", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2938_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2938_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2938_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 293 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2939 for ECDSA, tcId is 294 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2939_pubkey[] = { 0x2f, 0x2d, 0xa4, 0x0a, 0x1b, 0x72, 0xf6, 0x7b, 0xa6, 0x36, 0x13, 0xa2, 0x43, 0x11, 0x9c, 0x41, 0xc7, 0x25, 0x28, 0x39, 0xcf, 0x10, 0x6e, 0x86, 0xb5, 0xd8, 0xe6, 0xe3, 0x5a, 0x1e, 0x0e, 0x2f, 0xc4, 0x9b, 0x4f, 0x31, 0x6f, 0x0c, 0x0e, 0x72, 0x36, 0x78, 0x57, 0x49, 0xeb, 0x34, 0xce, 0x92, 0x3c, 0x23, 0xae, 0xf3, 0x30, 0xaf, 0x87, 0x33, }; static const unsigned char ecdsa_secp224r1_sha224_2939_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2939_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2939 = { .name = "ecdsa_secp224r1_sha224_2939", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2939_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2939_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2939_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 294 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2940 for ECDSA, tcId is 295 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2940_pubkey[] = { 0x7d, 0xc0, 0x97, 0x10, 0xf4, 0xf5, 0x86, 0xaf, 0x05, 0xb0, 0x8f, 0x0c, 0x9d, 0xcd, 0x48, 0xb1, 0x30, 0x87, 0x33, 0xc9, 0x77, 0x67, 0xfc, 0x28, 0x6d, 0x1c, 0x72, 0x83, 0x43, 0x53, 0xa7, 0x04, 0xc7, 0x95, 0x0b, 0x8f, 0x4a, 0x11, 0x39, 0x4b, 0xc8, 0xdb, 0x06, 0xad, 0xcc, 0xf1, 0x9d, 0x8e, 0xd9, 0x5c, 0x7f, 0x21, 0x4a, 0x17, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha224_2940_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2940_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2940 = { .name = "ecdsa_secp224r1_sha224_2940", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2940_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2940_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2940_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 295 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2941 for ECDSA, tcId is 296 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2941_pubkey[] = { 0xdb, 0xb4, 0x39, 0xe2, 0xc3, 0xe9, 0xd1, 0x82, 0x2b, 0x94, 0xcc, 0xc7, 0xd9, 0x8c, 0x9f, 0xcb, 0x66, 0x8e, 0x65, 0xdd, 0x6a, 0x75, 0x9a, 0xd2, 0xdf, 0xdc, 0xd3, 0x28, 0x82, 0x66, 0x32, 0x34, 0xe6, 0xda, 0x51, 0x2d, 0x7d, 0x7d, 0x5f, 0xe7, 0x91, 0x56, 0xad, 0x0e, 0x19, 0xff, 0xc6, 0x2d, 0x61, 0x8e, 0x3c, 0xf4, 0x82, 0x76, 0x10, 0x6d, }; static const unsigned char ecdsa_secp224r1_sha224_2941_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2941_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2941 = { .name = "ecdsa_secp224r1_sha224_2941", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2941_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2941_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2941_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 296 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2942 for ECDSA, tcId is 297 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2942_pubkey[] = { 0xe0, 0x12, 0xdc, 0x20, 0xcc, 0xa5, 0xbd, 0x2a, 0xdf, 0xaa, 0x27, 0xf5, 0x74, 0x19, 0x59, 0x6c, 0xe0, 0x9e, 0xd0, 0xf1, 0x8a, 0x91, 0x48, 0xe3, 0x0a, 0x0f, 0x6e, 0xd2, 0x55, 0xbe, 0xca, 0x1b, 0x5e, 0x3e, 0x24, 0x85, 0xef, 0x95, 0x37, 0xae, 0x48, 0xa6, 0x7b, 0x72, 0xdb, 0xcf, 0x6d, 0x7b, 0x33, 0x37, 0x20, 0x23, 0xa5, 0xc4, 0x43, 0xe8, }; static const unsigned char ecdsa_secp224r1_sha224_2942_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2942_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2942 = { .name = "ecdsa_secp224r1_sha224_2942", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2942_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2942_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2942_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 297 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2943 for ECDSA, tcId is 298 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2943_pubkey[] = { 0xc5, 0x10, 0xab, 0x34, 0xab, 0xd4, 0x85, 0x5c, 0x54, 0xd6, 0x24, 0x07, 0xab, 0xe6, 0xca, 0x09, 0x0c, 0x73, 0xba, 0x49, 0xac, 0xa9, 0xde, 0x9b, 0xf1, 0x17, 0xbc, 0xa2, 0x42, 0xb3, 0xb0, 0x0c, 0x27, 0x2c, 0x22, 0x68, 0x1a, 0xf7, 0xc2, 0x55, 0x12, 0x0f, 0xac, 0x14, 0x8a, 0xd7, 0x3c, 0x81, 0xb4, 0x78, 0x46, 0xe4, 0xad, 0x2f, 0x56, 0x27, }; static const unsigned char ecdsa_secp224r1_sha224_2943_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2943_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2943 = { .name = "ecdsa_secp224r1_sha224_2943", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2943_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2943_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2943_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 298 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2944 for ECDSA, tcId is 299 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2944_pubkey[] = { 0x08, 0xa6, 0xe1, 0x67, 0x53, 0x6a, 0x47, 0xaa, 0xa2, 0x24, 0xfe, 0xc2, 0x1c, 0xe0, 0x77, 0x64, 0x2e, 0xfd, 0xb9, 0x7d, 0x93, 0xae, 0x16, 0xb9, 0x67, 0x22, 0x79, 0xf4, 0x33, 0xfb, 0x9f, 0x1a, 0xbb, 0x25, 0xf2, 0xc0, 0xc3, 0xe6, 0x00, 0x8a, 0xc8, 0x57, 0xed, 0xe4, 0xa8, 0x9c, 0xa8, 0xd9, 0xd0, 0x8b, 0x89, 0x96, 0x61, 0x49, 0x69, 0xac, }; static const unsigned char ecdsa_secp224r1_sha224_2944_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2944_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2944 = { .name = "ecdsa_secp224r1_sha224_2944", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2944_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2944_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2944_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 299 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2945 for ECDSA, tcId is 300 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2945_pubkey[] = { 0x1a, 0x83, 0xe1, 0x85, 0xfc, 0xf3, 0x0e, 0x6c, 0x69, 0xcf, 0x29, 0x2e, 0x49, 0x7d, 0x63, 0xcc, 0x04, 0xe6, 0xfd, 0x07, 0xcb, 0x93, 0x65, 0xa7, 0x4b, 0xe3, 0xc3, 0x9c, 0x6b, 0x2d, 0x56, 0x24, 0x7d, 0xf4, 0x9c, 0xf9, 0x41, 0x76, 0xc4, 0xe8, 0xef, 0xc8, 0x4e, 0xc7, 0x10, 0xcd, 0x0d, 0x61, 0x4d, 0xd0, 0x66, 0xc1, 0x6f, 0x6a, 0xd3, 0xe0, }; static const unsigned char ecdsa_secp224r1_sha224_2945_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2945_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2945 = { .name = "ecdsa_secp224r1_sha224_2945", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2945_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2945_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2945_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 300 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2946 for ECDSA, tcId is 301 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2946_pubkey[] = { 0x2d, 0x59, 0xef, 0xd8, 0x41, 0xa4, 0x4b, 0x83, 0xfd, 0x42, 0xe6, 0xa2, 0x98, 0x4a, 0x53, 0xfa, 0x93, 0xad, 0x24, 0x2c, 0x11, 0x67, 0x8f, 0x92, 0x20, 0x2c, 0xcc, 0xfb, 0x95, 0xbc, 0xaf, 0x0b, 0x2f, 0x6e, 0xb0, 0xe6, 0xd4, 0xd8, 0x3e, 0x32, 0x60, 0xe0, 0x37, 0xd3, 0xdc, 0x0e, 0x48, 0xab, 0x6c, 0x41, 0x41, 0xce, 0x6b, 0x56, 0xca, 0xd0, }; static const unsigned char ecdsa_secp224r1_sha224_2946_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2946_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2946 = { .name = "ecdsa_secp224r1_sha224_2946", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2946_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2946_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2946_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 301 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2947 for ECDSA, tcId is 302 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2947_pubkey[] = { 0x11, 0x61, 0xc7, 0xad, 0xd6, 0xf6, 0x7f, 0x99, 0x5b, 0x93, 0xe1, 0x9e, 0xb1, 0x8b, 0xd5, 0xe7, 0x3f, 0xd7, 0x1d, 0x6b, 0xb1, 0x0d, 0xce, 0xef, 0x0b, 0x79, 0x2e, 0x9c, 0x08, 0xc4, 0x4c, 0xef, 0x98, 0x26, 0xb4, 0xed, 0x67, 0x50, 0x8c, 0x09, 0xd0, 0x7e, 0xc8, 0x57, 0xa0, 0xea, 0x49, 0xed, 0x1a, 0x7f, 0x1f, 0xa2, 0xc7, 0x4c, 0xb8, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2947_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2947_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2947 = { .name = "ecdsa_secp224r1_sha224_2947", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2947_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2947_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2947_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 302 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2948 for ECDSA, tcId is 303 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2948_pubkey[] = { 0x84, 0xdc, 0x3d, 0x2e, 0xbf, 0xcf, 0x34, 0x80, 0x71, 0x3b, 0xae, 0xff, 0x30, 0xad, 0x07, 0x81, 0xbc, 0x8c, 0x4d, 0x06, 0xab, 0x6d, 0xdd, 0x4f, 0x7f, 0x10, 0x45, 0xaf, 0x75, 0x70, 0x53, 0x7c, 0x5d, 0x71, 0xa7, 0x8b, 0x1a, 0x04, 0x1a, 0xca, 0x0f, 0xe3, 0x5f, 0x64, 0x28, 0x24, 0xab, 0xda, 0x8c, 0x3f, 0xf2, 0xe9, 0xfc, 0xf5, 0xc8, 0xcb, }; static const unsigned char ecdsa_secp224r1_sha224_2948_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2948_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2948 = { .name = "ecdsa_secp224r1_sha224_2948", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2948_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2948_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2948_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 303 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2949 for ECDSA, tcId is 304 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2949_pubkey[] = { 0x17, 0x67, 0x57, 0x4e, 0x64, 0x5c, 0x55, 0x0e, 0xf3, 0xd3, 0x53, 0xf7, 0x6d, 0x44, 0x28, 0xf9, 0x61, 0x6a, 0xc2, 0x88, 0xb3, 0x63, 0x78, 0x85, 0x7d, 0xe3, 0x32, 0x62, 0x9f, 0xe0, 0x98, 0x25, 0xa5, 0x7f, 0x3a, 0x0e, 0xc1, 0x11, 0x89, 0xf4, 0x56, 0x02, 0x72, 0x29, 0x7a, 0xb6, 0xd5, 0xe0, 0x95, 0x40, 0x1f, 0xeb, 0xb6, 0x0d, 0x0d, 0xc9, }; static const unsigned char ecdsa_secp224r1_sha224_2949_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2949_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x1e, 0xf3, 0x59, 0xe4, 0xbd, 0x14, 0x6f, 0x63, 0xd8, 0x15, 0x5c, 0x5c, 0x25, 0x23, 0xfa, 0x33, 0x53, 0xc9, 0x82, 0x0f, 0x84, 0xf2, 0x81, 0x50, 0xba, 0xd3, 0x81, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2949 = { .name = "ecdsa_secp224r1_sha224_2949", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2949_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2949_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2949_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 304 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2950 for ECDSA, tcId is 305 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2950_pubkey[] = { 0x17, 0x67, 0x57, 0x4e, 0x64, 0x5c, 0x55, 0x0e, 0xf3, 0xd3, 0x53, 0xf7, 0x6d, 0x44, 0x28, 0xf9, 0x61, 0x6a, 0xc2, 0x88, 0xb3, 0x63, 0x78, 0x85, 0x7d, 0xe3, 0x32, 0x62, 0x60, 0x1f, 0x67, 0xda, 0x5a, 0x80, 0xc5, 0xf1, 0x3e, 0xee, 0x76, 0x0b, 0xa9, 0xfd, 0x8d, 0xd5, 0x85, 0x49, 0x2a, 0x1f, 0x6a, 0xbf, 0xe0, 0x14, 0x49, 0xf2, 0xf2, 0x38, }; static const unsigned char ecdsa_secp224r1_sha224_2950_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2950_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x1e, 0xf3, 0x59, 0xe4, 0xbd, 0x14, 0x6f, 0x63, 0xd8, 0x15, 0x5c, 0x5c, 0x25, 0x23, 0xfa, 0x33, 0x53, 0xc9, 0x82, 0x0f, 0x84, 0xf2, 0x81, 0x50, 0xba, 0xd3, 0x81, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2950 = { .name = "ecdsa_secp224r1_sha224_2950", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2950_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2950_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2950_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 305 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2951 for ECDSA, tcId is 306 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2951_pubkey[] = { 0xe2, 0xef, 0x8c, 0x8c, 0xcb, 0x58, 0xeb, 0xa2, 0x87, 0xd9, 0x27, 0x9b, 0x34, 0x9e, 0x76, 0x52, 0xcc, 0xa3, 0xe7, 0xcd, 0xa1, 0x88, 0xa5, 0xf1, 0x79, 0xd7, 0x71, 0x42, 0xf8, 0x75, 0x94, 0xf3, 0x66, 0x4c, 0x0f, 0xaf, 0x7b, 0x59, 0x67, 0x0e, 0x35, 0x3a, 0x37, 0x0d, 0x1d, 0x68, 0xad, 0x89, 0xd6, 0xa1, 0xe2, 0x46, 0xb4, 0xd0, 0x3b, 0xee, }; static const unsigned char ecdsa_secp224r1_sha224_2951_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2951_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2951 = { .name = "ecdsa_secp224r1_sha224_2951", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2951_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2951_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2951_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 306 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2952 for ECDSA, tcId is 307 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2952_pubkey[] = { 0xb8, 0xbf, 0x3e, 0xf9, 0x64, 0x6a, 0xbf, 0xff, 0xb8, 0x42, 0x20, 0x10, 0x4e, 0xc9, 0x96, 0xa9, 0x2c, 0xef, 0x33, 0xf9, 0x32, 0x8e, 0xc4, 0xcb, 0x1e, 0xa6, 0x99, 0x48, 0x4f, 0xea, 0x51, 0xa0, 0xde, 0x9e, 0x9d, 0x80, 0x1b, 0xab, 0xd4, 0x2c, 0xa0, 0x92, 0x4b, 0x36, 0x49, 0x8b, 0xc5, 0x90, 0x0f, 0xbe, 0xb9, 0xcb, 0xd5, 0xad, 0x9c, 0x1a, }; static const unsigned char ecdsa_secp224r1_sha224_2952_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2952_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2952 = { .name = "ecdsa_secp224r1_sha224_2952", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2952_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2952_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2952_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 307 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2953 for ECDSA, tcId is 308 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2953_pubkey[] = { 0x28, 0x6e, 0x80, 0x42, 0x9c, 0x87, 0x96, 0xdc, 0xd8, 0x85, 0xd9, 0x5f, 0x96, 0x0d, 0x20, 0x9f, 0xed, 0x19, 0xf8, 0x7e, 0x2c, 0xe4, 0x23, 0xd1, 0x66, 0xc8, 0xe2, 0x20, 0x2e, 0x30, 0x88, 0x2c, 0x09, 0x97, 0x0d, 0x5d, 0xd5, 0x8b, 0x67, 0xe5, 0xbb, 0x80, 0xaf, 0xfe, 0xc7, 0x42, 0x48, 0xa9, 0xcb, 0x4a, 0x78, 0x33, 0x84, 0xc8, 0xb6, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha224_2953_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2953_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2953 = { .name = "ecdsa_secp224r1_sha224_2953", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2953_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2953_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2953_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 308 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2954 for ECDSA, tcId is 309 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2954_pubkey[] = { 0x55, 0x99, 0xa3, 0xfa, 0xf9, 0x6a, 0xba, 0x73, 0x02, 0xbd, 0x3d, 0x98, 0xcf, 0xde, 0x69, 0x52, 0x5b, 0x72, 0x92, 0x76, 0x23, 0x83, 0xf4, 0xa0, 0xb5, 0xc3, 0x10, 0x39, 0x3f, 0xaa, 0x45, 0xfe, 0xb6, 0xc3, 0x5d, 0x2b, 0x7b, 0xf2, 0x5f, 0xfc, 0x63, 0x3c, 0x42, 0x0e, 0xbf, 0xc4, 0xe7, 0x15, 0x76, 0x53, 0x02, 0xc5, 0xa1, 0x1a, 0xc7, 0x93, }; static const unsigned char ecdsa_secp224r1_sha224_2954_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2954_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2954 = { .name = "ecdsa_secp224r1_sha224_2954", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2954_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2954_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2954_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 309 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2955 for ECDSA, tcId is 310 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2955_pubkey[] = { 0x5b, 0x52, 0x34, 0xb8, 0xdb, 0x6b, 0xbd, 0x39, 0x6e, 0xae, 0x7d, 0x1c, 0xa4, 0xe6, 0xd8, 0x77, 0x82, 0x4c, 0x98, 0xcd, 0xe9, 0xfb, 0xfa, 0xb3, 0x4b, 0x6b, 0x8c, 0xcb, 0x1f, 0x38, 0xae, 0x9f, 0x87, 0xad, 0xc3, 0xe6, 0xd2, 0x47, 0x4e, 0xb5, 0xe3, 0xcd, 0x9a, 0xef, 0xf0, 0x92, 0x73, 0x20, 0x21, 0x4b, 0xe5, 0x50, 0xf5, 0xe6, 0x2e, 0xd4, }; static const unsigned char ecdsa_secp224r1_sha224_2955_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2955_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2955 = { .name = "ecdsa_secp224r1_sha224_2955", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2955_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2955_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2955_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 310 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2956 for ECDSA, tcId is 311 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2956_pubkey[] = { 0xac, 0xed, 0x4e, 0xa8, 0x94, 0x9e, 0x5a, 0xe3, 0x7e, 0xf2, 0xf5, 0xeb, 0x5e, 0x00, 0x67, 0x5d, 0x08, 0xe1, 0x7c, 0x34, 0xbe, 0x66, 0x77, 0xb0, 0xf2, 0x69, 0xb6, 0x72, 0x5e, 0x3a, 0xd0, 0xaf, 0x49, 0xeb, 0xff, 0xf4, 0x15, 0xee, 0x4f, 0x2a, 0x83, 0x8e, 0xad, 0x1f, 0x84, 0xca, 0xfa, 0xa6, 0x52, 0xc1, 0x7a, 0xcc, 0x26, 0x13, 0x07, 0x25, }; static const unsigned char ecdsa_secp224r1_sha224_2956_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2956_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2956 = { .name = "ecdsa_secp224r1_sha224_2956", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2956_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2956_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2956_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 311 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2957 for ECDSA, tcId is 312 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2957_pubkey[] = { 0x3e, 0x8c, 0x1b, 0xcc, 0x16, 0x19, 0x5e, 0x87, 0x69, 0xe2, 0x5d, 0x4c, 0x85, 0x98, 0x07, 0xdf, 0xfe, 0x17, 0x8b, 0xed, 0x5b, 0xca, 0x9d, 0xb0, 0x6e, 0xfa, 0x15, 0x32, 0x4e, 0x3b, 0x53, 0xb3, 0x04, 0x8b, 0x8c, 0xcd, 0x8c, 0xdc, 0x12, 0x65, 0xbe, 0x24, 0x0c, 0x8e, 0xe2, 0x04, 0x06, 0x04, 0x86, 0xa9, 0x9a, 0xd3, 0x1e, 0xaa, 0xd3, 0xa4, }; static const unsigned char ecdsa_secp224r1_sha224_2957_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2957_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2957 = { .name = "ecdsa_secp224r1_sha224_2957", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2957_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2957_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2957_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 312 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2958 for ECDSA, tcId is 313 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2958_pubkey[] = { 0x24, 0x81, 0x93, 0x23, 0xb7, 0xbe, 0x8a, 0xb0, 0x91, 0x0f, 0x7f, 0x33, 0xbd, 0x2f, 0x76, 0x69, 0xc4, 0x4b, 0x13, 0xf0, 0x94, 0x79, 0x96, 0x5e, 0x95, 0x28, 0x7d, 0x13, 0xb0, 0x59, 0x23, 0x45, 0xbe, 0xaf, 0xbf, 0xdb, 0x8c, 0xf3, 0x62, 0x92, 0x69, 0xbd, 0xd8, 0x17, 0x72, 0x8d, 0x5d, 0x5c, 0xd3, 0xc2, 0x8b, 0xc6, 0xc6, 0x41, 0x4a, 0x70, }; static const unsigned char ecdsa_secp224r1_sha224_2958_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2958_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2958 = { .name = "ecdsa_secp224r1_sha224_2958", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2958_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2958_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2958_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 313 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2959 for ECDSA, tcId is 314 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2959_pubkey[] = { 0x44, 0xcf, 0x57, 0xba, 0xc3, 0x0a, 0x83, 0xda, 0x39, 0xf9, 0x0b, 0xf3, 0xfa, 0xac, 0xd5, 0x22, 0x11, 0xa7, 0x0f, 0xb9, 0x25, 0x47, 0xdb, 0x77, 0x78, 0xea, 0x6c, 0x81, 0x2b, 0x3f, 0xd1, 0xbf, 0x14, 0x68, 0x8d, 0x27, 0x70, 0xc5, 0x0c, 0xd5, 0xa8, 0x90, 0xa3, 0x80, 0x7b, 0xa0, 0xe8, 0x61, 0x21, 0x36, 0xa1, 0xb1, 0x1e, 0x03, 0x0f, 0x82, }; static const unsigned char ecdsa_secp224r1_sha224_2959_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2959_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2959 = { .name = "ecdsa_secp224r1_sha224_2959", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2959_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2959_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2959_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 314 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2960 for ECDSA, tcId is 315 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2960_pubkey[] = { 0xdc, 0x17, 0xf1, 0x00, 0x1d, 0x32, 0x61, 0x27, 0xf7, 0x37, 0x5c, 0xff, 0xa7, 0x0b, 0x75, 0x30, 0xbc, 0xa4, 0xda, 0x10, 0x40, 0xdc, 0x43, 0xd0, 0x04, 0x4a, 0xac, 0xa0, 0x7a, 0x14, 0x6f, 0x04, 0xc5, 0x29, 0x4c, 0xfe, 0x7e, 0x1e, 0xd5, 0x87, 0xda, 0x55, 0xba, 0xe7, 0x0b, 0x7f, 0xa8, 0xe3, 0x2f, 0x6a, 0xa8, 0x00, 0x31, 0x4d, 0x01, 0xdd, }; static const unsigned char ecdsa_secp224r1_sha224_2960_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2960_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2960 = { .name = "ecdsa_secp224r1_sha224_2960", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2960_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2960_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2960_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 315 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2961 for ECDSA, tcId is 316 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2961_pubkey[] = { 0x68, 0xe2, 0xd7, 0x08, 0x8e, 0xac, 0x18, 0xba, 0x77, 0x5b, 0xf6, 0x8c, 0x5c, 0x50, 0x9e, 0x86, 0xaf, 0xd6, 0xf9, 0x34, 0x51, 0xb4, 0xe4, 0xee, 0x1d, 0x73, 0xe2, 0x77, 0xe2, 0x4f, 0xf4, 0xe2, 0x7e, 0xf6, 0xc5, 0x19, 0xdb, 0x67, 0x6d, 0x82, 0x2c, 0x5d, 0xb0, 0x40, 0x48, 0x28, 0x88, 0x01, 0x3c, 0x8f, 0x38, 0x81, 0xbc, 0x9a, 0xc6, 0x5a, }; static const unsigned char ecdsa_secp224r1_sha224_2961_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2961_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2961 = { .name = "ecdsa_secp224r1_sha224_2961", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2961_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2961_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2961_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 316 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2962 for ECDSA, tcId is 317 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2962_pubkey[] = { 0xcd, 0x41, 0x71, 0xad, 0xcb, 0x8b, 0xe7, 0x5e, 0x77, 0x34, 0x06, 0x1a, 0x04, 0x8b, 0x2b, 0xf2, 0x28, 0xd1, 0x67, 0xc2, 0x74, 0x2d, 0x27, 0xf8, 0x54, 0x39, 0x20, 0x46, 0x86, 0x5e, 0xb9, 0x58, 0xeb, 0xd3, 0x20, 0xba, 0x87, 0x66, 0x2a, 0xd3, 0xac, 0x7a, 0xf5, 0x68, 0xc6, 0xbe, 0x0f, 0x09, 0xbe, 0x09, 0x0b, 0xcf, 0xe0, 0x83, 0xb3, 0xe5, }; static const unsigned char ecdsa_secp224r1_sha224_2962_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2962_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2962 = { .name = "ecdsa_secp224r1_sha224_2962", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2962_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2962_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2962_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 317 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2963 for ECDSA, tcId is 318 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2963_pubkey[] = { 0xee, 0xfd, 0xf9, 0x9a, 0xb6, 0x9d, 0x18, 0x88, 0x77, 0x2c, 0xab, 0xe2, 0x1d, 0x40, 0x60, 0x45, 0xe1, 0xbe, 0xab, 0x82, 0x76, 0x1a, 0x70, 0x40, 0xbe, 0xeb, 0x7e, 0xd3, 0x59, 0x71, 0x8c, 0x88, 0x9a, 0xf8, 0x0f, 0x22, 0xf3, 0x20, 0xfb, 0xe6, 0x62, 0xd5, 0xea, 0x0f, 0x65, 0xdf, 0xb4, 0xa5, 0x58, 0x9c, 0x29, 0x4c, 0xe5, 0xb7, 0x33, 0x59, }; static const unsigned char ecdsa_secp224r1_sha224_2963_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2963_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2963 = { .name = "ecdsa_secp224r1_sha224_2963", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2963_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2963_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2963_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 318 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2964 for ECDSA, tcId is 319 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2964_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2964_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2964_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2964 = { .name = "ecdsa_secp224r1_sha224_2964", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2964_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2964_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2964_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 319 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2965 for ECDSA, tcId is 320 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2965_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha224_2965_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2965_sig[] = { 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0xee, 0xc1, 0x3b, 0x63, 0xfc, 0xb3, 0xd6, 0xe7, 0x36, 0x0a, 0xca, 0x56, 0x98, 0xf3, 0xef, 0x0f, 0x18, 0x11, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2965 = { .name = "ecdsa_secp224r1_sha224_2965", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2965_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2965_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2965_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 320 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2966 for ECDSA, tcId is 321 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2966_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha224_2966_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2966_sig[] = { 0x75, 0x3b, 0xb4, 0x00, 0x78, 0x93, 0x40, 0x81, 0xd7, 0xbd, 0x11, 0x3e, 0xc4, 0x9b, 0x19, 0xef, 0x09, 0xd1, 0xba, 0x33, 0x49, 0x86, 0x90, 0x51, 0x6d, 0x4d, 0x12, 0x2c, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2966 = { .name = "ecdsa_secp224r1_sha224_2966", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2966_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2966_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2966_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 321 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2967 for ECDSA, tcId is 322 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2967_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha224_2967_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2967_sig[] = { 0x8a, 0xc4, 0x4b, 0xff, 0x87, 0x6c, 0xbf, 0x7e, 0x28, 0x42, 0xee, 0xc1, 0x3b, 0x63, 0xfc, 0xb3, 0xd6, 0xe7, 0x36, 0x0a, 0xca, 0x56, 0x98, 0xf3, 0xef, 0x0f, 0x18, 0x11, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2967 = { .name = "ecdsa_secp224r1_sha224_2967", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2967_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2967_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2967_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 322 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2968 for ECDSA, tcId is 323 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2968_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2968_sig[] = { 0x27, 0x70, 0x40, 0x3d, 0x42, 0xb7, 0xb4, 0x5e, 0x55, 0x33, 0x08, 0xd1, 0xf6, 0xa4, 0x80, 0x64, 0x0b, 0x61, 0xca, 0xc0, 0xae, 0x36, 0x66, 0x5d, 0x6f, 0x14, 0xd3, 0x4e, 0x85, 0x50, 0x6b, 0x04, 0x04, 0x26, 0x5e, 0xde, 0xdf, 0x9a, 0x89, 0xfc, 0x7c, 0x9c, 0x7a, 0x55, 0xc1, 0x6c, 0x5b, 0x0d, 0x78, 0x1f, 0x77, 0x4d, 0xe8, 0xf4, 0x6f, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2968 = { .name = "ecdsa_secp224r1_sha224_2968", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2968_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha224_2968_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 323 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2969 for ECDSA, tcId is 324 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2969_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2969_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha224_2969_sig[] = { 0xb6, 0x8d, 0xa7, 0x22, 0xbb, 0xba, 0x7f, 0x6a, 0x58, 0x41, 0x7b, 0xb5, 0xd0, 0xdd, 0x88, 0xf4, 0x03, 0x16, 0xfc, 0x62, 0x8b, 0x0e, 0xdf, 0xcb, 0x0f, 0x02, 0xb0, 0x62, 0x5c, 0x74, 0x2e, 0x33, 0x0b, 0x6f, 0xeb, 0xad, 0xf9, 0xa1, 0x2d, 0x58, 0xba, 0x2a, 0x71, 0x99, 0x62, 0x94, 0x57, 0xef, 0x2e, 0x9e, 0x4c, 0xec, 0xd2, 0xf0, 0x9f, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2969 = { .name = "ecdsa_secp224r1_sha224_2969", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2969_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2969_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha224_2969_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 324 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2970 for ECDSA, tcId is 325 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2970_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2970_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha224_2970_sig[] = { 0x01, 0xec, 0x1f, 0xf1, 0x5c, 0x8a, 0x55, 0xd6, 0x97, 0xa5, 0x42, 0x4d, 0x67, 0x47, 0x53, 0xf8, 0x2f, 0x71, 0x15, 0x93, 0x82, 0x83, 0x68, 0xd2, 0xfb, 0xb4, 0x1a, 0x17, 0x20, 0xd9, 0x08, 0x9d, 0xb7, 0xba, 0xf4, 0x6b, 0x81, 0x35, 0xe1, 0x7e, 0x01, 0x64, 0x5e, 0x73, 0x2d, 0x22, 0xd5, 0xad, 0xb2, 0x0e, 0x37, 0x72, 0xda, 0x74, 0x0e, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2970 = { .name = "ecdsa_secp224r1_sha224_2970", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2970_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2970_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha224_2970_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 325 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2971 for ECDSA, tcId is 326 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2971_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha224_2971_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2971_sig[] = { 0x3e, 0x46, 0xe9, 0xba, 0x4d, 0xc0, 0x89, 0xff, 0x30, 0xfa, 0x8c, 0x02, 0x09, 0xc3, 0x1b, 0x11, 0xff, 0x49, 0xdb, 0xee, 0xc0, 0x90, 0xf9, 0xf5, 0x3c, 0x00, 0x0c, 0x75, 0x6f, 0x2e, 0x3b, 0x36, 0x36, 0x94, 0x16, 0x60, 0x2b, 0xca, 0x83, 0x20, 0x68, 0x09, 0xed, 0x89, 0x8f, 0xcf, 0x15, 0x8a, 0x56, 0xc2, 0x5a, 0x54, 0x74, 0x14, 0x3f, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2971 = { .name = "ecdsa_secp224r1_sha224_2971", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2971_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2971_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha224_2971_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 326 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2972 for ECDSA, tcId is 327 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2972_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2972_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2972_sig[] = { 0x77, 0xb3, 0x8d, 0xa3, 0x70, 0x79, 0xd2, 0x7b, 0x83, 0x76, 0x13, 0xac, 0x3e, 0x82, 0x48, 0xd6, 0x6e, 0xab, 0xd5, 0xd6, 0x37, 0x07, 0x6c, 0x8e, 0x62, 0xc7, 0x99, 0x1e, 0xd4, 0x0c, 0xd9, 0xf8, 0x1e, 0xfc, 0x52, 0xdb, 0x44, 0x29, 0xc0, 0xc1, 0xaf, 0x7c, 0x1d, 0x8a, 0x22, 0xb6, 0xc7, 0xba, 0xbb, 0xe7, 0xfb, 0xd8, 0xb5, 0xb3, 0xf0, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2972 = { .name = "ecdsa_secp224r1_sha224_2972", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2972_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2972_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2972_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 327 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2973 for ECDSA, tcId is 328 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2973_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2973_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2973_sig[] = { 0x8c, 0x03, 0xb3, 0x2c, 0x16, 0x6c, 0x0c, 0x8b, 0x99, 0xd7, 0xf8, 0x76, 0xac, 0xd1, 0x09, 0x44, 0x7e, 0xfb, 0x13, 0xf6, 0xb8, 0x29, 0x45, 0xe7, 0x8d, 0x51, 0xa2, 0x69, 0x65, 0x75, 0x68, 0xf1, 0xa0, 0xa8, 0xbd, 0x7d, 0xf5, 0xff, 0xa4, 0x30, 0x97, 0xeb, 0xb2, 0xb6, 0x44, 0x35, 0xc8, 0xe3, 0x33, 0x5b, 0xca, 0xaf, 0xc6, 0x3f, 0x9e, 0xd5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2973 = { .name = "ecdsa_secp224r1_sha224_2973", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2973_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2973_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2973_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 328 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2974 for ECDSA, tcId is 329 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2974_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha224_2974_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2974_sig[] = { 0xd1, 0x99, 0xa3, 0x75, 0x25, 0x3d, 0x30, 0xf1, 0xd2, 0xb4, 0x49, 0x35, 0x42, 0xe9, 0x93, 0x4f, 0x9f, 0x1f, 0x8b, 0x06, 0x80, 0x11, 0x76, 0x79, 0xf5, 0xbc, 0x4a, 0xd2, 0x11, 0x41, 0x9d, 0xdb, 0xf0, 0x2c, 0x8a, 0xd5, 0xf5, 0x18, 0xf8, 0xda, 0xc3, 0x3f, 0x86, 0xa8, 0x5e, 0x77, 0x7a, 0xf5, 0x1a, 0x03, 0x41, 0x32, 0xe2, 0x76, 0x7a, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2974 = { .name = "ecdsa_secp224r1_sha224_2974", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2974_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2974_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2974_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 329 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2975 for ECDSA, tcId is 330 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2975_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha224_2975_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2975_sig[] = { 0x8f, 0xf8, 0x26, 0x99, 0xe2, 0xe8, 0x28, 0x70, 0xbe, 0x9c, 0xfd, 0xd8, 0xa4, 0x08, 0xbb, 0x34, 0xf8, 0xf3, 0x8a, 0x83, 0xa4, 0xac, 0x83, 0x70, 0xf1, 0x8f, 0x2b, 0xc8, 0x7e, 0x50, 0x08, 0xfa, 0xb6, 0xa0, 0xd4, 0x15, 0x92, 0x00, 0x07, 0x7e, 0xf9, 0x91, 0x8d, 0xad, 0x65, 0x92, 0xcd, 0x83, 0x59, 0x83, 0x88, 0x52, 0xc6, 0x36, 0xac, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2975 = { .name = "ecdsa_secp224r1_sha224_2975", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2975_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2975_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2975_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 330 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2976 for ECDSA, tcId is 331 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2976_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha224_2976_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2976_sig[] = { 0x3f, 0x3b, 0x60, 0xb5, 0x29, 0xae, 0x0f, 0x95, 0x0c, 0x51, 0x72, 0x64, 0xad, 0xf2, 0xe4, 0x81, 0x61, 0x6b, 0xc4, 0x74, 0x16, 0x74, 0x2d, 0x51, 0x03, 0x58, 0x96, 0x60, 0xf7, 0x31, 0xeb, 0xe9, 0x8e, 0x58, 0x38, 0x4b, 0x3a, 0x64, 0xb4, 0x69, 0x6d, 0x4c, 0xc9, 0x61, 0x98, 0x28, 0xad, 0x51, 0xd7, 0xc3, 0x99, 0x80, 0x74, 0x97, 0x09, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2976 = { .name = "ecdsa_secp224r1_sha224_2976", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2976_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2976_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2976_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 331 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2977 for ECDSA, tcId is 332 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2977_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha224_2977_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2977_sig[] = { 0xdc, 0x11, 0xff, 0xdc, 0x6b, 0x78, 0x75, 0x4a, 0x33, 0x5f, 0x16, 0x8c, 0x40, 0x33, 0x91, 0x6a, 0x21, 0x58, 0xd1, 0x25, 0xa3, 0xf4, 0xfe, 0xd9, 0xdc, 0x73, 0x66, 0x61, 0x6d, 0xd8, 0x43, 0x64, 0x71, 0x7d, 0x9f, 0x4b, 0x07, 0x90, 0xf2, 0xb2, 0x82, 0xf9, 0x24, 0x5e, 0xcb, 0x31, 0x68, 0x74, 0xea, 0xc0, 0x25, 0x60, 0x03, 0x97, 0xf1, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2977 = { .name = "ecdsa_secp224r1_sha224_2977", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2977_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2977_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2977_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 332 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2978 for ECDSA, tcId is 333 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2978_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha224_2978_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2978_sig[] = { 0xa5, 0x9b, 0x25, 0xb7, 0x86, 0xd5, 0x5f, 0x26, 0xb0, 0x4d, 0xfe, 0x90, 0xee, 0x02, 0xa6, 0xbd, 0xe6, 0x4e, 0xd6, 0xe4, 0x31, 0xdc, 0x9f, 0xbd, 0xc3, 0xab, 0x36, 0x0e, 0xfc, 0x14, 0xb5, 0xad, 0x20, 0xf3, 0x9d, 0xa9, 0x90, 0x0e, 0x35, 0x43, 0x79, 0x36, 0xc8, 0x62, 0x6f, 0xcc, 0xf6, 0x63, 0x2e, 0x7a, 0x3d, 0x9e, 0x58, 0x7e, 0x33, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2978 = { .name = "ecdsa_secp224r1_sha224_2978", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2978_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2978_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2978_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 333 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2979 for ECDSA, tcId is 334 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2979_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha224_2979_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2979_sig[] = { 0x2e, 0xda, 0x1f, 0x96, 0xc1, 0xa6, 0xe3, 0xad, 0x8a, 0x33, 0x21, 0xce, 0x82, 0xcb, 0xb1, 0x3a, 0x5b, 0x93, 0x5b, 0x50, 0x1a, 0xbf, 0x6c, 0x06, 0xf7, 0xfd, 0x2b, 0x3f, 0xe8, 0x10, 0x50, 0xc3, 0xe5, 0xf5, 0x3a, 0x3c, 0x7b, 0x9d, 0x0b, 0xdb, 0x9e, 0xd9, 0x2a, 0x32, 0x6d, 0xfe, 0xac, 0x44, 0x79, 0x1b, 0xa1, 0xab, 0xe4, 0xd6, 0xe9, 0x73, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2979 = { .name = "ecdsa_secp224r1_sha224_2979", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2979_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2979_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2979_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 334 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2980 for ECDSA, tcId is 335 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2980_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha224_2980_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2980_sig[] = { 0x60, 0xf5, 0xe0, 0x93, 0xfd, 0xa0, 0x8f, 0xc1, 0x4a, 0xc9, 0x9d, 0x82, 0x0a, 0x18, 0xad, 0x13, 0x70, 0xc5, 0x81, 0x50, 0xbe, 0xa0, 0xac, 0xa2, 0x4f, 0xc6, 0xdb, 0x9d, 0xc2, 0x22, 0x0a, 0x0e, 0xbb, 0xf4, 0x89, 0x6e, 0x68, 0xfd, 0xb5, 0xbd, 0x82, 0x4f, 0x88, 0x29, 0x1c, 0x1c, 0x86, 0x2b, 0x91, 0x6f, 0x9c, 0x4a, 0xf8, 0x7f, 0x8f, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2980 = { .name = "ecdsa_secp224r1_sha224_2980", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2980_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2980_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2980_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 335 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2981 for ECDSA, tcId is 336 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2981_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2981_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2981_sig[] = { 0x2e, 0xad, 0x37, 0x84, 0x6a, 0x5e, 0x36, 0xa4, 0x90, 0xb7, 0x51, 0x40, 0xbd, 0xc7, 0xb6, 0x36, 0xc6, 0xe9, 0xf6, 0xd8, 0xf9, 0x80, 0xf6, 0xfa, 0xdb, 0x08, 0xf7, 0x69, 0xe1, 0xfe, 0x13, 0x0a, 0xe1, 0x79, 0x8c, 0x19, 0x6d, 0x7b, 0xe6, 0x2c, 0x7a, 0x5d, 0xdb, 0x31, 0x68, 0xcf, 0x4b, 0x8d, 0x48, 0xb6, 0xb6, 0xb4, 0xdc, 0x94, 0xab, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2981 = { .name = "ecdsa_secp224r1_sha224_2981", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2981_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2981_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2981_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 336 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2982 for ECDSA, tcId is 337 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2982_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2982_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2982_sig[] = { 0xa8, 0xa4, 0xc9, 0x41, 0x6d, 0x72, 0xc8, 0x60, 0x57, 0x3d, 0x07, 0x32, 0x81, 0xcb, 0x08, 0xc8, 0x6a, 0xd6, 0x53, 0x13, 0xf0, 0x6b, 0x15, 0xa3, 0x29, 0xe8, 0x2e, 0xb2, 0x5a, 0x6e, 0xdd, 0x2f, 0x08, 0x16, 0xb7, 0x26, 0x3d, 0x91, 0x5d, 0x72, 0xc6, 0x7d, 0x50, 0xa8, 0x54, 0xe3, 0xab, 0xee, 0x5c, 0xde, 0x1b, 0x67, 0x9a, 0x0c, 0xef, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2982 = { .name = "ecdsa_secp224r1_sha224_2982", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2982_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2982_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2982_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 337 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2983 for ECDSA, tcId is 338 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2983_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha224_2983_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2983_sig[] = { 0x57, 0x6b, 0xb8, 0x6c, 0x51, 0x7b, 0xfe, 0xcd, 0xc9, 0x30, 0xa4, 0xc8, 0x50, 0x17, 0x25, 0x54, 0x8d, 0x42, 0x5a, 0xfb, 0xb9, 0x6d, 0x93, 0xf5, 0xc1, 0xe2, 0xa0, 0xe1, 0x77, 0x24, 0x8c, 0x5e, 0xcd, 0x62, 0x0c, 0x43, 0x14, 0x38, 0xc5, 0x0e, 0x6b, 0xee, 0x68, 0x58, 0x09, 0x1b, 0x54, 0xa8, 0x7f, 0x85, 0x48, 0xae, 0x35, 0xc2, 0x10, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2983 = { .name = "ecdsa_secp224r1_sha224_2983", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2983_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2983_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2983_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 338 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2984 for ECDSA, tcId is 339 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2984_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha224_2984_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2984_sig[] = { 0x34, 0xe4, 0x1c, 0xba, 0x62, 0x8f, 0xd8, 0x78, 0x7b, 0xa1, 0xa5, 0x28, 0xf6, 0x01, 0x5d, 0x2c, 0xae, 0x01, 0x5c, 0x1c, 0x9a, 0x86, 0x6e, 0x08, 0xa7, 0x13, 0x38, 0x01, 0x83, 0xd4, 0x22, 0xff, 0xdd, 0x99, 0xcc, 0x3c, 0x6d, 0x70, 0x96, 0xef, 0x92, 0x7f, 0x0b, 0x11, 0x98, 0x8d, 0x18, 0x24, 0xe6, 0xe9, 0x38, 0x40, 0xff, 0x66, 0x6c, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2984 = { .name = "ecdsa_secp224r1_sha224_2984", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2984_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2984_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2984_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 339 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2985 for ECDSA, tcId is 340 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2985_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha224_2985_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2985_sig[] = { 0x25, 0x58, 0xa4, 0x2e, 0x79, 0x68, 0x92, 0x44, 0xbc, 0xcd, 0x5e, 0x85, 0x5f, 0x6a, 0x1e, 0x42, 0xb4, 0xff, 0x72, 0x68, 0x73, 0xf3, 0x0b, 0x53, 0x2b, 0x89, 0xef, 0x53, 0x07, 0xf9, 0xbd, 0x94, 0x77, 0x85, 0x18, 0x71, 0x75, 0xd8, 0x48, 0xb6, 0xe2, 0xd7, 0x9f, 0x7a, 0xb3, 0xbb, 0xc1, 0x08, 0x7b, 0x42, 0x59, 0x0b, 0x0c, 0xfb, 0x25, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2985 = { .name = "ecdsa_secp224r1_sha224_2985", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2985_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2985_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2985_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 340 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2986 for ECDSA, tcId is 341 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2986_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha224_2986_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2986_sig[] = { 0xd5, 0xfe, 0x7d, 0xd5, 0xfb, 0x4f, 0xd1, 0xea, 0x5c, 0xe6, 0x6c, 0x08, 0x24, 0xf5, 0x3f, 0x96, 0xce, 0x47, 0xfd, 0x9b, 0x6c, 0x63, 0xb4, 0xd5, 0x78, 0x27, 0xfd, 0x17, 0xbc, 0xe5, 0xbc, 0x3a, 0xf7, 0x05, 0xaf, 0xaa, 0xcb, 0x81, 0xbf, 0xa6, 0xd5, 0x52, 0xd6, 0x19, 0x89, 0x62, 0xfe, 0xce, 0x9f, 0xba, 0x41, 0x54, 0x6c, 0x60, 0x2d, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2986 = { .name = "ecdsa_secp224r1_sha224_2986", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2986_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2986_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2986_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 341 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2987 for ECDSA, tcId is 342 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2987_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha224_2987_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2987_sig[] = { 0x8c, 0x1d, 0xa2, 0xf0, 0x7c, 0xdc, 0xbc, 0xe4, 0xdb, 0x80, 0x67, 0xb8, 0x63, 0x46, 0x8c, 0xfc, 0x72, 0x8d, 0xf5, 0x29, 0x80, 0x22, 0x90, 0x28, 0x68, 0x9e, 0x57, 0xb6, 0x32, 0x17, 0x5c, 0x13, 0x90, 0xa4, 0xb2, 0xca, 0xb6, 0x35, 0x9b, 0xab, 0x9f, 0x85, 0x49, 0x57, 0xd4, 0xfd, 0x79, 0x76, 0xc9, 0xc6, 0xd9, 0x20, 0xc8, 0x71, 0xc0, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2987 = { .name = "ecdsa_secp224r1_sha224_2987", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2987_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2987_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2987_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 342 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2988 for ECDSA, tcId is 343 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2988_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha224_2988_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2988_sig[] = { 0xe4, 0x6d, 0x4f, 0x11, 0xb8, 0x6b, 0x5a, 0x12, 0xf6, 0xfe, 0x78, 0x1d, 0x1f, 0x93, 0x4e, 0xf2, 0xb3, 0x0e, 0x78, 0xf6, 0xf9, 0xcc, 0x86, 0xa9, 0x99, 0x6e, 0x20, 0xc0, 0x83, 0x51, 0x97, 0x4b, 0x96, 0x55, 0x26, 0x03, 0x4a, 0x0c, 0xce, 0xf0, 0xe7, 0xd3, 0xbc, 0x13, 0xd9, 0x17, 0x98, 0x15, 0x14, 0x88, 0xc9, 0x15, 0x33, 0x14, 0x3f, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2988 = { .name = "ecdsa_secp224r1_sha224_2988", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2988_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2988_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2988_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 343 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2989 for ECDSA, tcId is 344 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2989_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha224_2989_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2989_sig[] = { 0x30, 0x5c, 0xcf, 0x0b, 0x5d, 0x0c, 0xf3, 0x3d, 0xc7, 0x45, 0xbb, 0x7c, 0x79, 0x64, 0xc2, 0x33, 0xf6, 0xcf, 0xd8, 0x89, 0x2a, 0x1c, 0x1a, 0xe9, 0xf5, 0x0b, 0x2f, 0x3f, 0x78, 0x5f, 0x6e, 0x85, 0xf5, 0xe6, 0x52, 0x58, 0x7c, 0x6e, 0x15, 0xd0, 0xc4, 0x5c, 0x42, 0x72, 0x78, 0xcf, 0x65, 0xbb, 0x14, 0x29, 0xa5, 0x7d, 0x88, 0x26, 0xca, 0x39, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2989 = { .name = "ecdsa_secp224r1_sha224_2989", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2989_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2989_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2989_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 344 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2990 for ECDSA, tcId is 345 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2990_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha224_2990_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2990_sig[] = { 0x0e, 0x4f, 0xde, 0x0a, 0xc8, 0xd3, 0x75, 0x36, 0x50, 0x5f, 0x7b, 0x8b, 0xdc, 0x2d, 0x22, 0xc5, 0xc3, 0x34, 0xb0, 0x64, 0xac, 0x5e, 0xd2, 0x7b, 0xea, 0x9c, 0x17, 0x9e, 0xc4, 0xd6, 0xbf, 0x82, 0x9d, 0xd5, 0x47, 0x00, 0x0d, 0x6f, 0x70, 0xb9, 0xad, 0x9e, 0x9c, 0x15, 0x03, 0xbe, 0xbc, 0xf1, 0xd9, 0x5c, 0x26, 0x08, 0x94, 0x2c, 0xa1, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2990 = { .name = "ecdsa_secp224r1_sha224_2990", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2990_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2990_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2990_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 345 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2991 for ECDSA, tcId is 346 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2991_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha224_2991_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2991_sig[] = { 0x81, 0x8a, 0xfc, 0xaf, 0x49, 0x1d, 0xa9, 0xd0, 0x8a, 0x7c, 0xc2, 0x93, 0x18, 0xd5, 0xe8, 0x5d, 0xce, 0x56, 0x8d, 0xcc, 0xa7, 0x01, 0x80, 0x59, 0xf4, 0x4e, 0x9b, 0x7e, 0xbf, 0x32, 0xa2, 0x33, 0xd5, 0xfc, 0x6e, 0xd8, 0xe2, 0xd9, 0x27, 0x0b, 0x1b, 0xda, 0xd4, 0xbb, 0xd2, 0xa0, 0xf2, 0xc2, 0x93, 0xd2, 0x89, 0xbd, 0x91, 0xff, 0xbc, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2991 = { .name = "ecdsa_secp224r1_sha224_2991", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2991_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2991_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2991_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 346 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2992 for ECDSA, tcId is 347 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2992_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha224_2992_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2992_sig[] = { 0x0e, 0x05, 0xed, 0x67, 0x5c, 0x67, 0x3e, 0x5e, 0x70, 0xa4, 0xfd, 0xd5, 0xa4, 0x7b, 0x11, 0x4c, 0x5d, 0x54, 0x2d, 0x4f, 0x6d, 0x7a, 0x36, 0x75, 0x97, 0xd7, 0x13, 0xea, 0x26, 0xd7, 0x0d, 0x65, 0xc4, 0x84, 0x30, 0x37, 0x33, 0x63, 0x98, 0x78, 0x10, 0xbd, 0xcc, 0x55, 0x6e, 0x02, 0x71, 0x8e, 0xab, 0x21, 0x44, 0x03, 0xae, 0x00, 0x8d, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2992 = { .name = "ecdsa_secp224r1_sha224_2992", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2992_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2992_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2992_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 347 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2993 for ECDSA, tcId is 348 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2993_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha224_2993_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2993_sig[] = { 0xab, 0x7a, 0x19, 0xee, 0xcf, 0x63, 0xe9, 0x66, 0x82, 0x78, 0x96, 0x3b, 0x65, 0x23, 0x6b, 0x27, 0x68, 0xe5, 0x7c, 0xae, 0x0e, 0x26, 0x8c, 0xb8, 0x6a, 0x0d, 0xdd, 0xa1, 0x88, 0x29, 0xf5, 0xd3, 0xa3, 0x39, 0x4f, 0x94, 0x67, 0xba, 0x62, 0xe6, 0x6e, 0xf1, 0x76, 0x8e, 0x3e, 0x54, 0xf9, 0x3e, 0xd2, 0x3e, 0xc9, 0x62, 0xbc, 0x44, 0x3c, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2993 = { .name = "ecdsa_secp224r1_sha224_2993", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2993_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2993_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2993_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 348 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2994 for ECDSA, tcId is 349 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2994_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha224_2994_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2994_sig[] = { 0x17, 0x11, 0x1a, 0x77, 0xcf, 0x79, 0xbe, 0xad, 0x45, 0x6e, 0xd8, 0x6a, 0x7d, 0x8a, 0x93, 0x55, 0x31, 0x44, 0x02, 0x81, 0xeb, 0x8b, 0x15, 0xa8, 0x85, 0xe3, 0x41, 0xc0, 0xfd, 0xc3, 0x95, 0x8d, 0x04, 0xf0, 0x37, 0xb1, 0xd4, 0xbb, 0x2c, 0xee, 0x30, 0x7b, 0x52, 0x01, 0xbe, 0x06, 0x2e, 0x0d, 0x4e, 0x08, 0x9d, 0xf1, 0xc1, 0x91, 0x76, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2994 = { .name = "ecdsa_secp224r1_sha224_2994", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2994_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2994_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2994_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 349 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2995 for ECDSA, tcId is 350 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2995_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha224_2995_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2995_sig[] = { 0xac, 0xaf, 0xa1, 0xe3, 0x33, 0x45, 0xee, 0xba, 0x0c, 0x33, 0x8c, 0x22, 0x04, 0xb4, 0xcd, 0x8b, 0xa2, 0x1d, 0xe7, 0xec, 0x3e, 0x12, 0x13, 0x31, 0x70, 0x38, 0xe9, 0x68, 0x0b, 0x42, 0xfb, 0xba, 0xed, 0xa9, 0x8a, 0x35, 0xda, 0x0d, 0xe4, 0xc7, 0x95, 0x46, 0xf3, 0xa0, 0xf7, 0xd9, 0xde, 0xc2, 0x75, 0xd2, 0xcd, 0x67, 0x1f, 0x93, 0xc8, 0x74, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2995 = { .name = "ecdsa_secp224r1_sha224_2995", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2995_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2995_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2995_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 350 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2996 for ECDSA, tcId is 351 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2996_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha224_2996_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2996_sig[] = { 0xa3, 0xfe, 0x71, 0xa2, 0xa5, 0x6f, 0x55, 0x4e, 0x98, 0xfd, 0x10, 0xa8, 0x09, 0x8c, 0x2a, 0x54, 0x3c, 0x98, 0xbc, 0x6b, 0x36, 0x02, 0xef, 0x39, 0xf2, 0x41, 0x23, 0x08, 0x5d, 0x1d, 0x68, 0xf9, 0xa8, 0x70, 0xef, 0x2b, 0xc8, 0x74, 0x84, 0xb3, 0x38, 0x65, 0x49, 0xfa, 0xe9, 0x58, 0x11, 0xab, 0x72, 0xbc, 0x0e, 0x3a, 0x51, 0x47, 0x20, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2996 = { .name = "ecdsa_secp224r1_sha224_2996", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2996_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2996_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2996_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 351 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2997 for ECDSA, tcId is 352 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2997_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha224_2997_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2997_sig[] = { 0x13, 0x2f, 0x76, 0x25, 0x70, 0x47, 0x56, 0xc1, 0x3f, 0x2b, 0xfa, 0x44, 0x9e, 0x60, 0x95, 0x2f, 0x83, 0x6f, 0x49, 0x04, 0x66, 0x0b, 0x5b, 0x1d, 0xa0, 0x7e, 0x5a, 0x9f, 0x82, 0xb4, 0xab, 0xaf, 0xc4, 0x0e, 0x8f, 0xd1, 0x9b, 0x0c, 0x96, 0x7f, 0x02, 0xff, 0xf1, 0x52, 0x73, 0x7c, 0xe0, 0x11, 0x53, 0x65, 0x8d, 0xf4, 0x45, 0xc4, 0xd7, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2997 = { .name = "ecdsa_secp224r1_sha224_2997", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2997_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2997_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2997_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 352 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2998 for ECDSA, tcId is 353 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2998_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha224_2998_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2998_sig[] = { 0xf3, 0x6a, 0x83, 0x47, 0xc6, 0xfe, 0x03, 0x97, 0xa1, 0x16, 0x1a, 0x36, 0x4c, 0xbc, 0x4b, 0xdf, 0xb4, 0xd8, 0xb7, 0x89, 0x4c, 0xba, 0xa6, 0xed, 0xc5, 0x5a, 0x4f, 0xf7, 0x9c, 0x9c, 0x90, 0x51, 0x5d, 0xa5, 0xe6, 0x02, 0xd6, 0x2e, 0x99, 0xf4, 0x8e, 0xac, 0x41, 0x4e, 0x91, 0x3d, 0xd0, 0xb7, 0xcb, 0xf6, 0x80, 0xc1, 0xa5, 0x39, 0x99, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2998 = { .name = "ecdsa_secp224r1_sha224_2998", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2998_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2998_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2998_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 353 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 2999 for ECDSA, tcId is 354 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_2999_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha224_2999_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_2999_sig[] = { 0x21, 0x25, 0xec, 0xc0, 0x8e, 0x52, 0xe9, 0xe3, 0x9e, 0x59, 0x01, 0x17, 0xde, 0x21, 0x45, 0xbd, 0x87, 0x96, 0x26, 0xcb, 0x87, 0x18, 0x0e, 0x52, 0xe9, 0xd3, 0xce, 0x03, 0x8f, 0x7e, 0x83, 0x8d, 0x0e, 0x8f, 0xb8, 0x00, 0x05, 0xfe, 0x3c, 0x72, 0xfc, 0xa1, 0xb7, 0xcc, 0x08, 0xed, 0x32, 0x1a, 0x34, 0x48, 0x78, 0x96, 0xb0, 0xc9, 0x0b, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_2999 = { .name = "ecdsa_secp224r1_sha224_2999", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_2999_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_2999_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_2999_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 354 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 3000 for ECDSA, tcId is 355 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_3000_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha224_3000_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_3000_sig[] = { 0xe4, 0x85, 0x74, 0x7a, 0xc2, 0xf3, 0xd0, 0x45, 0xe0, 0x10, 0xcd, 0xad, 0xab, 0x4f, 0xd5, 0xdb, 0xd5, 0x55, 0x6c, 0x00, 0x08, 0x44, 0x5f, 0xb7, 0x3e, 0x07, 0xcd, 0x90, 0xe2, 0x13, 0x3a, 0x79, 0x06, 0xae, 0xac, 0x50, 0x48, 0x52, 0xe0, 0x9e, 0x6d, 0x05, 0x7f, 0x29, 0xab, 0x21, 0x36, 0x8c, 0xfc, 0x4e, 0x23, 0x94, 0xbe, 0x56, 0x5e, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_3000 = { .name = "ecdsa_secp224r1_sha224_3000", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_3000_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_3000_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_3000_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 355 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 3001 for ECDSA, tcId is 356 in file ecdsa_secp224r1_sha224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) static const unsigned char ecdsa_secp224r1_sha224_3001_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha224_3001_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha224_3001_sig[] = { 0xa4, 0xde, 0x0d, 0x93, 0x1d, 0xda, 0xb9, 0x0e, 0x66, 0x7e, 0xbc, 0x0a, 0xd8, 0x00, 0xce, 0x49, 0xe9, 0x71, 0xc6, 0x05, 0x43, 0xab, 0xdc, 0x46, 0xce, 0xff, 0xf9, 0x26, 0x55, 0x08, 0x16, 0x17, 0x0b, 0xd8, 0x75, 0x93, 0xb9, 0xfb, 0x8a, 0xd5, 0xed, 0x9a, 0xb4, 0xdd, 0xb1, 0x24, 0x03, 0xff, 0x6f, 0xe0, 0x32, 0x25, 0x28, 0x33, 0xba, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha224_3001 = { .name = "ecdsa_secp224r1_sha224_3001", .sig_alg = ECDSA, .hash = SHA224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha224_3001_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha224_3001_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha224_3001_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 356 in file ecdsa_secp224r1_sha224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA224) */ /* Test 3002 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3002_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3002_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3002_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x9e, 0x82, 0x95, 0x0e, 0xbe, 0x10, 0x2f, 0x37, 0xff, 0x36, 0x45, 0xcc, 0x7d, 0x3c, 0x1b, 0xab, 0x88, 0x64, 0xe5, 0xe0, 0x3a, 0x50, 0x11, 0xee, 0xba, 0x81, 0x50, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3002 = { .name = "ecdsa_secp224r1_sha256_3002", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3002_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3002_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3002_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3003 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3003_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3003_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3003_sig[] = { 0x01, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x1f, 0xd2, 0x83, 0x09, 0x8d, 0x8a, 0x00, 0x4f, 0xc7, 0x18, 0xe2, 0xe7, 0xe6, 0xb4, 0x41, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3003 = { .name = "ecdsa_secp224r1_sha256_3003", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3003_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3003_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3003_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3004 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3004_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3004_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3004_sig[] = { 0xc5, 0x21, 0xa3, 0xf9, 0xdb, 0x5a, 0x98, 0x81, 0x28, 0x49, 0xba, 0xf2, 0x6b, 0xde, 0x5a, 0xc2, 0xb7, 0xe4, 0x56, 0x7b, 0xd7, 0xf3, 0x39, 0xa7, 0xd0, 0xd1, 0xa0, 0x39, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3004 = { .name = "ecdsa_secp224r1_sha256_3004", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3004_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3004_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3004_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3005 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3005_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3005_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3005_sig[] = { 0x01, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3005 = { .name = "ecdsa_secp224r1_sha256_3005", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3005_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3005_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3005_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3006 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3006_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3006_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3006_sig[] = { 0xc5, 0x21, 0xa3, 0xf9, 0xdb, 0x5a, 0x98, 0x81, 0x28, 0x49, 0xba, 0xf2, 0x6b, 0xdf, 0x44, 0x1f, 0xd7, 0x2b, 0x66, 0x3d, 0xc4, 0x16, 0x10, 0x62, 0x74, 0x75, 0x75, 0xfc, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3006 = { .name = "ecdsa_secp224r1_sha256_3006", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3006_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3006_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3006_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3007 for ECDSA, tcId is 6 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3007_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3007_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3007_sig[] = { 0x00, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x01, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0x11, 0x9a, 0x39, 0x0c, 0xfa, 0x9b, 0xed, 0x6a, 0x40, 0x9b, 0xfe, 0x37, 0x03, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3007 = { .name = "ecdsa_secp224r1_sha256_3007", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3007_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3007_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3007_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3008 for ECDSA, tcId is 7 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3008_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3008_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3008_sig[] = { 0x00, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x01, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3008 = { .name = "ecdsa_secp224r1_sha256_3008", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3008_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3008_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3008_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3009 for ECDSA, tcId is 8 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3009_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3009_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3009_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x9e, 0x82, 0x95, 0x0e, 0xbe, 0x10, 0x2f, 0x37, 0xff, 0x36, 0x45, 0xcc, 0x7d, 0x3d, 0x05, 0x08, 0xa7, 0xab, 0xf5, 0xa2, 0x26, 0x72, 0xe8, 0xa9, 0x5e, 0x25, 0x26, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3009 = { .name = "ecdsa_secp224r1_sha256_3009", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3009_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3009_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3009_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3010 for ECDSA, tcId is 9 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3010_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3010_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3010_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3010 = { .name = "ecdsa_secp224r1_sha256_3010", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3010_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3010_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3010_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3011 for ECDSA, tcId is 10 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3011_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3011_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3011_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3011 = { .name = "ecdsa_secp224r1_sha256_3011", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3011_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3011_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3011_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3012 for ECDSA, tcId is 11 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3012_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3012_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3012_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3012 = { .name = "ecdsa_secp224r1_sha256_3012", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3012_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3012_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3012_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3013 for ECDSA, tcId is 12 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3013_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3013_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3013_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3013 = { .name = "ecdsa_secp224r1_sha256_3013", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3013_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3013_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3013_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3014 for ECDSA, tcId is 13 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3014_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3014_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3014_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3014 = { .name = "ecdsa_secp224r1_sha256_3014", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3014_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3014_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3014_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3015 for ECDSA, tcId is 14 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3015_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3015_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3015_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3015 = { .name = "ecdsa_secp224r1_sha256_3015", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3015_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3015_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3015_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3016 for ECDSA, tcId is 15 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3016_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3016_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3016_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3016 = { .name = "ecdsa_secp224r1_sha256_3016", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3016_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3016_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3016_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3017 for ECDSA, tcId is 16 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3017_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3017_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3017_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3017 = { .name = "ecdsa_secp224r1_sha256_3017", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3017_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3017_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3017_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3018 for ECDSA, tcId is 17 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3018_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3018_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3018_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3018 = { .name = "ecdsa_secp224r1_sha256_3018", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3018_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3018_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3018_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3019 for ECDSA, tcId is 18 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3019_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3019_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3019_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3019 = { .name = "ecdsa_secp224r1_sha256_3019", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3019_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3019_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3019_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3020 for ECDSA, tcId is 19 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3020_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3020_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3020_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3020 = { .name = "ecdsa_secp224r1_sha256_3020", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3020_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3020_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3020_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3021 for ECDSA, tcId is 20 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3021_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3021_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3021_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3021 = { .name = "ecdsa_secp224r1_sha256_3021", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3021_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3021_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3021_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3022 for ECDSA, tcId is 21 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3022_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3022_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3022_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3022 = { .name = "ecdsa_secp224r1_sha256_3022", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3022_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3022_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3022_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3023 for ECDSA, tcId is 22 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3023_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3023_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3023_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3023 = { .name = "ecdsa_secp224r1_sha256_3023", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3023_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3023_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3023_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3024 for ECDSA, tcId is 23 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3024_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3024_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3024_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3024 = { .name = "ecdsa_secp224r1_sha256_3024", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3024_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3024_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3024_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3025 for ECDSA, tcId is 24 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3025_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3025_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3025_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3025 = { .name = "ecdsa_secp224r1_sha256_3025", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3025_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3025_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3025_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3026 for ECDSA, tcId is 25 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3026_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3026_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3026_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3026 = { .name = "ecdsa_secp224r1_sha256_3026", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3026_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3026_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3026_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3027 for ECDSA, tcId is 26 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3027_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3027_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3027_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3027 = { .name = "ecdsa_secp224r1_sha256_3027", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3027_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3027_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3027_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3028 for ECDSA, tcId is 27 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3028_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3028_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3028_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3028 = { .name = "ecdsa_secp224r1_sha256_3028", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3028_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3028_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3028_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3029 for ECDSA, tcId is 28 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3029_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3029_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3029_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3029 = { .name = "ecdsa_secp224r1_sha256_3029", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3029_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3029_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3029_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3030 for ECDSA, tcId is 29 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3030_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3030_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3030_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3030 = { .name = "ecdsa_secp224r1_sha256_3030", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3030_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3030_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3030_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3031 for ECDSA, tcId is 30 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3031_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3031_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3031_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3031 = { .name = "ecdsa_secp224r1_sha256_3031", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3031_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3031_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3031_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3032 for ECDSA, tcId is 31 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3032_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3032_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3032_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3032 = { .name = "ecdsa_secp224r1_sha256_3032", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3032_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3032_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3032_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3033 for ECDSA, tcId is 32 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3033_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3033_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3033_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3033 = { .name = "ecdsa_secp224r1_sha256_3033", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3033_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3033_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3033_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3034 for ECDSA, tcId is 33 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3034_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3034_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3034_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3034 = { .name = "ecdsa_secp224r1_sha256_3034", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3034_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3034_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3034_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3035 for ECDSA, tcId is 34 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3035_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3035_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3035_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3035 = { .name = "ecdsa_secp224r1_sha256_3035", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3035_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3035_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3035_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3036 for ECDSA, tcId is 35 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3036_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3036_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3036_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3036 = { .name = "ecdsa_secp224r1_sha256_3036", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3036_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3036_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3036_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3037 for ECDSA, tcId is 36 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3037_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3037_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3037_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3037 = { .name = "ecdsa_secp224r1_sha256_3037", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3037_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3037_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3037_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3038 for ECDSA, tcId is 37 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3038_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3038_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3038_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3038 = { .name = "ecdsa_secp224r1_sha256_3038", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3038_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3038_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3038_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3039 for ECDSA, tcId is 38 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3039_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3039_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3039_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3039 = { .name = "ecdsa_secp224r1_sha256_3039", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3039_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3039_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3039_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3040 for ECDSA, tcId is 39 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3040_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3040_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3040_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3040 = { .name = "ecdsa_secp224r1_sha256_3040", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3040_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3040_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3040_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3041 for ECDSA, tcId is 40 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3041_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3041_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3041_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3041 = { .name = "ecdsa_secp224r1_sha256_3041", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3041_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3041_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3041_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3042 for ECDSA, tcId is 41 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3042_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3042_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3042_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3042 = { .name = "ecdsa_secp224r1_sha256_3042", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3042_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3042_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3042_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3043 for ECDSA, tcId is 42 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3043_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3043_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3043_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3043 = { .name = "ecdsa_secp224r1_sha256_3043", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3043_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3043_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3043_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3044 for ECDSA, tcId is 43 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3044_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3044_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3044_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3044 = { .name = "ecdsa_secp224r1_sha256_3044", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3044_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3044_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3044_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3045 for ECDSA, tcId is 44 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3045_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3045_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3045_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3045 = { .name = "ecdsa_secp224r1_sha256_3045", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3045_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3045_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3045_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3046 for ECDSA, tcId is 45 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3046_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3046_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3046_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3046 = { .name = "ecdsa_secp224r1_sha256_3046", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3046_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3046_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3046_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3047 for ECDSA, tcId is 46 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3047_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3047_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3047_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3047 = { .name = "ecdsa_secp224r1_sha256_3047", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3047_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3047_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3047_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3048 for ECDSA, tcId is 47 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3048_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3048_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3048_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3048 = { .name = "ecdsa_secp224r1_sha256_3048", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3048_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3048_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3048_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3049 for ECDSA, tcId is 48 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3049_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3049_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3049_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3049 = { .name = "ecdsa_secp224r1_sha256_3049", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3049_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3049_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3049_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3050 for ECDSA, tcId is 49 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3050_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3050_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3050_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3050 = { .name = "ecdsa_secp224r1_sha256_3050", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3050_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3050_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3050_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3051 for ECDSA, tcId is 50 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3051_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3051_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3051_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3051 = { .name = "ecdsa_secp224r1_sha256_3051", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3051_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3051_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3051_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3052 for ECDSA, tcId is 51 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3052_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3052_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3052_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3052 = { .name = "ecdsa_secp224r1_sha256_3052", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3052_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3052_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3052_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3053 for ECDSA, tcId is 52 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3053_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3053_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3053_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3053 = { .name = "ecdsa_secp224r1_sha256_3053", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3053_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3053_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3053_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3054 for ECDSA, tcId is 53 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3054_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3054_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3054_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3054 = { .name = "ecdsa_secp224r1_sha256_3054", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3054_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3054_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3054_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3055 for ECDSA, tcId is 54 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3055_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3055_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3055_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3055 = { .name = "ecdsa_secp224r1_sha256_3055", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3055_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3055_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3055_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3056 for ECDSA, tcId is 55 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3056_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3056_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3056_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3056 = { .name = "ecdsa_secp224r1_sha256_3056", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3056_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3056_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3056_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3057 for ECDSA, tcId is 56 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3057_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3057_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3057_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3057 = { .name = "ecdsa_secp224r1_sha256_3057", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3057_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3057_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3057_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3058 for ECDSA, tcId is 57 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3058_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3058_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3058_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3058 = { .name = "ecdsa_secp224r1_sha256_3058", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3058_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3058_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3058_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3059 for ECDSA, tcId is 58 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3059_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3059_msg[] = { 0x38, 0x39, 0x31, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3059_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x96, 0xad, 0x91, 0xf0, 0x2a, 0x3b, 0xc4, 0x0c, 0x11, 0x8a, 0xbd, 0x41, 0x6e, 0xd5, 0xc6, 0x20, 0x3e, 0xd7, 0xce, 0xd0, 0x33, 0x08, 0x60, 0xd7, 0xb8, 0x8c, 0x10, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3059 = { .name = "ecdsa_secp224r1_sha256_3059", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3059_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3059_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha256_3059_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3060 for ECDSA, tcId is 59 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3060_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3060_msg[] = { 0x34, 0x32, 0x36, 0x34, 0x37, 0x39, 0x37, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3060_sig[] = { 0xbc, 0xca, 0x23, 0x65, 0xce, 0xbd, 0xcf, 0x7c, 0x6c, 0xda, 0x1e, 0xe7, 0xb2, 0x7c, 0x7f, 0xe7, 0x9e, 0x37, 0x15, 0x37, 0xb0, 0x18, 0x69, 0xc7, 0x15, 0xea, 0xbb, 0x1e, 0x3a, 0xe7, 0x6f, 0x9b, 0xbf, 0xe5, 0x19, 0xd7, 0x78, 0x81, 0x6d, 0xc8, 0xfe, 0x10, 0x63, 0x5e, 0xe7, 0x57, 0x6b, 0x6b, 0x79, 0x16, 0xf0, 0xc2, 0x1d, 0xf3, 0x20, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3060 = { .name = "ecdsa_secp224r1_sha256_3060", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3060_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3060_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3060_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3061 for ECDSA, tcId is 60 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3061_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3061_msg[] = { 0x37, 0x31, 0x33, 0x38, 0x36, 0x38, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3061_sig[] = { 0x59, 0xa9, 0xf8, 0x32, 0x89, 0xef, 0x69, 0x95, 0xd5, 0xd5, 0x59, 0x2e, 0x80, 0xab, 0x4f, 0x6a, 0x81, 0x12, 0x3f, 0x69, 0xd3, 0x85, 0xd3, 0xcf, 0xb1, 0x52, 0xfa, 0xf2, 0x3a, 0x97, 0xd5, 0xbe, 0x19, 0x0d, 0x58, 0x19, 0x24, 0x10, 0x67, 0xe2, 0xbe, 0x56, 0x37, 0x5a, 0xb8, 0x41, 0x55, 0xba, 0xab, 0x8f, 0xc7, 0xae, 0xb7, 0xf8, 0xcb, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3061 = { .name = "ecdsa_secp224r1_sha256_3061", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3061_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3061_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3061_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3062 for ECDSA, tcId is 61 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3062_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3062_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x33, 0x33, 0x31, 0x36, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3062_sig[] = { 0xb5, 0x4b, 0xac, 0x9b, 0xe2, 0xbe, 0xaa, 0xa0, 0x94, 0x56, 0xa3, 0x96, 0x8a, 0x1f, 0xaf, 0x27, 0xc9, 0xd9, 0x6b, 0xd5, 0xf6, 0x73, 0x8f, 0xec, 0x60, 0x66, 0xd3, 0x1e, 0xd7, 0x2c, 0x22, 0x12, 0x93, 0x44, 0xa9, 0x6d, 0x52, 0xfd, 0xa6, 0x0b, 0x26, 0x4c, 0xf5, 0xe6, 0xfa, 0xe4, 0x5f, 0xd2, 0xc1, 0xb1, 0xb7, 0x8b, 0xcb, 0xa3, 0x00, 0x70, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3062 = { .name = "ecdsa_secp224r1_sha256_3062", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3062_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3062_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3062_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3063 for ECDSA, tcId is 62 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3063_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3063_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x34, 0x30, 0x31, 0x32, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3063_sig[] = { 0x32, 0x3d, 0xbd, 0xec, 0xd4, 0x09, 0x10, 0xc6, 0xfa, 0x7a, 0x56, 0x91, 0x84, 0x6f, 0xa7, 0x76, 0x91, 0x13, 0xd1, 0xf2, 0xba, 0x64, 0xef, 0x0d, 0xc9, 0x7d, 0x2d, 0xdb, 0xca, 0x9e, 0x73, 0xa4, 0x58, 0x7a, 0xf0, 0x42, 0xf8, 0xba, 0x92, 0x4b, 0xb6, 0x18, 0x29, 0xc5, 0xe2, 0x40, 0x46, 0xf9, 0x80, 0x3e, 0xb7, 0x6a, 0xb8, 0x0e, 0xf3, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3063 = { .name = "ecdsa_secp224r1_sha256_3063", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3063_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3063_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3063_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3064 for ECDSA, tcId is 63 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3064_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3064_msg[] = { 0x31, 0x33, 0x34, 0x34, 0x32, 0x39, 0x33, 0x30, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha256_3064_sig[] = { 0xa5, 0x5d, 0xcc, 0xc2, 0x7d, 0x28, 0x7f, 0x15, 0x96, 0x0e, 0xd7, 0x99, 0x08, 0xa3, 0xed, 0xb6, 0xbb, 0x31, 0xaf, 0xf0, 0x7c, 0x8c, 0xaa, 0x0e, 0x65, 0xfc, 0x07, 0x85, 0x55, 0x9c, 0xb5, 0x1a, 0xa5, 0xf2, 0xb9, 0x06, 0x66, 0x10, 0x19, 0x9d, 0xd0, 0x12, 0x91, 0xa4, 0x77, 0x29, 0xa6, 0x18, 0x9a, 0x62, 0x2a, 0xe9, 0xe7, 0xaf, 0x76, 0x21, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3064 = { .name = "ecdsa_secp224r1_sha256_3064", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3064_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3064_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3064_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3065 for ECDSA, tcId is 64 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3065_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3065_msg[] = { 0x33, 0x37, 0x30, 0x36, 0x32, 0x31, 0x31, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3065_sig[] = { 0x13, 0x7e, 0xd6, 0x10, 0x51, 0x48, 0xd6, 0xf5, 0xb8, 0x4e, 0x87, 0x73, 0x5d, 0x57, 0x95, 0x5f, 0x81, 0xc5, 0x91, 0x4a, 0x6e, 0x69, 0xf5, 0x53, 0x47, 0xad, 0xe0, 0x74, 0xdf, 0xa5, 0xd5, 0x6b, 0x1a, 0x12, 0x56, 0x7e, 0xfa, 0xcb, 0x34, 0x8a, 0x13, 0x3b, 0x79, 0xd4, 0x8d, 0xa7, 0xaa, 0xc7, 0x8d, 0x78, 0xee, 0x58, 0x9c, 0x2e, 0xc0, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3065 = { .name = "ecdsa_secp224r1_sha256_3065", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3065_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3065_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3065_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3066 for ECDSA, tcId is 65 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3066_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3066_msg[] = { 0x33, 0x34, 0x33, 0x36, 0x38, 0x38, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3066_sig[] = { 0x85, 0x6f, 0xf6, 0x3d, 0x77, 0x91, 0x63, 0xe7, 0x8f, 0xed, 0x8c, 0x48, 0x33, 0x0b, 0x48, 0xf0, 0x8b, 0xf9, 0x53, 0xa9, 0x52, 0x66, 0xb3, 0x85, 0x7e, 0xee, 0x91, 0xaa, 0xf4, 0xaa, 0x91, 0x7c, 0xd3, 0x7f, 0x55, 0x6c, 0x6d, 0xf9, 0xd0, 0x96, 0x0c, 0x2f, 0x7d, 0xaa, 0x7e, 0xa1, 0x18, 0xe5, 0xc3, 0x0c, 0xc4, 0x0c, 0xa1, 0xee, 0xd4, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3066 = { .name = "ecdsa_secp224r1_sha256_3066", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3066_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3066_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3066_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3067 for ECDSA, tcId is 66 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3067_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3067_msg[] = { 0x31, 0x33, 0x35, 0x31, 0x35, 0x33, 0x30, 0x33, 0x37, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3067_sig[] = { 0xa9, 0xd7, 0x71, 0x6f, 0x04, 0xc5, 0xce, 0x24, 0x7f, 0x6b, 0x8c, 0x60, 0x8b, 0x37, 0xdb, 0x55, 0xf6, 0x8e, 0x2f, 0xf9, 0x4a, 0x58, 0x83, 0x86, 0x3e, 0x86, 0x77, 0x08, 0x61, 0xbc, 0x09, 0x3f, 0xaa, 0x6f, 0xb2, 0x5c, 0xd2, 0x40, 0xae, 0xa4, 0xb5, 0x6f, 0xed, 0x72, 0x8f, 0x7b, 0x36, 0x69, 0xb4, 0xdc, 0x84, 0xc4, 0x49, 0xd3, 0x8c, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3067 = { .name = "ecdsa_secp224r1_sha256_3067", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3067_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3067_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3067_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3068 for ECDSA, tcId is 67 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3068_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3068_msg[] = { 0x36, 0x35, 0x35, 0x33, 0x32, 0x30, 0x33, 0x31, 0x32, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3068_sig[] = { 0xf6, 0xd0, 0x88, 0xfd, 0x3b, 0x9c, 0x98, 0x1a, 0xc4, 0x91, 0xc6, 0x20, 0x30, 0x64, 0x3b, 0xbd, 0x82, 0xd4, 0xf4, 0x58, 0x8e, 0x85, 0x17, 0xde, 0x58, 0x84, 0xe7, 0x3d, 0x77, 0x3e, 0xee, 0x47, 0x79, 0x80, 0x76, 0x3b, 0x1e, 0xa2, 0x7a, 0xe9, 0x98, 0xbd, 0xa0, 0x24, 0x4c, 0xb6, 0x7b, 0x07, 0xaa, 0x67, 0x79, 0xa3, 0x8c, 0xd2, 0xba, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3068 = { .name = "ecdsa_secp224r1_sha256_3068", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3068_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3068_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3068_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3069 for ECDSA, tcId is 68 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3069_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3069_msg[] = { 0x31, 0x35, 0x36, 0x34, 0x33, 0x34, 0x36, 0x36, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha256_3069_sig[] = { 0xea, 0xcb, 0x55, 0x58, 0x8e, 0x44, 0x6b, 0xbf, 0x36, 0x87, 0x08, 0x9b, 0xa8, 0xba, 0x3b, 0x05, 0xcf, 0xef, 0x74, 0x58, 0xbb, 0x81, 0xb4, 0x27, 0x7f, 0x90, 0xa8, 0x53, 0x80, 0x39, 0xe8, 0x94, 0x4c, 0xc3, 0xdf, 0x7f, 0x4c, 0xe5, 0xba, 0xdc, 0x34, 0x99, 0x75, 0xd4, 0x71, 0xa8, 0x1d, 0xea, 0x14, 0xe9, 0xbc, 0xae, 0x30, 0x65, 0xd4, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3069 = { .name = "ecdsa_secp224r1_sha256_3069", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3069_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3069_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3069_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3070 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3070_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3070_msg[] = { 0x34, 0x34, 0x32, 0x39, 0x35, 0x33, 0x39, 0x31, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3070_sig[] = { 0x59, 0x84, 0xaf, 0x8c, 0x89, 0xfb, 0x9d, 0x59, 0x6a, 0x1f, 0x28, 0xfd, 0x3d, 0x41, 0xe4, 0x6f, 0x72, 0x05, 0xfe, 0x12, 0xfa, 0x63, 0x43, 0x7a, 0xc7, 0x9e, 0x7e, 0x81, 0x33, 0xb1, 0x6b, 0x74, 0x2d, 0x45, 0xf1, 0x8f, 0x88, 0xde, 0x27, 0x13, 0x07, 0x83, 0x84, 0xe6, 0x15, 0x0f, 0x06, 0xb8, 0xb9, 0x9f, 0x36, 0xab, 0x2c, 0xe3, 0xdd, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3070 = { .name = "ecdsa_secp224r1_sha256_3070", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3070_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3070_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3070_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3071 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3071_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3071_msg[] = { 0x31, 0x30, 0x39, 0x35, 0x33, 0x32, 0x36, 0x31, 0x33, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3071_sig[] = { 0x3c, 0xda, 0x62, 0xd8, 0x47, 0x11, 0xc2, 0x62, 0xf7, 0x82, 0xd5, 0xc3, 0xa7, 0x9b, 0x56, 0x74, 0x85, 0x22, 0x7b, 0x34, 0xaf, 0xb8, 0x21, 0xf5, 0x24, 0x1b, 0x19, 0x61, 0xb6, 0x15, 0xce, 0xf3, 0x99, 0x70, 0x6f, 0xf7, 0x58, 0xf0, 0x72, 0x93, 0x18, 0x52, 0xb7, 0x17, 0xec, 0x89, 0x8e, 0x9a, 0x1e, 0x63, 0x39, 0xd0, 0xee, 0x81, 0xb8, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3071 = { .name = "ecdsa_secp224r1_sha256_3071", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3071_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3071_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3071_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3072 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3072_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3072_msg[] = { 0x35, 0x39, 0x38, 0x37, 0x33, 0x35, 0x30, 0x30, 0x34, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3072_sig[] = { 0xe1, 0xdb, 0x73, 0x04, 0x60, 0x91, 0x91, 0xea, 0x1a, 0xc9, 0x11, 0x83, 0xff, 0xb3, 0x1d, 0xf5, 0x1b, 0x5b, 0x3f, 0xdc, 0x6b, 0x1a, 0x11, 0x29, 0xd8, 0x58, 0x18, 0xd6, 0x44, 0x18, 0x86, 0xd0, 0x03, 0xae, 0x80, 0xfb, 0xe7, 0x13, 0x9e, 0x1d, 0x02, 0x84, 0x5c, 0xd1, 0xbd, 0x95, 0x9f, 0x0d, 0xf1, 0x46, 0x8f, 0x58, 0x36, 0xdd, 0x6e, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3072 = { .name = "ecdsa_secp224r1_sha256_3072", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3072_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3072_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3072_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3073 for ECDSA, tcId is 72 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3073_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3073_msg[] = { 0x33, 0x34, 0x36, 0x33, 0x30, 0x30, 0x36, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3073_sig[] = { 0x35, 0x45, 0xdc, 0x4a, 0x4e, 0xf8, 0x4b, 0xbb, 0x3a, 0x52, 0x6f, 0xf9, 0x29, 0xc9, 0x1a, 0xd2, 0x34, 0x51, 0x6a, 0x9e, 0x95, 0x45, 0x5a, 0xc8, 0xdb, 0x40, 0x12, 0xb1, 0xaf, 0x49, 0x92, 0x6f, 0x69, 0x3a, 0x7c, 0xf1, 0x1f, 0x71, 0xe1, 0x99, 0xf3, 0x82, 0xa8, 0xd6, 0x40, 0xc0, 0xc8, 0x5e, 0x46, 0xd9, 0x4e, 0xe2, 0x6e, 0x38, 0x43, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3073 = { .name = "ecdsa_secp224r1_sha256_3073", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3073_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3073_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3073_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3074 for ECDSA, tcId is 73 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3074_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3074_msg[] = { 0x39, 0x38, 0x31, 0x37, 0x33, 0x32, 0x30, 0x32, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3074_sig[] = { 0x0c, 0xca, 0xfd, 0xea, 0xe4, 0x58, 0x2c, 0x9d, 0xe6, 0x79, 0x5b, 0x2d, 0x09, 0xa7, 0xfc, 0x38, 0x48, 0xc7, 0x59, 0x04, 0xfa, 0x96, 0x09, 0x89, 0x15, 0x6c, 0xbb, 0xb9, 0xaf, 0x1f, 0x99, 0x4d, 0xa3, 0xe7, 0xd8, 0x9c, 0xc8, 0xaa, 0xa4, 0x46, 0x16, 0xcb, 0x77, 0xe3, 0xbe, 0x7a, 0x83, 0xcc, 0xec, 0xc9, 0x65, 0x77, 0x51, 0x94, 0xe5, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3074 = { .name = "ecdsa_secp224r1_sha256_3074", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3074_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3074_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3074_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3075 for ECDSA, tcId is 74 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3075_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3075_msg[] = { 0x33, 0x32, 0x32, 0x32, 0x30, 0x34, 0x31, 0x30, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3075_sig[] = { 0xa3, 0xb2, 0x14, 0x5d, 0x8c, 0x66, 0x90, 0x27, 0x53, 0x25, 0x01, 0xee, 0xa1, 0x91, 0x3a, 0xbb, 0x22, 0xa7, 0x8a, 0x82, 0x7f, 0xdd, 0x82, 0xfe, 0x9d, 0x6d, 0x37, 0x57, 0x9b, 0x2f, 0x1a, 0xe8, 0x4f, 0x56, 0x06, 0xd6, 0x86, 0x53, 0x06, 0x5f, 0x74, 0xe9, 0xd0, 0x89, 0x88, 0x66, 0x94, 0xc7, 0x39, 0xfb, 0xe3, 0xfd, 0x4a, 0x1b, 0x2b, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3075 = { .name = "ecdsa_secp224r1_sha256_3075", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3075_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3075_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3075_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3076 for ECDSA, tcId is 75 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3076_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3076_msg[] = { 0x36, 0x36, 0x36, 0x36, 0x33, 0x30, 0x37, 0x31, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3076_sig[] = { 0x9a, 0xac, 0x3a, 0x7e, 0x3d, 0x14, 0x23, 0x44, 0x99, 0x1b, 0xf1, 0x77, 0xb4, 0xf4, 0xdb, 0xfa, 0x07, 0x41, 0x48, 0xad, 0x9e, 0x20, 0xf2, 0x75, 0x55, 0xb5, 0x47, 0xd9, 0xf8, 0x30, 0xa3, 0xc7, 0xfd, 0xf2, 0x51, 0xd7, 0x9d, 0x41, 0x97, 0x7d, 0x28, 0xe6, 0xd9, 0xa7, 0x2a, 0x36, 0xdf, 0x11, 0xb8, 0x6e, 0x17, 0xc8, 0xdc, 0x3a, 0xca, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3076 = { .name = "ecdsa_secp224r1_sha256_3076", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3076_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3076_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3076_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3077 for ECDSA, tcId is 76 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3077_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3077_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x35, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3077_sig[] = { 0x47, 0x69, 0xfb, 0xa5, 0x54, 0xfd, 0x43, 0x60, 0x51, 0xc2, 0x85, 0xbd, 0xad, 0xfa, 0x33, 0xa4, 0x43, 0xd4, 0xf7, 0x08, 0x4d, 0xd5, 0x98, 0xce, 0x3b, 0x98, 0xb8, 0xfb, 0x0c, 0x01, 0x4c, 0x87, 0xcb, 0x14, 0x11, 0x3d, 0x75, 0x86, 0x4f, 0x74, 0x90, 0x5f, 0x75, 0xb3, 0x4f, 0x99, 0x70, 0xba, 0x58, 0xb5, 0xd0, 0x67, 0x60, 0x21, 0x82, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3077 = { .name = "ecdsa_secp224r1_sha256_3077", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3077_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3077_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3077_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3078 for ECDSA, tcId is 77 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3078_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3078_msg[] = { 0x31, 0x38, 0x34, 0x36, 0x35, 0x39, 0x37, 0x31, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3078_sig[] = { 0x8b, 0x91, 0xfc, 0x50, 0x54, 0xa7, 0x5c, 0x34, 0xa5, 0x08, 0x62, 0x4b, 0x85, 0x70, 0x8b, 0x3d, 0x25, 0xfa, 0x74, 0x32, 0x8c, 0x68, 0x74, 0x1c, 0x3a, 0xeb, 0x92, 0xd9, 0x15, 0x5e, 0x3e, 0x46, 0xb1, 0x20, 0x95, 0x83, 0x13, 0x5a, 0x9f, 0xef, 0x15, 0xab, 0xe3, 0x25, 0xb2, 0x5b, 0xd1, 0x92, 0x85, 0xee, 0x6b, 0x5b, 0x45, 0x49, 0x62, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3078 = { .name = "ecdsa_secp224r1_sha256_3078", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3078_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3078_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3078_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3079 for ECDSA, tcId is 78 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3079_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3079_msg[] = { 0x33, 0x31, 0x33, 0x36, 0x30, 0x34, 0x36, 0x31, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha256_3079_sig[] = { 0xa4, 0xa2, 0xa8, 0x5f, 0xbb, 0x8b, 0xb2, 0x6c, 0x4d, 0x84, 0x5c, 0xfa, 0xc1, 0x91, 0xf8, 0x9d, 0x65, 0xb0, 0x0d, 0x3f, 0x1b, 0x94, 0x50, 0xd1, 0x77, 0xf7, 0x88, 0x90, 0x66, 0x05, 0xa4, 0x60, 0xe6, 0x04, 0x02, 0x68, 0x5c, 0x7a, 0x5a, 0xcc, 0xd2, 0x61, 0x5e, 0x92, 0x32, 0xe5, 0x19, 0x37, 0xbd, 0x83, 0xdf, 0xa3, 0x06, 0x5e, 0xab, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3079 = { .name = "ecdsa_secp224r1_sha256_3079", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3079_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3079_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3079_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3080 for ECDSA, tcId is 79 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3080_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3080_msg[] = { 0x32, 0x36, 0x36, 0x33, 0x37, 0x38, 0x34, 0x32, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3080_sig[] = { 0xa8, 0x9d, 0x33, 0x3a, 0xe3, 0x41, 0x87, 0x85, 0x5c, 0xf7, 0xfa, 0x43, 0x5f, 0xf3, 0x9b, 0xe6, 0xb7, 0xbb, 0x39, 0xb2, 0xd0, 0xce, 0x68, 0x21, 0x33, 0xad, 0x96, 0x46, 0x48, 0x3d, 0xcc, 0x89, 0xa3, 0xb4, 0x3b, 0xe2, 0x50, 0xf5, 0xc3, 0xf7, 0x8f, 0x78, 0x41, 0x8e, 0x7b, 0x83, 0x41, 0xa8, 0xbc, 0xfb, 0x93, 0xdf, 0xd5, 0x8e, 0x46, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3080 = { .name = "ecdsa_secp224r1_sha256_3080", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3080_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3080_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3080_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3081 for ECDSA, tcId is 80 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3081_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3081_msg[] = { 0x31, 0x36, 0x35, 0x32, 0x31, 0x30, 0x30, 0x35, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3081_sig[] = { 0x2d, 0x0f, 0x99, 0xc7, 0x19, 0x33, 0xc8, 0x2d, 0xed, 0x54, 0x4e, 0xf4, 0xfa, 0xac, 0x9d, 0x66, 0x9e, 0x43, 0x7d, 0xea, 0x13, 0xb5, 0x71, 0x86, 0xf4, 0xc2, 0x0a, 0x0e, 0xd9, 0x68, 0x2b, 0x9f, 0x3a, 0x05, 0xd7, 0x83, 0x29, 0x47, 0xbc, 0x45, 0xea, 0xdb, 0xc7, 0x42, 0xd9, 0x6e, 0x7a, 0xb1, 0x12, 0x48, 0x32, 0xdd, 0xb7, 0xa8, 0xc6, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3081 = { .name = "ecdsa_secp224r1_sha256_3081", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3081_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3081_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3081_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3082 for ECDSA, tcId is 81 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3082_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3082_msg[] = { 0x35, 0x37, 0x34, 0x38, 0x30, 0x38, 0x31, 0x36, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3082_sig[] = { 0x84, 0x02, 0x08, 0xf7, 0xc4, 0x1b, 0x1f, 0xba, 0xdc, 0xc7, 0x01, 0xfb, 0x3a, 0x1d, 0x0f, 0x98, 0xa3, 0xe2, 0xa7, 0x52, 0x35, 0xe6, 0x95, 0xbf, 0xd3, 0x78, 0xf8, 0xb4, 0x44, 0xc8, 0xda, 0xad, 0x4e, 0xfc, 0x03, 0xe1, 0x75, 0x38, 0x03, 0xc3, 0x62, 0xb4, 0x09, 0xc3, 0xca, 0x6e, 0x0f, 0x21, 0xe5, 0x38, 0xfe, 0x3a, 0x36, 0x4c, 0x0e, 0x53, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3082 = { .name = "ecdsa_secp224r1_sha256_3082", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3082_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3082_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3082_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3083 for ECDSA, tcId is 82 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3083_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3083_msg[] = { 0x36, 0x33, 0x34, 0x33, 0x39, 0x31, 0x33, 0x34, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3083_sig[] = { 0x87, 0xcc, 0x58, 0x2c, 0xb1, 0x06, 0x02, 0x11, 0x05, 0x66, 0xfc, 0xb1, 0x0a, 0x23, 0x3a, 0xed, 0xe9, 0x93, 0xfa, 0xe5, 0xfb, 0x3f, 0x81, 0xb0, 0xbb, 0xff, 0x94, 0xca, 0xc9, 0x71, 0xc0, 0x5b, 0xd5, 0x1d, 0x96, 0x85, 0x82, 0x5b, 0x2c, 0xfc, 0x0a, 0x25, 0x96, 0xc7, 0xf8, 0x0d, 0x9f, 0x9d, 0xc6, 0x8c, 0x28, 0xc1, 0x59, 0xaa, 0x39, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3083 = { .name = "ecdsa_secp224r1_sha256_3083", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3083_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3083_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3083_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3084 for ECDSA, tcId is 83 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3084_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3084_msg[] = { 0x31, 0x35, 0x34, 0x31, 0x31, 0x30, 0x33, 0x35, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3084_sig[] = { 0x50, 0xd7, 0x3d, 0x94, 0x9b, 0x3a, 0xdc, 0xd3, 0xe8, 0xfa, 0x94, 0xda, 0xfe, 0xfa, 0xf9, 0xd2, 0x63, 0xeb, 0xc7, 0x02, 0x12, 0x8d, 0x89, 0x1a, 0xfa, 0xc4, 0x7e, 0xa7, 0xf8, 0x42, 0x3c, 0x37, 0x8f, 0x01, 0x90, 0x57, 0x49, 0x25, 0x14, 0x2e, 0xb5, 0xb9, 0x7c, 0x61, 0x2a, 0xbf, 0xa0, 0x48, 0xfa, 0x3a, 0xb5, 0x37, 0x5e, 0xc7, 0x95, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3084 = { .name = "ecdsa_secp224r1_sha256_3084", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3084_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3084_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3084_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3085 for ECDSA, tcId is 84 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3085_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3085_msg[] = { 0x31, 0x30, 0x34, 0x37, 0x38, 0x35, 0x38, 0x30, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3085_sig[] = { 0xd6, 0x08, 0x91, 0x5d, 0xfc, 0xd5, 0xd3, 0xc6, 0x3e, 0xd1, 0x0d, 0x0d, 0x9b, 0x61, 0x4f, 0x7a, 0x86, 0x6f, 0x88, 0x58, 0xa6, 0xe5, 0x9d, 0xc0, 0x3e, 0xb0, 0xa8, 0xee, 0x8e, 0x70, 0x1a, 0xa0, 0xba, 0xb4, 0x91, 0x43, 0x0f, 0x6e, 0x4d, 0xa9, 0x22, 0x44, 0xb0, 0xbb, 0x17, 0x49, 0x57, 0xee, 0x6f, 0x49, 0x5b, 0xc5, 0xd1, 0x5f, 0xab, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3085 = { .name = "ecdsa_secp224r1_sha256_3085", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3085_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3085_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3085_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3086 for ECDSA, tcId is 85 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3086_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3086_msg[] = { 0x31, 0x30, 0x35, 0x33, 0x36, 0x32, 0x38, 0x35, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3086_sig[] = { 0xc8, 0x7b, 0x0a, 0xb8, 0x42, 0xc4, 0x76, 0x9e, 0xd9, 0x4b, 0x91, 0x0b, 0xd7, 0x71, 0x96, 0x91, 0xf9, 0x99, 0x1b, 0xc5, 0xa3, 0x47, 0x88, 0x96, 0x08, 0xf0, 0x70, 0x34, 0xd0, 0x83, 0x11, 0x10, 0x48, 0xd6, 0xe0, 0x19, 0x77, 0x1f, 0xc2, 0x66, 0x9c, 0x55, 0x15, 0x6a, 0x3d, 0x09, 0x61, 0x5a, 0x6b, 0x2d, 0x9c, 0xae, 0x52, 0xdd, 0xab, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3086 = { .name = "ecdsa_secp224r1_sha256_3086", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3086_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3086_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3086_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3087 for ECDSA, tcId is 86 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3087_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3087_msg[] = { 0x39, 0x35, 0x33, 0x39, 0x30, 0x34, 0x31, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3087_sig[] = { 0x0a, 0x1c, 0x2c, 0x24, 0x78, 0xe2, 0x44, 0x46, 0x42, 0x26, 0xc6, 0x60, 0xed, 0xf7, 0x24, 0xdb, 0x12, 0x13, 0xf4, 0x92, 0x3e, 0xb7, 0x25, 0xd6, 0x11, 0xd9, 0x76, 0xfd, 0x76, 0x4e, 0x55, 0x18, 0x6a, 0x76, 0xf7, 0x34, 0x89, 0x1d, 0x05, 0xfb, 0x57, 0xaf, 0x27, 0x27, 0xfa, 0xb8, 0xfb, 0xea, 0x68, 0x4c, 0xa4, 0x32, 0x1d, 0x5d, 0xe5, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3087 = { .name = "ecdsa_secp224r1_sha256_3087", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3087_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3087_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3087_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3088 for ECDSA, tcId is 87 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3088_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3088_msg[] = { 0x39, 0x37, 0x38, 0x38, 0x34, 0x38, 0x30, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha256_3088_sig[] = { 0x8a, 0x27, 0x47, 0xc5, 0xdd, 0x9e, 0xf5, 0x29, 0x8b, 0x8a, 0xea, 0xbd, 0x2f, 0xb3, 0xa2, 0xbe, 0xb1, 0x61, 0x58, 0xfb, 0x2c, 0xc6, 0x2b, 0xe9, 0xe5, 0x1b, 0x21, 0x52, 0xf9, 0x62, 0x51, 0xbc, 0x04, 0x8b, 0xca, 0xd8, 0x32, 0xe6, 0xcb, 0xc0, 0x9c, 0x9c, 0x2e, 0x58, 0x5a, 0xb7, 0x54, 0x3d, 0xc5, 0x52, 0xea, 0xa5, 0x12, 0x5b, 0xe0, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3088 = { .name = "ecdsa_secp224r1_sha256_3088", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3088_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3088_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3088_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3089 for ECDSA, tcId is 88 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3089_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3089_msg[] = { 0x33, 0x36, 0x31, 0x30, 0x36, 0x37, 0x32, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3089_sig[] = { 0xd9, 0xea, 0xc3, 0x2a, 0x73, 0x4f, 0x3a, 0x3e, 0x5b, 0x5a, 0x29, 0x05, 0xbe, 0xd8, 0x16, 0x4e, 0xf4, 0xc6, 0xcd, 0x24, 0xd5, 0xc0, 0xfc, 0x54, 0xcc, 0x83, 0xf3, 0xcc, 0xa7, 0x84, 0x93, 0x0d, 0x16, 0xc3, 0xb7, 0x53, 0xbb, 0x3e, 0xd9, 0x15, 0x1d, 0x58, 0x3c, 0x50, 0xff, 0x97, 0xbc, 0x97, 0x62, 0x74, 0xbd, 0xe4, 0x82, 0xfb, 0x96, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3089 = { .name = "ecdsa_secp224r1_sha256_3089", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3089_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3089_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3089_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3090 for ECDSA, tcId is 89 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3090_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3090_msg[] = { 0x31, 0x30, 0x35, 0x34, 0x32, 0x34, 0x30, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3090_sig[] = { 0x6c, 0x40, 0xc6, 0xb1, 0x5a, 0xe5, 0x73, 0xf7, 0x7b, 0x67, 0x7c, 0xd8, 0x78, 0xcc, 0x5e, 0x4d, 0xa8, 0x17, 0x1c, 0xf5, 0x0d, 0x79, 0x97, 0x4f, 0xde, 0x37, 0x4e, 0x00, 0xc8, 0x8c, 0x98, 0x28, 0x03, 0x7b, 0xf7, 0x01, 0x3a, 0x14, 0x15, 0x53, 0x7c, 0xa0, 0x74, 0xd6, 0xc8, 0xa5, 0x53, 0xbd, 0xb4, 0xb2, 0x6b, 0x14, 0xa7, 0xe8, 0x8d, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3090 = { .name = "ecdsa_secp224r1_sha256_3090", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3090_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3090_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3090_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3091 for ECDSA, tcId is 90 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3091_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3091_msg[] = { 0x35, 0x31, 0x37, 0x34, 0x34, 0x34, 0x38, 0x31, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3091_sig[] = { 0xdc, 0xa0, 0xaa, 0xa0, 0xa3, 0x95, 0x39, 0x31, 0x42, 0xb3, 0x23, 0xed, 0xce, 0xd0, 0x93, 0x72, 0x76, 0x03, 0x50, 0xf2, 0xab, 0x26, 0x1c, 0xe3, 0x33, 0x9b, 0x11, 0x4d, 0x09, 0x83, 0xbf, 0x6e, 0x51, 0x0c, 0xe7, 0xf0, 0xa7, 0x52, 0x0f, 0x2b, 0x7c, 0x60, 0xcd, 0x68, 0xa4, 0x91, 0x2b, 0x78, 0x16, 0x2c, 0x7a, 0xc3, 0x37, 0x89, 0xe0, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3091 = { .name = "ecdsa_secp224r1_sha256_3091", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3091_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3091_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3091_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3092 for ECDSA, tcId is 91 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3092_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3092_msg[] = { 0x31, 0x39, 0x36, 0x37, 0x35, 0x36, 0x31, 0x32, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3092_sig[] = { 0xa0, 0x52, 0x6e, 0xd4, 0x7e, 0x26, 0x07, 0xe6, 0xba, 0xe6, 0xdc, 0xf3, 0xb8, 0xf5, 0x4f, 0x4e, 0x06, 0x38, 0x02, 0x36, 0x73, 0xa3, 0x8c, 0xad, 0x45, 0x69, 0xc3, 0xba, 0x61, 0x51, 0x6f, 0x55, 0x74, 0x6b, 0x37, 0x9d, 0x11, 0xcb, 0xaa, 0x02, 0xce, 0xf3, 0x53, 0x11, 0xd7, 0x77, 0x1a, 0x47, 0xd1, 0xe1, 0x27, 0xcf, 0xf4, 0x6d, 0xcf, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3092 = { .name = "ecdsa_secp224r1_sha256_3092", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3092_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3092_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3092_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3093 for ECDSA, tcId is 92 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3093_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3093_msg[] = { 0x33, 0x34, 0x34, 0x37, 0x32, 0x35, 0x33, 0x33, 0x34, 0x33, }; static const unsigned char ecdsa_secp224r1_sha256_3093_sig[] = { 0x5c, 0x00, 0xdb, 0x60, 0x17, 0x8c, 0x83, 0x61, 0x09, 0x2b, 0xdf, 0xb4, 0x7f, 0xc9, 0xa4, 0x7b, 0x33, 0x36, 0x3d, 0x7e, 0x0d, 0x76, 0xe3, 0x25, 0x20, 0xf7, 0x96, 0x57, 0xe1, 0xba, 0xf7, 0xae, 0x7d, 0x81, 0x04, 0x57, 0x93, 0xc7, 0x31, 0x73, 0xf4, 0x9d, 0x60, 0xbd, 0xfc, 0x87, 0x79, 0x94, 0x27, 0x95, 0xd9, 0xd0, 0x82, 0xb3, 0xca, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3093 = { .name = "ecdsa_secp224r1_sha256_3093", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3093_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3093_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3093_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3094 for ECDSA, tcId is 93 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3094_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3094_msg[] = { 0x33, 0x36, 0x38, 0x32, 0x36, 0x34, 0x33, 0x31, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3094_sig[] = { 0x46, 0xf6, 0x9b, 0x6a, 0x99, 0x71, 0x79, 0x49, 0xee, 0xe7, 0x40, 0x92, 0xa0, 0xc1, 0x43, 0x8a, 0x29, 0x0a, 0x2c, 0xd8, 0x2f, 0xe1, 0xe1, 0x0d, 0x8f, 0x37, 0xe8, 0x8b, 0x99, 0xa5, 0xf5, 0x9f, 0x09, 0xbd, 0x98, 0x0a, 0x06, 0x62, 0x33, 0x52, 0x33, 0x97, 0x84, 0x69, 0x87, 0xa8, 0xa1, 0xbf, 0xdd, 0xe3, 0x55, 0x06, 0x2d, 0x14, 0x0a, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3094 = { .name = "ecdsa_secp224r1_sha256_3094", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3094_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3094_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3094_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3095 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3095_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3095_msg[] = { 0x33, 0x32, 0x36, 0x31, 0x31, 0x39, 0x38, 0x36, 0x30, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3095_sig[] = { 0xe6, 0x43, 0xd8, 0x08, 0x5a, 0x22, 0x70, 0x6f, 0xa0, 0xe6, 0x54, 0x0f, 0x3d, 0x5e, 0x16, 0x9a, 0xd8, 0xcc, 0x49, 0xb4, 0xbf, 0xe9, 0x8e, 0x32, 0x53, 0x21, 0xc7, 0x05, 0xf9, 0x5b, 0xd4, 0x23, 0xf9, 0xca, 0xfe, 0x0c, 0xed, 0xfe, 0xc6, 0xfd, 0x97, 0x87, 0x15, 0x36, 0xd7, 0x1b, 0x2a, 0xc5, 0x8d, 0xfb, 0x2f, 0x7a, 0xb8, 0x95, 0x2d, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3095 = { .name = "ecdsa_secp224r1_sha256_3095", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3095_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3095_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3095_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3096 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3096_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3096_msg[] = { 0x39, 0x36, 0x37, 0x38, 0x37, 0x38, 0x31, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3096_sig[] = { 0xe6, 0x5f, 0xb9, 0xbc, 0xdd, 0x79, 0x1f, 0x14, 0x1c, 0xcf, 0xf2, 0xb3, 0xcf, 0xbf, 0x45, 0xd8, 0x4f, 0x8c, 0x62, 0x72, 0x02, 0x1a, 0x68, 0xdd, 0xe8, 0xc3, 0x6b, 0xc8, 0xdf, 0x6e, 0x08, 0xc7, 0x4b, 0x5e, 0x36, 0xb7, 0x77, 0x26, 0x58, 0xf0, 0x25, 0x15, 0xae, 0x0e, 0xa8, 0x13, 0xb6, 0x4d, 0xf2, 0x4f, 0x35, 0x22, 0xea, 0x15, 0xfb, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3096 = { .name = "ecdsa_secp224r1_sha256_3096", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3096_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3096_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3096_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3097 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3097_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3097_msg[] = { 0x34, 0x39, 0x35, 0x38, 0x38, 0x32, 0x33, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha256_3097_sig[] = { 0xa4, 0x76, 0xd4, 0x68, 0x22, 0x1e, 0xf5, 0x56, 0x11, 0xe8, 0xa7, 0x24, 0xc9, 0xb4, 0xcd, 0x79, 0xc3, 0x4f, 0x69, 0x40, 0xd5, 0xf6, 0x65, 0xe3, 0x33, 0x5f, 0x62, 0x31, 0xbf, 0xdd, 0xc1, 0x8e, 0x7a, 0x00, 0x8b, 0xc2, 0x06, 0xc8, 0xe1, 0xca, 0x6c, 0x87, 0x83, 0x63, 0xe4, 0x13, 0x85, 0x08, 0xe0, 0xc3, 0xa8, 0x4a, 0x27, 0xea, 0xbe, 0x35, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3097 = { .name = "ecdsa_secp224r1_sha256_3097", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3097_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3097_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3097_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3098 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3098_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3098_msg[] = { 0x38, 0x32, 0x34, 0x36, 0x33, 0x37, 0x38, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3098_sig[] = { 0x1b, 0x39, 0x34, 0x77, 0x94, 0x18, 0x79, 0x27, 0x18, 0x73, 0xa8, 0xc0, 0x43, 0xa7, 0x7c, 0xaa, 0xdb, 0x99, 0x57, 0xfc, 0xdd, 0x26, 0x3a, 0x6a, 0xc9, 0x78, 0xe4, 0xba, 0x27, 0x00, 0x60, 0xd5, 0xf3, 0x56, 0xeb, 0xb6, 0xd1, 0x85, 0x77, 0x2b, 0xaa, 0x78, 0xb8, 0x78, 0xaf, 0x68, 0x07, 0x37, 0x8e, 0x0d, 0x5c, 0x53, 0x2d, 0xa0, 0xa4, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3098 = { .name = "ecdsa_secp224r1_sha256_3098", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3098_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3098_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3098_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3099 for ECDSA, tcId is 98 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3099_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3099_msg[] = { 0x31, 0x31, 0x30, 0x32, 0x30, 0x38, 0x33, 0x33, 0x37, 0x37, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3099_sig[] = { 0xb2, 0xed, 0xa8, 0xc9, 0x69, 0xd4, 0xb1, 0xbd, 0xd3, 0x18, 0x67, 0xfd, 0x1f, 0x92, 0xd5, 0x47, 0xb4, 0x06, 0x84, 0x0c, 0x25, 0x7f, 0x2f, 0x80, 0xdf, 0xbd, 0xc4, 0xe3, 0xe6, 0x29, 0x7b, 0x05, 0x9c, 0xe6, 0x4e, 0xf0, 0x4d, 0xe9, 0x71, 0x5a, 0x8f, 0x68, 0x6a, 0x9f, 0x73, 0x98, 0x08, 0x65, 0x06, 0x6a, 0x94, 0x97, 0x5b, 0x7f, 0x81, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3099 = { .name = "ecdsa_secp224r1_sha256_3099", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3099_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3099_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3099_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3100 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3100_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3100_msg[] = { 0x31, 0x33, 0x33, 0x38, 0x37, 0x31, 0x36, 0x34, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3100_sig[] = { 0x93, 0x81, 0x89, 0xa1, 0x8a, 0x4b, 0xff, 0x57, 0x12, 0xac, 0x99, 0xc2, 0xb8, 0xe9, 0x2c, 0x21, 0x8a, 0xf3, 0xe4, 0xd4, 0xe3, 0xa8, 0x4b, 0x90, 0x6b, 0x0f, 0x70, 0x4e, 0x7b, 0xb3, 0xe5, 0x38, 0xf0, 0xb7, 0x06, 0x64, 0xda, 0xd4, 0x62, 0xab, 0x14, 0xb0, 0xed, 0x41, 0x6c, 0x86, 0xac, 0x6e, 0x90, 0x60, 0xfe, 0x76, 0x0d, 0xab, 0xb7, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3100 = { .name = "ecdsa_secp224r1_sha256_3100", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3100_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3100_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3100_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3101 for ECDSA, tcId is 100 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3101_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3101_msg[] = { 0x33, 0x32, 0x32, 0x31, 0x34, 0x34, 0x31, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3101_sig[] = { 0xbb, 0x7c, 0x1d, 0x81, 0x20, 0xd2, 0xaa, 0x77, 0x65, 0xb1, 0x6e, 0xea, 0xc4, 0x42, 0x82, 0xde, 0x60, 0x5f, 0xb2, 0xa1, 0x66, 0x56, 0x57, 0xde, 0xa4, 0x49, 0x29, 0x35, 0xe0, 0xa8, 0xad, 0xb3, 0xa1, 0x43, 0x88, 0x3f, 0x98, 0x1e, 0xa1, 0x32, 0x3f, 0xa6, 0xf1, 0xd3, 0x47, 0x84, 0x5b, 0xe2, 0xb8, 0xdc, 0xc6, 0xcd, 0x5c, 0xc9, 0x3e, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3101 = { .name = "ecdsa_secp224r1_sha256_3101", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3101_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3101_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3101_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3102 for ECDSA, tcId is 101 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3102_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3102_msg[] = { 0x31, 0x30, 0x36, 0x38, 0x36, 0x36, 0x35, 0x35, 0x35, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3102_sig[] = { 0x74, 0xa4, 0xc5, 0x1d, 0xd6, 0x0c, 0x71, 0x18, 0x46, 0x7b, 0xe2, 0x96, 0x52, 0x06, 0x0f, 0x39, 0xaf, 0x94, 0xf8, 0xc0, 0xeb, 0x7f, 0x15, 0xc6, 0x47, 0x71, 0x01, 0x0c, 0x61, 0x02, 0xec, 0x0c, 0x92, 0x57, 0xe6, 0x07, 0xaf, 0x3f, 0x3f, 0xf7, 0x49, 0x0b, 0x54, 0xe7, 0x81, 0x11, 0xf4, 0x22, 0xbe, 0xc1, 0x1b, 0xa0, 0x12, 0x77, 0x17, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3102 = { .name = "ecdsa_secp224r1_sha256_3102", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3102_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3102_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3102_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3103 for ECDSA, tcId is 102 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3103_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3103_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x35, 0x32, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3103_sig[] = { 0x62, 0x5d, 0xa1, 0x8d, 0x67, 0x6f, 0x02, 0xfa, 0xe9, 0xdb, 0xcb, 0x30, 0x92, 0x26, 0x59, 0x09, 0x48, 0x8f, 0xb9, 0x5d, 0x66, 0x25, 0x69, 0xd7, 0x74, 0x6b, 0x96, 0x87, 0xc4, 0xf1, 0xec, 0x83, 0x1e, 0x36, 0x60, 0x4d, 0x60, 0x4b, 0x63, 0x0f, 0xd0, 0xb1, 0x99, 0x9c, 0xd0, 0x99, 0x60, 0x86, 0x22, 0x94, 0x25, 0x1d, 0x85, 0xe5, 0x87, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3103 = { .name = "ecdsa_secp224r1_sha256_3103", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3103_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3103_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha256_3103_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3104 for ECDSA, tcId is 103 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3104_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3104_msg[] = { 0x37, 0x30, 0x33, 0x30, 0x38, 0x31, 0x38, 0x37, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3104_sig[] = { 0x8e, 0xe0, 0xd4, 0xa3, 0x1f, 0xd1, 0xc4, 0xd8, 0x54, 0xd7, 0x5c, 0x14, 0x15, 0x19, 0x26, 0x89, 0x9d, 0xde, 0x1c, 0x73, 0x32, 0xfd, 0x47, 0x69, 0x44, 0x3d, 0x21, 0x3d, 0x4b, 0x82, 0x78, 0xb8, 0x9b, 0xa4, 0xf8, 0xfb, 0xd7, 0xdc, 0xc6, 0xaf, 0xfe, 0x4c, 0x12, 0x15, 0x6f, 0x74, 0x09, 0x90, 0x94, 0x16, 0x98, 0x96, 0x85, 0xdd, 0x5a, 0x39, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3104 = { .name = "ecdsa_secp224r1_sha256_3104", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3104_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3104_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3104_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3105 for ECDSA, tcId is 104 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3105_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3105_msg[] = { 0x35, 0x39, 0x32, 0x34, 0x35, 0x32, 0x33, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3105_sig[] = { 0xbd, 0xde, 0x45, 0xfc, 0x9e, 0xbb, 0x37, 0x49, 0xc9, 0xfb, 0x2c, 0x25, 0xbf, 0x02, 0xe2, 0xa2, 0x17, 0xcc, 0xc1, 0x12, 0xf8, 0xe6, 0x54, 0x99, 0xee, 0xff, 0xb6, 0xa1, 0xbe, 0xcd, 0x6b, 0x88, 0xef, 0x2b, 0xee, 0x87, 0x2e, 0xbc, 0x0e, 0x2b, 0x80, 0x5a, 0x56, 0x06, 0x6e, 0x19, 0x17, 0x9f, 0xce, 0x9f, 0x0d, 0xc0, 0xdf, 0x3f, 0x63, 0x78, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3105 = { .name = "ecdsa_secp224r1_sha256_3105", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3105_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3105_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3105_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3106 for ECDSA, tcId is 105 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3106_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3106_msg[] = { 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, 0x36, 0x36, 0x32, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3106_sig[] = { 0x50, 0x18, 0x6e, 0x02, 0x3a, 0x1f, 0x50, 0x53, 0xfc, 0xb4, 0xd0, 0x47, 0x30, 0x39, 0xb1, 0xb2, 0xcd, 0xeb, 0xa5, 0x69, 0x71, 0x9a, 0x4e, 0xba, 0xbd, 0xd6, 0x75, 0xc8, 0xf8, 0xfb, 0x89, 0x3c, 0x1b, 0x6b, 0x5b, 0x82, 0x7b, 0x5f, 0x3f, 0x4b, 0xb5, 0xea, 0xb7, 0x5b, 0x62, 0x12, 0xbb, 0x56, 0xa5, 0xa3, 0x9b, 0xb3, 0x5c, 0x12, 0x7a, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3106 = { .name = "ecdsa_secp224r1_sha256_3106", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3106_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3106_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3106_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3107 for ECDSA, tcId is 106 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3107_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3107_msg[] = { 0x34, 0x30, 0x30, 0x35, 0x33, 0x31, 0x34, 0x34, 0x30, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3107_sig[] = { 0xd3, 0xb4, 0x54, 0x63, 0x9b, 0x0f, 0xb3, 0xda, 0x93, 0xb2, 0x0d, 0x55, 0xbe, 0x86, 0x09, 0xe4, 0x09, 0x02, 0xcb, 0x4a, 0x60, 0x8f, 0x3b, 0x90, 0x64, 0xc0, 0xde, 0xb7, 0xec, 0x7a, 0xa9, 0x63, 0x7f, 0xd7, 0x1b, 0x54, 0x3e, 0x52, 0x43, 0xfa, 0xab, 0x4c, 0x7a, 0x2e, 0xdc, 0x2c, 0x48, 0xe9, 0x82, 0xc5, 0xac, 0x01, 0x78, 0x07, 0xf1, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3107 = { .name = "ecdsa_secp224r1_sha256_3107", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3107_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3107_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3107_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3108 for ECDSA, tcId is 107 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3108_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3108_msg[] = { 0x33, 0x30, 0x39, 0x36, 0x34, 0x35, 0x37, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3108_sig[] = { 0xc2, 0x02, 0xab, 0xbd, 0x98, 0xe0, 0x38, 0x09, 0xde, 0x84, 0x2b, 0xde, 0xf2, 0x68, 0xa1, 0xc6, 0x16, 0xa7, 0x30, 0x6d, 0xa6, 0x9a, 0x87, 0xab, 0xaf, 0x03, 0x16, 0x9c, 0x7e, 0x7e, 0x04, 0x82, 0x3a, 0xf8, 0xed, 0x68, 0x36, 0xfd, 0x2a, 0xc0, 0x11, 0xe4, 0x7d, 0xe8, 0xe1, 0xbe, 0xf9, 0x1e, 0xd1, 0xda, 0x51, 0x44, 0x89, 0x3f, 0xc2, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3108 = { .name = "ecdsa_secp224r1_sha256_3108", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3108_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3108_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3108_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3109 for ECDSA, tcId is 108 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3109_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3109_msg[] = { 0x32, 0x37, 0x38, 0x34, 0x30, 0x32, 0x35, 0x36, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3109_sig[] = { 0x2e, 0x4b, 0x76, 0x63, 0x88, 0x16, 0xcc, 0xe0, 0x57, 0xa4, 0xa2, 0x7a, 0x49, 0x25, 0x8d, 0xcb, 0x54, 0x37, 0xae, 0x97, 0x73, 0x9f, 0x27, 0xeb, 0xc0, 0x97, 0x3c, 0x0b, 0xe9, 0xf6, 0xc0, 0xb6, 0x4e, 0x76, 0x4a, 0xd3, 0x9d, 0xd9, 0x2b, 0x57, 0x6e, 0x11, 0xc2, 0x3e, 0x59, 0x94, 0xb0, 0x20, 0x95, 0xcb, 0x2a, 0x47, 0x20, 0xc8, 0x66, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3109 = { .name = "ecdsa_secp224r1_sha256_3109", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3109_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3109_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3109_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3110 for ECDSA, tcId is 109 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3110_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3110_msg[] = { 0x32, 0x36, 0x31, 0x38, 0x37, 0x38, 0x37, 0x34, 0x31, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3110_sig[] = { 0x7e, 0x0f, 0x48, 0x76, 0x10, 0x89, 0xaa, 0x4c, 0x7e, 0xcd, 0x5a, 0x7a, 0xc5, 0x38, 0x08, 0x36, 0xb1, 0xe5, 0xd3, 0x81, 0xd3, 0x40, 0x01, 0x74, 0xd1, 0x5d, 0xf9, 0x8b, 0x0c, 0x3d, 0xf5, 0x00, 0x60, 0xe3, 0xa6, 0x71, 0x4a, 0xa5, 0x65, 0xa3, 0x3d, 0x78, 0x4e, 0x7b, 0x16, 0xac, 0x87, 0xbe, 0xbf, 0xb3, 0xc2, 0x25, 0x5c, 0xfd, 0x83, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3110 = { .name = "ecdsa_secp224r1_sha256_3110", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3110_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3110_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3110_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3111 for ECDSA, tcId is 110 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3111_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3111_msg[] = { 0x31, 0x36, 0x34, 0x32, 0x36, 0x32, 0x35, 0x32, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3111_sig[] = { 0x4d, 0x6f, 0x74, 0x08, 0x50, 0x8e, 0xb0, 0x81, 0x4d, 0xcd, 0x48, 0x00, 0x7f, 0x0e, 0xfd, 0x9e, 0x2b, 0x91, 0xcd, 0xac, 0x40, 0x30, 0x54, 0x0c, 0xc6, 0x78, 0xde, 0x19, 0x1e, 0x74, 0xf8, 0xdc, 0x34, 0xd1, 0x36, 0x13, 0xef, 0x42, 0x46, 0x2f, 0xe8, 0x89, 0x81, 0xcb, 0xe2, 0x48, 0x9b, 0xe1, 0x0e, 0x4c, 0xda, 0xe9, 0x75, 0xa1, 0xb3, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3111 = { .name = "ecdsa_secp224r1_sha256_3111", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3111_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3111_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3111_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3112 for ECDSA, tcId is 111 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3112_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3112_msg[] = { 0x36, 0x38, 0x32, 0x34, 0x31, 0x38, 0x39, 0x34, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3112_sig[] = { 0x96, 0x7f, 0x2c, 0x5d, 0x30, 0x4c, 0x79, 0x32, 0xea, 0xaa, 0x16, 0x82, 0x19, 0x79, 0x45, 0xe6, 0x6c, 0xc9, 0x12, 0xb7, 0x03, 0x82, 0x47, 0x76, 0xef, 0x16, 0xad, 0x7a, 0x73, 0x95, 0x70, 0x01, 0xd9, 0x03, 0x7c, 0x63, 0xd6, 0x47, 0x1c, 0x80, 0x9a, 0x23, 0x88, 0x38, 0x3a, 0xd6, 0x95, 0x13, 0x7c, 0x62, 0x2c, 0xd5, 0xf5, 0x58, 0x44, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3112 = { .name = "ecdsa_secp224r1_sha256_3112", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3112_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3112_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3112_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3113 for ECDSA, tcId is 112 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3113_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3113_msg[] = { 0x34, 0x38, 0x34, 0x32, 0x34, 0x35, 0x34, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3113_sig[] = { 0x49, 0x26, 0x08, 0x04, 0xbb, 0x2c, 0xea, 0xe4, 0xb9, 0xce, 0xe6, 0x3b, 0x02, 0xea, 0x60, 0x17, 0x3e, 0xc3, 0xf4, 0xf9, 0x01, 0x67, 0x62, 0x7c, 0x0b, 0xb3, 0x98, 0x88, 0xc9, 0xeb, 0x02, 0x2f, 0x96, 0xdb, 0x3e, 0x90, 0xfe, 0x0f, 0xf6, 0x17, 0x73, 0x0a, 0x62, 0x9f, 0x34, 0x2e, 0x02, 0xfb, 0x20, 0x8d, 0x68, 0x36, 0xcb, 0xbd, 0xc7, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3113 = { .name = "ecdsa_secp224r1_sha256_3113", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3113_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3113_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3113_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3114 for ECDSA, tcId is 113 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3114_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3114_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3114_sig[] = { 0xf3, 0xe7, 0x12, 0x59, 0x7a, 0x4b, 0x22, 0x63, 0x2c, 0x5f, 0x8e, 0xb9, 0xf2, 0x84, 0x58, 0x82, 0xbb, 0x03, 0xa1, 0x39, 0x73, 0x5f, 0x80, 0xaf, 0x88, 0x26, 0xfc, 0x56, 0x62, 0x86, 0x5b, 0xd9, 0x1c, 0x09, 0x03, 0x51, 0x1a, 0x48, 0x1d, 0x60, 0x7e, 0xb6, 0xb5, 0xfe, 0x28, 0xf6, 0xf6, 0xc8, 0x92, 0x95, 0x68, 0x1a, 0x3e, 0x8d, 0x55, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3114 = { .name = "ecdsa_secp224r1_sha256_3114", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3114_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3114_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3114_sig, .siglen = 56, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 113 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3115 for ECDSA, tcId is 114 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3115_pubkey[] = { 0x93, 0xb4, 0xc2, 0x8f, 0x03, 0x2d, 0x00, 0xf8, 0x0e, 0x77, 0x49, 0x1e, 0xdc, 0x15, 0x83, 0x59, 0x90, 0x9e, 0xe9, 0xe3, 0x0a, 0x73, 0x27, 0xb7, 0x42, 0x19, 0xe5, 0xe2, 0x48, 0x2c, 0x19, 0xae, 0x35, 0xcb, 0x28, 0xaf, 0xc9, 0xb9, 0x5c, 0xa1, 0xed, 0x7a, 0xd9, 0x1c, 0x81, 0x2d, 0x5f, 0xcc, 0xeb, 0x4b, 0xed, 0xdb, 0xf1, 0xa1, 0x6d, 0x92, }; static const unsigned char ecdsa_secp224r1_sha256_3115_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3115_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3115 = { .name = "ecdsa_secp224r1_sha256_3115", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3115_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3115_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3115_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 114 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3116 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3116_pubkey[] = { 0x93, 0xb4, 0xc2, 0x8f, 0x03, 0x2d, 0x00, 0xf8, 0x0e, 0x77, 0x49, 0x1e, 0xdc, 0x15, 0x83, 0x59, 0x90, 0x9e, 0xe9, 0xe3, 0x0a, 0x73, 0x27, 0xb7, 0x42, 0x19, 0xe5, 0xe2, 0x48, 0x2c, 0x19, 0xae, 0x35, 0xcb, 0x28, 0xaf, 0xc9, 0xb9, 0x5c, 0xa1, 0xed, 0x7a, 0xd9, 0x1c, 0x81, 0x2d, 0x5f, 0xcc, 0xeb, 0x4b, 0xed, 0xdb, 0xf1, 0xa1, 0x6d, 0x92, }; static const unsigned char ecdsa_secp224r1_sha256_3116_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3116_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3116 = { .name = "ecdsa_secp224r1_sha256_3116", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3116_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3116_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3116_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 115 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3117 for ECDSA, tcId is 116 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3117_pubkey[] = { 0xda, 0x92, 0x7f, 0x4b, 0xa8, 0x8b, 0x63, 0x9b, 0xf5, 0x33, 0x42, 0x21, 0xd2, 0xf5, 0x4d, 0x8e, 0xf9, 0xcc, 0xc1, 0xa1, 0x12, 0x5f, 0xad, 0x18, 0xc7, 0xbf, 0xb7, 0x89, 0xac, 0x51, 0xae, 0x53, 0xde, 0x6d, 0x83, 0x4a, 0x9d, 0xb3, 0x94, 0x7b, 0x8d, 0xd4, 0xc6, 0xac, 0x2b, 0x08, 0x4b, 0x85, 0x49, 0x6b, 0xfa, 0x72, 0xd8, 0x6b, 0x69, 0x48, }; static const unsigned char ecdsa_secp224r1_sha256_3117_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3117_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3117 = { .name = "ecdsa_secp224r1_sha256_3117", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3117_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3117_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3117_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 116 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3118 for ECDSA, tcId is 117 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3118_pubkey[] = { 0x20, 0x88, 0x8e, 0x1c, 0x0f, 0x56, 0x94, 0xc4, 0xc0, 0x36, 0x3b, 0x36, 0x48, 0x2b, 0xeb, 0x6e, 0x1e, 0x66, 0x49, 0xb3, 0xd3, 0xb2, 0x6f, 0x12, 0x7f, 0xeb, 0xb6, 0xfc, 0xde, 0x00, 0xc2, 0xf3, 0xd8, 0xe4, 0xa7, 0xe8, 0xa0, 0xba, 0xfd, 0x41, 0x7c, 0x96, 0xd3, 0xe8, 0x1c, 0x97, 0x59, 0x46, 0xa2, 0xf3, 0x68, 0x6a, 0xa3, 0x9d, 0x35, 0xf1, }; static const unsigned char ecdsa_secp224r1_sha256_3118_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3118_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3118 = { .name = "ecdsa_secp224r1_sha256_3118", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3118_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3118_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3118_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 117 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3119 for ECDSA, tcId is 118 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3119_pubkey[] = { 0x95, 0x45, 0xc8, 0x6f, 0x03, 0x2c, 0x5d, 0xf2, 0x55, 0xa4, 0x49, 0x0b, 0xb0, 0xb8, 0x3e, 0xca, 0x20, 0x11, 0x81, 0x79, 0x2a, 0xd7, 0x42, 0x46, 0x87, 0x4d, 0xb2, 0x29, 0x40, 0x52, 0x64, 0xc2, 0x83, 0x06, 0x33, 0x27, 0xb7, 0x0f, 0x4c, 0x2b, 0xe5, 0xab, 0x4d, 0x2e, 0x94, 0x07, 0xb8, 0x66, 0xe1, 0x21, 0xd6, 0x14, 0x5d, 0x12, 0x4c, 0x04, }; static const unsigned char ecdsa_secp224r1_sha256_3119_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3119_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3119 = { .name = "ecdsa_secp224r1_sha256_3119", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3119_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3119_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3119_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 118 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3120 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3120_pubkey[] = { 0x57, 0x9d, 0x53, 0xf3, 0x9d, 0x51, 0x09, 0xbd, 0x44, 0x0e, 0x3e, 0x3e, 0x7e, 0xfd, 0x60, 0x37, 0x40, 0x96, 0x33, 0x48, 0xff, 0x9c, 0x72, 0xc0, 0x3b, 0x0f, 0xe6, 0xb8, 0xdf, 0x02, 0xf1, 0x33, 0xec, 0xd6, 0x0b, 0x07, 0x2a, 0x08, 0x12, 0xad, 0xc7, 0x52, 0x70, 0x8f, 0x2b, 0xe9, 0xd8, 0xc9, 0xad, 0x59, 0x53, 0xd8, 0xc7, 0xbf, 0x39, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3120_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3120_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3120 = { .name = "ecdsa_secp224r1_sha256_3120", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3120_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3120_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3120_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 119 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3121 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3121_pubkey[] = { 0x57, 0x9d, 0x53, 0xf3, 0x9d, 0x51, 0x09, 0xbd, 0x44, 0x0e, 0x3e, 0x3e, 0x7e, 0xfd, 0x60, 0x37, 0x40, 0x96, 0x33, 0x48, 0xff, 0x9c, 0x72, 0xc0, 0x3b, 0x0f, 0xe6, 0xb8, 0xdf, 0x02, 0xf1, 0x33, 0xec, 0xd6, 0x0b, 0x07, 0x2a, 0x08, 0x12, 0xad, 0xc7, 0x52, 0x70, 0x8f, 0x2b, 0xe9, 0xd8, 0xc9, 0xad, 0x59, 0x53, 0xd8, 0xc7, 0xbf, 0x39, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3121_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3121_sig[] = { 0x03, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3121 = { .name = "ecdsa_secp224r1_sha256_3121", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3121_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3121_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3121_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 120 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3122 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3122_pubkey[] = { 0xd2, 0xa1, 0x4c, 0x81, 0x06, 0xd8, 0x9f, 0x35, 0x36, 0xfa, 0xeb, 0xda, 0xfc, 0xd4, 0x68, 0x0f, 0x65, 0xab, 0x4b, 0xf2, 0x24, 0x31, 0x64, 0xca, 0x14, 0x64, 0xb6, 0x28, 0xac, 0xaf, 0x2b, 0xee, 0x52, 0xe6, 0x23, 0x1d, 0x3c, 0x98, 0x0f, 0x52, 0xf8, 0xe1, 0x89, 0xa4, 0x1c, 0x3e, 0x3a, 0x05, 0xe5, 0x91, 0x19, 0x5e, 0xc8, 0x64, 0x21, 0x7a, }; static const unsigned char ecdsa_secp224r1_sha256_3122_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3122_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3122 = { .name = "ecdsa_secp224r1_sha256_3122", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3122_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3122_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3122_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 121 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3123 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3123_pubkey[] = { 0xd2, 0xa1, 0x4c, 0x81, 0x06, 0xd8, 0x9f, 0x35, 0x36, 0xfa, 0xeb, 0xda, 0xfc, 0xd4, 0x68, 0x0f, 0x65, 0xab, 0x4b, 0xf2, 0x24, 0x31, 0x64, 0xca, 0x14, 0x64, 0xb6, 0x28, 0xac, 0xaf, 0x2b, 0xee, 0x52, 0xe6, 0x23, 0x1d, 0x3c, 0x98, 0x0f, 0x52, 0xf8, 0xe1, 0x89, 0xa4, 0x1c, 0x3e, 0x3a, 0x05, 0xe5, 0x91, 0x19, 0x5e, 0xc8, 0x64, 0x21, 0x7a, }; static const unsigned char ecdsa_secp224r1_sha256_3123_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3123_sig[] = { 0x03, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3123 = { .name = "ecdsa_secp224r1_sha256_3123", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3123_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3123_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3123_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 122 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3124 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3124_pubkey[] = { 0xe8, 0x92, 0x47, 0x91, 0x53, 0xad, 0x13, 0xea, 0x5c, 0xa4, 0x5d, 0x4c, 0x32, 0x3e, 0xbf, 0x1f, 0xc3, 0xcd, 0x0c, 0xdf, 0x78, 0x7c, 0x34, 0x30, 0x6a, 0x3f, 0x79, 0xa4, 0x32, 0x6c, 0xa9, 0x64, 0x5f, 0x2b, 0x51, 0x76, 0x08, 0xdc, 0x1f, 0x08, 0xb7, 0xa8, 0x4c, 0xfc, 0x61, 0xe6, 0xff, 0x68, 0xd1, 0x4f, 0x27, 0xd2, 0x04, 0x3c, 0x7e, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3124_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3124_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3124 = { .name = "ecdsa_secp224r1_sha256_3124", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3124_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3124_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3124_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 123 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3125 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3125_pubkey[] = { 0xe8, 0x92, 0x47, 0x91, 0x53, 0xad, 0x13, 0xea, 0x5c, 0xa4, 0x5d, 0x4c, 0x32, 0x3e, 0xbf, 0x1f, 0xc3, 0xcd, 0x0c, 0xdf, 0x78, 0x7c, 0x34, 0x30, 0x6a, 0x3f, 0x79, 0xa4, 0x32, 0x6c, 0xa9, 0x64, 0x5f, 0x2b, 0x51, 0x76, 0x08, 0xdc, 0x1f, 0x08, 0xb7, 0xa8, 0x4c, 0xfc, 0x61, 0xe6, 0xff, 0x68, 0xd1, 0x4f, 0x27, 0xd2, 0x04, 0x3c, 0x7e, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3125_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3125_sig[] = { 0x03, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3125 = { .name = "ecdsa_secp224r1_sha256_3125", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3125_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3125_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3125_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 124 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3126 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3126_pubkey[] = { 0xe8, 0x92, 0x47, 0x91, 0x53, 0xad, 0x13, 0xea, 0x5c, 0xa4, 0x5d, 0x4c, 0x32, 0x3e, 0xbf, 0x1f, 0xc3, 0xcd, 0x0c, 0xdf, 0x78, 0x7c, 0x34, 0x30, 0x6a, 0x3f, 0x79, 0xa4, 0x32, 0x6c, 0xa9, 0x64, 0x5f, 0x2b, 0x51, 0x76, 0x08, 0xdc, 0x1f, 0x08, 0xb7, 0xa8, 0x4c, 0xfc, 0x61, 0xe6, 0xff, 0x68, 0xd1, 0x4f, 0x27, 0xd2, 0x04, 0x3c, 0x7e, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3126_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3126_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3126 = { .name = "ecdsa_secp224r1_sha256_3126", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3126_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3126_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3126_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 125 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3127 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3127_pubkey[] = { 0x2b, 0x0e, 0xac, 0x35, 0xc0, 0xb2, 0x94, 0xf6, 0xd4, 0x35, 0xdc, 0xaf, 0xfa, 0x86, 0x33, 0xb0, 0x12, 0x30, 0x05, 0x46, 0x5c, 0x30, 0x08, 0x0a, 0xdb, 0xcc, 0x10, 0x3a, 0xd4, 0x65, 0xa6, 0x3b, 0xfb, 0x71, 0xd4, 0xae, 0xe0, 0x93, 0x28, 0x69, 0x7f, 0xe1, 0x08, 0x87, 0x53, 0x64, 0x6d, 0x83, 0x69, 0xb8, 0xdc, 0x10, 0x32, 0x17, 0xc2, 0x19, }; static const unsigned char ecdsa_secp224r1_sha256_3127_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3127_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3127 = { .name = "ecdsa_secp224r1_sha256_3127", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3127_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3127_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3127_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 126 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3128 for ECDSA, tcId is 127 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3128_pubkey[] = { 0xd1, 0x56, 0xe0, 0x1e, 0x33, 0xbe, 0xce, 0xde, 0x8f, 0x4f, 0xb4, 0xae, 0x95, 0x21, 0xd7, 0x51, 0xe7, 0xf8, 0xeb, 0x79, 0x5c, 0xa0, 0x08, 0x57, 0xdb, 0x2f, 0xd7, 0xaf, 0xd7, 0x3a, 0x45, 0x0e, 0xc6, 0x0e, 0x6a, 0x92, 0x18, 0xa8, 0x43, 0x18, 0x70, 0x68, 0x7e, 0x09, 0x68, 0x94, 0x4f, 0x6d, 0xc5, 0xff, 0xeb, 0x30, 0xe4, 0x69, 0x3b, 0x7c, }; static const unsigned char ecdsa_secp224r1_sha256_3128_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3128_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3128 = { .name = "ecdsa_secp224r1_sha256_3128", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3128_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3128_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3128_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 127 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3129 for ECDSA, tcId is 128 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3129_pubkey[] = { 0xf2, 0x93, 0xa8, 0xa2, 0xb4, 0xaf, 0xf0, 0xbe, 0xd9, 0x5c, 0x66, 0x3b, 0x36, 0x4a, 0xfe, 0x69, 0x77, 0x8d, 0x38, 0xdd, 0x7e, 0x7a, 0x30, 0x4f, 0x7d, 0x3c, 0x74, 0xe6, 0x17, 0xdf, 0xd0, 0x9e, 0x78, 0x03, 0xc4, 0x43, 0x9a, 0x6c, 0x07, 0x5c, 0xb5, 0x79, 0xcd, 0xe6, 0x52, 0xd0, 0x3f, 0x75, 0x59, 0xff, 0x58, 0x84, 0x63, 0x12, 0xfa, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha256_3129_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3129_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3129 = { .name = "ecdsa_secp224r1_sha256_3129", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3129_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3129_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3129_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 128 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3130 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3130_pubkey[] = { 0xd4, 0xdd, 0xf0, 0x03, 0xb2, 0x98, 0xcb, 0xaa, 0x7d, 0x2e, 0xdc, 0x58, 0x4b, 0x28, 0xb4, 0x74, 0xa7, 0x61, 0x62, 0xed, 0x4b, 0x5b, 0x0f, 0x62, 0x22, 0xc5, 0x43, 0x17, 0xd4, 0xe4, 0xfe, 0x03, 0x0f, 0x17, 0x8f, 0xb4, 0xaa, 0x4a, 0x6d, 0x7f, 0x61, 0x26, 0x5e, 0xcd, 0x7e, 0xf1, 0x3c, 0x31, 0x36, 0x06, 0xb8, 0xd3, 0x41, 0xa8, 0xb9, 0x54, }; static const unsigned char ecdsa_secp224r1_sha256_3130_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3130_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3130 = { .name = "ecdsa_secp224r1_sha256_3130", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3130_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3130_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3130_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 129 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3131 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3131_pubkey[] = { 0x8a, 0x5b, 0xf0, 0x02, 0x8f, 0x1e, 0x3e, 0xb6, 0x84, 0x1d, 0xee, 0x7b, 0x8f, 0x87, 0x3f, 0x68, 0xb0, 0xc5, 0x60, 0xe5, 0x92, 0xe3, 0x18, 0x20, 0x74, 0xf5, 0x1c, 0xe8, 0x96, 0x68, 0xc3, 0x22, 0x24, 0xb6, 0x5b, 0x68, 0x49, 0x71, 0x3d, 0x35, 0xe3, 0xac, 0xf1, 0x78, 0x68, 0x62, 0xe6, 0x5b, 0x5a, 0x66, 0x4b, 0x47, 0xa0, 0x98, 0xca, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha256_3131_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3131_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3131 = { .name = "ecdsa_secp224r1_sha256_3131", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3131_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3131_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3131_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 130 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3132 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3132_pubkey[] = { 0xb5, 0x3e, 0x56, 0x9b, 0x18, 0xe9, 0x36, 0x15, 0x67, 0xe5, 0x71, 0x3e, 0xe6, 0x9e, 0xcb, 0xe7, 0x94, 0x99, 0x11, 0xb0, 0x25, 0x75, 0x46, 0xa2, 0x4c, 0x3d, 0xd1, 0x37, 0xf2, 0x9a, 0x83, 0x33, 0x4c, 0xff, 0x1c, 0x44, 0xd8, 0xc0, 0xc3, 0x3b, 0x6d, 0xad, 0xb8, 0x56, 0x8c, 0x02, 0x4f, 0xa1, 0xfb, 0xb6, 0x94, 0xcd, 0x9e, 0x70, 0x5f, 0x5a, }; static const unsigned char ecdsa_secp224r1_sha256_3132_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3132_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3132 = { .name = "ecdsa_secp224r1_sha256_3132", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3132_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3132_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3132_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 131 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3133 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3133_pubkey[] = { 0x77, 0xf3, 0xeb, 0xf5, 0x27, 0x25, 0xc8, 0x09, 0xac, 0xbb, 0x19, 0xad, 0xf0, 0x93, 0x12, 0x6a, 0x2a, 0x3a, 0x06, 0x5c, 0xa6, 0x54, 0xc2, 0x20, 0x99, 0xc9, 0x78, 0x12, 0x9f, 0x19, 0x48, 0xd2, 0x3c, 0x51, 0x58, 0xec, 0x2a, 0xdf, 0xf4, 0x55, 0xeb, 0x2f, 0xed, 0xf1, 0x07, 0x5d, 0x4e, 0xc2, 0x2d, 0x66, 0x09, 0x77, 0x42, 0x4a, 0x10, 0xf7, }; static const unsigned char ecdsa_secp224r1_sha256_3133_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3133_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3133 = { .name = "ecdsa_secp224r1_sha256_3133", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3133_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3133_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3133_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 132 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3134 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3134_pubkey[] = { 0xa7, 0xf7, 0xb9, 0x9e, 0x5c, 0xdc, 0x6f, 0xec, 0x89, 0x28, 0xef, 0xf7, 0x73, 0xcc, 0xdf, 0x3b, 0x68, 0xb1, 0x9d, 0x43, 0xcd, 0xb4, 0x18, 0x09, 0xe1, 0x9c, 0x60, 0xf3, 0x17, 0x36, 0xb7, 0xa0, 0xc1, 0x2a, 0x9c, 0x2d, 0x70, 0x66, 0x71, 0x91, 0x29, 0x15, 0x14, 0x2b, 0x3e, 0x05, 0xc8, 0x9e, 0xf3, 0xad, 0x49, 0x7b, 0xd6, 0xc3, 0x46, 0x99, }; static const unsigned char ecdsa_secp224r1_sha256_3134_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3134_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3134 = { .name = "ecdsa_secp224r1_sha256_3134", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3134_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3134_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3134_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 133 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3135 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3135_pubkey[] = { 0xa7, 0xf7, 0xb9, 0x9e, 0x5c, 0xdc, 0x6f, 0xec, 0x89, 0x28, 0xef, 0xf7, 0x73, 0xcc, 0xdf, 0x3b, 0x68, 0xb1, 0x9d, 0x43, 0xcd, 0xb4, 0x18, 0x09, 0xe1, 0x9c, 0x60, 0xf3, 0x17, 0x36, 0xb7, 0xa0, 0xc1, 0x2a, 0x9c, 0x2d, 0x70, 0x66, 0x71, 0x91, 0x29, 0x15, 0x14, 0x2b, 0x3e, 0x05, 0xc8, 0x9e, 0xf3, 0xad, 0x49, 0x7b, 0xd6, 0xc3, 0x46, 0x99, }; static const unsigned char ecdsa_secp224r1_sha256_3135_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3135_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3135 = { .name = "ecdsa_secp224r1_sha256_3135", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3135_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3135_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3135_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 134 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3136 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3136_pubkey[] = { 0x9c, 0xf0, 0x00, 0x10, 0xb4, 0xad, 0x86, 0x63, 0x6f, 0x6c, 0xc7, 0x0f, 0xb5, 0x8c, 0x3b, 0x99, 0x5c, 0x0d, 0x12, 0xe4, 0x6f, 0xc5, 0x8e, 0x24, 0xb0, 0xd2, 0x8f, 0x69, 0x21, 0xc8, 0xa8, 0xa3, 0x20, 0xcc, 0x45, 0x0c, 0xcb, 0x15, 0xeb, 0xd7, 0x16, 0x17, 0xf4, 0xed, 0x25, 0xdb, 0x4d, 0x34, 0x13, 0xfb, 0xdf, 0x15, 0x7d, 0x31, 0xdb, 0xb6, }; static const unsigned char ecdsa_secp224r1_sha256_3136_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3136_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3136 = { .name = "ecdsa_secp224r1_sha256_3136", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3136_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3136_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3136_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 135 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3137 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3137_pubkey[] = { 0xae, 0x9b, 0x36, 0x36, 0xb8, 0x54, 0x72, 0x32, 0xdf, 0x43, 0x85, 0x59, 0xb5, 0xa1, 0x09, 0xe0, 0x23, 0x8a, 0x73, 0xa7, 0x6a, 0xfc, 0x25, 0xd0, 0x70, 0xea, 0x27, 0x42, 0x72, 0x10, 0xa6, 0x9d, 0xe4, 0x4a, 0xd6, 0x45, 0xb1, 0xb0, 0x38, 0x45, 0x04, 0x0f, 0x46, 0xfc, 0xe2, 0x38, 0xe9, 0x2c, 0x13, 0x1a, 0x71, 0xe4, 0xb1, 0x84, 0xc0, 0x1f, }; static const unsigned char ecdsa_secp224r1_sha256_3137_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3137_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3137 = { .name = "ecdsa_secp224r1_sha256_3137", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3137_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3137_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3137_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 136 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3138 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3138_pubkey[] = { 0x8d, 0x57, 0xd4, 0xfc, 0xe6, 0x27, 0x57, 0x79, 0x18, 0x88, 0xc1, 0x93, 0x80, 0x76, 0xfd, 0x76, 0x6d, 0xae, 0xb2, 0xec, 0x9f, 0x1b, 0xda, 0x8a, 0xd5, 0xdf, 0x48, 0x09, 0xaa, 0xde, 0x92, 0x4d, 0x7e, 0xa3, 0xae, 0x5a, 0xbb, 0xd0, 0x71, 0x9a, 0x7d, 0x48, 0x65, 0x75, 0x9d, 0xa6, 0x54, 0xcf, 0x76, 0xcf, 0x7e, 0xc0, 0x31, 0x27, 0x71, 0x08, }; static const unsigned char ecdsa_secp224r1_sha256_3138_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3138_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3138 = { .name = "ecdsa_secp224r1_sha256_3138", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3138_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3138_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3138_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 137 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3139 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3139_pubkey[] = { 0x10, 0x51, 0x8e, 0xb7, 0xa9, 0x26, 0xb5, 0xf7, 0xb6, 0x5b, 0xe8, 0x01, 0xec, 0x9b, 0x2a, 0xbf, 0x76, 0xad, 0xce, 0x25, 0xc6, 0x15, 0x2e, 0x45, 0x2a, 0x35, 0x12, 0xc8, 0x3f, 0x32, 0x2b, 0x9a, 0xb5, 0x7e, 0xa8, 0x35, 0x2a, 0xd2, 0x9b, 0xeb, 0x99, 0xef, 0x35, 0x6b, 0x71, 0x34, 0x32, 0xfc, 0xc4, 0xae, 0xf3, 0x1f, 0x90, 0x30, 0x45, 0xd9, }; static const unsigned char ecdsa_secp224r1_sha256_3139_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3139_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3139 = { .name = "ecdsa_secp224r1_sha256_3139", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3139_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3139_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3139_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 138 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3140 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3140_pubkey[] = { 0x8a, 0x5d, 0xfe, 0xdc, 0x9d, 0xd1, 0xcb, 0x9a, 0x43, 0x9c, 0x88, 0xb3, 0xdd, 0x47, 0x2b, 0x2e, 0x66, 0x17, 0x3f, 0x78, 0x66, 0x85, 0x5d, 0xb6, 0xbb, 0x6c, 0x12, 0xfd, 0x3b, 0xad, 0xfb, 0xb8, 0xa4, 0xc6, 0xfd, 0x80, 0xe6, 0x65, 0x10, 0x95, 0x79, 0x27, 0xc7, 0x8a, 0x2a, 0xa0, 0x2e, 0xce, 0xf6, 0x28, 0x16, 0xd0, 0x35, 0x6b, 0x49, 0xc3, }; static const unsigned char ecdsa_secp224r1_sha256_3140_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3140_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdc, 0x74, 0xbf, 0xe0, 0x82, 0x08, 0x7a, 0xe8, 0xb6, 0x1c, 0xbd, 0x54, 0xb8, 0x10, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3140 = { .name = "ecdsa_secp224r1_sha256_3140", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3140_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3140_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3140_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 139 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3141 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3141_pubkey[] = { 0x83, 0xa5, 0x9f, 0xc3, 0xdf, 0x29, 0x5e, 0x84, 0xc2, 0x90, 0xb3, 0x2d, 0x0b, 0x55, 0x0a, 0x06, 0xf9, 0x94, 0x56, 0xfc, 0x22, 0x98, 0xe4, 0xa6, 0x8c, 0x4f, 0x2b, 0xff, 0x1b, 0x34, 0xf4, 0x83, 0xdb, 0x30, 0xdb, 0x3a, 0x51, 0xd8, 0x28, 0x87, 0x32, 0xc1, 0x07, 0xd8, 0xb1, 0xa8, 0x58, 0xcd, 0x54, 0xc3, 0x93, 0x6e, 0x1b, 0x5c, 0x11, 0xa4, }; static const unsigned char ecdsa_secp224r1_sha256_3141_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3141_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3141 = { .name = "ecdsa_secp224r1_sha256_3141", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3141_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3141_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3141_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 140 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3142 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3142_pubkey[] = { 0x58, 0xba, 0xda, 0x57, 0x8a, 0x20, 0x5d, 0x6e, 0x17, 0x07, 0x22, 0xc8, 0xed, 0x6c, 0x77, 0x15, 0x01, 0x1f, 0xe3, 0x3d, 0x7e, 0xba, 0x86, 0x9e, 0xd1, 0xd4, 0x48, 0xa7, 0x5b, 0xe4, 0x73, 0x0c, 0x1d, 0x2d, 0x2e, 0xf8, 0x81, 0xe0, 0x2f, 0x02, 0x8a, 0x24, 0x1b, 0x7d, 0x7d, 0x3b, 0x0d, 0x0b, 0x4a, 0x9c, 0x05, 0x65, 0xfc, 0xb4, 0x99, 0x77, }; static const unsigned char ecdsa_secp224r1_sha256_3142_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3142_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3142 = { .name = "ecdsa_secp224r1_sha256_3142", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3142_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3142_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3142_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 141 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3143 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3143_pubkey[] = { 0x7f, 0xcc, 0x79, 0x9b, 0x91, 0x9f, 0xe9, 0x78, 0x9c, 0xe0, 0x1d, 0xd9, 0x20, 0x27, 0x31, 0xcb, 0x7d, 0x81, 0x51, 0x58, 0xbc, 0x6c, 0xb8, 0x46, 0x87, 0x60, 0x24, 0x7c, 0x0f, 0x9d, 0x29, 0x57, 0xe0, 0xdd, 0x5e, 0x4c, 0x40, 0x12, 0x4b, 0xd5, 0xe0, 0xdd, 0x1b, 0xe4, 0x1c, 0x03, 0x8f, 0xce, 0x2c, 0xd1, 0xdc, 0x81, 0x4e, 0x0a, 0xf3, 0x7d, }; static const unsigned char ecdsa_secp224r1_sha256_3143_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3143_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x93, 0xc8, 0xc6, 0x51, 0x65, 0x34, 0x30, 0xcb, 0x4f, 0x16, 0x75, 0xfc, 0x86, 0xb5, 0xe8, 0x2c, 0xa0, 0x4f, 0xf2, 0xab, 0x15, 0x01, 0x67, 0x44, 0x76, 0xaa, 0xc1, 0x69, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3143 = { .name = "ecdsa_secp224r1_sha256_3143", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3143_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3143_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3143_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 142 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3144 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3144_pubkey[] = { 0x3d, 0xdd, 0x68, 0xf6, 0x9d, 0x0b, 0xfd, 0x47, 0xad, 0x19, 0x37, 0x0f, 0xa3, 0xdc, 0x72, 0xeb, 0x25, 0x82, 0x68, 0xc2, 0xb5, 0xf3, 0x76, 0x88, 0x52, 0x15, 0x16, 0x74, 0xfb, 0xe0, 0xe1, 0x55, 0xd9, 0x4d, 0x23, 0x73, 0xa0, 0x1a, 0x5e, 0x70, 0xf1, 0xa1, 0x05, 0x25, 0x9e, 0x7b, 0x8b, 0x1d, 0x2f, 0xdf, 0x4d, 0xba, 0x3c, 0xf4, 0xc7, 0x80, }; static const unsigned char ecdsa_secp224r1_sha256_3144_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3144_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x9d, 0xf5, 0x0a, 0xcc, 0x33, 0xb3, 0x62, 0x5a, 0x2d, 0x59, 0x40, 0xdd, 0x13, 0xdb, 0xb9, 0x7d, 0x1f, 0x7d, 0xd5, 0x6a, 0xff, 0xf8, 0xb7, 0xde, 0x75, 0x45, 0x12, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3144 = { .name = "ecdsa_secp224r1_sha256_3144", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3144_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3144_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3144_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 143 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3145 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3145_pubkey[] = { 0x1c, 0xb1, 0xf5, 0x64, 0xc2, 0x9e, 0xbf, 0x60, 0xa3, 0x42, 0xb3, 0xbc, 0x33, 0xc8, 0x94, 0x5c, 0xb2, 0x79, 0xc6, 0xc1, 0xa0, 0x12, 0x25, 0x5c, 0x87, 0x4e, 0x1c, 0x37, 0xb7, 0x51, 0x91, 0xab, 0x3b, 0x2b, 0xb7, 0x30, 0x91, 0x4e, 0xbf, 0xa1, 0x40, 0x80, 0x41, 0x09, 0x70, 0xb7, 0x1e, 0xaf, 0x4f, 0xe0, 0x1e, 0x2d, 0x48, 0xbe, 0x98, 0x91, }; static const unsigned char ecdsa_secp224r1_sha256_3145_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3145_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xdc, 0xe8, 0xc2, 0x23, 0xf2, 0x35, 0x69, 0x9d, 0x1f, 0x5d, 0x2d, 0xcd, 0xe4, 0x80, 0x9d, 0x01, 0x33, 0x90, 0xb5, 0x91, 0x29, 0xf7, 0x83, 0x23, 0x95, 0x25, 0xc0, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3145 = { .name = "ecdsa_secp224r1_sha256_3145", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3145_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3145_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3145_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 144 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3146 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3146_pubkey[] = { 0x44, 0xe3, 0x09, 0xeb, 0x68, 0x6e, 0x7a, 0xf7, 0xf1, 0xe2, 0xcc, 0x17, 0xfd, 0x56, 0x54, 0x2b, 0x38, 0x91, 0x0b, 0x3b, 0x79, 0x08, 0xea, 0x54, 0xfb, 0x03, 0x8d, 0x36, 0x47, 0x7e, 0x82, 0x9d, 0x4c, 0x83, 0x32, 0xe5, 0xb2, 0x9f, 0x34, 0x4a, 0xd2, 0x7a, 0x21, 0xc1, 0x8d, 0xab, 0x24, 0xa3, 0x1c, 0xe7, 0x98, 0x5b, 0x63, 0xa2, 0x13, 0x04, }; static const unsigned char ecdsa_secp224r1_sha256_3146_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3146_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x07, 0x4a, 0xae, 0x94, 0x4e, 0xe7, 0xa7, 0xd5, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x66, 0xf8, 0x72, 0xd2, 0x25, 0x0b, 0xa3, 0x01, 0x8a, 0x63, 0xd2, 0xa7, 0xf2, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3146 = { .name = "ecdsa_secp224r1_sha256_3146", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3146_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3146_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3146_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 145 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3147 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3147_pubkey[] = { 0xc7, 0x28, 0x06, 0x45, 0x42, 0xcb, 0x51, 0x42, 0xf5, 0xee, 0xfe, 0x63, 0x81, 0x24, 0xdc, 0xd7, 0xa1, 0xad, 0x0b, 0x35, 0x55, 0x84, 0x2a, 0x47, 0xdd, 0x51, 0x08, 0xe1, 0x10, 0x12, 0x9d, 0xd8, 0x78, 0xeb, 0xd4, 0x73, 0x13, 0x27, 0x6c, 0xec, 0x86, 0xf5, 0x21, 0xea, 0x95, 0x85, 0xcd, 0x10, 0x5b, 0x3d, 0xc4, 0x21, 0x14, 0x19, 0x93, 0xb8, }; static const unsigned char ecdsa_secp224r1_sha256_3147_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3147_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xaa, 0xe9, 0x44, 0xee, 0x7a, 0x7d, 0x54, 0x4a, 0x5a, 0xd0, 0xbd, 0x06, 0x36, 0xd9, 0x45, 0x5f, 0x4e, 0x83, 0xde, 0x0f, 0x18, 0x6f, 0x89, 0xbc, 0xa5, 0x6b, 0x3c, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3147 = { .name = "ecdsa_secp224r1_sha256_3147", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3147_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3147_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3147_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 146 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3148 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3148_pubkey[] = { 0xc4, 0x6c, 0x1a, 0xd3, 0xd3, 0xd0, 0xdf, 0x8e, 0x9c, 0x0f, 0x52, 0x5c, 0x21, 0xce, 0x8d, 0x81, 0xef, 0x9d, 0x66, 0x29, 0x7f, 0x44, 0x2d, 0x63, 0x09, 0x96, 0x67, 0x22, 0x0c, 0xfa, 0x22, 0x53, 0xaa, 0x31, 0xa9, 0x8d, 0x89, 0x66, 0xb8, 0x59, 0x69, 0xbf, 0x9c, 0x81, 0x9c, 0x01, 0x92, 0x92, 0xef, 0x6a, 0x53, 0xac, 0x1d, 0xb2, 0xa1, 0x08, }; static const unsigned char ecdsa_secp224r1_sha256_3148_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3148_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x55, 0xd2, 0x89, 0xdc, 0xf4, 0xfa, 0xa8, 0x94, 0xb5, 0xa1, 0x7a, 0x0c, 0x6d, 0xb3, 0x74, 0x1b, 0xbc, 0x4e, 0xcb, 0xe0, 0x1d, 0x01, 0xea, 0x33, 0xee, 0x7a, 0x4e, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3148 = { .name = "ecdsa_secp224r1_sha256_3148", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3148_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3148_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3148_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 147 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3149 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3149_pubkey[] = { 0xb7, 0xb2, 0xe4, 0x8c, 0x1e, 0x60, 0xe2, 0x09, 0x25, 0xf4, 0xd9, 0xb6, 0xbe, 0x60, 0x0d, 0xd8, 0x37, 0x86, 0xa9, 0x36, 0xc9, 0xbf, 0xab, 0x00, 0x63, 0x9c, 0x33, 0xca, 0xa9, 0x67, 0xcb, 0xc6, 0x50, 0x70, 0x73, 0x9a, 0x33, 0x79, 0xda, 0x80, 0xd5, 0x48, 0x43, 0xa1, 0x8d, 0x9c, 0x11, 0xa2, 0x9a, 0x32, 0x23, 0x4a, 0x0b, 0x30, 0x3c, 0x12, }; static const unsigned char ecdsa_secp224r1_sha256_3149_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3149_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4e, 0xe7, 0xa7, 0xd5, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x56, 0x1c, 0xe0, 0x4f, 0xaa, 0xf1, 0x31, 0x2b, 0xba, 0x3a, 0x15, 0x60, 0x1e, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3149 = { .name = "ecdsa_secp224r1_sha256_3149", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3149_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3149_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3149_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 148 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3150 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3150_pubkey[] = { 0xf4, 0xa3, 0xd4, 0x59, 0x88, 0x75, 0xaf, 0x7f, 0x27, 0x41, 0xbb, 0xd6, 0x7b, 0x17, 0x33, 0xb6, 0x54, 0x1b, 0xc5, 0x32, 0x5b, 0x3b, 0xcb, 0x4d, 0x32, 0x67, 0xc2, 0x7e, 0xc3, 0x0b, 0xf3, 0x22, 0xf5, 0x8a, 0x45, 0xc6, 0xc2, 0xaa, 0x2c, 0xed, 0x55, 0xf1, 0x75, 0xd1, 0xcb, 0xf7, 0x2a, 0x7c, 0x5b, 0xfc, 0x46, 0x4d, 0x74, 0xf6, 0x66, 0xc0, }; static const unsigned char ecdsa_secp224r1_sha256_3150_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3150_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x36, 0x1b, 0x9c, 0xd7, 0x4d, 0x65, 0xe7, 0x9a, 0x58, 0x74, 0xc5, 0x01, 0xbc, 0xa4, 0x97, 0x3b, 0x20, 0x34, 0x7e, 0xc9, 0x7f, 0x6d, 0xe1, 0x00, 0x72, 0xd8, 0xb4, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3150 = { .name = "ecdsa_secp224r1_sha256_3150", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3150_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3150_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3150_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 149 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3151 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3151_pubkey[] = { 0x56, 0xd1, 0xe5, 0xc1, 0xd6, 0x64, 0xf6, 0xce, 0x2f, 0xc1, 0xfc, 0xb9, 0x37, 0xa7, 0xce, 0x23, 0x1a, 0x29, 0x48, 0x6a, 0xbf, 0x36, 0xc7, 0x3f, 0x77, 0xa2, 0xbd, 0x11, 0x6c, 0xb2, 0x82, 0xc9, 0xd7, 0xc6, 0xfc, 0x05, 0xf3, 0x99, 0xc1, 0x83, 0xe8, 0x80, 0xea, 0x36, 0x2e, 0xdf, 0x04, 0x3c, 0xd2, 0x8f, 0xfa, 0xc9, 0xf9, 0x4f, 0x21, 0x41, }; static const unsigned char ecdsa_secp224r1_sha256_3151_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3151_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x37, 0x39, 0xae, 0x9a, 0xcb, 0xcf, 0x34, 0xb0, 0xe9, 0x8a, 0x03, 0x79, 0x49, 0x2e, 0x76, 0x40, 0x68, 0xfd, 0x92, 0xfe, 0xdb, 0xc2, 0x00, 0xe5, 0xb1, 0x68, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3151 = { .name = "ecdsa_secp224r1_sha256_3151", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3151_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3151_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3151_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 150 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3152 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3152_pubkey[] = { 0x30, 0xbc, 0xe8, 0xc6, 0xb7, 0xf1, 0xbb, 0xba, 0x04, 0x0b, 0x8d, 0x12, 0x1d, 0x85, 0xd5, 0x51, 0x67, 0xac, 0x99, 0xb2, 0xe2, 0xcf, 0x1c, 0xfa, 0xc8, 0xb0, 0x18, 0xb5, 0xf1, 0xc3, 0x84, 0xc3, 0x5b, 0xe0, 0xae, 0x30, 0x9a, 0x5c, 0xb5, 0x5a, 0xba, 0x98, 0x23, 0x43, 0xd2, 0x12, 0x5f, 0x2d, 0x4a, 0x55, 0x9d, 0x8c, 0x54, 0x53, 0x59, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha256_3152_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3152_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa2, 0x52, 0xd6, 0x85, 0xe8, 0x31, 0xb6, 0xcf, 0x09, 0x5e, 0x4f, 0x05, 0x35, 0xed, 0xc5, 0xb1, 0x60, 0x9d, 0x7c, 0x5c, 0x7e, 0x49, 0xa3, 0x01, 0x58, 0x8a, 0x1d, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3152 = { .name = "ecdsa_secp224r1_sha256_3152", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3152_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3152_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3152_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 151 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3153 for ECDSA, tcId is 152 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3153_pubkey[] = { 0xe8, 0x7e, 0x53, 0x8a, 0x97, 0x8c, 0xf1, 0x87, 0x90, 0x8b, 0xeb, 0x27, 0xa4, 0xa2, 0x47, 0xd4, 0x96, 0xa8, 0x42, 0x1d, 0xab, 0x1f, 0xe7, 0x9f, 0x87, 0x44, 0xd2, 0xb5, 0x53, 0x9b, 0x9f, 0x8f, 0xe8, 0xbd, 0xdc, 0xf7, 0xc9, 0x7c, 0x44, 0xc5, 0x5a, 0x4f, 0xc2, 0x2f, 0x4d, 0x78, 0xf6, 0xa9, 0x61, 0x44, 0x7a, 0x5b, 0x61, 0x3b, 0x5c, 0x49, }; static const unsigned char ecdsa_secp224r1_sha256_3153_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3153_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xee, 0x74, 0x61, 0x11, 0xf9, 0x1a, 0xb4, 0xce, 0x8f, 0xae, 0x96, 0xe6, 0xf2, 0x3f, 0xd9, 0xd2, 0x0a, 0x24, 0xd2, 0xe7, 0x9e, 0xea, 0x56, 0x34, 0x78, 0xc0, 0xf5, 0x66, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3153 = { .name = "ecdsa_secp224r1_sha256_3153", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3153_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3153_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3153_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 152 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3154 for ECDSA, tcId is 153 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3154_pubkey[] = { 0x11, 0x3a, 0x2c, 0xc5, 0x7c, 0x8e, 0xe7, 0xde, 0x11, 0xbc, 0x45, 0xe1, 0x45, 0x46, 0xc7, 0x2a, 0x29, 0x72, 0x5b, 0x9a, 0x72, 0x18, 0x11, 0x4a, 0xc3, 0x1f, 0x02, 0x81, 0x6c, 0x76, 0x5b, 0x9a, 0x46, 0xb0, 0x21, 0x53, 0x12, 0xa3, 0x29, 0x2f, 0x59, 0x79, 0xc9, 0x8d, 0x37, 0xb3, 0x58, 0x83, 0xba, 0xa1, 0x56, 0x28, 0x1b, 0x1b, 0xae, 0x8c, }; static const unsigned char ecdsa_secp224r1_sha256_3154_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3154_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3154 = { .name = "ecdsa_secp224r1_sha256_3154", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3154_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3154_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3154_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 153 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3155 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3155_pubkey[] = { 0x23, 0xdd, 0x9c, 0x3f, 0x1a, 0x4b, 0x47, 0x8b, 0x01, 0xfa, 0x2c, 0x5e, 0x99, 0x7d, 0x04, 0x82, 0x07, 0x3b, 0x32, 0x91, 0x8d, 0xe4, 0x4b, 0xe5, 0x83, 0xdc, 0xf7, 0x4a, 0xd6, 0x61, 0xa5, 0xed, 0x57, 0x9a, 0x2f, 0x09, 0xd2, 0xff, 0x56, 0xd6, 0xb8, 0x0f, 0x26, 0x56, 0x8d, 0x93, 0xa2, 0x37, 0xca, 0x64, 0x44, 0xb0, 0xca, 0xdc, 0x79, 0x51, }; static const unsigned char ecdsa_secp224r1_sha256_3155_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3155_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3155 = { .name = "ecdsa_secp224r1_sha256_3155", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3155_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3155_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3155_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 154 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3156 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3156_pubkey[] = { 0xbb, 0xce, 0x4b, 0x17, 0xd4, 0x5d, 0x24, 0xa1, 0xc8, 0x0b, 0xc8, 0xec, 0xa9, 0x8c, 0x35, 0x9d, 0x5e, 0x1e, 0x45, 0x80, 0x58, 0xa0, 0x0b, 0x95, 0x06, 0x43, 0x25, 0x6d, 0xfe, 0x09, 0xe0, 0x92, 0x31, 0x8e, 0x39, 0x30, 0x3d, 0xca, 0x03, 0x68, 0x8e, 0x4e, 0xcf, 0x30, 0x03, 0x00, 0x78, 0x43, 0x12, 0xd6, 0x17, 0xe5, 0x08, 0x8c, 0x58, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha256_3156_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3156_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3156 = { .name = "ecdsa_secp224r1_sha256_3156", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3156_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3156_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3156_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 155 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3157 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3157_pubkey[] = { 0x03, 0x5f, 0x58, 0x44, 0x6c, 0x1b, 0xdb, 0xea, 0xa5, 0x66, 0x60, 0xa8, 0x97, 0xeb, 0xf9, 0x65, 0xf2, 0xd1, 0x88, 0x20, 0xc7, 0xcd, 0x06, 0x30, 0xf0, 0x4a, 0x49, 0x53, 0x47, 0xbd, 0xfa, 0xea, 0x60, 0x09, 0x1f, 0x40, 0x5e, 0x09, 0x92, 0x9c, 0xb2, 0xc0, 0xe2, 0xf6, 0xee, 0xd5, 0x3e, 0x08, 0x71, 0xb7, 0xfe, 0x0c, 0xd5, 0xa1, 0x5d, 0x85, }; static const unsigned char ecdsa_secp224r1_sha256_3157_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3157_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3157 = { .name = "ecdsa_secp224r1_sha256_3157", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3157_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3157_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3157_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 156 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3158 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3158_pubkey[] = { 0x91, 0x1c, 0x00, 0x33, 0xea, 0xc4, 0x63, 0x32, 0x69, 0x1c, 0xb7, 0x92, 0x0c, 0x49, 0x50, 0xee, 0xd5, 0x73, 0x54, 0x76, 0x1e, 0x10, 0x81, 0xa1, 0xea, 0x9f, 0x12, 0x79, 0x50, 0x8e, 0xbf, 0x7c, 0xfd, 0x3e, 0xab, 0x5d, 0xab, 0xde, 0xe1, 0xbe, 0x14, 0xce, 0x82, 0x96, 0xb1, 0xfc, 0x20, 0xac, 0xfa, 0xac, 0x16, 0xf7, 0x82, 0x4c, 0x60, 0x02, }; static const unsigned char ecdsa_secp224r1_sha256_3158_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3158_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3158 = { .name = "ecdsa_secp224r1_sha256_3158", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3158_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3158_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3158_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 157 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3159 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3159_pubkey[] = { 0x62, 0xb2, 0xab, 0xb7, 0x0b, 0xb9, 0xc7, 0xef, 0xdf, 0xb5, 0x71, 0x81, 0xf4, 0x33, 0xb6, 0x47, 0x51, 0xf1, 0x08, 0x13, 0x0d, 0xce, 0x18, 0x0d, 0x69, 0x92, 0xe7, 0xd3, 0x12, 0x4b, 0x3a, 0xa8, 0xa5, 0x3e, 0x5e, 0xed, 0xf7, 0x2a, 0xa6, 0x7e, 0x6e, 0xdc, 0xc7, 0x1f, 0x19, 0xe3, 0x6e, 0x6a, 0xd1, 0xd0, 0x99, 0xa5, 0x9f, 0xfd, 0x95, 0x55, }; static const unsigned char ecdsa_secp224r1_sha256_3159_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3159_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3159 = { .name = "ecdsa_secp224r1_sha256_3159", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3159_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3159_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3159_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 158 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3160 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3160_pubkey[] = { 0x0f, 0x75, 0x93, 0x30, 0xe7, 0x99, 0x27, 0x52, 0xaa, 0xe6, 0xa8, 0x5f, 0x7b, 0xb0, 0x59, 0x97, 0x84, 0xbe, 0xa5, 0x3e, 0x28, 0x8f, 0xf7, 0xee, 0x8d, 0x53, 0xd5, 0xe6, 0xde, 0xfe, 0x61, 0x73, 0x62, 0x38, 0x0e, 0x92, 0xf9, 0xa2, 0x3c, 0x4f, 0xdc, 0xc3, 0x4e, 0x09, 0x71, 0x3a, 0xab, 0x9c, 0xc4, 0x41, 0x19, 0x41, 0x8f, 0x6f, 0x2f, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha256_3160_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3160_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3160 = { .name = "ecdsa_secp224r1_sha256_3160", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3160_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3160_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3160_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 159 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3161 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3161_pubkey[] = { 0x8f, 0x2e, 0xda, 0x42, 0x74, 0x2a, 0xb3, 0x1f, 0x5d, 0x4c, 0xf6, 0x66, 0x89, 0x2d, 0x1d, 0x62, 0x3e, 0xfd, 0x3b, 0x26, 0xf7, 0xdf, 0x9a, 0xa7, 0x02, 0x96, 0xe8, 0x0d, 0x3b, 0xea, 0xf2, 0x35, 0xcf, 0xea, 0x41, 0xfa, 0xdb, 0x98, 0xc5, 0x33, 0xa8, 0xfd, 0xeb, 0x58, 0x41, 0xd6, 0x9e, 0xe6, 0x5f, 0x6e, 0x71, 0x91, 0x47, 0x11, 0xf1, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3161_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3161_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3161 = { .name = "ecdsa_secp224r1_sha256_3161", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3161_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3161_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3161_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 160 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3162 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3162_pubkey[] = { 0x2b, 0xcf, 0x43, 0x71, 0xb3, 0x19, 0xa6, 0x91, 0xed, 0x0e, 0x2e, 0x0c, 0x4a, 0x55, 0xa8, 0xa9, 0xb9, 0x87, 0xde, 0xc8, 0x6b, 0x86, 0x36, 0x21, 0xe9, 0x7b, 0x9c, 0x09, 0x5b, 0x86, 0x60, 0xa7, 0x4c, 0xc9, 0x64, 0xa6, 0xaf, 0x03, 0x11, 0xed, 0xc6, 0xb1, 0xcd, 0x98, 0x0f, 0x9c, 0x7b, 0xf3, 0xa6, 0xc9, 0xb7, 0xf9, 0x13, 0x2a, 0x0b, 0x2f, }; static const unsigned char ecdsa_secp224r1_sha256_3162_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3162_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3162 = { .name = "ecdsa_secp224r1_sha256_3162", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3162_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3162_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3162_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 161 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3163 for ECDSA, tcId is 162 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3163_pubkey[] = { 0xa6, 0xf2, 0x52, 0x56, 0x8f, 0x6f, 0xbd, 0x1a, 0xe0, 0x45, 0xe6, 0x02, 0x34, 0x43, 0x59, 0xc0, 0xc2, 0x16, 0x91, 0x17, 0x23, 0x74, 0x8f, 0x9a, 0x3e, 0x7f, 0xad, 0xec, 0x3b, 0x76, 0xef, 0xc7, 0x5b, 0xa0, 0x30, 0xbf, 0xe7, 0xde, 0x2d, 0xed, 0x68, 0x69, 0x91, 0xe6, 0x18, 0x3d, 0x40, 0x24, 0x1a, 0x05, 0xb4, 0x79, 0x69, 0x3c, 0x70, 0x15, }; static const unsigned char ecdsa_secp224r1_sha256_3163_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3163_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3163 = { .name = "ecdsa_secp224r1_sha256_3163", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3163_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3163_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3163_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 162 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3164 for ECDSA, tcId is 163 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3164_pubkey[] = { 0xa7, 0x4c, 0x1c, 0x3a, 0x31, 0xc7, 0xd4, 0x93, 0xab, 0x2c, 0x0a, 0xf8, 0x9c, 0xf5, 0xe6, 0x88, 0x62, 0x1c, 0xa9, 0x46, 0x6d, 0x2b, 0xa1, 0xd8, 0x76, 0x1c, 0x3f, 0xe8, 0x2b, 0xa0, 0xd0, 0x8f, 0x4c, 0x9f, 0x76, 0x85, 0x6c, 0x2b, 0x71, 0x38, 0xc8, 0xf1, 0xe7, 0x80, 0xb6, 0x95, 0x99, 0x92, 0xb1, 0x6c, 0xcd, 0xfd, 0x92, 0x5f, 0x4b, 0x3a, }; static const unsigned char ecdsa_secp224r1_sha256_3164_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3164_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3164 = { .name = "ecdsa_secp224r1_sha256_3164", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3164_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3164_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3164_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 163 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3165 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3165_pubkey[] = { 0x03, 0x4e, 0xa7, 0x27, 0x98, 0x25, 0x7f, 0x33, 0xf2, 0x4f, 0x64, 0xc4, 0x94, 0x38, 0xfc, 0x43, 0xe8, 0xf6, 0x7d, 0xdc, 0x71, 0x70, 0xfd, 0x12, 0x7e, 0x2c, 0x43, 0xf2, 0x80, 0x56, 0x2a, 0xcc, 0x9b, 0x49, 0xf2, 0xd7, 0xfc, 0xc8, 0x94, 0x21, 0xd2, 0xa5, 0xdb, 0x2e, 0xa8, 0xdd, 0x03, 0x61, 0xfb, 0x48, 0xd8, 0x97, 0xd4, 0x61, 0x26, 0x27, }; static const unsigned char ecdsa_secp224r1_sha256_3165_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3165_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x3f, 0x55, 0x2f, 0x1c, 0x2b, 0x01, 0x65, 0x1e, 0xdf, 0x59, 0x02, 0x65, 0x0f, 0xe9, 0xab, 0x04, 0x6f, 0x71, 0x99, 0x9a, 0xc9, 0x28, 0xed, 0xc0, 0x08, 0x7b, 0xdb, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3165 = { .name = "ecdsa_secp224r1_sha256_3165", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3165_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3165_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3165_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 164 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3166 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3166_pubkey[] = { 0x03, 0x4e, 0xa7, 0x27, 0x98, 0x25, 0x7f, 0x33, 0xf2, 0x4f, 0x64, 0xc4, 0x94, 0x38, 0xfc, 0x43, 0xe8, 0xf6, 0x7d, 0xdc, 0x71, 0x70, 0xfd, 0x12, 0x7e, 0x2c, 0x43, 0xf2, 0x7f, 0xa9, 0xd5, 0x33, 0x64, 0xb6, 0x0d, 0x28, 0x03, 0x37, 0x6b, 0xde, 0x2d, 0x5a, 0x24, 0xd0, 0x57, 0x22, 0xfc, 0x9e, 0x04, 0xb7, 0x27, 0x68, 0x2b, 0x9e, 0xd9, 0xda, }; static const unsigned char ecdsa_secp224r1_sha256_3166_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3166_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x3f, 0x55, 0x2f, 0x1c, 0x2b, 0x01, 0x65, 0x1e, 0xdf, 0x59, 0x02, 0x65, 0x0f, 0xe9, 0xab, 0x04, 0x6f, 0x71, 0x99, 0x9a, 0xc9, 0x28, 0xed, 0xc0, 0x08, 0x7b, 0xdb, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3166 = { .name = "ecdsa_secp224r1_sha256_3166", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3166_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3166_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3166_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 165 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3167 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3167_pubkey[] = { 0x36, 0x72, 0xba, 0x97, 0x18, 0xe6, 0x0d, 0x00, 0xea, 0xb4, 0x29, 0x5c, 0x81, 0x9e, 0xa3, 0x66, 0xa7, 0x78, 0xdd, 0x6f, 0xd6, 0x21, 0xfa, 0x96, 0x65, 0x25, 0x9c, 0xb6, 0x7a, 0xe5, 0xe8, 0x47, 0xee, 0xae, 0xa6, 0x74, 0xbe, 0xeb, 0x63, 0x63, 0x79, 0xe9, 0x68, 0xf7, 0x92, 0x65, 0x50, 0x2e, 0x41, 0x4a, 0x1d, 0x44, 0x4f, 0x04, 0xae, 0x79, }; static const unsigned char ecdsa_secp224r1_sha256_3167_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3167_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3167 = { .name = "ecdsa_secp224r1_sha256_3167", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3167_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3167_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3167_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 166 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3168 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3168_pubkey[] = { 0x33, 0xee, 0xef, 0xbf, 0xc7, 0x72, 0x29, 0x13, 0x6e, 0x56, 0xb5, 0x75, 0x14, 0x48, 0x63, 0xed, 0x90, 0xb4, 0xc0, 0xf8, 0xa9, 0xe3, 0x15, 0x81, 0x6d, 0x6d, 0xe6, 0x48, 0x05, 0x17, 0x49, 0xdd, 0x11, 0x48, 0x0c, 0x14, 0x1f, 0xb5, 0xa1, 0x94, 0x63, 0x13, 0x16, 0x3c, 0x01, 0x41, 0x26, 0x5b, 0x68, 0xa2, 0x62, 0x16, 0xbc, 0xb9, 0x93, 0x6a, }; static const unsigned char ecdsa_secp224r1_sha256_3168_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3168_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3168 = { .name = "ecdsa_secp224r1_sha256_3168", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3168_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3168_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3168_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 167 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3169 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3169_pubkey[] = { 0xbd, 0xa0, 0x3b, 0x24, 0xb6, 0x22, 0x43, 0xc6, 0x1e, 0x28, 0x8b, 0x6e, 0xa1, 0xe9, 0x9a, 0x28, 0x86, 0xf7, 0x00, 0x94, 0x4e, 0xb1, 0xb8, 0xf0, 0x46, 0x6c, 0xff, 0xd6, 0x1c, 0x71, 0x2a, 0x3a, 0xaa, 0xce, 0x69, 0x33, 0x19, 0x89, 0xb7, 0x07, 0xe6, 0x9e, 0x8d, 0xe3, 0x9d, 0x7c, 0xd1, 0xae, 0xb6, 0x5d, 0x97, 0xad, 0x18, 0x00, 0xbf, 0x7f, }; static const unsigned char ecdsa_secp224r1_sha256_3169_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3169_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3169 = { .name = "ecdsa_secp224r1_sha256_3169", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3169_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3169_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3169_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 168 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3170 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3170_pubkey[] = { 0x7a, 0xbb, 0xa0, 0xcb, 0xff, 0x13, 0x4d, 0xdc, 0xf5, 0x4d, 0x04, 0x84, 0x6f, 0x95, 0x4b, 0x88, 0x2c, 0xa9, 0xfa, 0xef, 0xdf, 0xe8, 0x18, 0x89, 0x8b, 0xfb, 0x37, 0x8b, 0x79, 0x2f, 0x10, 0xb5, 0x79, 0x70, 0xae, 0x57, 0xbb, 0x4f, 0xb0, 0x1c, 0x08, 0x88, 0x68, 0x48, 0x85, 0x5a, 0xeb, 0x19, 0x84, 0xd3, 0xd6, 0xfc, 0xb2, 0xb4, 0x12, 0xdf, }; static const unsigned char ecdsa_secp224r1_sha256_3170_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3170_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3170 = { .name = "ecdsa_secp224r1_sha256_3170", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3170_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3170_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3170_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 169 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3171 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3171_pubkey[] = { 0xf6, 0x8d, 0x99, 0xe2, 0x86, 0x53, 0xb9, 0xba, 0x3e, 0x7c, 0xed, 0xb3, 0xb7, 0x81, 0x65, 0xf5, 0xa5, 0x4f, 0xbe, 0x90, 0xd4, 0xb9, 0xf8, 0x84, 0x97, 0x97, 0x7e, 0x16, 0x23, 0x4d, 0xa3, 0xea, 0xa0, 0x17, 0x8a, 0x51, 0xb5, 0xb0, 0xc2, 0x08, 0xef, 0x08, 0x18, 0xdf, 0x6f, 0x65, 0x78, 0x79, 0x3c, 0x1a, 0xf1, 0x78, 0x70, 0x26, 0xb8, 0xda, }; static const unsigned char ecdsa_secp224r1_sha256_3171_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3171_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3171 = { .name = "ecdsa_secp224r1_sha256_3171", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3171_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3171_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3171_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 170 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3172 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3172_pubkey[] = { 0x06, 0x5d, 0x9e, 0xf1, 0x33, 0xce, 0x81, 0xc2, 0xd6, 0xb6, 0x6e, 0x92, 0x83, 0x60, 0xf9, 0x52, 0x7f, 0x8f, 0x36, 0xb5, 0xba, 0xdd, 0x35, 0xb5, 0xf1, 0x09, 0x34, 0x27, 0x20, 0x04, 0x85, 0x27, 0x55, 0xf7, 0x74, 0x40, 0xa0, 0xb0, 0x8b, 0x9f, 0x16, 0x54, 0x89, 0xc0, 0x69, 0x6e, 0x8b, 0x49, 0x81, 0xd6, 0xd0, 0x4a, 0x28, 0x5b, 0x0f, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha256_3172_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3172_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3172 = { .name = "ecdsa_secp224r1_sha256_3172", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3172_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3172_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3172_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 171 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3173 for ECDSA, tcId is 172 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3173_pubkey[] = { 0xd6, 0xce, 0xa0, 0x94, 0x72, 0xed, 0xe5, 0x74, 0xce, 0x1e, 0x05, 0x46, 0xc9, 0xac, 0xd0, 0xe1, 0xcd, 0x8c, 0xba, 0x9b, 0x12, 0x1d, 0xf2, 0x9e, 0x89, 0xd5, 0x09, 0x2e, 0x83, 0x90, 0x4e, 0xbf, 0xb9, 0x02, 0xea, 0x61, 0xc9, 0x87, 0xdc, 0x05, 0x08, 0xe0, 0xc9, 0xa7, 0xe5, 0x63, 0xe2, 0x60, 0x9f, 0xea, 0xf7, 0x91, 0x40, 0xab, 0x91, 0xd6, }; static const unsigned char ecdsa_secp224r1_sha256_3173_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3173_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3173 = { .name = "ecdsa_secp224r1_sha256_3173", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3173_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3173_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3173_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 172 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3174 for ECDSA, tcId is 173 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3174_pubkey[] = { 0xc5, 0x20, 0xb1, 0x80, 0x03, 0xb3, 0x56, 0x09, 0x41, 0x47, 0xee, 0x2f, 0x9d, 0xf1, 0x17, 0x85, 0x72, 0xbe, 0xd8, 0x37, 0xbd, 0x89, 0x44, 0x3b, 0x25, 0xeb, 0xce, 0xb8, 0x0e, 0x2e, 0x93, 0xa9, 0x98, 0xfb, 0xba, 0xbe, 0x82, 0x19, 0x2e, 0xa4, 0xc8, 0x56, 0x51, 0xcf, 0x09, 0xa9, 0x5a, 0xb0, 0xdc, 0x2e, 0x3d, 0x97, 0x5e, 0xe7, 0xbe, 0x98, }; static const unsigned char ecdsa_secp224r1_sha256_3174_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3174_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3174 = { .name = "ecdsa_secp224r1_sha256_3174", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3174_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3174_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3174_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 173 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3175 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3175_pubkey[] = { 0x9d, 0xd0, 0xb9, 0x9b, 0xb7, 0xa8, 0x30, 0xbc, 0xc7, 0xd5, 0x5a, 0xba, 0xc4, 0x29, 0x12, 0xd5, 0x25, 0xb0, 0x63, 0xc5, 0x0c, 0xf3, 0x77, 0xca, 0x57, 0x71, 0xa2, 0x6c, 0xa1, 0x41, 0xfc, 0xcf, 0x07, 0x93, 0xc2, 0xba, 0x24, 0x69, 0xa9, 0x46, 0xc2, 0xd4, 0xed, 0x26, 0x34, 0x40, 0x52, 0xc6, 0x3a, 0x6d, 0x7e, 0x77, 0x97, 0xce, 0x96, 0xc3, }; static const unsigned char ecdsa_secp224r1_sha256_3175_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3175_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3175 = { .name = "ecdsa_secp224r1_sha256_3175", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3175_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3175_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3175_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 174 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3176 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3176_pubkey[] = { 0x3d, 0xab, 0x9f, 0x1b, 0x19, 0xe7, 0x15, 0xd1, 0x74, 0xa7, 0x36, 0x09, 0x20, 0x37, 0x5d, 0x56, 0x9a, 0x18, 0x1f, 0x05, 0x5e, 0x66, 0xf0, 0x13, 0x91, 0x87, 0x1b, 0x6f, 0x47, 0xa6, 0xd8, 0x7c, 0x23, 0xa5, 0xb6, 0xa1, 0xe3, 0xd0, 0xa9, 0x72, 0x13, 0x02, 0xcc, 0x02, 0xcc, 0xe3, 0x5f, 0x35, 0xde, 0xa0, 0x8e, 0x22, 0x61, 0x9b, 0xe5, 0x21, }; static const unsigned char ecdsa_secp224r1_sha256_3176_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3176_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3176 = { .name = "ecdsa_secp224r1_sha256_3176", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3176_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3176_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3176_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 175 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3177 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3177_pubkey[] = { 0x56, 0xdd, 0xe1, 0xba, 0x58, 0xea, 0x31, 0x05, 0x3b, 0x25, 0x35, 0xc6, 0x66, 0x23, 0x34, 0x4c, 0x24, 0xc7, 0x2d, 0x21, 0x4a, 0xf5, 0xbe, 0x69, 0x82, 0xe8, 0x91, 0x00, 0xe7, 0x71, 0x08, 0x48, 0x06, 0x14, 0x3e, 0x86, 0xf2, 0xb3, 0x1b, 0xda, 0xf6, 0x22, 0x80, 0xf5, 0xb3, 0x11, 0xd0, 0xd2, 0xbd, 0xbb, 0x38, 0x5b, 0x20, 0xfc, 0x6c, 0x87, }; static const unsigned char ecdsa_secp224r1_sha256_3177_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3177_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3177 = { .name = "ecdsa_secp224r1_sha256_3177", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3177_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3177_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3177_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 176 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3178 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3178_pubkey[] = { 0x94, 0xef, 0xe1, 0x38, 0x7f, 0xc0, 0x44, 0x7d, 0x7d, 0xbc, 0xb5, 0x37, 0x39, 0xa0, 0xe4, 0xe0, 0xdd, 0xec, 0x18, 0x1d, 0x38, 0x2c, 0xae, 0xa6, 0x45, 0xb1, 0xa6, 0x12, 0x44, 0x14, 0xa6, 0xb1, 0xc7, 0x89, 0x08, 0xd0, 0xfa, 0x20, 0x6f, 0x8f, 0x2d, 0xe9, 0x50, 0xad, 0x4a, 0x14, 0xd1, 0xce, 0x94, 0xd9, 0xcd, 0xdb, 0xe3, 0x2e, 0x46, 0x01, }; static const unsigned char ecdsa_secp224r1_sha256_3178_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3178_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3178 = { .name = "ecdsa_secp224r1_sha256_3178", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3178_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3178_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3178_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 177 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3179 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3179_pubkey[] = { 0x62, 0x86, 0x80, 0x3b, 0x95, 0x29, 0x76, 0xee, 0x18, 0x97, 0x01, 0x36, 0x95, 0xd3, 0xef, 0x2c, 0xbb, 0x6f, 0x97, 0x71, 0x42, 0xa0, 0x42, 0xb2, 0x36, 0x57, 0x25, 0x77, 0x72, 0x2a, 0x6c, 0xe9, 0xad, 0x3e, 0x3f, 0xd2, 0x8e, 0x45, 0x18, 0x33, 0x49, 0x6c, 0x63, 0xb8, 0xab, 0x70, 0x53, 0x88, 0x77, 0x21, 0x5f, 0x20, 0x49, 0x42, 0xbf, 0x59, }; static const unsigned char ecdsa_secp224r1_sha256_3179_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3179_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3179 = { .name = "ecdsa_secp224r1_sha256_3179", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3179_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3179_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3179_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 178 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3180 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3180_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3180_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3180_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3180 = { .name = "ecdsa_secp224r1_sha256_3180", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3180_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3180_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3180_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 179 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3181 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3181_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3181_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3181_sig[] = { 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdc, 0x74, 0xbf, 0xe0, 0x82, 0x08, 0x7a, 0xe8, 0xb6, 0x1c, 0xbd, 0x54, 0xb8, 0x10, 0x3f, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3181 = { .name = "ecdsa_secp224r1_sha256_3181", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3181_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3181_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3181_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 180 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3182 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3182_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha256_3182_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3182_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3182 = { .name = "ecdsa_secp224r1_sha256_3182", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3182_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3182_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3182_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 181 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3183 for ECDSA, tcId is 182 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3183_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha256_3183_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3183_sig[] = { 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdc, 0x74, 0xbf, 0xe0, 0x82, 0x08, 0x7a, 0xe8, 0xb6, 0x1c, 0xbd, 0x54, 0xb8, 0x10, 0x3f, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3183 = { .name = "ecdsa_secp224r1_sha256_3183", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3183_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3183_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3183_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 182 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3184 for ECDSA, tcId is 183 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3184_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3184_sig[] = { 0x03, 0x64, 0xe7, 0xd9, 0x68, 0x32, 0x61, 0x4a, 0x80, 0x21, 0x6e, 0x73, 0x0c, 0x35, 0x35, 0x34, 0xd4, 0xbf, 0xfd, 0x2c, 0x26, 0x64, 0x9c, 0x0b, 0x4b, 0x0e, 0x26, 0x28, 0x8f, 0x40, 0x06, 0x4b, 0x41, 0x2f, 0xe3, 0x8c, 0x5b, 0xa9, 0xcf, 0x66, 0x4e, 0x61, 0x72, 0xed, 0x48, 0xe6, 0xe7, 0x9f, 0x0f, 0xe5, 0xe3, 0x1a, 0x54, 0x98, 0x5d, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3184 = { .name = "ecdsa_secp224r1_sha256_3184", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3184_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha256_3184_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 183 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3185 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3185_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3185_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha256_3185_sig[] = { 0xf4, 0xb6, 0x8d, 0xf6, 0x2b, 0x92, 0x38, 0x36, 0x3c, 0xcc, 0x1b, 0xbe, 0xe0, 0x0d, 0xeb, 0x3f, 0xb2, 0x69, 0x3f, 0x78, 0x94, 0x17, 0x8e, 0x14, 0xee, 0xac, 0x59, 0x6a, 0x7f, 0x51, 0xc9, 0x45, 0x1a, 0xda, 0xcd, 0x2b, 0xcb, 0xc7, 0x21, 0xf7, 0xdf, 0x06, 0x43, 0xd7, 0xcd, 0x18, 0xa6, 0xb5, 0x20, 0x64, 0xb5, 0x07, 0xe1, 0x91, 0x2f, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3185 = { .name = "ecdsa_secp224r1_sha256_3185", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3185_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3185_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha256_3185_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 184 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3186 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3186_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3186_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3186_sig[] = { 0xb2, 0x97, 0x0c, 0xde, 0xc2, 0x9c, 0x70, 0x29, 0x4a, 0x18, 0xbb, 0xc4, 0x99, 0x85, 0xef, 0xa3, 0x3a, 0xcc, 0x0a, 0xf5, 0x09, 0xc3, 0x26, 0xa3, 0x97, 0x7a, 0x35, 0xe8, 0x0c, 0xea, 0x3e, 0xd8, 0xeb, 0xaa, 0xf6, 0xee, 0x6a, 0xef, 0x60, 0x49, 0xa2, 0x3c, 0xbc, 0x39, 0xf6, 0x1f, 0xcf, 0x8f, 0xc6, 0xbe, 0x4b, 0xab, 0x13, 0x38, 0x55, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3186 = { .name = "ecdsa_secp224r1_sha256_3186", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3186_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3186_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3186_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 185 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3187 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3187_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3187_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3187_sig[] = { 0x7e, 0x7b, 0x0e, 0xb7, 0xda, 0x8c, 0x68, 0xa7, 0x07, 0x2b, 0x11, 0x40, 0x4e, 0xe9, 0x5a, 0x5c, 0x40, 0x7f, 0xbf, 0xe3, 0xd6, 0x96, 0x46, 0x80, 0x2e, 0x28, 0xae, 0x77, 0xd4, 0x09, 0xa2, 0xf6, 0xbb, 0xaa, 0xe5, 0x9b, 0xb6, 0x0f, 0xc0, 0xa0, 0x92, 0xb1, 0x2f, 0xa4, 0xe6, 0x7d, 0xc8, 0xd0, 0x88, 0xcf, 0x19, 0xa8, 0x33, 0x32, 0x2f, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3187 = { .name = "ecdsa_secp224r1_sha256_3187", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3187_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3187_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha256_3187_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 186 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3188 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3188_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3188_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3188_sig[] = { 0x51, 0x9b, 0xf1, 0x85, 0xff, 0x46, 0x35, 0x27, 0x19, 0x61, 0xfa, 0x49, 0x1b, 0xe2, 0x57, 0x23, 0x1d, 0xee, 0xea, 0x9c, 0x53, 0xa6, 0xed, 0xe3, 0xb4, 0xa8, 0x9e, 0xd1, 0x48, 0x6b, 0xda, 0xd4, 0x84, 0xa6, 0xa3, 0x13, 0x4e, 0x14, 0x71, 0xcf, 0x56, 0xa9, 0xdf, 0x0f, 0xac, 0x50, 0xf7, 0x73, 0xb3, 0xe3, 0x7d, 0x6f, 0x32, 0x76, 0x17, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3188 = { .name = "ecdsa_secp224r1_sha256_3188", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3188_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3188_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3188_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 187 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3189 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3189_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3189_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3189_sig[] = { 0x09, 0xfd, 0x64, 0x48, 0x98, 0xb7, 0xcb, 0x5d, 0x01, 0x8b, 0x52, 0x23, 0x4e, 0x7b, 0x4e, 0xf2, 0xb5, 0x47, 0x89, 0xaf, 0xd0, 0xce, 0x9c, 0x43, 0x4e, 0x9e, 0x55, 0x15, 0xf1, 0x93, 0x09, 0x53, 0x21, 0x64, 0xea, 0x20, 0x53, 0xca, 0xe5, 0x5d, 0xf7, 0xbd, 0xcb, 0xab, 0x53, 0x6c, 0x83, 0xea, 0x7b, 0xfe, 0x6f, 0xe1, 0x0d, 0x60, 0xc1, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3189 = { .name = "ecdsa_secp224r1_sha256_3189", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3189_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3189_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3189_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 188 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3190 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3190_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3190_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3190_sig[] = { 0xec, 0x91, 0x9d, 0x4e, 0x28, 0x3c, 0xcf, 0x1f, 0x71, 0xa9, 0xe3, 0xc0, 0xf7, 0x81, 0xa3, 0x67, 0x58, 0xd3, 0xf3, 0x8b, 0x1b, 0x78, 0xa8, 0x7a, 0x74, 0x28, 0x8e, 0x80, 0x4c, 0x46, 0x63, 0x04, 0x4a, 0x73, 0xc7, 0x9b, 0xd8, 0x8f, 0x0d, 0xc2, 0x45, 0xab, 0x1a, 0x32, 0xf8, 0x9f, 0x06, 0xf4, 0x0a, 0x70, 0x4b, 0x31, 0xe9, 0xfa, 0xbc, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3190 = { .name = "ecdsa_secp224r1_sha256_3190", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3190_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3190_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3190_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 189 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3191 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3191_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha256_3191_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3191_sig[] = { 0xc5, 0x17, 0x60, 0x47, 0x84, 0x47, 0x21, 0x75, 0x97, 0xec, 0xc6, 0xf4, 0x00, 0x1b, 0xd4, 0x50, 0x88, 0xd5, 0x3c, 0x90, 0xf5, 0x31, 0x03, 0x60, 0x8b, 0xf8, 0x8a, 0xea, 0xa2, 0x01, 0x25, 0x3a, 0xa9, 0x03, 0xf9, 0x78, 0x1e, 0x89, 0x92, 0x10, 0x1d, 0x71, 0x71, 0xd2, 0xdd, 0x3a, 0x5d, 0x48, 0xc4, 0x4d, 0x8e, 0x1d, 0x54, 0x4c, 0xd6, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3191 = { .name = "ecdsa_secp224r1_sha256_3191", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3191_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3191_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3191_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 190 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3192 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3192_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha256_3192_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3192_sig[] = { 0x76, 0xbe, 0x01, 0x12, 0x67, 0x4e, 0xc2, 0x91, 0x28, 0x82, 0x3e, 0x1a, 0xf7, 0x51, 0x2e, 0x61, 0x43, 0x87, 0x2f, 0xef, 0x30, 0xa6, 0x4e, 0x2f, 0x17, 0x99, 0xbd, 0x56, 0x18, 0x7e, 0x50, 0x3e, 0x1a, 0x48, 0xc2, 0x7b, 0x54, 0x9f, 0xe0, 0xa4, 0xce, 0x5e, 0x58, 0x1e, 0x24, 0x2c, 0x86, 0x63, 0xfc, 0x9e, 0xfb, 0x02, 0xd6, 0xf2, 0xb1, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3192 = { .name = "ecdsa_secp224r1_sha256_3192", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3192_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3192_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3192_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 191 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3193 for ECDSA, tcId is 192 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3193_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha256_3193_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3193_sig[] = { 0x36, 0x24, 0x5e, 0xf1, 0x26, 0xb5, 0xb5, 0x1e, 0x45, 0x9f, 0x84, 0xea, 0xaa, 0xd5, 0xa4, 0x95, 0x06, 0x1f, 0x04, 0x71, 0xdc, 0x8c, 0x23, 0xf1, 0xc5, 0xf1, 0x62, 0x82, 0x39, 0xe3, 0x1d, 0x72, 0xa0, 0x6b, 0xa8, 0xe1, 0x4f, 0xcf, 0x95, 0x77, 0x8e, 0x07, 0xbc, 0x16, 0xa2, 0x62, 0x8e, 0x39, 0x44, 0x9d, 0xa8, 0x85, 0x7d, 0x50, 0x6e, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3193 = { .name = "ecdsa_secp224r1_sha256_3193", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3193_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3193_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3193_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 192 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3194 for ECDSA, tcId is 193 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3194_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha256_3194_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3194_sig[] = { 0x25, 0x86, 0x82, 0x97, 0x5d, 0xf8, 0xbc, 0xa7, 0xf2, 0x03, 0xf7, 0x71, 0xeb, 0xeb, 0x47, 0x8e, 0xf6, 0x37, 0x36, 0x0c, 0x86, 0x0f, 0xc3, 0x86, 0xcf, 0xb2, 0x17, 0x45, 0x76, 0x63, 0xe7, 0x01, 0x88, 0x04, 0x7e, 0x41, 0x46, 0x9a, 0x2a, 0x35, 0xc8, 0xc3, 0x30, 0xdd, 0x90, 0x0f, 0x23, 0x40, 0xba, 0x82, 0xaa, 0xfd, 0x22, 0x96, 0x2a, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3194 = { .name = "ecdsa_secp224r1_sha256_3194", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3194_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3194_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3194_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 193 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3195 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3195_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha256_3195_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3195_sig[] = { 0x85, 0xc9, 0x86, 0x14, 0xf3, 0x6c, 0x0d, 0x66, 0xf8, 0xd8, 0x78, 0x34, 0xca, 0xe9, 0x78, 0x61, 0x1b, 0x7b, 0x4e, 0xeb, 0xf5, 0x9a, 0x46, 0xbe, 0xa1, 0xb8, 0x9a, 0xe9, 0xd1, 0xa1, 0x8e, 0x37, 0x8d, 0xda, 0x84, 0x0e, 0x06, 0xb6, 0x0f, 0x62, 0x79, 0xbf, 0x0a, 0x22, 0x31, 0xd9, 0xfa, 0x2d, 0x8d, 0x2c, 0x31, 0xe8, 0x8b, 0xc1, 0xbd, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3195 = { .name = "ecdsa_secp224r1_sha256_3195", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3195_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3195_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3195_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 194 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3196 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3196_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha256_3196_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3196_sig[] = { 0xca, 0x7b, 0x74, 0x32, 0xba, 0x41, 0xff, 0x21, 0x12, 0xe1, 0x11, 0x6f, 0xff, 0xde, 0x89, 0xbb, 0xd6, 0x8f, 0x5c, 0xe6, 0x7f, 0xe5, 0x51, 0x3d, 0x16, 0xc8, 0xe6, 0xf7, 0xe4, 0x21, 0xb7, 0x59, 0x9e, 0x01, 0x80, 0x79, 0x8a, 0xcc, 0x20, 0x06, 0x45, 0x16, 0x03, 0xcd, 0xa2, 0xdb, 0x1d, 0x58, 0x27, 0x41, 0x11, 0x6e, 0x60, 0x33, 0xce, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3196 = { .name = "ecdsa_secp224r1_sha256_3196", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3196_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3196_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3196_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 195 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3197 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3197_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha256_3197_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3197_sig[] = { 0x19, 0x39, 0x7f, 0xe5, 0xd3, 0xec, 0xab, 0xf8, 0x0f, 0xc6, 0x24, 0xc1, 0xbf, 0x37, 0x95, 0x64, 0x38, 0x75, 0x17, 0xc1, 0x85, 0x08, 0x7d, 0xc9, 0x7d, 0x60, 0x50, 0x69, 0x33, 0xb5, 0x77, 0x3e, 0x9a, 0xaf, 0x6c, 0x34, 0xcb, 0x61, 0x2c, 0xfc, 0x81, 0xef, 0xd3, 0xbf, 0x9c, 0x22, 0x22, 0x4e, 0x8c, 0x4f, 0xa1, 0xbf, 0xcc, 0xf5, 0xc5, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3197 = { .name = "ecdsa_secp224r1_sha256_3197", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3197_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3197_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3197_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 196 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3198 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3198_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha256_3198_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3198_sig[] = { 0x70, 0xf2, 0x4f, 0x5c, 0x16, 0x41, 0x64, 0xbf, 0xbb, 0x84, 0x59, 0xaa, 0x12, 0xa9, 0x81, 0xaa, 0x31, 0x2d, 0xbc, 0xf0, 0x02, 0x04, 0x32, 0x6e, 0xba, 0xaa, 0xbd, 0xc8, 0xf5, 0xce, 0xbe, 0xe8, 0xca, 0xed, 0xae, 0x86, 0x62, 0xc4, 0x35, 0x01, 0x66, 0x50, 0x84, 0xb4, 0x5d, 0x2f, 0x49, 0x4f, 0xb7, 0x0d, 0x60, 0x30, 0x43, 0x54, 0x3d, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3198 = { .name = "ecdsa_secp224r1_sha256_3198", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3198_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3198_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3198_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 197 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3199 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3199_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha256_3199_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3199_sig[] = { 0x0b, 0xf2, 0xd8, 0x6e, 0xca, 0xa8, 0xb5, 0x6a, 0xca, 0x5e, 0x8f, 0x8e, 0xbc, 0xb4, 0x50, 0x81, 0xd0, 0x78, 0xa1, 0x45, 0x55, 0xb7, 0x5f, 0x5b, 0xe8, 0xe9, 0xb1, 0x32, 0x9a, 0x55, 0xb3, 0xce, 0x47, 0x34, 0x84, 0x99, 0x66, 0xb5, 0x03, 0x4c, 0xcd, 0x9b, 0x19, 0xf7, 0x64, 0x07, 0xee, 0x02, 0x41, 0xc3, 0xf5, 0x8e, 0x7b, 0x8f, 0xc8, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3199 = { .name = "ecdsa_secp224r1_sha256_3199", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3199_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3199_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3199_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 198 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3200 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3200_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3200_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3200_sig[] = { 0xbf, 0xc5, 0xdc, 0x44, 0x34, 0xcd, 0x09, 0x36, 0x96, 0x10, 0x68, 0x7d, 0x38, 0xd2, 0xd4, 0x18, 0xb6, 0x3f, 0xd4, 0x75, 0xde, 0xa2, 0x46, 0xa4, 0x56, 0xb2, 0x5a, 0x3a, 0xb1, 0x71, 0xdf, 0xa6, 0xcf, 0x72, 0x2f, 0x20, 0x81, 0x63, 0x70, 0xa8, 0x68, 0x78, 0x5d, 0xa8, 0x42, 0xb3, 0x7b, 0xac, 0x31, 0xd7, 0xb7, 0x8e, 0x67, 0x51, 0xfc, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3200 = { .name = "ecdsa_secp224r1_sha256_3200", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3200_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3200_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3200_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 199 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3201 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3201_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3201_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3201_sig[] = { 0x8f, 0xdb, 0xe8, 0xda, 0x64, 0x6c, 0x56, 0x42, 0xd7, 0x67, 0xc7, 0xdb, 0xeb, 0x38, 0x72, 0xb1, 0xed, 0xab, 0x6e, 0x37, 0x36, 0x58, 0x05, 0xf0, 0xe9, 0x4c, 0xe0, 0xa9, 0xbc, 0xf3, 0x5a, 0xb8, 0x12, 0x22, 0x88, 0x3d, 0xd3, 0x52, 0x6c, 0xb0, 0xcf, 0x93, 0x13, 0x8f, 0x46, 0x87, 0xcd, 0x0b, 0x10, 0xc2, 0xb0, 0xa1, 0x26, 0x38, 0x51, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3201 = { .name = "ecdsa_secp224r1_sha256_3201", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3201_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3201_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3201_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 200 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3202 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3202_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3202_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3202_sig[] = { 0xe2, 0x3a, 0x11, 0x27, 0x58, 0x48, 0xfd, 0x4f, 0x8b, 0x6f, 0x4a, 0xc4, 0xfc, 0x30, 0x5e, 0xae, 0x98, 0x1d, 0x3b, 0x7d, 0xc4, 0x53, 0xe5, 0xa9, 0x80, 0xc4, 0x64, 0x22, 0x1a, 0x87, 0x56, 0x93, 0xf2, 0x4a, 0x03, 0xea, 0x16, 0x14, 0xc4, 0xc3, 0xbb, 0xd0, 0xdd, 0x72, 0x21, 0x42, 0x9f, 0x22, 0xb3, 0x37, 0xea, 0x7d, 0x98, 0x34, 0x8c, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3202 = { .name = "ecdsa_secp224r1_sha256_3202", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3202_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3202_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3202_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 201 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3203 for ECDSA, tcId is 202 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3203_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha256_3203_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3203_sig[] = { 0x76, 0x64, 0x51, 0x64, 0xff, 0x9a, 0xf3, 0xa1, 0xa9, 0x20, 0x5f, 0xda, 0x2e, 0xef, 0x32, 0x6d, 0x2b, 0xff, 0xc7, 0x95, 0xdc, 0xc4, 0x82, 0x95, 0x47, 0xfe, 0x01, 0xdd, 0xb6, 0x5b, 0xba, 0x50, 0x37, 0x19, 0x31, 0x4b, 0x27, 0x73, 0x4d, 0xd0, 0x6b, 0x13, 0x95, 0xd5, 0x40, 0xaf, 0x83, 0x96, 0x02, 0x9b, 0x78, 0xb8, 0x4e, 0x01, 0x49, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3203 = { .name = "ecdsa_secp224r1_sha256_3203", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3203_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3203_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3203_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 202 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3204 for ECDSA, tcId is 203 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3204_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha256_3204_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3204_sig[] = { 0x32, 0xfa, 0x0c, 0xa7, 0xe0, 0x7f, 0x1f, 0x86, 0xac, 0x35, 0x07, 0x34, 0x99, 0x4e, 0x1f, 0x31, 0xb6, 0xda, 0x9c, 0x82, 0xf9, 0x3d, 0xce, 0xd2, 0xb9, 0x83, 0xc2, 0x9c, 0x7b, 0x78, 0x91, 0x28, 0x22, 0x06, 0xa4, 0x57, 0x11, 0xbd, 0xfc, 0xb2, 0xa1, 0x02, 0xb5, 0xd2, 0x89, 0xdf, 0x84, 0xff, 0x57, 0x78, 0x54, 0x86, 0x03, 0x57, 0x40, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3204 = { .name = "ecdsa_secp224r1_sha256_3204", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3204_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3204_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3204_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 203 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3205 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3205_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha256_3205_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3205_sig[] = { 0x2d, 0x54, 0x92, 0x47, 0x8c, 0xa6, 0x4e, 0x51, 0x11, 0xdf, 0xd8, 0x52, 0x18, 0x67, 0xb6, 0x47, 0x7b, 0x7e, 0x78, 0x22, 0x78, 0x49, 0xad, 0x09, 0x0b, 0x85, 0x56, 0x94, 0xa5, 0x32, 0xf5, 0xa2, 0xfa, 0x35, 0x94, 0xaf, 0x81, 0xcd, 0x59, 0x28, 0xb8, 0x1b, 0x40, 0x57, 0xda, 0x71, 0x7b, 0xe5, 0xfb, 0x42, 0xa3, 0xa8, 0x6c, 0x68, 0x19, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3205 = { .name = "ecdsa_secp224r1_sha256_3205", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3205_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3205_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3205_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 204 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3206 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3206_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha256_3206_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3206_sig[] = { 0x19, 0x1e, 0xee, 0x5d, 0xaf, 0x55, 0xcd, 0x49, 0x9e, 0x85, 0x39, 0xcb, 0x2c, 0xff, 0x79, 0x7c, 0xfe, 0xc5, 0xd5, 0x66, 0xd2, 0x02, 0x7b, 0xf9, 0xf8, 0xd6, 0x46, 0x93, 0xda, 0xdf, 0xea, 0xe8, 0x13, 0x1f, 0x64, 0xd9, 0x6b, 0x94, 0xfd, 0x34, 0x01, 0x97, 0xca, 0xa2, 0xbc, 0x04, 0x81, 0x85, 0x54, 0x81, 0x2f, 0xee, 0xf3, 0x34, 0x30, 0x70, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3206 = { .name = "ecdsa_secp224r1_sha256_3206", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3206_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3206_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3206_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 205 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3207 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3207_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha256_3207_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3207_sig[] = { 0xe0, 0xe2, 0xc0, 0x81, 0x80, 0xb8, 0xa2, 0x07, 0xee, 0x91, 0x05, 0xa7, 0xd3, 0x79, 0xfa, 0x11, 0x23, 0x68, 0xe8, 0x37, 0x0f, 0xa0, 0x9d, 0xfd, 0xe4, 0xa4, 0x5c, 0x45, 0xc7, 0x17, 0xbc, 0x08, 0x60, 0xe0, 0x16, 0xe7, 0xce, 0x48, 0xf8, 0xfe, 0x6a, 0x29, 0x9b, 0x36, 0x90, 0x6a, 0x60, 0x55, 0xad, 0xad, 0x93, 0xb4, 0x16, 0xce, 0x88, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3207 = { .name = "ecdsa_secp224r1_sha256_3207", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3207_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3207_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3207_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 206 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3208 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3208_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha256_3208_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3208_sig[] = { 0x1b, 0x91, 0x9e, 0xf9, 0x35, 0x32, 0x29, 0x27, 0x43, 0xbb, 0x2e, 0x1b, 0x7b, 0x48, 0x94, 0xfd, 0x84, 0x7c, 0x6e, 0x5d, 0xe5, 0x2a, 0x08, 0xe1, 0xb0, 0xf2, 0xdc, 0xfb, 0xc2, 0xd3, 0x0d, 0x6b, 0x75, 0x94, 0xd8, 0xdb, 0xd2, 0x61, 0x49, 0x1a, 0xe1, 0xd5, 0x87, 0x79, 0x50, 0x5b, 0x07, 0x5b, 0x64, 0xe5, 0x56, 0x4d, 0xc9, 0x7a, 0x41, 0x8b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3208 = { .name = "ecdsa_secp224r1_sha256_3208", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3208_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3208_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3208_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 207 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3209 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3209_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha256_3209_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3209_sig[] = { 0xe7, 0x5d, 0xb4, 0x9e, 0xd3, 0x3f, 0xf2, 0x88, 0x5e, 0xa6, 0x10, 0x0c, 0xc9, 0x5b, 0x8f, 0xe1, 0xb9, 0x24, 0x2e, 0xa4, 0x24, 0x8d, 0xb0, 0x7b, 0xca, 0xc2, 0xe0, 0x20, 0x79, 0x6c, 0x86, 0x61, 0x42, 0xae, 0x8e, 0xb7, 0x5b, 0xb0, 0x49, 0x9c, 0x66, 0x8c, 0x6f, 0xe4, 0x54, 0x97, 0x69, 0x2f, 0xbc, 0xc6, 0x6b, 0x37, 0xc2, 0xe4, 0x62, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3209 = { .name = "ecdsa_secp224r1_sha256_3209", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3209_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3209_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3209_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 208 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3210 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3210_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha256_3210_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3210_sig[] = { 0x1f, 0x81, 0xcd, 0x92, 0x43, 0x62, 0xec, 0x82, 0x58, 0x90, 0x30, 0x7b, 0x9b, 0x39, 0x36, 0xe0, 0xd8, 0xf7, 0x28, 0xa7, 0xc8, 0x4b, 0xdb, 0x43, 0xc5, 0xcf, 0x04, 0x33, 0x39, 0xd3, 0xe4, 0x6a, 0x03, 0x04, 0x0a, 0xd4, 0x1a, 0xc0, 0x26, 0xb1, 0x8e, 0x06, 0x29, 0xf6, 0x14, 0x5e, 0x3d, 0xc8, 0xd1, 0xe6, 0xbb, 0xe2, 0x00, 0xc8, 0x48, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3210 = { .name = "ecdsa_secp224r1_sha256_3210", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3210_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3210_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3210_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 209 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3211 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3211_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha256_3211_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3211_sig[] = { 0x00, 0xfd, 0xa6, 0x13, 0xaa, 0x67, 0xca, 0x42, 0x67, 0x3a, 0xd4, 0x30, 0x9f, 0x3f, 0x0f, 0x05, 0xb2, 0x56, 0x9f, 0x3d, 0xee, 0x63, 0xf4, 0xaa, 0x9c, 0xc5, 0x4c, 0xf3, 0x1e, 0x5a, 0x64, 0xb6, 0x8a, 0x37, 0xe5, 0xb2, 0x01, 0xc9, 0x18, 0x30, 0x3d, 0xc7, 0xa4, 0x04, 0x39, 0xaa, 0xea, 0xcf, 0x01, 0x9c, 0x58, 0x92, 0xa8, 0xf6, 0xd0, 0xce, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3211 = { .name = "ecdsa_secp224r1_sha256_3211", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3211_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3211_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3211_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 210 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3212 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3212_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha256_3212_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3212_sig[] = { 0xb9, 0x32, 0xb3, 0xf7, 0xe6, 0x46, 0x7e, 0x1e, 0xc7, 0xa5, 0x61, 0xf3, 0x11, 0x60, 0x24, 0x8c, 0x7f, 0x22, 0x45, 0x50, 0xa8, 0x50, 0x87, 0x88, 0x63, 0x4b, 0x53, 0xce, 0xa0, 0xc5, 0x31, 0x2a, 0xcf, 0x9e, 0x80, 0x1a, 0xff, 0x6d, 0x6f, 0xc9, 0x85, 0x50, 0xcf, 0xa7, 0x12, 0xbb, 0xf6, 0x59, 0x37, 0x16, 0x5a, 0x36, 0xf2, 0xc3, 0x2d, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3212 = { .name = "ecdsa_secp224r1_sha256_3212", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3212_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3212_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3212_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 211 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3213 for ECDSA, tcId is 212 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3213_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha256_3213_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3213_sig[] = { 0xe5, 0x09, 0x59, 0x3f, 0xb0, 0x92, 0x45, 0xee, 0x82, 0x26, 0xce, 0x72, 0x78, 0x6b, 0x0c, 0xc3, 0x52, 0xbe, 0x55, 0x5a, 0x74, 0x86, 0xbe, 0x62, 0x8f, 0x4f, 0xd0, 0x0c, 0x0b, 0x7a, 0xbd, 0xe0, 0x06, 0x1b, 0x1e, 0x07, 0xbf, 0x13, 0x31, 0x91, 0x50, 0xa4, 0xff, 0x6a, 0x46, 0x4a, 0xba, 0xb6, 0x36, 0xab, 0x4e, 0x29, 0x7b, 0x0d, 0x76, 0x33, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3213 = { .name = "ecdsa_secp224r1_sha256_3213", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3213_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3213_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3213_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 212 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3214 for ECDSA, tcId is 213 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3214_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha256_3214_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3214_sig[] = { 0x6e, 0x54, 0xf9, 0x41, 0x20, 0x4d, 0x46, 0x39, 0xb8, 0x63, 0xc9, 0x8a, 0x65, 0xb7, 0xbe, 0xe3, 0x18, 0xd5, 0x1a, 0xb1, 0x90, 0x0a, 0x8f, 0x34, 0x5e, 0xac, 0x6f, 0x07, 0x0d, 0xa5, 0x05, 0x48, 0x29, 0x21, 0x4e, 0xcd, 0xe5, 0xe1, 0x05, 0x79, 0xb3, 0x6a, 0x2f, 0xe6, 0x42, 0x6c, 0x24, 0xb0, 0x64, 0xed, 0x77, 0xc3, 0x85, 0x90, 0xf2, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3214 = { .name = "ecdsa_secp224r1_sha256_3214", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3214_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3214_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3214_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 213 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3215 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3215_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha256_3215_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3215_sig[] = { 0x85, 0xea, 0x4a, 0xb3, 0xff, 0xdc, 0x99, 0x23, 0x30, 0xc0, 0xca, 0x81, 0x52, 0xfa, 0xf9, 0x91, 0x38, 0x6b, 0xce, 0x82, 0x87, 0x7d, 0xbb, 0x23, 0x9b, 0xa6, 0x54, 0xf6, 0x08, 0x06, 0xc6, 0xba, 0xf0, 0xeb, 0xea, 0x4c, 0x1a, 0xaa, 0x19, 0x0e, 0x7d, 0x43, 0x25, 0xd4, 0x6d, 0x1f, 0x77, 0x89, 0xd5, 0x50, 0x63, 0x2b, 0x70, 0xb5, 0xfc, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3215 = { .name = "ecdsa_secp224r1_sha256_3215", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3215_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3215_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3215_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 214 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3216 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3216_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha256_3216_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3216_sig[] = { 0x44, 0xd5, 0x3d, 0xeb, 0xb6, 0x46, 0xb7, 0x34, 0x85, 0x40, 0x2e, 0xab, 0x2d, 0x09, 0x90, 0x81, 0xb9, 0x7b, 0x12, 0x43, 0xc0, 0x25, 0xb6, 0x24, 0xf0, 0xdd, 0x67, 0xea, 0xe5, 0xde, 0x78, 0x9a, 0x7d, 0x4b, 0x77, 0xea, 0xc6, 0xd7, 0xbb, 0xa4, 0x16, 0x58, 0xe6, 0xe4, 0xdc, 0x34, 0x7d, 0xab, 0xed, 0x2f, 0x96, 0x80, 0xc0, 0x4a, 0x6f, 0x55, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3216 = { .name = "ecdsa_secp224r1_sha256_3216", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3216_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3216_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3216_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 215 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3217 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3217_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha256_3217_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3217_sig[] = { 0x15, 0x26, 0xeb, 0x2f, 0x65, 0x7e, 0xbe, 0xa9, 0xaf, 0x4c, 0xa1, 0x84, 0xb9, 0x75, 0xc0, 0x23, 0x72, 0xc8, 0x8e, 0x24, 0xe8, 0x35, 0xf3, 0xf5, 0x77, 0x4c, 0x0e, 0x12, 0x1f, 0x1e, 0xcc, 0xe3, 0x8e, 0xe5, 0x23, 0x72, 0xcb, 0x20, 0x19, 0x07, 0x79, 0x4d, 0xe1, 0x7b, 0x6d, 0x6c, 0x1a, 0xfa, 0x13, 0xc3, 0x16, 0xc5, 0x1c, 0xb0, 0x7b, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3217 = { .name = "ecdsa_secp224r1_sha256_3217", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3217_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3217_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3217_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 216 in file ecdsa_secp224r1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3218 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3218_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3218_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3218_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x9e, 0x82, 0x95, 0x0e, 0xbe, 0x10, 0x2f, 0x37, 0xff, 0x36, 0x45, 0xcc, 0x7d, 0x3c, 0x1b, 0xab, 0x88, 0x64, 0xe5, 0xe0, 0x3a, 0x50, 0x11, 0xee, 0xba, 0x81, 0x50, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3218 = { .name = "ecdsa_secp224r1_sha256_3218", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3218_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3218_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3218_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3219 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3219_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3219_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3219_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3219 = { .name = "ecdsa_secp224r1_sha256_3219", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3219_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3219_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3219_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 2 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3220 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3220_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3220_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3220_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3220 = { .name = "ecdsa_secp224r1_sha256_3220", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3220_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3220_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3220_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 3 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3221 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3221_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3221_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3221_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3221 = { .name = "ecdsa_secp224r1_sha256_3221", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3221_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3221_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3221_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 4 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3222 for ECDSA, tcId is 67 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3222_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3222_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3222_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3222 = { .name = "ecdsa_secp224r1_sha256_3222", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3222_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3222_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3222_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 67 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3223 for ECDSA, tcId is 68 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3223_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3223_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3223_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3223 = { .name = "ecdsa_secp224r1_sha256_3223", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3223_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3223_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3223_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3224 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3224_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3224_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3224_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3224 = { .name = "ecdsa_secp224r1_sha256_3224", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3224_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3224_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3224_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 69 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3225 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3225_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3225_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3225_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3225 = { .name = "ecdsa_secp224r1_sha256_3225", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3225_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3225_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3225_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3226 for ECDSA, tcId is 92 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3226_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3226_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3226_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x00, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3226 = { .name = "ecdsa_secp224r1_sha256_3226", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3226_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3226_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3226_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 92 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3227 for ECDSA, tcId is 93 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3227_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3227_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3227_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3227 = { .name = "ecdsa_secp224r1_sha256_3227", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3227_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3227_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3227_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3228 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3228_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3228_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3228_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3228 = { .name = "ecdsa_secp224r1_sha256_3228", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3228_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3228_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3228_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 94 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3229 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3229_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3229_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3229_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3229 = { .name = "ecdsa_secp224r1_sha256_3229", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3229_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3229_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3229_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3230 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3230_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3230_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3230_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x05, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3230 = { .name = "ecdsa_secp224r1_sha256_3230", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3230_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3230_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3230_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 97 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3231 for ECDSA, tcId is 98 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3231_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3231_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3231_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3231 = { .name = "ecdsa_secp224r1_sha256_3231", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3231_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3231_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3231_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3232 for ECDSA, tcId is 113 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3232_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3232_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3232_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3232 = { .name = "ecdsa_secp224r1_sha256_3232", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3232_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3232_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3232_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 113 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3233 for ECDSA, tcId is 114 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3233_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3233_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3233_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3233 = { .name = "ecdsa_secp224r1_sha256_3233", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3233_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3233_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3233_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3234 for ECDSA, tcId is 117 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3234_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3234_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3234_sig[] = { 0x38, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3234 = { .name = "ecdsa_secp224r1_sha256_3234", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3234_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3234_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3234_sig, .siglen = 56, .result = -1, .comment = "modify first byte of integer, tcId is 117 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3235 for ECDSA, tcId is 118 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3235_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3235_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3235_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x63, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3235 = { .name = "ecdsa_secp224r1_sha256_3235", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3235_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3235_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3235_sig, .siglen = 56, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3236 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3236_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3236_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3236_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x84, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3236 = { .name = "ecdsa_secp224r1_sha256_3236", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3236_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3236_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3236_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 119 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3237 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3237_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3237_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3237_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3237 = { .name = "ecdsa_secp224r1_sha256_3237", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3237_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3237_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3237_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3238 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3238_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3238_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3238_sig[] = { 0x00, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3238 = { .name = "ecdsa_secp224r1_sha256_3238", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3238_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3238_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3238_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 121 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3239 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3239_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3239_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3239_sig[] = { 0x00, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3239 = { .name = "ecdsa_secp224r1_sha256_3239", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3239_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3239_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3239_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3240 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3240_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3240_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3240_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3240 = { .name = "ecdsa_secp224r1_sha256_3240", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3240_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3240_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3240_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3241 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3241_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3241_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3241_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x00, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3241 = { .name = "ecdsa_secp224r1_sha256_3241", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3241_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3241_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3241_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3242 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3242_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3242_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3242_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3242 = { .name = "ecdsa_secp224r1_sha256_3242", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3242_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3242_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3242_sig, .siglen = 56, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3243 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3243_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3243_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3243_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3243 = { .name = "ecdsa_secp224r1_sha256_3243", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3243_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3243_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3243_sig, .siglen = 56, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp224r1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3244 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3244_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3244_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3244_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3244 = { .name = "ecdsa_secp224r1_sha256_3244", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3244_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3244_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3244_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3245 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3245_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3245_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3245_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3245 = { .name = "ecdsa_secp224r1_sha256_3245", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3245_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3245_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3245_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3246 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3246_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3246_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3246_sig[] = { 0x01, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x1f, 0xd2, 0x83, 0x09, 0x8d, 0x8a, 0x00, 0x4f, 0xc7, 0x18, 0xe2, 0xe7, 0xe6, 0xb4, 0x41, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3246 = { .name = "ecdsa_secp224r1_sha256_3246", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3246_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3246_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3246_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3247 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3247_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3247_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3247_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x21, 0xa5, 0x3d, 0x48, 0x1b, 0xa9, 0x84, 0x28, 0x0c, 0xc6, 0x58, 0x2f, 0x2e, 0x5f, 0xc7, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3247 = { .name = "ecdsa_secp224r1_sha256_3247", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3247_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3247_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3247_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3248 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3248_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3248_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3248_sig[] = { 0xc5, 0x21, 0xa3, 0xf9, 0xdb, 0x5a, 0x98, 0x81, 0x28, 0x49, 0xba, 0xf2, 0x6b, 0xdf, 0x44, 0x1f, 0xd7, 0x2b, 0x66, 0x3d, 0xc4, 0x16, 0x10, 0x62, 0x74, 0x75, 0x75, 0xfc, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3248 = { .name = "ecdsa_secp224r1_sha256_3248", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3248_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3248_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3248_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3249 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3249_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3249_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3249_sig[] = { 0xc5, 0x21, 0xa3, 0xf9, 0xdb, 0x5a, 0x98, 0x81, 0x28, 0x49, 0xba, 0xf2, 0x6b, 0xde, 0x5a, 0xc2, 0xb7, 0xe4, 0x56, 0x7b, 0xd7, 0xf3, 0x39, 0xa7, 0xd0, 0xd1, 0xa0, 0x39, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3249 = { .name = "ecdsa_secp224r1_sha256_3249", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3249_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3249_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3249_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3250 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3250_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3250_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3250_sig[] = { 0xfe, 0xc5, 0x21, 0xa3, 0xf9, 0xdb, 0x5a, 0x98, 0x81, 0x28, 0x49, 0xba, 0xf2, 0x6b, 0xe0, 0x2d, 0x7c, 0xf6, 0x72, 0x75, 0xff, 0xb0, 0x38, 0xe7, 0x1d, 0x18, 0x19, 0x4b, 0xbf, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3250 = { .name = "ecdsa_secp224r1_sha256_3250", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3250_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3250_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3250_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3251 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3251_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3251_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3251_sig[] = { 0x01, 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3251 = { .name = "ecdsa_secp224r1_sha256_3251", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3251_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3251_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3251_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3252 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3252_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3252_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3252_sig[] = { 0xc5, 0x21, 0xa3, 0xf9, 0xdb, 0x5a, 0x98, 0x81, 0x28, 0x49, 0xba, 0xf2, 0x6b, 0xdf, 0x44, 0x1f, 0xd7, 0x2b, 0x66, 0x3d, 0xc4, 0x16, 0x10, 0x62, 0x74, 0x75, 0x75, 0xfc, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3252 = { .name = "ecdsa_secp224r1_sha256_3252", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3252_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3252_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3252_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3253 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3253_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3253_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3253_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x01, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0x11, 0x9a, 0x39, 0x0c, 0xfa, 0x9b, 0xed, 0x6a, 0x40, 0x9b, 0xfe, 0x37, 0x03, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3253 = { .name = "ecdsa_secp224r1_sha256_3253", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3253_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3253_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3253_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3254 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3254_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3254_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3254_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc3, 0xe4, 0x54, 0x77, 0x9b, 0x1a, 0x1f, 0xc5, 0xaf, 0xee, 0x11, 0x45, 0x7e, 0xaf, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3254 = { .name = "ecdsa_secp224r1_sha256_3254", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3254_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3254_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3254_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3255 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3255_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3255_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3255_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x9e, 0x82, 0x95, 0x0e, 0xbe, 0x10, 0x2f, 0x37, 0xff, 0x36, 0x45, 0xcc, 0x7d, 0x3d, 0x05, 0x08, 0xa7, 0xab, 0xf5, 0xa2, 0x26, 0x72, 0xe8, 0xa9, 0x5e, 0x25, 0x26, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3255 = { .name = "ecdsa_secp224r1_sha256_3255", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3255_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3255_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3255_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3256 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3256_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3256_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3256_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0xfe, 0x9e, 0x82, 0x95, 0x0e, 0xbe, 0x10, 0x2f, 0x37, 0xff, 0x36, 0x45, 0xcc, 0x7d, 0x3d, 0xee, 0x65, 0xc6, 0xf3, 0x05, 0x64, 0x12, 0x95, 0xbf, 0x64, 0x01, 0xc8, 0xfc, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3256 = { .name = "ecdsa_secp224r1_sha256_3256", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3256_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3256_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3256_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3257 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3257_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3257_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3257_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x01, 0x61, 0x7d, 0x6a, 0xf1, 0x41, 0xef, 0xd0, 0xc8, 0x00, 0xc9, 0xba, 0x33, 0x82, 0xc2, 0xfa, 0xf7, 0x58, 0x54, 0x0a, 0x5d, 0xd9, 0x8d, 0x17, 0x56, 0xa1, 0xda, 0xd9, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3257 = { .name = "ecdsa_secp224r1_sha256_3257", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3257_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3257_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3257_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3258 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3258_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3258_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3258_sig[] = { 0x3a, 0xde, 0x5c, 0x06, 0x24, 0xa5, 0x67, 0x7e, 0xd7, 0xb6, 0x45, 0x0d, 0x94, 0x20, 0xbb, 0xe0, 0x28, 0xd4, 0x99, 0xc2, 0x3b, 0xe9, 0xef, 0x9d, 0x8b, 0x8a, 0x8a, 0x04, 0x9e, 0x82, 0x95, 0x0e, 0xbe, 0x10, 0x2f, 0x37, 0xff, 0x36, 0x45, 0xcc, 0x7d, 0x3d, 0x05, 0x08, 0xa7, 0xab, 0xf5, 0xa2, 0x26, 0x72, 0xe8, 0xa9, 0x5e, 0x25, 0x26, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3258 = { .name = "ecdsa_secp224r1_sha256_3258", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3258_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3258_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3258_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3259 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3259_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3259_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3259_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3259 = { .name = "ecdsa_secp224r1_sha256_3259", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3259_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3259_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3259_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3260 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3260_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3260_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3260_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3260 = { .name = "ecdsa_secp224r1_sha256_3260", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3260_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3260_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3260_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3261 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3261_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3261_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3261_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3261 = { .name = "ecdsa_secp224r1_sha256_3261", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3261_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3261_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3261_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3262 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3262_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3262_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3262_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3262 = { .name = "ecdsa_secp224r1_sha256_3262", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3262_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3262_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3262_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3263 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3263_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3263_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3263_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3263 = { .name = "ecdsa_secp224r1_sha256_3263", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3263_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3263_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3263_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3264 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3264_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3264_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3264_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3264 = { .name = "ecdsa_secp224r1_sha256_3264", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3264_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3264_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3264_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3265 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3265_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3265_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3265_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3265 = { .name = "ecdsa_secp224r1_sha256_3265", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3265_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3265_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3265_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3266 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3266_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3266_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3266_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3266 = { .name = "ecdsa_secp224r1_sha256_3266", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3266_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3266_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3266_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3267 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3267_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3267_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3267_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3267 = { .name = "ecdsa_secp224r1_sha256_3267", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3267_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3267_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3267_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3268 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3268_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3268_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3268_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3268 = { .name = "ecdsa_secp224r1_sha256_3268", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3268_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3268_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3268_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3269 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3269_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3269_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3269_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3269 = { .name = "ecdsa_secp224r1_sha256_3269", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3269_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3269_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3269_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3270 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3270_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3270_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3270_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3270 = { .name = "ecdsa_secp224r1_sha256_3270", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3270_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3270_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3270_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3271 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3271_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3271_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3271_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3271 = { .name = "ecdsa_secp224r1_sha256_3271", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3271_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3271_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3271_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3272 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3272_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3272_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3272_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3272 = { .name = "ecdsa_secp224r1_sha256_3272", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3272_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3272_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3272_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3273 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3273_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3273_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3273_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3273 = { .name = "ecdsa_secp224r1_sha256_3273", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3273_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3273_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3273_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3274 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3274_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3274_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3274_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3274 = { .name = "ecdsa_secp224r1_sha256_3274", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3274_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3274_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3274_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3275 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3275_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3275_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3275_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3275 = { .name = "ecdsa_secp224r1_sha256_3275", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3275_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3275_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3275_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3276 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3276_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3276_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3276_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3276 = { .name = "ecdsa_secp224r1_sha256_3276", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3276_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3276_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3276_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3277 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3277_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3277_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3277_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3277 = { .name = "ecdsa_secp224r1_sha256_3277", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3277_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3277_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3277_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3278 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3278_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3278_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3278_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3278 = { .name = "ecdsa_secp224r1_sha256_3278", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3278_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3278_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3278_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3279 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3279_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3279_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3279_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3279 = { .name = "ecdsa_secp224r1_sha256_3279", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3279_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3279_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3279_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3280 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3280_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3280_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3280_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3280 = { .name = "ecdsa_secp224r1_sha256_3280", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3280_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3280_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3280_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3281 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3281_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3281_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3281_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3281 = { .name = "ecdsa_secp224r1_sha256_3281", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3281_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3281_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3281_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3282 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3282_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3282_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3282_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3282 = { .name = "ecdsa_secp224r1_sha256_3282", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3282_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3282_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3282_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3283 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3283_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3283_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3283_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3283 = { .name = "ecdsa_secp224r1_sha256_3283", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3283_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3283_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3283_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3284 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3284_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3284_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3284_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3284 = { .name = "ecdsa_secp224r1_sha256_3284", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3284_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3284_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3284_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3285 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3285_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3285_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3285_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3285 = { .name = "ecdsa_secp224r1_sha256_3285", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3285_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3285_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3285_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3286 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3286_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3286_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3286_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3286 = { .name = "ecdsa_secp224r1_sha256_3286", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3286_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3286_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3286_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3287 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3287_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3287_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3287_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3287 = { .name = "ecdsa_secp224r1_sha256_3287", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3287_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3287_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3287_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3288 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3288_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3288_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3288_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3288 = { .name = "ecdsa_secp224r1_sha256_3288", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3288_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3288_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3288_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3289 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3289_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3289_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3289_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3289 = { .name = "ecdsa_secp224r1_sha256_3289", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3289_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3289_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3289_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3290 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3290_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3290_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3290_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3290 = { .name = "ecdsa_secp224r1_sha256_3290", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3290_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3290_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3290_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3291 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3291_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3291_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3291_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3291 = { .name = "ecdsa_secp224r1_sha256_3291", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3291_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3291_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3291_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3292 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3292_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3292_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3292_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3292 = { .name = "ecdsa_secp224r1_sha256_3292", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3292_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3292_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3292_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3293 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3293_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3293_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3293_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3293 = { .name = "ecdsa_secp224r1_sha256_3293", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3293_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3293_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3293_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3294 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3294_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3294_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3294_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3294 = { .name = "ecdsa_secp224r1_sha256_3294", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3294_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3294_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3294_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3295 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3295_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3295_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3295_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3295 = { .name = "ecdsa_secp224r1_sha256_3295", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3295_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3295_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3295_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3296 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3296_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3296_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3296_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3296 = { .name = "ecdsa_secp224r1_sha256_3296", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3296_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3296_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3296_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3297 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3297_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3297_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3297_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3297 = { .name = "ecdsa_secp224r1_sha256_3297", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3297_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3297_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3297_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3298 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3298_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3298_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3298_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3298 = { .name = "ecdsa_secp224r1_sha256_3298", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3298_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3298_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3298_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3299 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3299_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3299_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3299_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3299 = { .name = "ecdsa_secp224r1_sha256_3299", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3299_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3299_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3299_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3300 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3300_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3300_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3300_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3300 = { .name = "ecdsa_secp224r1_sha256_3300", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3300_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3300_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3300_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3301 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3301_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3301_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3301_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3301 = { .name = "ecdsa_secp224r1_sha256_3301", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3301_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3301_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3301_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3302 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3302_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3302_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3302_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3302 = { .name = "ecdsa_secp224r1_sha256_3302", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3302_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3302_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3302_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3303 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3303_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3303_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3303_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3303 = { .name = "ecdsa_secp224r1_sha256_3303", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3303_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3303_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3303_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3304 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3304_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3304_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3304_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3304 = { .name = "ecdsa_secp224r1_sha256_3304", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3304_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3304_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3304_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3305 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3305_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3305_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3305_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3305 = { .name = "ecdsa_secp224r1_sha256_3305", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3305_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3305_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3305_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3306 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3306_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3306_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3306_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3306 = { .name = "ecdsa_secp224r1_sha256_3306", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3306_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3306_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3306_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3307 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3307_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3307_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3307_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3307 = { .name = "ecdsa_secp224r1_sha256_3307", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3307_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3307_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3307_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3308 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3308_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3308_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3308_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3308 = { .name = "ecdsa_secp224r1_sha256_3308", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3308_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3308_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3308_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3309 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3309_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3309_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3309_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3309 = { .name = "ecdsa_secp224r1_sha256_3309", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3309_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3309_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3309_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3310 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3310_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3310_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3310_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3310 = { .name = "ecdsa_secp224r1_sha256_3310", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3310_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3310_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3310_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3311 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3311_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3311_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3311_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3311 = { .name = "ecdsa_secp224r1_sha256_3311", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3311_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3311_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3311_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3312 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3312_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3312_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3312_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3312 = { .name = "ecdsa_secp224r1_sha256_3312", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3312_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3312_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3312_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3313 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3313_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3313_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3313_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3313 = { .name = "ecdsa_secp224r1_sha256_3313", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3313_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3313_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3313_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3314 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3314_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3314_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3314_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3314 = { .name = "ecdsa_secp224r1_sha256_3314", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3314_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3314_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3314_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3315 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3315_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3315_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3315_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3315 = { .name = "ecdsa_secp224r1_sha256_3315", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3315_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3315_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3315_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3316 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3316_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3316_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3316_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3316 = { .name = "ecdsa_secp224r1_sha256_3316", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3316_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3316_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3316_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3317 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3317_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3317_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3317_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3317 = { .name = "ecdsa_secp224r1_sha256_3317", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3317_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3317_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3317_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3318 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3318_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3318_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3318_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3318 = { .name = "ecdsa_secp224r1_sha256_3318", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3318_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3318_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3318_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3319 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3319_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3319_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3319_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3319 = { .name = "ecdsa_secp224r1_sha256_3319", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3319_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3319_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3319_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3320 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3320_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3320_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3320_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3320 = { .name = "ecdsa_secp224r1_sha256_3320", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3320_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3320_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3320_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3321 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3321_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3321_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3321_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3321 = { .name = "ecdsa_secp224r1_sha256_3321", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3321_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3321_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3321_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3322 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3322_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3322_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3322_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3322 = { .name = "ecdsa_secp224r1_sha256_3322", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3322_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3322_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3322_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3323 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3323_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3323_msg[] = { 0x38, 0x39, 0x31, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3323_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x96, 0xad, 0x91, 0xf0, 0x2a, 0x3b, 0xc4, 0x0c, 0x11, 0x8a, 0xbd, 0x41, 0x6e, 0xd5, 0xc6, 0x20, 0x3e, 0xd7, 0xce, 0xd0, 0x33, 0x08, 0x60, 0xd7, 0xb8, 0x8c, 0x10, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3323 = { .name = "ecdsa_secp224r1_sha256_3323", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3323_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3323_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha256_3323_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3324 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3324_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3324_msg[] = { 0x34, 0x32, 0x36, 0x34, 0x37, 0x39, 0x37, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3324_sig[] = { 0xbc, 0xca, 0x23, 0x65, 0xce, 0xbd, 0xcf, 0x7c, 0x6c, 0xda, 0x1e, 0xe7, 0xb2, 0x7c, 0x7f, 0xe7, 0x9e, 0x37, 0x15, 0x37, 0xb0, 0x18, 0x69, 0xc7, 0x15, 0xea, 0xbb, 0x1e, 0x3a, 0xe7, 0x6f, 0x9b, 0xbf, 0xe5, 0x19, 0xd7, 0x78, 0x81, 0x6d, 0xc8, 0xfe, 0x10, 0x63, 0x5e, 0xe7, 0x57, 0x6b, 0x6b, 0x79, 0x16, 0xf0, 0xc2, 0x1d, 0xf3, 0x20, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3324 = { .name = "ecdsa_secp224r1_sha256_3324", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3324_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3324_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3324_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3325 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3325_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3325_msg[] = { 0x37, 0x31, 0x33, 0x38, 0x36, 0x38, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3325_sig[] = { 0x59, 0xa9, 0xf8, 0x32, 0x89, 0xef, 0x69, 0x95, 0xd5, 0xd5, 0x59, 0x2e, 0x80, 0xab, 0x4f, 0x6a, 0x81, 0x12, 0x3f, 0x69, 0xd3, 0x85, 0xd3, 0xcf, 0xb1, 0x52, 0xfa, 0xf2, 0x3a, 0x97, 0xd5, 0xbe, 0x19, 0x0d, 0x58, 0x19, 0x24, 0x10, 0x67, 0xe2, 0xbe, 0x56, 0x37, 0x5a, 0xb8, 0x41, 0x55, 0xba, 0xab, 0x8f, 0xc7, 0xae, 0xb7, 0xf8, 0xcb, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3325 = { .name = "ecdsa_secp224r1_sha256_3325", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3325_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3325_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3325_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3326 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3326_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3326_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x33, 0x33, 0x31, 0x36, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3326_sig[] = { 0xb5, 0x4b, 0xac, 0x9b, 0xe2, 0xbe, 0xaa, 0xa0, 0x94, 0x56, 0xa3, 0x96, 0x8a, 0x1f, 0xaf, 0x27, 0xc9, 0xd9, 0x6b, 0xd5, 0xf6, 0x73, 0x8f, 0xec, 0x60, 0x66, 0xd3, 0x1e, 0xd7, 0x2c, 0x22, 0x12, 0x93, 0x44, 0xa9, 0x6d, 0x52, 0xfd, 0xa6, 0x0b, 0x26, 0x4c, 0xf5, 0xe6, 0xfa, 0xe4, 0x5f, 0xd2, 0xc1, 0xb1, 0xb7, 0x8b, 0xcb, 0xa3, 0x00, 0x70, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3326 = { .name = "ecdsa_secp224r1_sha256_3326", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3326_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3326_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3326_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3327 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3327_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3327_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x34, 0x30, 0x31, 0x32, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3327_sig[] = { 0x32, 0x3d, 0xbd, 0xec, 0xd4, 0x09, 0x10, 0xc6, 0xfa, 0x7a, 0x56, 0x91, 0x84, 0x6f, 0xa7, 0x76, 0x91, 0x13, 0xd1, 0xf2, 0xba, 0x64, 0xef, 0x0d, 0xc9, 0x7d, 0x2d, 0xdb, 0xca, 0x9e, 0x73, 0xa4, 0x58, 0x7a, 0xf0, 0x42, 0xf8, 0xba, 0x92, 0x4b, 0xb6, 0x18, 0x29, 0xc5, 0xe2, 0x40, 0x46, 0xf9, 0x80, 0x3e, 0xb7, 0x6a, 0xb8, 0x0e, 0xf3, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3327 = { .name = "ecdsa_secp224r1_sha256_3327", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3327_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3327_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3327_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3328 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3328_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3328_msg[] = { 0x31, 0x33, 0x34, 0x34, 0x32, 0x39, 0x33, 0x30, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha256_3328_sig[] = { 0xa5, 0x5d, 0xcc, 0xc2, 0x7d, 0x28, 0x7f, 0x15, 0x96, 0x0e, 0xd7, 0x99, 0x08, 0xa3, 0xed, 0xb6, 0xbb, 0x31, 0xaf, 0xf0, 0x7c, 0x8c, 0xaa, 0x0e, 0x65, 0xfc, 0x07, 0x85, 0x55, 0x9c, 0xb5, 0x1a, 0xa5, 0xf2, 0xb9, 0x06, 0x66, 0x10, 0x19, 0x9d, 0xd0, 0x12, 0x91, 0xa4, 0x77, 0x29, 0xa6, 0x18, 0x9a, 0x62, 0x2a, 0xe9, 0xe7, 0xaf, 0x76, 0x21, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3328 = { .name = "ecdsa_secp224r1_sha256_3328", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3328_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3328_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3328_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3329 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3329_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3329_msg[] = { 0x33, 0x37, 0x30, 0x36, 0x32, 0x31, 0x31, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3329_sig[] = { 0x13, 0x7e, 0xd6, 0x10, 0x51, 0x48, 0xd6, 0xf5, 0xb8, 0x4e, 0x87, 0x73, 0x5d, 0x57, 0x95, 0x5f, 0x81, 0xc5, 0x91, 0x4a, 0x6e, 0x69, 0xf5, 0x53, 0x47, 0xad, 0xe0, 0x74, 0xdf, 0xa5, 0xd5, 0x6b, 0x1a, 0x12, 0x56, 0x7e, 0xfa, 0xcb, 0x34, 0x8a, 0x13, 0x3b, 0x79, 0xd4, 0x8d, 0xa7, 0xaa, 0xc7, 0x8d, 0x78, 0xee, 0x58, 0x9c, 0x2e, 0xc0, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3329 = { .name = "ecdsa_secp224r1_sha256_3329", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3329_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3329_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3329_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3330 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3330_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3330_msg[] = { 0x33, 0x34, 0x33, 0x36, 0x38, 0x38, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3330_sig[] = { 0x85, 0x6f, 0xf6, 0x3d, 0x77, 0x91, 0x63, 0xe7, 0x8f, 0xed, 0x8c, 0x48, 0x33, 0x0b, 0x48, 0xf0, 0x8b, 0xf9, 0x53, 0xa9, 0x52, 0x66, 0xb3, 0x85, 0x7e, 0xee, 0x91, 0xaa, 0xf4, 0xaa, 0x91, 0x7c, 0xd3, 0x7f, 0x55, 0x6c, 0x6d, 0xf9, 0xd0, 0x96, 0x0c, 0x2f, 0x7d, 0xaa, 0x7e, 0xa1, 0x18, 0xe5, 0xc3, 0x0c, 0xc4, 0x0c, 0xa1, 0xee, 0xd4, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3330 = { .name = "ecdsa_secp224r1_sha256_3330", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3330_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3330_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3330_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3331 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3331_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3331_msg[] = { 0x31, 0x33, 0x35, 0x31, 0x35, 0x33, 0x30, 0x33, 0x37, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3331_sig[] = { 0xa9, 0xd7, 0x71, 0x6f, 0x04, 0xc5, 0xce, 0x24, 0x7f, 0x6b, 0x8c, 0x60, 0x8b, 0x37, 0xdb, 0x55, 0xf6, 0x8e, 0x2f, 0xf9, 0x4a, 0x58, 0x83, 0x86, 0x3e, 0x86, 0x77, 0x08, 0x61, 0xbc, 0x09, 0x3f, 0xaa, 0x6f, 0xb2, 0x5c, 0xd2, 0x40, 0xae, 0xa4, 0xb5, 0x6f, 0xed, 0x72, 0x8f, 0x7b, 0x36, 0x69, 0xb4, 0xdc, 0x84, 0xc4, 0x49, 0xd3, 0x8c, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3331 = { .name = "ecdsa_secp224r1_sha256_3331", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3331_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3331_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3331_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3332 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3332_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3332_msg[] = { 0x36, 0x35, 0x35, 0x33, 0x32, 0x30, 0x33, 0x31, 0x32, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3332_sig[] = { 0xf6, 0xd0, 0x88, 0xfd, 0x3b, 0x9c, 0x98, 0x1a, 0xc4, 0x91, 0xc6, 0x20, 0x30, 0x64, 0x3b, 0xbd, 0x82, 0xd4, 0xf4, 0x58, 0x8e, 0x85, 0x17, 0xde, 0x58, 0x84, 0xe7, 0x3d, 0x77, 0x3e, 0xee, 0x47, 0x79, 0x80, 0x76, 0x3b, 0x1e, 0xa2, 0x7a, 0xe9, 0x98, 0xbd, 0xa0, 0x24, 0x4c, 0xb6, 0x7b, 0x07, 0xaa, 0x67, 0x79, 0xa3, 0x8c, 0xd2, 0xba, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3332 = { .name = "ecdsa_secp224r1_sha256_3332", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3332_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3332_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3332_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3333 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3333_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3333_msg[] = { 0x31, 0x35, 0x36, 0x34, 0x33, 0x34, 0x36, 0x36, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha256_3333_sig[] = { 0xea, 0xcb, 0x55, 0x58, 0x8e, 0x44, 0x6b, 0xbf, 0x36, 0x87, 0x08, 0x9b, 0xa8, 0xba, 0x3b, 0x05, 0xcf, 0xef, 0x74, 0x58, 0xbb, 0x81, 0xb4, 0x27, 0x7f, 0x90, 0xa8, 0x53, 0x80, 0x39, 0xe8, 0x94, 0x4c, 0xc3, 0xdf, 0x7f, 0x4c, 0xe5, 0xba, 0xdc, 0x34, 0x99, 0x75, 0xd4, 0x71, 0xa8, 0x1d, 0xea, 0x14, 0xe9, 0xbc, 0xae, 0x30, 0x65, 0xd4, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3333 = { .name = "ecdsa_secp224r1_sha256_3333", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3333_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3333_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3333_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3334 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3334_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3334_msg[] = { 0x34, 0x34, 0x32, 0x39, 0x35, 0x33, 0x39, 0x31, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3334_sig[] = { 0x59, 0x84, 0xaf, 0x8c, 0x89, 0xfb, 0x9d, 0x59, 0x6a, 0x1f, 0x28, 0xfd, 0x3d, 0x41, 0xe4, 0x6f, 0x72, 0x05, 0xfe, 0x12, 0xfa, 0x63, 0x43, 0x7a, 0xc7, 0x9e, 0x7e, 0x81, 0x33, 0xb1, 0x6b, 0x74, 0x2d, 0x45, 0xf1, 0x8f, 0x88, 0xde, 0x27, 0x13, 0x07, 0x83, 0x84, 0xe6, 0x15, 0x0f, 0x06, 0xb8, 0xb9, 0x9f, 0x36, 0xab, 0x2c, 0xe3, 0xdd, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3334 = { .name = "ecdsa_secp224r1_sha256_3334", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3334_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3334_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3334_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3335 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3335_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3335_msg[] = { 0x31, 0x30, 0x39, 0x35, 0x33, 0x32, 0x36, 0x31, 0x33, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3335_sig[] = { 0x3c, 0xda, 0x62, 0xd8, 0x47, 0x11, 0xc2, 0x62, 0xf7, 0x82, 0xd5, 0xc3, 0xa7, 0x9b, 0x56, 0x74, 0x85, 0x22, 0x7b, 0x34, 0xaf, 0xb8, 0x21, 0xf5, 0x24, 0x1b, 0x19, 0x61, 0xb6, 0x15, 0xce, 0xf3, 0x99, 0x70, 0x6f, 0xf7, 0x58, 0xf0, 0x72, 0x93, 0x18, 0x52, 0xb7, 0x17, 0xec, 0x89, 0x8e, 0x9a, 0x1e, 0x63, 0x39, 0xd0, 0xee, 0x81, 0xb8, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3335 = { .name = "ecdsa_secp224r1_sha256_3335", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3335_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3335_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3335_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3336 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3336_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3336_msg[] = { 0x35, 0x39, 0x38, 0x37, 0x33, 0x35, 0x30, 0x30, 0x34, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3336_sig[] = { 0xe1, 0xdb, 0x73, 0x04, 0x60, 0x91, 0x91, 0xea, 0x1a, 0xc9, 0x11, 0x83, 0xff, 0xb3, 0x1d, 0xf5, 0x1b, 0x5b, 0x3f, 0xdc, 0x6b, 0x1a, 0x11, 0x29, 0xd8, 0x58, 0x18, 0xd6, 0x44, 0x18, 0x86, 0xd0, 0x03, 0xae, 0x80, 0xfb, 0xe7, 0x13, 0x9e, 0x1d, 0x02, 0x84, 0x5c, 0xd1, 0xbd, 0x95, 0x9f, 0x0d, 0xf1, 0x46, 0x8f, 0x58, 0x36, 0xdd, 0x6e, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3336 = { .name = "ecdsa_secp224r1_sha256_3336", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3336_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3336_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3336_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3337 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3337_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3337_msg[] = { 0x33, 0x34, 0x36, 0x33, 0x30, 0x30, 0x36, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3337_sig[] = { 0x35, 0x45, 0xdc, 0x4a, 0x4e, 0xf8, 0x4b, 0xbb, 0x3a, 0x52, 0x6f, 0xf9, 0x29, 0xc9, 0x1a, 0xd2, 0x34, 0x51, 0x6a, 0x9e, 0x95, 0x45, 0x5a, 0xc8, 0xdb, 0x40, 0x12, 0xb1, 0xaf, 0x49, 0x92, 0x6f, 0x69, 0x3a, 0x7c, 0xf1, 0x1f, 0x71, 0xe1, 0x99, 0xf3, 0x82, 0xa8, 0xd6, 0x40, 0xc0, 0xc8, 0x5e, 0x46, 0xd9, 0x4e, 0xe2, 0x6e, 0x38, 0x43, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3337 = { .name = "ecdsa_secp224r1_sha256_3337", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3337_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3337_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3337_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3338 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3338_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3338_msg[] = { 0x39, 0x38, 0x31, 0x37, 0x33, 0x32, 0x30, 0x32, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3338_sig[] = { 0x0c, 0xca, 0xfd, 0xea, 0xe4, 0x58, 0x2c, 0x9d, 0xe6, 0x79, 0x5b, 0x2d, 0x09, 0xa7, 0xfc, 0x38, 0x48, 0xc7, 0x59, 0x04, 0xfa, 0x96, 0x09, 0x89, 0x15, 0x6c, 0xbb, 0xb9, 0xaf, 0x1f, 0x99, 0x4d, 0xa3, 0xe7, 0xd8, 0x9c, 0xc8, 0xaa, 0xa4, 0x46, 0x16, 0xcb, 0x77, 0xe3, 0xbe, 0x7a, 0x83, 0xcc, 0xec, 0xc9, 0x65, 0x77, 0x51, 0x94, 0xe5, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3338 = { .name = "ecdsa_secp224r1_sha256_3338", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3338_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3338_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3338_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3339 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3339_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3339_msg[] = { 0x33, 0x32, 0x32, 0x32, 0x30, 0x34, 0x31, 0x30, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3339_sig[] = { 0xa3, 0xb2, 0x14, 0x5d, 0x8c, 0x66, 0x90, 0x27, 0x53, 0x25, 0x01, 0xee, 0xa1, 0x91, 0x3a, 0xbb, 0x22, 0xa7, 0x8a, 0x82, 0x7f, 0xdd, 0x82, 0xfe, 0x9d, 0x6d, 0x37, 0x57, 0x9b, 0x2f, 0x1a, 0xe8, 0x4f, 0x56, 0x06, 0xd6, 0x86, 0x53, 0x06, 0x5f, 0x74, 0xe9, 0xd0, 0x89, 0x88, 0x66, 0x94, 0xc7, 0x39, 0xfb, 0xe3, 0xfd, 0x4a, 0x1b, 0x2b, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3339 = { .name = "ecdsa_secp224r1_sha256_3339", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3339_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3339_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3339_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3340 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3340_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3340_msg[] = { 0x36, 0x36, 0x36, 0x36, 0x33, 0x30, 0x37, 0x31, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3340_sig[] = { 0x9a, 0xac, 0x3a, 0x7e, 0x3d, 0x14, 0x23, 0x44, 0x99, 0x1b, 0xf1, 0x77, 0xb4, 0xf4, 0xdb, 0xfa, 0x07, 0x41, 0x48, 0xad, 0x9e, 0x20, 0xf2, 0x75, 0x55, 0xb5, 0x47, 0xd9, 0xf8, 0x30, 0xa3, 0xc7, 0xfd, 0xf2, 0x51, 0xd7, 0x9d, 0x41, 0x97, 0x7d, 0x28, 0xe6, 0xd9, 0xa7, 0x2a, 0x36, 0xdf, 0x11, 0xb8, 0x6e, 0x17, 0xc8, 0xdc, 0x3a, 0xca, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3340 = { .name = "ecdsa_secp224r1_sha256_3340", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3340_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3340_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3340_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3341 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3341_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3341_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x35, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3341_sig[] = { 0x47, 0x69, 0xfb, 0xa5, 0x54, 0xfd, 0x43, 0x60, 0x51, 0xc2, 0x85, 0xbd, 0xad, 0xfa, 0x33, 0xa4, 0x43, 0xd4, 0xf7, 0x08, 0x4d, 0xd5, 0x98, 0xce, 0x3b, 0x98, 0xb8, 0xfb, 0x0c, 0x01, 0x4c, 0x87, 0xcb, 0x14, 0x11, 0x3d, 0x75, 0x86, 0x4f, 0x74, 0x90, 0x5f, 0x75, 0xb3, 0x4f, 0x99, 0x70, 0xba, 0x58, 0xb5, 0xd0, 0x67, 0x60, 0x21, 0x82, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3341 = { .name = "ecdsa_secp224r1_sha256_3341", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3341_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3341_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3341_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3342 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3342_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3342_msg[] = { 0x31, 0x38, 0x34, 0x36, 0x35, 0x39, 0x37, 0x31, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3342_sig[] = { 0x8b, 0x91, 0xfc, 0x50, 0x54, 0xa7, 0x5c, 0x34, 0xa5, 0x08, 0x62, 0x4b, 0x85, 0x70, 0x8b, 0x3d, 0x25, 0xfa, 0x74, 0x32, 0x8c, 0x68, 0x74, 0x1c, 0x3a, 0xeb, 0x92, 0xd9, 0x15, 0x5e, 0x3e, 0x46, 0xb1, 0x20, 0x95, 0x83, 0x13, 0x5a, 0x9f, 0xef, 0x15, 0xab, 0xe3, 0x25, 0xb2, 0x5b, 0xd1, 0x92, 0x85, 0xee, 0x6b, 0x5b, 0x45, 0x49, 0x62, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3342 = { .name = "ecdsa_secp224r1_sha256_3342", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3342_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3342_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3342_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3343 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3343_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3343_msg[] = { 0x33, 0x31, 0x33, 0x36, 0x30, 0x34, 0x36, 0x31, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha256_3343_sig[] = { 0xa4, 0xa2, 0xa8, 0x5f, 0xbb, 0x8b, 0xb2, 0x6c, 0x4d, 0x84, 0x5c, 0xfa, 0xc1, 0x91, 0xf8, 0x9d, 0x65, 0xb0, 0x0d, 0x3f, 0x1b, 0x94, 0x50, 0xd1, 0x77, 0xf7, 0x88, 0x90, 0x66, 0x05, 0xa4, 0x60, 0xe6, 0x04, 0x02, 0x68, 0x5c, 0x7a, 0x5a, 0xcc, 0xd2, 0x61, 0x5e, 0x92, 0x32, 0xe5, 0x19, 0x37, 0xbd, 0x83, 0xdf, 0xa3, 0x06, 0x5e, 0xab, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3343 = { .name = "ecdsa_secp224r1_sha256_3343", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3343_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3343_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3343_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3344 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3344_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3344_msg[] = { 0x32, 0x36, 0x36, 0x33, 0x37, 0x38, 0x34, 0x32, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3344_sig[] = { 0xa8, 0x9d, 0x33, 0x3a, 0xe3, 0x41, 0x87, 0x85, 0x5c, 0xf7, 0xfa, 0x43, 0x5f, 0xf3, 0x9b, 0xe6, 0xb7, 0xbb, 0x39, 0xb2, 0xd0, 0xce, 0x68, 0x21, 0x33, 0xad, 0x96, 0x46, 0x48, 0x3d, 0xcc, 0x89, 0xa3, 0xb4, 0x3b, 0xe2, 0x50, 0xf5, 0xc3, 0xf7, 0x8f, 0x78, 0x41, 0x8e, 0x7b, 0x83, 0x41, 0xa8, 0xbc, 0xfb, 0x93, 0xdf, 0xd5, 0x8e, 0x46, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3344 = { .name = "ecdsa_secp224r1_sha256_3344", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3344_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3344_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3344_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3345 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3345_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3345_msg[] = { 0x31, 0x36, 0x35, 0x32, 0x31, 0x30, 0x30, 0x35, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3345_sig[] = { 0x2d, 0x0f, 0x99, 0xc7, 0x19, 0x33, 0xc8, 0x2d, 0xed, 0x54, 0x4e, 0xf4, 0xfa, 0xac, 0x9d, 0x66, 0x9e, 0x43, 0x7d, 0xea, 0x13, 0xb5, 0x71, 0x86, 0xf4, 0xc2, 0x0a, 0x0e, 0xd9, 0x68, 0x2b, 0x9f, 0x3a, 0x05, 0xd7, 0x83, 0x29, 0x47, 0xbc, 0x45, 0xea, 0xdb, 0xc7, 0x42, 0xd9, 0x6e, 0x7a, 0xb1, 0x12, 0x48, 0x32, 0xdd, 0xb7, 0xa8, 0xc6, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3345 = { .name = "ecdsa_secp224r1_sha256_3345", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3345_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3345_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3345_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3346 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3346_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3346_msg[] = { 0x35, 0x37, 0x34, 0x38, 0x30, 0x38, 0x31, 0x36, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3346_sig[] = { 0x84, 0x02, 0x08, 0xf7, 0xc4, 0x1b, 0x1f, 0xba, 0xdc, 0xc7, 0x01, 0xfb, 0x3a, 0x1d, 0x0f, 0x98, 0xa3, 0xe2, 0xa7, 0x52, 0x35, 0xe6, 0x95, 0xbf, 0xd3, 0x78, 0xf8, 0xb4, 0x44, 0xc8, 0xda, 0xad, 0x4e, 0xfc, 0x03, 0xe1, 0x75, 0x38, 0x03, 0xc3, 0x62, 0xb4, 0x09, 0xc3, 0xca, 0x6e, 0x0f, 0x21, 0xe5, 0x38, 0xfe, 0x3a, 0x36, 0x4c, 0x0e, 0x53, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3346 = { .name = "ecdsa_secp224r1_sha256_3346", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3346_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3346_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3346_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3347 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3347_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3347_msg[] = { 0x36, 0x33, 0x34, 0x33, 0x39, 0x31, 0x33, 0x34, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3347_sig[] = { 0x87, 0xcc, 0x58, 0x2c, 0xb1, 0x06, 0x02, 0x11, 0x05, 0x66, 0xfc, 0xb1, 0x0a, 0x23, 0x3a, 0xed, 0xe9, 0x93, 0xfa, 0xe5, 0xfb, 0x3f, 0x81, 0xb0, 0xbb, 0xff, 0x94, 0xca, 0xc9, 0x71, 0xc0, 0x5b, 0xd5, 0x1d, 0x96, 0x85, 0x82, 0x5b, 0x2c, 0xfc, 0x0a, 0x25, 0x96, 0xc7, 0xf8, 0x0d, 0x9f, 0x9d, 0xc6, 0x8c, 0x28, 0xc1, 0x59, 0xaa, 0x39, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3347 = { .name = "ecdsa_secp224r1_sha256_3347", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3347_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3347_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3347_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3348 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3348_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3348_msg[] = { 0x31, 0x35, 0x34, 0x31, 0x31, 0x30, 0x33, 0x35, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3348_sig[] = { 0x50, 0xd7, 0x3d, 0x94, 0x9b, 0x3a, 0xdc, 0xd3, 0xe8, 0xfa, 0x94, 0xda, 0xfe, 0xfa, 0xf9, 0xd2, 0x63, 0xeb, 0xc7, 0x02, 0x12, 0x8d, 0x89, 0x1a, 0xfa, 0xc4, 0x7e, 0xa7, 0xf8, 0x42, 0x3c, 0x37, 0x8f, 0x01, 0x90, 0x57, 0x49, 0x25, 0x14, 0x2e, 0xb5, 0xb9, 0x7c, 0x61, 0x2a, 0xbf, 0xa0, 0x48, 0xfa, 0x3a, 0xb5, 0x37, 0x5e, 0xc7, 0x95, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3348 = { .name = "ecdsa_secp224r1_sha256_3348", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3348_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3348_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3348_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3349 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3349_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3349_msg[] = { 0x31, 0x30, 0x34, 0x37, 0x38, 0x35, 0x38, 0x30, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3349_sig[] = { 0xd6, 0x08, 0x91, 0x5d, 0xfc, 0xd5, 0xd3, 0xc6, 0x3e, 0xd1, 0x0d, 0x0d, 0x9b, 0x61, 0x4f, 0x7a, 0x86, 0x6f, 0x88, 0x58, 0xa6, 0xe5, 0x9d, 0xc0, 0x3e, 0xb0, 0xa8, 0xee, 0x8e, 0x70, 0x1a, 0xa0, 0xba, 0xb4, 0x91, 0x43, 0x0f, 0x6e, 0x4d, 0xa9, 0x22, 0x44, 0xb0, 0xbb, 0x17, 0x49, 0x57, 0xee, 0x6f, 0x49, 0x5b, 0xc5, 0xd1, 0x5f, 0xab, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3349 = { .name = "ecdsa_secp224r1_sha256_3349", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3349_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3349_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3349_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3350 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3350_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3350_msg[] = { 0x31, 0x30, 0x35, 0x33, 0x36, 0x32, 0x38, 0x35, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3350_sig[] = { 0xc8, 0x7b, 0x0a, 0xb8, 0x42, 0xc4, 0x76, 0x9e, 0xd9, 0x4b, 0x91, 0x0b, 0xd7, 0x71, 0x96, 0x91, 0xf9, 0x99, 0x1b, 0xc5, 0xa3, 0x47, 0x88, 0x96, 0x08, 0xf0, 0x70, 0x34, 0xd0, 0x83, 0x11, 0x10, 0x48, 0xd6, 0xe0, 0x19, 0x77, 0x1f, 0xc2, 0x66, 0x9c, 0x55, 0x15, 0x6a, 0x3d, 0x09, 0x61, 0x5a, 0x6b, 0x2d, 0x9c, 0xae, 0x52, 0xdd, 0xab, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3350 = { .name = "ecdsa_secp224r1_sha256_3350", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3350_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3350_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3350_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3351 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3351_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3351_msg[] = { 0x39, 0x35, 0x33, 0x39, 0x30, 0x34, 0x31, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3351_sig[] = { 0x0a, 0x1c, 0x2c, 0x24, 0x78, 0xe2, 0x44, 0x46, 0x42, 0x26, 0xc6, 0x60, 0xed, 0xf7, 0x24, 0xdb, 0x12, 0x13, 0xf4, 0x92, 0x3e, 0xb7, 0x25, 0xd6, 0x11, 0xd9, 0x76, 0xfd, 0x76, 0x4e, 0x55, 0x18, 0x6a, 0x76, 0xf7, 0x34, 0x89, 0x1d, 0x05, 0xfb, 0x57, 0xaf, 0x27, 0x27, 0xfa, 0xb8, 0xfb, 0xea, 0x68, 0x4c, 0xa4, 0x32, 0x1d, 0x5d, 0xe5, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3351 = { .name = "ecdsa_secp224r1_sha256_3351", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3351_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3351_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3351_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3352 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3352_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3352_msg[] = { 0x39, 0x37, 0x38, 0x38, 0x34, 0x38, 0x30, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha256_3352_sig[] = { 0x8a, 0x27, 0x47, 0xc5, 0xdd, 0x9e, 0xf5, 0x29, 0x8b, 0x8a, 0xea, 0xbd, 0x2f, 0xb3, 0xa2, 0xbe, 0xb1, 0x61, 0x58, 0xfb, 0x2c, 0xc6, 0x2b, 0xe9, 0xe5, 0x1b, 0x21, 0x52, 0xf9, 0x62, 0x51, 0xbc, 0x04, 0x8b, 0xca, 0xd8, 0x32, 0xe6, 0xcb, 0xc0, 0x9c, 0x9c, 0x2e, 0x58, 0x5a, 0xb7, 0x54, 0x3d, 0xc5, 0x52, 0xea, 0xa5, 0x12, 0x5b, 0xe0, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3352 = { .name = "ecdsa_secp224r1_sha256_3352", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3352_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3352_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3352_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3353 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3353_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3353_msg[] = { 0x33, 0x36, 0x31, 0x30, 0x36, 0x37, 0x32, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3353_sig[] = { 0xd9, 0xea, 0xc3, 0x2a, 0x73, 0x4f, 0x3a, 0x3e, 0x5b, 0x5a, 0x29, 0x05, 0xbe, 0xd8, 0x16, 0x4e, 0xf4, 0xc6, 0xcd, 0x24, 0xd5, 0xc0, 0xfc, 0x54, 0xcc, 0x83, 0xf3, 0xcc, 0xa7, 0x84, 0x93, 0x0d, 0x16, 0xc3, 0xb7, 0x53, 0xbb, 0x3e, 0xd9, 0x15, 0x1d, 0x58, 0x3c, 0x50, 0xff, 0x97, 0xbc, 0x97, 0x62, 0x74, 0xbd, 0xe4, 0x82, 0xfb, 0x96, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3353 = { .name = "ecdsa_secp224r1_sha256_3353", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3353_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3353_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3353_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3354 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3354_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3354_msg[] = { 0x31, 0x30, 0x35, 0x34, 0x32, 0x34, 0x30, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3354_sig[] = { 0x6c, 0x40, 0xc6, 0xb1, 0x5a, 0xe5, 0x73, 0xf7, 0x7b, 0x67, 0x7c, 0xd8, 0x78, 0xcc, 0x5e, 0x4d, 0xa8, 0x17, 0x1c, 0xf5, 0x0d, 0x79, 0x97, 0x4f, 0xde, 0x37, 0x4e, 0x00, 0xc8, 0x8c, 0x98, 0x28, 0x03, 0x7b, 0xf7, 0x01, 0x3a, 0x14, 0x15, 0x53, 0x7c, 0xa0, 0x74, 0xd6, 0xc8, 0xa5, 0x53, 0xbd, 0xb4, 0xb2, 0x6b, 0x14, 0xa7, 0xe8, 0x8d, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3354 = { .name = "ecdsa_secp224r1_sha256_3354", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3354_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3354_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3354_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3355 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3355_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3355_msg[] = { 0x35, 0x31, 0x37, 0x34, 0x34, 0x34, 0x38, 0x31, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3355_sig[] = { 0xdc, 0xa0, 0xaa, 0xa0, 0xa3, 0x95, 0x39, 0x31, 0x42, 0xb3, 0x23, 0xed, 0xce, 0xd0, 0x93, 0x72, 0x76, 0x03, 0x50, 0xf2, 0xab, 0x26, 0x1c, 0xe3, 0x33, 0x9b, 0x11, 0x4d, 0x09, 0x83, 0xbf, 0x6e, 0x51, 0x0c, 0xe7, 0xf0, 0xa7, 0x52, 0x0f, 0x2b, 0x7c, 0x60, 0xcd, 0x68, 0xa4, 0x91, 0x2b, 0x78, 0x16, 0x2c, 0x7a, 0xc3, 0x37, 0x89, 0xe0, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3355 = { .name = "ecdsa_secp224r1_sha256_3355", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3355_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3355_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3355_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3356 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3356_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3356_msg[] = { 0x31, 0x39, 0x36, 0x37, 0x35, 0x36, 0x31, 0x32, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3356_sig[] = { 0xa0, 0x52, 0x6e, 0xd4, 0x7e, 0x26, 0x07, 0xe6, 0xba, 0xe6, 0xdc, 0xf3, 0xb8, 0xf5, 0x4f, 0x4e, 0x06, 0x38, 0x02, 0x36, 0x73, 0xa3, 0x8c, 0xad, 0x45, 0x69, 0xc3, 0xba, 0x61, 0x51, 0x6f, 0x55, 0x74, 0x6b, 0x37, 0x9d, 0x11, 0xcb, 0xaa, 0x02, 0xce, 0xf3, 0x53, 0x11, 0xd7, 0x77, 0x1a, 0x47, 0xd1, 0xe1, 0x27, 0xcf, 0xf4, 0x6d, 0xcf, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3356 = { .name = "ecdsa_secp224r1_sha256_3356", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3356_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3356_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3356_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3357 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3357_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3357_msg[] = { 0x33, 0x34, 0x34, 0x37, 0x32, 0x35, 0x33, 0x33, 0x34, 0x33, }; static const unsigned char ecdsa_secp224r1_sha256_3357_sig[] = { 0x5c, 0x00, 0xdb, 0x60, 0x17, 0x8c, 0x83, 0x61, 0x09, 0x2b, 0xdf, 0xb4, 0x7f, 0xc9, 0xa4, 0x7b, 0x33, 0x36, 0x3d, 0x7e, 0x0d, 0x76, 0xe3, 0x25, 0x20, 0xf7, 0x96, 0x57, 0xe1, 0xba, 0xf7, 0xae, 0x7d, 0x81, 0x04, 0x57, 0x93, 0xc7, 0x31, 0x73, 0xf4, 0x9d, 0x60, 0xbd, 0xfc, 0x87, 0x79, 0x94, 0x27, 0x95, 0xd9, 0xd0, 0x82, 0xb3, 0xca, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3357 = { .name = "ecdsa_secp224r1_sha256_3357", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3357_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3357_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3357_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3358 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3358_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3358_msg[] = { 0x33, 0x36, 0x38, 0x32, 0x36, 0x34, 0x33, 0x31, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3358_sig[] = { 0x46, 0xf6, 0x9b, 0x6a, 0x99, 0x71, 0x79, 0x49, 0xee, 0xe7, 0x40, 0x92, 0xa0, 0xc1, 0x43, 0x8a, 0x29, 0x0a, 0x2c, 0xd8, 0x2f, 0xe1, 0xe1, 0x0d, 0x8f, 0x37, 0xe8, 0x8b, 0x99, 0xa5, 0xf5, 0x9f, 0x09, 0xbd, 0x98, 0x0a, 0x06, 0x62, 0x33, 0x52, 0x33, 0x97, 0x84, 0x69, 0x87, 0xa8, 0xa1, 0xbf, 0xdd, 0xe3, 0x55, 0x06, 0x2d, 0x14, 0x0a, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3358 = { .name = "ecdsa_secp224r1_sha256_3358", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3358_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3358_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3358_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3359 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3359_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3359_msg[] = { 0x33, 0x32, 0x36, 0x31, 0x31, 0x39, 0x38, 0x36, 0x30, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3359_sig[] = { 0xe6, 0x43, 0xd8, 0x08, 0x5a, 0x22, 0x70, 0x6f, 0xa0, 0xe6, 0x54, 0x0f, 0x3d, 0x5e, 0x16, 0x9a, 0xd8, 0xcc, 0x49, 0xb4, 0xbf, 0xe9, 0x8e, 0x32, 0x53, 0x21, 0xc7, 0x05, 0xf9, 0x5b, 0xd4, 0x23, 0xf9, 0xca, 0xfe, 0x0c, 0xed, 0xfe, 0xc6, 0xfd, 0x97, 0x87, 0x15, 0x36, 0xd7, 0x1b, 0x2a, 0xc5, 0x8d, 0xfb, 0x2f, 0x7a, 0xb8, 0x95, 0x2d, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3359 = { .name = "ecdsa_secp224r1_sha256_3359", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3359_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3359_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3359_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3360 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3360_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3360_msg[] = { 0x39, 0x36, 0x37, 0x38, 0x37, 0x38, 0x31, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3360_sig[] = { 0xe6, 0x5f, 0xb9, 0xbc, 0xdd, 0x79, 0x1f, 0x14, 0x1c, 0xcf, 0xf2, 0xb3, 0xcf, 0xbf, 0x45, 0xd8, 0x4f, 0x8c, 0x62, 0x72, 0x02, 0x1a, 0x68, 0xdd, 0xe8, 0xc3, 0x6b, 0xc8, 0xdf, 0x6e, 0x08, 0xc7, 0x4b, 0x5e, 0x36, 0xb7, 0x77, 0x26, 0x58, 0xf0, 0x25, 0x15, 0xae, 0x0e, 0xa8, 0x13, 0xb6, 0x4d, 0xf2, 0x4f, 0x35, 0x22, 0xea, 0x15, 0xfb, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3360 = { .name = "ecdsa_secp224r1_sha256_3360", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3360_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3360_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3360_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3361 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3361_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3361_msg[] = { 0x34, 0x39, 0x35, 0x38, 0x38, 0x32, 0x33, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha256_3361_sig[] = { 0xa4, 0x76, 0xd4, 0x68, 0x22, 0x1e, 0xf5, 0x56, 0x11, 0xe8, 0xa7, 0x24, 0xc9, 0xb4, 0xcd, 0x79, 0xc3, 0x4f, 0x69, 0x40, 0xd5, 0xf6, 0x65, 0xe3, 0x33, 0x5f, 0x62, 0x31, 0xbf, 0xdd, 0xc1, 0x8e, 0x7a, 0x00, 0x8b, 0xc2, 0x06, 0xc8, 0xe1, 0xca, 0x6c, 0x87, 0x83, 0x63, 0xe4, 0x13, 0x85, 0x08, 0xe0, 0xc3, 0xa8, 0x4a, 0x27, 0xea, 0xbe, 0x35, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3361 = { .name = "ecdsa_secp224r1_sha256_3361", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3361_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3361_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3361_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3362 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3362_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3362_msg[] = { 0x38, 0x32, 0x34, 0x36, 0x33, 0x37, 0x38, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha256_3362_sig[] = { 0x1b, 0x39, 0x34, 0x77, 0x94, 0x18, 0x79, 0x27, 0x18, 0x73, 0xa8, 0xc0, 0x43, 0xa7, 0x7c, 0xaa, 0xdb, 0x99, 0x57, 0xfc, 0xdd, 0x26, 0x3a, 0x6a, 0xc9, 0x78, 0xe4, 0xba, 0x27, 0x00, 0x60, 0xd5, 0xf3, 0x56, 0xeb, 0xb6, 0xd1, 0x85, 0x77, 0x2b, 0xaa, 0x78, 0xb8, 0x78, 0xaf, 0x68, 0x07, 0x37, 0x8e, 0x0d, 0x5c, 0x53, 0x2d, 0xa0, 0xa4, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3362 = { .name = "ecdsa_secp224r1_sha256_3362", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3362_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3362_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3362_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3363 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3363_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3363_msg[] = { 0x31, 0x31, 0x30, 0x32, 0x30, 0x38, 0x33, 0x33, 0x37, 0x37, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3363_sig[] = { 0xb2, 0xed, 0xa8, 0xc9, 0x69, 0xd4, 0xb1, 0xbd, 0xd3, 0x18, 0x67, 0xfd, 0x1f, 0x92, 0xd5, 0x47, 0xb4, 0x06, 0x84, 0x0c, 0x25, 0x7f, 0x2f, 0x80, 0xdf, 0xbd, 0xc4, 0xe3, 0xe6, 0x29, 0x7b, 0x05, 0x9c, 0xe6, 0x4e, 0xf0, 0x4d, 0xe9, 0x71, 0x5a, 0x8f, 0x68, 0x6a, 0x9f, 0x73, 0x98, 0x08, 0x65, 0x06, 0x6a, 0x94, 0x97, 0x5b, 0x7f, 0x81, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3363 = { .name = "ecdsa_secp224r1_sha256_3363", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3363_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3363_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3363_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3364 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3364_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3364_msg[] = { 0x31, 0x33, 0x33, 0x38, 0x37, 0x31, 0x36, 0x34, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3364_sig[] = { 0x93, 0x81, 0x89, 0xa1, 0x8a, 0x4b, 0xff, 0x57, 0x12, 0xac, 0x99, 0xc2, 0xb8, 0xe9, 0x2c, 0x21, 0x8a, 0xf3, 0xe4, 0xd4, 0xe3, 0xa8, 0x4b, 0x90, 0x6b, 0x0f, 0x70, 0x4e, 0x7b, 0xb3, 0xe5, 0x38, 0xf0, 0xb7, 0x06, 0x64, 0xda, 0xd4, 0x62, 0xab, 0x14, 0xb0, 0xed, 0x41, 0x6c, 0x86, 0xac, 0x6e, 0x90, 0x60, 0xfe, 0x76, 0x0d, 0xab, 0xb7, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3364 = { .name = "ecdsa_secp224r1_sha256_3364", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3364_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3364_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3364_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3365 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3365_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3365_msg[] = { 0x33, 0x32, 0x32, 0x31, 0x34, 0x34, 0x31, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3365_sig[] = { 0xbb, 0x7c, 0x1d, 0x81, 0x20, 0xd2, 0xaa, 0x77, 0x65, 0xb1, 0x6e, 0xea, 0xc4, 0x42, 0x82, 0xde, 0x60, 0x5f, 0xb2, 0xa1, 0x66, 0x56, 0x57, 0xde, 0xa4, 0x49, 0x29, 0x35, 0xe0, 0xa8, 0xad, 0xb3, 0xa1, 0x43, 0x88, 0x3f, 0x98, 0x1e, 0xa1, 0x32, 0x3f, 0xa6, 0xf1, 0xd3, 0x47, 0x84, 0x5b, 0xe2, 0xb8, 0xdc, 0xc6, 0xcd, 0x5c, 0xc9, 0x3e, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3365 = { .name = "ecdsa_secp224r1_sha256_3365", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3365_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3365_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3365_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3366 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3366_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3366_msg[] = { 0x31, 0x30, 0x36, 0x38, 0x36, 0x36, 0x35, 0x35, 0x35, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3366_sig[] = { 0x74, 0xa4, 0xc5, 0x1d, 0xd6, 0x0c, 0x71, 0x18, 0x46, 0x7b, 0xe2, 0x96, 0x52, 0x06, 0x0f, 0x39, 0xaf, 0x94, 0xf8, 0xc0, 0xeb, 0x7f, 0x15, 0xc6, 0x47, 0x71, 0x01, 0x0c, 0x61, 0x02, 0xec, 0x0c, 0x92, 0x57, 0xe6, 0x07, 0xaf, 0x3f, 0x3f, 0xf7, 0x49, 0x0b, 0x54, 0xe7, 0x81, 0x11, 0xf4, 0x22, 0xbe, 0xc1, 0x1b, 0xa0, 0x12, 0x77, 0x17, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3366 = { .name = "ecdsa_secp224r1_sha256_3366", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3366_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3366_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha256_3366_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3367 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3367_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3367_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x35, 0x32, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3367_sig[] = { 0x62, 0x5d, 0xa1, 0x8d, 0x67, 0x6f, 0x02, 0xfa, 0xe9, 0xdb, 0xcb, 0x30, 0x92, 0x26, 0x59, 0x09, 0x48, 0x8f, 0xb9, 0x5d, 0x66, 0x25, 0x69, 0xd7, 0x74, 0x6b, 0x96, 0x87, 0xc4, 0xf1, 0xec, 0x83, 0x1e, 0x36, 0x60, 0x4d, 0x60, 0x4b, 0x63, 0x0f, 0xd0, 0xb1, 0x99, 0x9c, 0xd0, 0x99, 0x60, 0x86, 0x22, 0x94, 0x25, 0x1d, 0x85, 0xe5, 0x87, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3367 = { .name = "ecdsa_secp224r1_sha256_3367", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3367_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3367_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha256_3367_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3368 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3368_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3368_msg[] = { 0x37, 0x30, 0x33, 0x30, 0x38, 0x31, 0x38, 0x37, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3368_sig[] = { 0x8e, 0xe0, 0xd4, 0xa3, 0x1f, 0xd1, 0xc4, 0xd8, 0x54, 0xd7, 0x5c, 0x14, 0x15, 0x19, 0x26, 0x89, 0x9d, 0xde, 0x1c, 0x73, 0x32, 0xfd, 0x47, 0x69, 0x44, 0x3d, 0x21, 0x3d, 0x4b, 0x82, 0x78, 0xb8, 0x9b, 0xa4, 0xf8, 0xfb, 0xd7, 0xdc, 0xc6, 0xaf, 0xfe, 0x4c, 0x12, 0x15, 0x6f, 0x74, 0x09, 0x90, 0x94, 0x16, 0x98, 0x96, 0x85, 0xdd, 0x5a, 0x39, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3368 = { .name = "ecdsa_secp224r1_sha256_3368", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3368_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3368_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3368_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3369 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3369_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3369_msg[] = { 0x35, 0x39, 0x32, 0x34, 0x35, 0x32, 0x33, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3369_sig[] = { 0xbd, 0xde, 0x45, 0xfc, 0x9e, 0xbb, 0x37, 0x49, 0xc9, 0xfb, 0x2c, 0x25, 0xbf, 0x02, 0xe2, 0xa2, 0x17, 0xcc, 0xc1, 0x12, 0xf8, 0xe6, 0x54, 0x99, 0xee, 0xff, 0xb6, 0xa1, 0xbe, 0xcd, 0x6b, 0x88, 0xef, 0x2b, 0xee, 0x87, 0x2e, 0xbc, 0x0e, 0x2b, 0x80, 0x5a, 0x56, 0x06, 0x6e, 0x19, 0x17, 0x9f, 0xce, 0x9f, 0x0d, 0xc0, 0xdf, 0x3f, 0x63, 0x78, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3369 = { .name = "ecdsa_secp224r1_sha256_3369", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3369_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3369_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3369_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3370 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3370_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3370_msg[] = { 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, 0x36, 0x36, 0x32, 0x31, }; static const unsigned char ecdsa_secp224r1_sha256_3370_sig[] = { 0x50, 0x18, 0x6e, 0x02, 0x3a, 0x1f, 0x50, 0x53, 0xfc, 0xb4, 0xd0, 0x47, 0x30, 0x39, 0xb1, 0xb2, 0xcd, 0xeb, 0xa5, 0x69, 0x71, 0x9a, 0x4e, 0xba, 0xbd, 0xd6, 0x75, 0xc8, 0xf8, 0xfb, 0x89, 0x3c, 0x1b, 0x6b, 0x5b, 0x82, 0x7b, 0x5f, 0x3f, 0x4b, 0xb5, 0xea, 0xb7, 0x5b, 0x62, 0x12, 0xbb, 0x56, 0xa5, 0xa3, 0x9b, 0xb3, 0x5c, 0x12, 0x7a, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3370 = { .name = "ecdsa_secp224r1_sha256_3370", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3370_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3370_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3370_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3371 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3371_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3371_msg[] = { 0x34, 0x30, 0x30, 0x35, 0x33, 0x31, 0x34, 0x34, 0x30, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3371_sig[] = { 0xd3, 0xb4, 0x54, 0x63, 0x9b, 0x0f, 0xb3, 0xda, 0x93, 0xb2, 0x0d, 0x55, 0xbe, 0x86, 0x09, 0xe4, 0x09, 0x02, 0xcb, 0x4a, 0x60, 0x8f, 0x3b, 0x90, 0x64, 0xc0, 0xde, 0xb7, 0xec, 0x7a, 0xa9, 0x63, 0x7f, 0xd7, 0x1b, 0x54, 0x3e, 0x52, 0x43, 0xfa, 0xab, 0x4c, 0x7a, 0x2e, 0xdc, 0x2c, 0x48, 0xe9, 0x82, 0xc5, 0xac, 0x01, 0x78, 0x07, 0xf1, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3371 = { .name = "ecdsa_secp224r1_sha256_3371", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3371_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3371_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3371_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3372 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3372_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3372_msg[] = { 0x33, 0x30, 0x39, 0x36, 0x34, 0x35, 0x37, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3372_sig[] = { 0xc2, 0x02, 0xab, 0xbd, 0x98, 0xe0, 0x38, 0x09, 0xde, 0x84, 0x2b, 0xde, 0xf2, 0x68, 0xa1, 0xc6, 0x16, 0xa7, 0x30, 0x6d, 0xa6, 0x9a, 0x87, 0xab, 0xaf, 0x03, 0x16, 0x9c, 0x7e, 0x7e, 0x04, 0x82, 0x3a, 0xf8, 0xed, 0x68, 0x36, 0xfd, 0x2a, 0xc0, 0x11, 0xe4, 0x7d, 0xe8, 0xe1, 0xbe, 0xf9, 0x1e, 0xd1, 0xda, 0x51, 0x44, 0x89, 0x3f, 0xc2, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3372 = { .name = "ecdsa_secp224r1_sha256_3372", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3372_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3372_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3372_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3373 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3373_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3373_msg[] = { 0x32, 0x37, 0x38, 0x34, 0x30, 0x32, 0x35, 0x36, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3373_sig[] = { 0x2e, 0x4b, 0x76, 0x63, 0x88, 0x16, 0xcc, 0xe0, 0x57, 0xa4, 0xa2, 0x7a, 0x49, 0x25, 0x8d, 0xcb, 0x54, 0x37, 0xae, 0x97, 0x73, 0x9f, 0x27, 0xeb, 0xc0, 0x97, 0x3c, 0x0b, 0xe9, 0xf6, 0xc0, 0xb6, 0x4e, 0x76, 0x4a, 0xd3, 0x9d, 0xd9, 0x2b, 0x57, 0x6e, 0x11, 0xc2, 0x3e, 0x59, 0x94, 0xb0, 0x20, 0x95, 0xcb, 0x2a, 0x47, 0x20, 0xc8, 0x66, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3373 = { .name = "ecdsa_secp224r1_sha256_3373", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3373_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3373_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3373_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3374 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3374_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3374_msg[] = { 0x32, 0x36, 0x31, 0x38, 0x37, 0x38, 0x37, 0x34, 0x31, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3374_sig[] = { 0x7e, 0x0f, 0x48, 0x76, 0x10, 0x89, 0xaa, 0x4c, 0x7e, 0xcd, 0x5a, 0x7a, 0xc5, 0x38, 0x08, 0x36, 0xb1, 0xe5, 0xd3, 0x81, 0xd3, 0x40, 0x01, 0x74, 0xd1, 0x5d, 0xf9, 0x8b, 0x0c, 0x3d, 0xf5, 0x00, 0x60, 0xe3, 0xa6, 0x71, 0x4a, 0xa5, 0x65, 0xa3, 0x3d, 0x78, 0x4e, 0x7b, 0x16, 0xac, 0x87, 0xbe, 0xbf, 0xb3, 0xc2, 0x25, 0x5c, 0xfd, 0x83, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3374 = { .name = "ecdsa_secp224r1_sha256_3374", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3374_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3374_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3374_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3375 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3375_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3375_msg[] = { 0x31, 0x36, 0x34, 0x32, 0x36, 0x32, 0x35, 0x32, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha256_3375_sig[] = { 0x4d, 0x6f, 0x74, 0x08, 0x50, 0x8e, 0xb0, 0x81, 0x4d, 0xcd, 0x48, 0x00, 0x7f, 0x0e, 0xfd, 0x9e, 0x2b, 0x91, 0xcd, 0xac, 0x40, 0x30, 0x54, 0x0c, 0xc6, 0x78, 0xde, 0x19, 0x1e, 0x74, 0xf8, 0xdc, 0x34, 0xd1, 0x36, 0x13, 0xef, 0x42, 0x46, 0x2f, 0xe8, 0x89, 0x81, 0xcb, 0xe2, 0x48, 0x9b, 0xe1, 0x0e, 0x4c, 0xda, 0xe9, 0x75, 0xa1, 0xb3, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3375 = { .name = "ecdsa_secp224r1_sha256_3375", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3375_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3375_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3375_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3376 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3376_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3376_msg[] = { 0x36, 0x38, 0x32, 0x34, 0x31, 0x38, 0x39, 0x34, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha256_3376_sig[] = { 0x96, 0x7f, 0x2c, 0x5d, 0x30, 0x4c, 0x79, 0x32, 0xea, 0xaa, 0x16, 0x82, 0x19, 0x79, 0x45, 0xe6, 0x6c, 0xc9, 0x12, 0xb7, 0x03, 0x82, 0x47, 0x76, 0xef, 0x16, 0xad, 0x7a, 0x73, 0x95, 0x70, 0x01, 0xd9, 0x03, 0x7c, 0x63, 0xd6, 0x47, 0x1c, 0x80, 0x9a, 0x23, 0x88, 0x38, 0x3a, 0xd6, 0x95, 0x13, 0x7c, 0x62, 0x2c, 0xd5, 0xf5, 0x58, 0x44, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3376 = { .name = "ecdsa_secp224r1_sha256_3376", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3376_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3376_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha256_3376_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3377 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3377_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3377_msg[] = { 0x34, 0x38, 0x34, 0x32, 0x34, 0x35, 0x34, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha256_3377_sig[] = { 0x49, 0x26, 0x08, 0x04, 0xbb, 0x2c, 0xea, 0xe4, 0xb9, 0xce, 0xe6, 0x3b, 0x02, 0xea, 0x60, 0x17, 0x3e, 0xc3, 0xf4, 0xf9, 0x01, 0x67, 0x62, 0x7c, 0x0b, 0xb3, 0x98, 0x88, 0xc9, 0xeb, 0x02, 0x2f, 0x96, 0xdb, 0x3e, 0x90, 0xfe, 0x0f, 0xf6, 0x17, 0x73, 0x0a, 0x62, 0x9f, 0x34, 0x2e, 0x02, 0xfb, 0x20, 0x8d, 0x68, 0x36, 0xcb, 0xbd, 0xc7, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3377 = { .name = "ecdsa_secp224r1_sha256_3377", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3377_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3377_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha256_3377_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3378 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3378_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha256_3378_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3378_sig[] = { 0xf3, 0xe7, 0x12, 0x59, 0x7a, 0x4b, 0x22, 0x63, 0x2c, 0x5f, 0x8e, 0xb9, 0xf2, 0x84, 0x58, 0x82, 0xbb, 0x03, 0xa1, 0x39, 0x73, 0x5f, 0x80, 0xaf, 0x88, 0x26, 0xfc, 0x56, 0x62, 0x86, 0x5b, 0xd9, 0x1c, 0x09, 0x03, 0x51, 0x1a, 0x48, 0x1d, 0x60, 0x7e, 0xb6, 0xb5, 0xfe, 0x28, 0xf6, 0xf6, 0xc8, 0x92, 0x95, 0x68, 0x1a, 0x3e, 0x8d, 0x55, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3378 = { .name = "ecdsa_secp224r1_sha256_3378", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3378_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3378_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3378_sig, .siglen = 56, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 285 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3379 for ECDSA, tcId is 286 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3379_pubkey[] = { 0x93, 0xb4, 0xc2, 0x8f, 0x03, 0x2d, 0x00, 0xf8, 0x0e, 0x77, 0x49, 0x1e, 0xdc, 0x15, 0x83, 0x59, 0x90, 0x9e, 0xe9, 0xe3, 0x0a, 0x73, 0x27, 0xb7, 0x42, 0x19, 0xe5, 0xe2, 0x48, 0x2c, 0x19, 0xae, 0x35, 0xcb, 0x28, 0xaf, 0xc9, 0xb9, 0x5c, 0xa1, 0xed, 0x7a, 0xd9, 0x1c, 0x81, 0x2d, 0x5f, 0xcc, 0xeb, 0x4b, 0xed, 0xdb, 0xf1, 0xa1, 0x6d, 0x92, }; static const unsigned char ecdsa_secp224r1_sha256_3379_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3379_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3379 = { .name = "ecdsa_secp224r1_sha256_3379", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3379_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3379_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3379_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 286 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3380 for ECDSA, tcId is 287 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3380_pubkey[] = { 0x93, 0xb4, 0xc2, 0x8f, 0x03, 0x2d, 0x00, 0xf8, 0x0e, 0x77, 0x49, 0x1e, 0xdc, 0x15, 0x83, 0x59, 0x90, 0x9e, 0xe9, 0xe3, 0x0a, 0x73, 0x27, 0xb7, 0x42, 0x19, 0xe5, 0xe2, 0x48, 0x2c, 0x19, 0xae, 0x35, 0xcb, 0x28, 0xaf, 0xc9, 0xb9, 0x5c, 0xa1, 0xed, 0x7a, 0xd9, 0x1c, 0x81, 0x2d, 0x5f, 0xcc, 0xeb, 0x4b, 0xed, 0xdb, 0xf1, 0xa1, 0x6d, 0x92, }; static const unsigned char ecdsa_secp224r1_sha256_3380_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3380_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3380 = { .name = "ecdsa_secp224r1_sha256_3380", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3380_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3380_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3380_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 287 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3381 for ECDSA, tcId is 288 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3381_pubkey[] = { 0xda, 0x92, 0x7f, 0x4b, 0xa8, 0x8b, 0x63, 0x9b, 0xf5, 0x33, 0x42, 0x21, 0xd2, 0xf5, 0x4d, 0x8e, 0xf9, 0xcc, 0xc1, 0xa1, 0x12, 0x5f, 0xad, 0x18, 0xc7, 0xbf, 0xb7, 0x89, 0xac, 0x51, 0xae, 0x53, 0xde, 0x6d, 0x83, 0x4a, 0x9d, 0xb3, 0x94, 0x7b, 0x8d, 0xd4, 0xc6, 0xac, 0x2b, 0x08, 0x4b, 0x85, 0x49, 0x6b, 0xfa, 0x72, 0xd8, 0x6b, 0x69, 0x48, }; static const unsigned char ecdsa_secp224r1_sha256_3381_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3381_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3381 = { .name = "ecdsa_secp224r1_sha256_3381", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3381_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3381_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3381_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 288 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3382 for ECDSA, tcId is 289 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3382_pubkey[] = { 0x20, 0x88, 0x8e, 0x1c, 0x0f, 0x56, 0x94, 0xc4, 0xc0, 0x36, 0x3b, 0x36, 0x48, 0x2b, 0xeb, 0x6e, 0x1e, 0x66, 0x49, 0xb3, 0xd3, 0xb2, 0x6f, 0x12, 0x7f, 0xeb, 0xb6, 0xfc, 0xde, 0x00, 0xc2, 0xf3, 0xd8, 0xe4, 0xa7, 0xe8, 0xa0, 0xba, 0xfd, 0x41, 0x7c, 0x96, 0xd3, 0xe8, 0x1c, 0x97, 0x59, 0x46, 0xa2, 0xf3, 0x68, 0x6a, 0xa3, 0x9d, 0x35, 0xf1, }; static const unsigned char ecdsa_secp224r1_sha256_3382_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3382_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3382 = { .name = "ecdsa_secp224r1_sha256_3382", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3382_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3382_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3382_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 289 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3383 for ECDSA, tcId is 290 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3383_pubkey[] = { 0x95, 0x45, 0xc8, 0x6f, 0x03, 0x2c, 0x5d, 0xf2, 0x55, 0xa4, 0x49, 0x0b, 0xb0, 0xb8, 0x3e, 0xca, 0x20, 0x11, 0x81, 0x79, 0x2a, 0xd7, 0x42, 0x46, 0x87, 0x4d, 0xb2, 0x29, 0x40, 0x52, 0x64, 0xc2, 0x83, 0x06, 0x33, 0x27, 0xb7, 0x0f, 0x4c, 0x2b, 0xe5, 0xab, 0x4d, 0x2e, 0x94, 0x07, 0xb8, 0x66, 0xe1, 0x21, 0xd6, 0x14, 0x5d, 0x12, 0x4c, 0x04, }; static const unsigned char ecdsa_secp224r1_sha256_3383_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3383_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3383 = { .name = "ecdsa_secp224r1_sha256_3383", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3383_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3383_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3383_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 290 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3384 for ECDSA, tcId is 291 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3384_pubkey[] = { 0x57, 0x9d, 0x53, 0xf3, 0x9d, 0x51, 0x09, 0xbd, 0x44, 0x0e, 0x3e, 0x3e, 0x7e, 0xfd, 0x60, 0x37, 0x40, 0x96, 0x33, 0x48, 0xff, 0x9c, 0x72, 0xc0, 0x3b, 0x0f, 0xe6, 0xb8, 0xdf, 0x02, 0xf1, 0x33, 0xec, 0xd6, 0x0b, 0x07, 0x2a, 0x08, 0x12, 0xad, 0xc7, 0x52, 0x70, 0x8f, 0x2b, 0xe9, 0xd8, 0xc9, 0xad, 0x59, 0x53, 0xd8, 0xc7, 0xbf, 0x39, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3384_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3384_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3384 = { .name = "ecdsa_secp224r1_sha256_3384", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3384_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3384_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3384_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 291 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3385 for ECDSA, tcId is 292 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3385_pubkey[] = { 0xd2, 0xa1, 0x4c, 0x81, 0x06, 0xd8, 0x9f, 0x35, 0x36, 0xfa, 0xeb, 0xda, 0xfc, 0xd4, 0x68, 0x0f, 0x65, 0xab, 0x4b, 0xf2, 0x24, 0x31, 0x64, 0xca, 0x14, 0x64, 0xb6, 0x28, 0xac, 0xaf, 0x2b, 0xee, 0x52, 0xe6, 0x23, 0x1d, 0x3c, 0x98, 0x0f, 0x52, 0xf8, 0xe1, 0x89, 0xa4, 0x1c, 0x3e, 0x3a, 0x05, 0xe5, 0x91, 0x19, 0x5e, 0xc8, 0x64, 0x21, 0x7a, }; static const unsigned char ecdsa_secp224r1_sha256_3385_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3385_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3385 = { .name = "ecdsa_secp224r1_sha256_3385", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3385_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3385_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3385_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 292 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3386 for ECDSA, tcId is 293 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3386_pubkey[] = { 0xe8, 0x92, 0x47, 0x91, 0x53, 0xad, 0x13, 0xea, 0x5c, 0xa4, 0x5d, 0x4c, 0x32, 0x3e, 0xbf, 0x1f, 0xc3, 0xcd, 0x0c, 0xdf, 0x78, 0x7c, 0x34, 0x30, 0x6a, 0x3f, 0x79, 0xa4, 0x32, 0x6c, 0xa9, 0x64, 0x5f, 0x2b, 0x51, 0x76, 0x08, 0xdc, 0x1f, 0x08, 0xb7, 0xa8, 0x4c, 0xfc, 0x61, 0xe6, 0xff, 0x68, 0xd1, 0x4f, 0x27, 0xd2, 0x04, 0x3c, 0x7e, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3386_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3386_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3386 = { .name = "ecdsa_secp224r1_sha256_3386", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3386_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3386_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3386_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 293 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3387 for ECDSA, tcId is 294 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3387_pubkey[] = { 0xe8, 0x92, 0x47, 0x91, 0x53, 0xad, 0x13, 0xea, 0x5c, 0xa4, 0x5d, 0x4c, 0x32, 0x3e, 0xbf, 0x1f, 0xc3, 0xcd, 0x0c, 0xdf, 0x78, 0x7c, 0x34, 0x30, 0x6a, 0x3f, 0x79, 0xa4, 0x32, 0x6c, 0xa9, 0x64, 0x5f, 0x2b, 0x51, 0x76, 0x08, 0xdc, 0x1f, 0x08, 0xb7, 0xa8, 0x4c, 0xfc, 0x61, 0xe6, 0xff, 0x68, 0xd1, 0x4f, 0x27, 0xd2, 0x04, 0x3c, 0x7e, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3387_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3387_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3387 = { .name = "ecdsa_secp224r1_sha256_3387", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3387_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3387_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3387_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 294 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3388 for ECDSA, tcId is 295 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3388_pubkey[] = { 0x2b, 0x0e, 0xac, 0x35, 0xc0, 0xb2, 0x94, 0xf6, 0xd4, 0x35, 0xdc, 0xaf, 0xfa, 0x86, 0x33, 0xb0, 0x12, 0x30, 0x05, 0x46, 0x5c, 0x30, 0x08, 0x0a, 0xdb, 0xcc, 0x10, 0x3a, 0xd4, 0x65, 0xa6, 0x3b, 0xfb, 0x71, 0xd4, 0xae, 0xe0, 0x93, 0x28, 0x69, 0x7f, 0xe1, 0x08, 0x87, 0x53, 0x64, 0x6d, 0x83, 0x69, 0xb8, 0xdc, 0x10, 0x32, 0x17, 0xc2, 0x19, }; static const unsigned char ecdsa_secp224r1_sha256_3388_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3388_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3388 = { .name = "ecdsa_secp224r1_sha256_3388", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3388_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3388_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3388_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 295 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3389 for ECDSA, tcId is 296 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3389_pubkey[] = { 0xd1, 0x56, 0xe0, 0x1e, 0x33, 0xbe, 0xce, 0xde, 0x8f, 0x4f, 0xb4, 0xae, 0x95, 0x21, 0xd7, 0x51, 0xe7, 0xf8, 0xeb, 0x79, 0x5c, 0xa0, 0x08, 0x57, 0xdb, 0x2f, 0xd7, 0xaf, 0xd7, 0x3a, 0x45, 0x0e, 0xc6, 0x0e, 0x6a, 0x92, 0x18, 0xa8, 0x43, 0x18, 0x70, 0x68, 0x7e, 0x09, 0x68, 0x94, 0x4f, 0x6d, 0xc5, 0xff, 0xeb, 0x30, 0xe4, 0x69, 0x3b, 0x7c, }; static const unsigned char ecdsa_secp224r1_sha256_3389_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3389_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3389 = { .name = "ecdsa_secp224r1_sha256_3389", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3389_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3389_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3389_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 296 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3390 for ECDSA, tcId is 297 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3390_pubkey[] = { 0xf2, 0x93, 0xa8, 0xa2, 0xb4, 0xaf, 0xf0, 0xbe, 0xd9, 0x5c, 0x66, 0x3b, 0x36, 0x4a, 0xfe, 0x69, 0x77, 0x8d, 0x38, 0xdd, 0x7e, 0x7a, 0x30, 0x4f, 0x7d, 0x3c, 0x74, 0xe6, 0x17, 0xdf, 0xd0, 0x9e, 0x78, 0x03, 0xc4, 0x43, 0x9a, 0x6c, 0x07, 0x5c, 0xb5, 0x79, 0xcd, 0xe6, 0x52, 0xd0, 0x3f, 0x75, 0x59, 0xff, 0x58, 0x84, 0x63, 0x12, 0xfa, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha256_3390_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3390_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3390 = { .name = "ecdsa_secp224r1_sha256_3390", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3390_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3390_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3390_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 297 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3391 for ECDSA, tcId is 298 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3391_pubkey[] = { 0xd4, 0xdd, 0xf0, 0x03, 0xb2, 0x98, 0xcb, 0xaa, 0x7d, 0x2e, 0xdc, 0x58, 0x4b, 0x28, 0xb4, 0x74, 0xa7, 0x61, 0x62, 0xed, 0x4b, 0x5b, 0x0f, 0x62, 0x22, 0xc5, 0x43, 0x17, 0xd4, 0xe4, 0xfe, 0x03, 0x0f, 0x17, 0x8f, 0xb4, 0xaa, 0x4a, 0x6d, 0x7f, 0x61, 0x26, 0x5e, 0xcd, 0x7e, 0xf1, 0x3c, 0x31, 0x36, 0x06, 0xb8, 0xd3, 0x41, 0xa8, 0xb9, 0x54, }; static const unsigned char ecdsa_secp224r1_sha256_3391_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3391_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3391 = { .name = "ecdsa_secp224r1_sha256_3391", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3391_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3391_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3391_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 298 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3392 for ECDSA, tcId is 299 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3392_pubkey[] = { 0x8a, 0x5b, 0xf0, 0x02, 0x8f, 0x1e, 0x3e, 0xb6, 0x84, 0x1d, 0xee, 0x7b, 0x8f, 0x87, 0x3f, 0x68, 0xb0, 0xc5, 0x60, 0xe5, 0x92, 0xe3, 0x18, 0x20, 0x74, 0xf5, 0x1c, 0xe8, 0x96, 0x68, 0xc3, 0x22, 0x24, 0xb6, 0x5b, 0x68, 0x49, 0x71, 0x3d, 0x35, 0xe3, 0xac, 0xf1, 0x78, 0x68, 0x62, 0xe6, 0x5b, 0x5a, 0x66, 0x4b, 0x47, 0xa0, 0x98, 0xca, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha256_3392_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3392_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3392 = { .name = "ecdsa_secp224r1_sha256_3392", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3392_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3392_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3392_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 299 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3393 for ECDSA, tcId is 300 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3393_pubkey[] = { 0xb5, 0x3e, 0x56, 0x9b, 0x18, 0xe9, 0x36, 0x15, 0x67, 0xe5, 0x71, 0x3e, 0xe6, 0x9e, 0xcb, 0xe7, 0x94, 0x99, 0x11, 0xb0, 0x25, 0x75, 0x46, 0xa2, 0x4c, 0x3d, 0xd1, 0x37, 0xf2, 0x9a, 0x83, 0x33, 0x4c, 0xff, 0x1c, 0x44, 0xd8, 0xc0, 0xc3, 0x3b, 0x6d, 0xad, 0xb8, 0x56, 0x8c, 0x02, 0x4f, 0xa1, 0xfb, 0xb6, 0x94, 0xcd, 0x9e, 0x70, 0x5f, 0x5a, }; static const unsigned char ecdsa_secp224r1_sha256_3393_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3393_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3393 = { .name = "ecdsa_secp224r1_sha256_3393", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3393_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3393_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3393_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 300 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3394 for ECDSA, tcId is 301 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3394_pubkey[] = { 0x77, 0xf3, 0xeb, 0xf5, 0x27, 0x25, 0xc8, 0x09, 0xac, 0xbb, 0x19, 0xad, 0xf0, 0x93, 0x12, 0x6a, 0x2a, 0x3a, 0x06, 0x5c, 0xa6, 0x54, 0xc2, 0x20, 0x99, 0xc9, 0x78, 0x12, 0x9f, 0x19, 0x48, 0xd2, 0x3c, 0x51, 0x58, 0xec, 0x2a, 0xdf, 0xf4, 0x55, 0xeb, 0x2f, 0xed, 0xf1, 0x07, 0x5d, 0x4e, 0xc2, 0x2d, 0x66, 0x09, 0x77, 0x42, 0x4a, 0x10, 0xf7, }; static const unsigned char ecdsa_secp224r1_sha256_3394_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3394_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3394 = { .name = "ecdsa_secp224r1_sha256_3394", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3394_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3394_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3394_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 301 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3395 for ECDSA, tcId is 302 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3395_pubkey[] = { 0xa7, 0xf7, 0xb9, 0x9e, 0x5c, 0xdc, 0x6f, 0xec, 0x89, 0x28, 0xef, 0xf7, 0x73, 0xcc, 0xdf, 0x3b, 0x68, 0xb1, 0x9d, 0x43, 0xcd, 0xb4, 0x18, 0x09, 0xe1, 0x9c, 0x60, 0xf3, 0x17, 0x36, 0xb7, 0xa0, 0xc1, 0x2a, 0x9c, 0x2d, 0x70, 0x66, 0x71, 0x91, 0x29, 0x15, 0x14, 0x2b, 0x3e, 0x05, 0xc8, 0x9e, 0xf3, 0xad, 0x49, 0x7b, 0xd6, 0xc3, 0x46, 0x99, }; static const unsigned char ecdsa_secp224r1_sha256_3395_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3395_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3395 = { .name = "ecdsa_secp224r1_sha256_3395", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3395_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3395_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3395_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 302 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3396 for ECDSA, tcId is 303 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3396_pubkey[] = { 0xa7, 0xf7, 0xb9, 0x9e, 0x5c, 0xdc, 0x6f, 0xec, 0x89, 0x28, 0xef, 0xf7, 0x73, 0xcc, 0xdf, 0x3b, 0x68, 0xb1, 0x9d, 0x43, 0xcd, 0xb4, 0x18, 0x09, 0xe1, 0x9c, 0x60, 0xf3, 0x17, 0x36, 0xb7, 0xa0, 0xc1, 0x2a, 0x9c, 0x2d, 0x70, 0x66, 0x71, 0x91, 0x29, 0x15, 0x14, 0x2b, 0x3e, 0x05, 0xc8, 0x9e, 0xf3, 0xad, 0x49, 0x7b, 0xd6, 0xc3, 0x46, 0x99, }; static const unsigned char ecdsa_secp224r1_sha256_3396_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3396_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3396 = { .name = "ecdsa_secp224r1_sha256_3396", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3396_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3396_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3396_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 303 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3397 for ECDSA, tcId is 304 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3397_pubkey[] = { 0x9c, 0xf0, 0x00, 0x10, 0xb4, 0xad, 0x86, 0x63, 0x6f, 0x6c, 0xc7, 0x0f, 0xb5, 0x8c, 0x3b, 0x99, 0x5c, 0x0d, 0x12, 0xe4, 0x6f, 0xc5, 0x8e, 0x24, 0xb0, 0xd2, 0x8f, 0x69, 0x21, 0xc8, 0xa8, 0xa3, 0x20, 0xcc, 0x45, 0x0c, 0xcb, 0x15, 0xeb, 0xd7, 0x16, 0x17, 0xf4, 0xed, 0x25, 0xdb, 0x4d, 0x34, 0x13, 0xfb, 0xdf, 0x15, 0x7d, 0x31, 0xdb, 0xb6, }; static const unsigned char ecdsa_secp224r1_sha256_3397_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3397_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3397 = { .name = "ecdsa_secp224r1_sha256_3397", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3397_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3397_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3397_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 304 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3398 for ECDSA, tcId is 305 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3398_pubkey[] = { 0xae, 0x9b, 0x36, 0x36, 0xb8, 0x54, 0x72, 0x32, 0xdf, 0x43, 0x85, 0x59, 0xb5, 0xa1, 0x09, 0xe0, 0x23, 0x8a, 0x73, 0xa7, 0x6a, 0xfc, 0x25, 0xd0, 0x70, 0xea, 0x27, 0x42, 0x72, 0x10, 0xa6, 0x9d, 0xe4, 0x4a, 0xd6, 0x45, 0xb1, 0xb0, 0x38, 0x45, 0x04, 0x0f, 0x46, 0xfc, 0xe2, 0x38, 0xe9, 0x2c, 0x13, 0x1a, 0x71, 0xe4, 0xb1, 0x84, 0xc0, 0x1f, }; static const unsigned char ecdsa_secp224r1_sha256_3398_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3398_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3398 = { .name = "ecdsa_secp224r1_sha256_3398", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3398_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3398_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3398_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 305 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3399 for ECDSA, tcId is 306 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3399_pubkey[] = { 0x8d, 0x57, 0xd4, 0xfc, 0xe6, 0x27, 0x57, 0x79, 0x18, 0x88, 0xc1, 0x93, 0x80, 0x76, 0xfd, 0x76, 0x6d, 0xae, 0xb2, 0xec, 0x9f, 0x1b, 0xda, 0x8a, 0xd5, 0xdf, 0x48, 0x09, 0xaa, 0xde, 0x92, 0x4d, 0x7e, 0xa3, 0xae, 0x5a, 0xbb, 0xd0, 0x71, 0x9a, 0x7d, 0x48, 0x65, 0x75, 0x9d, 0xa6, 0x54, 0xcf, 0x76, 0xcf, 0x7e, 0xc0, 0x31, 0x27, 0x71, 0x08, }; static const unsigned char ecdsa_secp224r1_sha256_3399_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3399_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3399 = { .name = "ecdsa_secp224r1_sha256_3399", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3399_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3399_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3399_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 306 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3400 for ECDSA, tcId is 307 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3400_pubkey[] = { 0x10, 0x51, 0x8e, 0xb7, 0xa9, 0x26, 0xb5, 0xf7, 0xb6, 0x5b, 0xe8, 0x01, 0xec, 0x9b, 0x2a, 0xbf, 0x76, 0xad, 0xce, 0x25, 0xc6, 0x15, 0x2e, 0x45, 0x2a, 0x35, 0x12, 0xc8, 0x3f, 0x32, 0x2b, 0x9a, 0xb5, 0x7e, 0xa8, 0x35, 0x2a, 0xd2, 0x9b, 0xeb, 0x99, 0xef, 0x35, 0x6b, 0x71, 0x34, 0x32, 0xfc, 0xc4, 0xae, 0xf3, 0x1f, 0x90, 0x30, 0x45, 0xd9, }; static const unsigned char ecdsa_secp224r1_sha256_3400_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3400_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3400 = { .name = "ecdsa_secp224r1_sha256_3400", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3400_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3400_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3400_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 307 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3401 for ECDSA, tcId is 308 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3401_pubkey[] = { 0x8a, 0x5d, 0xfe, 0xdc, 0x9d, 0xd1, 0xcb, 0x9a, 0x43, 0x9c, 0x88, 0xb3, 0xdd, 0x47, 0x2b, 0x2e, 0x66, 0x17, 0x3f, 0x78, 0x66, 0x85, 0x5d, 0xb6, 0xbb, 0x6c, 0x12, 0xfd, 0x3b, 0xad, 0xfb, 0xb8, 0xa4, 0xc6, 0xfd, 0x80, 0xe6, 0x65, 0x10, 0x95, 0x79, 0x27, 0xc7, 0x8a, 0x2a, 0xa0, 0x2e, 0xce, 0xf6, 0x28, 0x16, 0xd0, 0x35, 0x6b, 0x49, 0xc3, }; static const unsigned char ecdsa_secp224r1_sha256_3401_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3401_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdc, 0x74, 0xbf, 0xe0, 0x82, 0x08, 0x7a, 0xe8, 0xb6, 0x1c, 0xbd, 0x54, 0xb8, 0x10, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3401 = { .name = "ecdsa_secp224r1_sha256_3401", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3401_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3401_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3401_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 308 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3402 for ECDSA, tcId is 309 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3402_pubkey[] = { 0x83, 0xa5, 0x9f, 0xc3, 0xdf, 0x29, 0x5e, 0x84, 0xc2, 0x90, 0xb3, 0x2d, 0x0b, 0x55, 0x0a, 0x06, 0xf9, 0x94, 0x56, 0xfc, 0x22, 0x98, 0xe4, 0xa6, 0x8c, 0x4f, 0x2b, 0xff, 0x1b, 0x34, 0xf4, 0x83, 0xdb, 0x30, 0xdb, 0x3a, 0x51, 0xd8, 0x28, 0x87, 0x32, 0xc1, 0x07, 0xd8, 0xb1, 0xa8, 0x58, 0xcd, 0x54, 0xc3, 0x93, 0x6e, 0x1b, 0x5c, 0x11, 0xa4, }; static const unsigned char ecdsa_secp224r1_sha256_3402_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3402_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3402 = { .name = "ecdsa_secp224r1_sha256_3402", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3402_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3402_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3402_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 309 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3403 for ECDSA, tcId is 310 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3403_pubkey[] = { 0x58, 0xba, 0xda, 0x57, 0x8a, 0x20, 0x5d, 0x6e, 0x17, 0x07, 0x22, 0xc8, 0xed, 0x6c, 0x77, 0x15, 0x01, 0x1f, 0xe3, 0x3d, 0x7e, 0xba, 0x86, 0x9e, 0xd1, 0xd4, 0x48, 0xa7, 0x5b, 0xe4, 0x73, 0x0c, 0x1d, 0x2d, 0x2e, 0xf8, 0x81, 0xe0, 0x2f, 0x02, 0x8a, 0x24, 0x1b, 0x7d, 0x7d, 0x3b, 0x0d, 0x0b, 0x4a, 0x9c, 0x05, 0x65, 0xfc, 0xb4, 0x99, 0x77, }; static const unsigned char ecdsa_secp224r1_sha256_3403_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3403_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3403 = { .name = "ecdsa_secp224r1_sha256_3403", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3403_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3403_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3403_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 310 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3404 for ECDSA, tcId is 311 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3404_pubkey[] = { 0x7f, 0xcc, 0x79, 0x9b, 0x91, 0x9f, 0xe9, 0x78, 0x9c, 0xe0, 0x1d, 0xd9, 0x20, 0x27, 0x31, 0xcb, 0x7d, 0x81, 0x51, 0x58, 0xbc, 0x6c, 0xb8, 0x46, 0x87, 0x60, 0x24, 0x7c, 0x0f, 0x9d, 0x29, 0x57, 0xe0, 0xdd, 0x5e, 0x4c, 0x40, 0x12, 0x4b, 0xd5, 0xe0, 0xdd, 0x1b, 0xe4, 0x1c, 0x03, 0x8f, 0xce, 0x2c, 0xd1, 0xdc, 0x81, 0x4e, 0x0a, 0xf3, 0x7d, }; static const unsigned char ecdsa_secp224r1_sha256_3404_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3404_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x93, 0xc8, 0xc6, 0x51, 0x65, 0x34, 0x30, 0xcb, 0x4f, 0x16, 0x75, 0xfc, 0x86, 0xb5, 0xe8, 0x2c, 0xa0, 0x4f, 0xf2, 0xab, 0x15, 0x01, 0x67, 0x44, 0x76, 0xaa, 0xc1, 0x69, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3404 = { .name = "ecdsa_secp224r1_sha256_3404", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3404_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3404_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3404_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 311 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3405 for ECDSA, tcId is 312 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3405_pubkey[] = { 0x3d, 0xdd, 0x68, 0xf6, 0x9d, 0x0b, 0xfd, 0x47, 0xad, 0x19, 0x37, 0x0f, 0xa3, 0xdc, 0x72, 0xeb, 0x25, 0x82, 0x68, 0xc2, 0xb5, 0xf3, 0x76, 0x88, 0x52, 0x15, 0x16, 0x74, 0xfb, 0xe0, 0xe1, 0x55, 0xd9, 0x4d, 0x23, 0x73, 0xa0, 0x1a, 0x5e, 0x70, 0xf1, 0xa1, 0x05, 0x25, 0x9e, 0x7b, 0x8b, 0x1d, 0x2f, 0xdf, 0x4d, 0xba, 0x3c, 0xf4, 0xc7, 0x80, }; static const unsigned char ecdsa_secp224r1_sha256_3405_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3405_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x9d, 0xf5, 0x0a, 0xcc, 0x33, 0xb3, 0x62, 0x5a, 0x2d, 0x59, 0x40, 0xdd, 0x13, 0xdb, 0xb9, 0x7d, 0x1f, 0x7d, 0xd5, 0x6a, 0xff, 0xf8, 0xb7, 0xde, 0x75, 0x45, 0x12, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3405 = { .name = "ecdsa_secp224r1_sha256_3405", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3405_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3405_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3405_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 312 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3406 for ECDSA, tcId is 313 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3406_pubkey[] = { 0x1c, 0xb1, 0xf5, 0x64, 0xc2, 0x9e, 0xbf, 0x60, 0xa3, 0x42, 0xb3, 0xbc, 0x33, 0xc8, 0x94, 0x5c, 0xb2, 0x79, 0xc6, 0xc1, 0xa0, 0x12, 0x25, 0x5c, 0x87, 0x4e, 0x1c, 0x37, 0xb7, 0x51, 0x91, 0xab, 0x3b, 0x2b, 0xb7, 0x30, 0x91, 0x4e, 0xbf, 0xa1, 0x40, 0x80, 0x41, 0x09, 0x70, 0xb7, 0x1e, 0xaf, 0x4f, 0xe0, 0x1e, 0x2d, 0x48, 0xbe, 0x98, 0x91, }; static const unsigned char ecdsa_secp224r1_sha256_3406_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3406_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xdc, 0xe8, 0xc2, 0x23, 0xf2, 0x35, 0x69, 0x9d, 0x1f, 0x5d, 0x2d, 0xcd, 0xe4, 0x80, 0x9d, 0x01, 0x33, 0x90, 0xb5, 0x91, 0x29, 0xf7, 0x83, 0x23, 0x95, 0x25, 0xc0, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3406 = { .name = "ecdsa_secp224r1_sha256_3406", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3406_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3406_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3406_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 313 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3407 for ECDSA, tcId is 314 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3407_pubkey[] = { 0x44, 0xe3, 0x09, 0xeb, 0x68, 0x6e, 0x7a, 0xf7, 0xf1, 0xe2, 0xcc, 0x17, 0xfd, 0x56, 0x54, 0x2b, 0x38, 0x91, 0x0b, 0x3b, 0x79, 0x08, 0xea, 0x54, 0xfb, 0x03, 0x8d, 0x36, 0x47, 0x7e, 0x82, 0x9d, 0x4c, 0x83, 0x32, 0xe5, 0xb2, 0x9f, 0x34, 0x4a, 0xd2, 0x7a, 0x21, 0xc1, 0x8d, 0xab, 0x24, 0xa3, 0x1c, 0xe7, 0x98, 0x5b, 0x63, 0xa2, 0x13, 0x04, }; static const unsigned char ecdsa_secp224r1_sha256_3407_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3407_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x07, 0x4a, 0xae, 0x94, 0x4e, 0xe7, 0xa7, 0xd5, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x66, 0xf8, 0x72, 0xd2, 0x25, 0x0b, 0xa3, 0x01, 0x8a, 0x63, 0xd2, 0xa7, 0xf2, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3407 = { .name = "ecdsa_secp224r1_sha256_3407", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3407_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3407_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3407_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 314 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3408 for ECDSA, tcId is 315 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3408_pubkey[] = { 0xc7, 0x28, 0x06, 0x45, 0x42, 0xcb, 0x51, 0x42, 0xf5, 0xee, 0xfe, 0x63, 0x81, 0x24, 0xdc, 0xd7, 0xa1, 0xad, 0x0b, 0x35, 0x55, 0x84, 0x2a, 0x47, 0xdd, 0x51, 0x08, 0xe1, 0x10, 0x12, 0x9d, 0xd8, 0x78, 0xeb, 0xd4, 0x73, 0x13, 0x27, 0x6c, 0xec, 0x86, 0xf5, 0x21, 0xea, 0x95, 0x85, 0xcd, 0x10, 0x5b, 0x3d, 0xc4, 0x21, 0x14, 0x19, 0x93, 0xb8, }; static const unsigned char ecdsa_secp224r1_sha256_3408_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3408_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xaa, 0xe9, 0x44, 0xee, 0x7a, 0x7d, 0x54, 0x4a, 0x5a, 0xd0, 0xbd, 0x06, 0x36, 0xd9, 0x45, 0x5f, 0x4e, 0x83, 0xde, 0x0f, 0x18, 0x6f, 0x89, 0xbc, 0xa5, 0x6b, 0x3c, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3408 = { .name = "ecdsa_secp224r1_sha256_3408", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3408_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3408_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3408_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 315 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3409 for ECDSA, tcId is 316 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3409_pubkey[] = { 0xc4, 0x6c, 0x1a, 0xd3, 0xd3, 0xd0, 0xdf, 0x8e, 0x9c, 0x0f, 0x52, 0x5c, 0x21, 0xce, 0x8d, 0x81, 0xef, 0x9d, 0x66, 0x29, 0x7f, 0x44, 0x2d, 0x63, 0x09, 0x96, 0x67, 0x22, 0x0c, 0xfa, 0x22, 0x53, 0xaa, 0x31, 0xa9, 0x8d, 0x89, 0x66, 0xb8, 0x59, 0x69, 0xbf, 0x9c, 0x81, 0x9c, 0x01, 0x92, 0x92, 0xef, 0x6a, 0x53, 0xac, 0x1d, 0xb2, 0xa1, 0x08, }; static const unsigned char ecdsa_secp224r1_sha256_3409_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3409_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x55, 0xd2, 0x89, 0xdc, 0xf4, 0xfa, 0xa8, 0x94, 0xb5, 0xa1, 0x7a, 0x0c, 0x6d, 0xb3, 0x74, 0x1b, 0xbc, 0x4e, 0xcb, 0xe0, 0x1d, 0x01, 0xea, 0x33, 0xee, 0x7a, 0x4e, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3409 = { .name = "ecdsa_secp224r1_sha256_3409", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3409_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3409_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3409_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 316 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3410 for ECDSA, tcId is 317 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3410_pubkey[] = { 0xb7, 0xb2, 0xe4, 0x8c, 0x1e, 0x60, 0xe2, 0x09, 0x25, 0xf4, 0xd9, 0xb6, 0xbe, 0x60, 0x0d, 0xd8, 0x37, 0x86, 0xa9, 0x36, 0xc9, 0xbf, 0xab, 0x00, 0x63, 0x9c, 0x33, 0xca, 0xa9, 0x67, 0xcb, 0xc6, 0x50, 0x70, 0x73, 0x9a, 0x33, 0x79, 0xda, 0x80, 0xd5, 0x48, 0x43, 0xa1, 0x8d, 0x9c, 0x11, 0xa2, 0x9a, 0x32, 0x23, 0x4a, 0x0b, 0x30, 0x3c, 0x12, }; static const unsigned char ecdsa_secp224r1_sha256_3410_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3410_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4e, 0xe7, 0xa7, 0xd5, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x56, 0x1c, 0xe0, 0x4f, 0xaa, 0xf1, 0x31, 0x2b, 0xba, 0x3a, 0x15, 0x60, 0x1e, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3410 = { .name = "ecdsa_secp224r1_sha256_3410", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3410_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3410_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3410_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 317 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3411 for ECDSA, tcId is 318 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3411_pubkey[] = { 0xf4, 0xa3, 0xd4, 0x59, 0x88, 0x75, 0xaf, 0x7f, 0x27, 0x41, 0xbb, 0xd6, 0x7b, 0x17, 0x33, 0xb6, 0x54, 0x1b, 0xc5, 0x32, 0x5b, 0x3b, 0xcb, 0x4d, 0x32, 0x67, 0xc2, 0x7e, 0xc3, 0x0b, 0xf3, 0x22, 0xf5, 0x8a, 0x45, 0xc6, 0xc2, 0xaa, 0x2c, 0xed, 0x55, 0xf1, 0x75, 0xd1, 0xcb, 0xf7, 0x2a, 0x7c, 0x5b, 0xfc, 0x46, 0x4d, 0x74, 0xf6, 0x66, 0xc0, }; static const unsigned char ecdsa_secp224r1_sha256_3411_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3411_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x36, 0x1b, 0x9c, 0xd7, 0x4d, 0x65, 0xe7, 0x9a, 0x58, 0x74, 0xc5, 0x01, 0xbc, 0xa4, 0x97, 0x3b, 0x20, 0x34, 0x7e, 0xc9, 0x7f, 0x6d, 0xe1, 0x00, 0x72, 0xd8, 0xb4, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3411 = { .name = "ecdsa_secp224r1_sha256_3411", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3411_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3411_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3411_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 318 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3412 for ECDSA, tcId is 319 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3412_pubkey[] = { 0x56, 0xd1, 0xe5, 0xc1, 0xd6, 0x64, 0xf6, 0xce, 0x2f, 0xc1, 0xfc, 0xb9, 0x37, 0xa7, 0xce, 0x23, 0x1a, 0x29, 0x48, 0x6a, 0xbf, 0x36, 0xc7, 0x3f, 0x77, 0xa2, 0xbd, 0x11, 0x6c, 0xb2, 0x82, 0xc9, 0xd7, 0xc6, 0xfc, 0x05, 0xf3, 0x99, 0xc1, 0x83, 0xe8, 0x80, 0xea, 0x36, 0x2e, 0xdf, 0x04, 0x3c, 0xd2, 0x8f, 0xfa, 0xc9, 0xf9, 0x4f, 0x21, 0x41, }; static const unsigned char ecdsa_secp224r1_sha256_3412_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3412_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x37, 0x39, 0xae, 0x9a, 0xcb, 0xcf, 0x34, 0xb0, 0xe9, 0x8a, 0x03, 0x79, 0x49, 0x2e, 0x76, 0x40, 0x68, 0xfd, 0x92, 0xfe, 0xdb, 0xc2, 0x00, 0xe5, 0xb1, 0x68, 0xd4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3412 = { .name = "ecdsa_secp224r1_sha256_3412", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3412_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3412_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3412_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 319 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3413 for ECDSA, tcId is 320 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3413_pubkey[] = { 0x30, 0xbc, 0xe8, 0xc6, 0xb7, 0xf1, 0xbb, 0xba, 0x04, 0x0b, 0x8d, 0x12, 0x1d, 0x85, 0xd5, 0x51, 0x67, 0xac, 0x99, 0xb2, 0xe2, 0xcf, 0x1c, 0xfa, 0xc8, 0xb0, 0x18, 0xb5, 0xf1, 0xc3, 0x84, 0xc3, 0x5b, 0xe0, 0xae, 0x30, 0x9a, 0x5c, 0xb5, 0x5a, 0xba, 0x98, 0x23, 0x43, 0xd2, 0x12, 0x5f, 0x2d, 0x4a, 0x55, 0x9d, 0x8c, 0x54, 0x53, 0x59, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha256_3413_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3413_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xa2, 0x52, 0xd6, 0x85, 0xe8, 0x31, 0xb6, 0xcf, 0x09, 0x5e, 0x4f, 0x05, 0x35, 0xed, 0xc5, 0xb1, 0x60, 0x9d, 0x7c, 0x5c, 0x7e, 0x49, 0xa3, 0x01, 0x58, 0x8a, 0x1d, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3413 = { .name = "ecdsa_secp224r1_sha256_3413", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3413_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3413_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3413_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 320 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3414 for ECDSA, tcId is 321 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3414_pubkey[] = { 0xe8, 0x7e, 0x53, 0x8a, 0x97, 0x8c, 0xf1, 0x87, 0x90, 0x8b, 0xeb, 0x27, 0xa4, 0xa2, 0x47, 0xd4, 0x96, 0xa8, 0x42, 0x1d, 0xab, 0x1f, 0xe7, 0x9f, 0x87, 0x44, 0xd2, 0xb5, 0x53, 0x9b, 0x9f, 0x8f, 0xe8, 0xbd, 0xdc, 0xf7, 0xc9, 0x7c, 0x44, 0xc5, 0x5a, 0x4f, 0xc2, 0x2f, 0x4d, 0x78, 0xf6, 0xa9, 0x61, 0x44, 0x7a, 0x5b, 0x61, 0x3b, 0x5c, 0x49, }; static const unsigned char ecdsa_secp224r1_sha256_3414_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3414_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xee, 0x74, 0x61, 0x11, 0xf9, 0x1a, 0xb4, 0xce, 0x8f, 0xae, 0x96, 0xe6, 0xf2, 0x3f, 0xd9, 0xd2, 0x0a, 0x24, 0xd2, 0xe7, 0x9e, 0xea, 0x56, 0x34, 0x78, 0xc0, 0xf5, 0x66, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3414 = { .name = "ecdsa_secp224r1_sha256_3414", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3414_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3414_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3414_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 321 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3415 for ECDSA, tcId is 322 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3415_pubkey[] = { 0x11, 0x3a, 0x2c, 0xc5, 0x7c, 0x8e, 0xe7, 0xde, 0x11, 0xbc, 0x45, 0xe1, 0x45, 0x46, 0xc7, 0x2a, 0x29, 0x72, 0x5b, 0x9a, 0x72, 0x18, 0x11, 0x4a, 0xc3, 0x1f, 0x02, 0x81, 0x6c, 0x76, 0x5b, 0x9a, 0x46, 0xb0, 0x21, 0x53, 0x12, 0xa3, 0x29, 0x2f, 0x59, 0x79, 0xc9, 0x8d, 0x37, 0xb3, 0x58, 0x83, 0xba, 0xa1, 0x56, 0x28, 0x1b, 0x1b, 0xae, 0x8c, }; static const unsigned char ecdsa_secp224r1_sha256_3415_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3415_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3415 = { .name = "ecdsa_secp224r1_sha256_3415", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3415_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3415_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3415_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 322 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3416 for ECDSA, tcId is 323 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3416_pubkey[] = { 0x23, 0xdd, 0x9c, 0x3f, 0x1a, 0x4b, 0x47, 0x8b, 0x01, 0xfa, 0x2c, 0x5e, 0x99, 0x7d, 0x04, 0x82, 0x07, 0x3b, 0x32, 0x91, 0x8d, 0xe4, 0x4b, 0xe5, 0x83, 0xdc, 0xf7, 0x4a, 0xd6, 0x61, 0xa5, 0xed, 0x57, 0x9a, 0x2f, 0x09, 0xd2, 0xff, 0x56, 0xd6, 0xb8, 0x0f, 0x26, 0x56, 0x8d, 0x93, 0xa2, 0x37, 0xca, 0x64, 0x44, 0xb0, 0xca, 0xdc, 0x79, 0x51, }; static const unsigned char ecdsa_secp224r1_sha256_3416_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3416_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3416 = { .name = "ecdsa_secp224r1_sha256_3416", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3416_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3416_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3416_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 323 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3417 for ECDSA, tcId is 324 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3417_pubkey[] = { 0xbb, 0xce, 0x4b, 0x17, 0xd4, 0x5d, 0x24, 0xa1, 0xc8, 0x0b, 0xc8, 0xec, 0xa9, 0x8c, 0x35, 0x9d, 0x5e, 0x1e, 0x45, 0x80, 0x58, 0xa0, 0x0b, 0x95, 0x06, 0x43, 0x25, 0x6d, 0xfe, 0x09, 0xe0, 0x92, 0x31, 0x8e, 0x39, 0x30, 0x3d, 0xca, 0x03, 0x68, 0x8e, 0x4e, 0xcf, 0x30, 0x03, 0x00, 0x78, 0x43, 0x12, 0xd6, 0x17, 0xe5, 0x08, 0x8c, 0x58, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha256_3417_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3417_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3417 = { .name = "ecdsa_secp224r1_sha256_3417", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3417_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3417_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3417_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 324 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3418 for ECDSA, tcId is 325 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3418_pubkey[] = { 0x03, 0x5f, 0x58, 0x44, 0x6c, 0x1b, 0xdb, 0xea, 0xa5, 0x66, 0x60, 0xa8, 0x97, 0xeb, 0xf9, 0x65, 0xf2, 0xd1, 0x88, 0x20, 0xc7, 0xcd, 0x06, 0x30, 0xf0, 0x4a, 0x49, 0x53, 0x47, 0xbd, 0xfa, 0xea, 0x60, 0x09, 0x1f, 0x40, 0x5e, 0x09, 0x92, 0x9c, 0xb2, 0xc0, 0xe2, 0xf6, 0xee, 0xd5, 0x3e, 0x08, 0x71, 0xb7, 0xfe, 0x0c, 0xd5, 0xa1, 0x5d, 0x85, }; static const unsigned char ecdsa_secp224r1_sha256_3418_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3418_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3418 = { .name = "ecdsa_secp224r1_sha256_3418", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3418_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3418_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3418_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 325 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3419 for ECDSA, tcId is 326 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3419_pubkey[] = { 0x91, 0x1c, 0x00, 0x33, 0xea, 0xc4, 0x63, 0x32, 0x69, 0x1c, 0xb7, 0x92, 0x0c, 0x49, 0x50, 0xee, 0xd5, 0x73, 0x54, 0x76, 0x1e, 0x10, 0x81, 0xa1, 0xea, 0x9f, 0x12, 0x79, 0x50, 0x8e, 0xbf, 0x7c, 0xfd, 0x3e, 0xab, 0x5d, 0xab, 0xde, 0xe1, 0xbe, 0x14, 0xce, 0x82, 0x96, 0xb1, 0xfc, 0x20, 0xac, 0xfa, 0xac, 0x16, 0xf7, 0x82, 0x4c, 0x60, 0x02, }; static const unsigned char ecdsa_secp224r1_sha256_3419_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3419_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3419 = { .name = "ecdsa_secp224r1_sha256_3419", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3419_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3419_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3419_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 326 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3420 for ECDSA, tcId is 327 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3420_pubkey[] = { 0x62, 0xb2, 0xab, 0xb7, 0x0b, 0xb9, 0xc7, 0xef, 0xdf, 0xb5, 0x71, 0x81, 0xf4, 0x33, 0xb6, 0x47, 0x51, 0xf1, 0x08, 0x13, 0x0d, 0xce, 0x18, 0x0d, 0x69, 0x92, 0xe7, 0xd3, 0x12, 0x4b, 0x3a, 0xa8, 0xa5, 0x3e, 0x5e, 0xed, 0xf7, 0x2a, 0xa6, 0x7e, 0x6e, 0xdc, 0xc7, 0x1f, 0x19, 0xe3, 0x6e, 0x6a, 0xd1, 0xd0, 0x99, 0xa5, 0x9f, 0xfd, 0x95, 0x55, }; static const unsigned char ecdsa_secp224r1_sha256_3420_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3420_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3420 = { .name = "ecdsa_secp224r1_sha256_3420", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3420_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3420_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3420_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 327 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3421 for ECDSA, tcId is 328 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3421_pubkey[] = { 0x0f, 0x75, 0x93, 0x30, 0xe7, 0x99, 0x27, 0x52, 0xaa, 0xe6, 0xa8, 0x5f, 0x7b, 0xb0, 0x59, 0x97, 0x84, 0xbe, 0xa5, 0x3e, 0x28, 0x8f, 0xf7, 0xee, 0x8d, 0x53, 0xd5, 0xe6, 0xde, 0xfe, 0x61, 0x73, 0x62, 0x38, 0x0e, 0x92, 0xf9, 0xa2, 0x3c, 0x4f, 0xdc, 0xc3, 0x4e, 0x09, 0x71, 0x3a, 0xab, 0x9c, 0xc4, 0x41, 0x19, 0x41, 0x8f, 0x6f, 0x2f, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha256_3421_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3421_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3421 = { .name = "ecdsa_secp224r1_sha256_3421", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3421_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3421_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3421_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 328 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3422 for ECDSA, tcId is 329 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3422_pubkey[] = { 0x8f, 0x2e, 0xda, 0x42, 0x74, 0x2a, 0xb3, 0x1f, 0x5d, 0x4c, 0xf6, 0x66, 0x89, 0x2d, 0x1d, 0x62, 0x3e, 0xfd, 0x3b, 0x26, 0xf7, 0xdf, 0x9a, 0xa7, 0x02, 0x96, 0xe8, 0x0d, 0x3b, 0xea, 0xf2, 0x35, 0xcf, 0xea, 0x41, 0xfa, 0xdb, 0x98, 0xc5, 0x33, 0xa8, 0xfd, 0xeb, 0x58, 0x41, 0xd6, 0x9e, 0xe6, 0x5f, 0x6e, 0x71, 0x91, 0x47, 0x11, 0xf1, 0x38, }; static const unsigned char ecdsa_secp224r1_sha256_3422_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3422_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3422 = { .name = "ecdsa_secp224r1_sha256_3422", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3422_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3422_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3422_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 329 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3423 for ECDSA, tcId is 330 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3423_pubkey[] = { 0x2b, 0xcf, 0x43, 0x71, 0xb3, 0x19, 0xa6, 0x91, 0xed, 0x0e, 0x2e, 0x0c, 0x4a, 0x55, 0xa8, 0xa9, 0xb9, 0x87, 0xde, 0xc8, 0x6b, 0x86, 0x36, 0x21, 0xe9, 0x7b, 0x9c, 0x09, 0x5b, 0x86, 0x60, 0xa7, 0x4c, 0xc9, 0x64, 0xa6, 0xaf, 0x03, 0x11, 0xed, 0xc6, 0xb1, 0xcd, 0x98, 0x0f, 0x9c, 0x7b, 0xf3, 0xa6, 0xc9, 0xb7, 0xf9, 0x13, 0x2a, 0x0b, 0x2f, }; static const unsigned char ecdsa_secp224r1_sha256_3423_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3423_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3423 = { .name = "ecdsa_secp224r1_sha256_3423", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3423_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3423_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3423_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 330 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3424 for ECDSA, tcId is 331 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3424_pubkey[] = { 0xa6, 0xf2, 0x52, 0x56, 0x8f, 0x6f, 0xbd, 0x1a, 0xe0, 0x45, 0xe6, 0x02, 0x34, 0x43, 0x59, 0xc0, 0xc2, 0x16, 0x91, 0x17, 0x23, 0x74, 0x8f, 0x9a, 0x3e, 0x7f, 0xad, 0xec, 0x3b, 0x76, 0xef, 0xc7, 0x5b, 0xa0, 0x30, 0xbf, 0xe7, 0xde, 0x2d, 0xed, 0x68, 0x69, 0x91, 0xe6, 0x18, 0x3d, 0x40, 0x24, 0x1a, 0x05, 0xb4, 0x79, 0x69, 0x3c, 0x70, 0x15, }; static const unsigned char ecdsa_secp224r1_sha256_3424_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3424_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3424 = { .name = "ecdsa_secp224r1_sha256_3424", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3424_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3424_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3424_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 331 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3425 for ECDSA, tcId is 332 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3425_pubkey[] = { 0xa7, 0x4c, 0x1c, 0x3a, 0x31, 0xc7, 0xd4, 0x93, 0xab, 0x2c, 0x0a, 0xf8, 0x9c, 0xf5, 0xe6, 0x88, 0x62, 0x1c, 0xa9, 0x46, 0x6d, 0x2b, 0xa1, 0xd8, 0x76, 0x1c, 0x3f, 0xe8, 0x2b, 0xa0, 0xd0, 0x8f, 0x4c, 0x9f, 0x76, 0x85, 0x6c, 0x2b, 0x71, 0x38, 0xc8, 0xf1, 0xe7, 0x80, 0xb6, 0x95, 0x99, 0x92, 0xb1, 0x6c, 0xcd, 0xfd, 0x92, 0x5f, 0x4b, 0x3a, }; static const unsigned char ecdsa_secp224r1_sha256_3425_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3425_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3425 = { .name = "ecdsa_secp224r1_sha256_3425", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3425_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3425_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3425_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 332 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3426 for ECDSA, tcId is 333 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3426_pubkey[] = { 0x03, 0x4e, 0xa7, 0x27, 0x98, 0x25, 0x7f, 0x33, 0xf2, 0x4f, 0x64, 0xc4, 0x94, 0x38, 0xfc, 0x43, 0xe8, 0xf6, 0x7d, 0xdc, 0x71, 0x70, 0xfd, 0x12, 0x7e, 0x2c, 0x43, 0xf2, 0x80, 0x56, 0x2a, 0xcc, 0x9b, 0x49, 0xf2, 0xd7, 0xfc, 0xc8, 0x94, 0x21, 0xd2, 0xa5, 0xdb, 0x2e, 0xa8, 0xdd, 0x03, 0x61, 0xfb, 0x48, 0xd8, 0x97, 0xd4, 0x61, 0x26, 0x27, }; static const unsigned char ecdsa_secp224r1_sha256_3426_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3426_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x3f, 0x55, 0x2f, 0x1c, 0x2b, 0x01, 0x65, 0x1e, 0xdf, 0x59, 0x02, 0x65, 0x0f, 0xe9, 0xab, 0x04, 0x6f, 0x71, 0x99, 0x9a, 0xc9, 0x28, 0xed, 0xc0, 0x08, 0x7b, 0xdb, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3426 = { .name = "ecdsa_secp224r1_sha256_3426", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3426_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3426_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3426_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 333 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3427 for ECDSA, tcId is 334 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3427_pubkey[] = { 0x03, 0x4e, 0xa7, 0x27, 0x98, 0x25, 0x7f, 0x33, 0xf2, 0x4f, 0x64, 0xc4, 0x94, 0x38, 0xfc, 0x43, 0xe8, 0xf6, 0x7d, 0xdc, 0x71, 0x70, 0xfd, 0x12, 0x7e, 0x2c, 0x43, 0xf2, 0x7f, 0xa9, 0xd5, 0x33, 0x64, 0xb6, 0x0d, 0x28, 0x03, 0x37, 0x6b, 0xde, 0x2d, 0x5a, 0x24, 0xd0, 0x57, 0x22, 0xfc, 0x9e, 0x04, 0xb7, 0x27, 0x68, 0x2b, 0x9e, 0xd9, 0xda, }; static const unsigned char ecdsa_secp224r1_sha256_3427_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3427_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x3f, 0x55, 0x2f, 0x1c, 0x2b, 0x01, 0x65, 0x1e, 0xdf, 0x59, 0x02, 0x65, 0x0f, 0xe9, 0xab, 0x04, 0x6f, 0x71, 0x99, 0x9a, 0xc9, 0x28, 0xed, 0xc0, 0x08, 0x7b, 0xdb, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3427 = { .name = "ecdsa_secp224r1_sha256_3427", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3427_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3427_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3427_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 334 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3428 for ECDSA, tcId is 335 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3428_pubkey[] = { 0x36, 0x72, 0xba, 0x97, 0x18, 0xe6, 0x0d, 0x00, 0xea, 0xb4, 0x29, 0x5c, 0x81, 0x9e, 0xa3, 0x66, 0xa7, 0x78, 0xdd, 0x6f, 0xd6, 0x21, 0xfa, 0x96, 0x65, 0x25, 0x9c, 0xb6, 0x7a, 0xe5, 0xe8, 0x47, 0xee, 0xae, 0xa6, 0x74, 0xbe, 0xeb, 0x63, 0x63, 0x79, 0xe9, 0x68, 0xf7, 0x92, 0x65, 0x50, 0x2e, 0x41, 0x4a, 0x1d, 0x44, 0x4f, 0x04, 0xae, 0x79, }; static const unsigned char ecdsa_secp224r1_sha256_3428_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3428_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3428 = { .name = "ecdsa_secp224r1_sha256_3428", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3428_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3428_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3428_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 335 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3429 for ECDSA, tcId is 336 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3429_pubkey[] = { 0x33, 0xee, 0xef, 0xbf, 0xc7, 0x72, 0x29, 0x13, 0x6e, 0x56, 0xb5, 0x75, 0x14, 0x48, 0x63, 0xed, 0x90, 0xb4, 0xc0, 0xf8, 0xa9, 0xe3, 0x15, 0x81, 0x6d, 0x6d, 0xe6, 0x48, 0x05, 0x17, 0x49, 0xdd, 0x11, 0x48, 0x0c, 0x14, 0x1f, 0xb5, 0xa1, 0x94, 0x63, 0x13, 0x16, 0x3c, 0x01, 0x41, 0x26, 0x5b, 0x68, 0xa2, 0x62, 0x16, 0xbc, 0xb9, 0x93, 0x6a, }; static const unsigned char ecdsa_secp224r1_sha256_3429_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3429_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3429 = { .name = "ecdsa_secp224r1_sha256_3429", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3429_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3429_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3429_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 336 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3430 for ECDSA, tcId is 337 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3430_pubkey[] = { 0xbd, 0xa0, 0x3b, 0x24, 0xb6, 0x22, 0x43, 0xc6, 0x1e, 0x28, 0x8b, 0x6e, 0xa1, 0xe9, 0x9a, 0x28, 0x86, 0xf7, 0x00, 0x94, 0x4e, 0xb1, 0xb8, 0xf0, 0x46, 0x6c, 0xff, 0xd6, 0x1c, 0x71, 0x2a, 0x3a, 0xaa, 0xce, 0x69, 0x33, 0x19, 0x89, 0xb7, 0x07, 0xe6, 0x9e, 0x8d, 0xe3, 0x9d, 0x7c, 0xd1, 0xae, 0xb6, 0x5d, 0x97, 0xad, 0x18, 0x00, 0xbf, 0x7f, }; static const unsigned char ecdsa_secp224r1_sha256_3430_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3430_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3430 = { .name = "ecdsa_secp224r1_sha256_3430", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3430_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3430_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3430_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 337 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3431 for ECDSA, tcId is 338 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3431_pubkey[] = { 0x7a, 0xbb, 0xa0, 0xcb, 0xff, 0x13, 0x4d, 0xdc, 0xf5, 0x4d, 0x04, 0x84, 0x6f, 0x95, 0x4b, 0x88, 0x2c, 0xa9, 0xfa, 0xef, 0xdf, 0xe8, 0x18, 0x89, 0x8b, 0xfb, 0x37, 0x8b, 0x79, 0x2f, 0x10, 0xb5, 0x79, 0x70, 0xae, 0x57, 0xbb, 0x4f, 0xb0, 0x1c, 0x08, 0x88, 0x68, 0x48, 0x85, 0x5a, 0xeb, 0x19, 0x84, 0xd3, 0xd6, 0xfc, 0xb2, 0xb4, 0x12, 0xdf, }; static const unsigned char ecdsa_secp224r1_sha256_3431_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3431_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3431 = { .name = "ecdsa_secp224r1_sha256_3431", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3431_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3431_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3431_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 338 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3432 for ECDSA, tcId is 339 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3432_pubkey[] = { 0xf6, 0x8d, 0x99, 0xe2, 0x86, 0x53, 0xb9, 0xba, 0x3e, 0x7c, 0xed, 0xb3, 0xb7, 0x81, 0x65, 0xf5, 0xa5, 0x4f, 0xbe, 0x90, 0xd4, 0xb9, 0xf8, 0x84, 0x97, 0x97, 0x7e, 0x16, 0x23, 0x4d, 0xa3, 0xea, 0xa0, 0x17, 0x8a, 0x51, 0xb5, 0xb0, 0xc2, 0x08, 0xef, 0x08, 0x18, 0xdf, 0x6f, 0x65, 0x78, 0x79, 0x3c, 0x1a, 0xf1, 0x78, 0x70, 0x26, 0xb8, 0xda, }; static const unsigned char ecdsa_secp224r1_sha256_3432_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3432_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3432 = { .name = "ecdsa_secp224r1_sha256_3432", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3432_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3432_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3432_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 339 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3433 for ECDSA, tcId is 340 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3433_pubkey[] = { 0x06, 0x5d, 0x9e, 0xf1, 0x33, 0xce, 0x81, 0xc2, 0xd6, 0xb6, 0x6e, 0x92, 0x83, 0x60, 0xf9, 0x52, 0x7f, 0x8f, 0x36, 0xb5, 0xba, 0xdd, 0x35, 0xb5, 0xf1, 0x09, 0x34, 0x27, 0x20, 0x04, 0x85, 0x27, 0x55, 0xf7, 0x74, 0x40, 0xa0, 0xb0, 0x8b, 0x9f, 0x16, 0x54, 0x89, 0xc0, 0x69, 0x6e, 0x8b, 0x49, 0x81, 0xd6, 0xd0, 0x4a, 0x28, 0x5b, 0x0f, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha256_3433_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3433_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3433 = { .name = "ecdsa_secp224r1_sha256_3433", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3433_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3433_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3433_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 340 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3434 for ECDSA, tcId is 341 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3434_pubkey[] = { 0xd6, 0xce, 0xa0, 0x94, 0x72, 0xed, 0xe5, 0x74, 0xce, 0x1e, 0x05, 0x46, 0xc9, 0xac, 0xd0, 0xe1, 0xcd, 0x8c, 0xba, 0x9b, 0x12, 0x1d, 0xf2, 0x9e, 0x89, 0xd5, 0x09, 0x2e, 0x83, 0x90, 0x4e, 0xbf, 0xb9, 0x02, 0xea, 0x61, 0xc9, 0x87, 0xdc, 0x05, 0x08, 0xe0, 0xc9, 0xa7, 0xe5, 0x63, 0xe2, 0x60, 0x9f, 0xea, 0xf7, 0x91, 0x40, 0xab, 0x91, 0xd6, }; static const unsigned char ecdsa_secp224r1_sha256_3434_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3434_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3434 = { .name = "ecdsa_secp224r1_sha256_3434", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3434_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3434_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3434_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 341 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3435 for ECDSA, tcId is 342 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3435_pubkey[] = { 0xc5, 0x20, 0xb1, 0x80, 0x03, 0xb3, 0x56, 0x09, 0x41, 0x47, 0xee, 0x2f, 0x9d, 0xf1, 0x17, 0x85, 0x72, 0xbe, 0xd8, 0x37, 0xbd, 0x89, 0x44, 0x3b, 0x25, 0xeb, 0xce, 0xb8, 0x0e, 0x2e, 0x93, 0xa9, 0x98, 0xfb, 0xba, 0xbe, 0x82, 0x19, 0x2e, 0xa4, 0xc8, 0x56, 0x51, 0xcf, 0x09, 0xa9, 0x5a, 0xb0, 0xdc, 0x2e, 0x3d, 0x97, 0x5e, 0xe7, 0xbe, 0x98, }; static const unsigned char ecdsa_secp224r1_sha256_3435_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3435_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3435 = { .name = "ecdsa_secp224r1_sha256_3435", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3435_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3435_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3435_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 342 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3436 for ECDSA, tcId is 343 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3436_pubkey[] = { 0x9d, 0xd0, 0xb9, 0x9b, 0xb7, 0xa8, 0x30, 0xbc, 0xc7, 0xd5, 0x5a, 0xba, 0xc4, 0x29, 0x12, 0xd5, 0x25, 0xb0, 0x63, 0xc5, 0x0c, 0xf3, 0x77, 0xca, 0x57, 0x71, 0xa2, 0x6c, 0xa1, 0x41, 0xfc, 0xcf, 0x07, 0x93, 0xc2, 0xba, 0x24, 0x69, 0xa9, 0x46, 0xc2, 0xd4, 0xed, 0x26, 0x34, 0x40, 0x52, 0xc6, 0x3a, 0x6d, 0x7e, 0x77, 0x97, 0xce, 0x96, 0xc3, }; static const unsigned char ecdsa_secp224r1_sha256_3436_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3436_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3436 = { .name = "ecdsa_secp224r1_sha256_3436", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3436_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3436_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3436_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 343 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3437 for ECDSA, tcId is 344 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3437_pubkey[] = { 0x3d, 0xab, 0x9f, 0x1b, 0x19, 0xe7, 0x15, 0xd1, 0x74, 0xa7, 0x36, 0x09, 0x20, 0x37, 0x5d, 0x56, 0x9a, 0x18, 0x1f, 0x05, 0x5e, 0x66, 0xf0, 0x13, 0x91, 0x87, 0x1b, 0x6f, 0x47, 0xa6, 0xd8, 0x7c, 0x23, 0xa5, 0xb6, 0xa1, 0xe3, 0xd0, 0xa9, 0x72, 0x13, 0x02, 0xcc, 0x02, 0xcc, 0xe3, 0x5f, 0x35, 0xde, 0xa0, 0x8e, 0x22, 0x61, 0x9b, 0xe5, 0x21, }; static const unsigned char ecdsa_secp224r1_sha256_3437_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3437_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3437 = { .name = "ecdsa_secp224r1_sha256_3437", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3437_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3437_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3437_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 344 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3438 for ECDSA, tcId is 345 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3438_pubkey[] = { 0x56, 0xdd, 0xe1, 0xba, 0x58, 0xea, 0x31, 0x05, 0x3b, 0x25, 0x35, 0xc6, 0x66, 0x23, 0x34, 0x4c, 0x24, 0xc7, 0x2d, 0x21, 0x4a, 0xf5, 0xbe, 0x69, 0x82, 0xe8, 0x91, 0x00, 0xe7, 0x71, 0x08, 0x48, 0x06, 0x14, 0x3e, 0x86, 0xf2, 0xb3, 0x1b, 0xda, 0xf6, 0x22, 0x80, 0xf5, 0xb3, 0x11, 0xd0, 0xd2, 0xbd, 0xbb, 0x38, 0x5b, 0x20, 0xfc, 0x6c, 0x87, }; static const unsigned char ecdsa_secp224r1_sha256_3438_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3438_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3438 = { .name = "ecdsa_secp224r1_sha256_3438", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3438_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3438_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3438_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 345 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3439 for ECDSA, tcId is 346 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3439_pubkey[] = { 0x94, 0xef, 0xe1, 0x38, 0x7f, 0xc0, 0x44, 0x7d, 0x7d, 0xbc, 0xb5, 0x37, 0x39, 0xa0, 0xe4, 0xe0, 0xdd, 0xec, 0x18, 0x1d, 0x38, 0x2c, 0xae, 0xa6, 0x45, 0xb1, 0xa6, 0x12, 0x44, 0x14, 0xa6, 0xb1, 0xc7, 0x89, 0x08, 0xd0, 0xfa, 0x20, 0x6f, 0x8f, 0x2d, 0xe9, 0x50, 0xad, 0x4a, 0x14, 0xd1, 0xce, 0x94, 0xd9, 0xcd, 0xdb, 0xe3, 0x2e, 0x46, 0x01, }; static const unsigned char ecdsa_secp224r1_sha256_3439_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3439_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3439 = { .name = "ecdsa_secp224r1_sha256_3439", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3439_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3439_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3439_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 346 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3440 for ECDSA, tcId is 347 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3440_pubkey[] = { 0x62, 0x86, 0x80, 0x3b, 0x95, 0x29, 0x76, 0xee, 0x18, 0x97, 0x01, 0x36, 0x95, 0xd3, 0xef, 0x2c, 0xbb, 0x6f, 0x97, 0x71, 0x42, 0xa0, 0x42, 0xb2, 0x36, 0x57, 0x25, 0x77, 0x72, 0x2a, 0x6c, 0xe9, 0xad, 0x3e, 0x3f, 0xd2, 0x8e, 0x45, 0x18, 0x33, 0x49, 0x6c, 0x63, 0xb8, 0xab, 0x70, 0x53, 0x88, 0x77, 0x21, 0x5f, 0x20, 0x49, 0x42, 0xbf, 0x59, }; static const unsigned char ecdsa_secp224r1_sha256_3440_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3440_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3440 = { .name = "ecdsa_secp224r1_sha256_3440", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3440_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3440_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3440_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 347 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3441 for ECDSA, tcId is 348 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3441_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3441_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3441_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3441 = { .name = "ecdsa_secp224r1_sha256_3441", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3441_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3441_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3441_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 348 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3442 for ECDSA, tcId is 349 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3442_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha256_3442_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3442_sig[] = { 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdc, 0x74, 0xbf, 0xe0, 0x82, 0x08, 0x7a, 0xe8, 0xb6, 0x1c, 0xbd, 0x54, 0xb8, 0x10, 0x3f, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3442 = { .name = "ecdsa_secp224r1_sha256_3442", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3442_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3442_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3442_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 349 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3443 for ECDSA, tcId is 350 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3443_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha256_3443_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3443_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3443 = { .name = "ecdsa_secp224r1_sha256_3443", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3443_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3443_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3443_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 350 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3444 for ECDSA, tcId is 351 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3444_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha256_3444_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3444_sig[] = { 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdc, 0x74, 0xbf, 0xe0, 0x82, 0x08, 0x7a, 0xe8, 0xb6, 0x1c, 0xbd, 0x54, 0xb8, 0x10, 0x3f, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3444 = { .name = "ecdsa_secp224r1_sha256_3444", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3444_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3444_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3444_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 351 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3445 for ECDSA, tcId is 352 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3445_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3445_sig[] = { 0x03, 0x64, 0xe7, 0xd9, 0x68, 0x32, 0x61, 0x4a, 0x80, 0x21, 0x6e, 0x73, 0x0c, 0x35, 0x35, 0x34, 0xd4, 0xbf, 0xfd, 0x2c, 0x26, 0x64, 0x9c, 0x0b, 0x4b, 0x0e, 0x26, 0x28, 0x8f, 0x40, 0x06, 0x4b, 0x41, 0x2f, 0xe3, 0x8c, 0x5b, 0xa9, 0xcf, 0x66, 0x4e, 0x61, 0x72, 0xed, 0x48, 0xe6, 0xe7, 0x9f, 0x0f, 0xe5, 0xe3, 0x1a, 0x54, 0x98, 0x5d, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3445 = { .name = "ecdsa_secp224r1_sha256_3445", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3445_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha256_3445_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 352 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3446 for ECDSA, tcId is 353 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3446_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3446_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha256_3446_sig[] = { 0xf4, 0xb6, 0x8d, 0xf6, 0x2b, 0x92, 0x38, 0x36, 0x3c, 0xcc, 0x1b, 0xbe, 0xe0, 0x0d, 0xeb, 0x3f, 0xb2, 0x69, 0x3f, 0x78, 0x94, 0x17, 0x8e, 0x14, 0xee, 0xac, 0x59, 0x6a, 0x7f, 0x51, 0xc9, 0x45, 0x1a, 0xda, 0xcd, 0x2b, 0xcb, 0xc7, 0x21, 0xf7, 0xdf, 0x06, 0x43, 0xd7, 0xcd, 0x18, 0xa6, 0xb5, 0x20, 0x64, 0xb5, 0x07, 0xe1, 0x91, 0x2f, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3446 = { .name = "ecdsa_secp224r1_sha256_3446", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3446_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3446_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha256_3446_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 353 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3447 for ECDSA, tcId is 354 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3447_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3447_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha256_3447_sig[] = { 0xb2, 0x97, 0x0c, 0xde, 0xc2, 0x9c, 0x70, 0x29, 0x4a, 0x18, 0xbb, 0xc4, 0x99, 0x85, 0xef, 0xa3, 0x3a, 0xcc, 0x0a, 0xf5, 0x09, 0xc3, 0x26, 0xa3, 0x97, 0x7a, 0x35, 0xe8, 0x0c, 0xea, 0x3e, 0xd8, 0xeb, 0xaa, 0xf6, 0xee, 0x6a, 0xef, 0x60, 0x49, 0xa2, 0x3c, 0xbc, 0x39, 0xf6, 0x1f, 0xcf, 0x8f, 0xc6, 0xbe, 0x4b, 0xab, 0x13, 0x38, 0x55, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3447 = { .name = "ecdsa_secp224r1_sha256_3447", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3447_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3447_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha256_3447_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 354 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3448 for ECDSA, tcId is 355 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3448_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha256_3448_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3448_sig[] = { 0x7e, 0x7b, 0x0e, 0xb7, 0xda, 0x8c, 0x68, 0xa7, 0x07, 0x2b, 0x11, 0x40, 0x4e, 0xe9, 0x5a, 0x5c, 0x40, 0x7f, 0xbf, 0xe3, 0xd6, 0x96, 0x46, 0x80, 0x2e, 0x28, 0xae, 0x77, 0xd4, 0x09, 0xa2, 0xf6, 0xbb, 0xaa, 0xe5, 0x9b, 0xb6, 0x0f, 0xc0, 0xa0, 0x92, 0xb1, 0x2f, 0xa4, 0xe6, 0x7d, 0xc8, 0xd0, 0x88, 0xcf, 0x19, 0xa8, 0x33, 0x32, 0x2f, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3448 = { .name = "ecdsa_secp224r1_sha256_3448", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3448_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3448_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha256_3448_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 355 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3449 for ECDSA, tcId is 356 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3449_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3449_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3449_sig[] = { 0x51, 0x9b, 0xf1, 0x85, 0xff, 0x46, 0x35, 0x27, 0x19, 0x61, 0xfa, 0x49, 0x1b, 0xe2, 0x57, 0x23, 0x1d, 0xee, 0xea, 0x9c, 0x53, 0xa6, 0xed, 0xe3, 0xb4, 0xa8, 0x9e, 0xd1, 0x48, 0x6b, 0xda, 0xd4, 0x84, 0xa6, 0xa3, 0x13, 0x4e, 0x14, 0x71, 0xcf, 0x56, 0xa9, 0xdf, 0x0f, 0xac, 0x50, 0xf7, 0x73, 0xb3, 0xe3, 0x7d, 0x6f, 0x32, 0x76, 0x17, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3449 = { .name = "ecdsa_secp224r1_sha256_3449", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3449_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3449_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3449_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 356 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3450 for ECDSA, tcId is 357 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3450_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3450_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3450_sig[] = { 0x09, 0xfd, 0x64, 0x48, 0x98, 0xb7, 0xcb, 0x5d, 0x01, 0x8b, 0x52, 0x23, 0x4e, 0x7b, 0x4e, 0xf2, 0xb5, 0x47, 0x89, 0xaf, 0xd0, 0xce, 0x9c, 0x43, 0x4e, 0x9e, 0x55, 0x15, 0xf1, 0x93, 0x09, 0x53, 0x21, 0x64, 0xea, 0x20, 0x53, 0xca, 0xe5, 0x5d, 0xf7, 0xbd, 0xcb, 0xab, 0x53, 0x6c, 0x83, 0xea, 0x7b, 0xfe, 0x6f, 0xe1, 0x0d, 0x60, 0xc1, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3450 = { .name = "ecdsa_secp224r1_sha256_3450", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3450_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3450_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3450_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 357 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3451 for ECDSA, tcId is 358 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3451_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha256_3451_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3451_sig[] = { 0xec, 0x91, 0x9d, 0x4e, 0x28, 0x3c, 0xcf, 0x1f, 0x71, 0xa9, 0xe3, 0xc0, 0xf7, 0x81, 0xa3, 0x67, 0x58, 0xd3, 0xf3, 0x8b, 0x1b, 0x78, 0xa8, 0x7a, 0x74, 0x28, 0x8e, 0x80, 0x4c, 0x46, 0x63, 0x04, 0x4a, 0x73, 0xc7, 0x9b, 0xd8, 0x8f, 0x0d, 0xc2, 0x45, 0xab, 0x1a, 0x32, 0xf8, 0x9f, 0x06, 0xf4, 0x0a, 0x70, 0x4b, 0x31, 0xe9, 0xfa, 0xbc, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3451 = { .name = "ecdsa_secp224r1_sha256_3451", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3451_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3451_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3451_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 358 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3452 for ECDSA, tcId is 359 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3452_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha256_3452_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3452_sig[] = { 0xc5, 0x17, 0x60, 0x47, 0x84, 0x47, 0x21, 0x75, 0x97, 0xec, 0xc6, 0xf4, 0x00, 0x1b, 0xd4, 0x50, 0x88, 0xd5, 0x3c, 0x90, 0xf5, 0x31, 0x03, 0x60, 0x8b, 0xf8, 0x8a, 0xea, 0xa2, 0x01, 0x25, 0x3a, 0xa9, 0x03, 0xf9, 0x78, 0x1e, 0x89, 0x92, 0x10, 0x1d, 0x71, 0x71, 0xd2, 0xdd, 0x3a, 0x5d, 0x48, 0xc4, 0x4d, 0x8e, 0x1d, 0x54, 0x4c, 0xd6, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3452 = { .name = "ecdsa_secp224r1_sha256_3452", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3452_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3452_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3452_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 359 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3453 for ECDSA, tcId is 360 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3453_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha256_3453_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3453_sig[] = { 0x76, 0xbe, 0x01, 0x12, 0x67, 0x4e, 0xc2, 0x91, 0x28, 0x82, 0x3e, 0x1a, 0xf7, 0x51, 0x2e, 0x61, 0x43, 0x87, 0x2f, 0xef, 0x30, 0xa6, 0x4e, 0x2f, 0x17, 0x99, 0xbd, 0x56, 0x18, 0x7e, 0x50, 0x3e, 0x1a, 0x48, 0xc2, 0x7b, 0x54, 0x9f, 0xe0, 0xa4, 0xce, 0x5e, 0x58, 0x1e, 0x24, 0x2c, 0x86, 0x63, 0xfc, 0x9e, 0xfb, 0x02, 0xd6, 0xf2, 0xb1, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3453 = { .name = "ecdsa_secp224r1_sha256_3453", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3453_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3453_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3453_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 360 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3454 for ECDSA, tcId is 361 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3454_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha256_3454_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3454_sig[] = { 0x36, 0x24, 0x5e, 0xf1, 0x26, 0xb5, 0xb5, 0x1e, 0x45, 0x9f, 0x84, 0xea, 0xaa, 0xd5, 0xa4, 0x95, 0x06, 0x1f, 0x04, 0x71, 0xdc, 0x8c, 0x23, 0xf1, 0xc5, 0xf1, 0x62, 0x82, 0x39, 0xe3, 0x1d, 0x72, 0xa0, 0x6b, 0xa8, 0xe1, 0x4f, 0xcf, 0x95, 0x77, 0x8e, 0x07, 0xbc, 0x16, 0xa2, 0x62, 0x8e, 0x39, 0x44, 0x9d, 0xa8, 0x85, 0x7d, 0x50, 0x6e, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3454 = { .name = "ecdsa_secp224r1_sha256_3454", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3454_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3454_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3454_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 361 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3455 for ECDSA, tcId is 362 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3455_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha256_3455_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3455_sig[] = { 0x25, 0x86, 0x82, 0x97, 0x5d, 0xf8, 0xbc, 0xa7, 0xf2, 0x03, 0xf7, 0x71, 0xeb, 0xeb, 0x47, 0x8e, 0xf6, 0x37, 0x36, 0x0c, 0x86, 0x0f, 0xc3, 0x86, 0xcf, 0xb2, 0x17, 0x45, 0x76, 0x63, 0xe7, 0x01, 0x88, 0x04, 0x7e, 0x41, 0x46, 0x9a, 0x2a, 0x35, 0xc8, 0xc3, 0x30, 0xdd, 0x90, 0x0f, 0x23, 0x40, 0xba, 0x82, 0xaa, 0xfd, 0x22, 0x96, 0x2a, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3455 = { .name = "ecdsa_secp224r1_sha256_3455", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3455_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3455_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3455_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 362 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3456 for ECDSA, tcId is 363 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3456_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha256_3456_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3456_sig[] = { 0x85, 0xc9, 0x86, 0x14, 0xf3, 0x6c, 0x0d, 0x66, 0xf8, 0xd8, 0x78, 0x34, 0xca, 0xe9, 0x78, 0x61, 0x1b, 0x7b, 0x4e, 0xeb, 0xf5, 0x9a, 0x46, 0xbe, 0xa1, 0xb8, 0x9a, 0xe9, 0xd1, 0xa1, 0x8e, 0x37, 0x8d, 0xda, 0x84, 0x0e, 0x06, 0xb6, 0x0f, 0x62, 0x79, 0xbf, 0x0a, 0x22, 0x31, 0xd9, 0xfa, 0x2d, 0x8d, 0x2c, 0x31, 0xe8, 0x8b, 0xc1, 0xbd, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3456 = { .name = "ecdsa_secp224r1_sha256_3456", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3456_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3456_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3456_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 363 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3457 for ECDSA, tcId is 364 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3457_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha256_3457_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3457_sig[] = { 0xca, 0x7b, 0x74, 0x32, 0xba, 0x41, 0xff, 0x21, 0x12, 0xe1, 0x11, 0x6f, 0xff, 0xde, 0x89, 0xbb, 0xd6, 0x8f, 0x5c, 0xe6, 0x7f, 0xe5, 0x51, 0x3d, 0x16, 0xc8, 0xe6, 0xf7, 0xe4, 0x21, 0xb7, 0x59, 0x9e, 0x01, 0x80, 0x79, 0x8a, 0xcc, 0x20, 0x06, 0x45, 0x16, 0x03, 0xcd, 0xa2, 0xdb, 0x1d, 0x58, 0x27, 0x41, 0x11, 0x6e, 0x60, 0x33, 0xce, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3457 = { .name = "ecdsa_secp224r1_sha256_3457", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3457_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3457_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3457_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 364 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3458 for ECDSA, tcId is 365 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3458_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha256_3458_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3458_sig[] = { 0x19, 0x39, 0x7f, 0xe5, 0xd3, 0xec, 0xab, 0xf8, 0x0f, 0xc6, 0x24, 0xc1, 0xbf, 0x37, 0x95, 0x64, 0x38, 0x75, 0x17, 0xc1, 0x85, 0x08, 0x7d, 0xc9, 0x7d, 0x60, 0x50, 0x69, 0x33, 0xb5, 0x77, 0x3e, 0x9a, 0xaf, 0x6c, 0x34, 0xcb, 0x61, 0x2c, 0xfc, 0x81, 0xef, 0xd3, 0xbf, 0x9c, 0x22, 0x22, 0x4e, 0x8c, 0x4f, 0xa1, 0xbf, 0xcc, 0xf5, 0xc5, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3458 = { .name = "ecdsa_secp224r1_sha256_3458", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3458_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3458_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3458_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 365 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3459 for ECDSA, tcId is 366 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3459_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha256_3459_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3459_sig[] = { 0x70, 0xf2, 0x4f, 0x5c, 0x16, 0x41, 0x64, 0xbf, 0xbb, 0x84, 0x59, 0xaa, 0x12, 0xa9, 0x81, 0xaa, 0x31, 0x2d, 0xbc, 0xf0, 0x02, 0x04, 0x32, 0x6e, 0xba, 0xaa, 0xbd, 0xc8, 0xf5, 0xce, 0xbe, 0xe8, 0xca, 0xed, 0xae, 0x86, 0x62, 0xc4, 0x35, 0x01, 0x66, 0x50, 0x84, 0xb4, 0x5d, 0x2f, 0x49, 0x4f, 0xb7, 0x0d, 0x60, 0x30, 0x43, 0x54, 0x3d, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3459 = { .name = "ecdsa_secp224r1_sha256_3459", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3459_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3459_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3459_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 366 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3460 for ECDSA, tcId is 367 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3460_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha256_3460_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3460_sig[] = { 0x0b, 0xf2, 0xd8, 0x6e, 0xca, 0xa8, 0xb5, 0x6a, 0xca, 0x5e, 0x8f, 0x8e, 0xbc, 0xb4, 0x50, 0x81, 0xd0, 0x78, 0xa1, 0x45, 0x55, 0xb7, 0x5f, 0x5b, 0xe8, 0xe9, 0xb1, 0x32, 0x9a, 0x55, 0xb3, 0xce, 0x47, 0x34, 0x84, 0x99, 0x66, 0xb5, 0x03, 0x4c, 0xcd, 0x9b, 0x19, 0xf7, 0x64, 0x07, 0xee, 0x02, 0x41, 0xc3, 0xf5, 0x8e, 0x7b, 0x8f, 0xc8, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3460 = { .name = "ecdsa_secp224r1_sha256_3460", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3460_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3460_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3460_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 367 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3461 for ECDSA, tcId is 368 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3461_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3461_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3461_sig[] = { 0xbf, 0xc5, 0xdc, 0x44, 0x34, 0xcd, 0x09, 0x36, 0x96, 0x10, 0x68, 0x7d, 0x38, 0xd2, 0xd4, 0x18, 0xb6, 0x3f, 0xd4, 0x75, 0xde, 0xa2, 0x46, 0xa4, 0x56, 0xb2, 0x5a, 0x3a, 0xb1, 0x71, 0xdf, 0xa6, 0xcf, 0x72, 0x2f, 0x20, 0x81, 0x63, 0x70, 0xa8, 0x68, 0x78, 0x5d, 0xa8, 0x42, 0xb3, 0x7b, 0xac, 0x31, 0xd7, 0xb7, 0x8e, 0x67, 0x51, 0xfc, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3461 = { .name = "ecdsa_secp224r1_sha256_3461", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3461_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3461_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3461_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 368 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3462 for ECDSA, tcId is 369 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3462_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3462_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3462_sig[] = { 0x8f, 0xdb, 0xe8, 0xda, 0x64, 0x6c, 0x56, 0x42, 0xd7, 0x67, 0xc7, 0xdb, 0xeb, 0x38, 0x72, 0xb1, 0xed, 0xab, 0x6e, 0x37, 0x36, 0x58, 0x05, 0xf0, 0xe9, 0x4c, 0xe0, 0xa9, 0xbc, 0xf3, 0x5a, 0xb8, 0x12, 0x22, 0x88, 0x3d, 0xd3, 0x52, 0x6c, 0xb0, 0xcf, 0x93, 0x13, 0x8f, 0x46, 0x87, 0xcd, 0x0b, 0x10, 0xc2, 0xb0, 0xa1, 0x26, 0x38, 0x51, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3462 = { .name = "ecdsa_secp224r1_sha256_3462", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3462_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3462_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3462_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 369 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3463 for ECDSA, tcId is 370 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3463_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha256_3463_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3463_sig[] = { 0xe2, 0x3a, 0x11, 0x27, 0x58, 0x48, 0xfd, 0x4f, 0x8b, 0x6f, 0x4a, 0xc4, 0xfc, 0x30, 0x5e, 0xae, 0x98, 0x1d, 0x3b, 0x7d, 0xc4, 0x53, 0xe5, 0xa9, 0x80, 0xc4, 0x64, 0x22, 0x1a, 0x87, 0x56, 0x93, 0xf2, 0x4a, 0x03, 0xea, 0x16, 0x14, 0xc4, 0xc3, 0xbb, 0xd0, 0xdd, 0x72, 0x21, 0x42, 0x9f, 0x22, 0xb3, 0x37, 0xea, 0x7d, 0x98, 0x34, 0x8c, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3463 = { .name = "ecdsa_secp224r1_sha256_3463", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3463_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3463_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3463_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 370 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3464 for ECDSA, tcId is 371 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3464_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha256_3464_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3464_sig[] = { 0x76, 0x64, 0x51, 0x64, 0xff, 0x9a, 0xf3, 0xa1, 0xa9, 0x20, 0x5f, 0xda, 0x2e, 0xef, 0x32, 0x6d, 0x2b, 0xff, 0xc7, 0x95, 0xdc, 0xc4, 0x82, 0x95, 0x47, 0xfe, 0x01, 0xdd, 0xb6, 0x5b, 0xba, 0x50, 0x37, 0x19, 0x31, 0x4b, 0x27, 0x73, 0x4d, 0xd0, 0x6b, 0x13, 0x95, 0xd5, 0x40, 0xaf, 0x83, 0x96, 0x02, 0x9b, 0x78, 0xb8, 0x4e, 0x01, 0x49, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3464 = { .name = "ecdsa_secp224r1_sha256_3464", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3464_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3464_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3464_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 371 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3465 for ECDSA, tcId is 372 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3465_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha256_3465_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3465_sig[] = { 0x32, 0xfa, 0x0c, 0xa7, 0xe0, 0x7f, 0x1f, 0x86, 0xac, 0x35, 0x07, 0x34, 0x99, 0x4e, 0x1f, 0x31, 0xb6, 0xda, 0x9c, 0x82, 0xf9, 0x3d, 0xce, 0xd2, 0xb9, 0x83, 0xc2, 0x9c, 0x7b, 0x78, 0x91, 0x28, 0x22, 0x06, 0xa4, 0x57, 0x11, 0xbd, 0xfc, 0xb2, 0xa1, 0x02, 0xb5, 0xd2, 0x89, 0xdf, 0x84, 0xff, 0x57, 0x78, 0x54, 0x86, 0x03, 0x57, 0x40, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3465 = { .name = "ecdsa_secp224r1_sha256_3465", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3465_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3465_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3465_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 372 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3466 for ECDSA, tcId is 373 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3466_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha256_3466_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3466_sig[] = { 0x2d, 0x54, 0x92, 0x47, 0x8c, 0xa6, 0x4e, 0x51, 0x11, 0xdf, 0xd8, 0x52, 0x18, 0x67, 0xb6, 0x47, 0x7b, 0x7e, 0x78, 0x22, 0x78, 0x49, 0xad, 0x09, 0x0b, 0x85, 0x56, 0x94, 0xa5, 0x32, 0xf5, 0xa2, 0xfa, 0x35, 0x94, 0xaf, 0x81, 0xcd, 0x59, 0x28, 0xb8, 0x1b, 0x40, 0x57, 0xda, 0x71, 0x7b, 0xe5, 0xfb, 0x42, 0xa3, 0xa8, 0x6c, 0x68, 0x19, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3466 = { .name = "ecdsa_secp224r1_sha256_3466", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3466_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3466_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3466_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 373 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3467 for ECDSA, tcId is 374 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3467_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha256_3467_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3467_sig[] = { 0x19, 0x1e, 0xee, 0x5d, 0xaf, 0x55, 0xcd, 0x49, 0x9e, 0x85, 0x39, 0xcb, 0x2c, 0xff, 0x79, 0x7c, 0xfe, 0xc5, 0xd5, 0x66, 0xd2, 0x02, 0x7b, 0xf9, 0xf8, 0xd6, 0x46, 0x93, 0xda, 0xdf, 0xea, 0xe8, 0x13, 0x1f, 0x64, 0xd9, 0x6b, 0x94, 0xfd, 0x34, 0x01, 0x97, 0xca, 0xa2, 0xbc, 0x04, 0x81, 0x85, 0x54, 0x81, 0x2f, 0xee, 0xf3, 0x34, 0x30, 0x70, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3467 = { .name = "ecdsa_secp224r1_sha256_3467", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3467_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3467_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3467_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 374 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3468 for ECDSA, tcId is 375 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3468_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha256_3468_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3468_sig[] = { 0xe0, 0xe2, 0xc0, 0x81, 0x80, 0xb8, 0xa2, 0x07, 0xee, 0x91, 0x05, 0xa7, 0xd3, 0x79, 0xfa, 0x11, 0x23, 0x68, 0xe8, 0x37, 0x0f, 0xa0, 0x9d, 0xfd, 0xe4, 0xa4, 0x5c, 0x45, 0xc7, 0x17, 0xbc, 0x08, 0x60, 0xe0, 0x16, 0xe7, 0xce, 0x48, 0xf8, 0xfe, 0x6a, 0x29, 0x9b, 0x36, 0x90, 0x6a, 0x60, 0x55, 0xad, 0xad, 0x93, 0xb4, 0x16, 0xce, 0x88, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3468 = { .name = "ecdsa_secp224r1_sha256_3468", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3468_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3468_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3468_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 375 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3469 for ECDSA, tcId is 376 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3469_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha256_3469_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3469_sig[] = { 0x1b, 0x91, 0x9e, 0xf9, 0x35, 0x32, 0x29, 0x27, 0x43, 0xbb, 0x2e, 0x1b, 0x7b, 0x48, 0x94, 0xfd, 0x84, 0x7c, 0x6e, 0x5d, 0xe5, 0x2a, 0x08, 0xe1, 0xb0, 0xf2, 0xdc, 0xfb, 0xc2, 0xd3, 0x0d, 0x6b, 0x75, 0x94, 0xd8, 0xdb, 0xd2, 0x61, 0x49, 0x1a, 0xe1, 0xd5, 0x87, 0x79, 0x50, 0x5b, 0x07, 0x5b, 0x64, 0xe5, 0x56, 0x4d, 0xc9, 0x7a, 0x41, 0x8b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3469 = { .name = "ecdsa_secp224r1_sha256_3469", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3469_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3469_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3469_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 376 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3470 for ECDSA, tcId is 377 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3470_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha256_3470_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3470_sig[] = { 0xe7, 0x5d, 0xb4, 0x9e, 0xd3, 0x3f, 0xf2, 0x88, 0x5e, 0xa6, 0x10, 0x0c, 0xc9, 0x5b, 0x8f, 0xe1, 0xb9, 0x24, 0x2e, 0xa4, 0x24, 0x8d, 0xb0, 0x7b, 0xca, 0xc2, 0xe0, 0x20, 0x79, 0x6c, 0x86, 0x61, 0x42, 0xae, 0x8e, 0xb7, 0x5b, 0xb0, 0x49, 0x9c, 0x66, 0x8c, 0x6f, 0xe4, 0x54, 0x97, 0x69, 0x2f, 0xbc, 0xc6, 0x6b, 0x37, 0xc2, 0xe4, 0x62, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3470 = { .name = "ecdsa_secp224r1_sha256_3470", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3470_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3470_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3470_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 377 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3471 for ECDSA, tcId is 378 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3471_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha256_3471_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3471_sig[] = { 0x1f, 0x81, 0xcd, 0x92, 0x43, 0x62, 0xec, 0x82, 0x58, 0x90, 0x30, 0x7b, 0x9b, 0x39, 0x36, 0xe0, 0xd8, 0xf7, 0x28, 0xa7, 0xc8, 0x4b, 0xdb, 0x43, 0xc5, 0xcf, 0x04, 0x33, 0x39, 0xd3, 0xe4, 0x6a, 0x03, 0x04, 0x0a, 0xd4, 0x1a, 0xc0, 0x26, 0xb1, 0x8e, 0x06, 0x29, 0xf6, 0x14, 0x5e, 0x3d, 0xc8, 0xd1, 0xe6, 0xbb, 0xe2, 0x00, 0xc8, 0x48, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3471 = { .name = "ecdsa_secp224r1_sha256_3471", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3471_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3471_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3471_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 378 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3472 for ECDSA, tcId is 379 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3472_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha256_3472_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3472_sig[] = { 0x00, 0xfd, 0xa6, 0x13, 0xaa, 0x67, 0xca, 0x42, 0x67, 0x3a, 0xd4, 0x30, 0x9f, 0x3f, 0x0f, 0x05, 0xb2, 0x56, 0x9f, 0x3d, 0xee, 0x63, 0xf4, 0xaa, 0x9c, 0xc5, 0x4c, 0xf3, 0x1e, 0x5a, 0x64, 0xb6, 0x8a, 0x37, 0xe5, 0xb2, 0x01, 0xc9, 0x18, 0x30, 0x3d, 0xc7, 0xa4, 0x04, 0x39, 0xaa, 0xea, 0xcf, 0x01, 0x9c, 0x58, 0x92, 0xa8, 0xf6, 0xd0, 0xce, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3472 = { .name = "ecdsa_secp224r1_sha256_3472", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3472_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3472_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3472_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 379 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3473 for ECDSA, tcId is 380 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3473_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha256_3473_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3473_sig[] = { 0xb9, 0x32, 0xb3, 0xf7, 0xe6, 0x46, 0x7e, 0x1e, 0xc7, 0xa5, 0x61, 0xf3, 0x11, 0x60, 0x24, 0x8c, 0x7f, 0x22, 0x45, 0x50, 0xa8, 0x50, 0x87, 0x88, 0x63, 0x4b, 0x53, 0xce, 0xa0, 0xc5, 0x31, 0x2a, 0xcf, 0x9e, 0x80, 0x1a, 0xff, 0x6d, 0x6f, 0xc9, 0x85, 0x50, 0xcf, 0xa7, 0x12, 0xbb, 0xf6, 0x59, 0x37, 0x16, 0x5a, 0x36, 0xf2, 0xc3, 0x2d, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3473 = { .name = "ecdsa_secp224r1_sha256_3473", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3473_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3473_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3473_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 380 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3474 for ECDSA, tcId is 381 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3474_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha256_3474_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3474_sig[] = { 0xe5, 0x09, 0x59, 0x3f, 0xb0, 0x92, 0x45, 0xee, 0x82, 0x26, 0xce, 0x72, 0x78, 0x6b, 0x0c, 0xc3, 0x52, 0xbe, 0x55, 0x5a, 0x74, 0x86, 0xbe, 0x62, 0x8f, 0x4f, 0xd0, 0x0c, 0x0b, 0x7a, 0xbd, 0xe0, 0x06, 0x1b, 0x1e, 0x07, 0xbf, 0x13, 0x31, 0x91, 0x50, 0xa4, 0xff, 0x6a, 0x46, 0x4a, 0xba, 0xb6, 0x36, 0xab, 0x4e, 0x29, 0x7b, 0x0d, 0x76, 0x33, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3474 = { .name = "ecdsa_secp224r1_sha256_3474", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3474_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3474_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3474_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 381 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3475 for ECDSA, tcId is 382 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3475_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha256_3475_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3475_sig[] = { 0x6e, 0x54, 0xf9, 0x41, 0x20, 0x4d, 0x46, 0x39, 0xb8, 0x63, 0xc9, 0x8a, 0x65, 0xb7, 0xbe, 0xe3, 0x18, 0xd5, 0x1a, 0xb1, 0x90, 0x0a, 0x8f, 0x34, 0x5e, 0xac, 0x6f, 0x07, 0x0d, 0xa5, 0x05, 0x48, 0x29, 0x21, 0x4e, 0xcd, 0xe5, 0xe1, 0x05, 0x79, 0xb3, 0x6a, 0x2f, 0xe6, 0x42, 0x6c, 0x24, 0xb0, 0x64, 0xed, 0x77, 0xc3, 0x85, 0x90, 0xf2, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3475 = { .name = "ecdsa_secp224r1_sha256_3475", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3475_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3475_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3475_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 382 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3476 for ECDSA, tcId is 383 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3476_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha256_3476_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3476_sig[] = { 0x85, 0xea, 0x4a, 0xb3, 0xff, 0xdc, 0x99, 0x23, 0x30, 0xc0, 0xca, 0x81, 0x52, 0xfa, 0xf9, 0x91, 0x38, 0x6b, 0xce, 0x82, 0x87, 0x7d, 0xbb, 0x23, 0x9b, 0xa6, 0x54, 0xf6, 0x08, 0x06, 0xc6, 0xba, 0xf0, 0xeb, 0xea, 0x4c, 0x1a, 0xaa, 0x19, 0x0e, 0x7d, 0x43, 0x25, 0xd4, 0x6d, 0x1f, 0x77, 0x89, 0xd5, 0x50, 0x63, 0x2b, 0x70, 0xb5, 0xfc, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3476 = { .name = "ecdsa_secp224r1_sha256_3476", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3476_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3476_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3476_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 383 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3477 for ECDSA, tcId is 384 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3477_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha256_3477_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3477_sig[] = { 0x44, 0xd5, 0x3d, 0xeb, 0xb6, 0x46, 0xb7, 0x34, 0x85, 0x40, 0x2e, 0xab, 0x2d, 0x09, 0x90, 0x81, 0xb9, 0x7b, 0x12, 0x43, 0xc0, 0x25, 0xb6, 0x24, 0xf0, 0xdd, 0x67, 0xea, 0xe5, 0xde, 0x78, 0x9a, 0x7d, 0x4b, 0x77, 0xea, 0xc6, 0xd7, 0xbb, 0xa4, 0x16, 0x58, 0xe6, 0xe4, 0xdc, 0x34, 0x7d, 0xab, 0xed, 0x2f, 0x96, 0x80, 0xc0, 0x4a, 0x6f, 0x55, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3477 = { .name = "ecdsa_secp224r1_sha256_3477", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3477_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3477_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3477_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 384 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3478 for ECDSA, tcId is 385 in file ecdsa_secp224r1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp224r1_sha256_3478_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha256_3478_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha256_3478_sig[] = { 0x15, 0x26, 0xeb, 0x2f, 0x65, 0x7e, 0xbe, 0xa9, 0xaf, 0x4c, 0xa1, 0x84, 0xb9, 0x75, 0xc0, 0x23, 0x72, 0xc8, 0x8e, 0x24, 0xe8, 0x35, 0xf3, 0xf5, 0x77, 0x4c, 0x0e, 0x12, 0x1f, 0x1e, 0xcc, 0xe3, 0x8e, 0xe5, 0x23, 0x72, 0xcb, 0x20, 0x19, 0x07, 0x79, 0x4d, 0xe1, 0x7b, 0x6d, 0x6c, 0x1a, 0xfa, 0x13, 0xc3, 0x16, 0xc5, 0x1c, 0xb0, 0x7b, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha256_3478 = { .name = "ecdsa_secp224r1_sha256_3478", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha256_3478_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha256_3478_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha256_3478_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 385 in file ecdsa_secp224r1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA256) */ /* Test 3479 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3479_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3479_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3479_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x56, 0xc8, 0x09, 0x70, 0xd9, 0xa3, 0x08, 0xa9, 0xf6, 0x39, 0xed, 0x19, 0x9a, 0xc0, 0x88, 0xf9, 0x3b, 0xa9, 0xaf, 0xd0, 0x4c, 0x53, 0xf4, 0x8e, 0x4f, 0xa8, 0x8d, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3479 = { .name = "ecdsa_secp224r1_sha3_224_3479", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3479_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3479_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3479_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3480 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3480_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3480_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3480_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3480 = { .name = "ecdsa_secp224r1_sha3_224_3480", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3480_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3480_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3480_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of r misses leading 0, tcId is 2 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3481 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3481_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3481_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3481_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3481 = { .name = "ecdsa_secp224r1_sha3_224_3481", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3481_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3481_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3481_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of s misses leading 0, tcId is 3 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3482 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3482_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3482_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3482_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3482 = { .name = "ecdsa_secp224r1_sha3_224_3482", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3482_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3482_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3482_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 4 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3483 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3483_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3483_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3483_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3483 = { .name = "ecdsa_secp224r1_sha3_224_3483", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3483_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3483_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3483_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 5 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3484 for ECDSA, tcId is 6 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3484_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3484_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3484_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3484 = { .name = "ecdsa_secp224r1_sha3_224_3484", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3484_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3484_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3484_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 6 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3485 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3485_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3485_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3485_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3485 = { .name = "ecdsa_secp224r1_sha3_224_3485", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3485_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3485_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3485_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3486 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3486_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3486_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3486_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3486 = { .name = "ecdsa_secp224r1_sha3_224_3486", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3486_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3486_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3486_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 70 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3487 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3487_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3487_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3487_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3487 = { .name = "ecdsa_secp224r1_sha3_224_3487", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3487_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3487_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3487_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3488 for ECDSA, tcId is 72 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3488_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3488_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3488_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3488 = { .name = "ecdsa_secp224r1_sha3_224_3488", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3488_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3488_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3488_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 72 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3489 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3489_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3489_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3489_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x00, 0x00, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3489 = { .name = "ecdsa_secp224r1_sha3_224_3489", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3489_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3489_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3489_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3490 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3490_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3490_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3490_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3490 = { .name = "ecdsa_secp224r1_sha3_224_3490", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3490_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3490_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3490_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 95 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3491 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3491_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3491_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3491_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3491 = { .name = "ecdsa_secp224r1_sha3_224_3491", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3491_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3491_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3491_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3492 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3492_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3492_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3492_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3492 = { .name = "ecdsa_secp224r1_sha3_224_3492", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3492_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3492_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3492_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 97 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3493 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3493_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3493_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3493_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x05, 0x00, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3493 = { .name = "ecdsa_secp224r1_sha3_224_3493", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3493_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3493_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3493_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3494 for ECDSA, tcId is 100 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3494_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3494_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3494_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3494 = { .name = "ecdsa_secp224r1_sha3_224_3494", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3494_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3494_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3494_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 100 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3495 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3495_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3495_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3495_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3495 = { .name = "ecdsa_secp224r1_sha3_224_3495", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3495_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3495_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3495_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3496 for ECDSA, tcId is 116 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3496_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3496_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3496_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3496 = { .name = "ecdsa_secp224r1_sha3_224_3496", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3496_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3496_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3496_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 116 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3497 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3497_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3497_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3497_sig[] = { 0x02, 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3497 = { .name = "ecdsa_secp224r1_sha3_224_3497", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3497_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3497_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3497_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3498 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3498_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3498_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3498_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x02, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3498 = { .name = "ecdsa_secp224r1_sha3_224_3498", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3498_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3498_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3498_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 120 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3499 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3499_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3499_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3499_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0xf6, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3499 = { .name = "ecdsa_secp224r1_sha3_224_3499", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3499_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3499_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3499_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3500 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3500_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3500_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3500_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x83, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3500 = { .name = "ecdsa_secp224r1_sha3_224_3500", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3500_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3500_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3500_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 122 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3501 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3501_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3501_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3501_sig[] = { 0x00, 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3501 = { .name = "ecdsa_secp224r1_sha3_224_3501", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3501_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3501_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3501_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3502 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3502_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3502_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3502_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x00, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3502 = { .name = "ecdsa_secp224r1_sha3_224_3502", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3502_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3502_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3502_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3503 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3503_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3503_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3503_sig[] = { 0x00, 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3503 = { .name = "ecdsa_secp224r1_sha3_224_3503", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3503_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3503_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3503_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3504 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3504_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3504_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3504_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x00, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3504 = { .name = "ecdsa_secp224r1_sha3_224_3504", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3504_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3504_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3504_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp224r1_sha3_224_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3505 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3505_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3505_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3505_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3505 = { .name = "ecdsa_secp224r1_sha3_224_3505", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3505_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3505_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3505_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3506 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3506_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3506_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3506_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3506 = { .name = "ecdsa_secp224r1_sha3_224_3506", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3506_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3506_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3506_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3507 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3507_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3507_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3507_sig[] = { 0x01, 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa1, 0xeb, 0xa1, 0x54, 0xc6, 0x1a, 0x02, 0xd5, 0xe2, 0xff, 0xf1, 0x71, 0xe0, 0x7d, 0xb3, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3507 = { .name = "ecdsa_secp224r1_sha3_224_3507", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3507_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3507_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3507_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3508 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3508_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3508_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3508_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa3, 0xbe, 0x5b, 0x93, 0x54, 0x39, 0x86, 0xae, 0x28, 0xad, 0x66, 0xb9, 0x28, 0x29, 0x39, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3508 = { .name = "ecdsa_secp224r1_sha3_224_3508", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3508_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3508_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3508_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3509 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3509_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3509_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3509_sig[] = { 0x42, 0x14, 0x71, 0x24, 0x34, 0xcf, 0x77, 0xa3, 0x9a, 0x43, 0x4a, 0x72, 0x91, 0x5d, 0x2b, 0x01, 0x8b, 0xf2, 0xd6, 0x3b, 0x3d, 0xfa, 0x29, 0x53, 0xea, 0x7b, 0xac, 0x8a, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3509 = { .name = "ecdsa_secp224r1_sha3_224_3509", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3509_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3509_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3509_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3510 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3510_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3510_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3510_sig[] = { 0x42, 0x14, 0x71, 0x24, 0x34, 0xcf, 0x77, 0xa3, 0x9a, 0x43, 0x4a, 0x72, 0x91, 0x5c, 0x41, 0xa4, 0x6c, 0xab, 0xc6, 0x79, 0x51, 0xd7, 0x52, 0x99, 0x46, 0xd7, 0xd6, 0xc7, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3510 = { .name = "ecdsa_secp224r1_sha3_224_3510", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3510_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3510_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3510_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3511 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3511_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3511_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3511_sig[] = { 0xfe, 0x42, 0x14, 0x71, 0x24, 0x34, 0xcf, 0x77, 0xa3, 0x9a, 0x43, 0x4a, 0x72, 0x91, 0x5e, 0x14, 0x5e, 0xab, 0x39, 0xe5, 0xfd, 0x2a, 0x1d, 0x00, 0x0e, 0x8e, 0x1f, 0x82, 0x4d, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3511 = { .name = "ecdsa_secp224r1_sha3_224_3511", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3511_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3511_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3511_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3512 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3512_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3512_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3512_sig[] = { 0x01, 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3512 = { .name = "ecdsa_secp224r1_sha3_224_3512", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3512_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3512_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3512_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3513 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3513_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3513_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3513_sig[] = { 0x42, 0x14, 0x71, 0x24, 0x34, 0xcf, 0x77, 0xa3, 0x9a, 0x43, 0x4a, 0x72, 0x91, 0x5d, 0x2b, 0x01, 0x8b, 0xf2, 0xd6, 0x3b, 0x3d, 0xfa, 0x29, 0x53, 0xea, 0x7b, 0xac, 0x8a, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3513 = { .name = "ecdsa_secp224r1_sha3_224_3513", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3513_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3513_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3513_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3514 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3514_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3514_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3514_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x01, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3d, 0xa4, 0x4c, 0x85, 0xc8, 0x30, 0xab, 0xdb, 0x66, 0x5d, 0xfc, 0x69, 0x0f, 0xc7, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3514 = { .name = "ecdsa_secp224r1_sha3_224_3514", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3514_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3514_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3514_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3515 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3515_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3515_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3515_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3f, 0x77, 0x06, 0xc4, 0x56, 0x50, 0x2f, 0xb3, 0xac, 0x0b, 0x71, 0xb0, 0x57, 0x72, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3515 = { .name = "ecdsa_secp224r1_sha3_224_3515", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3515_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3515_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3515_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3516 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3516_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3516_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3516_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x56, 0xc8, 0x09, 0x70, 0xd9, 0xa3, 0x08, 0xa9, 0xf6, 0x39, 0xed, 0x19, 0x9a, 0xc1, 0x72, 0x56, 0x5a, 0xf0, 0xbf, 0x92, 0x38, 0x76, 0xcb, 0x48, 0xf3, 0x4c, 0x62, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3516 = { .name = "ecdsa_secp224r1_sha3_224_3516", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3516_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3516_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3516_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3517 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3517_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3517_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3517_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0xfe, 0x56, 0xc8, 0x09, 0x70, 0xd9, 0xa3, 0x08, 0xa9, 0xf6, 0x39, 0xed, 0x19, 0x9a, 0xc2, 0x5b, 0xb3, 0x7a, 0x37, 0xcf, 0x54, 0x24, 0x99, 0xa2, 0x03, 0x96, 0xf0, 0x38, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3517 = { .name = "ecdsa_secp224r1_sha3_224_3517", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3517_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3517_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3517_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3518 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3518_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3518_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3518_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x01, 0xa9, 0x37, 0xf6, 0x8f, 0x26, 0x5c, 0xf7, 0x56, 0x09, 0xc6, 0x12, 0xe6, 0x65, 0x3e, 0x8d, 0xa9, 0xa5, 0x0f, 0x40, 0x6d, 0xc7, 0x89, 0x34, 0xb7, 0x0c, 0xb3, 0x9d, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3518 = { .name = "ecdsa_secp224r1_sha3_224_3518", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3518_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3518_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3518_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3519 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3519_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3519_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3519_sig[] = { 0xbd, 0xeb, 0x8e, 0xdb, 0xcb, 0x30, 0x88, 0x5c, 0x65, 0xbc, 0xb5, 0x8d, 0x6e, 0xa2, 0xd4, 0xfe, 0x74, 0x0d, 0x29, 0xc4, 0xc2, 0x05, 0xd6, 0xac, 0x15, 0x84, 0x53, 0x76, 0x56, 0xc8, 0x09, 0x70, 0xd9, 0xa3, 0x08, 0xa9, 0xf6, 0x39, 0xed, 0x19, 0x9a, 0xc1, 0x72, 0x56, 0x5a, 0xf0, 0xbf, 0x92, 0x38, 0x76, 0xcb, 0x48, 0xf3, 0x4c, 0x62, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3519 = { .name = "ecdsa_secp224r1_sha3_224_3519", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3519_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3519_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3519_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3520 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3520_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3520_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3520_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3520 = { .name = "ecdsa_secp224r1_sha3_224_3520", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3520_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3520_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3520_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3521 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3521_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3521_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3521_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3521 = { .name = "ecdsa_secp224r1_sha3_224_3521", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3521_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3521_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3521_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3522 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3522_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3522_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3522_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3522 = { .name = "ecdsa_secp224r1_sha3_224_3522", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3522_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3522_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3522_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3523 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3523_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3523_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3523_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3523 = { .name = "ecdsa_secp224r1_sha3_224_3523", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3523_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3523_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3523_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3524 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3524_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3524_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3524_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3524 = { .name = "ecdsa_secp224r1_sha3_224_3524", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3524_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3524_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3524_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3525 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3525_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3525_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3525_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3525 = { .name = "ecdsa_secp224r1_sha3_224_3525", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3525_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3525_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3525_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3526 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3526_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3526_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3526_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3526 = { .name = "ecdsa_secp224r1_sha3_224_3526", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3526_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3526_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3526_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3527 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3527_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3527_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3527_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3527 = { .name = "ecdsa_secp224r1_sha3_224_3527", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3527_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3527_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3527_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3528 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3528_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3528_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3528_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3528 = { .name = "ecdsa_secp224r1_sha3_224_3528", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3528_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3528_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3528_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3529 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3529_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3529_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3529_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3529 = { .name = "ecdsa_secp224r1_sha3_224_3529", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3529_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3529_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3529_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3530 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3530_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3530_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3530_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3530 = { .name = "ecdsa_secp224r1_sha3_224_3530", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3530_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3530_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3530_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3531 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3531_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3531_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3531_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3531 = { .name = "ecdsa_secp224r1_sha3_224_3531", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3531_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3531_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3531_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3532 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3532_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3532_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3532_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3532 = { .name = "ecdsa_secp224r1_sha3_224_3532", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3532_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3532_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3532_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3533 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3533_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3533_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3533_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3533 = { .name = "ecdsa_secp224r1_sha3_224_3533", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3533_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3533_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3533_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3534 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3534_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3534_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3534_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3534 = { .name = "ecdsa_secp224r1_sha3_224_3534", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3534_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3534_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3534_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3535 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3535_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3535_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3535_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3535 = { .name = "ecdsa_secp224r1_sha3_224_3535", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3535_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3535_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3535_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3536 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3536_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3536_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3536_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3536 = { .name = "ecdsa_secp224r1_sha3_224_3536", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3536_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3536_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3536_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3537 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3537_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3537_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3537_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3537 = { .name = "ecdsa_secp224r1_sha3_224_3537", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3537_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3537_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3537_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3538 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3538_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3538_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3538_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3538 = { .name = "ecdsa_secp224r1_sha3_224_3538", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3538_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3538_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3538_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3539 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3539_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3539_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3539_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3539 = { .name = "ecdsa_secp224r1_sha3_224_3539", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3539_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3539_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3539_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3540 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3540_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3540_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3540_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3540 = { .name = "ecdsa_secp224r1_sha3_224_3540", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3540_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3540_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3540_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3541 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3541_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3541_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3541_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3541 = { .name = "ecdsa_secp224r1_sha3_224_3541", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3541_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3541_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3541_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3542 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3542_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3542_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3542_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3542 = { .name = "ecdsa_secp224r1_sha3_224_3542", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3542_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3542_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3542_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3543 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3543_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3543_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3543_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3543 = { .name = "ecdsa_secp224r1_sha3_224_3543", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3543_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3543_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3543_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3544 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3544_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3544_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3544_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3544 = { .name = "ecdsa_secp224r1_sha3_224_3544", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3544_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3544_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3544_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3545 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3545_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3545_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3545_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3545 = { .name = "ecdsa_secp224r1_sha3_224_3545", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3545_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3545_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3545_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3546 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3546_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3546_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3546_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3546 = { .name = "ecdsa_secp224r1_sha3_224_3546", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3546_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3546_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3546_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3547 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3547_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3547_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3547_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3547 = { .name = "ecdsa_secp224r1_sha3_224_3547", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3547_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3547_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3547_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3548 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3548_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3548_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3548_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3548 = { .name = "ecdsa_secp224r1_sha3_224_3548", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3548_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3548_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3548_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3549 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3549_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3549_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3549_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3549 = { .name = "ecdsa_secp224r1_sha3_224_3549", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3549_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3549_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3549_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3550 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3550_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3550_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3550_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3550 = { .name = "ecdsa_secp224r1_sha3_224_3550", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3550_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3550_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3550_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3551 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3551_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3551_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3551_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3551 = { .name = "ecdsa_secp224r1_sha3_224_3551", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3551_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3551_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3551_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3552 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3552_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3552_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3552_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3552 = { .name = "ecdsa_secp224r1_sha3_224_3552", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3552_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3552_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3552_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3553 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3553_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3553_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3553_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3553 = { .name = "ecdsa_secp224r1_sha3_224_3553", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3553_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3553_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3553_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3554 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3554_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3554_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3554_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3554 = { .name = "ecdsa_secp224r1_sha3_224_3554", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3554_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3554_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3554_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3555 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3555_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3555_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3555_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3555 = { .name = "ecdsa_secp224r1_sha3_224_3555", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3555_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3555_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3555_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3556 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3556_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3556_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3556_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3556 = { .name = "ecdsa_secp224r1_sha3_224_3556", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3556_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3556_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3556_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3557 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3557_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3557_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3557_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3557 = { .name = "ecdsa_secp224r1_sha3_224_3557", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3557_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3557_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3557_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3558 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3558_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3558_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3558_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3558 = { .name = "ecdsa_secp224r1_sha3_224_3558", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3558_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3558_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3558_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3559 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3559_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3559_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3559_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3559 = { .name = "ecdsa_secp224r1_sha3_224_3559", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3559_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3559_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3559_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3560 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3560_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3560_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3560_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3560 = { .name = "ecdsa_secp224r1_sha3_224_3560", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3560_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3560_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3560_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3561 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3561_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3561_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3561_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3561 = { .name = "ecdsa_secp224r1_sha3_224_3561", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3561_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3561_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3561_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3562 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3562_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3562_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3562_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3562 = { .name = "ecdsa_secp224r1_sha3_224_3562", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3562_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3562_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3562_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3563 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3563_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3563_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3563_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3563 = { .name = "ecdsa_secp224r1_sha3_224_3563", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3563_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3563_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3563_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3564 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3564_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3564_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3564_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3564 = { .name = "ecdsa_secp224r1_sha3_224_3564", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3564_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3564_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3564_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3565 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3565_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3565_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3565_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3565 = { .name = "ecdsa_secp224r1_sha3_224_3565", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3565_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3565_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3565_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3566 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3566_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3566_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3566_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3566 = { .name = "ecdsa_secp224r1_sha3_224_3566", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3566_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3566_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3566_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3567 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3567_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3567_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3567_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3567 = { .name = "ecdsa_secp224r1_sha3_224_3567", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3567_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3567_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3567_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3568 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3568_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3568_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3568_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3568 = { .name = "ecdsa_secp224r1_sha3_224_3568", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3568_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3568_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3568_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3569 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3569_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3569_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3569_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3569 = { .name = "ecdsa_secp224r1_sha3_224_3569", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3569_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3569_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3569_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3570 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3570_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3570_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3570_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3570 = { .name = "ecdsa_secp224r1_sha3_224_3570", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3570_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3570_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3570_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3571 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3571_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3571_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3571_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3571 = { .name = "ecdsa_secp224r1_sha3_224_3571", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3571_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3571_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3571_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3572 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3572_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3572_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3572_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3572 = { .name = "ecdsa_secp224r1_sha3_224_3572", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3572_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3572_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3572_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3573 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3573_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3573_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3573_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3573 = { .name = "ecdsa_secp224r1_sha3_224_3573", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3573_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3573_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3573_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3574 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3574_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3574_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3574_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3574 = { .name = "ecdsa_secp224r1_sha3_224_3574", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3574_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3574_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3574_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3575 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3575_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3575_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3575_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3575 = { .name = "ecdsa_secp224r1_sha3_224_3575", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3575_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3575_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3575_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3576 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3576_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3576_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3576_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3576 = { .name = "ecdsa_secp224r1_sha3_224_3576", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3576_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3576_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3576_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3577 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3577_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3577_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3577_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3577 = { .name = "ecdsa_secp224r1_sha3_224_3577", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3577_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3577_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3577_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3578 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3578_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3578_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3578_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3578 = { .name = "ecdsa_secp224r1_sha3_224_3578", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3578_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3578_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3578_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3579 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3579_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3579_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3579_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3579 = { .name = "ecdsa_secp224r1_sha3_224_3579", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3579_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3579_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3579_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3580 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3580_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3580_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3580_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3580 = { .name = "ecdsa_secp224r1_sha3_224_3580", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3580_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3580_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3580_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3581 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3581_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3581_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3581_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3581 = { .name = "ecdsa_secp224r1_sha3_224_3581", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3581_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3581_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3581_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3582 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3582_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3582_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3582_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3582 = { .name = "ecdsa_secp224r1_sha3_224_3582", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3582_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3582_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3582_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3583 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3583_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3583_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3583_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3583 = { .name = "ecdsa_secp224r1_sha3_224_3583", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3583_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3583_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3583_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3584 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3584_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3584_msg[] = { 0x34, 0x37, 0x37, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_224_3584_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0xbd, 0x6b, 0x1d, 0x7a, 0xb9, 0x7a, 0xc1, 0xb6, 0x07, 0xc2, 0x2e, 0x04, 0x2f, 0xfc, 0xc0, 0x06, 0x2c, 0x74, 0x41, 0x60, 0xc9, 0x58, 0xad, 0x0b, 0x19, 0x43, 0xa9, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3584 = { .name = "ecdsa_secp224r1_sha3_224_3584", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3584_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3584_msg, .msglen = 4, .sig = ecdsa_secp224r1_sha3_224_3584_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3585 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3585_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3585_msg[] = { 0x38, 0x36, 0x31, 0x38, 0x36, 0x35, 0x36, 0x38, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_224_3585_sig[] = { 0x47, 0x6b, 0xab, 0x7a, 0x32, 0xe1, 0xf6, 0x69, 0x58, 0x49, 0x2d, 0xeb, 0x68, 0x10, 0x33, 0xdc, 0x13, 0x52, 0x76, 0xf6, 0x2d, 0x92, 0x65, 0xc7, 0xc7, 0xfd, 0xdf, 0xf4, 0xbc, 0xce, 0x78, 0xad, 0x80, 0x17, 0xbb, 0x49, 0x94, 0x90, 0xeb, 0x1b, 0xf0, 0x0d, 0xd9, 0xf3, 0x5b, 0x23, 0xb5, 0xe8, 0xbd, 0x03, 0xfe, 0x5b, 0xb0, 0x9e, 0x3f, 0x5f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3585 = { .name = "ecdsa_secp224r1_sha3_224_3585", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3585_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3585_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3585_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3586 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3586_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3586_msg[] = { 0x34, 0x32, 0x31, 0x36, 0x35, 0x39, 0x39, 0x37, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3586_sig[] = { 0x83, 0x55, 0x27, 0x0a, 0xae, 0x4e, 0xf8, 0xdd, 0xa3, 0x3c, 0xdb, 0x3f, 0xad, 0x66, 0x4d, 0xfb, 0x01, 0x24, 0xf6, 0xdc, 0xc0, 0xe7, 0x9a, 0x9a, 0x7b, 0x6b, 0xb1, 0x9f, 0xec, 0x8d, 0x3e, 0x43, 0x97, 0x7e, 0x26, 0x92, 0xec, 0x27, 0xc7, 0x02, 0xa6, 0xf3, 0x49, 0xd4, 0x53, 0x6d, 0x00, 0xcc, 0x01, 0x7b, 0x55, 0xf3, 0x25, 0x22, 0x7d, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3586 = { .name = "ecdsa_secp224r1_sha3_224_3586", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3586_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3586_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3586_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3587 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3587_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3587_msg[] = { 0x33, 0x35, 0x30, 0x35, 0x31, 0x34, 0x35, 0x37, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3587_sig[] = { 0x62, 0x22, 0x91, 0x5d, 0xdf, 0x6e, 0x69, 0xea, 0xef, 0xce, 0x3e, 0xbd, 0xa5, 0x6a, 0xc5, 0x01, 0x42, 0x8b, 0x3d, 0x69, 0xb7, 0xb9, 0x4c, 0x0e, 0x9c, 0xcf, 0x00, 0x10, 0x5a, 0xcb, 0xd1, 0xd1, 0x30, 0xb5, 0x0c, 0x08, 0x77, 0x81, 0x75, 0x17, 0x2a, 0x9d, 0x0d, 0x0e, 0x0e, 0x36, 0xb6, 0xa6, 0x8c, 0x80, 0xaf, 0x9a, 0xea, 0xe4, 0x1b, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3587 = { .name = "ecdsa_secp224r1_sha3_224_3587", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3587_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3587_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3587_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3588 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3588_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3588_msg[] = { 0x34, 0x32, 0x38, 0x33, 0x32, 0x33, 0x34, 0x30, 0x36, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3588_sig[] = { 0x6b, 0x8e, 0x3e, 0xda, 0xf6, 0xaa, 0x9e, 0x63, 0x22, 0xe9, 0x16, 0xba, 0x1c, 0xd2, 0xbc, 0xe6, 0xce, 0x69, 0x4c, 0xa8, 0xe8, 0xf9, 0xf9, 0x99, 0xef, 0xe9, 0xcc, 0x07, 0x79, 0x3b, 0x8d, 0x55, 0x7b, 0x98, 0xe5, 0x04, 0xbf, 0x05, 0xb2, 0xa5, 0x7b, 0x1f, 0xd1, 0xea, 0xff, 0xb3, 0x8e, 0xda, 0x30, 0xdb, 0x7c, 0x5e, 0x8a, 0x55, 0x9c, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3588 = { .name = "ecdsa_secp224r1_sha3_224_3588", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3588_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3588_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3588_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3589 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3589_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3589_msg[] = { 0x31, 0x34, 0x32, 0x38, 0x35, 0x39, 0x39, 0x33, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_224_3589_sig[] = { 0xa8, 0xb7, 0x82, 0x86, 0xf4, 0xb4, 0xad, 0xe2, 0x0d, 0x7a, 0x8f, 0x7c, 0x1c, 0xe3, 0xc2, 0x9d, 0x66, 0x16, 0x43, 0x2e, 0xb9, 0x9b, 0x34, 0xcf, 0x8a, 0x46, 0xd4, 0x21, 0x66, 0xb0, 0x5e, 0x86, 0xc8, 0xa7, 0xe4, 0x1f, 0xec, 0xb5, 0x10, 0x47, 0xa7, 0xb8, 0xd7, 0xc4, 0xa6, 0xba, 0xf8, 0x06, 0xe9, 0xd3, 0x60, 0xf0, 0xc6, 0x71, 0x5c, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3589 = { .name = "ecdsa_secp224r1_sha3_224_3589", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3589_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3589_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3589_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3590 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3590_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3590_msg[] = { 0x31, 0x30, 0x35, 0x32, 0x36, 0x36, 0x34, 0x35, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3590_sig[] = { 0x33, 0x52, 0x9f, 0xca, 0xfc, 0xd1, 0x07, 0x59, 0x6f, 0x84, 0x65, 0x63, 0x60, 0x5f, 0x0d, 0x9c, 0x47, 0x9f, 0x5a, 0xc9, 0x49, 0x8e, 0x32, 0x5e, 0x03, 0x4f, 0xd0, 0x01, 0x75, 0xe2, 0x31, 0xe7, 0x60, 0xbc, 0x10, 0xeb, 0x97, 0x90, 0x1c, 0x2b, 0x8c, 0xcf, 0x90, 0x80, 0x99, 0xce, 0x7f, 0xc5, 0x44, 0x72, 0xfc, 0xb4, 0x19, 0x78, 0x4d, 0x36, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3590 = { .name = "ecdsa_secp224r1_sha3_224_3590", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3590_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3590_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3590_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3591 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3591_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3591_msg[] = { 0x35, 0x34, 0x38, 0x30, 0x39, 0x37, 0x38, 0x37, 0x31, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_224_3591_sig[] = { 0xd4, 0x51, 0x4a, 0xa4, 0xda, 0x10, 0x57, 0x7b, 0xf2, 0x97, 0x4f, 0xf7, 0xf6, 0xe4, 0x10, 0xe8, 0x2f, 0x92, 0x67, 0x87, 0x7b, 0x73, 0x63, 0x1e, 0x0b, 0x33, 0x6e, 0xcb, 0x93, 0x6e, 0x3d, 0xdc, 0x78, 0x46, 0xce, 0xeb, 0xb4, 0xf9, 0xe8, 0xc2, 0x62, 0xd0, 0x14, 0xf8, 0xec, 0x5a, 0xe9, 0x0c, 0xeb, 0xed, 0x23, 0x59, 0xb4, 0x9a, 0xa5, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3591 = { .name = "ecdsa_secp224r1_sha3_224_3591", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3591_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3591_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_224_3591_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3592 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3592_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3592_msg[] = { 0x36, 0x32, 0x33, 0x39, 0x37, 0x36, 0x39, 0x31, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3592_sig[] = { 0x65, 0xd3, 0x5e, 0x97, 0xf9, 0x45, 0x5b, 0xbc, 0x13, 0xc8, 0xec, 0x28, 0xf8, 0xb8, 0xd1, 0x3a, 0xb7, 0x32, 0x7f, 0xe7, 0x7c, 0x38, 0xb4, 0x0f, 0x5b, 0x85, 0x5c, 0x37, 0xa2, 0x1c, 0xad, 0x03, 0x3d, 0x04, 0x65, 0x9b, 0xd2, 0x53, 0x9e, 0x78, 0x38, 0xe8, 0x37, 0x7b, 0x5b, 0x11, 0xf1, 0x4d, 0x0c, 0x01, 0x66, 0x16, 0x77, 0x55, 0x86, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3592 = { .name = "ecdsa_secp224r1_sha3_224_3592", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3592_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3592_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3592_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3593 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3593_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3593_msg[] = { 0x38, 0x35, 0x34, 0x38, 0x39, 0x38, 0x33, 0x34, 0x35, 0x35, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_224_3593_sig[] = { 0xd4, 0x44, 0xef, 0x96, 0x64, 0x9d, 0x01, 0xd2, 0xa4, 0x7a, 0x9d, 0xd6, 0x21, 0x0b, 0x45, 0xff, 0xfe, 0xc0, 0xed, 0x1a, 0x4c, 0xb7, 0x43, 0x8e, 0x8c, 0xcc, 0xf0, 0x48, 0xa8, 0x28, 0x34, 0x1b, 0xea, 0x5c, 0x28, 0xb5, 0x50, 0x97, 0xe7, 0x73, 0x32, 0xdd, 0x7e, 0x30, 0x3d, 0xf7, 0x89, 0xa2, 0xa6, 0x79, 0x46, 0xde, 0x23, 0xdd, 0x34, 0x73, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3593 = { .name = "ecdsa_secp224r1_sha3_224_3593", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3593_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3593_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_224_3593_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3594 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3594_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3594_msg[] = { 0x37, 0x33, 0x32, 0x37, 0x33, 0x37, 0x33, 0x36, 0x35, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3594_sig[] = { 0x09, 0x46, 0x3b, 0xaa, 0x1c, 0x76, 0x30, 0x49, 0x4a, 0x9e, 0xd5, 0xd6, 0x4f, 0xa2, 0xfa, 0xc1, 0x9a, 0xc4, 0x52, 0xb3, 0x14, 0x2f, 0x8b, 0xf1, 0x9f, 0x58, 0x55, 0x74, 0x38, 0x97, 0xd5, 0x8b, 0x8a, 0xff, 0x94, 0x2a, 0x07, 0x4a, 0x58, 0x36, 0x04, 0xb1, 0x74, 0xdd, 0xea, 0xf2, 0x30, 0xd7, 0xce, 0xad, 0x58, 0xe7, 0x48, 0x35, 0xd8, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3594 = { .name = "ecdsa_secp224r1_sha3_224_3594", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3594_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3594_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3594_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3595 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3595_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3595_msg[] = { 0x35, 0x33, 0x33, 0x35, 0x31, 0x31, 0x37, 0x30, 0x30, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_224_3595_sig[] = { 0x4c, 0x2b, 0xa4, 0x4a, 0xdb, 0xb4, 0x4f, 0x6b, 0x0f, 0x57, 0xde, 0x21, 0x83, 0x08, 0x70, 0xd5, 0xac, 0xfc, 0x68, 0xe0, 0x3c, 0x8f, 0x35, 0xe1, 0xdd, 0xa1, 0x4c, 0xec, 0x6a, 0xff, 0x00, 0xcd, 0x64, 0x17, 0xac, 0x43, 0xc1, 0xea, 0x7e, 0x10, 0x7f, 0xcf, 0xad, 0xa4, 0x04, 0xb8, 0x8f, 0x4a, 0x79, 0xa0, 0xd1, 0x2d, 0xf9, 0x6a, 0xb0, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3595 = { .name = "ecdsa_secp224r1_sha3_224_3595", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3595_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3595_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3595_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3596 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3596_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3596_msg[] = { 0x31, 0x36, 0x36, 0x30, 0x31, 0x38, 0x37, 0x37, 0x37, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3596_sig[] = { 0xdb, 0xbc, 0x41, 0xee, 0xa7, 0xc5, 0xc2, 0x04, 0x38, 0x8b, 0x79, 0x41, 0xcd, 0x19, 0xac, 0xc7, 0xa2, 0xeb, 0x38, 0xb8, 0xe8, 0x48, 0x84, 0x5b, 0xcd, 0xb4, 0x24, 0x4d, 0x7c, 0x4e, 0x41, 0x1b, 0x93, 0x0f, 0x26, 0xff, 0xaa, 0x49, 0x4d, 0x25, 0x22, 0x38, 0x1a, 0xc8, 0x6f, 0x38, 0xb3, 0x75, 0x91, 0xd6, 0x97, 0xd1, 0x22, 0x92, 0x53, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3596 = { .name = "ecdsa_secp224r1_sha3_224_3596", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3596_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3596_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3596_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3597 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3597_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3597_msg[] = { 0x32, 0x37, 0x36, 0x37, 0x39, 0x33, 0x34, 0x33, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3597_sig[] = { 0x59, 0x5b, 0x69, 0x00, 0xf6, 0xeb, 0x44, 0x94, 0x36, 0x62, 0x19, 0xc3, 0x5b, 0x40, 0x39, 0x7f, 0xfd, 0xb3, 0x14, 0x1b, 0xff, 0xb2, 0xd8, 0xd2, 0x16, 0xf9, 0x79, 0x73, 0xf5, 0x32, 0x61, 0x79, 0x5d, 0xdf, 0xb3, 0x6e, 0xd4, 0xa8, 0x3f, 0x78, 0x37, 0x10, 0xf1, 0x5a, 0x8f, 0x60, 0x6c, 0xf9, 0xfb, 0x3f, 0x9c, 0xa1, 0x98, 0x1f, 0x26, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3597 = { .name = "ecdsa_secp224r1_sha3_224_3597", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3597_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3597_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3597_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3598 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3598_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3598_msg[] = { 0x34, 0x36, 0x36, 0x32, 0x34, 0x33, 0x38, 0x36, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3598_sig[] = { 0x6a, 0x78, 0x5a, 0x5b, 0xc1, 0xb8, 0x57, 0xf7, 0xc1, 0x01, 0x20, 0xd8, 0x5f, 0x36, 0xd9, 0xd4, 0x44, 0xa5, 0xbb, 0x6e, 0xd0, 0x99, 0x1e, 0xac, 0x4a, 0x5a, 0x26, 0xa8, 0xee, 0xfa, 0x7d, 0x67, 0x74, 0xee, 0x58, 0x51, 0xdd, 0x7f, 0x1c, 0x45, 0xd2, 0x04, 0xff, 0xf4, 0x38, 0x7e, 0xe1, 0x26, 0xac, 0xbd, 0x56, 0x45, 0x2d, 0x34, 0x24, 0x39, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3598 = { .name = "ecdsa_secp224r1_sha3_224_3598", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3598_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3598_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3598_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3599 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3599_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3599_msg[] = { 0x31, 0x31, 0x33, 0x31, 0x32, 0x31, 0x34, 0x36, 0x39, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_224_3599_sig[] = { 0x4e, 0x0f, 0x67, 0xb0, 0x81, 0xcd, 0x6b, 0x87, 0xe3, 0xf4, 0xd7, 0x92, 0xf1, 0xcc, 0xdd, 0x66, 0xe7, 0x80, 0xd8, 0x02, 0x8e, 0xae, 0xb5, 0xc4, 0x00, 0x47, 0xb6, 0x15, 0x14, 0xc4, 0x2e, 0xa5, 0x0c, 0x71, 0x2c, 0x3f, 0xb7, 0xa0, 0xe1, 0x8f, 0xe0, 0x6b, 0x23, 0x82, 0x2e, 0x90, 0x63, 0xf1, 0x5b, 0xf2, 0x75, 0x9d, 0xfc, 0x70, 0x38, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3599 = { .name = "ecdsa_secp224r1_sha3_224_3599", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3599_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3599_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_224_3599_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3600 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3600_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3600_msg[] = { 0x39, 0x37, 0x35, 0x33, 0x37, 0x33, 0x39, 0x32, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3600_sig[] = { 0xb1, 0x6e, 0x31, 0xa9, 0xa0, 0x7b, 0xed, 0x7d, 0x2a, 0xda, 0xb9, 0xbf, 0xbf, 0x9f, 0xb8, 0xa2, 0x79, 0xf6, 0x38, 0x77, 0x91, 0xd2, 0x29, 0xe7, 0x9f, 0xf4, 0x35, 0xc7, 0x0c, 0xac, 0x45, 0xc7, 0x03, 0x51, 0xa7, 0x7c, 0xf2, 0xd0, 0x37, 0x76, 0x01, 0xbe, 0x4f, 0x7b, 0xbf, 0x5a, 0xcd, 0xdf, 0x03, 0x10, 0xf9, 0xe1, 0x0b, 0x1c, 0x70, 0x22, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3600 = { .name = "ecdsa_secp224r1_sha3_224_3600", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3600_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3600_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3600_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3601 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3601_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3601_msg[] = { 0x32, 0x35, 0x30, 0x31, 0x31, 0x39, 0x33, 0x37, 0x31, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3601_sig[] = { 0x87, 0x53, 0xa0, 0x4e, 0x4c, 0xe3, 0x4a, 0xb8, 0x99, 0x7d, 0xf5, 0xf3, 0x69, 0x34, 0xcd, 0x16, 0x36, 0x8c, 0xb0, 0xf3, 0xe8, 0x49, 0x89, 0x0d, 0x74, 0x24, 0x2a, 0xcc, 0xd0, 0x35, 0xd2, 0xd7, 0x8f, 0xea, 0xb9, 0xce, 0xd6, 0xc2, 0x57, 0x35, 0xb3, 0x74, 0x0a, 0x23, 0x09, 0xd9, 0x6c, 0xb5, 0xd5, 0x7f, 0xea, 0x72, 0x9a, 0x96, 0x39, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3601 = { .name = "ecdsa_secp224r1_sha3_224_3601", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3601_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3601_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3601_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3602 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3602_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3602_msg[] = { 0x31, 0x36, 0x30, 0x33, 0x39, 0x35, 0x33, 0x38, 0x36, 0x33, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3602_sig[] = { 0x11, 0x97, 0x4f, 0x58, 0xc9, 0x5f, 0x8c, 0x44, 0x52, 0x2f, 0x83, 0x59, 0xae, 0x5e, 0x94, 0x25, 0x77, 0xb8, 0xfb, 0x57, 0x5a, 0x2b, 0xa1, 0x8f, 0xf3, 0x83, 0xdf, 0x71, 0x6c, 0x14, 0x13, 0x27, 0xf9, 0xe4, 0x05, 0x72, 0x9c, 0x30, 0x0f, 0x16, 0xb3, 0x01, 0xde, 0x14, 0x0c, 0x8d, 0xf9, 0x2c, 0x05, 0x63, 0x7d, 0xb9, 0x52, 0x21, 0x6e, 0x4c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3602 = { .name = "ecdsa_secp224r1_sha3_224_3602", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3602_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3602_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_224_3602_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3603 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3603_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3603_msg[] = { 0x35, 0x38, 0x37, 0x39, 0x30, 0x36, 0x34, 0x39, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3603_sig[] = { 0x9d, 0x5d, 0x51, 0x4b, 0x88, 0x4b, 0x4d, 0x89, 0x2e, 0x92, 0xe3, 0x73, 0x66, 0x3e, 0x39, 0x49, 0x01, 0xe4, 0x83, 0xec, 0xa8, 0xc9, 0xbc, 0xd7, 0x80, 0x91, 0x0c, 0x82, 0x7d, 0xa1, 0xcd, 0x12, 0xc5, 0x75, 0x74, 0x4f, 0xf7, 0x0c, 0xfb, 0x35, 0x13, 0xc5, 0xea, 0xbc, 0x0e, 0x36, 0x32, 0xcf, 0x2c, 0xe5, 0x0e, 0xcf, 0x0f, 0x55, 0xc8, 0x22, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3603 = { .name = "ecdsa_secp224r1_sha3_224_3603", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3603_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3603_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3603_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3604 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3604_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3604_msg[] = { 0x33, 0x30, 0x39, 0x35, 0x39, 0x37, 0x37, 0x32, 0x31, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_224_3604_sig[] = { 0xf6, 0x8c, 0x1b, 0x64, 0x2a, 0x35, 0xa1, 0x98, 0x8f, 0x6c, 0x2f, 0xa7, 0x7a, 0x55, 0x33, 0xa2, 0xf6, 0x35, 0xab, 0xf0, 0x2c, 0x67, 0x48, 0xf5, 0xa2, 0xb9, 0xd1, 0xde, 0x63, 0xee, 0x52, 0x14, 0x9f, 0xec, 0x97, 0xe5, 0x2b, 0x2d, 0xa4, 0x55, 0x6f, 0xe2, 0x8a, 0xcf, 0x8f, 0x59, 0x86, 0x36, 0x45, 0x5f, 0x32, 0x2c, 0xc9, 0xf4, 0x71, 0x75, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3604 = { .name = "ecdsa_secp224r1_sha3_224_3604", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3604_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3604_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3604_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3605 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3605_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3605_msg[] = { 0x37, 0x35, 0x37, 0x35, 0x30, 0x36, 0x34, 0x35, 0x36, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_224_3605_sig[] = { 0x48, 0x94, 0x8b, 0x8d, 0xd7, 0xe6, 0x27, 0x60, 0xaf, 0x36, 0x8f, 0xdc, 0x3c, 0x22, 0x5a, 0xfd, 0xbf, 0xb6, 0xb9, 0x8a, 0x11, 0x25, 0xd8, 0xae, 0xb6, 0x24, 0x19, 0xdf, 0xbf, 0x88, 0x9d, 0xd8, 0xec, 0xa1, 0x45, 0x6c, 0x24, 0xd8, 0x8a, 0xbc, 0x16, 0xa5, 0xdc, 0x02, 0x17, 0xd3, 0xac, 0x72, 0xb0, 0xe5, 0x79, 0x35, 0xbb, 0x80, 0x35, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3605 = { .name = "ecdsa_secp224r1_sha3_224_3605", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3605_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3605_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3605_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3606 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3606_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3606_msg[] = { 0x33, 0x33, 0x33, 0x33, 0x39, 0x39, 0x36, 0x35, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3606_sig[] = { 0x0d, 0x00, 0x27, 0x50, 0xcc, 0x80, 0xc0, 0xf5, 0xa6, 0xb2, 0xb1, 0xe6, 0xe0, 0x8a, 0xfa, 0xfb, 0x48, 0x40, 0xcb, 0xde, 0xf6, 0xe3, 0x2b, 0x72, 0x6a, 0x4c, 0x19, 0x59, 0xee, 0x40, 0x95, 0xe3, 0x1b, 0x59, 0x4d, 0x15, 0x96, 0x91, 0x77, 0x7f, 0xf1, 0xf6, 0x16, 0x98, 0x9a, 0x65, 0xc4, 0x57, 0x2b, 0x26, 0x42, 0x15, 0x80, 0x6f, 0x92, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3606 = { .name = "ecdsa_secp224r1_sha3_224_3606", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3606_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3606_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_224_3606_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3607 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3607_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3607_msg[] = { 0x31, 0x35, 0x32, 0x36, 0x35, 0x35, 0x32, 0x36, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3607_sig[] = { 0x09, 0x77, 0xb6, 0xca, 0xba, 0x19, 0x1d, 0x7c, 0xbe, 0x0b, 0x53, 0x19, 0x91, 0x7f, 0x27, 0x48, 0x30, 0x4e, 0x66, 0x57, 0x72, 0x02, 0x33, 0x58, 0x42, 0xe0, 0x09, 0xcf, 0xb0, 0x68, 0x0b, 0x5d, 0x60, 0x6e, 0xf9, 0xba, 0xa2, 0x92, 0xf6, 0xbf, 0xfd, 0xc8, 0x4c, 0x11, 0xc5, 0x92, 0x99, 0x85, 0x4b, 0x46, 0x24, 0x53, 0x9c, 0x2e, 0xfc, 0x74, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3607 = { .name = "ecdsa_secp224r1_sha3_224_3607", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3607_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3607_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3607_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3608 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3608_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3608_msg[] = { 0x39, 0x38, 0x39, 0x31, 0x31, 0x37, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_224_3608_sig[] = { 0x02, 0x3a, 0x1d, 0x2a, 0x8e, 0x49, 0xde, 0xac, 0x35, 0x2a, 0xcb, 0x3a, 0x6a, 0x75, 0x80, 0x70, 0xb5, 0xc8, 0xa4, 0xe7, 0x5f, 0xcb, 0xaf, 0xfd, 0x9f, 0x32, 0xe8, 0x62, 0x5d, 0x2d, 0x51, 0x1e, 0xd3, 0x7c, 0xf7, 0xd0, 0x23, 0xa5, 0x33, 0x5c, 0x48, 0xfc, 0x2f, 0x63, 0xcf, 0x07, 0x33, 0xa1, 0xa7, 0x86, 0xc4, 0x9a, 0xe9, 0x29, 0xce, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3608 = { .name = "ecdsa_secp224r1_sha3_224_3608", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3608_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3608_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha3_224_3608_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3609 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3609_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3609_msg[] = { 0x34, 0x39, 0x33, 0x38, 0x33, 0x39, 0x31, 0x38, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3609_sig[] = { 0xc7, 0xcb, 0xad, 0x38, 0xe1, 0xc7, 0x66, 0x03, 0x25, 0x4d, 0xc2, 0xe9, 0xfd, 0x69, 0x33, 0x2d, 0x0e, 0xf8, 0xf1, 0xa5, 0x87, 0x9e, 0xdb, 0x5b, 0xe1, 0xbb, 0x57, 0x8b, 0xdd, 0xdc, 0xf1, 0xaa, 0x86, 0x3f, 0x29, 0x1c, 0x0a, 0x28, 0x7f, 0xa1, 0xd0, 0x15, 0x9d, 0xab, 0xfa, 0x7d, 0x98, 0xe6, 0x46, 0x59, 0x6e, 0x8a, 0xc4, 0x1f, 0x1b, 0x66, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3609 = { .name = "ecdsa_secp224r1_sha3_224_3609", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3609_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3609_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3609_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3610 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3610_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3610_msg[] = { 0x33, 0x33, 0x33, 0x34, 0x39, 0x35, 0x33, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3610_sig[] = { 0x5c, 0x84, 0x5a, 0x27, 0x55, 0x21, 0x64, 0x9b, 0xde, 0x9e, 0x3b, 0xfa, 0x07, 0xd6, 0xca, 0x52, 0x8f, 0x6e, 0x14, 0x3d, 0x19, 0xe9, 0x7b, 0x1e, 0x9e, 0x30, 0x5e, 0x71, 0x60, 0xb4, 0xbd, 0x52, 0x2c, 0x44, 0xb4, 0xc3, 0x2e, 0x87, 0xb1, 0x1b, 0x6b, 0x80, 0xb2, 0x06, 0x1d, 0xa9, 0x8b, 0x4c, 0xf5, 0xc5, 0x6d, 0xbf, 0x5f, 0x06, 0x51, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3610 = { .name = "ecdsa_secp224r1_sha3_224_3610", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3610_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3610_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_224_3610_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3611 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3611_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3611_msg[] = { 0x31, 0x35, 0x34, 0x35, 0x37, 0x39, 0x32, 0x34, 0x36, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3611_sig[] = { 0x26, 0x04, 0x18, 0x18, 0x2c, 0x81, 0x9d, 0xe5, 0xbd, 0xb8, 0x85, 0x1c, 0x5a, 0xc9, 0x37, 0xab, 0x8d, 0x83, 0xab, 0x70, 0x64, 0x00, 0x10, 0xf7, 0xee, 0xae, 0x13, 0xf4, 0x03, 0x4c, 0x2f, 0x5f, 0xfa, 0xa2, 0xb4, 0xf1, 0xf1, 0x11, 0xf4, 0x75, 0x8e, 0x5a, 0xdf, 0xba, 0xb5, 0xb7, 0xcf, 0xec, 0xfa, 0x48, 0xc8, 0xd8, 0x8f, 0x5b, 0x68, 0x16, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3611 = { .name = "ecdsa_secp224r1_sha3_224_3611", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3611_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3611_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3611_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3612 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3612_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3612_msg[] = { 0x33, 0x31, 0x33, 0x31, 0x34, 0x30, 0x36, 0x34, 0x34, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3612_sig[] = { 0x03, 0x46, 0xd6, 0x52, 0x1c, 0x74, 0xbf, 0xb3, 0x43, 0x42, 0xc4, 0xb0, 0x3c, 0x06, 0x7d, 0x3c, 0xdf, 0xe3, 0x5d, 0x3e, 0xa1, 0x21, 0x58, 0x06, 0x68, 0x30, 0x14, 0x31, 0x57, 0x1d, 0xc8, 0x4c, 0xc0, 0x71, 0xe2, 0x5b, 0x98, 0xd4, 0x7c, 0x87, 0xed, 0xd3, 0xf6, 0xdb, 0x73, 0xf9, 0x95, 0xe5, 0xa4, 0xfa, 0x03, 0x87, 0x60, 0xc4, 0x3c, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3612 = { .name = "ecdsa_secp224r1_sha3_224_3612", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3612_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3612_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3612_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3613 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3613_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3613_msg[] = { 0x36, 0x33, 0x30, 0x34, 0x34, 0x37, 0x31, 0x32, 0x38, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_224_3613_sig[] = { 0xf6, 0xd5, 0x04, 0x9e, 0x2f, 0x03, 0x77, 0xf2, 0x4f, 0xd3, 0xed, 0xd8, 0xec, 0x14, 0x94, 0x72, 0x51, 0xc9, 0xd6, 0x87, 0xa4, 0xec, 0x10, 0x4f, 0x36, 0xb9, 0x23, 0x8f, 0x71, 0x3a, 0x07, 0xb0, 0xdd, 0x9a, 0xa2, 0xb0, 0x8c, 0x30, 0xd9, 0x16, 0x7b, 0x03, 0x73, 0xb8, 0x52, 0x59, 0x55, 0x79, 0xa7, 0xdf, 0xc4, 0x81, 0x99, 0x05, 0x61, 0x78, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3613 = { .name = "ecdsa_secp224r1_sha3_224_3613", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3613_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3613_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3613_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3614 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3614_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3614_msg[] = { 0x38, 0x39, 0x30, 0x37, 0x30, 0x32, 0x30, 0x37, 0x31, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3614_sig[] = { 0xa7, 0x99, 0x45, 0x53, 0xf1, 0xa7, 0x93, 0xeb, 0xce, 0x2d, 0xfd, 0xcd, 0x35, 0x7d, 0x3e, 0x4a, 0x01, 0xd0, 0xf7, 0xc1, 0xca, 0xaa, 0x90, 0x99, 0xfb, 0xb4, 0xb0, 0x7a, 0xd8, 0xf7, 0x71, 0x08, 0x4d, 0x36, 0x2e, 0xf2, 0xa0, 0xde, 0xe5, 0x04, 0x96, 0xe4, 0x50, 0xb6, 0xe8, 0x12, 0xe4, 0x0c, 0x2e, 0x6d, 0x34, 0x24, 0x95, 0x57, 0x15, 0x08, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3614 = { .name = "ecdsa_secp224r1_sha3_224_3614", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3614_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3614_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3614_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3615 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3615_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3615_msg[] = { 0x36, 0x39, 0x35, 0x36, 0x37, 0x35, 0x34, 0x32, 0x35, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_224_3615_sig[] = { 0x43, 0x23, 0x6a, 0x22, 0xba, 0x68, 0x1b, 0xd7, 0x1f, 0x99, 0xa8, 0xee, 0x2b, 0x42, 0x5b, 0x78, 0x4b, 0xa6, 0xff, 0x55, 0xca, 0xe1, 0x54, 0xbf, 0x1b, 0x8e, 0xf4, 0x54, 0x09, 0xcf, 0xfb, 0x77, 0x30, 0x6a, 0x5e, 0xa7, 0x67, 0x55, 0x78, 0xbc, 0xfa, 0x2d, 0x21, 0x42, 0xc9, 0xdb, 0xd8, 0x44, 0x01, 0xe0, 0x9f, 0x78, 0xec, 0x29, 0xfa, 0x74, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3615 = { .name = "ecdsa_secp224r1_sha3_224_3615", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3615_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3615_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3615_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3616 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3616_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3616_msg[] = { 0x34, 0x35, 0x35, 0x33, 0x30, 0x31, 0x32, 0x31, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_224_3616_sig[] = { 0x8c, 0x63, 0xda, 0xe1, 0xf1, 0x9d, 0x97, 0x13, 0x5d, 0xf1, 0x8f, 0x8c, 0xf1, 0xa0, 0x9e, 0x52, 0x8b, 0x11, 0xed, 0x2e, 0xac, 0x9f, 0x4b, 0x34, 0x06, 0x21, 0xc7, 0x3d, 0x30, 0x95, 0xbe, 0x22, 0x32, 0xfe, 0x57, 0xd3, 0x72, 0x79, 0x6c, 0xc0, 0xc8, 0x46, 0x44, 0x58, 0x36, 0xff, 0x35, 0xf2, 0x5a, 0x38, 0xce, 0x13, 0x58, 0x58, 0x58, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3616 = { .name = "ecdsa_secp224r1_sha3_224_3616", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3616_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3616_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3616_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3617 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3617_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3617_msg[] = { 0x39, 0x37, 0x38, 0x37, 0x39, 0x36, 0x32, 0x32, 0x39, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3617_sig[] = { 0x80, 0x05, 0xbc, 0xb6, 0xb9, 0x55, 0xf8, 0x0b, 0x2a, 0x2b, 0x6e, 0x45, 0xd8, 0x61, 0x54, 0xc5, 0x61, 0xb5, 0x43, 0x08, 0x3a, 0xb0, 0x65, 0xb5, 0x0b, 0xff, 0xb4, 0x99, 0xe6, 0x51, 0x5a, 0x9e, 0xb3, 0xfd, 0x81, 0x38, 0xca, 0x11, 0x75, 0x15, 0xd0, 0xf9, 0xa6, 0x54, 0x9f, 0x22, 0x6a, 0x72, 0xcc, 0xcd, 0x49, 0x74, 0x1a, 0xdf, 0xfe, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3617 = { .name = "ecdsa_secp224r1_sha3_224_3617", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3617_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3617_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3617_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3618 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3618_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3618_msg[] = { 0x34, 0x35, 0x34, 0x33, 0x36, 0x32, 0x34, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3618_sig[] = { 0xbe, 0x66, 0xcc, 0x8e, 0xb0, 0xd9, 0xe5, 0xdd, 0x7e, 0xf6, 0xc7, 0x54, 0x01, 0x85, 0x02, 0xe7, 0x37, 0x1c, 0x0b, 0x0d, 0xb9, 0x7c, 0xce, 0x37, 0x8b, 0x9a, 0xa3, 0x55, 0x56, 0x2b, 0x77, 0x1c, 0x51, 0x04, 0x38, 0x58, 0x78, 0xc3, 0xb9, 0x18, 0x37, 0x9b, 0x10, 0x1a, 0xc8, 0x88, 0xb1, 0xf1, 0x5f, 0x0f, 0x52, 0xd1, 0x5e, 0x0a, 0x92, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3618 = { .name = "ecdsa_secp224r1_sha3_224_3618", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3618_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3618_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3618_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3619 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3619_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3619_msg[] = { 0x32, 0x31, 0x31, 0x38, 0x31, 0x37, 0x33, 0x30, 0x31, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3619_sig[] = { 0xf4, 0x29, 0x40, 0xed, 0x72, 0x87, 0xb2, 0x81, 0xf0, 0x0c, 0x79, 0x5a, 0xbd, 0x67, 0x1f, 0xef, 0xfd, 0xed, 0x54, 0x2f, 0xc6, 0x3c, 0x4e, 0xcf, 0xc7, 0x33, 0x64, 0x27, 0x90, 0x49, 0xe6, 0x2c, 0x46, 0x47, 0x23, 0xf5, 0x0c, 0x26, 0x5f, 0xdb, 0xcf, 0x7c, 0x67, 0x94, 0xb5, 0x29, 0x4a, 0x58, 0xb3, 0x10, 0x0e, 0x82, 0xad, 0x9c, 0xd7, 0x24, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3619 = { .name = "ecdsa_secp224r1_sha3_224_3619", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3619_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3619_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_224_3619_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3620 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3620_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3620_msg[] = { 0x34, 0x30, 0x34, 0x39, 0x36, 0x34, 0x39, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3620_sig[] = { 0xd0, 0xb0, 0x92, 0x86, 0x78, 0x08, 0xc7, 0xd3, 0xb3, 0x4f, 0xec, 0x07, 0xc4, 0xeb, 0xe8, 0x32, 0x4a, 0x1a, 0x4f, 0xf2, 0xbf, 0xc2, 0xe2, 0x0a, 0xaf, 0xfb, 0xd2, 0x48, 0x4e, 0xb9, 0x22, 0xb3, 0xde, 0x3b, 0xd2, 0x44, 0x93, 0x8a, 0xdb, 0x20, 0xe2, 0x1c, 0xdd, 0x56, 0x00, 0x30, 0xd1, 0x3c, 0xc0, 0x19, 0x1c, 0x37, 0xcc, 0xd3, 0x8e, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3620 = { .name = "ecdsa_secp224r1_sha3_224_3620", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3620_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3620_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3620_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3621 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3621_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3621_msg[] = { 0x36, 0x32, 0x35, 0x33, 0x33, 0x32, 0x34, 0x35, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3621_sig[] = { 0xa7, 0x34, 0x72, 0xe1, 0xf3, 0x03, 0xbf, 0xe5, 0x01, 0x28, 0x77, 0x0c, 0x91, 0x34, 0xbd, 0x93, 0xaf, 0x9b, 0x06, 0x4f, 0x9b, 0x78, 0x2a, 0x45, 0xdd, 0x85, 0xc3, 0x3c, 0xda, 0x4b, 0x8b, 0xd6, 0xe2, 0xba, 0x5c, 0x63, 0x5d, 0xca, 0xf9, 0xa7, 0xd2, 0xbf, 0x77, 0x4b, 0x10, 0xc2, 0xb0, 0x9b, 0xa0, 0x74, 0xcd, 0xc5, 0x8d, 0x9c, 0x8d, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3621 = { .name = "ecdsa_secp224r1_sha3_224_3621", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3621_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3621_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3621_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3622 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3622_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3622_msg[] = { 0x33, 0x37, 0x39, 0x35, 0x32, 0x35, 0x33, 0x36, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3622_sig[] = { 0x98, 0x32, 0xae, 0x82, 0x08, 0x0e, 0xc0, 0x28, 0x33, 0xe3, 0xea, 0xe9, 0x13, 0xf7, 0xa9, 0x8e, 0xb9, 0xe2, 0xd0, 0x51, 0x33, 0xe5, 0xf2, 0xc7, 0xfa, 0x20, 0x47, 0x9d, 0x0e, 0x90, 0xc6, 0x76, 0xdf, 0x77, 0x37, 0xad, 0xb8, 0x4e, 0x54, 0xcd, 0xa4, 0x7a, 0xf9, 0xf5, 0xd6, 0xab, 0x2f, 0x34, 0xea, 0xec, 0x83, 0x7b, 0x62, 0x8f, 0x64, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3622 = { .name = "ecdsa_secp224r1_sha3_224_3622", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3622_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3622_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3622_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3623 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3623_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3623_msg[] = { 0x38, 0x33, 0x34, 0x39, 0x30, 0x34, 0x32, 0x34, 0x30, 0x35, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3623_sig[] = { 0x3e, 0xac, 0x05, 0xa7, 0x47, 0xf4, 0x39, 0x88, 0xda, 0xb9, 0x87, 0xf4, 0x87, 0xfb, 0xca, 0x80, 0x03, 0xe5, 0xc7, 0xe9, 0xbb, 0x58, 0x06, 0x34, 0xaf, 0xef, 0x6e, 0x03, 0xdd, 0x65, 0x66, 0x79, 0xe1, 0xc1, 0x80, 0x0f, 0x8a, 0x25, 0x87, 0x81, 0xf4, 0x54, 0x89, 0xe6, 0x63, 0x0a, 0x6d, 0x93, 0x4b, 0x3e, 0x2a, 0x05, 0xd4, 0x1a, 0x0c, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3623 = { .name = "ecdsa_secp224r1_sha3_224_3623", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3623_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3623_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_224_3623_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3624 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3624_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3624_msg[] = { 0x34, 0x37, 0x36, 0x37, 0x30, 0x36, 0x36, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3624_sig[] = { 0x5f, 0x3a, 0x63, 0x9c, 0x16, 0x3d, 0xaa, 0xf3, 0xe2, 0xc0, 0xd7, 0xd1, 0xa3, 0xca, 0x82, 0xeb, 0xe4, 0x29, 0x51, 0x49, 0x11, 0x14, 0xb6, 0xe2, 0x57, 0xe2, 0x8f, 0x69, 0xea, 0x0e, 0x12, 0xe2, 0x3d, 0x48, 0x5a, 0x93, 0x2f, 0x1a, 0xee, 0x97, 0x47, 0x61, 0xb0, 0xe0, 0xc9, 0xc3, 0xd5, 0xba, 0x18, 0x22, 0xab, 0x64, 0x68, 0x19, 0x88, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3624 = { .name = "ecdsa_secp224r1_sha3_224_3624", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3624_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3624_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_224_3624_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3625 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3625_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3625_msg[] = { 0x39, 0x32, 0x38, 0x35, 0x36, 0x33, 0x37, 0x36, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3625_sig[] = { 0xc0, 0xad, 0x06, 0xec, 0x18, 0xc4, 0xed, 0x44, 0x69, 0xc5, 0xf4, 0xf4, 0xbe, 0x4b, 0xfb, 0x41, 0xb6, 0xfc, 0x02, 0x44, 0x56, 0xb2, 0xee, 0xd1, 0xd8, 0x09, 0x6a, 0x75, 0x45, 0xe0, 0x8a, 0x93, 0xae, 0x4e, 0x33, 0xbd, 0xf3, 0x53, 0x79, 0x16, 0x18, 0x43, 0x26, 0x6e, 0xcd, 0x2f, 0x20, 0x0c, 0xe2, 0x92, 0xac, 0x99, 0x89, 0x47, 0x48, 0xef, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3625 = { .name = "ecdsa_secp224r1_sha3_224_3625", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3625_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3625_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_224_3625_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3626 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3626_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3626_msg[] = { 0x31, 0x34, 0x39, 0x36, 0x33, 0x33, 0x31, 0x31, 0x35, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3626_sig[] = { 0x0f, 0x5a, 0x1b, 0xb9, 0xc5, 0x72, 0xa6, 0xdd, 0xfe, 0x50, 0x72, 0xde, 0x6a, 0x07, 0x7b, 0x14, 0x90, 0x09, 0x6a, 0x88, 0xcb, 0x2b, 0xe9, 0xaf, 0x8d, 0x97, 0x64, 0x83, 0x92, 0xe7, 0x25, 0x84, 0x59, 0xdf, 0x84, 0x8f, 0xfb, 0xcc, 0x7f, 0xbf, 0xa9, 0x9f, 0xdf, 0x4d, 0xb1, 0x6b, 0x73, 0x4d, 0xc5, 0xb9, 0x70, 0x14, 0x27, 0x03, 0x4f, 0x80, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3626 = { .name = "ecdsa_secp224r1_sha3_224_3626", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3626_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3626_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3626_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3627 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3627_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3627_msg[] = { 0x37, 0x32, 0x34, 0x37, 0x30, 0x39, 0x33, 0x30, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3627_sig[] = { 0xa0, 0x97, 0xb8, 0x42, 0x24, 0x52, 0xdc, 0xb2, 0xa9, 0x3a, 0xe3, 0x2f, 0xf8, 0xd6, 0xbe, 0xfc, 0x31, 0xd7, 0x60, 0x51, 0x70, 0x4b, 0x10, 0x23, 0xac, 0x5c, 0x76, 0x45, 0xf4, 0xfa, 0xaf, 0x5f, 0x0d, 0xc7, 0x80, 0x23, 0x88, 0x58, 0x23, 0xc5, 0x54, 0x7a, 0x59, 0x32, 0x0b, 0xed, 0x2e, 0xb2, 0xeb, 0x3b, 0x94, 0x8d, 0x07, 0xce, 0x49, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3627 = { .name = "ecdsa_secp224r1_sha3_224_3627", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3627_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3627_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3627_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3628 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3628_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3628_msg[] = { 0x31, 0x37, 0x36, 0x34, 0x35, 0x39, 0x39, 0x33, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3628_sig[] = { 0x7b, 0x4d, 0x49, 0x83, 0x8b, 0xff, 0xa9, 0x79, 0xd0, 0xd9, 0x77, 0x2f, 0x8a, 0xf3, 0x93, 0x40, 0x02, 0x3a, 0x6b, 0x11, 0xa0, 0xe2, 0x17, 0x3c, 0xe9, 0x2d, 0x1b, 0x8e, 0xf8, 0x78, 0xaf, 0x3f, 0x51, 0x62, 0x88, 0xab, 0xf3, 0x24, 0xb0, 0xc5, 0x2d, 0xbc, 0x2d, 0x71, 0x06, 0xd2, 0xdc, 0x39, 0x78, 0x71, 0x37, 0x4b, 0xd1, 0x44, 0xc2, 0x72, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3628 = { .name = "ecdsa_secp224r1_sha3_224_3628", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3628_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3628_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3628_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3629 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3629_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3629_msg[] = { 0x35, 0x39, 0x38, 0x33, 0x37, 0x36, 0x34, 0x33, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3629_sig[] = { 0xfe, 0xda, 0x6c, 0x1c, 0x40, 0xc4, 0x83, 0xf8, 0x7f, 0x45, 0x86, 0xd2, 0x33, 0x81, 0xa7, 0x1a, 0x6b, 0x05, 0x1c, 0xe2, 0x89, 0x16, 0xf1, 0x99, 0x29, 0x5e, 0xae, 0xd3, 0x75, 0xbe, 0x57, 0xd1, 0xb4, 0x6f, 0xf0, 0x36, 0x43, 0x08, 0xdb, 0x27, 0x25, 0xb1, 0x9b, 0xcc, 0x1c, 0xe8, 0x20, 0xcf, 0x57, 0xe3, 0x7f, 0x82, 0x5d, 0x30, 0xe1, 0x99, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3629 = { .name = "ecdsa_secp224r1_sha3_224_3629", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3629_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3629_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3629_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3630 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3630_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3630_msg[] = { 0x31, 0x39, 0x32, 0x36, 0x36, 0x37, 0x39, 0x36, 0x30, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_224_3630_sig[] = { 0x99, 0x69, 0xb8, 0xd0, 0x3e, 0xd1, 0x31, 0x3e, 0xcf, 0xd1, 0x73, 0x9e, 0x4c, 0x92, 0x34, 0xc0, 0xe7, 0x28, 0x7f, 0x15, 0x83, 0x9e, 0xa1, 0xe6, 0xfe, 0xed, 0x50, 0xb1, 0x45, 0xf6, 0xa8, 0x20, 0xac, 0x45, 0xd8, 0x35, 0xec, 0xdd, 0x52, 0xc8, 0x36, 0xf1, 0x57, 0xab, 0x2b, 0x92, 0x79, 0xa5, 0x60, 0xd2, 0xfe, 0x96, 0x6e, 0xe2, 0x3a, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3630 = { .name = "ecdsa_secp224r1_sha3_224_3630", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3630_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3630_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3630_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3631 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3631_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3631_msg[] = { 0x33, 0x33, 0x35, 0x38, 0x39, 0x39, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3631_sig[] = { 0xa6, 0x2e, 0x95, 0x21, 0x92, 0xd3, 0xa9, 0xdb, 0xfc, 0x2a, 0xb2, 0x0c, 0x57, 0xc7, 0x19, 0xbf, 0x52, 0xee, 0xf8, 0x59, 0xd9, 0x94, 0xc8, 0x60, 0xa9, 0x56, 0x4f, 0x12, 0xbe, 0x10, 0x07, 0xb5, 0x2e, 0x93, 0x08, 0xbd, 0xe8, 0x67, 0xf3, 0x80, 0xf0, 0xbd, 0x30, 0x02, 0x55, 0x4d, 0x8a, 0xc8, 0x54, 0xf9, 0xdb, 0x3d, 0x4a, 0x7d, 0x68, 0x98, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3631 = { .name = "ecdsa_secp224r1_sha3_224_3631", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3631_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3631_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha3_224_3631_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3632 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3632_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3632_msg[] = { 0x33, 0x31, 0x37, 0x31, 0x39, 0x37, 0x34, 0x32, 0x32, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3632_sig[] = { 0xf5, 0x26, 0xb9, 0x28, 0x8e, 0x25, 0xaa, 0xea, 0x8d, 0x65, 0x7e, 0xc7, 0xa4, 0xeb, 0xde, 0x46, 0xd8, 0xad, 0xc4, 0xc6, 0xd9, 0x09, 0xfc, 0xfd, 0x7e, 0x2d, 0xcd, 0xb0, 0x5d, 0x10, 0x08, 0x7d, 0x12, 0x63, 0xdb, 0x52, 0x59, 0x57, 0x9e, 0x99, 0x87, 0xb4, 0x10, 0x00, 0x1b, 0x77, 0x4f, 0x81, 0xc3, 0xe4, 0x89, 0xdf, 0x85, 0xb2, 0x71, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3632 = { .name = "ecdsa_secp224r1_sha3_224_3632", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3632_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3632_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3632_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3633 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3633_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3633_msg[] = { 0x32, 0x35, 0x37, 0x36, 0x38, 0x37, 0x31, 0x31, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_224_3633_sig[] = { 0xc5, 0xff, 0x7a, 0xb6, 0x38, 0xb6, 0x70, 0x25, 0x35, 0xea, 0x71, 0x9e, 0x7c, 0x2f, 0x77, 0x53, 0xc5, 0x3c, 0x16, 0x11, 0xc5, 0x91, 0x98, 0x68, 0xfb, 0x70, 0x8b, 0x00, 0xab, 0x29, 0xaa, 0xc0, 0x43, 0xd3, 0x58, 0x47, 0x28, 0x0a, 0x3d, 0x77, 0x59, 0x0a, 0xe9, 0x3a, 0x4b, 0x26, 0xdb, 0x18, 0x23, 0x8a, 0x53, 0xc6, 0x7c, 0xbd, 0x16, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3633 = { .name = "ecdsa_secp224r1_sha3_224_3633", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3633_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3633_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3633_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3634 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3634_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3634_msg[] = { 0x36, 0x30, 0x34, 0x32, 0x35, 0x38, 0x31, 0x38, 0x31, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3634_sig[] = { 0xe6, 0x9b, 0x43, 0xa6, 0x8f, 0x45, 0x2d, 0x26, 0x51, 0x6e, 0x13, 0x16, 0xd5, 0x4c, 0xd5, 0x14, 0x16, 0xa0, 0x47, 0xd4, 0x29, 0x45, 0x35, 0x0c, 0xdc, 0x50, 0x65, 0x18, 0x66, 0xd1, 0xab, 0xd5, 0xaa, 0x58, 0xec, 0xcf, 0x9e, 0xbe, 0x93, 0x91, 0xcc, 0xe8, 0xce, 0xfa, 0xb1, 0x62, 0xa9, 0x13, 0x04, 0x39, 0x23, 0x5f, 0x05, 0x1f, 0xc4, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3634 = { .name = "ecdsa_secp224r1_sha3_224_3634", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3634_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3634_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3634_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3635 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3635_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3635_msg[] = { 0x38, 0x36, 0x35, 0x31, 0x30, 0x30, 0x32, 0x30, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3635_sig[] = { 0x0c, 0x68, 0x22, 0xe2, 0x56, 0xd0, 0x19, 0x0b, 0x49, 0x62, 0xc5, 0xb4, 0xbf, 0xda, 0xbc, 0xe1, 0x0d, 0x27, 0x7c, 0xd3, 0x47, 0xca, 0xf0, 0x85, 0x08, 0x92, 0x28, 0x8f, 0x3f, 0x59, 0x72, 0x7e, 0x4d, 0x9e, 0x3b, 0x92, 0xf4, 0xb0, 0xce, 0x71, 0x0c, 0x51, 0x12, 0xca, 0xa1, 0x8e, 0x40, 0x51, 0xcc, 0x71, 0x45, 0x0f, 0x69, 0x89, 0xcb, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3635 = { .name = "ecdsa_secp224r1_sha3_224_3635", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3635_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3635_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3635_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3636 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3636_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3636_msg[] = { 0x34, 0x30, 0x37, 0x31, 0x32, 0x38, 0x30, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_224_3636_sig[] = { 0x85, 0x0b, 0x43, 0x46, 0x1e, 0x10, 0x71, 0x74, 0xa7, 0x7a, 0x4f, 0x9a, 0x30, 0x11, 0xe0, 0x38, 0x54, 0xd6, 0xb5, 0xb4, 0xa0, 0xa6, 0x25, 0x0e, 0x2f, 0xc4, 0x72, 0xa2, 0x0e, 0x7d, 0xa9, 0xa2, 0x1a, 0x23, 0x73, 0xd0, 0x94, 0x40, 0x31, 0xfd, 0x12, 0x1d, 0xce, 0x05, 0x94, 0xaa, 0x87, 0x21, 0xda, 0x12, 0x69, 0xf8, 0x46, 0x74, 0x7f, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3636 = { .name = "ecdsa_secp224r1_sha3_224_3636", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3636_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3636_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_224_3636_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3637 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3637_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3637_msg[] = { 0x34, 0x38, 0x38, 0x33, 0x31, 0x37, 0x34, 0x35, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_224_3637_sig[] = { 0xa6, 0xe1, 0x42, 0x06, 0x93, 0x66, 0xbe, 0x8c, 0x48, 0xa7, 0xb6, 0x51, 0xec, 0x45, 0xb0, 0xe2, 0xdd, 0x9d, 0x79, 0x70, 0x11, 0x08, 0xc3, 0x59, 0x97, 0xca, 0x1a, 0x4b, 0x20, 0xb5, 0x76, 0x04, 0x0b, 0x9f, 0x3e, 0x73, 0xae, 0x7f, 0xf3, 0xaf, 0x22, 0x3e, 0x34, 0xdf, 0x82, 0xdc, 0xe8, 0x53, 0x3b, 0xf1, 0x90, 0x14, 0x86, 0xa8, 0xb3, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3637 = { .name = "ecdsa_secp224r1_sha3_224_3637", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3637_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3637_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3637_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3638 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3638_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3638_msg[] = { 0x34, 0x33, 0x36, 0x31, 0x33, 0x38, 0x34, 0x35, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_224_3638_sig[] = { 0x58, 0xe4, 0xc5, 0x55, 0x8f, 0x2d, 0x4d, 0x2b, 0xae, 0xe3, 0x61, 0xda, 0x0e, 0x90, 0x7e, 0x06, 0x8b, 0xbc, 0x69, 0x7b, 0x3a, 0xbd, 0xba, 0xe2, 0x94, 0x74, 0x08, 0x4e, 0x95, 0x1d, 0xe9, 0x02, 0xc7, 0xaf, 0x71, 0xb5, 0xd7, 0xa3, 0xc6, 0x11, 0x7d, 0x25, 0x82, 0x42, 0xa0, 0x4a, 0x86, 0x61, 0xbf, 0xdd, 0x4d, 0x04, 0x76, 0x94, 0xf7, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3638 = { .name = "ecdsa_secp224r1_sha3_224_3638", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3638_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3638_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_224_3638_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3639 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3639_pubkey[] = { 0xd3, 0x7f, 0xb4, 0xab, 0xe8, 0xc5, 0x04, 0x50, 0x4f, 0x01, 0x05, 0x39, 0xeb, 0x76, 0x4c, 0x10, 0xc1, 0x42, 0x50, 0x64, 0x5e, 0x84, 0x6e, 0xaf, 0x41, 0xb9, 0x99, 0x53, 0xc4, 0xe2, 0xc1, 0xc2, 0x77, 0x05, 0x69, 0x82, 0xc5, 0xb8, 0x13, 0x05, 0xed, 0x31, 0x10, 0xa0, 0x64, 0xff, 0x6a, 0xe8, 0xe0, 0x54, 0x5f, 0x0c, 0x35, 0xff, 0x88, 0x71, }; static const unsigned char ecdsa_secp224r1_sha3_224_3639_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3639_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3639 = { .name = "ecdsa_secp224r1_sha3_224_3639", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3639_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3639_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3639_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 285 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3640 for ECDSA, tcId is 286 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3640_pubkey[] = { 0xd3, 0x7f, 0xb4, 0xab, 0xe8, 0xc5, 0x04, 0x50, 0x4f, 0x01, 0x05, 0x39, 0xeb, 0x76, 0x4c, 0x10, 0xc1, 0x42, 0x50, 0x64, 0x5e, 0x84, 0x6e, 0xaf, 0x41, 0xb9, 0x99, 0x53, 0xc4, 0xe2, 0xc1, 0xc2, 0x77, 0x05, 0x69, 0x82, 0xc5, 0xb8, 0x13, 0x05, 0xed, 0x31, 0x10, 0xa0, 0x64, 0xff, 0x6a, 0xe8, 0xe0, 0x54, 0x5f, 0x0c, 0x35, 0xff, 0x88, 0x71, }; static const unsigned char ecdsa_secp224r1_sha3_224_3640_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3640_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3640 = { .name = "ecdsa_secp224r1_sha3_224_3640", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3640_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3640_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3640_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 286 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3641 for ECDSA, tcId is 287 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3641_pubkey[] = { 0xd9, 0xaa, 0xc1, 0x1d, 0x02, 0x77, 0xa4, 0xb2, 0x35, 0x14, 0xc4, 0xd0, 0x2a, 0x48, 0x3e, 0x92, 0x2d, 0xc4, 0x0c, 0x92, 0xa7, 0x74, 0xb8, 0xc6, 0x21, 0x79, 0x69, 0x0b, 0x9c, 0xfe, 0x0c, 0x9b, 0x06, 0x0b, 0x1a, 0x49, 0x59, 0x83, 0x18, 0x63, 0x16, 0x68, 0x08, 0x3e, 0x4c, 0xf3, 0x4e, 0x4b, 0xab, 0x29, 0xd1, 0x4d, 0x81, 0xc2, 0xb0, 0x49, }; static const unsigned char ecdsa_secp224r1_sha3_224_3641_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3641_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3641 = { .name = "ecdsa_secp224r1_sha3_224_3641", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3641_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3641_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3641_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 287 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3642 for ECDSA, tcId is 288 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3642_pubkey[] = { 0xc3, 0x59, 0xb3, 0x1b, 0x3e, 0xe1, 0x0c, 0xc0, 0xba, 0xb7, 0xd2, 0x1f, 0x0c, 0xc5, 0xce, 0xcb, 0x63, 0x21, 0x86, 0xe8, 0xca, 0x60, 0x8a, 0x74, 0xf9, 0x21, 0x98, 0x6f, 0x27, 0x78, 0x7c, 0xc2, 0x04, 0xc5, 0xed, 0x56, 0x18, 0x97, 0xc1, 0x49, 0x61, 0xf7, 0x82, 0x7b, 0x5f, 0x97, 0x39, 0x59, 0x96, 0xde, 0x6c, 0xff, 0x87, 0x86, 0x27, 0x71, }; static const unsigned char ecdsa_secp224r1_sha3_224_3642_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3642_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3642 = { .name = "ecdsa_secp224r1_sha3_224_3642", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3642_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3642_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3642_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 288 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3643 for ECDSA, tcId is 289 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3643_pubkey[] = { 0xb2, 0x1f, 0xde, 0x4e, 0x39, 0x9d, 0x8c, 0xbf, 0x8c, 0xbb, 0x8e, 0xa8, 0xac, 0x77, 0x0e, 0xb9, 0x7f, 0xf8, 0x5b, 0x01, 0x86, 0x83, 0x43, 0x39, 0x82, 0xca, 0x2b, 0x35, 0x3e, 0x7b, 0x43, 0x25, 0xb4, 0x31, 0x9b, 0xbd, 0x71, 0xfe, 0x9c, 0x3e, 0x49, 0xc4, 0xda, 0xec, 0x89, 0x55, 0x01, 0xaf, 0xce, 0xaa, 0x55, 0x40, 0x40, 0x12, 0x9b, 0x71, }; static const unsigned char ecdsa_secp224r1_sha3_224_3643_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3643_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3643 = { .name = "ecdsa_secp224r1_sha3_224_3643", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3643_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3643_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3643_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 289 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3644 for ECDSA, tcId is 290 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3644_pubkey[] = { 0xfc, 0x03, 0x41, 0xbd, 0xbb, 0xce, 0x3b, 0xee, 0xe1, 0xbe, 0x9f, 0x02, 0xe4, 0x61, 0x48, 0xaf, 0x9d, 0xa5, 0x31, 0x28, 0xe0, 0xe3, 0xc4, 0x5a, 0xf1, 0xab, 0xe4, 0xc7, 0x92, 0xac, 0xfd, 0x71, 0x83, 0x52, 0xe7, 0x10, 0x7f, 0xe0, 0x8e, 0xa6, 0xa3, 0x5d, 0x8b, 0xad, 0xcf, 0x54, 0xf5, 0x70, 0x65, 0xdc, 0x4e, 0x8c, 0x9f, 0x27, 0x05, 0xd2, }; static const unsigned char ecdsa_secp224r1_sha3_224_3644_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3644_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3644 = { .name = "ecdsa_secp224r1_sha3_224_3644", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3644_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3644_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3644_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 290 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3645 for ECDSA, tcId is 291 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3645_pubkey[] = { 0x50, 0xb1, 0x42, 0x56, 0xf6, 0xea, 0x50, 0xd9, 0x84, 0x3b, 0xd9, 0xe2, 0xb4, 0xc2, 0xd9, 0xda, 0xf7, 0x5f, 0x76, 0xac, 0x4e, 0x4e, 0x75, 0x7c, 0x71, 0x2b, 0x30, 0x53, 0x59, 0x4d, 0x68, 0xe1, 0x68, 0x3e, 0xc9, 0x77, 0xb2, 0xef, 0xcc, 0x8a, 0x7b, 0xa6, 0xc4, 0x6a, 0x0e, 0x6a, 0x66, 0x8a, 0x03, 0xf4, 0xf5, 0x0a, 0x3e, 0x21, 0xe4, 0xce, }; static const unsigned char ecdsa_secp224r1_sha3_224_3645_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3645_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3645 = { .name = "ecdsa_secp224r1_sha3_224_3645", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3645_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3645_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3645_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 291 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3646 for ECDSA, tcId is 292 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3646_pubkey[] = { 0x78, 0x01, 0xe4, 0x80, 0x11, 0xfc, 0xe2, 0x68, 0x5a, 0x2f, 0x56, 0x3f, 0xaa, 0xb3, 0x4f, 0xff, 0x72, 0x8e, 0xbb, 0x6e, 0x92, 0xeb, 0x02, 0x9f, 0xef, 0x12, 0x4e, 0xb5, 0xa9, 0xbe, 0x2c, 0x1b, 0x86, 0xe9, 0x9e, 0x44, 0xef, 0x60, 0xe6, 0xc0, 0x2a, 0x04, 0xa1, 0x6c, 0xbd, 0x96, 0x84, 0x82, 0xed, 0x2e, 0xc4, 0xc1, 0x46, 0x3e, 0xfe, 0xef, }; static const unsigned char ecdsa_secp224r1_sha3_224_3646_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3646_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3646 = { .name = "ecdsa_secp224r1_sha3_224_3646", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3646_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3646_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3646_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 292 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3647 for ECDSA, tcId is 293 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3647_pubkey[] = { 0x78, 0x01, 0xe4, 0x80, 0x11, 0xfc, 0xe2, 0x68, 0x5a, 0x2f, 0x56, 0x3f, 0xaa, 0xb3, 0x4f, 0xff, 0x72, 0x8e, 0xbb, 0x6e, 0x92, 0xeb, 0x02, 0x9f, 0xef, 0x12, 0x4e, 0xb5, 0xa9, 0xbe, 0x2c, 0x1b, 0x86, 0xe9, 0x9e, 0x44, 0xef, 0x60, 0xe6, 0xc0, 0x2a, 0x04, 0xa1, 0x6c, 0xbd, 0x96, 0x84, 0x82, 0xed, 0x2e, 0xc4, 0xc1, 0x46, 0x3e, 0xfe, 0xef, }; static const unsigned char ecdsa_secp224r1_sha3_224_3647_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3647_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3647 = { .name = "ecdsa_secp224r1_sha3_224_3647", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3647_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3647_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3647_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 293 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3648 for ECDSA, tcId is 294 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3648_pubkey[] = { 0x6c, 0xce, 0x00, 0x4a, 0xbb, 0xcd, 0xcc, 0xdb, 0x3f, 0xda, 0x69, 0x1e, 0x70, 0xa7, 0x1a, 0x4d, 0x8a, 0x92, 0x02, 0x19, 0xaf, 0x2a, 0x20, 0x88, 0x0f, 0x59, 0xc5, 0x3d, 0x86, 0x02, 0x3e, 0xa8, 0x5c, 0xaa, 0x2b, 0xeb, 0xff, 0xcb, 0x9f, 0x36, 0x00, 0x82, 0xe6, 0x26, 0x44, 0x66, 0xea, 0x06, 0x5a, 0xfb, 0x07, 0x82, 0x0d, 0xfb, 0x1a, 0x9a, }; static const unsigned char ecdsa_secp224r1_sha3_224_3648_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3648_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3648 = { .name = "ecdsa_secp224r1_sha3_224_3648", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3648_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3648_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3648_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 294 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3649 for ECDSA, tcId is 295 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3649_pubkey[] = { 0x5d, 0x1b, 0x27, 0xdd, 0x47, 0x71, 0x1d, 0x7f, 0xa9, 0x0b, 0x26, 0x51, 0xe2, 0x02, 0xc2, 0x40, 0xca, 0xd2, 0x81, 0xed, 0x80, 0x3e, 0x1a, 0x32, 0x36, 0xc7, 0x89, 0xfa, 0x0e, 0xa5, 0x42, 0x06, 0x64, 0xe2, 0xa8, 0xbd, 0x9c, 0xea, 0x37, 0x40, 0x21, 0x8e, 0x23, 0x73, 0x5e, 0xe2, 0x71, 0x5f, 0x81, 0x30, 0xbe, 0xb4, 0x37, 0x41, 0x95, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_224_3649_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3649_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3649 = { .name = "ecdsa_secp224r1_sha3_224_3649", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3649_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3649_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3649_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 295 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3650 for ECDSA, tcId is 296 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3650_pubkey[] = { 0xdd, 0xf5, 0x3c, 0xec, 0x8d, 0x9c, 0x60, 0x62, 0x90, 0x4d, 0x2a, 0x04, 0xf7, 0x90, 0xf4, 0x59, 0x6c, 0x67, 0x69, 0x6d, 0xd4, 0xf5, 0x42, 0x2a, 0x3c, 0xb8, 0x4c, 0x9c, 0xaf, 0x10, 0xf2, 0xd1, 0xeb, 0x0e, 0x0f, 0xf2, 0x8f, 0xa8, 0xe4, 0x0a, 0x91, 0xd8, 0xd4, 0xad, 0xdb, 0x20, 0xc0, 0x85, 0xd6, 0x35, 0x15, 0x8d, 0xe1, 0xa6, 0x7b, 0xdd, }; static const unsigned char ecdsa_secp224r1_sha3_224_3650_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3650_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3650 = { .name = "ecdsa_secp224r1_sha3_224_3650", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3650_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3650_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3650_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 296 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3651 for ECDSA, tcId is 297 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3651_pubkey[] = { 0xf4, 0x3b, 0x4a, 0x87, 0xdc, 0x12, 0xc6, 0x5b, 0xf2, 0x7f, 0x4b, 0x86, 0x10, 0x48, 0x64, 0x02, 0x32, 0x7a, 0xdc, 0x01, 0x33, 0xc1, 0xdb, 0x8a, 0xdf, 0x4e, 0x3f, 0x9b, 0xa6, 0x1a, 0xad, 0xb4, 0xc5, 0x8a, 0xc0, 0xb5, 0x51, 0x8d, 0x1c, 0x29, 0x29, 0x06, 0x8e, 0xaa, 0x0d, 0x6a, 0x5d, 0x5f, 0x84, 0xda, 0xcf, 0x66, 0xe5, 0xb2, 0x76, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_224_3651_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3651_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3651 = { .name = "ecdsa_secp224r1_sha3_224_3651", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3651_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3651_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3651_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 297 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3652 for ECDSA, tcId is 298 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3652_pubkey[] = { 0x6b, 0xd0, 0xa5, 0xdc, 0x98, 0xa6, 0x76, 0x1a, 0x24, 0xd4, 0xe5, 0xe6, 0xc3, 0x11, 0x87, 0xaf, 0x8c, 0x7e, 0xd8, 0x74, 0xd4, 0x2a, 0xf8, 0x41, 0x80, 0x65, 0x83, 0xb6, 0x02, 0x2e, 0x6b, 0xf9, 0x48, 0x0c, 0x23, 0xd1, 0xbe, 0x34, 0x1f, 0x59, 0xb0, 0x43, 0xaf, 0xda, 0xa7, 0x6b, 0xad, 0x86, 0x22, 0x20, 0x4f, 0xa8, 0x4e, 0x26, 0xdd, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3652_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3652_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3652 = { .name = "ecdsa_secp224r1_sha3_224_3652", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3652_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3652_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3652_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 298 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3653 for ECDSA, tcId is 299 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3653_pubkey[] = { 0x75, 0xb6, 0x5c, 0xd6, 0x14, 0x49, 0xfa, 0xf0, 0xd4, 0xbb, 0x2d, 0x23, 0x00, 0xb1, 0x34, 0x75, 0x7b, 0x71, 0x4f, 0xbc, 0x4e, 0xfb, 0xd6, 0x63, 0x1e, 0x66, 0x4c, 0xbf, 0xb4, 0x88, 0x63, 0x3f, 0x42, 0xe5, 0x0b, 0x11, 0xc3, 0x01, 0xbf, 0x37, 0x36, 0xa4, 0x61, 0x28, 0x6e, 0xcc, 0xad, 0x24, 0x47, 0x18, 0x08, 0x35, 0xd5, 0x08, 0xde, 0xb2, }; static const unsigned char ecdsa_secp224r1_sha3_224_3653_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3653_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3653 = { .name = "ecdsa_secp224r1_sha3_224_3653", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3653_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3653_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3653_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 299 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3654 for ECDSA, tcId is 300 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3654_pubkey[] = { 0xbd, 0x18, 0xc7, 0x79, 0x74, 0x49, 0xc6, 0x4e, 0x9f, 0xc1, 0xad, 0x2c, 0xa9, 0xc4, 0x91, 0x32, 0xfc, 0x34, 0xb4, 0x74, 0x18, 0x31, 0xfd, 0xbc, 0x6c, 0xbd, 0x87, 0xcf, 0xf8, 0x30, 0xc1, 0x08, 0xfd, 0x50, 0x1b, 0xf9, 0xb7, 0xb3, 0xb8, 0x98, 0x07, 0x23, 0x97, 0xb9, 0xa6, 0xe7, 0x22, 0x16, 0xdb, 0x78, 0x4c, 0x87, 0x78, 0x82, 0xc8, 0x7b, }; static const unsigned char ecdsa_secp224r1_sha3_224_3654_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3654_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3654 = { .name = "ecdsa_secp224r1_sha3_224_3654", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3654_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3654_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3654_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 300 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3655 for ECDSA, tcId is 301 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3655_pubkey[] = { 0xaf, 0x73, 0x66, 0x67, 0xb6, 0x18, 0xcf, 0xa5, 0x52, 0x6f, 0x07, 0x3f, 0x70, 0x48, 0xd5, 0xe6, 0xb6, 0x72, 0xa0, 0x55, 0x69, 0xcd, 0x29, 0x12, 0xbc, 0xe8, 0x91, 0x4d, 0x6a, 0x03, 0x0a, 0xa7, 0x3f, 0xd7, 0x95, 0x17, 0xee, 0x81, 0x75, 0x80, 0x04, 0x84, 0xf2, 0xdc, 0xeb, 0xf0, 0x28, 0x71, 0x82, 0x5c, 0xc6, 0x7c, 0x41, 0xb1, 0xa8, 0xfc, }; static const unsigned char ecdsa_secp224r1_sha3_224_3655_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3655_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3655 = { .name = "ecdsa_secp224r1_sha3_224_3655", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3655_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3655_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3655_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 301 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3656 for ECDSA, tcId is 302 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3656_pubkey[] = { 0xaf, 0x73, 0x66, 0x67, 0xb6, 0x18, 0xcf, 0xa5, 0x52, 0x6f, 0x07, 0x3f, 0x70, 0x48, 0xd5, 0xe6, 0xb6, 0x72, 0xa0, 0x55, 0x69, 0xcd, 0x29, 0x12, 0xbc, 0xe8, 0x91, 0x4d, 0x6a, 0x03, 0x0a, 0xa7, 0x3f, 0xd7, 0x95, 0x17, 0xee, 0x81, 0x75, 0x80, 0x04, 0x84, 0xf2, 0xdc, 0xeb, 0xf0, 0x28, 0x71, 0x82, 0x5c, 0xc6, 0x7c, 0x41, 0xb1, 0xa8, 0xfc, }; static const unsigned char ecdsa_secp224r1_sha3_224_3656_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3656_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3656 = { .name = "ecdsa_secp224r1_sha3_224_3656", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3656_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3656_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3656_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 302 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3657 for ECDSA, tcId is 303 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3657_pubkey[] = { 0xaa, 0x2f, 0x98, 0x1a, 0xdd, 0x54, 0x80, 0xe7, 0xf2, 0xa8, 0xae, 0x50, 0xfc, 0x52, 0x25, 0x86, 0x12, 0xad, 0x64, 0x20, 0xa1, 0xa2, 0xcc, 0x2c, 0x25, 0x2c, 0x16, 0x93, 0x32, 0xc1, 0xff, 0x19, 0xc3, 0x31, 0xd3, 0xe5, 0x2a, 0x98, 0xad, 0xd7, 0xe7, 0xf4, 0xf8, 0xac, 0x12, 0x2c, 0xa9, 0x61, 0xb8, 0xcb, 0xe4, 0x26, 0x0e, 0xd8, 0x3e, 0x4c, }; static const unsigned char ecdsa_secp224r1_sha3_224_3657_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3657_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3657 = { .name = "ecdsa_secp224r1_sha3_224_3657", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3657_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3657_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3657_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 303 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3658 for ECDSA, tcId is 304 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3658_pubkey[] = { 0x8f, 0xeb, 0x4b, 0x15, 0x3b, 0x7d, 0xfe, 0x40, 0x81, 0x06, 0x9e, 0xc7, 0x08, 0xfd, 0xb1, 0x61, 0x71, 0x6e, 0xc3, 0xed, 0x17, 0xc8, 0x1e, 0xfb, 0x1b, 0xb3, 0xe3, 0x96, 0xbb, 0xc9, 0x0c, 0xfa, 0xe2, 0xc3, 0x95, 0x7f, 0x2c, 0xec, 0x75, 0x23, 0x94, 0x45, 0x23, 0x9a, 0x1c, 0x0e, 0x9e, 0x0a, 0x03, 0x23, 0x85, 0xd0, 0x63, 0xf1, 0xd2, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_224_3658_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3658_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3658 = { .name = "ecdsa_secp224r1_sha3_224_3658", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3658_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3658_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3658_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 304 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3659 for ECDSA, tcId is 305 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3659_pubkey[] = { 0xaf, 0x2a, 0x29, 0xd3, 0x56, 0x13, 0x3f, 0x4d, 0x72, 0x6c, 0x64, 0xe8, 0xff, 0x7d, 0x80, 0x85, 0x16, 0x49, 0xcf, 0x3e, 0x35, 0xd2, 0xb9, 0xde, 0x27, 0x25, 0xbb, 0xab, 0x6d, 0x21, 0x99, 0xd9, 0xf3, 0xe0, 0xf0, 0x86, 0x3e, 0x67, 0x1d, 0xeb, 0x98, 0x7a, 0xfd, 0xb2, 0x5b, 0x6e, 0x6b, 0x77, 0x44, 0xbc, 0x53, 0xfa, 0xa1, 0x5c, 0xac, 0x53, }; static const unsigned char ecdsa_secp224r1_sha3_224_3659_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3659_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3659 = { .name = "ecdsa_secp224r1_sha3_224_3659", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3659_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3659_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3659_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 305 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3660 for ECDSA, tcId is 306 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3660_pubkey[] = { 0x7b, 0xb0, 0xbc, 0x95, 0x29, 0xb0, 0x6a, 0x42, 0x4e, 0x8e, 0xfb, 0xaa, 0xfd, 0xec, 0x5a, 0xa3, 0x39, 0xde, 0x55, 0x99, 0xf8, 0x2e, 0xc9, 0xe1, 0x95, 0xf0, 0xce, 0xde, 0x38, 0x1d, 0xc9, 0x50, 0xca, 0xa8, 0xb0, 0x45, 0x4f, 0xab, 0x70, 0xc5, 0x7e, 0x06, 0xa1, 0x5b, 0xc7, 0x71, 0xb6, 0x93, 0xeb, 0xb4, 0x01, 0x3b, 0xc8, 0x5b, 0x56, 0xac, }; static const unsigned char ecdsa_secp224r1_sha3_224_3660_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3660_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x0e, 0x77, 0xef, 0xeb, 0xda, 0xc8, 0x3c, 0x01, 0xdc, 0xe3, 0xf8, 0xc4, 0x16, 0x2e, 0x28, 0x6b, 0x38, 0xb7, 0xe2, 0x3d, 0xe8, 0x36, 0x37, 0xa7, 0x25, 0x31, 0xea, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3660 = { .name = "ecdsa_secp224r1_sha3_224_3660", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3660_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3660_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3660_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 306 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3661 for ECDSA, tcId is 307 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3661_pubkey[] = { 0x2d, 0xa3, 0xea, 0x31, 0x45, 0xa1, 0xe6, 0x87, 0x72, 0xe1, 0x39, 0xf1, 0xb5, 0xd9, 0xb8, 0x5e, 0x20, 0x1d, 0xe7, 0xdf, 0x47, 0x75, 0xd5, 0xc4, 0xf7, 0x78, 0x25, 0x96, 0x4d, 0x3a, 0x23, 0x80, 0x09, 0x9d, 0x7f, 0x3c, 0xf3, 0xad, 0x18, 0xc1, 0xfb, 0x13, 0xab, 0x1e, 0x05, 0x4c, 0x09, 0x76, 0x33, 0xfd, 0x51, 0xe6, 0x7c, 0x1a, 0x9c, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha3_224_3661_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3661_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xf1, 0x88, 0x10, 0x14, 0x25, 0x37, 0xc3, 0xfe, 0x23, 0x1c, 0x07, 0x3b, 0xe9, 0xd0, 0xee, 0x37, 0xa8, 0x01, 0x0e, 0x00, 0x2b, 0xa6, 0xf1, 0x9e, 0x37, 0x2a, 0x3f, 0x86, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3661 = { .name = "ecdsa_secp224r1_sha3_224_3661", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3661_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3661_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3661_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 307 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3662 for ECDSA, tcId is 308 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3662_pubkey[] = { 0xff, 0xd4, 0x0a, 0x19, 0xc0, 0x9c, 0xe0, 0xa2, 0x11, 0x24, 0xf1, 0x63, 0xc7, 0x25, 0x58, 0xe1, 0xf1, 0x5a, 0x11, 0xae, 0xcd, 0xe9, 0xdd, 0xe0, 0x8c, 0x46, 0x5b, 0xce, 0xe3, 0xcc, 0x54, 0x42, 0x6c, 0x78, 0x50, 0xae, 0x17, 0x67, 0x0e, 0x1c, 0xc1, 0x99, 0x31, 0xe9, 0xd9, 0x34, 0x61, 0x0f, 0x42, 0xf4, 0x56, 0xb8, 0x47, 0x2a, 0x80, 0x47, }; static const unsigned char ecdsa_secp224r1_sha3_224_3662_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3662_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3662 = { .name = "ecdsa_secp224r1_sha3_224_3662", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3662_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3662_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3662_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 308 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3663 for ECDSA, tcId is 309 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3663_pubkey[] = { 0x06, 0x08, 0x1e, 0xe7, 0xd0, 0x6a, 0xe8, 0xd4, 0xb8, 0x40, 0x75, 0xe5, 0x32, 0x64, 0x12, 0x5b, 0x0e, 0xfa, 0x08, 0x2d, 0xc6, 0xe1, 0xd9, 0x19, 0x0e, 0x9c, 0xd8, 0xf6, 0x36, 0x10, 0x12, 0xdb, 0x57, 0x0e, 0x27, 0x93, 0x36, 0xfb, 0xc8, 0xf7, 0x48, 0xd7, 0xd1, 0xc7, 0x79, 0x67, 0xcc, 0x0a, 0xe1, 0x88, 0xae, 0xdf, 0x8c, 0xb4, 0xd0, 0xf6, }; static const unsigned char ecdsa_secp224r1_sha3_224_3663_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3663_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3663 = { .name = "ecdsa_secp224r1_sha3_224_3663", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3663_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3663_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3663_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 309 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3664 for ECDSA, tcId is 310 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3664_pubkey[] = { 0xf4, 0x80, 0xa4, 0x74, 0xe2, 0x8f, 0x98, 0x7e, 0x1e, 0x76, 0xe7, 0x3c, 0x7a, 0x9c, 0x5c, 0x12, 0x30, 0x7f, 0x5b, 0xdc, 0x99, 0xd9, 0x7e, 0x51, 0x5e, 0x71, 0xae, 0x42, 0x0e, 0x31, 0x0a, 0xb3, 0x40, 0x3e, 0xb4, 0x4f, 0x8f, 0x17, 0xe2, 0x17, 0x91, 0x4d, 0x13, 0x6c, 0x8e, 0x23, 0x41, 0xf7, 0x11, 0x77, 0x05, 0x2d, 0x4f, 0x07, 0xdc, 0xb3, }; static const unsigned char ecdsa_secp224r1_sha3_224_3664_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3664_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x04, 0xd2, 0xa5, 0x4e, 0x9e, 0x42, 0xbe, 0xab, 0x49, 0xa1, 0x52, 0xec, 0x07, 0x64, 0xb8, 0x23, 0xbd, 0x92, 0xa0, 0xbf, 0x4d, 0x67, 0x67, 0xe2, 0x61, 0xbb, 0x4e, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3664 = { .name = "ecdsa_secp224r1_sha3_224_3664", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3664_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3664_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3664_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 310 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3665 for ECDSA, tcId is 311 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3665_pubkey[] = { 0x46, 0x55, 0xa8, 0xb7, 0xd4, 0x66, 0x13, 0xd3, 0xd8, 0xac, 0xe5, 0x97, 0xa9, 0xd3, 0x81, 0xb7, 0xd2, 0xe3, 0x0c, 0x57, 0xaa, 0xd4, 0x90, 0xe4, 0x13, 0x48, 0x11, 0x05, 0x4a, 0xca, 0x54, 0x63, 0xf0, 0x37, 0x7d, 0xb9, 0xc9, 0x63, 0x8d, 0x28, 0x01, 0x29, 0xcf, 0x14, 0xf5, 0xe6, 0x0c, 0x8e, 0xbc, 0xef, 0x4c, 0x8e, 0xbd, 0xc9, 0xb1, 0x5d, }; static const unsigned char ecdsa_secp224r1_sha3_224_3665_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3665_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xf9, 0xf9, 0xe7, 0xf1, 0x01, 0xb4, 0xea, 0x46, 0x8e, 0xb7, 0x8f, 0xd9, 0xba, 0x89, 0x15, 0x64, 0x54, 0xb4, 0x14, 0xfc, 0x17, 0xd0, 0x28, 0x40, 0xca, 0x81, 0xca, 0x78, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3665 = { .name = "ecdsa_secp224r1_sha3_224_3665", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3665_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3665_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3665_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 311 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3666 for ECDSA, tcId is 312 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3666_pubkey[] = { 0x6c, 0x3c, 0x10, 0x69, 0xfb, 0x76, 0xda, 0x43, 0xe5, 0xa9, 0xae, 0x1a, 0x69, 0xfb, 0x67, 0x97, 0x40, 0x17, 0x1f, 0x2b, 0x45, 0x79, 0x56, 0xb1, 0x3f, 0x58, 0x29, 0xc0, 0x4f, 0x0b, 0x10, 0x00, 0xd4, 0x1a, 0x56, 0xd9, 0x6e, 0xca, 0x18, 0xa6, 0x26, 0xd0, 0x63, 0x6f, 0x20, 0xce, 0xe1, 0x84, 0xf3, 0xd2, 0xf5, 0xb8, 0x7a, 0xb6, 0x8c, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha3_224_3666_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3666_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbe, 0x7e, 0xd7, 0x38, 0x4b, 0xc8, 0xb9, 0x01, 0x13, 0xe5, 0x8c, 0xa8, 0x7a, 0x68, 0xa0, 0x6f, 0xc2, 0xfe, 0x5e, 0xfa, 0x96, 0xf0, 0xa9, 0x56, 0x73, 0x3d, 0xc6, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3666 = { .name = "ecdsa_secp224r1_sha3_224_3666", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3666_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3666_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3666_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 312 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3667 for ECDSA, tcId is 313 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3667_pubkey[] = { 0x9a, 0x24, 0x37, 0x5b, 0x03, 0xb7, 0x8c, 0x20, 0x23, 0x08, 0x67, 0xb8, 0x42, 0xc6, 0x80, 0xbd, 0xb8, 0x86, 0x04, 0xfa, 0x93, 0xf7, 0xc5, 0x93, 0x17, 0x34, 0x83, 0x10, 0x60, 0x09, 0x0f, 0xf5, 0xde, 0xc7, 0xb6, 0xfb, 0x6d, 0xf4, 0x59, 0xbe, 0xfd, 0xfc, 0x5e, 0x9d, 0x44, 0x01, 0x98, 0xe8, 0x61, 0x0a, 0x26, 0x7d, 0xaa, 0x95, 0x48, 0xfa, }; static const unsigned char ecdsa_secp224r1_sha3_224_3667_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3667_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x79, 0x82, 0x35, 0x15, 0xd5, 0x25, 0xdc, 0x02, 0xf1, 0x88, 0x10, 0x14, 0x25, 0x37, 0x55, 0x3a, 0x6d, 0xa5, 0x60, 0x48, 0xfb, 0x99, 0x9d, 0x3f, 0xdf, 0xf8, 0x5f, 0x70, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3667 = { .name = "ecdsa_secp224r1_sha3_224_3667", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3667_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3667_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3667_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 313 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3668 for ECDSA, tcId is 314 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3668_pubkey[] = { 0x71, 0xf0, 0x1e, 0x60, 0x70, 0xa5, 0xbd, 0x69, 0x40, 0x92, 0x41, 0x7f, 0x75, 0xb1, 0xf1, 0xb3, 0x54, 0x57, 0x42, 0x1e, 0x99, 0x97, 0xfa, 0x50, 0x86, 0xdf, 0xef, 0x4b, 0x2b, 0x8f, 0x67, 0x51, 0x0a, 0xc8, 0x20, 0x38, 0x09, 0x07, 0x50, 0x3b, 0x3b, 0xcd, 0xb8, 0x9f, 0xdb, 0x5f, 0x26, 0x88, 0x43, 0x4d, 0xba, 0x79, 0xd3, 0xa4, 0x0a, 0x11, }; static const unsigned char ecdsa_secp224r1_sha3_224_3668_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3668_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x23, 0x51, 0x5d, 0x52, 0x5d, 0xc0, 0x2f, 0x18, 0x81, 0x01, 0x42, 0x53, 0x7c, 0x3f, 0xc1, 0xff, 0xd9, 0xa4, 0x38, 0x52, 0xc2, 0x62, 0x97, 0x4a, 0x2a, 0x16, 0x40, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3668 = { .name = "ecdsa_secp224r1_sha3_224_3668", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3668_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3668_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3668_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 314 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3669 for ECDSA, tcId is 315 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3669_pubkey[] = { 0x45, 0x33, 0x55, 0x21, 0x42, 0x78, 0x47, 0x47, 0x35, 0xb3, 0x2b, 0x1d, 0x45, 0xc9, 0xa2, 0x03, 0x42, 0x15, 0x78, 0xc1, 0x0a, 0xcd, 0x42, 0x6e, 0x9a, 0x56, 0x9d, 0x5f, 0x6b, 0x56, 0x55, 0x13, 0x83, 0x46, 0xd0, 0xbe, 0xf9, 0xcd, 0xe0, 0xeb, 0xb9, 0x7b, 0x49, 0x38, 0xe3, 0xc2, 0x8d, 0xc6, 0x12, 0xb4, 0xea, 0xab, 0xa8, 0x62, 0x18, 0x2d, }; static const unsigned char ecdsa_secp224r1_sha3_224_3669_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3669_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x46, 0xa2, 0xba, 0xa4, 0xbb, 0x80, 0x5e, 0x31, 0x02, 0x02, 0x84, 0xa6, 0xf8, 0x7f, 0x83, 0xff, 0xb3, 0x48, 0x70, 0xa5, 0x84, 0xc5, 0x2e, 0x94, 0x54, 0x2c, 0x81, 0x90, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3669 = { .name = "ecdsa_secp224r1_sha3_224_3669", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3669_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3669_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3669_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 315 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3670 for ECDSA, tcId is 316 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3670_pubkey[] = { 0xfa, 0x86, 0xcd, 0xd0, 0x97, 0x6a, 0xcf, 0x06, 0xb0, 0xa7, 0xa3, 0xdc, 0xae, 0x70, 0xf2, 0x87, 0xe6, 0x29, 0x50, 0xd8, 0x87, 0x4b, 0x32, 0xab, 0xcd, 0x59, 0xf7, 0x55, 0xbd, 0x00, 0x81, 0x7c, 0xea, 0x3c, 0x6b, 0x5e, 0x8d, 0x32, 0x66, 0xbe, 0xf1, 0xf3, 0xdf, 0x94, 0x4f, 0xc4, 0x95, 0x3e, 0x7a, 0x96, 0x09, 0x02, 0x90, 0x1f, 0xf3, 0x80, }; static const unsigned char ecdsa_secp224r1_sha3_224_3670_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3670_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd5, 0x25, 0xdc, 0x02, 0xf1, 0x88, 0x10, 0x14, 0x25, 0x37, 0xc3, 0xfe, 0x23, 0x1b, 0x44, 0xee, 0xeb, 0xc7, 0x6f, 0x3a, 0xb7, 0x68, 0x29, 0xdc, 0x0f, 0xb7, 0xe7, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3670 = { .name = "ecdsa_secp224r1_sha3_224_3670", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3670_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3670_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3670_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 316 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3671 for ECDSA, tcId is 317 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3671_pubkey[] = { 0x6f, 0xc6, 0xce, 0x34, 0x8c, 0xb1, 0x7c, 0xf5, 0x7f, 0xe1, 0x8e, 0x21, 0xed, 0x13, 0xe8, 0xf3, 0x3e, 0x5a, 0x72, 0x4b, 0xf8, 0x7f, 0x15, 0x1e, 0xa7, 0x57, 0x96, 0x33, 0xbd, 0xd1, 0xfb, 0x53, 0xba, 0x4e, 0xc9, 0xa4, 0x77, 0xa6, 0xf3, 0xe5, 0x19, 0x30, 0x03, 0xaa, 0xf4, 0x62, 0xc8, 0x57, 0xbc, 0x4a, 0x20, 0xbb, 0x62, 0x44, 0x65, 0x52, }; static const unsigned char ecdsa_secp224r1_sha3_224_3671_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3671_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7d, 0x96, 0xad, 0x58, 0xb0, 0xde, 0xa0, 0xaa, 0x5b, 0x2f, 0x56, 0x89, 0xfc, 0x4d, 0x2f, 0x3f, 0x91, 0x93, 0x27, 0xbf, 0x63, 0x3a, 0xe0, 0xb1, 0x7d, 0x50, 0x6e, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3671 = { .name = "ecdsa_secp224r1_sha3_224_3671", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3671_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3671_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3671_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 317 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3672 for ECDSA, tcId is 318 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3672_pubkey[] = { 0x98, 0xf2, 0xf5, 0xda, 0x45, 0x49, 0x58, 0xc7, 0xb0, 0x4e, 0xf2, 0x22, 0x0d, 0x45, 0xed, 0x85, 0x7a, 0x15, 0x7d, 0x38, 0x74, 0xd0, 0x33, 0xa2, 0x5a, 0xf6, 0xdb, 0x87, 0x90, 0xc7, 0x11, 0xd7, 0x57, 0x41, 0x28, 0xfb, 0x7d, 0xe7, 0xf3, 0x16, 0xf7, 0x89, 0x6b, 0x89, 0x86, 0x70, 0xc9, 0x77, 0x98, 0xd0, 0x5a, 0x97, 0xf9, 0xea, 0xb7, 0xb0, }; static const unsigned char ecdsa_secp224r1_sha3_224_3672_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3672_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xfb, 0x2d, 0x5a, 0xb1, 0x61, 0xbd, 0x41, 0x54, 0xb6, 0x5e, 0xad, 0x13, 0xf8, 0x9a, 0x5e, 0x7f, 0x23, 0x26, 0x4f, 0x7e, 0xc6, 0x75, 0xc1, 0x62, 0xfa, 0xa0, 0xdc, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3672 = { .name = "ecdsa_secp224r1_sha3_224_3672", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3672_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3672_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3672_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 318 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3673 for ECDSA, tcId is 319 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3673_pubkey[] = { 0x3c, 0xcb, 0x08, 0x21, 0x0d, 0x0b, 0x22, 0x83, 0xf3, 0xcc, 0xb7, 0x79, 0x07, 0x9b, 0xb1, 0x60, 0xce, 0xe3, 0xce, 0xc9, 0x26, 0x3d, 0x35, 0x65, 0x65, 0xf7, 0x70, 0xb3, 0x9f, 0xb0, 0xed, 0xb8, 0x3c, 0xae, 0x0b, 0x73, 0x0f, 0xdd, 0xd5, 0xc0, 0xd6, 0x3e, 0x10, 0xa9, 0x9e, 0x52, 0x74, 0x97, 0xa5, 0x8c, 0x18, 0xb8, 0x4d, 0xae, 0x8e, 0x8e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3673_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3673_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x78, 0xc4, 0x08, 0x0a, 0x12, 0x9b, 0xe1, 0xff, 0x11, 0x8e, 0x03, 0x9d, 0xf4, 0xe8, 0x77, 0x1b, 0xd4, 0x00, 0x87, 0x00, 0x15, 0xd3, 0x78, 0xcf, 0x1b, 0x95, 0x1f, 0xc3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3673 = { .name = "ecdsa_secp224r1_sha3_224_3673", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3673_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3673_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3673_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 319 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3674 for ECDSA, tcId is 320 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3674_pubkey[] = { 0x2d, 0xd3, 0xcd, 0x29, 0xdb, 0x76, 0x16, 0xa6, 0xdc, 0x77, 0xbb, 0x1a, 0x66, 0xe8, 0x49, 0x13, 0x3b, 0x14, 0x08, 0xc5, 0x40, 0xee, 0x2e, 0xbb, 0x01, 0xe0, 0x7b, 0xc4, 0xd3, 0xe5, 0x78, 0x64, 0x01, 0xc4, 0x53, 0x3e, 0x15, 0x69, 0x7c, 0x6b, 0xf8, 0x6e, 0x14, 0xde, 0xf5, 0x08, 0x85, 0x90, 0xc1, 0x9a, 0xec, 0x9d, 0x96, 0xf8, 0x53, 0x8a, }; static const unsigned char ecdsa_secp224r1_sha3_224_3674_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3674_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x5f, 0x3f, 0x6b, 0x9c, 0x25, 0xe4, 0x5c, 0x80, 0x89, 0xf2, 0xc6, 0x54, 0x3d, 0x34, 0x50, 0x37, 0xe1, 0x7f, 0x2f, 0x7d, 0x4b, 0x78, 0x54, 0xab, 0x39, 0x9e, 0xe3, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3674 = { .name = "ecdsa_secp224r1_sha3_224_3674", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3674_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3674_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3674_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 320 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3675 for ECDSA, tcId is 321 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3675_pubkey[] = { 0x53, 0xe8, 0x9d, 0x29, 0x40, 0x66, 0x22, 0xbb, 0xaa, 0x1b, 0xcf, 0x7c, 0x98, 0x0d, 0x52, 0x32, 0x09, 0x64, 0x6c, 0xc2, 0x0a, 0x4b, 0x31, 0x04, 0xaa, 0x34, 0x42, 0x64, 0x77, 0x81, 0xd3, 0xde, 0x43, 0x41, 0x3d, 0xfa, 0x06, 0x1a, 0xa9, 0xb2, 0xd7, 0xc2, 0x9e, 0xca, 0x9c, 0x8e, 0xd4, 0x2b, 0x28, 0x5f, 0xbc, 0xbb, 0xe0, 0x16, 0xcc, 0x1e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3675_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3675_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3675 = { .name = "ecdsa_secp224r1_sha3_224_3675", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3675_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3675_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3675_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 321 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3676 for ECDSA, tcId is 322 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3676_pubkey[] = { 0x04, 0x9c, 0x4d, 0x99, 0x8c, 0x0f, 0x36, 0x8e, 0xbf, 0x1a, 0x69, 0x27, 0x4f, 0xdd, 0xf8, 0x07, 0xda, 0xe2, 0x45, 0xb4, 0xd3, 0x14, 0x4d, 0x69, 0x6d, 0x81, 0x3e, 0xd9, 0xa5, 0xd3, 0xf5, 0x86, 0x31, 0x5e, 0xe7, 0xf5, 0xb2, 0x63, 0xef, 0xe4, 0x7a, 0x1b, 0x0a, 0x2e, 0x94, 0x84, 0x72, 0x42, 0x71, 0x03, 0x70, 0xd9, 0x2c, 0xeb, 0x24, 0xa4, }; static const unsigned char ecdsa_secp224r1_sha3_224_3676_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3676_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3676 = { .name = "ecdsa_secp224r1_sha3_224_3676", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3676_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3676_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3676_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 322 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3677 for ECDSA, tcId is 323 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3677_pubkey[] = { 0x4b, 0x1b, 0x3c, 0x49, 0x14, 0x43, 0xd1, 0xa4, 0x5c, 0xbe, 0x5f, 0xb2, 0xf6, 0xed, 0x36, 0xac, 0x3e, 0xbd, 0xe2, 0xa2, 0x45, 0x6a, 0x7f, 0x9a, 0xfe, 0x62, 0x8d, 0xd7, 0xd3, 0x28, 0xdb, 0x16, 0x5e, 0xe1, 0x11, 0x07, 0x65, 0x79, 0x75, 0x69, 0xb3, 0x0b, 0x04, 0x19, 0x84, 0x79, 0x0e, 0xa3, 0xaa, 0x65, 0xbd, 0x0b, 0xa3, 0x34, 0x18, 0x18, }; static const unsigned char ecdsa_secp224r1_sha3_224_3677_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3677_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3677 = { .name = "ecdsa_secp224r1_sha3_224_3677", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3677_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3677_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3677_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 323 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3678 for ECDSA, tcId is 324 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3678_pubkey[] = { 0xb1, 0x9e, 0x13, 0x69, 0xac, 0xb5, 0xfc, 0x91, 0x3d, 0x1a, 0xc6, 0xe9, 0x2e, 0xe3, 0x77, 0x05, 0x90, 0xc5, 0xa4, 0x5c, 0xe5, 0x2f, 0xdf, 0x64, 0xa9, 0xf6, 0x51, 0xbe, 0x2f, 0xac, 0x7a, 0x01, 0x7a, 0x6b, 0x6c, 0xfc, 0x1c, 0x38, 0x1c, 0x92, 0x54, 0x56, 0x4c, 0x1b, 0x92, 0x9b, 0x3c, 0x10, 0x1f, 0x89, 0x19, 0x5a, 0x6d, 0x27, 0x90, 0x7e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3678_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3678_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3678 = { .name = "ecdsa_secp224r1_sha3_224_3678", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3678_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3678_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3678_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 324 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3679 for ECDSA, tcId is 325 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3679_pubkey[] = { 0xd0, 0xc8, 0x0d, 0x94, 0x2d, 0xa3, 0xdb, 0xe6, 0x62, 0x46, 0x7e, 0x1b, 0xcc, 0x69, 0xce, 0xb3, 0x22, 0xdc, 0x31, 0x11, 0x52, 0xbf, 0x15, 0x55, 0x7e, 0xd3, 0xf7, 0xaf, 0xf7, 0xb6, 0x27, 0xb0, 0xba, 0x59, 0x52, 0x41, 0x70, 0x52, 0x7c, 0xc1, 0x16, 0x1a, 0xbd, 0xfa, 0x4a, 0x4a, 0x25, 0xdf, 0xd0, 0x9c, 0x59, 0xa9, 0x8d, 0xb7, 0xea, 0x04, }; static const unsigned char ecdsa_secp224r1_sha3_224_3679_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3679_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3679 = { .name = "ecdsa_secp224r1_sha3_224_3679", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3679_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3679_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3679_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 325 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3680 for ECDSA, tcId is 326 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3680_pubkey[] = { 0xa7, 0x81, 0xc8, 0x86, 0x81, 0xc9, 0x8a, 0xad, 0xf3, 0x1e, 0x26, 0x54, 0x1b, 0x9a, 0xb6, 0xef, 0xa5, 0x2a, 0x49, 0x41, 0x2c, 0xf7, 0x28, 0x29, 0x44, 0xf1, 0x37, 0x20, 0xb6, 0x8d, 0xde, 0xaf, 0x8a, 0x09, 0xaf, 0x0b, 0x37, 0x2b, 0x00, 0x7e, 0x12, 0x2d, 0x40, 0x2e, 0x72, 0x4f, 0xdc, 0xea, 0x1c, 0x61, 0x9a, 0x80, 0xb3, 0x2b, 0xfe, 0x5b, }; static const unsigned char ecdsa_secp224r1_sha3_224_3680_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3680_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3680 = { .name = "ecdsa_secp224r1_sha3_224_3680", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3680_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3680_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3680_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 326 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3681 for ECDSA, tcId is 327 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3681_pubkey[] = { 0x93, 0x16, 0x06, 0xb9, 0xf1, 0x80, 0xd1, 0x64, 0x09, 0xef, 0xeb, 0xc9, 0x96, 0xbb, 0x1d, 0xf4, 0x42, 0xb8, 0x4e, 0x19, 0xbc, 0xc9, 0xbe, 0xd0, 0xe2, 0x36, 0xcb, 0x64, 0x50, 0xed, 0xd2, 0x16, 0x26, 0x25, 0xa9, 0x79, 0xa2, 0x5b, 0x23, 0x1f, 0xba, 0x17, 0x87, 0x8b, 0x75, 0x6a, 0x77, 0xc1, 0x67, 0x22, 0x38, 0x86, 0x61, 0x3a, 0xfb, 0x03, }; static const unsigned char ecdsa_secp224r1_sha3_224_3681_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3681_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3681 = { .name = "ecdsa_secp224r1_sha3_224_3681", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3681_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3681_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3681_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 327 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3682 for ECDSA, tcId is 328 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3682_pubkey[] = { 0x1d, 0xf7, 0x98, 0x5b, 0x13, 0xde, 0xcb, 0x2a, 0xa1, 0x70, 0xb3, 0x25, 0xed, 0x24, 0x21, 0xd8, 0xd4, 0x24, 0x74, 0x15, 0x2b, 0x10, 0x40, 0x72, 0x4e, 0xd7, 0xf2, 0x8d, 0x77, 0xab, 0x5d, 0x47, 0xa2, 0xfb, 0x85, 0x75, 0x4a, 0x35, 0x15, 0x68, 0x2f, 0x20, 0xb3, 0xa4, 0x7d, 0x13, 0xb2, 0x6b, 0xd5, 0x9b, 0x72, 0xf3, 0xbd, 0xa8, 0x35, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_224_3682_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3682_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3682 = { .name = "ecdsa_secp224r1_sha3_224_3682", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3682_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3682_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3682_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 328 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3683 for ECDSA, tcId is 329 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3683_pubkey[] = { 0x8a, 0x46, 0x67, 0x0a, 0x9c, 0x9d, 0x3c, 0xf0, 0x3a, 0x9e, 0x9d, 0x48, 0x52, 0x5c, 0x75, 0xe5, 0x72, 0x68, 0x0a, 0x26, 0x27, 0x8a, 0xdc, 0x08, 0x88, 0xd5, 0x03, 0x0f, 0x8c, 0x88, 0xe5, 0x98, 0x29, 0xd5, 0xa8, 0x02, 0xc0, 0x24, 0x5a, 0xa8, 0xb5, 0x64, 0x17, 0x79, 0x87, 0x7c, 0x56, 0x47, 0xad, 0x2b, 0x9b, 0x2a, 0x73, 0x65, 0x35, 0xeb, }; static const unsigned char ecdsa_secp224r1_sha3_224_3683_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3683_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3683 = { .name = "ecdsa_secp224r1_sha3_224_3683", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3683_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3683_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3683_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 329 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3684 for ECDSA, tcId is 330 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3684_pubkey[] = { 0x16, 0x42, 0x80, 0x97, 0xe6, 0xeb, 0x65, 0x68, 0x89, 0x05, 0x67, 0x8a, 0xae, 0x66, 0x1f, 0x3d, 0x83, 0xb7, 0xe5, 0xec, 0xc7, 0x78, 0x7e, 0xd2, 0x2f, 0xc0, 0x29, 0xe8, 0x68, 0xd6, 0x2c, 0xb8, 0x9b, 0xe5, 0x4d, 0x10, 0xca, 0x5b, 0x57, 0x5a, 0xa8, 0x6f, 0x9c, 0x8f, 0xb4, 0x75, 0xc6, 0xd9, 0x0f, 0x59, 0xd4, 0x47, 0x75, 0x95, 0xc0, 0x1c, }; static const unsigned char ecdsa_secp224r1_sha3_224_3684_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3684_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3684 = { .name = "ecdsa_secp224r1_sha3_224_3684", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3684_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3684_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3684_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 330 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3685 for ECDSA, tcId is 331 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3685_pubkey[] = { 0x3f, 0xa5, 0x63, 0xf8, 0x06, 0xbe, 0x91, 0x3b, 0x57, 0x34, 0x7a, 0xdf, 0x8b, 0x1e, 0x86, 0x2b, 0x7e, 0x02, 0x53, 0xbe, 0xa7, 0x01, 0xf6, 0xb2, 0x01, 0xe5, 0x7d, 0xca, 0x02, 0x31, 0xcd, 0x68, 0xa2, 0xc2, 0x44, 0x93, 0xde, 0xce, 0xd0, 0x07, 0x71, 0xe1, 0x00, 0xbd, 0x00, 0x1b, 0xc7, 0x99, 0x02, 0x75, 0x6d, 0x56, 0xd6, 0xff, 0x87, 0xf1, }; static const unsigned char ecdsa_secp224r1_sha3_224_3685_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3685_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3685 = { .name = "ecdsa_secp224r1_sha3_224_3685", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3685_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3685_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3685_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 331 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3686 for ECDSA, tcId is 332 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3686_pubkey[] = { 0xfe, 0xba, 0x92, 0x30, 0x66, 0x0a, 0xc3, 0xfd, 0x64, 0xae, 0x02, 0xf7, 0x30, 0x62, 0x97, 0xaa, 0x49, 0x75, 0x43, 0x6c, 0x0a, 0xd1, 0x10, 0x58, 0x54, 0xe4, 0x06, 0x6b, 0xdd, 0xcd, 0xba, 0x26, 0x67, 0x94, 0x36, 0xb4, 0xe1, 0x3f, 0x95, 0xd8, 0xf4, 0xf6, 0x59, 0x14, 0x2e, 0x7b, 0xf4, 0x05, 0xc7, 0x72, 0xe2, 0x17, 0x88, 0x04, 0x7b, 0x08, }; static const unsigned char ecdsa_secp224r1_sha3_224_3686_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3686_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x14, 0x1a, 0x6e, 0xfb, 0x8f, 0x6e, 0x19, 0x01, 0x6b, 0x61, 0xc7, 0x65, 0x73, 0xc9, 0x75, 0x93, 0x09, 0xa1, 0x8c, 0x16, 0xe4, 0x8c, 0x13, 0x6d, 0xca, 0x55, 0x26, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3686 = { .name = "ecdsa_secp224r1_sha3_224_3686", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3686_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3686_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3686_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 332 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3687 for ECDSA, tcId is 333 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3687_pubkey[] = { 0xfe, 0xba, 0x92, 0x30, 0x66, 0x0a, 0xc3, 0xfd, 0x64, 0xae, 0x02, 0xf7, 0x30, 0x62, 0x97, 0xaa, 0x49, 0x75, 0x43, 0x6c, 0x0a, 0xd1, 0x10, 0x58, 0x54, 0xe4, 0x06, 0x6b, 0x22, 0x32, 0x45, 0xd9, 0x98, 0x6b, 0xc9, 0x4b, 0x1e, 0xc0, 0x6a, 0x27, 0x0b, 0x09, 0xa6, 0xea, 0xd1, 0x84, 0x0b, 0xfa, 0x38, 0x8d, 0x1d, 0xe8, 0x77, 0xfb, 0x84, 0xf9, }; static const unsigned char ecdsa_secp224r1_sha3_224_3687_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3687_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x14, 0x1a, 0x6e, 0xfb, 0x8f, 0x6e, 0x19, 0x01, 0x6b, 0x61, 0xc7, 0x65, 0x73, 0xc9, 0x75, 0x93, 0x09, 0xa1, 0x8c, 0x16, 0xe4, 0x8c, 0x13, 0x6d, 0xca, 0x55, 0x26, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3687 = { .name = "ecdsa_secp224r1_sha3_224_3687", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3687_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3687_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3687_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 333 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3688 for ECDSA, tcId is 334 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3688_pubkey[] = { 0x00, 0x25, 0x09, 0x4e, 0xa9, 0xe4, 0xce, 0x76, 0xd8, 0xc4, 0x73, 0x56, 0xe4, 0xae, 0x60, 0x4e, 0xb6, 0x46, 0x96, 0x69, 0xb0, 0x16, 0x1f, 0xff, 0x80, 0x5a, 0x76, 0x5f, 0x6f, 0x80, 0x74, 0x30, 0xf1, 0x86, 0xba, 0x63, 0xff, 0xa0, 0xf3, 0x15, 0xbe, 0x72, 0x1e, 0xc4, 0x3b, 0xae, 0xf2, 0x4b, 0x8f, 0xba, 0x10, 0xb0, 0x4f, 0x19, 0x18, 0x9f, }; static const unsigned char ecdsa_secp224r1_sha3_224_3688_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3688_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3688 = { .name = "ecdsa_secp224r1_sha3_224_3688", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3688_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3688_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3688_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 334 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3689 for ECDSA, tcId is 335 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3689_pubkey[] = { 0x75, 0x42, 0x67, 0xd9, 0xf0, 0x90, 0x52, 0x4d, 0x4c, 0x97, 0xbb, 0x1a, 0x56, 0x22, 0xe0, 0xc9, 0xf8, 0x04, 0xdf, 0xd7, 0x0c, 0xc6, 0x8d, 0x98, 0x72, 0xf0, 0xa4, 0xf8, 0x70, 0x8c, 0x24, 0xa4, 0x9b, 0x81, 0x30, 0x7d, 0xb4, 0x58, 0xc0, 0x20, 0xfc, 0x73, 0x74, 0x77, 0x08, 0x58, 0xfa, 0xae, 0xa1, 0xd6, 0xee, 0x37, 0xbf, 0x7b, 0xea, 0xe3, }; static const unsigned char ecdsa_secp224r1_sha3_224_3689_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3689_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3689 = { .name = "ecdsa_secp224r1_sha3_224_3689", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3689_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3689_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3689_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 335 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3690 for ECDSA, tcId is 336 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3690_pubkey[] = { 0x75, 0xa0, 0xd5, 0x29, 0x1f, 0x48, 0xc1, 0x7b, 0x40, 0x29, 0xba, 0xae, 0xa4, 0xd5, 0x79, 0x6b, 0xda, 0x7c, 0x9d, 0x58, 0x02, 0xd5, 0x34, 0xc0, 0xc2, 0x65, 0x79, 0x4a, 0xc9, 0x37, 0x69, 0xdc, 0xaf, 0x79, 0x65, 0xf3, 0xc1, 0x28, 0x64, 0xf5, 0x0c, 0xcb, 0x22, 0xf1, 0x0f, 0x19, 0x3d, 0x5f, 0x0f, 0x7c, 0x33, 0x44, 0x91, 0x31, 0xd2, 0xc4, }; static const unsigned char ecdsa_secp224r1_sha3_224_3690_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3690_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3690 = { .name = "ecdsa_secp224r1_sha3_224_3690", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3690_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3690_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3690_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 336 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3691 for ECDSA, tcId is 337 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3691_pubkey[] = { 0xd3, 0x57, 0x67, 0x4d, 0xa1, 0x66, 0xe0, 0xf4, 0xa0, 0x58, 0x20, 0x3d, 0xf2, 0x3b, 0x8f, 0x8a, 0xda, 0x82, 0x85, 0x80, 0x34, 0x35, 0x5d, 0x23, 0xaf, 0xf5, 0xa8, 0x12, 0xed, 0xf6, 0xd5, 0x26, 0x5e, 0xd4, 0x0b, 0x6d, 0xa2, 0xad, 0xbe, 0x9f, 0x8c, 0xb6, 0x05, 0x0e, 0xbf, 0x61, 0xeb, 0xc0, 0xe5, 0x6a, 0x10, 0xa1, 0xd6, 0xcf, 0x6e, 0x2e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3691_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3691_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3691 = { .name = "ecdsa_secp224r1_sha3_224_3691", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3691_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3691_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3691_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 337 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3692 for ECDSA, tcId is 338 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3692_pubkey[] = { 0x85, 0x67, 0x5f, 0x96, 0x00, 0x9d, 0xdf, 0x74, 0x01, 0x08, 0xf5, 0xbd, 0xb8, 0x25, 0x23, 0xd5, 0x94, 0x14, 0xd3, 0x9b, 0x74, 0xe1, 0x15, 0x70, 0xa6, 0xd0, 0xfa, 0xa3, 0x13, 0xcd, 0x58, 0x41, 0xa8, 0xe2, 0xa3, 0xe3, 0xeb, 0xd0, 0x99, 0xb4, 0x32, 0x05, 0xca, 0x46, 0x66, 0x4a, 0x6e, 0x6c, 0xf1, 0x94, 0x81, 0xe8, 0x55, 0x2f, 0xb4, 0xd8, }; static const unsigned char ecdsa_secp224r1_sha3_224_3692_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3692_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3692 = { .name = "ecdsa_secp224r1_sha3_224_3692", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3692_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3692_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3692_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 338 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3693 for ECDSA, tcId is 339 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3693_pubkey[] = { 0xc1, 0x67, 0x8b, 0xdd, 0xce, 0x5f, 0x00, 0xe4, 0xf4, 0x1e, 0xbc, 0xab, 0x86, 0xf8, 0x01, 0xb4, 0xdc, 0x05, 0x0a, 0x1b, 0x2d, 0xa8, 0xf9, 0x74, 0x7b, 0x5a, 0xbf, 0xc9, 0xf1, 0xcf, 0x0d, 0x67, 0xd9, 0xc9, 0x34, 0x56, 0x98, 0x8a, 0x00, 0x4d, 0xbc, 0xb8, 0xe9, 0x5d, 0x17, 0xdd, 0xe4, 0x07, 0x05, 0x77, 0xe5, 0x1d, 0x88, 0x1d, 0x88, 0x59, }; static const unsigned char ecdsa_secp224r1_sha3_224_3693_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3693_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3693 = { .name = "ecdsa_secp224r1_sha3_224_3693", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3693_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3693_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3693_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 339 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3694 for ECDSA, tcId is 340 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3694_pubkey[] = { 0x09, 0xd2, 0xcf, 0xd5, 0x75, 0x98, 0x6b, 0xfe, 0x1a, 0x74, 0x20, 0xc7, 0xda, 0xbc, 0x04, 0x76, 0xe0, 0xdd, 0x13, 0xe5, 0x4e, 0x01, 0xaa, 0x6f, 0x97, 0xb9, 0xe0, 0x27, 0x46, 0x4b, 0xa5, 0xb8, 0x4c, 0x4d, 0x92, 0xed, 0x9f, 0xdd, 0xd0, 0xbb, 0xcb, 0x23, 0x82, 0xf0, 0xe9, 0xb9, 0xd5, 0xbb, 0x20, 0x1b, 0x2e, 0xa8, 0xeb, 0x8d, 0x3a, 0x50, }; static const unsigned char ecdsa_secp224r1_sha3_224_3694_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3694_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3694 = { .name = "ecdsa_secp224r1_sha3_224_3694", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3694_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3694_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3694_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 340 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3695 for ECDSA, tcId is 341 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3695_pubkey[] = { 0x00, 0x6f, 0xcc, 0x24, 0x43, 0x52, 0x86, 0x9f, 0xeb, 0xdc, 0x74, 0x25, 0x20, 0x4f, 0x7b, 0x29, 0x7c, 0xa8, 0x5d, 0x5b, 0x0d, 0xa8, 0xaa, 0x6f, 0xfe, 0x87, 0x19, 0x80, 0x62, 0xfe, 0xef, 0x58, 0xd8, 0xc5, 0xa8, 0x78, 0xd0, 0x25, 0x5c, 0xd5, 0x47, 0xaf, 0x4f, 0x13, 0x29, 0x06, 0x55, 0x50, 0x17, 0xc3, 0x30, 0x64, 0x8d, 0x5b, 0x1a, 0xe4, }; static const unsigned char ecdsa_secp224r1_sha3_224_3695_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3695_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3695 = { .name = "ecdsa_secp224r1_sha3_224_3695", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3695_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3695_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3695_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 341 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3696 for ECDSA, tcId is 342 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3696_pubkey[] = { 0x01, 0x71, 0xe0, 0x8f, 0x58, 0xfb, 0xf9, 0x81, 0x2a, 0xe3, 0x25, 0x70, 0xc2, 0x10, 0x2e, 0x84, 0x39, 0x68, 0xf5, 0xf3, 0x5c, 0x59, 0x6f, 0xf8, 0x59, 0x1b, 0x03, 0xa6, 0x6c, 0x07, 0xf7, 0x5d, 0x9e, 0xcc, 0x5e, 0x39, 0xdd, 0xa0, 0x90, 0xae, 0x92, 0x15, 0x7e, 0x5d, 0x86, 0xfc, 0xf1, 0xa8, 0xc3, 0x95, 0x49, 0x0a, 0x44, 0x6d, 0xc7, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_224_3696_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3696_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3696 = { .name = "ecdsa_secp224r1_sha3_224_3696", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3696_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3696_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3696_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 342 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3697 for ECDSA, tcId is 343 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3697_pubkey[] = { 0x33, 0x05, 0x86, 0x23, 0x62, 0x57, 0xb3, 0xda, 0xbb, 0x8f, 0xa2, 0x49, 0xfc, 0x6a, 0x65, 0xfe, 0x0f, 0x97, 0xe4, 0xd5, 0x1c, 0x16, 0x20, 0x28, 0xe5, 0x35, 0xb7, 0x4d, 0x20, 0x10, 0x1b, 0xa5, 0xcc, 0x99, 0x67, 0x51, 0x1f, 0x79, 0x4f, 0xa7, 0xc7, 0xf6, 0x11, 0x4d, 0x40, 0xe1, 0x4b, 0x7d, 0xc5, 0x89, 0x14, 0x8b, 0xdb, 0x1c, 0x27, 0x5a, }; static const unsigned char ecdsa_secp224r1_sha3_224_3697_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3697_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3697 = { .name = "ecdsa_secp224r1_sha3_224_3697", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3697_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3697_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3697_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 343 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3698 for ECDSA, tcId is 344 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3698_pubkey[] = { 0x80, 0x44, 0xb7, 0x33, 0x05, 0xe9, 0xf5, 0x90, 0x21, 0xdb, 0xd0, 0xce, 0x46, 0x2d, 0x0d, 0x8a, 0x9b, 0x22, 0xe7, 0x58, 0x87, 0xc5, 0x65, 0x05, 0xc9, 0xc9, 0x4c, 0x2e, 0x62, 0x91, 0xa5, 0xc5, 0x36, 0x4b, 0xad, 0x13, 0x8d, 0x3a, 0xc3, 0xb5, 0x38, 0xf7, 0x7b, 0x26, 0x69, 0x03, 0xbf, 0x71, 0xb6, 0xd4, 0xcc, 0x25, 0xac, 0x0b, 0x6f, 0x12, }; static const unsigned char ecdsa_secp224r1_sha3_224_3698_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3698_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3698 = { .name = "ecdsa_secp224r1_sha3_224_3698", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3698_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3698_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3698_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 344 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3699 for ECDSA, tcId is 345 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3699_pubkey[] = { 0x6f, 0xdb, 0xd4, 0x4d, 0x22, 0x53, 0x2a, 0x88, 0x03, 0x56, 0x8b, 0x51, 0x2f, 0x27, 0xc1, 0x07, 0x57, 0x2a, 0x4f, 0x0e, 0x99, 0xc9, 0x0a, 0xb1, 0x5d, 0x6c, 0x1b, 0xc7, 0x01, 0x4e, 0x59, 0x43, 0xda, 0x51, 0x6a, 0x92, 0xcf, 0x6c, 0xf1, 0xff, 0xb4, 0xf8, 0x59, 0xbc, 0x93, 0xe5, 0xa8, 0xdd, 0x9f, 0x9b, 0x19, 0x06, 0xd6, 0x9a, 0xcd, 0x92, }; static const unsigned char ecdsa_secp224r1_sha3_224_3699_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3699_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3699 = { .name = "ecdsa_secp224r1_sha3_224_3699", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3699_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3699_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3699_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 345 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3700 for ECDSA, tcId is 346 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3700_pubkey[] = { 0x1b, 0x9a, 0x83, 0x8b, 0x88, 0x99, 0xa5, 0xc7, 0xb9, 0xd9, 0x82, 0xbc, 0xc0, 0x80, 0x78, 0x75, 0x21, 0xd8, 0x33, 0x4f, 0xdb, 0xd2, 0xbb, 0x54, 0x4a, 0xb1, 0x0f, 0x46, 0x76, 0x54, 0x8c, 0x21, 0xfd, 0x01, 0x28, 0x75, 0xc5, 0x36, 0x4e, 0x15, 0x52, 0xa0, 0x3a, 0x1e, 0xa2, 0x37, 0xa2, 0xf1, 0xad, 0xaf, 0xe6, 0x27, 0x94, 0x19, 0x87, 0x7d, }; static const unsigned char ecdsa_secp224r1_sha3_224_3700_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3700_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3700 = { .name = "ecdsa_secp224r1_sha3_224_3700", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3700_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3700_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3700_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 346 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3701 for ECDSA, tcId is 347 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3701_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3701_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3701_sig[] = { 0x0e, 0x77, 0xef, 0xeb, 0xda, 0xc8, 0x3c, 0x01, 0xdc, 0xe3, 0xf8, 0xc4, 0x16, 0x2e, 0x28, 0x6b, 0x38, 0xb7, 0xe2, 0x3d, 0xe8, 0x36, 0x37, 0xa7, 0x25, 0x31, 0xea, 0xb7, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3701 = { .name = "ecdsa_secp224r1_sha3_224_3701", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3701_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3701_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3701_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 347 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3702 for ECDSA, tcId is 348 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3702_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_224_3702_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3702_sig[] = { 0xf1, 0x88, 0x10, 0x14, 0x25, 0x37, 0xc3, 0xfe, 0x23, 0x1c, 0x07, 0x3b, 0xe9, 0xd0, 0xee, 0x37, 0xa8, 0x01, 0x0e, 0x00, 0x2b, 0xa6, 0xf1, 0x9e, 0x37, 0x2a, 0x3f, 0x86, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3702 = { .name = "ecdsa_secp224r1_sha3_224_3702", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3702_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3702_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3702_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 348 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3703 for ECDSA, tcId is 349 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3703_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha3_224_3703_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3703_sig[] = { 0x0e, 0x77, 0xef, 0xeb, 0xda, 0xc8, 0x3c, 0x01, 0xdc, 0xe3, 0xf8, 0xc4, 0x16, 0x2e, 0x28, 0x6b, 0x38, 0xb7, 0xe2, 0x3d, 0xe8, 0x36, 0x37, 0xa7, 0x25, 0x31, 0xea, 0xb7, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3703 = { .name = "ecdsa_secp224r1_sha3_224_3703", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3703_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3703_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3703_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 349 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3704 for ECDSA, tcId is 350 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3704_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha3_224_3704_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3704_sig[] = { 0xf1, 0x88, 0x10, 0x14, 0x25, 0x37, 0xc3, 0xfe, 0x23, 0x1c, 0x07, 0x3b, 0xe9, 0xd0, 0xee, 0x37, 0xa8, 0x01, 0x0e, 0x00, 0x2b, 0xa6, 0xf1, 0x9e, 0x37, 0x2a, 0x3f, 0x86, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3704 = { .name = "ecdsa_secp224r1_sha3_224_3704", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3704_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3704_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3704_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 350 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3705 for ECDSA, tcId is 351 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3705_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_224_3705_sig[] = { 0x47, 0x4b, 0x08, 0x6c, 0xf4, 0x75, 0x4c, 0x27, 0x0d, 0x20, 0xf8, 0x8b, 0xe5, 0x69, 0xb7, 0xd7, 0xb6, 0xeb, 0x6e, 0x55, 0xde, 0x6c, 0xe2, 0x13, 0x82, 0x16, 0x0e, 0x81, 0x60, 0x69, 0x2f, 0xdb, 0x35, 0xb4, 0xcb, 0x82, 0x4a, 0x27, 0x29, 0xfb, 0x17, 0x5f, 0x70, 0x9d, 0x06, 0xbc, 0x9f, 0x4e, 0x8b, 0xbb, 0x4b, 0x10, 0x58, 0xc5, 0x37, 0x88, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3705 = { .name = "ecdsa_secp224r1_sha3_224_3705", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3705_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha3_224_3705_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 351 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3706 for ECDSA, tcId is 352 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3706_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_224_3706_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha3_224_3706_sig[] = { 0xdd, 0xe3, 0x59, 0xfe, 0x51, 0xa6, 0xd8, 0xca, 0x9a, 0xec, 0x41, 0xe3, 0x37, 0x6b, 0xd3, 0xe9, 0xff, 0xf8, 0xa4, 0x1a, 0x3e, 0x44, 0xa6, 0x4d, 0xb8, 0x1d, 0x63, 0x26, 0xa1, 0xc2, 0x9d, 0x57, 0x73, 0x09, 0xf7, 0x13, 0x5b, 0x68, 0x8b, 0x19, 0x90, 0x43, 0x3f, 0xb4, 0x5c, 0x5d, 0xc1, 0x7a, 0x02, 0x15, 0x57, 0x27, 0x2c, 0x12, 0x56, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3706 = { .name = "ecdsa_secp224r1_sha3_224_3706", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3706_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3706_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha3_224_3706_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 352 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3707 for ECDSA, tcId is 353 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3707_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_224_3707_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_224_3707_sig[] = { 0x0c, 0xdc, 0x4a, 0x54, 0xa0, 0x91, 0xe6, 0x1e, 0x0f, 0x76, 0x4d, 0xdb, 0x12, 0xff, 0xb2, 0x43, 0xf4, 0x57, 0xad, 0x57, 0x1a, 0x8a, 0xe7, 0x99, 0x9c, 0xaa, 0x0f, 0x06, 0xd5, 0xcd, 0xd5, 0x24, 0xf2, 0x09, 0x2b, 0xcb, 0xe2, 0xfc, 0x7c, 0x32, 0x8b, 0x08, 0x76, 0xd4, 0x36, 0xd9, 0x19, 0x00, 0x58, 0x70, 0x0a, 0xf3, 0x70, 0xda, 0xb0, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3707 = { .name = "ecdsa_secp224r1_sha3_224_3707", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3707_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3707_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_224_3707_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 353 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3708 for ECDSA, tcId is 354 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3708_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_224_3708_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_224_3708_sig[] = { 0x6e, 0xfa, 0x32, 0x45, 0x7e, 0x09, 0xb8, 0xab, 0xe2, 0x21, 0x68, 0x50, 0x1b, 0xc4, 0xae, 0x05, 0x1d, 0x22, 0x94, 0x67, 0x41, 0x14, 0xa9, 0xdc, 0xa9, 0x4c, 0x51, 0xae, 0x31, 0x73, 0xb6, 0x52, 0xc7, 0x83, 0x24, 0xb8, 0x77, 0xdc, 0x5b, 0xdf, 0xe8, 0x03, 0x24, 0xae, 0xb0, 0x1b, 0x17, 0x1f, 0xd2, 0x62, 0x61, 0x24, 0xa4, 0x4f, 0x0b, 0x36, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3708 = { .name = "ecdsa_secp224r1_sha3_224_3708", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3708_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3708_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha3_224_3708_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 354 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3709 for ECDSA, tcId is 355 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3709_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_224_3709_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3709_sig[] = { 0x41, 0xa3, 0xe0, 0x37, 0x0c, 0xf8, 0x14, 0x8b, 0xcc, 0xbd, 0xd0, 0x3a, 0x7e, 0x76, 0x3d, 0x38, 0x26, 0x95, 0x26, 0x3d, 0xa1, 0x1b, 0x94, 0x70, 0xb0, 0xe1, 0x03, 0xd6, 0x87, 0xa6, 0x12, 0x99, 0x0d, 0x0a, 0x4a, 0x9f, 0x81, 0x1e, 0x20, 0xac, 0x52, 0x0a, 0x34, 0x76, 0xd9, 0x18, 0x48, 0x44, 0x4c, 0xcc, 0xc4, 0xc8, 0x13, 0x8a, 0xd5, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3709 = { .name = "ecdsa_secp224r1_sha3_224_3709", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3709_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3709_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3709_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 355 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3710 for ECDSA, tcId is 356 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3710_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_224_3710_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3710_sig[] = { 0x6f, 0x13, 0x85, 0x12, 0xbf, 0x05, 0xad, 0xdb, 0xb5, 0x36, 0xb9, 0x76, 0xb9, 0x12, 0x5e, 0x12, 0x28, 0xf4, 0x3f, 0x32, 0xf7, 0x66, 0x32, 0x5d, 0x1c, 0x27, 0x0e, 0x16, 0x55, 0x62, 0x05, 0x46, 0x4f, 0xf6, 0x5c, 0x9a, 0x5d, 0x4d, 0x94, 0x75, 0x16, 0x70, 0x59, 0x86, 0x38, 0x35, 0x64, 0x4b, 0x06, 0x86, 0x2f, 0x1b, 0x49, 0xcc, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3710 = { .name = "ecdsa_secp224r1_sha3_224_3710", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3710_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3710_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3710_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 356 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3711 for ECDSA, tcId is 357 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3711_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_224_3711_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3711_sig[] = { 0x84, 0x0d, 0xcc, 0xce, 0x17, 0x60, 0xf4, 0x76, 0x24, 0x0b, 0x51, 0x6d, 0x5c, 0xfb, 0xf9, 0xa1, 0x0f, 0xbd, 0x44, 0xb2, 0x5c, 0x68, 0xfd, 0x69, 0xa9, 0x6f, 0x67, 0xa3, 0xb7, 0x98, 0x84, 0xb6, 0x49, 0x5a, 0x1c, 0x65, 0xf0, 0x78, 0x53, 0xfc, 0x5d, 0x56, 0xac, 0x06, 0xb8, 0x43, 0x66, 0xbd, 0xdb, 0x3d, 0xdf, 0x56, 0xb0, 0xfc, 0x93, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3711 = { .name = "ecdsa_secp224r1_sha3_224_3711", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3711_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3711_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3711_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 357 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3712 for ECDSA, tcId is 358 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3712_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_224_3712_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3712_sig[] = { 0x94, 0x9e, 0x76, 0xe0, 0xe3, 0x5b, 0xe5, 0xa0, 0x8f, 0xcb, 0x60, 0xd8, 0xf8, 0x6e, 0xcb, 0x0c, 0x65, 0x0f, 0xc9, 0xb3, 0x7e, 0xcd, 0x61, 0xa0, 0x59, 0x64, 0x93, 0x15, 0xcd, 0x87, 0x09, 0x03, 0xfc, 0x14, 0x37, 0xd5, 0x9e, 0x43, 0xea, 0xde, 0x13, 0x9a, 0xa8, 0xeb, 0x71, 0x70, 0x39, 0xd2, 0xe8, 0xd3, 0x28, 0x2f, 0x27, 0xd4, 0x84, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3712 = { .name = "ecdsa_secp224r1_sha3_224_3712", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3712_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3712_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3712_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 358 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3713 for ECDSA, tcId is 359 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3713_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_224_3713_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3713_sig[] = { 0xa6, 0x36, 0x4e, 0x1e, 0x4d, 0xd4, 0x13, 0x27, 0xb4, 0xf8, 0x8a, 0x99, 0x98, 0x41, 0x2b, 0xf1, 0x68, 0x55, 0x1a, 0xcc, 0x56, 0x13, 0x57, 0xd2, 0xbb, 0xfd, 0x2a, 0xaf, 0xf5, 0xe4, 0x8c, 0xed, 0x76, 0x65, 0x5e, 0xb7, 0x29, 0xf4, 0x37, 0x1d, 0x20, 0xf5, 0xd4, 0xec, 0x53, 0xa2, 0x38, 0x44, 0x31, 0x34, 0x23, 0x06, 0x3b, 0xb8, 0x5f, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3713 = { .name = "ecdsa_secp224r1_sha3_224_3713", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3713_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3713_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3713_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 359 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3714 for ECDSA, tcId is 360 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3714_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_224_3714_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3714_sig[] = { 0xf5, 0x72, 0xbd, 0x06, 0x9f, 0xfe, 0xf7, 0x26, 0x22, 0x2d, 0xb0, 0x33, 0x66, 0x42, 0x05, 0x22, 0x0b, 0xf6, 0x94, 0xf3, 0x74, 0x28, 0x2c, 0x79, 0x59, 0x59, 0x94, 0x5f, 0xca, 0x94, 0x2e, 0xf4, 0xfd, 0x6b, 0xec, 0xd3, 0xbc, 0x4c, 0x32, 0x80, 0xca, 0x29, 0xb8, 0x4c, 0x8d, 0x29, 0x55, 0x5d, 0xda, 0x40, 0x2a, 0x50, 0xaf, 0x1d, 0x76, 0x65, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3714 = { .name = "ecdsa_secp224r1_sha3_224_3714", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3714_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3714_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3714_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 360 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3715 for ECDSA, tcId is 361 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3715_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_224_3715_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3715_sig[] = { 0xe8, 0xb2, 0x94, 0x01, 0xb2, 0x26, 0x88, 0x77, 0x6f, 0x8b, 0x24, 0x95, 0x1f, 0x23, 0x98, 0x93, 0xe1, 0x2d, 0x82, 0x28, 0x68, 0xdb, 0xbe, 0x1f, 0x6b, 0xc8, 0x60, 0xee, 0xbf, 0xef, 0xb3, 0x64, 0x18, 0x75, 0xaa, 0x10, 0xc3, 0xe8, 0x46, 0x86, 0x65, 0x07, 0x16, 0x58, 0xd0, 0xab, 0x31, 0x2c, 0xdf, 0x8f, 0x9a, 0x66, 0x9b, 0xd8, 0x2a, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3715 = { .name = "ecdsa_secp224r1_sha3_224_3715", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3715_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3715_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3715_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 361 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3716 for ECDSA, tcId is 362 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3716_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_224_3716_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3716_sig[] = { 0x29, 0x1d, 0x8c, 0xc8, 0x1f, 0x71, 0x5f, 0xd5, 0x2a, 0x74, 0x16, 0x89, 0x46, 0xed, 0x2b, 0xf2, 0xd6, 0x92, 0xda, 0xe0, 0x95, 0x52, 0x49, 0xe4, 0xcd, 0xad, 0x32, 0x09, 0xef, 0x56, 0xa6, 0x9e, 0xbd, 0x78, 0x12, 0x5a, 0x4c, 0xa1, 0x2b, 0xda, 0xcd, 0x19, 0x3e, 0x21, 0x11, 0xa3, 0x51, 0x58, 0xd5, 0xd7, 0x8b, 0x5d, 0x30, 0x46, 0x0a, 0x34, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3716 = { .name = "ecdsa_secp224r1_sha3_224_3716", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3716_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3716_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3716_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 362 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3717 for ECDSA, tcId is 363 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3717_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_224_3717_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3717_sig[] = { 0xf5, 0x12, 0x3a, 0x9f, 0x92, 0x12, 0xf6, 0x4b, 0x8c, 0x60, 0x7c, 0xfd, 0x5b, 0x04, 0x18, 0xf3, 0x69, 0x4c, 0xe5, 0xef, 0x4d, 0x16, 0x11, 0x86, 0xaf, 0xac, 0x7d, 0x30, 0x44, 0xc4, 0xb5, 0xd7, 0x64, 0x7d, 0xfc, 0x1e, 0xd1, 0x0f, 0x1d, 0x8d, 0x92, 0x83, 0xd4, 0xbc, 0xa6, 0x96, 0x1a, 0x4e, 0xa7, 0x8c, 0xf1, 0xca, 0xd6, 0x32, 0xf9, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3717 = { .name = "ecdsa_secp224r1_sha3_224_3717", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3717_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3717_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3717_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 363 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3718 for ECDSA, tcId is 364 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3718_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_224_3718_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3718_sig[] = { 0x61, 0x19, 0xc7, 0x2d, 0x6d, 0x5f, 0xe7, 0x2d, 0x18, 0x16, 0x14, 0xd3, 0xd4, 0x0b, 0x36, 0xee, 0xc7, 0x56, 0xca, 0x7d, 0x9e, 0x4f, 0x2a, 0xb3, 0x09, 0x5d, 0x52, 0xa4, 0xfb, 0xba, 0xf5, 0xbb, 0x4a, 0x97, 0xb6, 0x09, 0x67, 0x92, 0xf1, 0x7f, 0x95, 0xb1, 0x16, 0xa6, 0x45, 0xfe, 0x1c, 0x62, 0xfa, 0x1d, 0x83, 0xe9, 0x69, 0xc0, 0xe8, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3718 = { .name = "ecdsa_secp224r1_sha3_224_3718", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3718_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3718_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3718_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 364 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3719 for ECDSA, tcId is 365 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3719_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_224_3719_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3719_sig[] = { 0x8c, 0x3d, 0x67, 0x5a, 0x75, 0x9d, 0x30, 0xb8, 0xaf, 0xcb, 0xee, 0x3f, 0x37, 0x74, 0x6c, 0x22, 0x6e, 0xb9, 0x92, 0x17, 0x7f, 0x8d, 0x76, 0xf1, 0x62, 0xd4, 0x09, 0x3e, 0x64, 0x33, 0x22, 0xd3, 0xf3, 0x7b, 0xa5, 0x32, 0xe7, 0xe5, 0xf0, 0xf0, 0xc1, 0x4b, 0x69, 0x1a, 0x36, 0x78, 0x07, 0x5c, 0x03, 0x28, 0x12, 0x03, 0xeb, 0x52, 0x97, 0x45, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3719 = { .name = "ecdsa_secp224r1_sha3_224_3719", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3719_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3719_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3719_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 365 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3720 for ECDSA, tcId is 366 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3720_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_224_3720_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3720_sig[] = { 0xe1, 0xf7, 0xac, 0xc9, 0x6f, 0xd3, 0xea, 0xfc, 0x29, 0x99, 0x11, 0x65, 0x22, 0x3b, 0x0b, 0x89, 0x9c, 0x2b, 0x04, 0xcc, 0x23, 0x93, 0x72, 0xee, 0xf4, 0xd0, 0x60, 0xa5, 0x2a, 0x0b, 0x6f, 0x21, 0x4f, 0xa1, 0x97, 0xcf, 0xbe, 0x83, 0x4a, 0x4f, 0x80, 0xa7, 0x4d, 0xe9, 0x74, 0x8e, 0x62, 0xf2, 0xa8, 0x94, 0x21, 0x4f, 0xe9, 0x2b, 0xde, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3720 = { .name = "ecdsa_secp224r1_sha3_224_3720", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3720_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3720_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3720_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 366 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3721 for ECDSA, tcId is 367 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3721_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3721_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3721_sig[] = { 0xab, 0x49, 0xa9, 0x26, 0x49, 0xa5, 0xb9, 0x5b, 0xee, 0x1a, 0x0e, 0x4d, 0xd8, 0x97, 0xd5, 0xf5, 0xaa, 0xe7, 0x58, 0x1f, 0xaa, 0x41, 0x67, 0x3a, 0xd4, 0xd1, 0x8e, 0xb6, 0x5d, 0xf9, 0xe1, 0xa6, 0x5a, 0xd7, 0x2a, 0x88, 0xf5, 0x8b, 0x0b, 0x71, 0x1e, 0x16, 0x2c, 0x6d, 0xe1, 0x69, 0xad, 0xe7, 0x10, 0x6c, 0x01, 0x57, 0x14, 0x86, 0xc7, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3721 = { .name = "ecdsa_secp224r1_sha3_224_3721", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3721_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3721_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3721_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 367 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3722 for ECDSA, tcId is 368 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3722_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3722_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3722_sig[] = { 0xb3, 0xed, 0xcc, 0x31, 0x6d, 0xd5, 0xcb, 0xe6, 0xcd, 0x00, 0x54, 0xe4, 0x8b, 0xc1, 0xa7, 0x7e, 0x55, 0xcc, 0x4c, 0xf3, 0xdd, 0xdb, 0xf5, 0x52, 0xff, 0xc4, 0xe9, 0x29, 0xcf, 0x4d, 0xe6, 0x54, 0x98, 0x0e, 0x88, 0xf7, 0x90, 0x81, 0x09, 0xc5, 0xf6, 0x37, 0x11, 0x3c, 0xb0, 0x3b, 0xdf, 0x8b, 0xa5, 0x44, 0x3d, 0xda, 0x85, 0x2e, 0x63, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3722 = { .name = "ecdsa_secp224r1_sha3_224_3722", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3722_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3722_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3722_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 368 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3723 for ECDSA, tcId is 369 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3723_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_224_3723_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3723_sig[] = { 0x32, 0x53, 0x8b, 0x93, 0xb7, 0x1e, 0x7e, 0xa2, 0xb3, 0xce, 0xf6, 0x02, 0x72, 0x71, 0xe0, 0x03, 0x7b, 0x84, 0xf3, 0x81, 0x8a, 0x07, 0x27, 0xac, 0xca, 0xae, 0xa6, 0xd9, 0xe6, 0x22, 0x50, 0x61, 0xa7, 0xd7, 0x6b, 0x93, 0xc6, 0x56, 0x2d, 0xe3, 0x1d, 0x50, 0x60, 0x84, 0x44, 0xa5, 0x33, 0xbb, 0x58, 0x53, 0xb8, 0xab, 0x94, 0x16, 0x0f, 0xea, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3723 = { .name = "ecdsa_secp224r1_sha3_224_3723", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3723_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3723_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3723_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 369 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3724 for ECDSA, tcId is 370 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3724_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_224_3724_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3724_sig[] = { 0x84, 0x6e, 0x6b, 0x4a, 0xe0, 0x59, 0xcf, 0x67, 0x3a, 0xc2, 0xf4, 0x24, 0xc0, 0x7b, 0xe6, 0xb6, 0x44, 0x56, 0x55, 0x4e, 0xff, 0xd1, 0x4d, 0x4a, 0x0a, 0x85, 0xd5, 0xd1, 0xc6, 0x73, 0x53, 0xe8, 0x5f, 0xdf, 0xb4, 0x21, 0xfb, 0x3a, 0xbb, 0x01, 0x4f, 0x1d, 0x3d, 0x21, 0xa8, 0xb7, 0x44, 0xba, 0x14, 0x6e, 0x47, 0x09, 0xe7, 0x22, 0xa5, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3724 = { .name = "ecdsa_secp224r1_sha3_224_3724", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3724_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3724_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3724_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 370 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3725 for ECDSA, tcId is 371 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3725_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_224_3725_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3725_sig[] = { 0x95, 0x07, 0x3b, 0xb8, 0x24, 0x19, 0x60, 0x16, 0x09, 0x24, 0x13, 0x63, 0x1d, 0xd4, 0x20, 0x8a, 0x57, 0x17, 0x44, 0xd0, 0x03, 0x0d, 0xd5, 0x43, 0x52, 0x61, 0x19, 0x21, 0x10, 0x0e, 0xf7, 0xac, 0x96, 0x09, 0x37, 0xe7, 0x40, 0xf8, 0x68, 0xbf, 0x9b, 0x37, 0xc6, 0x84, 0x53, 0x17, 0xab, 0x18, 0x65, 0xce, 0x13, 0x88, 0x1c, 0xe5, 0x15, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3725 = { .name = "ecdsa_secp224r1_sha3_224_3725", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3725_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3725_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3725_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 371 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3726 for ECDSA, tcId is 372 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3726_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_224_3726_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3726_sig[] = { 0x31, 0x86, 0xa9, 0x2a, 0xa7, 0x60, 0x96, 0x09, 0x96, 0xae, 0xa1, 0x3f, 0x31, 0x37, 0xac, 0xf0, 0x0b, 0x82, 0xb2, 0xb2, 0x03, 0x6e, 0x60, 0x7e, 0xc9, 0xc4, 0x4b, 0x67, 0x18, 0x35, 0x94, 0x4e, 0x96, 0xb6, 0xca, 0x1f, 0x44, 0x5c, 0xf3, 0x35, 0x0f, 0x10, 0x5a, 0x97, 0xa3, 0x72, 0x52, 0xf8, 0x5c, 0xf6, 0xd8, 0xe6, 0x28, 0xc9, 0x6a, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3726 = { .name = "ecdsa_secp224r1_sha3_224_3726", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3726_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3726_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3726_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 372 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3727 for ECDSA, tcId is 373 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3727_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_224_3727_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3727_sig[] = { 0xcd, 0xb4, 0x3f, 0x06, 0x3e, 0xd3, 0xce, 0x20, 0xf9, 0x4e, 0x45, 0x3d, 0x40, 0xe9, 0xd7, 0xde, 0x39, 0x93, 0x69, 0x06, 0x48, 0x41, 0x14, 0xc3, 0x07, 0x07, 0x8e, 0x22, 0x26, 0xd2, 0x43, 0x6f, 0x2f, 0x66, 0xa9, 0x54, 0x01, 0x0e, 0x58, 0x0b, 0x95, 0xe2, 0x1a, 0x17, 0x4a, 0x4b, 0x66, 0x7a, 0xa8, 0x24, 0x9f, 0x26, 0x76, 0xfe, 0x1b, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3727 = { .name = "ecdsa_secp224r1_sha3_224_3727", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3727_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3727_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3727_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 373 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3728 for ECDSA, tcId is 374 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3728_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_224_3728_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3728_sig[] = { 0xb2, 0x9a, 0x2b, 0xfe, 0x9f, 0xab, 0x39, 0x4b, 0x34, 0x55, 0x04, 0x83, 0xf3, 0xcc, 0x81, 0x1d, 0x9b, 0x86, 0x34, 0x5f, 0x6f, 0x8e, 0x35, 0xd6, 0xa6, 0xbb, 0x0b, 0x34, 0x26, 0x12, 0x0e, 0xa0, 0x6b, 0x19, 0x10, 0xc4, 0x4b, 0xc3, 0x70, 0xcd, 0x04, 0x79, 0xc6, 0xad, 0xdc, 0x5b, 0xce, 0x89, 0x6c, 0x4a, 0x60, 0x68, 0x10, 0x19, 0x4e, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3728 = { .name = "ecdsa_secp224r1_sha3_224_3728", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3728_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3728_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3728_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 374 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3729 for ECDSA, tcId is 375 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3729_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_224_3729_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3729_sig[] = { 0xac, 0x24, 0x7d, 0xff, 0x26, 0x01, 0x61, 0x09, 0xd2, 0x82, 0x00, 0x50, 0x52, 0x70, 0xcf, 0x2d, 0x2c, 0x2b, 0x06, 0x06, 0x7b, 0xd5, 0xd3, 0x30, 0xa1, 0xc2, 0xa4, 0x1a, 0x91, 0x0a, 0x8d, 0x69, 0xda, 0x5d, 0x6a, 0x50, 0x8c, 0x88, 0xaa, 0xd4, 0xf0, 0x91, 0xed, 0x5b, 0x52, 0x86, 0xd0, 0x29, 0xc1, 0x09, 0x5f, 0xc5, 0x7a, 0xf2, 0xa1, 0x06, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3729 = { .name = "ecdsa_secp224r1_sha3_224_3729", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3729_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3729_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3729_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 375 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3730 for ECDSA, tcId is 376 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3730_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3730_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3730_sig[] = { 0xbf, 0xdb, 0xfc, 0xd3, 0xbe, 0xe9, 0x80, 0x3c, 0x50, 0x60, 0xdb, 0xc6, 0x9d, 0x67, 0x49, 0xfb, 0x5e, 0x4d, 0xc4, 0x0a, 0x1c, 0x00, 0x00, 0x2e, 0x0d, 0x23, 0x53, 0x54, 0xa8, 0x4a, 0x6f, 0xf4, 0xc2, 0xef, 0x80, 0xc0, 0x74, 0xc8, 0xa8, 0xa9, 0x30, 0x5e, 0x79, 0xe0, 0xe7, 0x53, 0x21, 0xb9, 0xaf, 0xab, 0x93, 0x48, 0xc0, 0x2a, 0x7e, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3730 = { .name = "ecdsa_secp224r1_sha3_224_3730", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3730_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3730_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3730_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 376 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3731 for ECDSA, tcId is 377 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3731_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3731_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3731_sig[] = { 0x20, 0xfd, 0x72, 0xeb, 0x73, 0xed, 0xda, 0x9c, 0xb0, 0xac, 0xa2, 0x47, 0x3c, 0x5c, 0x58, 0x2c, 0x78, 0x31, 0x8b, 0x07, 0x05, 0xa9, 0xa6, 0xd7, 0x18, 0x0a, 0xc7, 0x67, 0xb0, 0x7a, 0x3e, 0x77, 0x3f, 0xa2, 0x8f, 0x51, 0x32, 0x02, 0xb6, 0x99, 0x03, 0xb5, 0xcc, 0x65, 0xf2, 0xb4, 0xf7, 0x71, 0x4b, 0x5b, 0x28, 0xc8, 0x3b, 0x52, 0xbe, 0xdd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3731 = { .name = "ecdsa_secp224r1_sha3_224_3731", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3731_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3731_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3731_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 377 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3732 for ECDSA, tcId is 378 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3732_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_224_3732_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3732_sig[] = { 0x86, 0xaa, 0x1e, 0xba, 0x72, 0xa1, 0xac, 0xa7, 0xdd, 0x83, 0xcb, 0x2c, 0x26, 0x59, 0x24, 0x1d, 0x12, 0xfd, 0x8a, 0xc1, 0x7c, 0xbd, 0x79, 0x8c, 0xc4, 0x4a, 0xfa, 0xbb, 0x66, 0xe0, 0xa6, 0x6a, 0x78, 0xc6, 0xc3, 0x1c, 0xe9, 0x9e, 0x45, 0x16, 0x2a, 0x0b, 0x47, 0x57, 0xde, 0xff, 0x5e, 0xd8, 0x0b, 0xe8, 0x34, 0x82, 0x83, 0xf1, 0xb7, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3732 = { .name = "ecdsa_secp224r1_sha3_224_3732", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3732_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3732_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3732_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 378 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3733 for ECDSA, tcId is 379 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3733_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_224_3733_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3733_sig[] = { 0x01, 0xcf, 0xaa, 0x7c, 0xca, 0xe0, 0x52, 0x2b, 0x53, 0x63, 0xb4, 0x8a, 0xb1, 0xfa, 0x5e, 0x0e, 0x10, 0x26, 0x66, 0xf2, 0xac, 0x52, 0x18, 0xc5, 0xb3, 0x25, 0x23, 0xd3, 0xa6, 0x14, 0x91, 0xde, 0x2a, 0x4a, 0x05, 0xbd, 0xa0, 0xbf, 0x27, 0x69, 0x45, 0x3f, 0xaa, 0x84, 0x54, 0x51, 0x20, 0x7c, 0x4d, 0xd3, 0xa9, 0x5a, 0xab, 0x16, 0x9b, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3733 = { .name = "ecdsa_secp224r1_sha3_224_3733", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3733_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3733_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3733_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 379 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3734 for ECDSA, tcId is 380 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3734_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_224_3734_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3734_sig[] = { 0x50, 0x0c, 0x9d, 0x08, 0xa0, 0xab, 0x52, 0xd3, 0x5f, 0xe5, 0xcf, 0x9d, 0x4e, 0xdd, 0xea, 0x0e, 0xb8, 0xcc, 0x00, 0xe8, 0xe8, 0xdb, 0x0a, 0x29, 0xa5, 0x12, 0xde, 0x10, 0x48, 0x2d, 0x0f, 0x78, 0xf2, 0x80, 0x8e, 0x83, 0xf1, 0x0b, 0xee, 0x9f, 0xad, 0x61, 0xf4, 0xbd, 0xba, 0x83, 0xab, 0x9a, 0x4f, 0x7d, 0x71, 0xc9, 0xb7, 0x08, 0x3e, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3734 = { .name = "ecdsa_secp224r1_sha3_224_3734", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3734_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3734_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3734_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 380 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3735 for ECDSA, tcId is 381 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3735_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_224_3735_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3735_sig[] = { 0x75, 0xbf, 0x80, 0xb0, 0x60, 0xff, 0x12, 0x3c, 0x0e, 0x52, 0x5c, 0x98, 0xca, 0x74, 0xfa, 0x82, 0xd7, 0x16, 0xa0, 0x9c, 0x21, 0xd6, 0x7a, 0xcc, 0xd3, 0x4a, 0x60, 0xbc, 0xed, 0xa7, 0xa9, 0x64, 0x45, 0x63, 0xa3, 0x49, 0xff, 0x3a, 0x24, 0x83, 0xb6, 0xe7, 0x56, 0x3f, 0x0a, 0xa4, 0xc4, 0xd3, 0x19, 0x55, 0x1c, 0xa0, 0xc3, 0xbd, 0x1f, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3735 = { .name = "ecdsa_secp224r1_sha3_224_3735", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3735_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3735_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3735_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 381 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3736 for ECDSA, tcId is 382 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3736_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_224_3736_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3736_sig[] = { 0x3e, 0xf8, 0x32, 0x67, 0x9f, 0x62, 0x77, 0xb9, 0x01, 0xb6, 0xa9, 0x86, 0x83, 0x3d, 0x03, 0xe4, 0xb5, 0x74, 0xd2, 0x3f, 0xd7, 0x3e, 0xdf, 0xd9, 0x36, 0x68, 0x97, 0x61, 0xe8, 0x2a, 0xf0, 0x5e, 0xba, 0xfe, 0x22, 0xcc, 0xd3, 0x84, 0x33, 0x6c, 0x95, 0x30, 0x73, 0x80, 0x36, 0xd9, 0x9f, 0x17, 0xb6, 0x2e, 0xf3, 0xdf, 0xc4, 0xe0, 0x94, 0x8b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3736 = { .name = "ecdsa_secp224r1_sha3_224_3736", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3736_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3736_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3736_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 382 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3737 for ECDSA, tcId is 383 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3737_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_224_3737_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3737_sig[] = { 0x95, 0x04, 0xb6, 0x24, 0xb1, 0x16, 0xa2, 0xc2, 0x8e, 0xfa, 0x03, 0x7e, 0x35, 0x58, 0x1c, 0x71, 0xb2, 0xe7, 0xd0, 0x1f, 0x30, 0xd8, 0xf6, 0x89, 0x46, 0xc1, 0x3e, 0x88, 0x80, 0x82, 0x63, 0x93, 0x74, 0xa8, 0xd5, 0xe0, 0x67, 0xa6, 0xdf, 0x09, 0xd6, 0xdf, 0x11, 0xa9, 0x72, 0x96, 0x7a, 0x08, 0x1a, 0x53, 0x07, 0xa3, 0xb7, 0xf1, 0x78, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3737 = { .name = "ecdsa_secp224r1_sha3_224_3737", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3737_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3737_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3737_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 383 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3738 for ECDSA, tcId is 384 in file ecdsa_secp224r1_sha3_224_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) static const unsigned char ecdsa_secp224r1_sha3_224_3738_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_224_3738_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_224_3738_sig[] = { 0x2e, 0xb5, 0xdb, 0x8a, 0x9e, 0x1c, 0x82, 0xed, 0x4c, 0xe6, 0x43, 0xc9, 0x53, 0xc9, 0xf1, 0x1c, 0x3d, 0xe2, 0x64, 0xef, 0x92, 0xd7, 0x60, 0x7c, 0x91, 0xdb, 0xce, 0x76, 0xb6, 0xa9, 0x7c, 0x94, 0x3a, 0xa7, 0xa6, 0x2b, 0x57, 0x83, 0x78, 0x63, 0x56, 0xf7, 0xb7, 0x5b, 0x36, 0xb8, 0x83, 0x56, 0xeb, 0x62, 0xd5, 0xa3, 0xd1, 0x5a, 0x70, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_224_3738 = { .name = "ecdsa_secp224r1_sha3_224_3738", .sig_alg = ECDSA, .hash = SHA3_224, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_224_3738_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_224_3738_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_224_3738_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 384 in file ecdsa_secp224r1_sha3_224_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_224) */ /* Test 3739 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3739_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3739_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3739_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x2f, 0x39, 0x64, 0x42, 0x93, 0x2c, 0xb8, 0x0e, 0x2c, 0xca, 0x33, 0x81, 0xeb, 0xf0, 0xd9, 0x75, 0xf3, 0x3f, 0x6d, 0x7b, 0x77, 0xda, 0x96, 0xae, 0xfb, 0xa1, 0x21, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3739 = { .name = "ecdsa_secp224r1_sha3_256_3739", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3739_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3739_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3739_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3740 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3740_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3740_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3740_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3740 = { .name = "ecdsa_secp224r1_sha3_256_3740", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3740_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3740_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3740_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of r misses leading 0, tcId is 2 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3741 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3741_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3741_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3741_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3741 = { .name = "ecdsa_secp224r1_sha3_256_3741", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3741_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3741_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3741_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of s misses leading 0, tcId is 3 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3742 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3742_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3742_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3742_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3742 = { .name = "ecdsa_secp224r1_sha3_256_3742", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3742_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3742_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3742_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 4 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3743 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3743_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3743_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3743_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3743 = { .name = "ecdsa_secp224r1_sha3_256_3743", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3743_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3743_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3743_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 5 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3744 for ECDSA, tcId is 6 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3744_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3744_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3744_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3744 = { .name = "ecdsa_secp224r1_sha3_256_3744", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3744_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3744_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3744_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 6 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3745 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3745_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3745_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3745_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3745 = { .name = "ecdsa_secp224r1_sha3_256_3745", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3745_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3745_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3745_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3746 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3746_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3746_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3746_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3746 = { .name = "ecdsa_secp224r1_sha3_256_3746", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3746_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3746_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3746_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 70 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3747 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3747_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3747_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3747_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3747 = { .name = "ecdsa_secp224r1_sha3_256_3747", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3747_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3747_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3747_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3748 for ECDSA, tcId is 72 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3748_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3748_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3748_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3748 = { .name = "ecdsa_secp224r1_sha3_256_3748", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3748_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3748_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3748_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 72 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3749 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3749_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3749_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3749_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x00, 0x00, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3749 = { .name = "ecdsa_secp224r1_sha3_256_3749", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3749_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3749_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3749_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3750 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3750_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3750_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3750_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3750 = { .name = "ecdsa_secp224r1_sha3_256_3750", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3750_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3750_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3750_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 95 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3751 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3751_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3751_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3751_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3751 = { .name = "ecdsa_secp224r1_sha3_256_3751", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3751_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3751_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3751_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3752 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3752_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3752_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3752_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3752 = { .name = "ecdsa_secp224r1_sha3_256_3752", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3752_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3752_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3752_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 97 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3753 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3753_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3753_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3753_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x05, 0x00, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3753 = { .name = "ecdsa_secp224r1_sha3_256_3753", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3753_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3753_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3753_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3754 for ECDSA, tcId is 100 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3754_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3754_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3754_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3754 = { .name = "ecdsa_secp224r1_sha3_256_3754", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3754_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3754_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3754_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 100 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3755 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3755_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3755_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3755_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3755 = { .name = "ecdsa_secp224r1_sha3_256_3755", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3755_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3755_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3755_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3756 for ECDSA, tcId is 116 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3756_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3756_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3756_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3756 = { .name = "ecdsa_secp224r1_sha3_256_3756", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3756_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3756_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3756_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 116 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3757 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3757_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3757_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3757_sig[] = { 0x02, 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3757 = { .name = "ecdsa_secp224r1_sha3_256_3757", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3757_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3757_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3757_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3758 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3758_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3758_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3758_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x02, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3758 = { .name = "ecdsa_secp224r1_sha3_256_3758", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3758_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3758_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3758_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 120 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3759 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3759_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3759_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3759_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0xe4, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3759 = { .name = "ecdsa_secp224r1_sha3_256_3759", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3759_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3759_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3759_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3760 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3760_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3760_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3760_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0x53, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3760 = { .name = "ecdsa_secp224r1_sha3_256_3760", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3760_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3760_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3760_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 122 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3761 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3761_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3761_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3761_sig[] = { 0x00, 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3761 = { .name = "ecdsa_secp224r1_sha3_256_3761", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3761_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3761_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3761_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3762 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3762_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3762_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3762_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x00, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3762 = { .name = "ecdsa_secp224r1_sha3_256_3762", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3762_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3762_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3762_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3763 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3763_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3763_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3763_sig[] = { 0x00, 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3763 = { .name = "ecdsa_secp224r1_sha3_256_3763", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3763_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3763_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3763_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3764 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3764_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3764_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3764_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x00, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3764 = { .name = "ecdsa_secp224r1_sha3_256_3764", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3764_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3764_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3764_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp224r1_sha3_256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3765 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3765_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3765_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3765_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3765 = { .name = "ecdsa_secp224r1_sha3_256_3765", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3765_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3765_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3765_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3766 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3766_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3766_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3766_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3766 = { .name = "ecdsa_secp224r1_sha3_256_3766", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3766_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3766_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3766_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3767 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3767_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3767_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3767_sig[] = { 0x01, 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xfe, 0xe3, 0xb4, 0xec, 0x7c, 0x59, 0xa4, 0xdd, 0x66, 0xa6, 0x5b, 0x6a, 0xd2, 0x5c, 0xa1, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3767 = { .name = "ecdsa_secp224r1_sha3_256_3767", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3767_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3767_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3767_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3768 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3768_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3768_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3768_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd3, 0x00, 0xb6, 0x6f, 0x2b, 0x0a, 0x79, 0x28, 0xb5, 0xac, 0x53, 0xd0, 0xb2, 0x1a, 0x08, 0x27, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3768 = { .name = "ecdsa_secp224r1_sha3_256_3768", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3768_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3768_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3768_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3769 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3769_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3769_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3769_sig[] = { 0x71, 0x29, 0x96, 0xf5, 0xec, 0xa5, 0x70, 0x6e, 0x73, 0xfa, 0x67, 0x3d, 0x2d, 0x00, 0x32, 0xed, 0xf4, 0x3c, 0x96, 0x99, 0x36, 0x76, 0x82, 0xe9, 0xf1, 0x89, 0xcd, 0x9c, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3769 = { .name = "ecdsa_secp224r1_sha3_256_3769", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3769_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3769_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3769_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3770 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3770_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3770_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3770_sig[] = { 0x71, 0x29, 0x96, 0xf5, 0xec, 0xa5, 0x70, 0x6e, 0x73, 0xfa, 0x67, 0x3d, 0x2c, 0xff, 0x49, 0x90, 0xd4, 0xf5, 0x86, 0xd7, 0x4a, 0x53, 0xac, 0x2f, 0x4d, 0xe5, 0xf7, 0xd9, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3770 = { .name = "ecdsa_secp224r1_sha3_256_3770", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3770_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3770_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3770_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3771 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3771_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3771_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3771_sig[] = { 0xfe, 0x71, 0x29, 0x96, 0xf5, 0xec, 0xa5, 0x70, 0x6e, 0x73, 0xfa, 0x67, 0x3d, 0x2d, 0x01, 0x1c, 0x4b, 0x13, 0x83, 0xa6, 0x5b, 0x22, 0x99, 0x59, 0xa4, 0x95, 0x2d, 0xa3, 0x5f, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3771 = { .name = "ecdsa_secp224r1_sha3_256_3771", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3771_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3771_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3771_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3772 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3772_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3772_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3772_sig[] = { 0x01, 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3772 = { .name = "ecdsa_secp224r1_sha3_256_3772", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3772_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3772_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3772_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3773 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3773_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3773_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3773_sig[] = { 0x71, 0x29, 0x96, 0xf5, 0xec, 0xa5, 0x70, 0x6e, 0x73, 0xfa, 0x67, 0x3d, 0x2d, 0x00, 0x32, 0xed, 0xf4, 0x3c, 0x96, 0x99, 0x36, 0x76, 0x82, 0xe9, 0xf1, 0x89, 0xcd, 0x9c, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3773 = { .name = "ecdsa_secp224r1_sha3_256_3773", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3773_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3773_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3773_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3774 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3774_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3774_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3774_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x01, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0d, 0x53, 0xcf, 0xce, 0x32, 0x73, 0x00, 0xaf, 0xdf, 0xbb, 0xdb, 0xbd, 0x17, 0x33, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3774 = { .name = "ecdsa_secp224r1_sha3_256_3774", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3774_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3774_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3774_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3775 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3775_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3775_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3775_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0f, 0x26, 0x8a, 0x0c, 0xc0, 0x92, 0x84, 0x88, 0x25, 0x69, 0x51, 0x04, 0x5e, 0xde, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3775 = { .name = "ecdsa_secp224r1_sha3_256_3775", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3775_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3775_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3775_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3776 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3776_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3776_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3776_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x2f, 0x39, 0x64, 0x42, 0x93, 0x2c, 0xb8, 0x0e, 0x2c, 0xca, 0x33, 0x81, 0xeb, 0xf1, 0xc2, 0xd3, 0x12, 0x86, 0x7d, 0x3d, 0x63, 0xfd, 0x6d, 0x69, 0x9f, 0x44, 0xf7, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3776 = { .name = "ecdsa_secp224r1_sha3_256_3776", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3776_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3776_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3776_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3777 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3777_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3777_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3777_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0xfe, 0x2f, 0x39, 0x64, 0x42, 0x93, 0x2c, 0xb8, 0x0e, 0x2c, 0xca, 0x33, 0x81, 0xeb, 0xf2, 0xac, 0x30, 0x31, 0xcd, 0x8c, 0xff, 0x50, 0x20, 0x44, 0x24, 0x42, 0xe8, 0xcc, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3777 = { .name = "ecdsa_secp224r1_sha3_256_3777", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3777_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3777_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3777_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3778 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3778_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3778_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3778_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x01, 0xd0, 0xc6, 0x9b, 0xbd, 0x6c, 0xd3, 0x47, 0xf1, 0xd3, 0x35, 0xcc, 0x7e, 0x14, 0x0e, 0x3d, 0x2c, 0xed, 0x79, 0x82, 0xc2, 0x9c, 0x02, 0x92, 0x96, 0x60, 0xbb, 0x08, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3778 = { .name = "ecdsa_secp224r1_sha3_256_3778", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3778_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3778_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3778_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3779 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3779_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3779_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3779_sig[] = { 0x8e, 0xd6, 0x69, 0x0a, 0x13, 0x5a, 0x8f, 0x91, 0x8c, 0x05, 0x98, 0xc2, 0xd2, 0xff, 0xcd, 0x12, 0x0b, 0xc3, 0x69, 0x66, 0xc9, 0x89, 0x7d, 0x16, 0x0e, 0x76, 0x32, 0x64, 0x2f, 0x39, 0x64, 0x42, 0x93, 0x2c, 0xb8, 0x0e, 0x2c, 0xca, 0x33, 0x81, 0xeb, 0xf1, 0xc2, 0xd3, 0x12, 0x86, 0x7d, 0x3d, 0x63, 0xfd, 0x6d, 0x69, 0x9f, 0x44, 0xf7, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3779 = { .name = "ecdsa_secp224r1_sha3_256_3779", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3779_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3779_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3779_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3780 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3780_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3780_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3780_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3780 = { .name = "ecdsa_secp224r1_sha3_256_3780", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3780_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3780_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3780_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3781 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3781_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3781_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3781_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3781 = { .name = "ecdsa_secp224r1_sha3_256_3781", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3781_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3781_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3781_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3782 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3782_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3782_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3782_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3782 = { .name = "ecdsa_secp224r1_sha3_256_3782", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3782_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3782_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3782_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3783 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3783_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3783_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3783_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3783 = { .name = "ecdsa_secp224r1_sha3_256_3783", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3783_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3783_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3783_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3784 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3784_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3784_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3784_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3784 = { .name = "ecdsa_secp224r1_sha3_256_3784", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3784_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3784_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3784_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3785 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3785_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3785_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3785_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3785 = { .name = "ecdsa_secp224r1_sha3_256_3785", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3785_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3785_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3785_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3786 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3786_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3786_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3786_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3786 = { .name = "ecdsa_secp224r1_sha3_256_3786", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3786_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3786_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3786_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3787 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3787_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3787_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3787_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3787 = { .name = "ecdsa_secp224r1_sha3_256_3787", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3787_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3787_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3787_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3788 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3788_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3788_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3788_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3788 = { .name = "ecdsa_secp224r1_sha3_256_3788", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3788_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3788_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3788_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3789 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3789_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3789_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3789_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3789 = { .name = "ecdsa_secp224r1_sha3_256_3789", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3789_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3789_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3789_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3790 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3790_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3790_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3790_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3790 = { .name = "ecdsa_secp224r1_sha3_256_3790", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3790_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3790_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3790_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3791 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3791_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3791_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3791_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3791 = { .name = "ecdsa_secp224r1_sha3_256_3791", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3791_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3791_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3791_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3792 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3792_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3792_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3792_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3792 = { .name = "ecdsa_secp224r1_sha3_256_3792", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3792_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3792_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3792_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3793 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3793_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3793_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3793_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3793 = { .name = "ecdsa_secp224r1_sha3_256_3793", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3793_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3793_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3793_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3794 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3794_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3794_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3794_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3794 = { .name = "ecdsa_secp224r1_sha3_256_3794", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3794_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3794_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3794_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3795 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3795_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3795_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3795_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3795 = { .name = "ecdsa_secp224r1_sha3_256_3795", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3795_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3795_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3795_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3796 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3796_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3796_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3796_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3796 = { .name = "ecdsa_secp224r1_sha3_256_3796", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3796_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3796_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3796_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3797 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3797_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3797_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3797_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3797 = { .name = "ecdsa_secp224r1_sha3_256_3797", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3797_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3797_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3797_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3798 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3798_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3798_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3798_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3798 = { .name = "ecdsa_secp224r1_sha3_256_3798", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3798_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3798_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3798_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3799 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3799_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3799_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3799_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3799 = { .name = "ecdsa_secp224r1_sha3_256_3799", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3799_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3799_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3799_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3800 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3800_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3800_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3800_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3800 = { .name = "ecdsa_secp224r1_sha3_256_3800", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3800_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3800_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3800_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3801 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3801_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3801_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3801_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3801 = { .name = "ecdsa_secp224r1_sha3_256_3801", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3801_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3801_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3801_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3802 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3802_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3802_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3802_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3802 = { .name = "ecdsa_secp224r1_sha3_256_3802", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3802_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3802_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3802_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3803 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3803_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3803_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3803_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3803 = { .name = "ecdsa_secp224r1_sha3_256_3803", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3803_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3803_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3803_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3804 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3804_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3804_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3804_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3804 = { .name = "ecdsa_secp224r1_sha3_256_3804", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3804_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3804_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3804_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3805 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3805_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3805_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3805_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3805 = { .name = "ecdsa_secp224r1_sha3_256_3805", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3805_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3805_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3805_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3806 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3806_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3806_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3806_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3806 = { .name = "ecdsa_secp224r1_sha3_256_3806", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3806_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3806_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3806_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3807 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3807_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3807_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3807_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3807 = { .name = "ecdsa_secp224r1_sha3_256_3807", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3807_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3807_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3807_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3808 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3808_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3808_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3808_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3808 = { .name = "ecdsa_secp224r1_sha3_256_3808", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3808_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3808_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3808_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3809 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3809_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3809_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3809_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3809 = { .name = "ecdsa_secp224r1_sha3_256_3809", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3809_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3809_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3809_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3810 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3810_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3810_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3810_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3810 = { .name = "ecdsa_secp224r1_sha3_256_3810", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3810_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3810_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3810_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3811 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3811_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3811_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3811_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3811 = { .name = "ecdsa_secp224r1_sha3_256_3811", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3811_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3811_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3811_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3812 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3812_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3812_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3812_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3812 = { .name = "ecdsa_secp224r1_sha3_256_3812", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3812_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3812_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3812_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3813 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3813_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3813_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3813_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3813 = { .name = "ecdsa_secp224r1_sha3_256_3813", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3813_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3813_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3813_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3814 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3814_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3814_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3814_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3814 = { .name = "ecdsa_secp224r1_sha3_256_3814", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3814_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3814_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3814_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3815 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3815_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3815_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3815_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3815 = { .name = "ecdsa_secp224r1_sha3_256_3815", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3815_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3815_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3815_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3816 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3816_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3816_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3816_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3816 = { .name = "ecdsa_secp224r1_sha3_256_3816", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3816_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3816_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3816_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3817 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3817_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3817_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3817_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3817 = { .name = "ecdsa_secp224r1_sha3_256_3817", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3817_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3817_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3817_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3818 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3818_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3818_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3818_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3818 = { .name = "ecdsa_secp224r1_sha3_256_3818", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3818_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3818_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3818_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3819 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3819_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3819_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3819_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3819 = { .name = "ecdsa_secp224r1_sha3_256_3819", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3819_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3819_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3819_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3820 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3820_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3820_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3820_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3820 = { .name = "ecdsa_secp224r1_sha3_256_3820", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3820_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3820_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3820_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3821 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3821_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3821_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3821_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3821 = { .name = "ecdsa_secp224r1_sha3_256_3821", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3821_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3821_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3821_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3822 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3822_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3822_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3822_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3822 = { .name = "ecdsa_secp224r1_sha3_256_3822", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3822_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3822_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3822_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3823 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3823_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3823_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3823_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3823 = { .name = "ecdsa_secp224r1_sha3_256_3823", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3823_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3823_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3823_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3824 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3824_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3824_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3824_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3824 = { .name = "ecdsa_secp224r1_sha3_256_3824", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3824_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3824_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3824_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3825 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3825_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3825_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3825_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3825 = { .name = "ecdsa_secp224r1_sha3_256_3825", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3825_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3825_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3825_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3826 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3826_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3826_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3826_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3826 = { .name = "ecdsa_secp224r1_sha3_256_3826", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3826_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3826_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3826_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3827 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3827_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3827_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3827_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3827 = { .name = "ecdsa_secp224r1_sha3_256_3827", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3827_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3827_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3827_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3828 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3828_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3828_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3828_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3828 = { .name = "ecdsa_secp224r1_sha3_256_3828", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3828_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3828_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3828_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3829 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3829_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3829_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3829_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3829 = { .name = "ecdsa_secp224r1_sha3_256_3829", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3829_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3829_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3829_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3830 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3830_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3830_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3830_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3830 = { .name = "ecdsa_secp224r1_sha3_256_3830", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3830_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3830_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3830_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3831 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3831_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3831_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3831_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3831 = { .name = "ecdsa_secp224r1_sha3_256_3831", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3831_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3831_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3831_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3832 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3832_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3832_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3832_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3832 = { .name = "ecdsa_secp224r1_sha3_256_3832", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3832_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3832_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3832_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3833 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3833_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3833_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3833_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3833 = { .name = "ecdsa_secp224r1_sha3_256_3833", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3833_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3833_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3833_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3834 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3834_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3834_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3834_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3834 = { .name = "ecdsa_secp224r1_sha3_256_3834", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3834_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3834_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3834_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3835 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3835_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3835_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3835_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3835 = { .name = "ecdsa_secp224r1_sha3_256_3835", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3835_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3835_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3835_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3836 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3836_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3836_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3836_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3836 = { .name = "ecdsa_secp224r1_sha3_256_3836", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3836_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3836_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3836_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3837 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3837_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3837_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3837_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3837 = { .name = "ecdsa_secp224r1_sha3_256_3837", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3837_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3837_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3837_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3838 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3838_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3838_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3838_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3838 = { .name = "ecdsa_secp224r1_sha3_256_3838", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3838_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3838_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3838_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3839 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3839_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3839_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3839_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3839 = { .name = "ecdsa_secp224r1_sha3_256_3839", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3839_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3839_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3839_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3840 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3840_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3840_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3840_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3840 = { .name = "ecdsa_secp224r1_sha3_256_3840", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3840_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3840_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3840_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3841 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3841_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3841_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3841_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3841 = { .name = "ecdsa_secp224r1_sha3_256_3841", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3841_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3841_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3841_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3842 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3842_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3842_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3842_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3842 = { .name = "ecdsa_secp224r1_sha3_256_3842", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3842_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3842_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3842_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3843 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3843_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3843_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3843_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3843 = { .name = "ecdsa_secp224r1_sha3_256_3843", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3843_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3843_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3843_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3844 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3844_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3844_msg[] = { 0x36, 0x33, 0x31, 0x33, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_256_3844_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x7e, 0xb5, 0xce, 0xa4, 0xbd, 0xa6, 0x7e, 0xb1, 0x7c, 0x42, 0xfd, 0x9e, 0x4e, 0xf8, 0xfc, 0x07, 0xa3, 0x86, 0xc4, 0xd3, 0x8b, 0x8e, 0x3f, 0xd7, 0xac, 0x14, 0xe6, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3844 = { .name = "ecdsa_secp224r1_sha3_256_3844", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3844_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3844_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha3_256_3844_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3845 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3845_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3845_msg[] = { 0x33, 0x31, 0x39, 0x30, 0x39, 0x34, 0x33, 0x32, 0x38, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3845_sig[] = { 0xce, 0x9c, 0x8f, 0x26, 0x2a, 0x8f, 0xcf, 0xbf, 0xf2, 0x6a, 0x2e, 0xd5, 0x61, 0x56, 0xdd, 0x7f, 0xa0, 0x0d, 0xf1, 0xb8, 0xdd, 0x78, 0xf2, 0x85, 0x22, 0xf9, 0x59, 0x9f, 0x3f, 0x8b, 0x90, 0x75, 0x86, 0x50, 0x03, 0x1a, 0xc9, 0x43, 0xb6, 0xe8, 0x9a, 0x2d, 0x40, 0x1c, 0x03, 0xa4, 0x84, 0x5f, 0x48, 0x25, 0x38, 0x5e, 0xdb, 0x0b, 0x99, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3845 = { .name = "ecdsa_secp224r1_sha3_256_3845", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3845_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3845_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3845_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3846 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3846_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3846_msg[] = { 0x38, 0x34, 0x33, 0x34, 0x37, 0x34, 0x31, 0x35, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3846_sig[] = { 0xa5, 0x96, 0xc7, 0x10, 0x49, 0x2f, 0x86, 0xb3, 0x1d, 0x7c, 0x30, 0x31, 0xdd, 0xff, 0xa4, 0x1e, 0xb6, 0xec, 0xd0, 0xd2, 0x55, 0x27, 0x27, 0x77, 0x76, 0x5d, 0x96, 0x5c, 0xbc, 0x0e, 0x0d, 0x13, 0x4f, 0x35, 0x90, 0x88, 0x43, 0x8f, 0x9d, 0x48, 0x65, 0x18, 0x4a, 0x91, 0x34, 0xb2, 0x2d, 0xc9, 0x30, 0xa3, 0x2d, 0xf3, 0x17, 0xcd, 0x2d, 0xad, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3846 = { .name = "ecdsa_secp224r1_sha3_256_3846", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3846_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3846_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3846_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3847 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3847_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3847_msg[] = { 0x33, 0x35, 0x37, 0x32, 0x36, 0x39, 0x36, 0x38, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3847_sig[] = { 0x44, 0xbf, 0x0e, 0x8e, 0xf3, 0x1a, 0xdc, 0xf9, 0x35, 0xbf, 0xdb, 0xdb, 0xff, 0xb8, 0x48, 0x16, 0x0e, 0xf5, 0xd5, 0xf9, 0x79, 0x73, 0x30, 0x35, 0x03, 0xae, 0x43, 0xc6, 0x58, 0x19, 0x41, 0x09, 0x10, 0x11, 0x07, 0xd0, 0x61, 0x57, 0x5d, 0x48, 0xae, 0xfb, 0x87, 0x91, 0xda, 0x1a, 0xec, 0xa9, 0x21, 0x4f, 0xcc, 0x4b, 0xf9, 0xb6, 0x0d, 0xec, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3847 = { .name = "ecdsa_secp224r1_sha3_256_3847", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3847_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3847_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3847_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3848 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3848_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3848_msg[] = { 0x35, 0x39, 0x31, 0x38, 0x33, 0x33, 0x34, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3848_sig[] = { 0xbc, 0xc5, 0x6b, 0x38, 0xd6, 0xa7, 0xb2, 0x27, 0xa0, 0x0f, 0x23, 0x5f, 0x0a, 0xee, 0xf3, 0xeb, 0xf8, 0x46, 0xcc, 0xa2, 0xdb, 0x14, 0xc2, 0x90, 0x27, 0x33, 0x9f, 0xc4, 0x43, 0x55, 0x86, 0x3f, 0xcc, 0x75, 0xf2, 0x46, 0xf2, 0x13, 0xa9, 0xb4, 0x86, 0x7d, 0xeb, 0x2a, 0x7f, 0xac, 0xe8, 0xcd, 0xf5, 0xdf, 0xbb, 0xe4, 0x3f, 0x8a, 0xc3, 0x1a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3848 = { .name = "ecdsa_secp224r1_sha3_256_3848", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3848_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3848_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3848_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3849 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3849_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3849_msg[] = { 0x38, 0x32, 0x35, 0x33, 0x30, 0x38, 0x32, 0x32, 0x35, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3849_sig[] = { 0x6e, 0xe3, 0xc0, 0xf0, 0x2d, 0xbb, 0x1c, 0x59, 0x91, 0xfe, 0x89, 0x7f, 0x85, 0x34, 0xbc, 0x9b, 0xa3, 0x9e, 0x3c, 0x4a, 0x5c, 0x31, 0xd2, 0x32, 0x6c, 0xeb, 0xfb, 0x1c, 0xe8, 0x5b, 0x88, 0xcc, 0x3b, 0x25, 0xe3, 0xf6, 0xc9, 0x05, 0x29, 0x93, 0xd3, 0xb4, 0x3f, 0xb1, 0xe0, 0xd3, 0x68, 0x40, 0xc6, 0x4f, 0xbf, 0xb0, 0xb9, 0x79, 0xf7, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3849 = { .name = "ecdsa_secp224r1_sha3_256_3849", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3849_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3849_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3849_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3850 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3850_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3850_msg[] = { 0x31, 0x33, 0x37, 0x33, 0x34, 0x38, 0x32, 0x38, 0x31, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_256_3850_sig[] = { 0x21, 0xdd, 0x71, 0xac, 0x10, 0x88, 0x1e, 0xa8, 0x82, 0x96, 0x39, 0x5a, 0xb8, 0xef, 0xbe, 0x82, 0x2c, 0x08, 0x1b, 0x5a, 0x6d, 0x44, 0x8e, 0x6e, 0x5d, 0x6d, 0xe9, 0x17, 0x3b, 0x90, 0x6e, 0x29, 0x10, 0xac, 0x30, 0x7a, 0x54, 0x5c, 0x7c, 0x5e, 0x5a, 0x41, 0x55, 0x63, 0x1b, 0xe6, 0xde, 0xd9, 0xda, 0x87, 0x19, 0xf4, 0x59, 0x0b, 0x5d, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3850 = { .name = "ecdsa_secp224r1_sha3_256_3850", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3850_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3850_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3850_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3851 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3851_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3851_msg[] = { 0x31, 0x37, 0x33, 0x38, 0x31, 0x35, 0x36, 0x34, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3851_sig[] = { 0x3c, 0x8d, 0xd1, 0xc1, 0xda, 0x01, 0xca, 0x77, 0x93, 0x89, 0x0c, 0xec, 0xf9, 0x67, 0xae, 0xf7, 0xb3, 0x19, 0x9b, 0xe8, 0x99, 0x73, 0xf4, 0x0f, 0x13, 0x2f, 0x47, 0xcc, 0x70, 0x30, 0xa2, 0xaf, 0xbf, 0x16, 0xe0, 0x20, 0x0c, 0x9b, 0x5d, 0x91, 0x04, 0x00, 0x98, 0x81, 0xb5, 0x66, 0x7f, 0x5c, 0x99, 0x1c, 0x31, 0x50, 0xd5, 0xec, 0x09, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3851 = { .name = "ecdsa_secp224r1_sha3_256_3851", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3851_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3851_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3851_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3852 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3852_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3852_msg[] = { 0x32, 0x35, 0x35, 0x33, 0x34, 0x36, 0x36, 0x35, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3852_sig[] = { 0x1b, 0xb5, 0x38, 0xff, 0xd4, 0x9b, 0x56, 0x62, 0x03, 0xb3, 0x39, 0x01, 0x86, 0xd4, 0x10, 0x52, 0xe2, 0x15, 0x8b, 0xd8, 0xca, 0xbc, 0xe4, 0x82, 0xe2, 0xbd, 0x9c, 0xfd, 0x26, 0x21, 0xfe, 0x8a, 0x3e, 0xbd, 0x93, 0x98, 0x2e, 0x7a, 0xd1, 0xf8, 0x76, 0xe3, 0x54, 0xa5, 0x68, 0x09, 0xf8, 0xcd, 0xaf, 0x72, 0x89, 0xc2, 0x47, 0xa9, 0x35, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3852 = { .name = "ecdsa_secp224r1_sha3_256_3852", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3852_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3852_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3852_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3853 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3853_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3853_msg[] = { 0x32, 0x31, 0x38, 0x33, 0x30, 0x33, 0x39, 0x31, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_256_3853_sig[] = { 0x0b, 0x6b, 0x55, 0x78, 0x39, 0x57, 0x38, 0x45, 0x1e, 0x59, 0xbc, 0x46, 0x1b, 0xfc, 0x55, 0x8b, 0x0f, 0xfa, 0xdc, 0x75, 0x04, 0x5c, 0x42, 0x98, 0xb0, 0x0f, 0x95, 0x39, 0x00, 0x31, 0x47, 0xe9, 0xcd, 0xce, 0x81, 0x80, 0x9e, 0x25, 0xb1, 0x05, 0x31, 0xc5, 0x9a, 0xe3, 0xf2, 0x25, 0xc7, 0xa7, 0x68, 0x1f, 0xf5, 0x13, 0x5c, 0xf3, 0x17, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3853 = { .name = "ecdsa_secp224r1_sha3_256_3853", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3853_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3853_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3853_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3854 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3854_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3854_msg[] = { 0x31, 0x30, 0x35, 0x32, 0x36, 0x31, 0x37, 0x36, 0x35, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3854_sig[] = { 0xcd, 0xe6, 0x75, 0x78, 0xf4, 0x66, 0x67, 0x89, 0xa8, 0xb7, 0x78, 0x12, 0xca, 0x4c, 0x05, 0x7f, 0xee, 0xe8, 0xb7, 0xcb, 0x2a, 0xc6, 0x7e, 0x03, 0x82, 0x92, 0xc2, 0x72, 0xdc, 0x2d, 0xad, 0x51, 0x33, 0xd0, 0xde, 0x4d, 0x1d, 0x5f, 0x4e, 0x66, 0xc1, 0x26, 0x41, 0xb0, 0xd0, 0x36, 0x05, 0x83, 0x82, 0x23, 0x7d, 0xa8, 0xc0, 0x25, 0x70, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3854 = { .name = "ecdsa_secp224r1_sha3_256_3854", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3854_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3854_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3854_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3855 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3855_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3855_msg[] = { 0x32, 0x35, 0x30, 0x31, 0x35, 0x33, 0x39, 0x39, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3855_sig[] = { 0xfd, 0xae, 0x74, 0xf7, 0x61, 0x8e, 0x26, 0xdc, 0xae, 0xa2, 0x3d, 0x96, 0xaa, 0x50, 0xbf, 0x31, 0x32, 0xe2, 0xad, 0xa0, 0xba, 0x51, 0x9b, 0x0c, 0xca, 0x94, 0xe4, 0x77, 0xd8, 0x4f, 0xd4, 0x43, 0x84, 0x76, 0xfd, 0x42, 0xfa, 0x02, 0xb5, 0x10, 0xa8, 0x8b, 0x8d, 0x66, 0xbd, 0x02, 0x3c, 0x50, 0x80, 0xa5, 0x4d, 0xe3, 0xd3, 0xc8, 0xfc, 0x8b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3855 = { .name = "ecdsa_secp224r1_sha3_256_3855", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3855_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3855_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3855_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3856 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3856_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3856_msg[] = { 0x31, 0x34, 0x39, 0x35, 0x33, 0x31, 0x36, 0x34, 0x36, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3856_sig[] = { 0x3a, 0x9c, 0x36, 0x46, 0xb7, 0xaf, 0x34, 0xc5, 0x02, 0x28, 0x4e, 0xf0, 0x07, 0x02, 0x87, 0x67, 0x2d, 0xd2, 0xb5, 0x9e, 0x2e, 0x60, 0xf7, 0x27, 0x2d, 0x50, 0x09, 0x5c, 0x56, 0x12, 0x25, 0xad, 0xdb, 0xaa, 0xb4, 0xb7, 0xbc, 0xeb, 0xa2, 0x48, 0xb0, 0x6d, 0xd4, 0x62, 0x77, 0x9b, 0xf1, 0xee, 0x31, 0x98, 0xc2, 0xea, 0x41, 0x7e, 0xa4, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3856 = { .name = "ecdsa_secp224r1_sha3_256_3856", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3856_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3856_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3856_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3857 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3857_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3857_msg[] = { 0x32, 0x30, 0x36, 0x33, 0x38, 0x35, 0x32, 0x39, 0x30, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3857_sig[] = { 0xc4, 0xd9, 0x1e, 0x54, 0x6a, 0xc9, 0xda, 0xb2, 0xcc, 0xec, 0xe1, 0x8c, 0x49, 0x39, 0x8d, 0x63, 0x42, 0xc0, 0x12, 0x31, 0x49, 0xb5, 0x98, 0xdb, 0x90, 0x05, 0x32, 0x0d, 0x95, 0x5a, 0xda, 0x4c, 0xbd, 0x17, 0xe4, 0x97, 0x54, 0x67, 0x63, 0x3f, 0xff, 0xb2, 0x32, 0x1f, 0x5b, 0x4a, 0xcb, 0x23, 0xf4, 0xb3, 0x02, 0x1a, 0x06, 0x32, 0x87, 0xf8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3857 = { .name = "ecdsa_secp224r1_sha3_256_3857", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3857_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3857_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3857_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3858 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3858_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3858_msg[] = { 0x37, 0x38, 0x33, 0x39, 0x37, 0x36, 0x34, 0x39, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_256_3858_sig[] = { 0x2f, 0xfe, 0xc2, 0x69, 0x7a, 0x93, 0xf0, 0xc4, 0xc5, 0xa4, 0x8b, 0xec, 0x8b, 0x15, 0xda, 0xd3, 0x27, 0xb1, 0xb7, 0x00, 0x17, 0xe6, 0x92, 0x5f, 0xa7, 0x6b, 0x68, 0x3b, 0x20, 0x5d, 0xba, 0xc5, 0x88, 0xca, 0xe4, 0xf0, 0xed, 0x3b, 0x8c, 0x7b, 0x41, 0x01, 0x39, 0x9c, 0xe1, 0x83, 0xd3, 0x82, 0x11, 0xed, 0x22, 0x30, 0x6d, 0x0c, 0xda, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3858 = { .name = "ecdsa_secp224r1_sha3_256_3858", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3858_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3858_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3858_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3859 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3859_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3859_msg[] = { 0x32, 0x31, 0x32, 0x39, 0x32, 0x36, 0x34, 0x34, 0x36, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3859_sig[] = { 0xfe, 0xc1, 0x50, 0x67, 0xa7, 0x8c, 0xa6, 0x43, 0xa5, 0x3f, 0x82, 0x7f, 0x56, 0xa8, 0x48, 0x2c, 0x59, 0xd7, 0xe0, 0xad, 0x38, 0xb0, 0x73, 0x21, 0xd6, 0xfa, 0x9f, 0xe9, 0x3c, 0xe7, 0xe4, 0x5b, 0x31, 0x39, 0x0e, 0x02, 0x6b, 0x48, 0x56, 0x64, 0xcb, 0xf6, 0x4e, 0x39, 0xb1, 0x97, 0x03, 0xc8, 0xef, 0x7b, 0x0f, 0x2d, 0x61, 0xbf, 0xe6, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3859 = { .name = "ecdsa_secp224r1_sha3_256_3859", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3859_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3859_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3859_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3860 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3860_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3860_msg[] = { 0x34, 0x38, 0x33, 0x32, 0x30, 0x34, 0x32, 0x36, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_256_3860_sig[] = { 0xd5, 0x76, 0x68, 0x67, 0x9c, 0x06, 0xd0, 0x0d, 0xb1, 0x12, 0xeb, 0xfd, 0x27, 0x3f, 0x6a, 0xa5, 0x67, 0x01, 0xb2, 0x00, 0x8d, 0x77, 0x28, 0x4f, 0x30, 0x52, 0x01, 0xcb, 0x21, 0xca, 0xcc, 0x0f, 0x29, 0x00, 0xde, 0xbc, 0x99, 0x0c, 0xf2, 0xaa, 0x52, 0xc6, 0x7b, 0xb7, 0xa9, 0xd1, 0x83, 0xf3, 0x31, 0xa3, 0xb9, 0x84, 0xd6, 0x3a, 0x15, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3860 = { .name = "ecdsa_secp224r1_sha3_256_3860", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3860_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3860_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3860_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3861 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3861_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3861_msg[] = { 0x33, 0x36, 0x35, 0x32, 0x32, 0x31, 0x38, 0x31, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3861_sig[] = { 0xc3, 0xc5, 0x26, 0x0b, 0xed, 0x20, 0x28, 0x99, 0x07, 0xb8, 0xb4, 0xfb, 0x6b, 0xd7, 0xfe, 0x69, 0xc2, 0x57, 0xfe, 0x50, 0xfa, 0x84, 0xaa, 0xea, 0x7e, 0xc1, 0xac, 0x0e, 0x38, 0xeb, 0x78, 0xdc, 0x31, 0x76, 0x6a, 0x1b, 0x03, 0x8e, 0x81, 0x1d, 0xbe, 0x6b, 0x80, 0x68, 0x3d, 0xb5, 0xc0, 0x6c, 0x7d, 0x46, 0x6b, 0x6f, 0x1b, 0xd4, 0x4f, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3861 = { .name = "ecdsa_secp224r1_sha3_256_3861", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3861_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3861_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3861_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3862 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3862_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3862_msg[] = { 0x32, 0x34, 0x39, 0x31, 0x37, 0x31, 0x32, 0x36, 0x39, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3862_sig[] = { 0x33, 0xef, 0xa9, 0x10, 0x52, 0xf2, 0xa8, 0x9d, 0xaf, 0xd2, 0xb0, 0x6c, 0xfa, 0x28, 0xb0, 0xc8, 0x24, 0x3e, 0x3c, 0xac, 0x82, 0x46, 0xc1, 0xae, 0xa3, 0xcf, 0x4e, 0x60, 0x41, 0xf9, 0x64, 0x71, 0x5d, 0xd5, 0x54, 0x18, 0xa5, 0x74, 0x6f, 0x91, 0xec, 0xff, 0x15, 0xb7, 0xc6, 0x16, 0x3f, 0xb9, 0x4c, 0x18, 0x97, 0x9c, 0xf6, 0x93, 0xc2, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3862 = { .name = "ecdsa_secp224r1_sha3_256_3862", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3862_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3862_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3862_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3863 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3863_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3863_msg[] = { 0x32, 0x36, 0x32, 0x32, 0x37, 0x39, 0x30, 0x37, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3863_sig[] = { 0x85, 0x61, 0x8a, 0xc1, 0x65, 0xd6, 0xf8, 0x79, 0xfd, 0x4f, 0x77, 0x1c, 0x5f, 0x1a, 0x88, 0x01, 0x9b, 0x04, 0x05, 0x2c, 0x5f, 0x94, 0x0b, 0xa0, 0x52, 0xa5, 0x41, 0xa5, 0x66, 0x40, 0xf1, 0xb8, 0xdb, 0x13, 0x7e, 0x51, 0x6f, 0x40, 0x5b, 0x64, 0xaa, 0x09, 0xd3, 0x1e, 0x8c, 0x1d, 0xc9, 0xac, 0x4d, 0x5a, 0xba, 0xb6, 0xf9, 0xf8, 0x76, 0x0a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3863 = { .name = "ecdsa_secp224r1_sha3_256_3863", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3863_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3863_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3863_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3864 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3864_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3864_msg[] = { 0x31, 0x30, 0x31, 0x32, 0x35, 0x37, 0x37, 0x32, 0x38, 0x39, 0x32, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_256_3864_sig[] = { 0x9d, 0x18, 0x73, 0xa0, 0x53, 0xa2, 0x80, 0xbd, 0x69, 0x86, 0x65, 0xab, 0x4d, 0xd0, 0x87, 0xbe, 0x30, 0x80, 0xc2, 0xc3, 0xc3, 0xb9, 0xa2, 0xd7, 0x28, 0xcc, 0x07, 0x04, 0x73, 0x42, 0x10, 0xe8, 0x41, 0x6e, 0x08, 0xfd, 0xcb, 0xb3, 0x25, 0x1f, 0x38, 0x39, 0x28, 0x97, 0x64, 0x43, 0xc5, 0x59, 0xf5, 0x0e, 0x71, 0x64, 0xf0, 0x84, 0xc8, 0x07, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3864 = { .name = "ecdsa_secp224r1_sha3_256_3864", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3864_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3864_msg, .msglen = 12, .sig = ecdsa_secp224r1_sha3_256_3864_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3865 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3865_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3865_msg[] = { 0x31, 0x30, 0x35, 0x30, 0x38, 0x37, 0x32, 0x32, 0x30, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_256_3865_sig[] = { 0xab, 0x1f, 0xa9, 0xdd, 0xd8, 0xf1, 0x67, 0x98, 0xfd, 0x01, 0x52, 0x51, 0xfd, 0x71, 0xa4, 0xad, 0xd9, 0x62, 0xaf, 0xb6, 0xf0, 0x1b, 0x00, 0xf9, 0x1e, 0x42, 0x35, 0x2c, 0x9d, 0x71, 0xb1, 0x1f, 0xe1, 0xa0, 0x62, 0x8c, 0x01, 0x2c, 0xdd, 0x93, 0x8e, 0x83, 0x8a, 0xcb, 0xf2, 0x2a, 0xeb, 0xd6, 0x4c, 0x1d, 0xa0, 0x1d, 0x5b, 0x2f, 0xbf, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3865 = { .name = "ecdsa_secp224r1_sha3_256_3865", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3865_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3865_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3865_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3866 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3866_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3866_msg[] = { 0x32, 0x35, 0x30, 0x37, 0x37, 0x32, 0x37, 0x30, 0x33, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_256_3866_sig[] = { 0x86, 0x9f, 0x3e, 0xc4, 0x76, 0x54, 0x50, 0xac, 0x03, 0xaa, 0x2a, 0x4a, 0x63, 0x2d, 0x5f, 0x7a, 0x96, 0x03, 0xb4, 0xb5, 0x2f, 0x37, 0x02, 0x9d, 0xd2, 0xc7, 0x28, 0x9b, 0xa4, 0xbd, 0x2d, 0x05, 0x6f, 0xe2, 0x43, 0xfd, 0x3c, 0x6d, 0x71, 0x90, 0x41, 0xb2, 0x09, 0x3c, 0x81, 0x12, 0x5f, 0x0e, 0xe7, 0x75, 0x27, 0x30, 0xc3, 0x98, 0x73, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3866 = { .name = "ecdsa_secp224r1_sha3_256_3866", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3866_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3866_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3866_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3867 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3867_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3867_msg[] = { 0x37, 0x31, 0x39, 0x33, 0x34, 0x35, 0x39, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3867_sig[] = { 0x0f, 0xd7, 0xa3, 0x77, 0xde, 0x13, 0xb5, 0x5e, 0xd9, 0xe3, 0x9a, 0xbe, 0xd7, 0x15, 0x3a, 0xb7, 0x2b, 0x38, 0x64, 0xae, 0x00, 0x08, 0x9b, 0xe6, 0xcb, 0x39, 0xc5, 0xae, 0x01, 0x99, 0x97, 0x22, 0x03, 0x6b, 0xa4, 0x4e, 0x9e, 0x00, 0x57, 0x4b, 0x3d, 0xe4, 0x6a, 0x7c, 0x2a, 0xf4, 0x69, 0x74, 0xf3, 0xce, 0x38, 0x18, 0x1c, 0xeb, 0xac, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3867 = { .name = "ecdsa_secp224r1_sha3_256_3867", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3867_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3867_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3867_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3868 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3868_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3868_msg[] = { 0x31, 0x36, 0x33, 0x37, 0x33, 0x30, 0x35, 0x37, 0x36, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_256_3868_sig[] = { 0x17, 0x9f, 0xf0, 0x7f, 0xe7, 0xb6, 0x84, 0xe7, 0x23, 0x1e, 0xfc, 0xb2, 0x22, 0x16, 0x70, 0x9b, 0x6c, 0x5b, 0x64, 0xf3, 0xe2, 0xab, 0x2b, 0x69, 0x62, 0xb7, 0xd0, 0xe2, 0x30, 0x77, 0xaf, 0x62, 0x4b, 0xfa, 0x19, 0xa3, 0xdf, 0x87, 0x36, 0x2e, 0x3a, 0x41, 0xea, 0x0e, 0x7f, 0x90, 0x4b, 0x32, 0xc0, 0x68, 0x51, 0xce, 0xe0, 0xf5, 0xb6, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3868 = { .name = "ecdsa_secp224r1_sha3_256_3868", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3868_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3868_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3868_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3869 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3869_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3869_msg[] = { 0x34, 0x32, 0x34, 0x31, 0x32, 0x37, 0x33, 0x37, 0x31, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_256_3869_sig[] = { 0x5d, 0x68, 0x17, 0xbb, 0xbc, 0xfa, 0x63, 0x3f, 0x93, 0x44, 0x56, 0xab, 0x59, 0x46, 0x74, 0x41, 0x28, 0xbd, 0x0e, 0xb7, 0xc5, 0xbb, 0xe6, 0xdb, 0x16, 0xe9, 0x59, 0x4d, 0x73, 0xc2, 0x34, 0xf3, 0xf2, 0x31, 0x87, 0xb3, 0x18, 0xb9, 0x84, 0xd0, 0x99, 0x83, 0x8e, 0xf5, 0x78, 0x73, 0xba, 0x6d, 0xe4, 0x8b, 0xd9, 0xfa, 0xdc, 0xd2, 0xef, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3869 = { .name = "ecdsa_secp224r1_sha3_256_3869", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3869_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3869_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3869_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3870 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3870_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3870_msg[] = { 0x34, 0x37, 0x35, 0x36, 0x31, 0x34, 0x37, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_256_3870_sig[] = { 0xad, 0xf7, 0xcb, 0xd3, 0x30, 0x18, 0xfe, 0x58, 0xd3, 0xda, 0x64, 0x0d, 0xc8, 0xdc, 0xdb, 0x5d, 0xb7, 0x5a, 0x85, 0xb8, 0x40, 0x9e, 0xf8, 0xa6, 0xd3, 0x4a, 0x88, 0xdf, 0x8a, 0xe5, 0xca, 0xfe, 0x68, 0x33, 0xad, 0x40, 0xea, 0x26, 0x98, 0xcd, 0x86, 0x2d, 0xf9, 0xa5, 0x71, 0x8f, 0x3b, 0x00, 0x93, 0x58, 0x85, 0xf8, 0x91, 0x34, 0xd9, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3870 = { .name = "ecdsa_secp224r1_sha3_256_3870", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3870_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3870_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3870_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3871 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3871_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3871_msg[] = { 0x37, 0x31, 0x36, 0x32, 0x33, 0x32, 0x37, 0x37, 0x33, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3871_sig[] = { 0xba, 0x77, 0x20, 0x51, 0x11, 0x53, 0xb6, 0xb9, 0x6a, 0x38, 0x63, 0x5e, 0x99, 0x97, 0xca, 0xff, 0x1a, 0xc3, 0x1c, 0xde, 0xa4, 0x02, 0x32, 0x41, 0xd0, 0x1f, 0x96, 0x6c, 0xa0, 0xe7, 0x2e, 0xa2, 0x0c, 0x55, 0xbb, 0xa4, 0x7e, 0xe6, 0xaa, 0x7d, 0xa3, 0xeb, 0xd1, 0xc1, 0xdb, 0xaf, 0xee, 0x71, 0x52, 0xe3, 0xe2, 0x27, 0x78, 0x64, 0x40, 0x26, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3871 = { .name = "ecdsa_secp224r1_sha3_256_3871", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3871_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3871_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3871_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3872 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3872_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3872_msg[] = { 0x31, 0x32, 0x32, 0x32, 0x34, 0x30, 0x34, 0x31, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3872_sig[] = { 0x10, 0xa8, 0xcc, 0x92, 0xe5, 0x50, 0xc8, 0x16, 0x99, 0x9c, 0x0a, 0x9b, 0xde, 0x2b, 0x34, 0x5a, 0x2a, 0x75, 0xc6, 0xf6, 0x68, 0x61, 0xf0, 0x60, 0xff, 0x2a, 0x37, 0x42, 0x6e, 0xf5, 0x45, 0x56, 0xc7, 0x88, 0x3f, 0xc4, 0x5e, 0x8b, 0x00, 0x63, 0x8f, 0xf7, 0x6c, 0x1f, 0x3e, 0xea, 0xfa, 0x89, 0x5e, 0x4f, 0x2d, 0xce, 0x99, 0x02, 0x49, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3872 = { .name = "ecdsa_secp224r1_sha3_256_3872", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3872_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3872_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3872_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3873 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3873_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3873_msg[] = { 0x33, 0x35, 0x32, 0x34, 0x35, 0x38, 0x33, 0x33, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3873_sig[] = { 0x29, 0x80, 0xc3, 0xaf, 0x3b, 0x6f, 0xe6, 0xfc, 0x5f, 0x0f, 0x82, 0xe7, 0x4b, 0x84, 0x84, 0x53, 0xcf, 0xed, 0x14, 0x60, 0xcf, 0x99, 0xa0, 0x80, 0xbd, 0x5a, 0x85, 0x66, 0x87, 0xd3, 0xab, 0xe0, 0xbc, 0x65, 0x27, 0x43, 0xa7, 0x5a, 0x54, 0x57, 0x9a, 0x34, 0xb8, 0x2a, 0x91, 0xc4, 0x88, 0x99, 0x01, 0x57, 0xc4, 0xa9, 0x36, 0x45, 0x40, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3873 = { .name = "ecdsa_secp224r1_sha3_256_3873", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3873_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3873_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3873_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3874 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3874_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3874_msg[] = { 0x33, 0x31, 0x36, 0x33, 0x34, 0x33, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3874_sig[] = { 0x2c, 0x3d, 0x2f, 0xef, 0x2d, 0x23, 0xea, 0x43, 0x1f, 0x36, 0xdd, 0x32, 0x58, 0x12, 0x73, 0x26, 0xf8, 0x3a, 0xba, 0x99, 0x89, 0x75, 0x4f, 0xd7, 0x33, 0x93, 0x1b, 0xb0, 0x64, 0xde, 0x0f, 0x37, 0xc3, 0x34, 0xeb, 0x07, 0xf5, 0x7e, 0x5d, 0xcf, 0x92, 0x5a, 0x78, 0x06, 0xf9, 0x0f, 0x1a, 0xf3, 0x4c, 0x25, 0x44, 0xcf, 0x3d, 0x4d, 0x9f, 0x65, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3874 = { .name = "ecdsa_secp224r1_sha3_256_3874", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3874_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3874_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha3_256_3874_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3875 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3875_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3875_msg[] = { 0x36, 0x35, 0x33, 0x32, 0x35, 0x39, 0x38, 0x34, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3875_sig[] = { 0x5f, 0x08, 0x49, 0x68, 0x64, 0xba, 0x9b, 0x6b, 0x74, 0x81, 0x04, 0x05, 0xfb, 0xba, 0x57, 0x9a, 0x5a, 0xec, 0xca, 0x52, 0xc3, 0xc9, 0x85, 0x1b, 0xce, 0x3a, 0xe5, 0x80, 0xfa, 0xd2, 0xd3, 0x2d, 0x58, 0x46, 0x79, 0xeb, 0x00, 0x74, 0x28, 0x5f, 0x34, 0xd5, 0xee, 0x45, 0x2e, 0xd0, 0xaa, 0xc2, 0x22, 0x29, 0x50, 0xbc, 0x3c, 0xb0, 0x19, 0x60, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3875 = { .name = "ecdsa_secp224r1_sha3_256_3875", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3875_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3875_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3875_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3876 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3876_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3876_msg[] = { 0x37, 0x33, 0x38, 0x35, 0x31, 0x38, 0x35, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3876_sig[] = { 0x07, 0x55, 0xfb, 0xc0, 0xcb, 0x48, 0x47, 0x10, 0x11, 0x18, 0xd2, 0x66, 0xe8, 0x26, 0xcf, 0x23, 0xfd, 0xc6, 0x64, 0xbf, 0xc4, 0xb9, 0x42, 0x5e, 0xeb, 0x56, 0x73, 0x42, 0xc2, 0xfe, 0xc3, 0x16, 0x39, 0x7c, 0xf1, 0x67, 0xc1, 0xb2, 0x34, 0xa7, 0xba, 0xb4, 0x6c, 0x2a, 0x26, 0xb6, 0xb4, 0x8b, 0x87, 0x79, 0x03, 0x25, 0x99, 0x5b, 0xf9, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3876 = { .name = "ecdsa_secp224r1_sha3_256_3876", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3876_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3876_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3876_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3877 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3877_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3877_msg[] = { 0x31, 0x34, 0x36, 0x35, 0x32, 0x36, 0x36, 0x35, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3877_sig[] = { 0x25, 0x44, 0x85, 0xaf, 0xee, 0x69, 0x12, 0xf3, 0x8b, 0xff, 0xae, 0x77, 0x15, 0x53, 0xaa, 0xf7, 0x34, 0xc7, 0x79, 0xb7, 0x69, 0xe7, 0x92, 0xb2, 0x62, 0x3a, 0xb0, 0x56, 0x6e, 0x59, 0x9e, 0xa2, 0xfe, 0x87, 0xd2, 0x22, 0x89, 0x92, 0xce, 0xa3, 0x40, 0xb1, 0x4d, 0x88, 0x72, 0xad, 0x3c, 0xb2, 0xab, 0xf3, 0x5a, 0x1f, 0x45, 0x3c, 0x7c, 0x24, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3877 = { .name = "ecdsa_secp224r1_sha3_256_3877", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3877_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3877_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3877_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3878 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3878_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3878_msg[] = { 0x32, 0x30, 0x33, 0x34, 0x38, 0x38, 0x39, 0x34, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3878_sig[] = { 0x99, 0xe6, 0x68, 0x98, 0x3f, 0x0c, 0x3c, 0x41, 0x68, 0x08, 0x1d, 0x37, 0x66, 0x46, 0x07, 0x43, 0x58, 0xe9, 0x23, 0xb0, 0x5c, 0x8b, 0xe3, 0x08, 0x0e, 0xd0, 0xd2, 0xa0, 0xe0, 0xb2, 0x8c, 0x84, 0xf2, 0xca, 0x32, 0x3d, 0x89, 0xde, 0xf8, 0x78, 0xde, 0xbd, 0x01, 0x9f, 0x3a, 0x89, 0x5c, 0x8d, 0xea, 0xcc, 0xbe, 0x69, 0xb5, 0x6c, 0x48, 0x07, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3878 = { .name = "ecdsa_secp224r1_sha3_256_3878", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3878_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3878_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3878_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3879 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3879_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3879_msg[] = { 0x34, 0x34, 0x37, 0x30, 0x38, 0x38, 0x36, 0x37, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3879_sig[] = { 0xac, 0xda, 0x06, 0xa1, 0xf0, 0x1d, 0xbc, 0xd4, 0x9e, 0x89, 0x98, 0xe2, 0x72, 0x77, 0x55, 0xcb, 0x64, 0x62, 0xba, 0xf3, 0x28, 0x11, 0xf2, 0x04, 0x35, 0x15, 0x89, 0xe3, 0x8e, 0xe9, 0xd9, 0x10, 0xbb, 0x66, 0x29, 0x58, 0x17, 0xc3, 0x2d, 0x69, 0xb5, 0x3e, 0xd6, 0xea, 0xbf, 0xa2, 0xe0, 0x9f, 0xb3, 0x9d, 0x46, 0x43, 0x9a, 0x8a, 0x48, 0x1d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3879 = { .name = "ecdsa_secp224r1_sha3_256_3879", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3879_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3879_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3879_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3880 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3880_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3880_msg[] = { 0x35, 0x35, 0x37, 0x36, 0x34, 0x30, 0x34, 0x34, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3880_sig[] = { 0x52, 0x24, 0xc5, 0x82, 0xac, 0x8f, 0x71, 0x01, 0xbf, 0x6f, 0xe1, 0x4a, 0x96, 0x17, 0xca, 0x0a, 0x98, 0x78, 0xdb, 0xbe, 0x02, 0x6a, 0xe2, 0x30, 0xd1, 0xe6, 0x3d, 0x0f, 0x61, 0xf0, 0xe4, 0x86, 0xa1, 0xb7, 0xcc, 0xe2, 0x28, 0x87, 0x4e, 0x7c, 0xcb, 0x6d, 0xc8, 0xdc, 0x95, 0x43, 0x4a, 0xfe, 0x6d, 0xbb, 0x74, 0x94, 0xb9, 0xf0, 0xe1, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3880 = { .name = "ecdsa_secp224r1_sha3_256_3880", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3880_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3880_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3880_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3881 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3881_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3881_msg[] = { 0x36, 0x33, 0x34, 0x34, 0x39, 0x35, 0x36, 0x36, 0x30, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3881_sig[] = { 0x9d, 0x05, 0x47, 0x0e, 0x39, 0x88, 0xf7, 0x6e, 0x78, 0x26, 0x84, 0xff, 0xd7, 0x43, 0xbb, 0xd3, 0xa2, 0xbb, 0x68, 0x3b, 0x0f, 0x2c, 0xdd, 0xc8, 0x73, 0xff, 0x79, 0xed, 0x3a, 0x1a, 0x4e, 0x79, 0x6a, 0x78, 0x47, 0x5d, 0xb7, 0x00, 0x04, 0x07, 0x27, 0x9a, 0x66, 0x5a, 0x2c, 0x40, 0x67, 0x93, 0x11, 0x04, 0x15, 0xe5, 0x65, 0x5b, 0x66, 0x98, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3881 = { .name = "ecdsa_secp224r1_sha3_256_3881", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3881_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3881_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3881_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3882 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3882_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3882_msg[] = { 0x34, 0x39, 0x34, 0x32, 0x38, 0x30, 0x39, 0x30, 0x33, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_256_3882_sig[] = { 0x74, 0xd5, 0xa5, 0xf8, 0x01, 0xab, 0x10, 0x3a, 0x8d, 0xe9, 0xce, 0xfe, 0x36, 0x57, 0x53, 0xe5, 0xe4, 0xe2, 0x4a, 0xae, 0x88, 0xb1, 0x8e, 0xad, 0x08, 0xf9, 0xe7, 0xe1, 0x22, 0x19, 0x5f, 0xf2, 0xb1, 0xdf, 0xf4, 0xf8, 0xef, 0x73, 0x82, 0xa5, 0x2f, 0x17, 0x7a, 0x76, 0x6a, 0x8f, 0x83, 0x9b, 0x65, 0xb7, 0x70, 0x76, 0x85, 0x0c, 0x5e, 0xdd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3882 = { .name = "ecdsa_secp224r1_sha3_256_3882", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3882_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3882_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3882_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3883 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3883_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3883_msg[] = { 0x32, 0x36, 0x36, 0x35, 0x38, 0x31, 0x39, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3883_sig[] = { 0xee, 0xe0, 0x09, 0x58, 0xac, 0xa3, 0xb5, 0xbc, 0x3f, 0xf4, 0x85, 0x33, 0xcc, 0xde, 0xc3, 0xeb, 0x56, 0x56, 0x63, 0xf1, 0x73, 0x36, 0x7c, 0xc9, 0x5a, 0x9f, 0x31, 0x4c, 0xeb, 0xc3, 0xed, 0x0d, 0x61, 0x0e, 0x0b, 0x9f, 0xc6, 0x3d, 0x81, 0x23, 0xb9, 0x27, 0xa3, 0x33, 0xaf, 0x6c, 0xcc, 0x2f, 0xc1, 0x40, 0x42, 0x91, 0x03, 0x6e, 0x51, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3883 = { .name = "ecdsa_secp224r1_sha3_256_3883", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3883_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3883_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3883_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3884 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3884_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3884_msg[] = { 0x33, 0x33, 0x33, 0x32, 0x32, 0x31, 0x34, 0x31, 0x31, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3884_sig[] = { 0x0f, 0x0a, 0x83, 0xfb, 0xdb, 0xb0, 0x5c, 0x61, 0x1f, 0x64, 0x30, 0xa8, 0xd2, 0xf4, 0x7c, 0x53, 0xe4, 0x45, 0x83, 0x1c, 0x87, 0x82, 0x03, 0xcb, 0x81, 0x51, 0x38, 0x78, 0xb4, 0xb1, 0x32, 0x1f, 0x09, 0xa3, 0xab, 0x5e, 0x4c, 0xc2, 0x7b, 0xef, 0xd8, 0x95, 0x06, 0x65, 0x1a, 0x4e, 0x40, 0xe2, 0x2a, 0xf6, 0x9e, 0x58, 0xb3, 0xc8, 0x86, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3884 = { .name = "ecdsa_secp224r1_sha3_256_3884", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3884_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3884_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3884_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3885 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3885_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3885_msg[] = { 0x36, 0x31, 0x36, 0x35, 0x32, 0x37, 0x37, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3885_sig[] = { 0x0a, 0x67, 0xda, 0x52, 0x5a, 0xb8, 0x69, 0xf3, 0xc6, 0xbb, 0x4d, 0xcc, 0x18, 0x21, 0xc2, 0xac, 0x06, 0x57, 0x28, 0xcd, 0x22, 0xd4, 0x9b, 0x0b, 0xa5, 0x81, 0x3b, 0xa8, 0xb7, 0x00, 0x65, 0xb1, 0x2a, 0x6d, 0x2b, 0xc5, 0x92, 0x78, 0x3a, 0x79, 0x42, 0xae, 0x0d, 0xae, 0x3a, 0xd1, 0xe7, 0xc6, 0xf2, 0x7c, 0xac, 0xfc, 0x2b, 0x48, 0xdd, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3885 = { .name = "ecdsa_secp224r1_sha3_256_3885", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3885_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3885_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3885_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3886 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3886_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3886_msg[] = { 0x32, 0x33, 0x35, 0x39, 0x39, 0x35, 0x35, 0x38, 0x31, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_256_3886_sig[] = { 0xb4, 0x1f, 0x01, 0xa5, 0xb7, 0x5f, 0xba, 0x48, 0x35, 0x79, 0x81, 0x56, 0xac, 0x88, 0x2e, 0x82, 0xa2, 0xe2, 0x98, 0x59, 0x96, 0x01, 0x32, 0x19, 0x5c, 0x1f, 0x7e, 0x91, 0xf4, 0x21, 0xfb, 0xa6, 0xd0, 0x06, 0x1b, 0x92, 0xf8, 0xab, 0x8e, 0xcb, 0xe7, 0xb5, 0x79, 0x1b, 0xc4, 0x3c, 0x51, 0x06, 0xc9, 0xac, 0x97, 0x47, 0xe5, 0xda, 0x67, 0x1a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3886 = { .name = "ecdsa_secp224r1_sha3_256_3886", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3886_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3886_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3886_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3887 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3887_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3887_msg[] = { 0x32, 0x39, 0x31, 0x33, 0x36, 0x31, 0x39, 0x35, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3887_sig[] = { 0xe3, 0x16, 0x3b, 0x6d, 0xfd, 0x65, 0x85, 0xf5, 0x0a, 0xc9, 0x34, 0xbd, 0x25, 0xea, 0x86, 0x06, 0x5e, 0xff, 0x63, 0x76, 0x38, 0x7a, 0x56, 0xcc, 0x21, 0x08, 0x97, 0xde, 0x05, 0xd9, 0x3a, 0x2d, 0xee, 0x9a, 0x55, 0x22, 0x8d, 0xbc, 0x3d, 0xf2, 0x60, 0x15, 0x2c, 0x45, 0x8f, 0x8d, 0xd6, 0xf7, 0x2b, 0x1d, 0x57, 0xf3, 0x7f, 0x6f, 0x68, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3887 = { .name = "ecdsa_secp224r1_sha3_256_3887", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3887_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3887_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3887_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3888 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3888_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3888_msg[] = { 0x31, 0x36, 0x32, 0x30, 0x39, 0x30, 0x33, 0x33, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3888_sig[] = { 0x27, 0xa2, 0xc5, 0xdb, 0x14, 0xc6, 0x0f, 0x71, 0xc3, 0xf0, 0x81, 0x96, 0x35, 0x6e, 0xa7, 0x09, 0x4d, 0xb6, 0x55, 0x9a, 0x4c, 0x5c, 0x7a, 0xb0, 0x97, 0xaa, 0xd7, 0x99, 0x75, 0x57, 0x41, 0xa7, 0x77, 0xad, 0x41, 0x9b, 0x5c, 0x18, 0x53, 0xbc, 0x6f, 0x8d, 0xa8, 0x9c, 0x28, 0x2a, 0x67, 0xf7, 0x1c, 0xd1, 0xfc, 0x3a, 0xbf, 0xe6, 0xef, 0x1c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3888 = { .name = "ecdsa_secp224r1_sha3_256_3888", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3888_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3888_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3888_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3889 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3889_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3889_msg[] = { 0x33, 0x33, 0x36, 0x33, 0x31, 0x30, 0x32, 0x38, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_256_3889_sig[] = { 0x6b, 0x5c, 0x4a, 0x21, 0x23, 0x72, 0x1c, 0xf7, 0x4e, 0x15, 0x1a, 0x3f, 0x3d, 0x97, 0x88, 0x0d, 0x19, 0x8c, 0xd7, 0x85, 0x0a, 0x49, 0x0b, 0x37, 0x36, 0xed, 0x28, 0xa4, 0x4b, 0x01, 0x07, 0xb4, 0xc7, 0xf3, 0x2a, 0x46, 0x31, 0x51, 0x60, 0xb3, 0x9f, 0x95, 0xd2, 0xbe, 0xc4, 0x69, 0x98, 0x19, 0x60, 0xee, 0xaf, 0x99, 0xf3, 0x0e, 0x8d, 0x8b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3889 = { .name = "ecdsa_secp224r1_sha3_256_3889", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3889_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3889_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3889_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3890 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3890_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3890_msg[] = { 0x36, 0x32, 0x37, 0x37, 0x34, 0x33, 0x34, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_256_3890_sig[] = { 0x21, 0x9a, 0x8f, 0x9d, 0x67, 0x01, 0xd7, 0xb5, 0x1d, 0x82, 0xb2, 0x93, 0xd2, 0xf0, 0xce, 0x48, 0x47, 0xe1, 0x3a, 0xbe, 0x9d, 0xfe, 0x8d, 0xe4, 0x26, 0x16, 0x40, 0x40, 0x33, 0x62, 0x3e, 0x69, 0x80, 0x63, 0xbe, 0xcd, 0x8f, 0x28, 0x44, 0x5d, 0xdb, 0x16, 0xca, 0xed, 0xfb, 0xe0, 0x93, 0xa2, 0xc1, 0xd8, 0x99, 0x25, 0xc2, 0x8a, 0x12, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3890 = { .name = "ecdsa_secp224r1_sha3_256_3890", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3890_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3890_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3890_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3891 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3891_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3891_msg[] = { 0x33, 0x38, 0x35, 0x36, 0x37, 0x39, 0x38, 0x31, 0x34, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_256_3891_sig[] = { 0xa0, 0x67, 0x65, 0x19, 0xc1, 0x27, 0xf5, 0x6b, 0x02, 0x56, 0x95, 0x32, 0x6e, 0xb6, 0x8c, 0x54, 0x38, 0xb5, 0xd4, 0x73, 0xc6, 0xb8, 0x1b, 0x25, 0xd5, 0x37, 0x93, 0xc2, 0x62, 0xce, 0x33, 0x31, 0x5e, 0xa1, 0xae, 0x83, 0xdc, 0x48, 0xe7, 0xe7, 0x74, 0xd7, 0x01, 0xdc, 0x27, 0xb3, 0x64, 0x48, 0x4e, 0x31, 0x33, 0xde, 0x24, 0xf0, 0x8e, 0x19, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3891 = { .name = "ecdsa_secp224r1_sha3_256_3891", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3891_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3891_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3891_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3892 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3892_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3892_msg[] = { 0x32, 0x38, 0x38, 0x31, 0x31, 0x38, 0x30, 0x36, 0x34, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3892_sig[] = { 0xb1, 0x6c, 0xb8, 0x31, 0x27, 0x7a, 0x40, 0x11, 0x55, 0x13, 0x4f, 0xb3, 0x0d, 0x69, 0x38, 0xb9, 0x91, 0x86, 0x65, 0xaf, 0x7e, 0x59, 0x53, 0x0f, 0xcd, 0x9c, 0xc0, 0xb2, 0xf8, 0x5a, 0x29, 0xc7, 0x9b, 0x30, 0xab, 0x6d, 0x94, 0x39, 0xea, 0xec, 0xe5, 0x90, 0x1d, 0x65, 0x77, 0x4a, 0xe1, 0x89, 0x3a, 0xc6, 0x03, 0xe3, 0x30, 0x8c, 0x29, 0xae, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3892 = { .name = "ecdsa_secp224r1_sha3_256_3892", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3892_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3892_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3892_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3893 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3893_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3893_msg[] = { 0x31, 0x30, 0x39, 0x35, 0x37, 0x33, 0x39, 0x34, 0x36, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3893_sig[] = { 0x4e, 0xb1, 0xf5, 0xdd, 0x75, 0x61, 0x5b, 0xda, 0x83, 0x68, 0xb9, 0x45, 0x66, 0xdf, 0xdd, 0xa9, 0xd7, 0xd8, 0x91, 0x7f, 0x18, 0x63, 0xd3, 0x60, 0x40, 0x59, 0xfb, 0x4f, 0x80, 0xb5, 0xe2, 0x43, 0xbe, 0x62, 0x19, 0x35, 0x0f, 0x60, 0xaf, 0x1b, 0x50, 0x57, 0x8f, 0x3d, 0x62, 0x04, 0xb5, 0xef, 0xcd, 0xa1, 0x0c, 0xdc, 0x33, 0x8d, 0x08, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3893 = { .name = "ecdsa_secp224r1_sha3_256_3893", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3893_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3893_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3893_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3894 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3894_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3894_msg[] = { 0x35, 0x34, 0x32, 0x37, 0x31, 0x31, 0x39, 0x38, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3894_sig[] = { 0x60, 0x02, 0x82, 0xc9, 0x01, 0xcc, 0x3a, 0x4c, 0x85, 0x96, 0xa0, 0x59, 0xb5, 0xac, 0x21, 0x7a, 0x9b, 0x99, 0x9f, 0x0d, 0x3b, 0x69, 0xb2, 0x4b, 0x39, 0x17, 0xd1, 0xcc, 0xf1, 0xf4, 0x01, 0xcd, 0x8c, 0xf1, 0x06, 0x99, 0x22, 0x44, 0xb3, 0x67, 0x4e, 0xd9, 0xe5, 0x59, 0x09, 0xb8, 0x68, 0x33, 0x57, 0xbe, 0x44, 0xfd, 0x48, 0xa1, 0xc3, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3894 = { .name = "ecdsa_secp224r1_sha3_256_3894", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3894_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3894_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3894_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3895 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3895_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3895_msg[] = { 0x33, 0x31, 0x35, 0x30, 0x30, 0x33, 0x34, 0x33, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3895_sig[] = { 0x54, 0xc6, 0x66, 0xa3, 0x0d, 0x72, 0xa0, 0x47, 0x5a, 0x4c, 0xf0, 0xfe, 0x0b, 0xb5, 0x8f, 0x13, 0xaa, 0xdb, 0x36, 0x1f, 0xfb, 0xa8, 0x93, 0x25, 0xc5, 0x6e, 0xc4, 0x8b, 0x91, 0xf3, 0x6a, 0x9f, 0xca, 0x04, 0x03, 0x43, 0xfc, 0xc2, 0x9c, 0x7f, 0xed, 0x35, 0xad, 0xb9, 0xdb, 0x9a, 0x2f, 0x17, 0xc1, 0xf3, 0x5d, 0xe4, 0xaf, 0xcc, 0x8f, 0x0a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3895 = { .name = "ecdsa_secp224r1_sha3_256_3895", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3895_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3895_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3895_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3896 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3896_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3896_msg[] = { 0x31, 0x39, 0x39, 0x39, 0x38, 0x32, 0x31, 0x33, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_256_3896_sig[] = { 0xff, 0xea, 0x34, 0x64, 0x81, 0xa3, 0x7d, 0x7f, 0x27, 0x28, 0xe2, 0xbb, 0xe3, 0x50, 0x83, 0xbc, 0xba, 0xce, 0x7b, 0x91, 0xe0, 0x6d, 0xa2, 0xad, 0x18, 0x25, 0xdb, 0xdf, 0x06, 0xcf, 0x6e, 0xee, 0x77, 0xea, 0x7a, 0x4d, 0xa0, 0xed, 0x79, 0xa8, 0xa1, 0x67, 0xad, 0xec, 0x51, 0xc8, 0xa2, 0xde, 0x90, 0x6f, 0x3f, 0x7f, 0xec, 0xde, 0x79, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3896 = { .name = "ecdsa_secp224r1_sha3_256_3896", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3896_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3896_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3896_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3897 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3897_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3897_msg[] = { 0x31, 0x39, 0x37, 0x31, 0x32, 0x30, 0x39, 0x32, 0x36, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_256_3897_sig[] = { 0x38, 0xfa, 0x40, 0xa5, 0x7e, 0x4a, 0x04, 0x02, 0x4c, 0x89, 0x90, 0x51, 0xcc, 0x80, 0x80, 0xc5, 0x26, 0x1d, 0xde, 0x66, 0xea, 0x59, 0xfe, 0x53, 0x2e, 0x85, 0x20, 0x13, 0x3e, 0x99, 0xd1, 0x23, 0xe5, 0x96, 0xe9, 0x93, 0xd6, 0x77, 0x68, 0x3b, 0xd2, 0x58, 0x89, 0x54, 0x91, 0x55, 0xed, 0xae, 0x09, 0x8e, 0x59, 0xa2, 0x9f, 0xe7, 0xd9, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3897 = { .name = "ecdsa_secp224r1_sha3_256_3897", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3897_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3897_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3897_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3898 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3898_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3898_msg[] = { 0x33, 0x35, 0x37, 0x31, 0x38, 0x33, 0x38, 0x38, 0x35, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_256_3898_sig[] = { 0x7f, 0x62, 0xa9, 0x85, 0xc5, 0xbb, 0xde, 0x0e, 0x11, 0xe0, 0x25, 0x0a, 0x97, 0xd7, 0x3f, 0xa3, 0x80, 0x11, 0xbb, 0x83, 0xb6, 0xfa, 0x2d, 0x98, 0x36, 0xbf, 0x5c, 0x45, 0x3b, 0xd8, 0x50, 0x83, 0x2c, 0xc3, 0x05, 0xe6, 0xb7, 0xd9, 0x56, 0x6d, 0x36, 0x95, 0x1a, 0xc4, 0x79, 0x4b, 0x2d, 0x08, 0xff, 0x71, 0x2b, 0x18, 0xb0, 0xaf, 0x65, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3898 = { .name = "ecdsa_secp224r1_sha3_256_3898", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3898_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3898_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3898_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3899 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3899_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3899_msg[] = { 0x38, 0x36, 0x38, 0x32, 0x32, 0x36, 0x39, 0x38, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3899_sig[] = { 0x31, 0x1f, 0x06, 0x35, 0x76, 0xc8, 0x37, 0x3b, 0x96, 0xcc, 0x16, 0x52, 0xab, 0x3b, 0xe3, 0xa5, 0x8e, 0xad, 0xea, 0x78, 0x6e, 0x75, 0xb1, 0x7a, 0x04, 0xc2, 0xbc, 0xa0, 0xbd, 0xb7, 0x09, 0x6d, 0x67, 0x5d, 0x10, 0x24, 0x29, 0x17, 0x02, 0xdd, 0x99, 0x1d, 0x56, 0x06, 0xc1, 0x25, 0xe6, 0x12, 0x95, 0x54, 0x92, 0x2e, 0x02, 0x44, 0x4f, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3899 = { .name = "ecdsa_secp224r1_sha3_256_3899", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3899_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3899_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3899_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 285 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3900 for ECDSA, tcId is 286 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3900_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3900_msg[] = { 0x32, 0x35, 0x34, 0x38, 0x38, 0x35, 0x36, 0x30, 0x33, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_256_3900_sig[] = { 0x65, 0xdb, 0x63, 0xa6, 0x63, 0xe3, 0x5f, 0xb9, 0x7e, 0xa8, 0xf0, 0x75, 0x2a, 0x31, 0x90, 0x13, 0x41, 0x02, 0xf4, 0xfb, 0xbe, 0xdd, 0x14, 0xbb, 0x5c, 0x13, 0x49, 0xa8, 0xab, 0xdf, 0xe6, 0x8c, 0x7f, 0x0c, 0x67, 0x4f, 0x30, 0x24, 0x88, 0xbc, 0x03, 0x05, 0x58, 0xd3, 0x56, 0x49, 0xf9, 0xa9, 0xc6, 0x9d, 0x58, 0x01, 0xa5, 0x75, 0xcb, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3900 = { .name = "ecdsa_secp224r1_sha3_256_3900", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3900_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3900_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3900_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 286 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3901 for ECDSA, tcId is 287 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3901_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3901_msg[] = { 0x34, 0x39, 0x39, 0x35, 0x37, 0x30, 0x31, 0x33, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_256_3901_sig[] = { 0x07, 0x5c, 0xee, 0xea, 0xa2, 0xff, 0xbe, 0x5d, 0xc1, 0x73, 0xd8, 0x4d, 0xf7, 0x11, 0x45, 0xa0, 0x56, 0x50, 0x0a, 0x90, 0xf8, 0xfb, 0x90, 0x2a, 0x24, 0xc0, 0xd3, 0x63, 0x68, 0x8c, 0xef, 0xcf, 0x26, 0xf5, 0x84, 0xf8, 0xd5, 0x98, 0xda, 0x2b, 0x96, 0x0a, 0x51, 0x2b, 0x6b, 0x65, 0xa4, 0x25, 0xed, 0x53, 0x6a, 0x4b, 0xd5, 0x70, 0xcf, 0x83, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3901 = { .name = "ecdsa_secp224r1_sha3_256_3901", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3901_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3901_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3901_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 287 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3902 for ECDSA, tcId is 288 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3902_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3902_msg[] = { 0x32, 0x34, 0x35, 0x36, 0x36, 0x38, 0x31, 0x37, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_256_3902_sig[] = { 0xf8, 0x40, 0x74, 0xb4, 0x2b, 0x14, 0xac, 0xb8, 0x71, 0x5a, 0xb2, 0x29, 0xe4, 0x26, 0x1c, 0x09, 0xb0, 0x96, 0xa5, 0x8b, 0x69, 0xf5, 0x10, 0xf5, 0xf4, 0x91, 0xba, 0x6e, 0x30, 0x4f, 0xe4, 0x12, 0x9c, 0x6d, 0xbe, 0x48, 0x1c, 0xc9, 0x2d, 0x9d, 0xcb, 0xea, 0x98, 0x3e, 0x40, 0xea, 0xfe, 0xf1, 0x7e, 0xa4, 0x60, 0x39, 0x60, 0x8a, 0x14, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3902 = { .name = "ecdsa_secp224r1_sha3_256_3902", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3902_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3902_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3902_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 288 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3903 for ECDSA, tcId is 289 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3903_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3903_msg[] = { 0x34, 0x31, 0x38, 0x35, 0x33, 0x37, 0x31, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3903_sig[] = { 0xad, 0xa0, 0x80, 0xec, 0xff, 0x37, 0xca, 0x81, 0x8f, 0x48, 0xdd, 0x5c, 0x0e, 0xba, 0xb7, 0x8a, 0x64, 0x5e, 0x97, 0x3e, 0x13, 0x84, 0x35, 0x63, 0x72, 0x37, 0xf8, 0x70, 0x4d, 0x85, 0xeb, 0x19, 0x50, 0x89, 0xc8, 0x3c, 0x92, 0xb4, 0x83, 0xa5, 0x3b, 0x03, 0x6b, 0x33, 0x05, 0x0a, 0xa1, 0x4b, 0xa2, 0x44, 0xeb, 0x48, 0xa0, 0xf9, 0x7d, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3903 = { .name = "ecdsa_secp224r1_sha3_256_3903", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3903_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3903_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3903_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 289 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3904 for ECDSA, tcId is 290 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3904_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3904_msg[] = { 0x37, 0x32, 0x37, 0x38, 0x34, 0x39, 0x30, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3904_sig[] = { 0xa7, 0xc2, 0x2c, 0x1d, 0x68, 0xe8, 0xbd, 0x56, 0x35, 0x20, 0xcf, 0xc7, 0x49, 0xd7, 0xde, 0x43, 0xd9, 0xae, 0x04, 0x51, 0x87, 0xa2, 0x42, 0x41, 0x68, 0xea, 0xac, 0xf3, 0x69, 0x59, 0xae, 0x2c, 0x1f, 0xe3, 0x0b, 0x45, 0xb0, 0x49, 0xc4, 0xa5, 0xe4, 0x18, 0x65, 0x47, 0x11, 0xf2, 0x1c, 0xbb, 0x92, 0x5d, 0xce, 0x89, 0xe5, 0x1a, 0x9a, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3904 = { .name = "ecdsa_secp224r1_sha3_256_3904", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3904_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3904_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_256_3904_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 290 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3905 for ECDSA, tcId is 291 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3905_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3905_msg[] = { 0x31, 0x35, 0x36, 0x32, 0x38, 0x31, 0x39, 0x33, 0x31, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_256_3905_sig[] = { 0x2c, 0xe1, 0x5f, 0x3b, 0xc4, 0xf8, 0x27, 0xe2, 0xcd, 0x5f, 0x59, 0xb7, 0x98, 0x0f, 0x69, 0x4e, 0x91, 0xc4, 0xb6, 0xa7, 0xb7, 0x7c, 0x61, 0x6f, 0x17, 0x12, 0x11, 0x36, 0x3f, 0x71, 0x76, 0x6a, 0xc9, 0xe5, 0x2b, 0x98, 0xf5, 0x8a, 0x68, 0x95, 0x11, 0x2e, 0x43, 0xb7, 0x59, 0x25, 0x18, 0x3a, 0x29, 0xa7, 0x3b, 0xd8, 0x35, 0xf9, 0x55, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3905 = { .name = "ecdsa_secp224r1_sha3_256_3905", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3905_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3905_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_256_3905_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 291 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3906 for ECDSA, tcId is 292 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3906_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3906_msg[] = { 0x32, 0x31, 0x38, 0x37, 0x39, 0x39, 0x32, 0x38, 0x33, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3906_sig[] = { 0xe6, 0x9b, 0x6b, 0x3c, 0x9a, 0x08, 0xda, 0x2a, 0x90, 0xd5, 0x9a, 0xc5, 0x45, 0x4c, 0x10, 0x24, 0x6b, 0xd8, 0xde, 0xc0, 0x65, 0x90, 0x42, 0x03, 0x91, 0x14, 0x06, 0x93, 0x52, 0xd0, 0x90, 0xe5, 0x4b, 0x79, 0xfa, 0x78, 0x0b, 0x46, 0x00, 0x0a, 0x07, 0x0b, 0x1a, 0x78, 0xba, 0x97, 0x97, 0xb3, 0x4b, 0x17, 0x61, 0xf0, 0x94, 0x08, 0xc8, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3906 = { .name = "ecdsa_secp224r1_sha3_256_3906", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3906_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3906_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_256_3906_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 292 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3907 for ECDSA, tcId is 293 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3907_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3907_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3907_sig[] = { 0xc1, 0xa5, 0x27, 0xa3, 0xef, 0xe3, 0xb3, 0x97, 0xbe, 0xf8, 0x89, 0xb6, 0x99, 0xb1, 0x92, 0xa7, 0x66, 0x3d, 0x9d, 0x60, 0x44, 0x9d, 0xd9, 0xec, 0xcb, 0xfa, 0x8e, 0x55, 0x7b, 0xa2, 0xde, 0x03, 0x47, 0xd0, 0x89, 0x5c, 0x6a, 0x24, 0xb2, 0x6e, 0x80, 0x04, 0x45, 0x86, 0xf6, 0x71, 0x8b, 0xee, 0xab, 0xc3, 0x16, 0xf1, 0x8c, 0x88, 0xf0, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3907 = { .name = "ecdsa_secp224r1_sha3_256_3907", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3907_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3907_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3907_sig, .siglen = 56, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 293 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3908 for ECDSA, tcId is 294 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3908_pubkey[] = { 0x8e, 0x76, 0x1a, 0x8f, 0xb0, 0xae, 0x0f, 0x4d, 0x07, 0x7c, 0x83, 0x31, 0x03, 0x91, 0x86, 0xba, 0xca, 0xfa, 0xc7, 0x4a, 0xd2, 0x5c, 0x49, 0x97, 0x87, 0xd0, 0x9e, 0xf4, 0xaf, 0x5e, 0x80, 0x29, 0x21, 0xde, 0xf0, 0x7b, 0x85, 0xdb, 0xac, 0xa1, 0x11, 0x46, 0x38, 0x2c, 0xc4, 0x12, 0x17, 0x67, 0xd8, 0xcd, 0x0f, 0x07, 0x98, 0xe2, 0xbc, 0x0a, }; static const unsigned char ecdsa_secp224r1_sha3_256_3908_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3908_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3908 = { .name = "ecdsa_secp224r1_sha3_256_3908", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3908_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3908_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3908_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 294 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3909 for ECDSA, tcId is 295 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3909_pubkey[] = { 0x8e, 0x76, 0x1a, 0x8f, 0xb0, 0xae, 0x0f, 0x4d, 0x07, 0x7c, 0x83, 0x31, 0x03, 0x91, 0x86, 0xba, 0xca, 0xfa, 0xc7, 0x4a, 0xd2, 0x5c, 0x49, 0x97, 0x87, 0xd0, 0x9e, 0xf4, 0xaf, 0x5e, 0x80, 0x29, 0x21, 0xde, 0xf0, 0x7b, 0x85, 0xdb, 0xac, 0xa1, 0x11, 0x46, 0x38, 0x2c, 0xc4, 0x12, 0x17, 0x67, 0xd8, 0xcd, 0x0f, 0x07, 0x98, 0xe2, 0xbc, 0x0a, }; static const unsigned char ecdsa_secp224r1_sha3_256_3909_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3909_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3909 = { .name = "ecdsa_secp224r1_sha3_256_3909", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3909_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3909_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3909_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 295 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3910 for ECDSA, tcId is 296 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3910_pubkey[] = { 0xca, 0x50, 0x63, 0x0a, 0x87, 0x2a, 0xdc, 0xd5, 0x58, 0xc3, 0x88, 0xca, 0x3b, 0x02, 0x4c, 0xb5, 0x9e, 0x12, 0x99, 0xbd, 0x45, 0xd9, 0xe3, 0x24, 0xf6, 0x05, 0xe2, 0x61, 0x3c, 0x69, 0xa7, 0x0c, 0x60, 0xf4, 0x9e, 0x04, 0xb3, 0x8e, 0x37, 0x38, 0xc5, 0xe5, 0x91, 0xed, 0xaa, 0x51, 0xd7, 0x97, 0x4d, 0xe9, 0xe7, 0x27, 0x25, 0xd8, 0xa6, 0x90, }; static const unsigned char ecdsa_secp224r1_sha3_256_3910_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3910_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3910 = { .name = "ecdsa_secp224r1_sha3_256_3910", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3910_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3910_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3910_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 296 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3911 for ECDSA, tcId is 297 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3911_pubkey[] = { 0x19, 0x77, 0xaa, 0xc0, 0xb9, 0x1c, 0x2b, 0x65, 0xf5, 0x80, 0xa5, 0xf3, 0x3d, 0x80, 0x45, 0xa3, 0xa5, 0x6e, 0x3a, 0x3a, 0xb4, 0x8d, 0x86, 0x13, 0xf3, 0xac, 0x08, 0x44, 0xc3, 0x15, 0xf3, 0x7b, 0x48, 0xcb, 0x77, 0x16, 0x35, 0xe1, 0x6a, 0xfb, 0xca, 0x84, 0x94, 0x8b, 0x9e, 0x4e, 0x35, 0x69, 0x0a, 0x09, 0x90, 0xbd, 0xdc, 0x6c, 0xab, 0x9a, }; static const unsigned char ecdsa_secp224r1_sha3_256_3911_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3911_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3911 = { .name = "ecdsa_secp224r1_sha3_256_3911", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3911_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3911_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3911_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 297 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3912 for ECDSA, tcId is 298 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3912_pubkey[] = { 0x04, 0x1e, 0xd3, 0xf4, 0xd3, 0x72, 0xc3, 0xb7, 0xc4, 0x27, 0x4e, 0x15, 0xc1, 0xa4, 0xc2, 0xe5, 0x20, 0x11, 0xa5, 0xea, 0x68, 0x6d, 0xe2, 0x3b, 0x3b, 0x27, 0xbf, 0x3f, 0x6d, 0x8d, 0x6e, 0xbf, 0xa6, 0x3b, 0x74, 0x67, 0xa6, 0x91, 0xd6, 0xda, 0x25, 0x9d, 0x93, 0x2e, 0xce, 0x80, 0xb6, 0xba, 0x94, 0x6d, 0x99, 0x2c, 0xa7, 0x8c, 0x3a, 0xab, }; static const unsigned char ecdsa_secp224r1_sha3_256_3912_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3912_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3912 = { .name = "ecdsa_secp224r1_sha3_256_3912", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3912_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3912_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3912_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 298 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3913 for ECDSA, tcId is 299 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3913_pubkey[] = { 0x67, 0x31, 0xbd, 0x2f, 0x79, 0x69, 0xfe, 0xbf, 0x93, 0xfa, 0x23, 0x82, 0xbd, 0x4f, 0xdc, 0x93, 0xdd, 0xee, 0xde, 0x8f, 0x2d, 0xea, 0xc4, 0xc3, 0xab, 0xf1, 0xce, 0x7a, 0x19, 0x51, 0x6b, 0x15, 0x72, 0x7d, 0x11, 0x1c, 0x78, 0x6b, 0x39, 0xba, 0x11, 0x02, 0x6d, 0x25, 0xa2, 0x20, 0xb4, 0xfe, 0x52, 0xc5, 0xf5, 0x6f, 0xd4, 0xca, 0x5d, 0xec, }; static const unsigned char ecdsa_secp224r1_sha3_256_3913_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3913_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3913 = { .name = "ecdsa_secp224r1_sha3_256_3913", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3913_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3913_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3913_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 299 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3914 for ECDSA, tcId is 300 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3914_pubkey[] = { 0x4a, 0xa4, 0x66, 0x7e, 0xac, 0xd6, 0x78, 0x8f, 0x17, 0xeb, 0xde, 0x59, 0xe7, 0x8d, 0xde, 0x17, 0x7b, 0x2b, 0x37, 0x89, 0x45, 0xba, 0x48, 0x7d, 0x32, 0x55, 0x67, 0xd8, 0x5d, 0x88, 0x7d, 0x32, 0xe8, 0xcf, 0x6d, 0x51, 0x82, 0x43, 0x3d, 0x8f, 0x81, 0xc9, 0x45, 0xb4, 0x35, 0x6d, 0x3e, 0xbc, 0x0e, 0x97, 0x0d, 0xd0, 0xa9, 0x03, 0x53, 0x87, }; static const unsigned char ecdsa_secp224r1_sha3_256_3914_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3914_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3914 = { .name = "ecdsa_secp224r1_sha3_256_3914", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3914_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3914_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3914_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 300 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3915 for ECDSA, tcId is 301 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3915_pubkey[] = { 0x03, 0x22, 0x43, 0x5e, 0xf8, 0x55, 0x7d, 0xa9, 0x30, 0x6c, 0x64, 0x5a, 0x0b, 0x61, 0x4c, 0x6f, 0x6c, 0xe9, 0x8d, 0x85, 0x96, 0x97, 0x78, 0x4c, 0xf7, 0x4f, 0x2f, 0x23, 0xa8, 0xcd, 0x9e, 0x24, 0x3e, 0x90, 0x88, 0x17, 0x01, 0x33, 0xbd, 0x81, 0xeb, 0x6c, 0xd2, 0x85, 0x71, 0xfc, 0xf2, 0x07, 0x50, 0x98, 0x19, 0xf4, 0x43, 0xe5, 0xbb, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3915_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3915_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3915 = { .name = "ecdsa_secp224r1_sha3_256_3915", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3915_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3915_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3915_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 301 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3916 for ECDSA, tcId is 302 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3916_pubkey[] = { 0x03, 0x22, 0x43, 0x5e, 0xf8, 0x55, 0x7d, 0xa9, 0x30, 0x6c, 0x64, 0x5a, 0x0b, 0x61, 0x4c, 0x6f, 0x6c, 0xe9, 0x8d, 0x85, 0x96, 0x97, 0x78, 0x4c, 0xf7, 0x4f, 0x2f, 0x23, 0xa8, 0xcd, 0x9e, 0x24, 0x3e, 0x90, 0x88, 0x17, 0x01, 0x33, 0xbd, 0x81, 0xeb, 0x6c, 0xd2, 0x85, 0x71, 0xfc, 0xf2, 0x07, 0x50, 0x98, 0x19, 0xf4, 0x43, 0xe5, 0xbb, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3916_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3916_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3916 = { .name = "ecdsa_secp224r1_sha3_256_3916", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3916_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3916_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3916_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 302 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3917 for ECDSA, tcId is 303 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3917_pubkey[] = { 0x57, 0x19, 0xbd, 0x78, 0x77, 0x63, 0x67, 0xff, 0xea, 0x95, 0xb9, 0x31, 0x3e, 0xc8, 0x25, 0xc7, 0x0a, 0x32, 0x52, 0x32, 0x6a, 0xa1, 0xec, 0x66, 0xbc, 0x20, 0x7b, 0xd3, 0x32, 0x7a, 0xe0, 0x55, 0x56, 0xf6, 0x2f, 0x56, 0x50, 0xdb, 0x89, 0x8b, 0x31, 0x6e, 0x68, 0x9b, 0x5c, 0x37, 0x7a, 0x8a, 0x64, 0xd7, 0x43, 0xa8, 0x9a, 0xb4, 0x15, 0x3b, }; static const unsigned char ecdsa_secp224r1_sha3_256_3917_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3917_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3917 = { .name = "ecdsa_secp224r1_sha3_256_3917", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3917_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3917_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3917_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 303 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3918 for ECDSA, tcId is 304 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3918_pubkey[] = { 0xbb, 0x1e, 0x97, 0xc4, 0xb5, 0xbe, 0xde, 0xc0, 0xaf, 0x97, 0x16, 0x9d, 0xb0, 0x6d, 0x04, 0x06, 0x47, 0xbd, 0x40, 0xfa, 0x78, 0x53, 0xc8, 0xe8, 0xd0, 0xad, 0x43, 0x0b, 0x10, 0x25, 0xec, 0x67, 0x7e, 0x90, 0x05, 0x74, 0x85, 0x3c, 0xc5, 0xce, 0x76, 0x1a, 0x92, 0xba, 0xe9, 0x29, 0xec, 0x86, 0x07, 0x6a, 0xcc, 0x48, 0x59, 0xbe, 0xac, 0xc8, }; static const unsigned char ecdsa_secp224r1_sha3_256_3918_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3918_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3918 = { .name = "ecdsa_secp224r1_sha3_256_3918", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3918_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3918_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3918_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 304 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3919 for ECDSA, tcId is 305 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3919_pubkey[] = { 0xb0, 0x0f, 0xf7, 0xe1, 0x92, 0x5b, 0x97, 0x17, 0x90, 0x3a, 0x05, 0xd4, 0x0c, 0xe9, 0x86, 0x0e, 0xd1, 0x2e, 0xbe, 0xd8, 0xc6, 0x86, 0xe0, 0x5a, 0x92, 0x05, 0xa9, 0x76, 0x11, 0x0e, 0xe9, 0x4a, 0x9a, 0x32, 0x67, 0xab, 0x15, 0x65, 0xc6, 0x6c, 0xdd, 0x5e, 0xd2, 0x84, 0x4c, 0xcc, 0x5c, 0x6a, 0x7e, 0x78, 0xe4, 0x82, 0x1b, 0x95, 0x4f, 0x98, }; static const unsigned char ecdsa_secp224r1_sha3_256_3919_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3919_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3919 = { .name = "ecdsa_secp224r1_sha3_256_3919", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3919_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3919_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3919_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 305 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3920 for ECDSA, tcId is 306 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3920_pubkey[] = { 0xb4, 0xf1, 0x8d, 0x03, 0x10, 0x97, 0xf1, 0x79, 0xef, 0xfa, 0xd1, 0x46, 0xf5, 0xfa, 0x7e, 0x85, 0x74, 0xe6, 0x49, 0x3d, 0xc4, 0x13, 0x3a, 0x7e, 0x6b, 0xff, 0x67, 0x63, 0xb1, 0x1a, 0xd9, 0xab, 0xcd, 0xe8, 0xa9, 0x3b, 0x78, 0xb6, 0xbc, 0x1f, 0x71, 0xd9, 0x61, 0x68, 0x71, 0x22, 0x63, 0xf6, 0xfd, 0xeb, 0x1d, 0xa9, 0xb1, 0x19, 0x39, 0x12, }; static const unsigned char ecdsa_secp224r1_sha3_256_3920_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3920_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3920 = { .name = "ecdsa_secp224r1_sha3_256_3920", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3920_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3920_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3920_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 306 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3921 for ECDSA, tcId is 307 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3921_pubkey[] = { 0xa3, 0x52, 0x40, 0xc6, 0x8e, 0x8f, 0x4e, 0xce, 0xc6, 0x40, 0xad, 0x2c, 0xc5, 0x45, 0x33, 0x27, 0x5c, 0xd6, 0xb5, 0x4f, 0x48, 0x04, 0x76, 0xe0, 0x41, 0x2f, 0x19, 0x1e, 0x7c, 0x4b, 0xde, 0xf2, 0xaa, 0x25, 0x61, 0xfb, 0xb2, 0xd2, 0x6f, 0x90, 0x34, 0x83, 0x62, 0x65, 0xb8, 0x1e, 0x55, 0x5d, 0x56, 0xb6, 0xf4, 0x46, 0xb6, 0xb8, 0x63, 0xa8, }; static const unsigned char ecdsa_secp224r1_sha3_256_3921_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3921_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3921 = { .name = "ecdsa_secp224r1_sha3_256_3921", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3921_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3921_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3921_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 307 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3922 for ECDSA, tcId is 308 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3922_pubkey[] = { 0xef, 0x67, 0xcf, 0xa9, 0x5e, 0xba, 0x7f, 0x21, 0xe4, 0x7e, 0x9f, 0x80, 0xe6, 0x24, 0xd0, 0x62, 0x97, 0xe3, 0xc5, 0x16, 0xb5, 0xd4, 0x81, 0x0b, 0xc0, 0x32, 0x64, 0xf4, 0x7a, 0xe0, 0x76, 0x45, 0x3e, 0xd0, 0x6b, 0xc4, 0x39, 0x99, 0xb7, 0x13, 0xaa, 0xfd, 0x0e, 0xb2, 0xaa, 0x81, 0x92, 0xf6, 0x1a, 0x61, 0xd6, 0x56, 0x0d, 0x66, 0xa3, 0xd8, }; static const unsigned char ecdsa_secp224r1_sha3_256_3922_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3922_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3922 = { .name = "ecdsa_secp224r1_sha3_256_3922", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3922_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3922_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3922_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 308 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3923 for ECDSA, tcId is 309 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3923_pubkey[] = { 0xff, 0x16, 0xdb, 0xdd, 0x13, 0x35, 0xd3, 0xd3, 0x1a, 0xcd, 0x1f, 0xea, 0x3c, 0xbd, 0xd5, 0xfa, 0xfb, 0xcf, 0xb1, 0x33, 0x67, 0xcc, 0x58, 0x31, 0x57, 0x4a, 0x0b, 0xae, 0x81, 0x76, 0x3f, 0xfb, 0xd6, 0xbc, 0x87, 0x20, 0xd4, 0x6e, 0x7e, 0xe3, 0xcd, 0xa0, 0x1b, 0x98, 0xa0, 0xcf, 0x47, 0x98, 0x16, 0xea, 0x46, 0xbe, 0xa8, 0xaa, 0xe1, 0x99, }; static const unsigned char ecdsa_secp224r1_sha3_256_3923_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3923_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3923 = { .name = "ecdsa_secp224r1_sha3_256_3923", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3923_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3923_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3923_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 309 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3924 for ECDSA, tcId is 310 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3924_pubkey[] = { 0x9c, 0x88, 0xd3, 0x4b, 0xcd, 0xc7, 0x0a, 0x09, 0xbd, 0x9c, 0xb4, 0xaa, 0xb4, 0xe4, 0x0f, 0xa9, 0x00, 0x47, 0x2d, 0x63, 0x5c, 0x4e, 0xbd, 0x23, 0x66, 0xe5, 0xd4, 0xb9, 0xec, 0xc5, 0x4c, 0x3d, 0x44, 0x71, 0x49, 0x53, 0x76, 0x6b, 0xbb, 0x12, 0x57, 0xa3, 0x58, 0x0a, 0x2a, 0xa8, 0x51, 0x70, 0xe4, 0x18, 0x96, 0x9b, 0xa3, 0xa6, 0x68, 0x41, }; static const unsigned char ecdsa_secp224r1_sha3_256_3924_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3924_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3924 = { .name = "ecdsa_secp224r1_sha3_256_3924", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3924_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3924_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3924_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 310 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3925 for ECDSA, tcId is 311 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3925_pubkey[] = { 0x9c, 0x88, 0xd3, 0x4b, 0xcd, 0xc7, 0x0a, 0x09, 0xbd, 0x9c, 0xb4, 0xaa, 0xb4, 0xe4, 0x0f, 0xa9, 0x00, 0x47, 0x2d, 0x63, 0x5c, 0x4e, 0xbd, 0x23, 0x66, 0xe5, 0xd4, 0xb9, 0xec, 0xc5, 0x4c, 0x3d, 0x44, 0x71, 0x49, 0x53, 0x76, 0x6b, 0xbb, 0x12, 0x57, 0xa3, 0x58, 0x0a, 0x2a, 0xa8, 0x51, 0x70, 0xe4, 0x18, 0x96, 0x9b, 0xa3, 0xa6, 0x68, 0x41, }; static const unsigned char ecdsa_secp224r1_sha3_256_3925_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3925_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3925 = { .name = "ecdsa_secp224r1_sha3_256_3925", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3925_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3925_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3925_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 311 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3926 for ECDSA, tcId is 312 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3926_pubkey[] = { 0xa3, 0xce, 0x18, 0x0b, 0xd6, 0x5f, 0xfc, 0x76, 0xd5, 0x50, 0x2a, 0xe8, 0x06, 0xa6, 0xb4, 0x34, 0xd7, 0xe6, 0x9b, 0x39, 0xb1, 0x94, 0x0e, 0x44, 0xc8, 0x36, 0x04, 0xcb, 0x41, 0x50, 0xca, 0x51, 0x2d, 0xdd, 0xf3, 0x36, 0x38, 0x97, 0xdd, 0x8d, 0x23, 0xf7, 0x65, 0x64, 0x41, 0x21, 0x88, 0xcc, 0x9b, 0xe7, 0x7c, 0x17, 0x0d, 0xce, 0xf4, 0xe7, }; static const unsigned char ecdsa_secp224r1_sha3_256_3926_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3926_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3926 = { .name = "ecdsa_secp224r1_sha3_256_3926", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3926_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3926_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3926_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 312 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3927 for ECDSA, tcId is 313 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3927_pubkey[] = { 0x7a, 0x11, 0x83, 0xe8, 0x3d, 0xd8, 0xe3, 0x8b, 0x2a, 0xef, 0x19, 0xc9, 0xe6, 0x04, 0xa2, 0x05, 0xec, 0xf5, 0x0a, 0xbc, 0x9a, 0xd1, 0xb2, 0xbf, 0x3a, 0x06, 0x2b, 0xa9, 0x35, 0xd0, 0xec, 0x70, 0xd1, 0xc6, 0x6b, 0xa1, 0x24, 0x87, 0x2a, 0x47, 0xd0, 0x44, 0xb8, 0xbb, 0x7b, 0x6a, 0x40, 0x5b, 0x9a, 0x9b, 0xcc, 0xe6, 0x36, 0xf9, 0xe7, 0x88, }; static const unsigned char ecdsa_secp224r1_sha3_256_3927_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3927_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3927 = { .name = "ecdsa_secp224r1_sha3_256_3927", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3927_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3927_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3927_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 313 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3928 for ECDSA, tcId is 314 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3928_pubkey[] = { 0x6f, 0xbb, 0xbf, 0xa6, 0x0d, 0x49, 0xb6, 0x03, 0xfb, 0xc7, 0xf6, 0xf6, 0xc9, 0x22, 0xdf, 0x03, 0x64, 0xc0, 0x3f, 0x08, 0x9a, 0xf3, 0xa2, 0x88, 0xce, 0x43, 0x37, 0xd5, 0x28, 0xc4, 0x6e, 0xb6, 0xf4, 0x3e, 0x9c, 0x4f, 0x26, 0x64, 0xff, 0x72, 0xd5, 0x87, 0xcd, 0x70, 0x6c, 0x62, 0x0c, 0xd7, 0x18, 0xbc, 0xeb, 0x11, 0x97, 0x48, 0x2e, 0xd9, }; static const unsigned char ecdsa_secp224r1_sha3_256_3928_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3928_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3928 = { .name = "ecdsa_secp224r1_sha3_256_3928", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3928_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3928_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3928_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 314 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3929 for ECDSA, tcId is 315 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3929_pubkey[] = { 0xd5, 0x0a, 0x93, 0xa4, 0x75, 0xab, 0x04, 0x52, 0x1c, 0xa4, 0xbc, 0x4d, 0xcd, 0x06, 0x87, 0x2e, 0x85, 0xfc, 0x58, 0x7a, 0x7c, 0x56, 0xe6, 0x8a, 0x6e, 0x94, 0x84, 0x6a, 0x45, 0x11, 0xf0, 0xbd, 0x21, 0xaf, 0x19, 0xdf, 0xf4, 0xde, 0xf0, 0x9b, 0x04, 0xbc, 0xb2, 0x0e, 0x21, 0xad, 0x21, 0xe0, 0xf8, 0xc4, 0xa4, 0x9f, 0x21, 0x85, 0x6a, 0xa6, }; static const unsigned char ecdsa_secp224r1_sha3_256_3929_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3929_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x57, 0x31, 0xb7, 0xc4, 0xbd, 0x04, 0xcb, 0x9e, 0xfb, 0x83, 0x69, 0x35, 0xff, 0x2e, 0x54, 0x7b, 0xf2, 0x90, 0x9f, 0x86, 0x82, 0x4a, 0xf4, 0xd8, 0xdf, 0x78, 0xac, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3929 = { .name = "ecdsa_secp224r1_sha3_256_3929", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3929_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3929_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3929_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 315 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3930 for ECDSA, tcId is 316 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3930_pubkey[] = { 0x4a, 0x02, 0x98, 0xd7, 0xa7, 0xa6, 0x70, 0xd2, 0x53, 0x8f, 0x6a, 0xae, 0x65, 0xdd, 0xf6, 0xbe, 0x35, 0xd4, 0x74, 0xbb, 0xdd, 0x1b, 0x6a, 0xa0, 0xa8, 0x12, 0xd9, 0x74, 0x92, 0x51, 0x86, 0x6f, 0x63, 0x0e, 0xda, 0x71, 0xe9, 0xd7, 0x27, 0x96, 0x4e, 0x56, 0x3a, 0x25, 0x96, 0xec, 0x04, 0xc4, 0xd0, 0x13, 0x4f, 0xb9, 0x97, 0x02, 0x1c, 0xa3, }; static const unsigned char ecdsa_secp224r1_sha3_256_3930_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3930_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xa8, 0xce, 0x48, 0x3b, 0x42, 0xfb, 0x34, 0x61, 0x04, 0x7c, 0x96, 0xca, 0x00, 0xd0, 0xc2, 0x26, 0xee, 0x28, 0x50, 0xb7, 0x91, 0x92, 0x34, 0x6c, 0x7c, 0xe3, 0x7d, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3930 = { .name = "ecdsa_secp224r1_sha3_256_3930", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3930_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3930_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3930_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 316 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3931 for ECDSA, tcId is 317 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3931_pubkey[] = { 0x4a, 0x8e, 0xad, 0x5e, 0x32, 0x23, 0x4b, 0x2a, 0x78, 0x17, 0x1b, 0xbe, 0x32, 0x15, 0xf1, 0xb7, 0x21, 0xf9, 0xae, 0x11, 0x3c, 0x7e, 0x97, 0x11, 0xbd, 0x44, 0xcb, 0x28, 0x15, 0x58, 0x0c, 0xc1, 0xe9, 0xf2, 0x2a, 0x43, 0x2e, 0x80, 0x70, 0xf7, 0x00, 0xb9, 0x49, 0xea, 0x55, 0xcf, 0xcd, 0x93, 0x23, 0x58, 0x9f, 0xe1, 0xed, 0xb0, 0x60, 0x53, }; static const unsigned char ecdsa_secp224r1_sha3_256_3931_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3931_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3931 = { .name = "ecdsa_secp224r1_sha3_256_3931", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3931_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3931_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3931_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 317 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3932 for ECDSA, tcId is 318 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3932_pubkey[] = { 0x55, 0xbd, 0x00, 0x33, 0x33, 0xe4, 0x49, 0xdc, 0x59, 0xe1, 0x81, 0xcb, 0x2e, 0x14, 0xe2, 0x24, 0x0f, 0x26, 0xbc, 0x7f, 0x3f, 0x17, 0x13, 0xa7, 0x3b, 0xa0, 0xe3, 0x6c, 0x69, 0xac, 0x8b, 0x1f, 0xb9, 0xc4, 0xc2, 0x70, 0xec, 0x57, 0xa6, 0xaf, 0xd3, 0xf8, 0xc6, 0x5f, 0x1e, 0x34, 0xc5, 0x17, 0x6c, 0x7f, 0x76, 0x84, 0xe8, 0x61, 0x16, 0x7d, }; static const unsigned char ecdsa_secp224r1_sha3_256_3932_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3932_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3932 = { .name = "ecdsa_secp224r1_sha3_256_3932", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3932_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3932_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3932_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 318 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3933 for ECDSA, tcId is 319 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3933_pubkey[] = { 0x70, 0x36, 0xb9, 0x6d, 0x90, 0x33, 0xea, 0x5b, 0xf6, 0xa6, 0x3b, 0xc3, 0x08, 0x93, 0x6d, 0xa1, 0x63, 0x6b, 0x22, 0xc6, 0x01, 0xf5, 0xfd, 0x1a, 0x3f, 0xc8, 0xb4, 0x91, 0x02, 0x84, 0x17, 0xad, 0x37, 0x89, 0x9b, 0x3e, 0xa1, 0xdc, 0xa7, 0xb6, 0x7e, 0xc6, 0x0a, 0x7e, 0x7b, 0x0a, 0xf0, 0x4d, 0x02, 0x4b, 0xad, 0x8a, 0xa3, 0xa5, 0xe4, 0xa3, }; static const unsigned char ecdsa_secp224r1_sha3_256_3933_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3933_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc7, 0xbb, 0x3d, 0x41, 0x94, 0x56, 0xee, 0x8a, 0x53, 0xd6, 0x78, 0x67, 0x55, 0x0e, 0xd5, 0xeb, 0x3c, 0x00, 0xd5, 0x56, 0x38, 0xac, 0x6d, 0x21, 0x32, 0xbb, 0x00, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3933 = { .name = "ecdsa_secp224r1_sha3_256_3933", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3933_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3933_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3933_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 319 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3934 for ECDSA, tcId is 320 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3934_pubkey[] = { 0x58, 0xfe, 0x2f, 0x40, 0xf6, 0xb3, 0x61, 0x16, 0x7b, 0xd9, 0x75, 0x7e, 0x73, 0x90, 0x8b, 0x21, 0xa8, 0xf4, 0x3c, 0x42, 0x0e, 0x13, 0xae, 0xf1, 0x19, 0x21, 0x1e, 0x64, 0x67, 0x75, 0xa4, 0x96, 0x81, 0xe2, 0xd6, 0x46, 0xde, 0xa2, 0x6b, 0xf2, 0x57, 0xf8, 0xf7, 0xfa, 0xc9, 0xf7, 0xfb, 0x2e, 0x9b, 0xbf, 0xd3, 0x66, 0x49, 0x95, 0x7b, 0x84, }; static const unsigned char ecdsa_secp224r1_sha3_256_3934_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3934_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xaa, 0xb6, 0xda, 0xa4, 0x62, 0x88, 0x52, 0xca, 0x4b, 0x25, 0xe9, 0x17, 0xef, 0x47, 0x71, 0x54, 0x7c, 0x75, 0xd5, 0xec, 0x51, 0x27, 0xc9, 0xc6, 0x67, 0x8c, 0xde, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3934 = { .name = "ecdsa_secp224r1_sha3_256_3934", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3934_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3934_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3934_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 320 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3935 for ECDSA, tcId is 321 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3935_pubkey[] = { 0xae, 0x55, 0x24, 0xa4, 0x53, 0x31, 0x01, 0xa5, 0xcf, 0xe3, 0x90, 0x7d, 0x70, 0x6c, 0xaf, 0xa7, 0xf9, 0x04, 0xd9, 0xdf, 0xe3, 0x8c, 0xee, 0xc5, 0x94, 0x57, 0xd6, 0x2e, 0x18, 0x43, 0x4e, 0x27, 0x1e, 0xdf, 0x58, 0x00, 0x8c, 0x15, 0xd6, 0x27, 0xda, 0xbb, 0xf5, 0x69, 0x1e, 0x9c, 0x9e, 0xaa, 0x79, 0x30, 0x09, 0x4c, 0xe8, 0x85, 0xe2, 0xce, }; static const unsigned char ecdsa_secp224r1_sha3_256_3935_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3935_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x80, 0x63, 0xdb, 0x16, 0x78, 0x70, 0x11, 0xa1, 0xc1, 0x21, 0x2a, 0xf0, 0x44, 0x59, 0x9a, 0x91, 0xf7, 0x88, 0x69, 0xbd, 0x79, 0x0f, 0x5d, 0xc5, 0x88, 0xd8, 0x42, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3935 = { .name = "ecdsa_secp224r1_sha3_256_3935", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3935_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3935_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3935_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 321 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3936 for ECDSA, tcId is 322 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3936_pubkey[] = { 0xe0, 0xaf, 0x4a, 0xd4, 0xf0, 0x6a, 0x41, 0xc7, 0x2d, 0x50, 0x2d, 0x69, 0x34, 0xc8, 0xc3, 0xf4, 0xb3, 0x4f, 0x06, 0x2d, 0x1c, 0xf7, 0x23, 0xb3, 0x71, 0x2c, 0x9a, 0xf3, 0x4a, 0x3d, 0x09, 0xff, 0xd3, 0x50, 0x6e, 0x11, 0x66, 0x96, 0x09, 0xea, 0x8f, 0xe8, 0xee, 0x54, 0xb3, 0x01, 0x88, 0xbc, 0x0a, 0xd1, 0x36, 0xcd, 0xcf, 0x73, 0x03, 0x8c, }; static const unsigned char ecdsa_secp224r1_sha3_256_3936_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3936_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x17, 0x68, 0x82, 0x46, 0x31, 0x3d, 0x0b, 0x42, 0xa8, 0xce, 0x48, 0x3b, 0x42, 0xfb, 0x1f, 0x0a, 0x62, 0x17, 0x39, 0x46, 0x11, 0xf2, 0xb1, 0x77, 0xad, 0xa9, 0x4b, 0x47, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3936 = { .name = "ecdsa_secp224r1_sha3_256_3936", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3936_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3936_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3936_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 322 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3937 for ECDSA, tcId is 323 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3937_pubkey[] = { 0xde, 0xaf, 0x78, 0x57, 0x50, 0xee, 0xf0, 0xb3, 0xe1, 0x78, 0xec, 0x72, 0x69, 0x56, 0xb9, 0x33, 0x88, 0x38, 0xb0, 0xbe, 0x79, 0xca, 0x51, 0x66, 0x04, 0x19, 0x37, 0xb5, 0xa6, 0xb6, 0x93, 0x18, 0xef, 0xc4, 0x96, 0x1a, 0x50, 0xb4, 0x4c, 0xd4, 0xb7, 0x92, 0xc2, 0x71, 0x53, 0x9f, 0x3b, 0x41, 0x29, 0xe8, 0xe8, 0xda, 0xdc, 0x96, 0x84, 0xb3, }; static const unsigned char ecdsa_secp224r1_sha3_256_3937_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3937_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x88, 0x24, 0x63, 0x13, 0xd0, 0xb4, 0x2a, 0x8c, 0xe4, 0x83, 0xb4, 0x2f, 0xb3, 0x45, 0x94, 0x2d, 0x25, 0x65, 0x66, 0x6e, 0x25, 0xfd, 0x2f, 0x85, 0xa6, 0x0e, 0xba, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3937 = { .name = "ecdsa_secp224r1_sha3_256_3937", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3937_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3937_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3937_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 323 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3938 for ECDSA, tcId is 324 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3938_pubkey[] = { 0xe1, 0x4f, 0xb7, 0xfc, 0x84, 0x9d, 0xe2, 0x0d, 0x33, 0xc6, 0xc5, 0xe6, 0xb3, 0x58, 0xf5, 0xba, 0x70, 0x2e, 0xb2, 0xb9, 0x12, 0x1d, 0xef, 0x8d, 0x3d, 0xed, 0xdb, 0xdf, 0x58, 0x15, 0x3c, 0x8e, 0x0e, 0xf0, 0xb7, 0x89, 0x93, 0xf4, 0xd1, 0x74, 0x05, 0xc1, 0xfe, 0x2b, 0x20, 0x88, 0x0d, 0x40, 0xb2, 0x29, 0xf7, 0xde, 0x51, 0xa4, 0xd6, 0xb3, }; static const unsigned char ecdsa_secp224r1_sha3_256_3938_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3938_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x10, 0x48, 0xc6, 0x27, 0xa1, 0x68, 0x55, 0x19, 0xc9, 0x07, 0x68, 0x5f, 0x66, 0x8c, 0x11, 0xb7, 0x6a, 0x11, 0xdc, 0x9e, 0x38, 0x1d, 0x35, 0xc5, 0xef, 0xc1, 0x4b, 0x87, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3938 = { .name = "ecdsa_secp224r1_sha3_256_3938", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3938_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3938_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3938_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 324 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3939 for ECDSA, tcId is 325 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3939_pubkey[] = { 0xf8, 0x3a, 0x25, 0x4c, 0x07, 0xc2, 0x90, 0x22, 0x45, 0x4c, 0x43, 0xbe, 0x9b, 0xd5, 0xe9, 0x9c, 0x63, 0x0f, 0xf7, 0xd8, 0x32, 0x06, 0x71, 0x3a, 0x1f, 0xbf, 0xa0, 0xfa, 0x01, 0x7a, 0x0a, 0xdb, 0x06, 0x8f, 0xb2, 0x8a, 0x94, 0x18, 0x32, 0x8e, 0xac, 0x1b, 0xc1, 0x9c, 0x6c, 0x92, 0xc3, 0xf1, 0x66, 0x6a, 0x77, 0x32, 0x50, 0x57, 0x1a, 0x19, }; static const unsigned char ecdsa_secp224r1_sha3_256_3939_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3939_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x31, 0x3d, 0x0b, 0x42, 0xa8, 0xce, 0x48, 0x3b, 0x42, 0xfb, 0x34, 0x61, 0x04, 0x7c, 0x69, 0xe7, 0x88, 0x60, 0x89, 0xd9, 0xf0, 0xc0, 0xfc, 0x2c, 0x4d, 0x91, 0x79, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3939 = { .name = "ecdsa_secp224r1_sha3_256_3939", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3939_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3939_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3939_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 325 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3940 for ECDSA, tcId is 326 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3940_pubkey[] = { 0x23, 0xac, 0x1c, 0xcb, 0x80, 0x7f, 0x76, 0xfa, 0x99, 0x20, 0x7a, 0xf6, 0x7f, 0x66, 0x2f, 0xb1, 0xee, 0x10, 0xf1, 0xd5, 0xfd, 0xdb, 0x71, 0x5e, 0xaf, 0xa8, 0xad, 0x3d, 0xb1, 0x8e, 0xce, 0xeb, 0x74, 0x32, 0xc7, 0x02, 0x50, 0xf8, 0xe9, 0x2f, 0xa9, 0x90, 0xba, 0xab, 0x18, 0x29, 0x65, 0x47, 0xfb, 0x79, 0x01, 0xac, 0xdd, 0x8f, 0xaf, 0x59, }; static const unsigned char ecdsa_secp224r1_sha3_256_3940_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3940_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x1c, 0x22, 0x61, 0x5f, 0x35, 0xd4, 0x88, 0xba, 0xd6, 0x14, 0xc3, 0xcc, 0x55, 0x78, 0x20, 0x5b, 0xd2, 0x5c, 0x0d, 0x73, 0xed, 0x98, 0x5e, 0x12, 0x14, 0xd0, 0x94, 0xe1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3940 = { .name = "ecdsa_secp224r1_sha3_256_3940", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3940_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3940_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3940_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 326 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3941 for ECDSA, tcId is 327 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3941_pubkey[] = { 0x11, 0x9d, 0x9f, 0x0c, 0x5f, 0x5f, 0x62, 0x06, 0xdf, 0x59, 0x86, 0x22, 0xec, 0x7a, 0xfc, 0x75, 0x6a, 0x0c, 0x1c, 0x1b, 0x3d, 0x11, 0x33, 0x52, 0x8a, 0x7a, 0x06, 0xcd, 0x0d, 0xf1, 0x7a, 0x91, 0x64, 0x71, 0x97, 0x14, 0x48, 0x8b, 0x9b, 0xa8, 0x02, 0x18, 0x85, 0xd4, 0xea, 0xa8, 0x3e, 0x88, 0x42, 0xb1, 0x1a, 0xf3, 0x68, 0xd0, 0x63, 0x04, }; static const unsigned char ecdsa_secp224r1_sha3_256_3941_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3941_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x38, 0x44, 0xc2, 0xbe, 0x6b, 0xa9, 0x11, 0x75, 0xac, 0x29, 0x87, 0x98, 0xaa, 0xf0, 0x40, 0xb7, 0xa4, 0xb8, 0x1a, 0xe7, 0xdb, 0x30, 0xbc, 0x24, 0x29, 0xa1, 0x29, 0xc2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3941 = { .name = "ecdsa_secp224r1_sha3_256_3941", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3941_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3941_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3941_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 327 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3942 for ECDSA, tcId is 328 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3942_pubkey[] = { 0x88, 0x88, 0xae, 0x9b, 0x1a, 0xb8, 0xd5, 0x7b, 0x18, 0x46, 0x8a, 0x2c, 0x16, 0xf8, 0xc9, 0x71, 0xa7, 0x07, 0x11, 0xc6, 0x36, 0x1a, 0x9a, 0xfe, 0x14, 0xbe, 0x4e, 0x33, 0xaf, 0x32, 0x31, 0x1a, 0x18, 0xef, 0x6b, 0x96, 0x5c, 0x8f, 0x6e, 0x25, 0x20, 0x51, 0x79, 0x4a, 0x34, 0x67, 0xde, 0x9f, 0x58, 0xc0, 0x6a, 0x85, 0x45, 0xb7, 0x43, 0xdc, }; static const unsigned char ecdsa_secp224r1_sha3_256_3942_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3942_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x54, 0x67, 0x24, 0x1d, 0xa1, 0x7d, 0x9a, 0x30, 0x82, 0x3e, 0x4b, 0x65, 0x00, 0x68, 0x61, 0x13, 0x77, 0x14, 0x28, 0x5b, 0xc8, 0xc9, 0x1a, 0x36, 0x3e, 0x71, 0xbe, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3942 = { .name = "ecdsa_secp224r1_sha3_256_3942", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3942_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3942_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3942_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 328 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3943 for ECDSA, tcId is 329 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3943_pubkey[] = { 0x2c, 0xe5, 0xa3, 0xf2, 0xb3, 0xfc, 0x79, 0x16, 0x95, 0x3e, 0xbe, 0x71, 0xa7, 0xff, 0x33, 0x92, 0x1c, 0xb5, 0x71, 0x67, 0xab, 0xaa, 0x87, 0x1a, 0x07, 0x20, 0x21, 0x96, 0xea, 0x2d, 0x3b, 0x61, 0x82, 0x0b, 0xdd, 0x52, 0x64, 0xf0, 0x60, 0x68, 0x08, 0x44, 0xd7, 0x21, 0x7a, 0x21, 0x60, 0x1e, 0x3e, 0xd3, 0x7a, 0x79, 0xd5, 0x95, 0x3b, 0x98, }; static const unsigned char ecdsa_secp224r1_sha3_256_3943_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3943_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc0, 0x31, 0xed, 0x8b, 0x3c, 0x38, 0x08, 0xd0, 0xe0, 0x90, 0x95, 0x78, 0x22, 0x2c, 0x58, 0x9a, 0x6c, 0x20, 0xac, 0xfd, 0xc6, 0x76, 0x43, 0x85, 0x72, 0x9a, 0x36, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3943 = { .name = "ecdsa_secp224r1_sha3_256_3943", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3943_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3943_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3943_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 329 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3944 for ECDSA, tcId is 330 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3944_pubkey[] = { 0xba, 0xe5, 0xf1, 0x1e, 0xb7, 0x7e, 0x35, 0x4a, 0x0d, 0x0e, 0x33, 0xc4, 0xce, 0x24, 0x83, 0x9d, 0x72, 0x6e, 0x17, 0x00, 0xe5, 0x14, 0xcc, 0xbd, 0xed, 0xe2, 0x31, 0x45, 0x4f, 0xfd, 0x00, 0x9f, 0xbe, 0xea, 0x9c, 0x73, 0x07, 0x93, 0x8f, 0x8a, 0xdf, 0xed, 0x84, 0xde, 0x36, 0x00, 0x92, 0x02, 0x86, 0x28, 0x1d, 0x26, 0x7c, 0x88, 0x60, 0x9a, }; static const unsigned char ecdsa_secp224r1_sha3_256_3944_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3944_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3944 = { .name = "ecdsa_secp224r1_sha3_256_3944", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3944_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3944_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3944_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 330 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3945 for ECDSA, tcId is 331 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3945_pubkey[] = { 0xd1, 0x53, 0xad, 0x8f, 0x46, 0x2d, 0x2f, 0x93, 0x88, 0xfa, 0x8b, 0x43, 0x51, 0x7a, 0xa2, 0xa7, 0x79, 0x9d, 0xea, 0x0b, 0xbb, 0x1f, 0xba, 0x67, 0xc5, 0x67, 0x41, 0x72, 0xdf, 0x03, 0xb7, 0x78, 0xb5, 0x87, 0xab, 0xc1, 0x8d, 0xb2, 0x3b, 0xd5, 0x2f, 0x43, 0x91, 0x37, 0x14, 0xd1, 0xf4, 0x1b, 0x8c, 0x91, 0x90, 0x7b, 0x24, 0xcf, 0x1e, 0xf8, }; static const unsigned char ecdsa_secp224r1_sha3_256_3945_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3945_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3945 = { .name = "ecdsa_secp224r1_sha3_256_3945", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3945_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3945_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3945_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 331 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3946 for ECDSA, tcId is 332 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3946_pubkey[] = { 0x39, 0xb3, 0x0c, 0xf6, 0x82, 0x7e, 0x95, 0xc4, 0xbb, 0x1c, 0xf5, 0xa2, 0x01, 0xe3, 0x61, 0x1e, 0xa8, 0x76, 0x60, 0xc6, 0x71, 0xfc, 0xfe, 0x48, 0x37, 0xa5, 0x5b, 0xa8, 0xbf, 0x99, 0x0d, 0x7e, 0x77, 0x56, 0xab, 0x4c, 0x0f, 0x08, 0xf0, 0xd6, 0x74, 0x98, 0x0c, 0xaa, 0x2e, 0x55, 0x9c, 0x93, 0xc8, 0x4f, 0x70, 0x42, 0xfb, 0xf0, 0xac, 0xe0, }; static const unsigned char ecdsa_secp224r1_sha3_256_3946_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3946_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3946 = { .name = "ecdsa_secp224r1_sha3_256_3946", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3946_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3946_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3946_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 332 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3947 for ECDSA, tcId is 333 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3947_pubkey[] = { 0xce, 0x72, 0xf4, 0x33, 0x41, 0x67, 0x94, 0xd9, 0xba, 0x0e, 0x53, 0x73, 0x5e, 0xb2, 0x27, 0x7f, 0xfd, 0xfe, 0x84, 0xf8, 0x52, 0xff, 0x06, 0xb2, 0x6b, 0x2b, 0xa4, 0x8d, 0xce, 0xf0, 0x33, 0xd6, 0xf8, 0x97, 0xce, 0x82, 0x0f, 0x31, 0x78, 0xf0, 0x33, 0x1b, 0x47, 0x5a, 0xd9, 0xf8, 0xe6, 0xbe, 0x2f, 0xf3, 0x47, 0x88, 0xe0, 0x9e, 0x55, 0xc4, }; static const unsigned char ecdsa_secp224r1_sha3_256_3947_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3947_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3947 = { .name = "ecdsa_secp224r1_sha3_256_3947", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3947_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3947_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3947_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 333 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3948 for ECDSA, tcId is 334 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3948_pubkey[] = { 0x69, 0x21, 0x1f, 0xb6, 0x8e, 0x0c, 0xe4, 0x0b, 0x59, 0x0b, 0xdf, 0xb2, 0x62, 0x75, 0x3d, 0x38, 0x17, 0xa9, 0x77, 0x7c, 0xbc, 0xc1, 0x82, 0x92, 0xf6, 0x3d, 0x94, 0x46, 0x7f, 0xc0, 0xdc, 0xf4, 0xd6, 0xa0, 0x2a, 0x0d, 0xaf, 0x95, 0x2f, 0x1b, 0xdc, 0x99, 0xec, 0xb4, 0xbc, 0xef, 0xde, 0x8d, 0x7e, 0xb2, 0x2a, 0xe1, 0x4b, 0xe4, 0x4b, 0x5f, }; static const unsigned char ecdsa_secp224r1_sha3_256_3948_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3948_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3948 = { .name = "ecdsa_secp224r1_sha3_256_3948", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3948_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3948_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3948_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 334 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3949 for ECDSA, tcId is 335 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3949_pubkey[] = { 0xea, 0xe4, 0xa3, 0xd4, 0x3d, 0xa3, 0x1e, 0x5b, 0xbb, 0x67, 0x67, 0xec, 0x18, 0xb0, 0x3c, 0x22, 0x31, 0x4d, 0xcd, 0xe7, 0x7f, 0x6a, 0xda, 0xe7, 0xe6, 0xa1, 0xb6, 0x6c, 0x3b, 0x2b, 0x6f, 0x2a, 0xbe, 0x22, 0xf0, 0x03, 0x76, 0x70, 0x3c, 0xda, 0x54, 0xa6, 0xb6, 0xe4, 0xcb, 0xd7, 0xba, 0xc7, 0x61, 0x47, 0x82, 0xef, 0x9e, 0x94, 0xb2, 0x6f, }; static const unsigned char ecdsa_secp224r1_sha3_256_3949_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3949_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3949 = { .name = "ecdsa_secp224r1_sha3_256_3949", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3949_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3949_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3949_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 335 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3950 for ECDSA, tcId is 336 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3950_pubkey[] = { 0x1a, 0x51, 0x96, 0x9a, 0x30, 0xf9, 0x66, 0x89, 0x4e, 0xd0, 0xe1, 0xb7, 0x63, 0xda, 0x7c, 0xdd, 0x2a, 0x25, 0x8a, 0x9a, 0x9d, 0x6e, 0xfb, 0x01, 0x94, 0x19, 0xc1, 0x52, 0xfd, 0x89, 0x82, 0x29, 0x54, 0x89, 0xe9, 0x7f, 0x2d, 0x8d, 0x6e, 0xbe, 0x04, 0x09, 0xd7, 0x59, 0xa5, 0xca, 0x25, 0xcf, 0x96, 0x27, 0xf2, 0x0e, 0x39, 0xf1, 0xe6, 0x51, }; static const unsigned char ecdsa_secp224r1_sha3_256_3950_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3950_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3950 = { .name = "ecdsa_secp224r1_sha3_256_3950", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3950_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3950_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3950_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 336 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3951 for ECDSA, tcId is 337 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3951_pubkey[] = { 0x90, 0x9b, 0xb6, 0xc4, 0x7b, 0x98, 0x1b, 0x1e, 0xb3, 0xad, 0x78, 0xd6, 0xad, 0x6b, 0x04, 0x79, 0x1f, 0x99, 0x52, 0x42, 0x9f, 0x98, 0xa0, 0x14, 0x16, 0xb7, 0x78, 0xfd, 0x6c, 0x38, 0x10, 0x7d, 0x55, 0xd2, 0x8e, 0x37, 0x49, 0x3d, 0x22, 0xe2, 0xaa, 0x2a, 0x4c, 0x66, 0xc9, 0xda, 0x2c, 0xc9, 0x0b, 0xe2, 0x20, 0x22, 0x78, 0x87, 0x0f, 0x92, }; static const unsigned char ecdsa_secp224r1_sha3_256_3951_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3951_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3951 = { .name = "ecdsa_secp224r1_sha3_256_3951", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3951_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3951_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3951_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 337 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3952 for ECDSA, tcId is 338 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3952_pubkey[] = { 0xee, 0xc9, 0xdb, 0xb6, 0xfe, 0x5e, 0xd5, 0xc8, 0xe4, 0xf8, 0x30, 0x9c, 0xd8, 0x1d, 0x50, 0x60, 0x05, 0xef, 0xd5, 0x2d, 0xca, 0x73, 0xe8, 0x87, 0x49, 0x57, 0xdb, 0x2c, 0x84, 0x0f, 0x66, 0x93, 0xe7, 0x7f, 0x92, 0x08, 0x8c, 0x6e, 0x41, 0x10, 0x75, 0xff, 0x15, 0x81, 0x7c, 0xa0, 0xf6, 0xe6, 0x69, 0xa2, 0x95, 0xd0, 0x1d, 0x24, 0x42, 0xbd, }; static const unsigned char ecdsa_secp224r1_sha3_256_3952_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3952_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3952 = { .name = "ecdsa_secp224r1_sha3_256_3952", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3952_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3952_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3952_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 338 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3953 for ECDSA, tcId is 339 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3953_pubkey[] = { 0xa4, 0xb5, 0xe9, 0x30, 0x4f, 0xb0, 0x4b, 0xc6, 0x25, 0x7f, 0xed, 0x45, 0x08, 0x3f, 0xc7, 0xf5, 0x0a, 0xac, 0xff, 0xb9, 0x62, 0xd4, 0x2b, 0x3b, 0x3a, 0x6c, 0x61, 0x77, 0x58, 0xaa, 0x38, 0xfe, 0x0a, 0xa0, 0x34, 0x02, 0x5e, 0x4b, 0x7e, 0xd0, 0x45, 0xee, 0xa3, 0xed, 0xad, 0x0a, 0x5e, 0xce, 0x26, 0xbf, 0xa7, 0x44, 0x12, 0x39, 0xf5, 0x21, }; static const unsigned char ecdsa_secp224r1_sha3_256_3953_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3953_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3953 = { .name = "ecdsa_secp224r1_sha3_256_3953", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3953_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3953_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3953_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 339 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3954 for ECDSA, tcId is 340 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3954_pubkey[] = { 0x7f, 0xef, 0x8e, 0xd4, 0x25, 0x08, 0x15, 0x37, 0xad, 0xbe, 0x47, 0x73, 0x03, 0x7d, 0x77, 0xcc, 0xec, 0x1a, 0x3d, 0xae, 0x49, 0x0c, 0x46, 0x36, 0x0c, 0x92, 0xd0, 0x67, 0xe5, 0x30, 0x97, 0x92, 0x68, 0x0d, 0xf2, 0x04, 0xf3, 0xcc, 0xaf, 0x51, 0xd9, 0xe7, 0x35, 0x43, 0xf2, 0x1e, 0x51, 0x93, 0x77, 0xb5, 0x04, 0x88, 0x5b, 0x6e, 0x55, 0xc5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3954_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3954_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3954 = { .name = "ecdsa_secp224r1_sha3_256_3954", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3954_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3954_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3954_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 340 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3955 for ECDSA, tcId is 341 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3955_pubkey[] = { 0xd4, 0xc3, 0x8c, 0x0d, 0xf6, 0xf7, 0x74, 0x3e, 0x57, 0x7c, 0xe3, 0xd0, 0x54, 0xa3, 0x2e, 0x84, 0xb2, 0xa7, 0x41, 0x8d, 0x1a, 0x9e, 0x00, 0xa0, 0xa1, 0xd3, 0x0e, 0x13, 0x54, 0x28, 0xf7, 0x04, 0x7f, 0x7e, 0xee, 0x01, 0xb2, 0x37, 0x7a, 0xc2, 0xeb, 0x04, 0x1d, 0x24, 0x63, 0x7f, 0x40, 0x97, 0x7b, 0x11, 0xb2, 0x4f, 0x29, 0x04, 0xd9, 0xdc, }; static const unsigned char ecdsa_secp224r1_sha3_256_3955_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3955_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x21, 0xcd, 0xaf, 0xc1, 0x9b, 0x3c, 0x56, 0xe7, 0x19, 0x33, 0xd3, 0x69, 0x2d, 0x76, 0xc9, 0x2c, 0x00, 0xcd, 0x08, 0xd1, 0x46, 0xb2, 0xed, 0x4c, 0x03, 0x52, 0x53, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3955 = { .name = "ecdsa_secp224r1_sha3_256_3955", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3955_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3955_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3955_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 341 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3956 for ECDSA, tcId is 342 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3956_pubkey[] = { 0xd4, 0xc3, 0x8c, 0x0d, 0xf6, 0xf7, 0x74, 0x3e, 0x57, 0x7c, 0xe3, 0xd0, 0x54, 0xa3, 0x2e, 0x84, 0xb2, 0xa7, 0x41, 0x8d, 0x1a, 0x9e, 0x00, 0xa0, 0xa1, 0xd3, 0x0e, 0x13, 0xab, 0xd7, 0x08, 0xfb, 0x80, 0x81, 0x11, 0xfe, 0x4d, 0xc8, 0x85, 0x3d, 0x14, 0xfb, 0xe2, 0xda, 0x9c, 0x80, 0xbf, 0x68, 0x84, 0xee, 0x4d, 0xb0, 0xd6, 0xfb, 0x26, 0x25, }; static const unsigned char ecdsa_secp224r1_sha3_256_3956_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3956_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0x21, 0xcd, 0xaf, 0xc1, 0x9b, 0x3c, 0x56, 0xe7, 0x19, 0x33, 0xd3, 0x69, 0x2d, 0x76, 0xc9, 0x2c, 0x00, 0xcd, 0x08, 0xd1, 0x46, 0xb2, 0xed, 0x4c, 0x03, 0x52, 0x53, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3956 = { .name = "ecdsa_secp224r1_sha3_256_3956", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3956_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3956_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3956_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 342 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3957 for ECDSA, tcId is 343 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3957_pubkey[] = { 0xeb, 0xc6, 0x91, 0x37, 0xdb, 0x89, 0xc0, 0x18, 0x96, 0x96, 0xee, 0x75, 0xff, 0x03, 0x70, 0x6b, 0x0d, 0x93, 0x96, 0x39, 0xbb, 0x64, 0xe2, 0x20, 0xd7, 0x0e, 0xce, 0xe6, 0x23, 0xa4, 0x46, 0xd6, 0x5b, 0x08, 0x3d, 0xa1, 0x8c, 0xb1, 0x4c, 0xb6, 0xa9, 0xe5, 0x7f, 0x00, 0x75, 0x58, 0x38, 0x60, 0x65, 0x72, 0x6e, 0xa3, 0x4f, 0xea, 0xb5, 0x73, }; static const unsigned char ecdsa_secp224r1_sha3_256_3957_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3957_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3957 = { .name = "ecdsa_secp224r1_sha3_256_3957", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3957_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3957_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3957_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 343 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3958 for ECDSA, tcId is 344 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3958_pubkey[] = { 0xff, 0x8f, 0x64, 0xc0, 0xc0, 0xf7, 0xf0, 0xe8, 0x1d, 0x20, 0x5b, 0x67, 0xa1, 0xc3, 0xbc, 0xcf, 0x0c, 0x3d, 0xcf, 0x3b, 0xfd, 0xfd, 0xc8, 0x0a, 0x61, 0x47, 0x1e, 0x80, 0xa0, 0xcb, 0xbf, 0x29, 0xeb, 0xed, 0xf5, 0x38, 0x10, 0x16, 0x93, 0x7a, 0xd9, 0x13, 0x35, 0xc5, 0x80, 0x1b, 0xbe, 0x6f, 0xd4, 0xa1, 0xee, 0x61, 0x99, 0x29, 0x56, 0x01, }; static const unsigned char ecdsa_secp224r1_sha3_256_3958_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3958_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3958 = { .name = "ecdsa_secp224r1_sha3_256_3958", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3958_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3958_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3958_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 344 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3959 for ECDSA, tcId is 345 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3959_pubkey[] = { 0x11, 0xc0, 0xf9, 0x4f, 0xc2, 0x82, 0x0e, 0xad, 0x7b, 0x14, 0x20, 0x8d, 0x06, 0x20, 0xa3, 0x5f, 0x37, 0x6f, 0x1c, 0x10, 0xb6, 0xaf, 0x16, 0x06, 0x04, 0x54, 0xb0, 0x48, 0xb0, 0x04, 0xd5, 0x32, 0x2d, 0xb3, 0x03, 0x9c, 0x7f, 0xdd, 0x48, 0x88, 0xfd, 0xc0, 0xca, 0xff, 0xae, 0x81, 0xed, 0xbe, 0x53, 0xe8, 0x0c, 0xd0, 0x5d, 0xf2, 0x10, 0xb9, }; static const unsigned char ecdsa_secp224r1_sha3_256_3959_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3959_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3959 = { .name = "ecdsa_secp224r1_sha3_256_3959", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3959_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3959_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3959_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 345 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3960 for ECDSA, tcId is 346 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3960_pubkey[] = { 0x3e, 0x4f, 0xa1, 0x64, 0x64, 0xba, 0x76, 0x2f, 0x06, 0xe7, 0xce, 0xc2, 0xfc, 0xbf, 0x66, 0x26, 0x9f, 0xf7, 0x42, 0xc1, 0x0a, 0x53, 0x36, 0x12, 0x17, 0xf2, 0x05, 0x3e, 0x70, 0x6b, 0x30, 0x8f, 0xa3, 0x6b, 0x5d, 0xe5, 0x86, 0x52, 0x3d, 0x32, 0x24, 0x4e, 0xea, 0x63, 0xa4, 0xd8, 0x6f, 0x21, 0x59, 0x30, 0xea, 0xe2, 0xbf, 0x99, 0x80, 0x8e, }; static const unsigned char ecdsa_secp224r1_sha3_256_3960_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3960_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3960 = { .name = "ecdsa_secp224r1_sha3_256_3960", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3960_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3960_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3960_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 346 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3961 for ECDSA, tcId is 347 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3961_pubkey[] = { 0x48, 0x25, 0xb3, 0x11, 0xea, 0x6b, 0x6a, 0xd8, 0x6e, 0xb6, 0xf8, 0xfe, 0x9d, 0x29, 0xee, 0xad, 0x7a, 0x7a, 0x93, 0xda, 0xaf, 0xaf, 0xfa, 0xe3, 0x56, 0xa7, 0x85, 0xb4, 0x73, 0x16, 0x0b, 0x43, 0x6b, 0x48, 0x94, 0xf5, 0xee, 0x3f, 0x50, 0x28, 0x8d, 0xbd, 0xb6, 0x6f, 0xe1, 0xc0, 0x8f, 0x94, 0xf6, 0x77, 0xec, 0xdc, 0x5e, 0xee, 0x6e, 0x44, }; static const unsigned char ecdsa_secp224r1_sha3_256_3961_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3961_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3961 = { .name = "ecdsa_secp224r1_sha3_256_3961", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3961_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3961_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3961_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 347 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3962 for ECDSA, tcId is 348 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3962_pubkey[] = { 0x23, 0x5c, 0x61, 0x0a, 0xfc, 0xdc, 0x0a, 0x22, 0xf8, 0x4d, 0x75, 0x3b, 0x1f, 0x7b, 0x9c, 0xee, 0x38, 0x8f, 0x8f, 0x5d, 0x68, 0x12, 0x70, 0x46, 0x50, 0x0b, 0x4f, 0x1a, 0x60, 0x5e, 0x49, 0x16, 0x84, 0x29, 0xc4, 0x4e, 0x19, 0x0d, 0x36, 0x12, 0xf3, 0x55, 0xbd, 0x7e, 0x63, 0x97, 0x8f, 0xb6, 0xc9, 0xa6, 0x1d, 0xcd, 0x53, 0xb1, 0x38, 0x21, }; static const unsigned char ecdsa_secp224r1_sha3_256_3962_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3962_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3962 = { .name = "ecdsa_secp224r1_sha3_256_3962", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3962_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3962_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3962_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 348 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3963 for ECDSA, tcId is 349 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3963_pubkey[] = { 0x9f, 0x77, 0x90, 0x6d, 0x35, 0x3c, 0x1b, 0x86, 0x2e, 0xc4, 0x79, 0x46, 0x87, 0xc6, 0x9f, 0xa5, 0x06, 0x40, 0x5c, 0x4d, 0x0b, 0x57, 0xf4, 0xef, 0x84, 0x91, 0xdb, 0xa7, 0xce, 0x9e, 0x81, 0x0a, 0xf6, 0x5e, 0xdf, 0x1a, 0xe5, 0x83, 0xe6, 0xf9, 0xd6, 0xf2, 0xdd, 0xbc, 0x01, 0x36, 0x5e, 0x1e, 0x74, 0x4f, 0x29, 0x87, 0xaf, 0x55, 0x27, 0xe0, }; static const unsigned char ecdsa_secp224r1_sha3_256_3963_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3963_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3963 = { .name = "ecdsa_secp224r1_sha3_256_3963", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3963_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3963_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3963_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 349 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3964 for ECDSA, tcId is 350 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3964_pubkey[] = { 0x31, 0x69, 0x9a, 0x00, 0x79, 0x05, 0x8d, 0x60, 0x4e, 0xd7, 0xf8, 0x7c, 0x9a, 0xeb, 0x44, 0xbf, 0x19, 0x78, 0x52, 0x7b, 0xfe, 0x01, 0x02, 0x5a, 0x0c, 0xdd, 0x2a, 0x0b, 0xeb, 0x91, 0x98, 0x83, 0x75, 0x3f, 0x88, 0x0b, 0x47, 0xd0, 0x6a, 0x1a, 0xcc, 0xcd, 0xf7, 0xd7, 0x7b, 0xf9, 0x84, 0xfa, 0x48, 0xf2, 0x6c, 0x95, 0x9b, 0x12, 0xfe, 0x7a, }; static const unsigned char ecdsa_secp224r1_sha3_256_3964_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3964_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3964 = { .name = "ecdsa_secp224r1_sha3_256_3964", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3964_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3964_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3964_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 350 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3965 for ECDSA, tcId is 351 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3965_pubkey[] = { 0x3f, 0xfe, 0x72, 0x30, 0x47, 0x7f, 0xe2, 0xba, 0x4c, 0x3f, 0xd5, 0x4a, 0xb1, 0xda, 0x6f, 0xe0, 0xc2, 0x9e, 0xaa, 0x5b, 0x6c, 0x18, 0x98, 0x2e, 0xb7, 0x03, 0x8a, 0x2f, 0x39, 0x11, 0x69, 0x9a, 0xd8, 0xe6, 0xc7, 0x13, 0xa7, 0xdd, 0xb2, 0xc7, 0xd5, 0x69, 0xf1, 0xae, 0x64, 0x8b, 0x14, 0x00, 0x11, 0x5e, 0x41, 0x6b, 0x2b, 0xe7, 0x4c, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_256_3965_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3965_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3965 = { .name = "ecdsa_secp224r1_sha3_256_3965", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3965_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3965_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3965_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 351 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3966 for ECDSA, tcId is 352 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3966_pubkey[] = { 0x4a, 0xbf, 0x00, 0xbb, 0x45, 0x59, 0x2c, 0xbf, 0xde, 0x38, 0xb5, 0x38, 0x1d, 0x18, 0x47, 0xbd, 0x88, 0x16, 0xd9, 0x11, 0x3a, 0x99, 0xb1, 0x8b, 0x7d, 0x1a, 0x0e, 0x07, 0x1f, 0x47, 0xd0, 0xc5, 0x0e, 0x55, 0x06, 0xc0, 0x6a, 0xf9, 0xe4, 0xdb, 0x68, 0xad, 0x58, 0x81, 0x8f, 0xff, 0x05, 0xdf, 0x01, 0x16, 0x04, 0x8a, 0x04, 0x18, 0xb9, 0x51, }; static const unsigned char ecdsa_secp224r1_sha3_256_3966_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3966_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3966 = { .name = "ecdsa_secp224r1_sha3_256_3966", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3966_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3966_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3966_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 352 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3967 for ECDSA, tcId is 353 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3967_pubkey[] = { 0x17, 0x56, 0x47, 0x64, 0xdd, 0xe6, 0xc5, 0xd5, 0xbc, 0x1f, 0xf0, 0xcc, 0x65, 0x47, 0x85, 0x22, 0xaa, 0x04, 0x92, 0xcc, 0xa7, 0xec, 0xde, 0x37, 0x4e, 0x50, 0x19, 0xec, 0xc1, 0x7e, 0x0c, 0xd3, 0x26, 0xb5, 0xa3, 0x0a, 0x51, 0x31, 0x09, 0x7d, 0xa6, 0x40, 0xea, 0x1f, 0x81, 0xb5, 0x77, 0xea, 0x98, 0xdf, 0x9e, 0x59, 0x06, 0x57, 0x43, 0x61, }; static const unsigned char ecdsa_secp224r1_sha3_256_3967_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3967_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3967 = { .name = "ecdsa_secp224r1_sha3_256_3967", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3967_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3967_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3967_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 353 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3968 for ECDSA, tcId is 354 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3968_pubkey[] = { 0xad, 0x72, 0x83, 0x13, 0xf5, 0x62, 0xdc, 0x22, 0x84, 0xa6, 0xf6, 0xc4, 0xa1, 0x02, 0xc5, 0x69, 0xc3, 0xbc, 0x73, 0x02, 0x79, 0x24, 0x8b, 0x15, 0xd7, 0x5d, 0xf1, 0x68, 0x0e, 0x90, 0x05, 0x06, 0xb8, 0xe4, 0x6b, 0xeb, 0x36, 0x60, 0x0b, 0xf2, 0xe2, 0xa0, 0xbd, 0xda, 0x49, 0x4d, 0xfe, 0x3f, 0xbb, 0x42, 0x21, 0xb4, 0x58, 0x79, 0x38, 0xd6, }; static const unsigned char ecdsa_secp224r1_sha3_256_3968_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3968_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3968 = { .name = "ecdsa_secp224r1_sha3_256_3968", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3968_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3968_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3968_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 354 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3969 for ECDSA, tcId is 355 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3969_pubkey[] = { 0x38, 0xb1, 0x85, 0xb1, 0xb7, 0xd7, 0x49, 0x7d, 0xb0, 0xeb, 0xb1, 0xf0, 0x99, 0x85, 0x75, 0x70, 0x6b, 0xdc, 0xc0, 0xc6, 0xb4, 0x30, 0x1c, 0x5c, 0x99, 0x08, 0x32, 0x10, 0xea, 0x4d, 0x43, 0x85, 0x4b, 0x92, 0xd8, 0xc3, 0xab, 0xa8, 0x16, 0x38, 0x03, 0x89, 0x30, 0x95, 0xf4, 0x48, 0xfd, 0x6b, 0xec, 0xcf, 0x5b, 0xa9, 0x0e, 0x6d, 0x07, 0x5e, }; static const unsigned char ecdsa_secp224r1_sha3_256_3969_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3969_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3969 = { .name = "ecdsa_secp224r1_sha3_256_3969", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3969_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3969_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3969_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 355 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3970 for ECDSA, tcId is 356 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3970_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3970_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3970_sig[] = { 0x57, 0x31, 0xb7, 0xc4, 0xbd, 0x04, 0xcb, 0x9e, 0xfb, 0x83, 0x69, 0x35, 0xff, 0x2e, 0x54, 0x7b, 0xf2, 0x90, 0x9f, 0x86, 0x82, 0x4a, 0xf4, 0xd8, 0xdf, 0x78, 0xac, 0xf7, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3970 = { .name = "ecdsa_secp224r1_sha3_256_3970", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3970_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3970_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3970_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 356 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3971 for ECDSA, tcId is 357 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3971_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_256_3971_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3971_sig[] = { 0xa8, 0xce, 0x48, 0x3b, 0x42, 0xfb, 0x34, 0x61, 0x04, 0x7c, 0x96, 0xca, 0x00, 0xd0, 0xc2, 0x26, 0xee, 0x28, 0x50, 0xb7, 0x91, 0x92, 0x34, 0x6c, 0x7c, 0xe3, 0x7d, 0x46, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3971 = { .name = "ecdsa_secp224r1_sha3_256_3971", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3971_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3971_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3971_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 357 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3972 for ECDSA, tcId is 358 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3972_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha3_256_3972_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3972_sig[] = { 0x57, 0x31, 0xb7, 0xc4, 0xbd, 0x04, 0xcb, 0x9e, 0xfb, 0x83, 0x69, 0x35, 0xff, 0x2e, 0x54, 0x7b, 0xf2, 0x90, 0x9f, 0x86, 0x82, 0x4a, 0xf4, 0xd8, 0xdf, 0x78, 0xac, 0xf7, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3972 = { .name = "ecdsa_secp224r1_sha3_256_3972", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3972_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3972_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3972_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 358 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3973 for ECDSA, tcId is 359 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3973_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha3_256_3973_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3973_sig[] = { 0xa8, 0xce, 0x48, 0x3b, 0x42, 0xfb, 0x34, 0x61, 0x04, 0x7c, 0x96, 0xca, 0x00, 0xd0, 0xc2, 0x26, 0xee, 0x28, 0x50, 0xb7, 0x91, 0x92, 0x34, 0x6c, 0x7c, 0xe3, 0x7d, 0x46, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3973 = { .name = "ecdsa_secp224r1_sha3_256_3973", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3973_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3973_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3973_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 359 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3974 for ECDSA, tcId is 360 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3974_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_256_3974_sig[] = { 0x2a, 0x8e, 0x4f, 0xc8, 0xc8, 0x13, 0xbe, 0x04, 0x59, 0xfe, 0x6f, 0xd5, 0xa4, 0x49, 0xfc, 0xd2, 0x71, 0x18, 0x12, 0x11, 0x80, 0xf3, 0x7f, 0x96, 0x85, 0x74, 0x98, 0xfb, 0x48, 0x7f, 0xab, 0xaa, 0xbe, 0xe7, 0x9f, 0x66, 0x7d, 0xa6, 0x50, 0x5c, 0x5c, 0x17, 0x1d, 0x29, 0x97, 0x32, 0xd3, 0x77, 0x84, 0xfd, 0x73, 0x77, 0x5d, 0xfd, 0x3d, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3974 = { .name = "ecdsa_secp224r1_sha3_256_3974", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3974_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha3_256_3974_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 360 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3975 for ECDSA, tcId is 361 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3975_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_256_3975_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha3_256_3975_sig[] = { 0x1e, 0x5a, 0x15, 0x19, 0x0a, 0x1d, 0x26, 0x31, 0xf2, 0x22, 0x2d, 0x70, 0x44, 0x89, 0x04, 0x1f, 0x72, 0xe0, 0xc5, 0x05, 0x48, 0xfd, 0x52, 0x6e, 0xda, 0x97, 0x5e, 0x1f, 0xeb, 0xff, 0x8d, 0xcb, 0x8c, 0x11, 0x34, 0xac, 0x5d, 0xfb, 0x27, 0x11, 0x82, 0x49, 0x55, 0x90, 0xfc, 0x8f, 0xd8, 0xea, 0x7b, 0x0a, 0x4f, 0x7f, 0x8e, 0xc7, 0x89, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3975 = { .name = "ecdsa_secp224r1_sha3_256_3975", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3975_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3975_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha3_256_3975_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 361 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3976 for ECDSA, tcId is 362 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3976_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_256_3976_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_256_3976_sig[] = { 0x29, 0x5e, 0x39, 0x9c, 0xbf, 0x49, 0x04, 0xe2, 0x28, 0x50, 0x24, 0x05, 0x98, 0xe0, 0x09, 0xd6, 0xb4, 0x0d, 0x63, 0x91, 0xe3, 0x70, 0xab, 0xa5, 0xa0, 0x40, 0x42, 0xd9, 0x2a, 0x0c, 0x58, 0x41, 0x56, 0x02, 0x71, 0xa3, 0x8c, 0x7b, 0x7c, 0x3b, 0xb0, 0x64, 0x99, 0x0e, 0x20, 0x4b, 0xae, 0x69, 0x3e, 0x21, 0x71, 0xa2, 0x46, 0x94, 0x2d, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3976 = { .name = "ecdsa_secp224r1_sha3_256_3976", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3976_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3976_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_256_3976_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 362 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3977 for ECDSA, tcId is 363 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3977_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_256_3977_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_256_3977_sig[] = { 0xf0, 0x4e, 0x2d, 0xc4, 0xd8, 0xf0, 0x1d, 0xe6, 0x9a, 0x5b, 0xae, 0x38, 0xd0, 0x86, 0x9b, 0xe1, 0x92, 0x6e, 0x0c, 0xa7, 0x5a, 0x64, 0x1f, 0x2f, 0xcd, 0x77, 0x84, 0xd7, 0x96, 0x13, 0x01, 0x22, 0x33, 0xdb, 0x11, 0x5b, 0xa1, 0x80, 0xf7, 0x36, 0x3a, 0xaf, 0xbd, 0xe0, 0x9d, 0xc0, 0xa5, 0xeb, 0xb6, 0x70, 0x76, 0x13, 0x83, 0x8a, 0x14, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3977 = { .name = "ecdsa_secp224r1_sha3_256_3977", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3977_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3977_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha3_256_3977_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 363 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3978 for ECDSA, tcId is 364 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3978_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_256_3978_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3978_sig[] = { 0x40, 0x07, 0x00, 0x8e, 0x43, 0x02, 0x02, 0xf9, 0x57, 0x7e, 0x43, 0xa0, 0xb2, 0x1f, 0xfd, 0x16, 0x9c, 0x04, 0x6d, 0x5b, 0xf3, 0x5c, 0x2b, 0x53, 0x01, 0x15, 0xa6, 0x18, 0xd8, 0x45, 0xd2, 0x7c, 0x3a, 0xb6, 0xd1, 0xf8, 0x18, 0x81, 0xf1, 0xc5, 0xf9, 0x80, 0xd1, 0xc2, 0x58, 0x44, 0xa4, 0x84, 0xa8, 0x7c, 0x99, 0x05, 0x8d, 0x76, 0xe3, 0xb5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3978 = { .name = "ecdsa_secp224r1_sha3_256_3978", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3978_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3978_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3978_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 364 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3979 for ECDSA, tcId is 365 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3979_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_256_3979_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3979_sig[] = { 0x91, 0x7e, 0x78, 0x5e, 0x5e, 0x04, 0x32, 0xf5, 0x97, 0xd1, 0x0d, 0xc4, 0x00, 0x72, 0x5a, 0x03, 0x44, 0xcf, 0x48, 0x56, 0xbe, 0x31, 0x39, 0x05, 0x73, 0xa1, 0xea, 0xf3, 0xb8, 0x5d, 0x30, 0x90, 0x11, 0x95, 0xe0, 0x5c, 0xbe, 0xf0, 0xe2, 0x82, 0xa0, 0x79, 0xf5, 0xc2, 0x29, 0xea, 0xe8, 0xeb, 0x28, 0x2b, 0xe9, 0x17, 0x6d, 0xf9, 0xed, 0x88, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3979 = { .name = "ecdsa_secp224r1_sha3_256_3979", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3979_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3979_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3979_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 365 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3980 for ECDSA, tcId is 366 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3980_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_256_3980_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3980_sig[] = { 0x3e, 0x4f, 0x98, 0x83, 0xf7, 0xac, 0xaa, 0xdf, 0x2a, 0x07, 0x62, 0x34, 0xfa, 0x99, 0xfd, 0x25, 0xa5, 0xd8, 0x36, 0x9f, 0xb7, 0x76, 0x6a, 0xa5, 0xb2, 0xeb, 0x3f, 0xd2, 0x42, 0xcb, 0x3e, 0x2e, 0xb9, 0xf5, 0x43, 0x1f, 0xca, 0x4a, 0x7e, 0xc8, 0x36, 0x37, 0xac, 0xa9, 0x2f, 0xbe, 0xbe, 0x8a, 0xfa, 0x4a, 0xb4, 0xbc, 0xed, 0x10, 0x88, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3980 = { .name = "ecdsa_secp224r1_sha3_256_3980", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3980_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3980_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3980_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 366 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3981 for ECDSA, tcId is 367 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3981_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_256_3981_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3981_sig[] = { 0xf3, 0x3a, 0x24, 0xa2, 0xcd, 0x64, 0xf4, 0x1d, 0x98, 0x1f, 0xfa, 0x97, 0xc2, 0x4c, 0xb7, 0x3d, 0x28, 0x37, 0x91, 0x46, 0x82, 0x4c, 0x8d, 0x4c, 0x77, 0xc3, 0x7f, 0x68, 0x70, 0x19, 0xa2, 0x7b, 0xc8, 0x7a, 0xb0, 0x6d, 0x3a, 0x31, 0x2b, 0x30, 0x27, 0x21, 0x51, 0x04, 0x04, 0x4a, 0xb9, 0xa9, 0x17, 0xde, 0x55, 0x42, 0x07, 0x1a, 0x57, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3981 = { .name = "ecdsa_secp224r1_sha3_256_3981", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3981_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3981_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3981_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 367 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3982 for ECDSA, tcId is 368 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3982_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_256_3982_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3982_sig[] = { 0xff, 0x96, 0x12, 0x28, 0xb9, 0x45, 0x51, 0xc2, 0x01, 0xbb, 0x61, 0xc1, 0x52, 0x86, 0xd1, 0x19, 0xe0, 0x2d, 0xb2, 0xf4, 0x5c, 0xdc, 0x66, 0x97, 0x9d, 0xeb, 0xb3, 0xa1, 0x34, 0xa4, 0x90, 0x22, 0x1e, 0x2b, 0xf3, 0x09, 0x7d, 0x36, 0x9f, 0x3f, 0xcf, 0x9c, 0x65, 0x07, 0xa5, 0x67, 0x80, 0x05, 0x1f, 0x54, 0xff, 0x96, 0x1f, 0x77, 0x3e, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3982 = { .name = "ecdsa_secp224r1_sha3_256_3982", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3982_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3982_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3982_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 368 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3983 for ECDSA, tcId is 369 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3983_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_256_3983_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3983_sig[] = { 0xdd, 0xce, 0xd5, 0x2b, 0xca, 0x96, 0x40, 0xb1, 0xa1, 0xa7, 0xf8, 0x5b, 0xb1, 0x2d, 0x8c, 0xf3, 0x6f, 0x0c, 0xd6, 0x0b, 0x27, 0xec, 0xdd, 0xd2, 0xa9, 0x44, 0xdc, 0x49, 0x82, 0x6b, 0x3c, 0x1a, 0x83, 0x9d, 0xa5, 0x4a, 0x8b, 0xee, 0xec, 0xe6, 0x9d, 0xa8, 0x68, 0x1c, 0x64, 0x3f, 0xec, 0x79, 0x39, 0x4d, 0x98, 0x2d, 0xbf, 0x0c, 0x68, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3983 = { .name = "ecdsa_secp224r1_sha3_256_3983", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3983_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3983_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3983_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 369 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3984 for ECDSA, tcId is 370 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3984_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_256_3984_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3984_sig[] = { 0xd8, 0xf0, 0xe2, 0x9a, 0x42, 0x4b, 0xa0, 0xa5, 0x3d, 0xdc, 0xb8, 0xf4, 0x8f, 0xc4, 0xb6, 0x50, 0x19, 0xd0, 0x1e, 0x7e, 0x8d, 0xac, 0x3f, 0xf6, 0x38, 0x47, 0xdc, 0xd3, 0x62, 0xec, 0x0f, 0x1f, 0x7b, 0x36, 0x51, 0x2e, 0xe9, 0x8c, 0xae, 0x1f, 0xac, 0x6b, 0xae, 0x75, 0x05, 0xe8, 0x4e, 0x6e, 0xb2, 0x79, 0x62, 0x3e, 0x06, 0x4f, 0xa0, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3984 = { .name = "ecdsa_secp224r1_sha3_256_3984", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3984_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3984_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3984_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 370 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3985 for ECDSA, tcId is 371 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3985_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_256_3985_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3985_sig[] = { 0xf5, 0xdf, 0x25, 0x24, 0x9a, 0xdb, 0xa5, 0x71, 0x73, 0x54, 0xfe, 0xa1, 0x43, 0xb9, 0x37, 0x93, 0xf3, 0x2e, 0xa8, 0xba, 0x31, 0xcd, 0x37, 0x7f, 0x9b, 0xbb, 0x6e, 0xea, 0x61, 0x37, 0x6f, 0x02, 0xd5, 0xe7, 0x51, 0x7f, 0x1c, 0xd2, 0xa5, 0xc3, 0x6c, 0x45, 0x2a, 0x76, 0xde, 0xcb, 0x28, 0x2d, 0xae, 0xbf, 0xee, 0xa5, 0xa5, 0xb3, 0x2e, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3985 = { .name = "ecdsa_secp224r1_sha3_256_3985", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3985_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3985_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3985_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 371 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3986 for ECDSA, tcId is 372 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3986_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_256_3986_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3986_sig[] = { 0x4b, 0x9b, 0x6f, 0xef, 0xe1, 0x8c, 0x73, 0x27, 0x2e, 0xe6, 0x6a, 0xb9, 0x6f, 0xe3, 0x40, 0xb3, 0x83, 0x5b, 0x1f, 0x63, 0xf9, 0x03, 0xb1, 0xac, 0x76, 0xba, 0x34, 0x57, 0x0c, 0x58, 0x0a, 0x65, 0xc5, 0x3b, 0x48, 0xd1, 0x18, 0x0f, 0x09, 0x85, 0xfe, 0x0f, 0x9d, 0x5f, 0x57, 0xcf, 0x7e, 0xb5, 0xe5, 0x72, 0xb9, 0x71, 0x44, 0x11, 0xaa, 0x98, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3986 = { .name = "ecdsa_secp224r1_sha3_256_3986", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3986_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3986_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3986_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 372 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3987 for ECDSA, tcId is 373 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3987_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_256_3987_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3987_sig[] = { 0x6f, 0x72, 0xf5, 0x93, 0x4d, 0x17, 0xa1, 0x26, 0xd0, 0xd6, 0xfe, 0x0a, 0xfa, 0x59, 0x95, 0x88, 0xc5, 0x19, 0x63, 0x02, 0x3c, 0xe9, 0x3c, 0x31, 0x2e, 0xc7, 0x7b, 0xaf, 0xd5, 0xb4, 0xb9, 0x69, 0x43, 0xf5, 0x85, 0xcd, 0x15, 0x68, 0xa6, 0x17, 0xe7, 0xc4, 0x7b, 0x9d, 0xfa, 0xdd, 0xfb, 0x58, 0xbe, 0xc1, 0x3c, 0x57, 0xc1, 0x5a, 0x0a, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3987 = { .name = "ecdsa_secp224r1_sha3_256_3987", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3987_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3987_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3987_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 373 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3988 for ECDSA, tcId is 374 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3988_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_256_3988_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3988_sig[] = { 0x15, 0x79, 0xcb, 0xc7, 0x1f, 0x2c, 0x06, 0x7d, 0x14, 0x49, 0xc5, 0xea, 0xf3, 0x2e, 0x12, 0x1e, 0xca, 0x05, 0x7a, 0x35, 0xf3, 0x75, 0xbd, 0xc9, 0x3f, 0x77, 0x1a, 0x3c, 0xc5, 0xe8, 0x65, 0xac, 0xd2, 0x1b, 0x48, 0x0a, 0x65, 0x15, 0x0e, 0x70, 0x10, 0xe5, 0x07, 0x2c, 0xc5, 0xaa, 0xc1, 0x6e, 0x33, 0x16, 0xfa, 0x8f, 0xd3, 0x2a, 0x07, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3988 = { .name = "ecdsa_secp224r1_sha3_256_3988", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3988_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3988_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3988_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 374 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3989 for ECDSA, tcId is 375 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3989_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_256_3989_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3989_sig[] = { 0xee, 0x50, 0x1c, 0xaf, 0x39, 0x06, 0x34, 0xfc, 0x37, 0x57, 0xea, 0xd8, 0xe3, 0xf6, 0x2e, 0x5c, 0x8e, 0x86, 0xc0, 0x44, 0x82, 0x89, 0xae, 0x5d, 0xff, 0xc6, 0xa3, 0x0f, 0x36, 0xd3, 0x9f, 0x35, 0x60, 0xc5, 0xaf, 0xa0, 0x57, 0x87, 0x24, 0x87, 0x87, 0x23, 0x5e, 0x8e, 0xdd, 0x8c, 0x42, 0xe7, 0x13, 0xed, 0x43, 0xad, 0xfb, 0x82, 0x87, 0x9a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3989 = { .name = "ecdsa_secp224r1_sha3_256_3989", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3989_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3989_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3989_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 375 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3990 for ECDSA, tcId is 376 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3990_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3990_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3990_sig[] = { 0x71, 0x47, 0x96, 0xf7, 0xfe, 0x64, 0xf4, 0xde, 0x33, 0xbd, 0xd8, 0xea, 0xef, 0xf4, 0xe7, 0xe3, 0xa8, 0xea, 0x96, 0x64, 0xa0, 0xd3, 0x24, 0x9e, 0x07, 0xbd, 0xec, 0x4f, 0xec, 0x82, 0xe6, 0x4e, 0x1c, 0x6f, 0x65, 0x2d, 0x11, 0x98, 0xc2, 0x99, 0x6f, 0x89, 0x32, 0x22, 0xd9, 0x20, 0xd3, 0x6d, 0x7e, 0x38, 0x50, 0x7e, 0x86, 0xf3, 0x73, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3990 = { .name = "ecdsa_secp224r1_sha3_256_3990", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3990_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3990_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3990_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 376 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3991 for ECDSA, tcId is 377 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3991_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3991_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3991_sig[] = { 0xb0, 0x10, 0xd4, 0x89, 0xc9, 0x66, 0x1c, 0x1a, 0x28, 0x35, 0x37, 0x42, 0x88, 0x68, 0xc4, 0xb5, 0xbb, 0x29, 0xd9, 0x50, 0x3d, 0xe6, 0x97, 0xac, 0x57, 0x4d, 0x22, 0xfd, 0xec, 0x67, 0x7c, 0xa1, 0xc8, 0xb1, 0x2e, 0xb0, 0x30, 0x4c, 0xf0, 0x90, 0xd9, 0x52, 0xc6, 0x38, 0x01, 0xed, 0x9c, 0x82, 0xd7, 0x51, 0xdb, 0xd7, 0x6d, 0x4b, 0xc1, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3991 = { .name = "ecdsa_secp224r1_sha3_256_3991", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3991_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3991_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3991_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 377 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3992 for ECDSA, tcId is 378 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3992_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_256_3992_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3992_sig[] = { 0xa8, 0xfb, 0x6a, 0x1a, 0x55, 0x8c, 0xb2, 0x22, 0x15, 0x60, 0x20, 0x4b, 0xab, 0xed, 0xf6, 0xc4, 0x4d, 0x48, 0x10, 0x9e, 0xba, 0xe7, 0x8d, 0x27, 0xe7, 0x84, 0x05, 0x6b, 0x1e, 0x53, 0x2d, 0x50, 0xe0, 0xb6, 0x72, 0x1e, 0x93, 0x45, 0x24, 0x8f, 0xcc, 0x37, 0x59, 0x30, 0x77, 0xc4, 0xba, 0xb5, 0x75, 0xb5, 0x5d, 0x21, 0x6f, 0xa2, 0xa3, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3992 = { .name = "ecdsa_secp224r1_sha3_256_3992", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3992_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3992_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3992_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 378 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3993 for ECDSA, tcId is 379 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3993_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_256_3993_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3993_sig[] = { 0x80, 0x85, 0xd6, 0xb7, 0xf3, 0xd9, 0x79, 0x35, 0x6f, 0x2a, 0x21, 0x3b, 0xb2, 0x43, 0x74, 0x6e, 0xa6, 0x78, 0xe9, 0x6a, 0x70, 0x5e, 0x68, 0x93, 0xbf, 0x2a, 0x51, 0xf7, 0xb4, 0xd8, 0xbe, 0x5c, 0x3f, 0x99, 0x6e, 0xd4, 0x0a, 0xf1, 0x02, 0x4b, 0x3a, 0x8c, 0x9f, 0x65, 0xc9, 0x0e, 0xfb, 0x41, 0xd8, 0xc5, 0x98, 0x7a, 0xca, 0x11, 0x55, 0x24, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3993 = { .name = "ecdsa_secp224r1_sha3_256_3993", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3993_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3993_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3993_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 379 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3994 for ECDSA, tcId is 380 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3994_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_256_3994_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3994_sig[] = { 0x5f, 0x1a, 0xdb, 0xfc, 0xde, 0x7a, 0x0a, 0x92, 0x9f, 0x43, 0xba, 0x30, 0xe0, 0xd8, 0x8e, 0xa2, 0xad, 0xa5, 0xb4, 0xa8, 0xbb, 0xf5, 0x53, 0x36, 0xeb, 0x22, 0x8f, 0xdf, 0xea, 0xc9, 0x0d, 0x6f, 0x06, 0x79, 0xbd, 0xee, 0xfc, 0x42, 0x84, 0x02, 0x7c, 0x5e, 0x52, 0x7c, 0xab, 0x4c, 0xb2, 0x76, 0x19, 0x21, 0x77, 0x83, 0xfb, 0x2c, 0x42, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3994 = { .name = "ecdsa_secp224r1_sha3_256_3994", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3994_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3994_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3994_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 380 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3995 for ECDSA, tcId is 381 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3995_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_256_3995_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3995_sig[] = { 0x17, 0xb2, 0x0a, 0x24, 0x45, 0x7e, 0x94, 0xf8, 0xb8, 0x82, 0xa4, 0xfc, 0x99, 0x69, 0x2c, 0x2c, 0x44, 0xb5, 0xc8, 0x53, 0xb9, 0xc2, 0x34, 0xd0, 0x3a, 0xd4, 0x73, 0xb3, 0xb0, 0x3b, 0xf4, 0x7e, 0xa4, 0x53, 0x3e, 0x86, 0x22, 0x9b, 0x96, 0xc6, 0x52, 0x65, 0x42, 0x3f, 0x89, 0xda, 0xad, 0xb9, 0xf3, 0xf6, 0x9b, 0x0e, 0xe3, 0x7c, 0x21, 0xbf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3995 = { .name = "ecdsa_secp224r1_sha3_256_3995", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3995_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3995_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3995_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 381 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3996 for ECDSA, tcId is 382 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3996_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_256_3996_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3996_sig[] = { 0xfa, 0xcc, 0xc9, 0xc3, 0x8e, 0xbf, 0xa8, 0xe2, 0x74, 0x8d, 0x32, 0xf8, 0xc4, 0x1c, 0xc2, 0x91, 0xc4, 0xa2, 0xb2, 0x7c, 0xad, 0x4a, 0x41, 0x1e, 0x51, 0x19, 0xd1, 0x9b, 0x70, 0xe5, 0xba, 0x90, 0xa6, 0x5e, 0x03, 0x51, 0x55, 0x94, 0xc9, 0x19, 0xf1, 0x7e, 0xac, 0x4d, 0x80, 0x95, 0x96, 0xe6, 0xa2, 0x73, 0x5b, 0x61, 0x7b, 0x38, 0x52, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3996 = { .name = "ecdsa_secp224r1_sha3_256_3996", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3996_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3996_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3996_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 382 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3997 for ECDSA, tcId is 383 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3997_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_256_3997_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3997_sig[] = { 0x8f, 0x8e, 0x90, 0xc2, 0xa8, 0x30, 0x53, 0x45, 0x93, 0xbd, 0xf1, 0xe5, 0x61, 0x4e, 0xd9, 0xca, 0x75, 0xf8, 0x25, 0x39, 0x56, 0xd1, 0x75, 0x79, 0xa6, 0xa4, 0x53, 0x2d, 0x80, 0x0c, 0x2d, 0x43, 0xee, 0xa0, 0xb7, 0x21, 0x1f, 0x73, 0x9f, 0x4e, 0x75, 0xca, 0x56, 0x77, 0xea, 0x0e, 0xfb, 0x10, 0x9b, 0x09, 0x4a, 0xac, 0x35, 0x4a, 0xf6, 0x76, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3997 = { .name = "ecdsa_secp224r1_sha3_256_3997", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3997_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3997_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3997_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 383 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3998 for ECDSA, tcId is 384 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3998_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_256_3998_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3998_sig[] = { 0x27, 0x28, 0xcc, 0x30, 0x3c, 0x3e, 0xd5, 0x4a, 0x05, 0xa3, 0x71, 0xf1, 0x6a, 0xdd, 0x7c, 0x2d, 0xa6, 0xd2, 0x27, 0x7b, 0x80, 0xa9, 0x32, 0xb7, 0xb9, 0x74, 0x9d, 0xf7, 0xad, 0x2c, 0x93, 0xf8, 0x37, 0x23, 0xc1, 0x9e, 0x20, 0x38, 0x5f, 0xab, 0x91, 0x16, 0x18, 0x81, 0x14, 0xa1, 0x28, 0x0b, 0xe7, 0xd1, 0xfd, 0x9a, 0x66, 0x1e, 0x5e, 0x77, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3998 = { .name = "ecdsa_secp224r1_sha3_256_3998", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3998_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3998_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3998_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 384 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 3999 for ECDSA, tcId is 385 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_3999_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_256_3999_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_3999_sig[] = { 0x3a, 0x22, 0x4d, 0x4b, 0xaa, 0xa5, 0xd5, 0xc3, 0x32, 0xa3, 0xd6, 0x20, 0x43, 0xb1, 0xaa, 0xf6, 0x6b, 0x02, 0x98, 0x80, 0x01, 0x0c, 0x83, 0x9c, 0x5c, 0x03, 0x3a, 0xa3, 0x2d, 0xe8, 0x7b, 0x37, 0xb0, 0x30, 0x5c, 0xf6, 0x11, 0x2e, 0x0a, 0xc9, 0x42, 0x00, 0x11, 0x8f, 0xf4, 0x93, 0xc0, 0xa3, 0x79, 0xf4, 0xbe, 0xb0, 0xb6, 0x60, 0x2e, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_3999 = { .name = "ecdsa_secp224r1_sha3_256_3999", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_3999_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_3999_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_3999_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 385 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4000 for ECDSA, tcId is 386 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4000_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_256_4000_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4000_sig[] = { 0x91, 0x59, 0xaa, 0x74, 0xa8, 0x8b, 0x59, 0x17, 0x80, 0x96, 0x05, 0xe1, 0x47, 0x36, 0xa0, 0x0e, 0x92, 0xf4, 0xaa, 0xcd, 0xa2, 0xb8, 0x7d, 0xde, 0x95, 0x0a, 0x5f, 0xf8, 0x4b, 0xd4, 0x56, 0xc6, 0x91, 0x4c, 0xf2, 0x1c, 0x88, 0xbe, 0x0b, 0xc9, 0xc6, 0x4a, 0x3d, 0x0d, 0x7b, 0x2c, 0xbd, 0x5c, 0x77, 0x62, 0x97, 0xfe, 0xa3, 0xa1, 0x2f, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4000 = { .name = "ecdsa_secp224r1_sha3_256_4000", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4000_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4000_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4000_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 386 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4001 for ECDSA, tcId is 387 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4001_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_256_4001_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4001_sig[] = { 0x8b, 0x21, 0xed, 0x26, 0xd9, 0x45, 0x56, 0x13, 0xa0, 0x43, 0x1e, 0xdb, 0x41, 0xd4, 0x22, 0x7f, 0xc5, 0x71, 0x1d, 0x1a, 0x6c, 0x70, 0xe4, 0xe0, 0xde, 0x80, 0x17, 0x37, 0x25, 0x92, 0xbe, 0xcb, 0x96, 0x7e, 0x25, 0xd2, 0x34, 0xa2, 0x51, 0x69, 0x86, 0xc1, 0x8a, 0x1c, 0x68, 0x7b, 0x29, 0x69, 0xdb, 0x71, 0x78, 0xcd, 0x20, 0x4d, 0x30, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4001 = { .name = "ecdsa_secp224r1_sha3_256_4001", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4001_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4001_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4001_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 387 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4002 for ECDSA, tcId is 388 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4002_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_256_4002_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4002_sig[] = { 0x5c, 0x7c, 0x63, 0xa6, 0x3a, 0x69, 0x78, 0x7b, 0xfc, 0x46, 0x9a, 0xb7, 0x0a, 0x68, 0x56, 0xf7, 0xf3, 0x22, 0x44, 0x7f, 0x9c, 0xe7, 0x45, 0x73, 0xd0, 0xf9, 0x4d, 0x2d, 0x3e, 0x80, 0xff, 0x0a, 0x9f, 0xbd, 0x8c, 0x11, 0xa0, 0x8d, 0x7d, 0xc0, 0x22, 0x37, 0xe4, 0x35, 0x83, 0x8d, 0xe2, 0xd2, 0xb5, 0x1e, 0xec, 0x11, 0x56, 0xe6, 0x67, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4002 = { .name = "ecdsa_secp224r1_sha3_256_4002", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4002_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4002_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4002_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 388 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4003 for ECDSA, tcId is 389 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4003_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_256_4003_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4003_sig[] = { 0x03, 0x6b, 0x3f, 0x33, 0xcc, 0xc3, 0x47, 0xd6, 0xf0, 0xae, 0x2b, 0x9e, 0x79, 0xef, 0x85, 0x35, 0x1d, 0x06, 0xe6, 0x18, 0x70, 0xb1, 0xcb, 0x08, 0x05, 0x4c, 0x90, 0x9d, 0x9a, 0x27, 0xfe, 0x9d, 0x69, 0x9c, 0xf6, 0xe2, 0xc2, 0xed, 0x2e, 0xd7, 0x0c, 0x96, 0x92, 0xf1, 0xf6, 0xb9, 0x6f, 0xc5, 0xb4, 0xe5, 0x0d, 0x99, 0x26, 0xa7, 0x52, 0xad, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4003 = { .name = "ecdsa_secp224r1_sha3_256_4003", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4003_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4003_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4003_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 389 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4004 for ECDSA, tcId is 390 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4004_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_256_4004_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4004_sig[] = { 0x31, 0x31, 0xbc, 0xf9, 0x30, 0xd1, 0x13, 0x6d, 0xf1, 0x43, 0x6c, 0x47, 0x80, 0xc0, 0x95, 0xe0, 0x01, 0x70, 0xce, 0xcb, 0x92, 0x9f, 0x6e, 0xe7, 0x1c, 0x74, 0x58, 0xf7, 0xa1, 0xc6, 0xf0, 0xf9, 0x7c, 0xad, 0x15, 0x60, 0x78, 0xd2, 0x48, 0xfc, 0x7e, 0x79, 0x74, 0x04, 0x5d, 0x27, 0x88, 0x8e, 0x8f, 0x65, 0x28, 0xaf, 0x66, 0x04, 0x7f, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4004 = { .name = "ecdsa_secp224r1_sha3_256_4004", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4004_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4004_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4004_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 390 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4005 for ECDSA, tcId is 391 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4005_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_256_4005_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4005_sig[] = { 0x10, 0x23, 0xfa, 0x4d, 0x5d, 0xce, 0xda, 0xb5, 0x3a, 0x8f, 0xdf, 0xe2, 0xa8, 0xf8, 0xda, 0x94, 0x1b, 0xe0, 0x8c, 0x63, 0x14, 0x6e, 0x4b, 0xa2, 0xed, 0x87, 0xbd, 0x4d, 0x36, 0x7a, 0x88, 0xe3, 0x93, 0xfd, 0x1e, 0xe4, 0xec, 0x92, 0x5f, 0x7f, 0x92, 0x0d, 0x4c, 0x3f, 0xe3, 0xba, 0x48, 0xed, 0xbd, 0x25, 0x32, 0x61, 0xec, 0x70, 0x6c, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4005 = { .name = "ecdsa_secp224r1_sha3_256_4005", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4005_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4005_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4005_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 391 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4006 for ECDSA, tcId is 392 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4006_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_256_4006_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4006_sig[] = { 0xb5, 0x25, 0xfb, 0x62, 0x04, 0xd3, 0xd6, 0x0f, 0xd4, 0x06, 0xb1, 0x06, 0x6f, 0x0a, 0xe4, 0xbd, 0x7e, 0xc7, 0x5b, 0x0a, 0xdf, 0xd8, 0x07, 0xde, 0x82, 0x01, 0xf1, 0x0a, 0xfa, 0xed, 0x75, 0x7f, 0x5a, 0x68, 0xd8, 0xa8, 0x33, 0x87, 0x88, 0xea, 0x53, 0x1d, 0x6f, 0x7c, 0x85, 0xa8, 0x8c, 0x9a, 0x8b, 0xae, 0x7f, 0x69, 0x6e, 0xbb, 0x6e, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4006 = { .name = "ecdsa_secp224r1_sha3_256_4006", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4006_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4006_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4006_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 392 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4007 for ECDSA, tcId is 393 in file ecdsa_secp224r1_sha3_256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) static const unsigned char ecdsa_secp224r1_sha3_256_4007_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_256_4007_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_256_4007_sig[] = { 0xe4, 0x72, 0xe5, 0x04, 0xef, 0x4b, 0x29, 0x3b, 0x7f, 0x4a, 0x6c, 0xc9, 0x9b, 0xa3, 0x3a, 0x70, 0x2f, 0x35, 0x59, 0x3f, 0x49, 0xcb, 0x28, 0x41, 0x37, 0x77, 0x6b, 0x44, 0xc1, 0xef, 0xe4, 0x40, 0x46, 0x3f, 0xde, 0x3b, 0x60, 0x4d, 0x48, 0x31, 0x9e, 0x0d, 0xdb, 0x93, 0x26, 0x1a, 0xe6, 0x08, 0xd0, 0x09, 0x94, 0x2a, 0x01, 0x93, 0x32, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_256_4007 = { .name = "ecdsa_secp224r1_sha3_256_4007", .sig_alg = ECDSA, .hash = SHA3_256, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_256_4007_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_256_4007_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_256_4007_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 393 in file ecdsa_secp224r1_sha3_256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_256) */ /* Test 4008 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4008_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4008_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4008_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x35, 0x25, 0x07, 0xaa, 0xbd, 0x0f, 0x9b, 0xc2, 0x23, 0xe1, 0xac, 0x97, 0xa4, 0xcc, 0xb3, 0x3b, 0x9d, 0xe8, 0xad, 0x3d, 0xf4, 0x47, 0x03, 0x73, 0x67, 0xaa, 0x41, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4008 = { .name = "ecdsa_secp224r1_sha3_512_4008", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4008_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4008_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4008_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4009 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4009_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4009_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4009_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4009 = { .name = "ecdsa_secp224r1_sha3_512_4009", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4009_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4009_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4009_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of r misses leading 0, tcId is 2 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4010 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4010_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4010_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4010_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4010 = { .name = "ecdsa_secp224r1_sha3_512_4010", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4010_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4010_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4010_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of s misses leading 0, tcId is 3 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4011 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4011_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4011_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4011_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4011 = { .name = "ecdsa_secp224r1_sha3_512_4011", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4011_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4011_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4011_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 4 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4012 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4012_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4012_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4012_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4012 = { .name = "ecdsa_secp224r1_sha3_512_4012", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4012_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4012_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4012_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 5 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4013 for ECDSA, tcId is 6 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4013_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4013_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4013_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4013 = { .name = "ecdsa_secp224r1_sha3_512_4013", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4013_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4013_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4013_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 6 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4014 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4014_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4014_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4014_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4014 = { .name = "ecdsa_secp224r1_sha3_512_4014", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4014_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4014_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4014_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4015 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4015_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4015_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4015_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4015 = { .name = "ecdsa_secp224r1_sha3_512_4015", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4015_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4015_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4015_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 70 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4016 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4016_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4016_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4016_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4016 = { .name = "ecdsa_secp224r1_sha3_512_4016", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4016_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4016_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4016_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4017 for ECDSA, tcId is 72 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4017_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4017_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4017_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4017 = { .name = "ecdsa_secp224r1_sha3_512_4017", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4017_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4017_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4017_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 72 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4018 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4018_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4018_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4018_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x00, 0x00, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4018 = { .name = "ecdsa_secp224r1_sha3_512_4018", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4018_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4018_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4018_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4019 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4019_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4019_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4019_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4019 = { .name = "ecdsa_secp224r1_sha3_512_4019", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4019_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4019_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4019_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 95 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4020 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4020_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4020_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4020_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4020 = { .name = "ecdsa_secp224r1_sha3_512_4020", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4020_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4020_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4020_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4021 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4021_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4021_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4021_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4021 = { .name = "ecdsa_secp224r1_sha3_512_4021", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4021_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4021_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4021_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 97 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4022 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4022_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4022_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4022_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x05, 0x00, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4022 = { .name = "ecdsa_secp224r1_sha3_512_4022", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4022_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4022_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4022_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4023 for ECDSA, tcId is 100 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4023_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4023_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4023_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4023 = { .name = "ecdsa_secp224r1_sha3_512_4023", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4023_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4023_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4023_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 100 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4024 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4024_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4024_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4024_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4024 = { .name = "ecdsa_secp224r1_sha3_512_4024", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4024_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4024_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4024_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4025 for ECDSA, tcId is 116 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4025_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4025_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4025_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4025 = { .name = "ecdsa_secp224r1_sha3_512_4025", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4025_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4025_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4025_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 116 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4026 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4026_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4026_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4026_sig[] = { 0x02, 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4026 = { .name = "ecdsa_secp224r1_sha3_512_4026", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4026_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4026_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4026_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4027 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4027_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4027_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4027_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x02, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4027 = { .name = "ecdsa_secp224r1_sha3_512_4027", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4027_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4027_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4027_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 120 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4028 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4028_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4028_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4028_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0xe4, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4028 = { .name = "ecdsa_secp224r1_sha3_512_4028", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4028_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4028_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4028_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4029 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4029_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4029_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4029_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4029 = { .name = "ecdsa_secp224r1_sha3_512_4029", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4029_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4029_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4029_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 122 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4030 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4030_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4030_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4030_sig[] = { 0x00, 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4030 = { .name = "ecdsa_secp224r1_sha3_512_4030", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4030_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4030_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4030_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4031 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4031_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4031_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4031_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x00, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4031 = { .name = "ecdsa_secp224r1_sha3_512_4031", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4031_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4031_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4031_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4032 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4032_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4032_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4032_sig[] = { 0x00, 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4032 = { .name = "ecdsa_secp224r1_sha3_512_4032", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4032_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4032_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4032_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4033 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4033_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4033_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4033_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x00, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4033 = { .name = "ecdsa_secp224r1_sha3_512_4033", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4033_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4033_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4033_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp224r1_sha3_512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4034 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4034_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4034_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4034_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4034 = { .name = "ecdsa_secp224r1_sha3_512_4034", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4034_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4034_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4034_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4035 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4035_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4035_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4035_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4035 = { .name = "ecdsa_secp224r1_sha3_512_4035", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4035_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4035_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4035_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4036 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4036_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4036_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4036_sig[] = { 0x01, 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x3f, 0xfc, 0xdd, 0xb3, 0x1f, 0x81, 0x91, 0x9d, 0x99, 0xd1, 0x4a, 0x2a, 0x06, 0x7c, 0xa1, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4036 = { .name = "ecdsa_secp224r1_sha3_512_4036", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4036_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4036_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4036_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4037 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4037_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4037_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4037_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x41, 0xcf, 0x97, 0xf1, 0xad, 0xa1, 0x15, 0x75, 0xdf, 0x7e, 0xbf, 0x71, 0x4e, 0x28, 0x27, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4037 = { .name = "ecdsa_secp224r1_sha3_512_4037", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4037_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4037_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4037_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4038 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4038_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4038_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4038_sig[] = { 0x04, 0x58, 0xe0, 0xed, 0xa8, 0x43, 0xd9, 0x1f, 0x56, 0x62, 0xcc, 0xfd, 0xb3, 0xbf, 0x19, 0xc5, 0x2d, 0x99, 0x6e, 0xac, 0x76, 0x43, 0x57, 0xfb, 0x32, 0x55, 0xad, 0x9c, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4038 = { .name = "ecdsa_secp224r1_sha3_512_4038", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4038_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4038_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4038_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4039 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4039_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4039_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4039_sig[] = { 0x04, 0x58, 0xe0, 0xed, 0xa8, 0x43, 0xd9, 0x1f, 0x56, 0x62, 0xcc, 0xfd, 0xb3, 0xbe, 0x30, 0x68, 0x0e, 0x52, 0x5e, 0xea, 0x8a, 0x20, 0x81, 0x40, 0x8e, 0xb1, 0xd7, 0xd9, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4039 = { .name = "ecdsa_secp224r1_sha3_512_4039", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4039_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4039_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4039_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4040 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4040_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4040_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4040_sig[] = { 0xfe, 0x04, 0x58, 0xe0, 0xed, 0xa8, 0x43, 0xd9, 0x1f, 0x56, 0x62, 0xcc, 0xfd, 0xb3, 0xc0, 0x03, 0x22, 0x4c, 0xe0, 0x7e, 0x6e, 0x62, 0x66, 0x2e, 0xb5, 0xd5, 0xf9, 0x83, 0x5f, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4040 = { .name = "ecdsa_secp224r1_sha3_512_4040", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4040_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4040_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4040_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4041 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4041_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4041_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4041_sig[] = { 0x01, 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4041 = { .name = "ecdsa_secp224r1_sha3_512_4041", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4041_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4041_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4041_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4042 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4042_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4042_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4042_sig[] = { 0x04, 0x58, 0xe0, 0xed, 0xa8, 0x43, 0xd9, 0x1f, 0x56, 0x62, 0xcc, 0xfd, 0xb3, 0xbf, 0x19, 0xc5, 0x2d, 0x99, 0x6e, 0xac, 0x76, 0x43, 0x57, 0xfb, 0x32, 0x55, 0xad, 0x9c, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4042 = { .name = "ecdsa_secp224r1_sha3_512_4042", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4042_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4042_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4042_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4043 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4043_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4043_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4043_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x01, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x31, 0x7a, 0x0a, 0x23, 0x89, 0x33, 0x3e, 0x33, 0x73, 0x4f, 0x17, 0x51, 0x0e, 0x13, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4043 = { .name = "ecdsa_secp224r1_sha3_512_4043", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4043_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4043_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4043_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4044 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4044_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4044_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4044_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x33, 0x4c, 0xc4, 0x62, 0x17, 0x52, 0xc2, 0x0b, 0xb8, 0xfc, 0x8c, 0x98, 0x55, 0xbe, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4044 = { .name = "ecdsa_secp224r1_sha3_512_4044", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4044_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4044_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4044_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4045 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4045_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4045_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4045_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x35, 0x25, 0x07, 0xaa, 0xbd, 0x0f, 0x9b, 0xc2, 0x23, 0xe1, 0xac, 0x97, 0xa4, 0xcd, 0x9c, 0x98, 0xbd, 0x2f, 0xbc, 0xff, 0xe0, 0x69, 0xda, 0x2e, 0x0b, 0x4e, 0x16, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4045 = { .name = "ecdsa_secp224r1_sha3_512_4045", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4045_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4045_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4045_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4046 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4046_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4046_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4046_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0xfe, 0x35, 0x25, 0x07, 0xaa, 0xbd, 0x0f, 0x9b, 0xc2, 0x23, 0xe1, 0xac, 0x97, 0xa4, 0xce, 0x85, 0xf5, 0xdc, 0x76, 0xcc, 0xc1, 0xcc, 0x8c, 0xb0, 0xe8, 0xae, 0xf1, 0xec, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4046 = { .name = "ecdsa_secp224r1_sha3_512_4046", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4046_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4046_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4046_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4047 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4047_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4047_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4047_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x01, 0xca, 0xda, 0xf8, 0x55, 0x42, 0xf0, 0x64, 0x3d, 0xdc, 0x1e, 0x53, 0x68, 0x5b, 0x32, 0x63, 0x67, 0x42, 0xd0, 0x43, 0x00, 0x1f, 0x96, 0x25, 0xd1, 0xf4, 0xb1, 0xe9, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4047 = { .name = "ecdsa_secp224r1_sha3_512_4047", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4047_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4047_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4047_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4048 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4048_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4048_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4048_sig[] = { 0xfb, 0xa7, 0x1f, 0x12, 0x57, 0xbc, 0x26, 0xe0, 0xa9, 0x9d, 0x33, 0x02, 0x4c, 0x40, 0xe6, 0x3a, 0xd2, 0x66, 0x91, 0x53, 0x89, 0xbc, 0xa8, 0x04, 0xcd, 0xaa, 0x52, 0x64, 0x35, 0x25, 0x07, 0xaa, 0xbd, 0x0f, 0x9b, 0xc2, 0x23, 0xe1, 0xac, 0x97, 0xa4, 0xcd, 0x9c, 0x98, 0xbd, 0x2f, 0xbc, 0xff, 0xe0, 0x69, 0xda, 0x2e, 0x0b, 0x4e, 0x16, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4048 = { .name = "ecdsa_secp224r1_sha3_512_4048", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4048_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4048_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4048_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4049 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4049_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4049_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4049_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4049 = { .name = "ecdsa_secp224r1_sha3_512_4049", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4049_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4049_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4049_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4050 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4050_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4050_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4050_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4050 = { .name = "ecdsa_secp224r1_sha3_512_4050", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4050_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4050_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4050_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4051 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4051_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4051_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4051_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4051 = { .name = "ecdsa_secp224r1_sha3_512_4051", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4051_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4051_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4051_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4052 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4052_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4052_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4052_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4052 = { .name = "ecdsa_secp224r1_sha3_512_4052", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4052_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4052_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4052_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4053 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4053_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4053_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4053_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4053 = { .name = "ecdsa_secp224r1_sha3_512_4053", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4053_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4053_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4053_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4054 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4054_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4054_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4054_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4054 = { .name = "ecdsa_secp224r1_sha3_512_4054", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4054_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4054_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4054_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4055 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4055_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4055_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4055_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4055 = { .name = "ecdsa_secp224r1_sha3_512_4055", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4055_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4055_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4055_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4056 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4056_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4056_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4056_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4056 = { .name = "ecdsa_secp224r1_sha3_512_4056", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4056_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4056_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4056_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4057 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4057_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4057_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4057_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4057 = { .name = "ecdsa_secp224r1_sha3_512_4057", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4057_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4057_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4057_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4058 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4058_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4058_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4058_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4058 = { .name = "ecdsa_secp224r1_sha3_512_4058", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4058_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4058_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4058_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4059 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4059_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4059_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4059_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4059 = { .name = "ecdsa_secp224r1_sha3_512_4059", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4059_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4059_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4059_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4060 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4060_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4060_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4060_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4060 = { .name = "ecdsa_secp224r1_sha3_512_4060", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4060_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4060_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4060_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4061 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4061_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4061_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4061_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4061 = { .name = "ecdsa_secp224r1_sha3_512_4061", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4061_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4061_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4061_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4062 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4062_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4062_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4062_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4062 = { .name = "ecdsa_secp224r1_sha3_512_4062", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4062_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4062_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4062_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4063 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4063_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4063_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4063_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4063 = { .name = "ecdsa_secp224r1_sha3_512_4063", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4063_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4063_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4063_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4064 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4064_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4064_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4064_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4064 = { .name = "ecdsa_secp224r1_sha3_512_4064", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4064_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4064_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4064_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4065 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4065_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4065_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4065_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4065 = { .name = "ecdsa_secp224r1_sha3_512_4065", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4065_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4065_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4065_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4066 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4066_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4066_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4066_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4066 = { .name = "ecdsa_secp224r1_sha3_512_4066", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4066_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4066_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4066_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4067 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4067_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4067_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4067_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4067 = { .name = "ecdsa_secp224r1_sha3_512_4067", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4067_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4067_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4067_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4068 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4068_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4068_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4068_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4068 = { .name = "ecdsa_secp224r1_sha3_512_4068", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4068_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4068_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4068_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4069 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4069_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4069_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4069_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4069 = { .name = "ecdsa_secp224r1_sha3_512_4069", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4069_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4069_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4069_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4070 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4070_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4070_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4070_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4070 = { .name = "ecdsa_secp224r1_sha3_512_4070", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4070_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4070_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4070_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4071 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4071_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4071_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4071_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4071 = { .name = "ecdsa_secp224r1_sha3_512_4071", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4071_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4071_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4071_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4072 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4072_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4072_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4072_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4072 = { .name = "ecdsa_secp224r1_sha3_512_4072", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4072_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4072_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4072_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4073 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4073_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4073_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4073_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4073 = { .name = "ecdsa_secp224r1_sha3_512_4073", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4073_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4073_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4073_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4074 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4074_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4074_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4074_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4074 = { .name = "ecdsa_secp224r1_sha3_512_4074", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4074_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4074_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4074_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4075 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4075_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4075_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4075_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4075 = { .name = "ecdsa_secp224r1_sha3_512_4075", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4075_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4075_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4075_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4076 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4076_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4076_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4076_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4076 = { .name = "ecdsa_secp224r1_sha3_512_4076", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4076_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4076_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4076_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4077 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4077_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4077_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4077_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4077 = { .name = "ecdsa_secp224r1_sha3_512_4077", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4077_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4077_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4077_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4078 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4078_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4078_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4078_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4078 = { .name = "ecdsa_secp224r1_sha3_512_4078", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4078_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4078_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4078_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4079 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4079_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4079_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4079_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4079 = { .name = "ecdsa_secp224r1_sha3_512_4079", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4079_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4079_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4079_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4080 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4080_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4080_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4080_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4080 = { .name = "ecdsa_secp224r1_sha3_512_4080", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4080_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4080_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4080_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4081 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4081_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4081_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4081_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4081 = { .name = "ecdsa_secp224r1_sha3_512_4081", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4081_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4081_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4081_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4082 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4082_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4082_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4082_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4082 = { .name = "ecdsa_secp224r1_sha3_512_4082", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4082_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4082_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4082_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4083 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4083_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4083_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4083_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4083 = { .name = "ecdsa_secp224r1_sha3_512_4083", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4083_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4083_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4083_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4084 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4084_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4084_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4084_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4084 = { .name = "ecdsa_secp224r1_sha3_512_4084", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4084_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4084_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4084_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4085 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4085_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4085_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4085_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4085 = { .name = "ecdsa_secp224r1_sha3_512_4085", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4085_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4085_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4085_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4086 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4086_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4086_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4086_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4086 = { .name = "ecdsa_secp224r1_sha3_512_4086", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4086_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4086_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4086_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4087 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4087_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4087_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4087_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4087 = { .name = "ecdsa_secp224r1_sha3_512_4087", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4087_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4087_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4087_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4088 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4088_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4088_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4088_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4088 = { .name = "ecdsa_secp224r1_sha3_512_4088", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4088_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4088_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4088_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4089 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4089_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4089_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4089_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4089 = { .name = "ecdsa_secp224r1_sha3_512_4089", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4089_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4089_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4089_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4090 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4090_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4090_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4090_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4090 = { .name = "ecdsa_secp224r1_sha3_512_4090", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4090_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4090_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4090_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4091 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4091_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4091_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4091_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4091 = { .name = "ecdsa_secp224r1_sha3_512_4091", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4091_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4091_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4091_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4092 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4092_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4092_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4092_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4092 = { .name = "ecdsa_secp224r1_sha3_512_4092", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4092_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4092_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4092_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4093 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4093_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4093_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4093_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4093 = { .name = "ecdsa_secp224r1_sha3_512_4093", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4093_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4093_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4093_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4094 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4094_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4094_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4094_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4094 = { .name = "ecdsa_secp224r1_sha3_512_4094", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4094_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4094_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4094_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4095 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4095_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4095_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4095_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4095 = { .name = "ecdsa_secp224r1_sha3_512_4095", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4095_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4095_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4095_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4096 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4096_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4096_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4096_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4096 = { .name = "ecdsa_secp224r1_sha3_512_4096", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4096_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4096_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4096_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4097 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4097_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4097_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4097_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4097 = { .name = "ecdsa_secp224r1_sha3_512_4097", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4097_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4097_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4097_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4098 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4098_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4098_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4098_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4098 = { .name = "ecdsa_secp224r1_sha3_512_4098", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4098_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4098_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4098_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4099 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4099_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4099_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4099_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4099 = { .name = "ecdsa_secp224r1_sha3_512_4099", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4099_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4099_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4099_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4100 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4100_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4100_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4100_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4100 = { .name = "ecdsa_secp224r1_sha3_512_4100", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4100_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4100_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4100_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4101 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4101_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4101_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4101_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4101 = { .name = "ecdsa_secp224r1_sha3_512_4101", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4101_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4101_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4101_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4102 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4102_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4102_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4102_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4102 = { .name = "ecdsa_secp224r1_sha3_512_4102", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4102_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4102_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4102_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4103 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4103_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4103_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4103_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4103 = { .name = "ecdsa_secp224r1_sha3_512_4103", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4103_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4103_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4103_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4104 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4104_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4104_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4104_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4104 = { .name = "ecdsa_secp224r1_sha3_512_4104", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4104_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4104_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4104_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4105 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4105_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4105_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4105_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4105 = { .name = "ecdsa_secp224r1_sha3_512_4105", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4105_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4105_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4105_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4106 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4106_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4106_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4106_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4106 = { .name = "ecdsa_secp224r1_sha3_512_4106", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4106_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4106_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4106_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4107 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4107_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4107_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4107_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4107 = { .name = "ecdsa_secp224r1_sha3_512_4107", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4107_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4107_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4107_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4108 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4108_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4108_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4108_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4108 = { .name = "ecdsa_secp224r1_sha3_512_4108", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4108_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4108_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4108_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4109 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4109_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4109_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4109_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4109 = { .name = "ecdsa_secp224r1_sha3_512_4109", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4109_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4109_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4109_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4110 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4110_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4110_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4110_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4110 = { .name = "ecdsa_secp224r1_sha3_512_4110", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4110_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4110_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4110_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4111 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4111_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4111_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4111_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4111 = { .name = "ecdsa_secp224r1_sha3_512_4111", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4111_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4111_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4111_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4112 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4112_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4112_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4112_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4112 = { .name = "ecdsa_secp224r1_sha3_512_4112", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4112_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4112_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4112_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4113 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4113_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4113_msg[] = { 0x35, 0x31, 0x31, 0x30, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4113_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x91, 0x58, 0x96, 0x58, 0xcc, 0xb7, 0xce, 0xaf, 0x1f, 0x01, 0x74, 0x92, 0x45, 0x0e, 0x29, 0x15, 0xbb, 0x8d, 0x86, 0x3b, 0xb7, 0xf3, 0x98, 0xc8, 0xf5, 0xbc, 0x13, 0x87, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4113 = { .name = "ecdsa_secp224r1_sha3_512_4113", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4113_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4113_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha3_512_4113_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4114 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4114_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4114_msg[] = { 0x32, 0x37, 0x32, 0x39, 0x37, 0x32, 0x36, 0x34, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4114_sig[] = { 0x5e, 0xe2, 0x7f, 0x92, 0x64, 0xab, 0x53, 0x66, 0x1d, 0x3a, 0x7b, 0x8c, 0x85, 0x83, 0x00, 0xc6, 0xee, 0x59, 0x78, 0xa3, 0x0a, 0xe9, 0xb7, 0xe4, 0x13, 0xdd, 0x68, 0x0d, 0xf9, 0xe6, 0xc2, 0xaa, 0xb2, 0xaf, 0xed, 0x52, 0x3b, 0x01, 0x72, 0xba, 0x11, 0x0b, 0x5b, 0x0d, 0x66, 0x3a, 0x8f, 0x77, 0x22, 0x0b, 0xb8, 0x65, 0xce, 0xf2, 0x0f, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4114 = { .name = "ecdsa_secp224r1_sha3_512_4114", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4114_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4114_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4114_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4115 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4115_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4115_msg[] = { 0x34, 0x33, 0x31, 0x34, 0x37, 0x37, 0x36, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4115_sig[] = { 0x1b, 0xb6, 0xce, 0x51, 0xb7, 0xe5, 0x04, 0xcc, 0xd6, 0x9a, 0x91, 0x0a, 0x11, 0xa9, 0xc2, 0x9b, 0xa7, 0x71, 0x00, 0xd5, 0xbc, 0xcb, 0x17, 0x9d, 0xe1, 0x9a, 0x93, 0xdd, 0x77, 0x0a, 0x16, 0x0b, 0x26, 0x35, 0xbb, 0x29, 0x3c, 0x73, 0xa0, 0x7f, 0xb1, 0xfd, 0x5e, 0x03, 0x14, 0xb5, 0x01, 0x27, 0xab, 0x3e, 0x70, 0xd1, 0xab, 0x97, 0x4d, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4115 = { .name = "ecdsa_secp224r1_sha3_512_4115", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4115_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4115_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4115_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4116 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4116_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4116_msg[] = { 0x36, 0x36, 0x30, 0x33, 0x34, 0x33, 0x38, 0x30, 0x33, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4116_sig[] = { 0xfd, 0x8a, 0x1f, 0x6b, 0xa8, 0x79, 0x41, 0xc7, 0xa4, 0xcb, 0x8e, 0x98, 0x44, 0xfd, 0xba, 0x09, 0x9b, 0xc3, 0x00, 0x36, 0xca, 0xb0, 0xb8, 0x2d, 0xce, 0x68, 0x02, 0xac, 0x97, 0x32, 0xc1, 0xf2, 0x4f, 0xe6, 0xc3, 0xfa, 0x81, 0x13, 0xb7, 0x56, 0xc6, 0xb7, 0xe1, 0x52, 0x33, 0x75, 0xdb, 0xda, 0x78, 0x88, 0x95, 0x01, 0x8e, 0xbf, 0x02, 0x45, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4116 = { .name = "ecdsa_secp224r1_sha3_512_4116", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4116_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4116_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4116_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4117 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4117_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4117_msg[] = { 0x32, 0x38, 0x32, 0x39, 0x36, 0x32, 0x31, 0x34, 0x35, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4117_sig[] = { 0xcf, 0xd8, 0x28, 0xe8, 0xc9, 0xb0, 0xb1, 0x73, 0x63, 0x13, 0x65, 0x30, 0xaf, 0x0a, 0x54, 0xa2, 0x1a, 0x6c, 0xbf, 0xfa, 0x7a, 0x20, 0xa2, 0x57, 0x38, 0x51, 0x18, 0xff, 0x7b, 0xc8, 0x79, 0x16, 0x27, 0xfb, 0xb7, 0x4a, 0x63, 0xa7, 0x6c, 0x99, 0xf8, 0xbe, 0xe1, 0x32, 0x59, 0x87, 0xd0, 0xab, 0x2a, 0x15, 0xb0, 0xd5, 0x76, 0x04, 0x14, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4117 = { .name = "ecdsa_secp224r1_sha3_512_4117", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4117_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4117_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4117_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4118 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4118_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4118_msg[] = { 0x34, 0x33, 0x31, 0x31, 0x38, 0x32, 0x31, 0x37, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4118_sig[] = { 0x35, 0xe4, 0x51, 0x49, 0xbd, 0xcd, 0xb5, 0x5a, 0xe3, 0x7a, 0x3a, 0x29, 0x37, 0xd2, 0xd0, 0x3a, 0x65, 0x75, 0x4e, 0x29, 0x60, 0x5d, 0xcc, 0x50, 0x76, 0xd2, 0x0a, 0xa7, 0xba, 0x6f, 0x5e, 0xb0, 0x5d, 0xa4, 0xfa, 0x57, 0x21, 0x7e, 0xfc, 0xc0, 0x3e, 0x8f, 0x59, 0xa3, 0x5a, 0xfb, 0x6c, 0x20, 0x43, 0xda, 0x8f, 0xfc, 0xdb, 0xfe, 0xa1, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4118 = { .name = "ecdsa_secp224r1_sha3_512_4118", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4118_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4118_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4118_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4119 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4119_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4119_msg[] = { 0x31, 0x31, 0x37, 0x37, 0x30, 0x37, 0x37, 0x34, 0x31, 0x37, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4119_sig[] = { 0x3f, 0x5d, 0xfb, 0xa4, 0x48, 0x33, 0x92, 0x87, 0xd1, 0xba, 0xc9, 0x38, 0x30, 0xc8, 0x32, 0x22, 0x40, 0x8a, 0x7b, 0x51, 0x1a, 0xad, 0x1d, 0x5f, 0x53, 0x0d, 0xc6, 0xee, 0xf4, 0x72, 0x6e, 0xda, 0xb9, 0x12, 0x64, 0x10, 0x67, 0x92, 0xe4, 0x5f, 0x30, 0xc8, 0xb4, 0x89, 0xd2, 0x68, 0x29, 0x1d, 0x3c, 0x2a, 0x16, 0x65, 0x55, 0xde, 0xdf, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4119 = { .name = "ecdsa_secp224r1_sha3_512_4119", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4119_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4119_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4119_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4120 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4120_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4120_msg[] = { 0x31, 0x35, 0x39, 0x38, 0x35, 0x31, 0x35, 0x35, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4120_sig[] = { 0xab, 0x65, 0x41, 0x2c, 0x5d, 0xb5, 0x88, 0x24, 0x2b, 0x51, 0x64, 0x4d, 0xfe, 0x78, 0xd7, 0x25, 0x70, 0xe6, 0x6f, 0xf8, 0x46, 0xfe, 0xb2, 0x81, 0x12, 0xd2, 0x65, 0x1a, 0x87, 0xba, 0x5d, 0x4a, 0x58, 0xed, 0x79, 0x99, 0xf5, 0x02, 0xb7, 0x96, 0x26, 0xb4, 0x5a, 0x0f, 0xb1, 0x9f, 0xd8, 0xe4, 0x57, 0x2b, 0xc1, 0xb5, 0xd4, 0x9b, 0x3b, 0x76, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4120 = { .name = "ecdsa_secp224r1_sha3_512_4120", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4120_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4120_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4120_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4121 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4121_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4121_msg[] = { 0x32, 0x38, 0x38, 0x31, 0x31, 0x30, 0x31, 0x36, 0x31, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4121_sig[] = { 0x9e, 0xe1, 0xf0, 0xed, 0xcf, 0x13, 0xe9, 0x52, 0xd2, 0x1c, 0x30, 0xfc, 0x3c, 0x0c, 0x05, 0xa7, 0xb7, 0x46, 0x06, 0x03, 0x89, 0x3d, 0x95, 0x30, 0xd8, 0xe9, 0x02, 0x58, 0x48, 0xef, 0xc4, 0x3f, 0xc2, 0x3f, 0x36, 0xf8, 0x49, 0x70, 0xc9, 0xdf, 0x74, 0xfb, 0x1a, 0x3e, 0x16, 0x3e, 0x95, 0xa1, 0x06, 0x3f, 0xb3, 0xba, 0x96, 0x6e, 0x3e, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4121 = { .name = "ecdsa_secp224r1_sha3_512_4121", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4121_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4121_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4121_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4122 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4122_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4122_msg[] = { 0x32, 0x30, 0x30, 0x34, 0x37, 0x38, 0x33, 0x33, 0x33, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4122_sig[] = { 0xb2, 0x79, 0x45, 0x2a, 0xe2, 0x4e, 0xb1, 0x3c, 0xdf, 0x7f, 0x08, 0x54, 0x40, 0x9a, 0x7a, 0x6c, 0x55, 0x6a, 0xe4, 0x2f, 0x59, 0x0a, 0xd5, 0xee, 0xb8, 0x74, 0xe2, 0x56, 0x2c, 0xc9, 0x6e, 0x8f, 0xf6, 0xe5, 0x23, 0xc2, 0xf1, 0x09, 0x08, 0x03, 0x51, 0xc8, 0xe1, 0x54, 0x2f, 0xe4, 0x05, 0x22, 0x7f, 0xf7, 0x54, 0x2f, 0x2f, 0x92, 0x4e, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4122 = { .name = "ecdsa_secp224r1_sha3_512_4122", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4122_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4122_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4122_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4123 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4123_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4123_msg[] = { 0x39, 0x35, 0x30, 0x30, 0x32, 0x34, 0x37, 0x37, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4123_sig[] = { 0x39, 0x8b, 0x59, 0xd0, 0xb6, 0xa7, 0x17, 0x1d, 0x35, 0x18, 0xd1, 0xd3, 0xef, 0x67, 0x96, 0xf1, 0x0a, 0x14, 0x25, 0x1a, 0xca, 0x56, 0x30, 0xfa, 0x32, 0x65, 0x57, 0x41, 0x42, 0x59, 0xd0, 0xed, 0xc9, 0xc2, 0xaa, 0xbc, 0x09, 0xc3, 0x7a, 0x69, 0x44, 0x4d, 0xf2, 0x4a, 0x51, 0x91, 0xe2, 0x1d, 0x38, 0x7b, 0x98, 0xb0, 0x80, 0x74, 0x52, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4123 = { .name = "ecdsa_secp224r1_sha3_512_4123", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4123_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4123_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4123_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4124 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4124_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4124_msg[] = { 0x32, 0x32, 0x30, 0x39, 0x35, 0x30, 0x30, 0x30, 0x36, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4124_sig[] = { 0xc0, 0x60, 0x48, 0x41, 0xfb, 0x5c, 0xaf, 0x4f, 0x4f, 0x2f, 0x91, 0xfc, 0x78, 0x04, 0x72, 0x93, 0x49, 0xf7, 0x96, 0xad, 0xeb, 0x30, 0x44, 0x86, 0xea, 0x57, 0x9e, 0x02, 0xda, 0xb8, 0x5b, 0x54, 0x30, 0x47, 0xef, 0x1f, 0x2c, 0x2b, 0xf9, 0xfe, 0xab, 0x25, 0xa6, 0xc1, 0xbf, 0xc8, 0x9e, 0x57, 0x34, 0xed, 0xd6, 0x9a, 0x3f, 0x8b, 0x09, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4124 = { .name = "ecdsa_secp224r1_sha3_512_4124", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4124_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4124_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4124_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4125 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4125_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4125_msg[] = { 0x38, 0x31, 0x39, 0x33, 0x37, 0x38, 0x39, 0x32, 0x32, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4125_sig[] = { 0x7f, 0x51, 0x27, 0xa8, 0x3c, 0x76, 0x55, 0x4f, 0xe4, 0xfc, 0xc0, 0x0e, 0xa6, 0xe6, 0x2b, 0x14, 0xc8, 0xa6, 0x75, 0x16, 0x8e, 0x60, 0xea, 0x9d, 0x6b, 0x1f, 0x03, 0x4d, 0x7a, 0xb4, 0xac, 0xa6, 0xa9, 0x31, 0x5c, 0x79, 0x59, 0x36, 0xfb, 0x41, 0xbc, 0xf4, 0x6a, 0x48, 0x40, 0xa1, 0xe4, 0x1a, 0x87, 0x4d, 0xdb, 0x1a, 0xd5, 0xb5, 0x50, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4125 = { .name = "ecdsa_secp224r1_sha3_512_4125", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4125_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4125_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4125_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4126 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4126_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4126_msg[] = { 0x33, 0x36, 0x35, 0x30, 0x36, 0x30, 0x33, 0x32, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4126_sig[] = { 0xac, 0xa0, 0xbf, 0x2b, 0xa5, 0x98, 0xaf, 0x7c, 0x37, 0xad, 0xb7, 0x61, 0x7d, 0xa4, 0xb1, 0xb2, 0xef, 0x93, 0xb8, 0x2b, 0x58, 0xf1, 0x16, 0x1d, 0xb8, 0x94, 0x9c, 0xe2, 0x86, 0xd0, 0xe4, 0x74, 0x3c, 0x15, 0xc7, 0x4b, 0x1a, 0xb3, 0x34, 0xe2, 0x36, 0xfc, 0xf2, 0x39, 0x76, 0xc7, 0x31, 0x49, 0x1c, 0x80, 0x8c, 0xc5, 0x50, 0x27, 0x52, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4126 = { .name = "ecdsa_secp224r1_sha3_512_4126", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4126_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4126_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4126_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4127 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4127_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4127_msg[] = { 0x31, 0x36, 0x33, 0x38, 0x33, 0x39, 0x35, 0x33, 0x35, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4127_sig[] = { 0x5f, 0xd0, 0xef, 0xe2, 0xe3, 0x60, 0x41, 0xcd, 0x23, 0x43, 0x1b, 0xb8, 0x5e, 0x2b, 0xc0, 0x38, 0x99, 0x4a, 0x70, 0x6f, 0xb9, 0xa4, 0x0e, 0xe8, 0xea, 0xf1, 0xe6, 0x64, 0xc4, 0x94, 0x18, 0x5a, 0xb2, 0xc6, 0xdf, 0xf6, 0x20, 0xf3, 0xd4, 0x8b, 0xca, 0x61, 0x30, 0xd4, 0xd5, 0x07, 0xe3, 0x5a, 0x00, 0x90, 0xeb, 0x27, 0xf1, 0x67, 0xbd, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4127 = { .name = "ecdsa_secp224r1_sha3_512_4127", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4127_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4127_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4127_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4128 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4128_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4128_msg[] = { 0x32, 0x30, 0x39, 0x31, 0x37, 0x36, 0x38, 0x32, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4128_sig[] = { 0x0f, 0x17, 0x3d, 0x33, 0x84, 0x04, 0x39, 0xb0, 0x07, 0x2b, 0x83, 0x15, 0xe7, 0x35, 0xf3, 0x73, 0x2a, 0x56, 0x57, 0x33, 0x4b, 0x9d, 0x8a, 0x90, 0xfa, 0xba, 0x69, 0x19, 0x9b, 0xe3, 0x35, 0xcd, 0x9d, 0x18, 0xcf, 0x81, 0xa4, 0xfa, 0xae, 0x61, 0x10, 0xf2, 0x53, 0x28, 0x81, 0xab, 0x57, 0xec, 0x71, 0xde, 0xd4, 0x48, 0x39, 0x0e, 0xa2, 0x24, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4128 = { .name = "ecdsa_secp224r1_sha3_512_4128", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4128_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4128_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4128_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4129 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4129_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4129_msg[] = { 0x39, 0x33, 0x36, 0x34, 0x37, 0x30, 0x32, 0x38, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4129_sig[] = { 0x60, 0x1f, 0x7b, 0xf1, 0x0b, 0xf2, 0x00, 0xa4, 0x83, 0x69, 0xd2, 0x22, 0xd9, 0xe4, 0x07, 0x66, 0x71, 0x33, 0x9a, 0xa9, 0x89, 0x55, 0xde, 0x31, 0xae, 0x7f, 0x45, 0x03, 0xa1, 0x1b, 0x5f, 0x8b, 0x77, 0x0d, 0x78, 0xaa, 0xb8, 0xce, 0x19, 0x18, 0xa6, 0x0b, 0x49, 0x6e, 0x37, 0x75, 0xe9, 0xf9, 0x09, 0x7b, 0xdb, 0xc5, 0x98, 0xc9, 0xe9, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4129 = { .name = "ecdsa_secp224r1_sha3_512_4129", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4129_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4129_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4129_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4130 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4130_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4130_msg[] = { 0x39, 0x32, 0x36, 0x38, 0x36, 0x38, 0x37, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4130_sig[] = { 0x07, 0xc3, 0x2d, 0xca, 0x0c, 0x28, 0xe0, 0xb3, 0xa1, 0x42, 0x94, 0x4b, 0x4f, 0x37, 0xa1, 0xb9, 0x29, 0x31, 0x75, 0xfb, 0xb5, 0x77, 0xce, 0x38, 0x64, 0x21, 0x54, 0xcc, 0xe4, 0x8d, 0x47, 0x87, 0x0a, 0xfc, 0x0f, 0x16, 0x93, 0x27, 0xcf, 0xba, 0xcf, 0x49, 0xdf, 0x87, 0xbf, 0x20, 0xa1, 0x3f, 0x5c, 0x2a, 0x57, 0x85, 0x4d, 0x21, 0x40, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4130 = { .name = "ecdsa_secp224r1_sha3_512_4130", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4130_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4130_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4130_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4131 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4131_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4131_msg[] = { 0x35, 0x31, 0x37, 0x38, 0x31, 0x33, 0x34, 0x38, 0x32, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4131_sig[] = { 0xca, 0x32, 0x8d, 0xba, 0x12, 0x9a, 0xe9, 0xa7, 0xb2, 0x73, 0xfd, 0x1b, 0x67, 0xd8, 0x43, 0xe0, 0x2d, 0x5b, 0xd2, 0xc4, 0xd7, 0x75, 0x14, 0x89, 0x1f, 0x2c, 0x08, 0xd5, 0x44, 0xae, 0x98, 0xaf, 0x8f, 0xa9, 0xd5, 0x15, 0x99, 0x5e, 0xe5, 0xa6, 0xfd, 0xf5, 0x68, 0x56, 0xc6, 0x7c, 0x4f, 0xe5, 0xf8, 0x83, 0x27, 0x81, 0x70, 0x4d, 0xac, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4131 = { .name = "ecdsa_secp224r1_sha3_512_4131", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4131_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4131_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4131_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4132 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4132_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4132_msg[] = { 0x34, 0x37, 0x33, 0x35, 0x30, 0x31, 0x30, 0x37, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4132_sig[] = { 0x6b, 0x00, 0xeb, 0xce, 0xdc, 0x8c, 0x30, 0x52, 0x10, 0x24, 0xd1, 0x5d, 0xfa, 0x14, 0x30, 0x4f, 0x8c, 0x59, 0x4a, 0xb8, 0xa1, 0x7e, 0xb3, 0xdf, 0x68, 0x39, 0x3b, 0x2e, 0x3a, 0x53, 0x18, 0x31, 0x03, 0xdd, 0x1b, 0x1e, 0xf8, 0x63, 0x1e, 0x7c, 0xaf, 0xe5, 0x10, 0xea, 0xc9, 0xab, 0x4c, 0x10, 0x16, 0x4d, 0xf2, 0x08, 0xc5, 0x98, 0xe2, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4132 = { .name = "ecdsa_secp224r1_sha3_512_4132", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4132_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4132_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4132_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4133 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4133_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4133_msg[] = { 0x31, 0x34, 0x33, 0x35, 0x33, 0x39, 0x31, 0x31, 0x36, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4133_sig[] = { 0x4c, 0xf2, 0x61, 0xaa, 0x66, 0x16, 0x50, 0x93, 0x19, 0x65, 0x30, 0x90, 0xab, 0xd7, 0x07, 0x20, 0x20, 0x26, 0x73, 0x3f, 0xd6, 0x4d, 0xdb, 0x14, 0xf2, 0xab, 0x26, 0xd3, 0xd8, 0xe3, 0x7f, 0xac, 0x62, 0x42, 0x0a, 0x7e, 0x99, 0x44, 0xe4, 0xb3, 0x19, 0xd5, 0xe7, 0x3d, 0x03, 0xb8, 0x7a, 0x58, 0x99, 0x71, 0xfe, 0xd7, 0x01, 0x2a, 0xda, 0x54, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4133 = { .name = "ecdsa_secp224r1_sha3_512_4133", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4133_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4133_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4133_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4134 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4134_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4134_msg[] = { 0x31, 0x33, 0x38, 0x34, 0x35, 0x34, 0x39, 0x32, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4134_sig[] = { 0x50, 0x4f, 0x2f, 0x50, 0xca, 0x93, 0x1e, 0x2a, 0x4f, 0x8c, 0xda, 0x0f, 0x08, 0xc2, 0xb7, 0x9e, 0xf0, 0x51, 0x67, 0x7d, 0x76, 0xa0, 0x8f, 0x18, 0x06, 0xc5, 0x3a, 0xf5, 0x73, 0x62, 0x48, 0x50, 0x1f, 0x06, 0x2b, 0x14, 0xbd, 0x3f, 0xee, 0x65, 0x28, 0x70, 0x0d, 0x1a, 0x64, 0xa8, 0xae, 0x30, 0xd7, 0xc7, 0x6e, 0x1a, 0x92, 0xb6, 0x6b, 0xad, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4134 = { .name = "ecdsa_secp224r1_sha3_512_4134", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4134_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4134_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4134_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4135 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4135_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4135_msg[] = { 0x32, 0x37, 0x36, 0x32, 0x31, 0x39, 0x32, 0x37, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4135_sig[] = { 0x79, 0xa5, 0x48, 0xe4, 0xda, 0x3b, 0x3d, 0xf4, 0xdf, 0x77, 0x4e, 0x7f, 0xb9, 0xdc, 0x4a, 0xf0, 0x70, 0x66, 0x35, 0xc4, 0x54, 0xe9, 0xe2, 0x3c, 0x2a, 0xa2, 0x97, 0x52, 0xb7, 0x40, 0x69, 0xec, 0xca, 0xef, 0xba, 0x00, 0xa7, 0x1f, 0x33, 0xb4, 0x3f, 0x69, 0xea, 0xa3, 0x21, 0xdc, 0x58, 0x43, 0x6e, 0xba, 0xfb, 0xcd, 0x57, 0x46, 0x60, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4135 = { .name = "ecdsa_secp224r1_sha3_512_4135", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4135_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4135_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4135_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4136 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4136_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4136_msg[] = { 0x31, 0x38, 0x33, 0x31, 0x36, 0x35, 0x34, 0x33, 0x33, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4136_sig[] = { 0x32, 0x37, 0x72, 0x96, 0xba, 0x47, 0x11, 0x4b, 0x5f, 0x3d, 0xcf, 0xf8, 0x41, 0x41, 0x6b, 0xca, 0x3e, 0x5e, 0x98, 0xd6, 0x4d, 0xd9, 0x87, 0xba, 0xdc, 0x45, 0x76, 0x55, 0x29, 0xa3, 0x7a, 0x14, 0x3b, 0x47, 0xb0, 0x29, 0xe2, 0x56, 0xc7, 0x50, 0x6a, 0x67, 0x9e, 0xe8, 0xf1, 0x96, 0x2c, 0xcb, 0xbb, 0x1c, 0x83, 0xf4, 0x08, 0x85, 0x01, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4136 = { .name = "ecdsa_secp224r1_sha3_512_4136", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4136_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4136_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4136_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4137 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4137_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4137_msg[] = { 0x32, 0x34, 0x33, 0x36, 0x38, 0x39, 0x39, 0x30, 0x33, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4137_sig[] = { 0x75, 0xd6, 0x2c, 0x17, 0x2f, 0x26, 0xe6, 0xe6, 0x83, 0x1c, 0x23, 0x3b, 0x49, 0x89, 0x5c, 0x1a, 0x87, 0xc1, 0xee, 0x3e, 0xf5, 0x7b, 0x71, 0x18, 0x56, 0x19, 0x9e, 0x46, 0x27, 0x83, 0x0a, 0x8d, 0x1f, 0xc4, 0x49, 0x93, 0x99, 0x0a, 0x9d, 0x1b, 0x2b, 0x14, 0x7f, 0xf8, 0x79, 0x2b, 0x0b, 0x08, 0x23, 0xbc, 0x30, 0xfb, 0x01, 0x2c, 0xe9, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4137 = { .name = "ecdsa_secp224r1_sha3_512_4137", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4137_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4137_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4137_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4138 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4138_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4138_msg[] = { 0x32, 0x30, 0x34, 0x30, 0x34, 0x31, 0x32, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4138_sig[] = { 0xfa, 0xb6, 0x2a, 0xd5, 0x26, 0xe8, 0x8f, 0x6b, 0x9c, 0xa7, 0xe2, 0xd2, 0x3f, 0x38, 0xd9, 0xfc, 0xf8, 0x61, 0xcb, 0x7c, 0xc2, 0x75, 0xfa, 0xa2, 0x5c, 0xa6, 0xa0, 0x9b, 0x29, 0xb3, 0x71, 0xdd, 0xa6, 0xef, 0x29, 0xf0, 0x37, 0x18, 0x1b, 0x9c, 0x3b, 0xd9, 0x2c, 0x78, 0x57, 0x8b, 0x43, 0xdd, 0xdb, 0x74, 0xa0, 0x29, 0xbe, 0xa7, 0xf2, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4138 = { .name = "ecdsa_secp224r1_sha3_512_4138", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4138_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4138_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4138_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4139 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4139_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4139_msg[] = { 0x33, 0x33, 0x33, 0x37, 0x31, 0x31, 0x39, 0x39, 0x37, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4139_sig[] = { 0x93, 0x9e, 0x3d, 0x37, 0x87, 0x67, 0xfc, 0x06, 0x9e, 0xe1, 0x93, 0xf0, 0x01, 0xf9, 0xc8, 0x4e, 0x4f, 0x82, 0xdd, 0x40, 0x74, 0x7e, 0x03, 0x7d, 0xf3, 0xfb, 0x20, 0x0d, 0x7d, 0xb5, 0x0e, 0xc0, 0x17, 0x09, 0x8c, 0xab, 0x3a, 0xd0, 0x54, 0x53, 0x0c, 0xee, 0x52, 0x38, 0xb0, 0xa3, 0x15, 0xcd, 0xc8, 0x0a, 0x3d, 0x8a, 0x7d, 0xd0, 0x99, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4139 = { .name = "ecdsa_secp224r1_sha3_512_4139", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4139_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4139_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4139_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4140 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4140_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4140_msg[] = { 0x36, 0x36, 0x39, 0x35, 0x36, 0x32, 0x30, 0x36, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4140_sig[] = { 0x1a, 0x71, 0xaa, 0x36, 0x38, 0x00, 0x73, 0x1f, 0x4c, 0x5a, 0x9f, 0x0a, 0x42, 0x35, 0x19, 0x8a, 0x76, 0x58, 0xf1, 0xb4, 0x25, 0x97, 0x2e, 0xca, 0xc9, 0xa2, 0xa3, 0x40, 0x21, 0xb6, 0x19, 0x39, 0xe5, 0x75, 0xb1, 0xa5, 0xff, 0x48, 0x74, 0x73, 0xba, 0x38, 0x03, 0x68, 0x3c, 0x8b, 0x20, 0xe8, 0x98, 0x44, 0xa5, 0x57, 0x85, 0x63, 0x0f, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4140 = { .name = "ecdsa_secp224r1_sha3_512_4140", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4140_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4140_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4140_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4141 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4141_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4141_msg[] = { 0x32, 0x30, 0x39, 0x33, 0x30, 0x31, 0x37, 0x37, 0x34, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4141_sig[] = { 0xe7, 0xbd, 0x4d, 0xde, 0xdd, 0x41, 0x2b, 0xdc, 0x84, 0x82, 0xf0, 0x8e, 0x2d, 0xf5, 0x40, 0x57, 0x6b, 0x1b, 0xf7, 0x68, 0x93, 0x3e, 0x1a, 0xdd, 0xa3, 0x0a, 0xb9, 0x63, 0xb7, 0xd6, 0x47, 0x17, 0x0f, 0x0c, 0xfb, 0x03, 0x24, 0xf9, 0xec, 0x2e, 0x29, 0x94, 0x03, 0xdc, 0x6c, 0xf1, 0x58, 0x9b, 0xe3, 0xdf, 0xc6, 0xfc, 0x22, 0x82, 0x34, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4141 = { .name = "ecdsa_secp224r1_sha3_512_4141", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4141_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4141_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4141_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4142 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4142_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4142_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x31, 0x37, 0x39, 0x31, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4142_sig[] = { 0xac, 0x96, 0xc0, 0x15, 0x8f, 0x3f, 0x93, 0x9d, 0x14, 0x23, 0x8f, 0x74, 0x4c, 0x9c, 0x2b, 0x57, 0x36, 0xc0, 0x26, 0xdb, 0x41, 0x4c, 0x5d, 0x9c, 0x01, 0x9d, 0x05, 0x62, 0xa2, 0x7c, 0x8a, 0x34, 0x06, 0x5c, 0x71, 0xb9, 0x2a, 0xf1, 0x1d, 0x77, 0xda, 0xd5, 0x33, 0xf9, 0xcc, 0x62, 0x66, 0x7e, 0xa0, 0x9d, 0x50, 0x05, 0x7f, 0xbe, 0xa9, 0xb2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4142 = { .name = "ecdsa_secp224r1_sha3_512_4142", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4142_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4142_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4142_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4143 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4143_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4143_msg[] = { 0x31, 0x37, 0x36, 0x34, 0x33, 0x35, 0x30, 0x36, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4143_sig[] = { 0xc5, 0x26, 0xa8, 0x88, 0xa4, 0xf7, 0x4f, 0x01, 0xf0, 0x37, 0xb7, 0x55, 0x69, 0x55, 0xdf, 0xca, 0xe7, 0x22, 0x66, 0xe5, 0xdf, 0x55, 0xac, 0x6c, 0xec, 0xbf, 0xb8, 0x5d, 0xd8, 0x5a, 0x5b, 0xc2, 0x4c, 0xb7, 0x3a, 0xba, 0x31, 0x88, 0x09, 0x8c, 0x11, 0xf7, 0x08, 0x7a, 0x39, 0xe5, 0xe6, 0x22, 0x71, 0xe0, 0x16, 0xcb, 0xca, 0x2b, 0x55, 0x88, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4143 = { .name = "ecdsa_secp224r1_sha3_512_4143", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4143_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4143_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4143_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4144 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4144_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4144_msg[] = { 0x31, 0x31, 0x34, 0x31, 0x37, 0x32, 0x34, 0x31, 0x34, 0x34, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4144_sig[] = { 0x37, 0x20, 0x6e, 0xde, 0x6a, 0x2f, 0x6b, 0xf4, 0x68, 0xa9, 0x11, 0x52, 0x50, 0x3e, 0xb9, 0x08, 0x37, 0x45, 0x6a, 0x3b, 0x1d, 0x6c, 0x93, 0x7b, 0x0e, 0xfb, 0xf6, 0x0d, 0x96, 0xd3, 0x51, 0x82, 0xfd, 0x97, 0x43, 0x8e, 0x4a, 0x97, 0x8c, 0x22, 0x23, 0xea, 0xc6, 0xa4, 0xf7, 0x00, 0x59, 0x26, 0xe8, 0x95, 0xff, 0x17, 0xd6, 0x67, 0xa2, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4144 = { .name = "ecdsa_secp224r1_sha3_512_4144", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4144_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4144_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4144_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4145 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4145_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4145_msg[] = { 0x32, 0x32, 0x36, 0x38, 0x32, 0x34, 0x36, 0x34, 0x39, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4145_sig[] = { 0xc4, 0x21, 0x06, 0xcf, 0x72, 0xc3, 0x63, 0x2d, 0x1d, 0x4f, 0x15, 0xa0, 0x8b, 0x7b, 0xb7, 0x2c, 0x57, 0xae, 0x82, 0xc0, 0x99, 0x95, 0x3d, 0x32, 0x41, 0x49, 0xb0, 0x3c, 0xfa, 0xd8, 0xd9, 0xd9, 0xda, 0x94, 0x25, 0x9b, 0x71, 0x9f, 0xf6, 0xb6, 0xc8, 0xe6, 0xab, 0x24, 0xbb, 0x36, 0x56, 0x02, 0xec, 0x2f, 0xfe, 0x12, 0xfe, 0x0e, 0x02, 0xec, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4145 = { .name = "ecdsa_secp224r1_sha3_512_4145", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4145_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4145_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4145_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4146 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4146_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4146_msg[] = { 0x32, 0x37, 0x32, 0x34, 0x37, 0x39, 0x36, 0x37, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4146_sig[] = { 0x0f, 0xc1, 0x58, 0x2e, 0x0b, 0x3e, 0xbe, 0x74, 0xb1, 0xfa, 0x44, 0x25, 0xe3, 0x21, 0xa5, 0xb2, 0xd1, 0x6b, 0x1c, 0x3a, 0xb0, 0x60, 0xe9, 0x8c, 0xf5, 0x30, 0xde, 0xfa, 0x11, 0x5e, 0xae, 0x02, 0x5f, 0xa3, 0x42, 0x26, 0x21, 0xa4, 0x9f, 0xd7, 0x84, 0x86, 0xca, 0x24, 0x58, 0x94, 0xa2, 0xd8, 0x3c, 0x64, 0x4e, 0x31, 0xab, 0xe2, 0x1b, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4146 = { .name = "ecdsa_secp224r1_sha3_512_4146", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4146_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4146_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4146_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4147 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4147_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4147_msg[] = { 0x39, 0x37, 0x33, 0x33, 0x39, 0x35, 0x31, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4147_sig[] = { 0xc9, 0x65, 0x88, 0xe9, 0x98, 0x31, 0x48, 0x49, 0x62, 0x13, 0x8e, 0xe5, 0xcd, 0x48, 0x7d, 0xde, 0xe8, 0xc2, 0x85, 0x0c, 0x6e, 0x82, 0xdb, 0x35, 0xf8, 0xd5, 0xad, 0x4b, 0x26, 0xee, 0x8a, 0x07, 0x87, 0xb6, 0xc5, 0xba, 0xd7, 0x59, 0x8e, 0x5d, 0x41, 0xe5, 0x98, 0x80, 0xb3, 0x2c, 0xfa, 0x12, 0x5c, 0x89, 0x30, 0xfd, 0xb0, 0xc1, 0x64, 0x80, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4147 = { .name = "ecdsa_secp224r1_sha3_512_4147", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4147_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4147_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4147_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4148 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4148_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4148_msg[] = { 0x31, 0x35, 0x30, 0x37, 0x30, 0x30, 0x32, 0x37, 0x30, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4148_sig[] = { 0xd1, 0x44, 0xba, 0x07, 0xfe, 0x4c, 0x7f, 0x96, 0x35, 0x3d, 0xc8, 0xb1, 0x71, 0x38, 0x4b, 0x44, 0x92, 0xce, 0xbe, 0x74, 0xc8, 0x6c, 0xdf, 0xfe, 0x62, 0x13, 0xf7, 0x96, 0xc1, 0x9f, 0xba, 0x0a, 0x58, 0x85, 0x0f, 0x2d, 0xda, 0xd8, 0xac, 0x81, 0xb4, 0x04, 0xef, 0x18, 0xf5, 0xb1, 0xb4, 0x81, 0x98, 0xe4, 0x8d, 0x06, 0x9d, 0xd9, 0xc2, 0xae, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4148 = { .name = "ecdsa_secp224r1_sha3_512_4148", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4148_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4148_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4148_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4149 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4149_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4149_msg[] = { 0x33, 0x37, 0x34, 0x33, 0x35, 0x36, 0x38, 0x37, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4149_sig[] = { 0x48, 0xf0, 0xd2, 0xb5, 0x50, 0x06, 0x51, 0x42, 0x80, 0xce, 0x7a, 0xd2, 0x83, 0x36, 0xab, 0x31, 0xa0, 0x53, 0x6d, 0xee, 0xf7, 0x67, 0xf0, 0x0e, 0xa3, 0x41, 0x9b, 0x97, 0x91, 0x83, 0x26, 0xb9, 0x33, 0x7f, 0x76, 0xf3, 0xb3, 0xb3, 0xb7, 0x89, 0x03, 0x1e, 0x5c, 0x6d, 0x30, 0x00, 0xf7, 0x21, 0x5b, 0x5d, 0x8e, 0xb3, 0x85, 0x46, 0x79, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4149 = { .name = "ecdsa_secp224r1_sha3_512_4149", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4149_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4149_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4149_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4150 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4150_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4150_msg[] = { 0x39, 0x34, 0x37, 0x36, 0x37, 0x31, 0x32, 0x34, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4150_sig[] = { 0x44, 0xd3, 0xa1, 0x82, 0xc9, 0xa8, 0xa2, 0x07, 0xa5, 0xdc, 0xc2, 0x81, 0x1e, 0x30, 0xeb, 0x26, 0x03, 0x7b, 0xb5, 0x62, 0x78, 0x70, 0xa1, 0xe3, 0xa7, 0x54, 0xa1, 0xef, 0x82, 0xa5, 0x97, 0x8d, 0x2f, 0xde, 0xa3, 0x87, 0x5c, 0xfe, 0xa5, 0x7b, 0x31, 0x78, 0x74, 0x2c, 0x42, 0xce, 0xed, 0xd3, 0xb3, 0x96, 0xd5, 0x01, 0x41, 0x85, 0x31, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4150 = { .name = "ecdsa_secp224r1_sha3_512_4150", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4150_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4150_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4150_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4151 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4151_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4151_msg[] = { 0x37, 0x32, 0x35, 0x34, 0x34, 0x34, 0x33, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4151_sig[] = { 0xee, 0xdd, 0xc5, 0x9d, 0x60, 0xf2, 0x75, 0x70, 0x81, 0xc3, 0xb9, 0x15, 0x98, 0x4e, 0x73, 0x9c, 0xe3, 0x1c, 0xcb, 0xf1, 0x84, 0xfe, 0xf2, 0x7d, 0x10, 0x25, 0xc7, 0x11, 0x68, 0x6f, 0x70, 0x48, 0x34, 0x04, 0x7a, 0xe4, 0xb8, 0xbe, 0xef, 0x8f, 0xcb, 0x67, 0xc9, 0x4a, 0x05, 0xb7, 0xf4, 0x76, 0x9d, 0x6d, 0xc9, 0x80, 0x21, 0xc2, 0x1d, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4151 = { .name = "ecdsa_secp224r1_sha3_512_4151", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4151_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4151_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4151_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4152 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4152_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4152_msg[] = { 0x35, 0x35, 0x33, 0x34, 0x30, 0x32, 0x31, 0x32, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4152_sig[] = { 0xba, 0x4c, 0x61, 0x25, 0x40, 0x92, 0x2f, 0x0a, 0x1b, 0x77, 0x0d, 0x93, 0x73, 0xc5, 0x18, 0x99, 0x3f, 0xd4, 0x45, 0x10, 0x50, 0x57, 0xcf, 0x26, 0xc0, 0xae, 0xff, 0x8c, 0x4d, 0x65, 0x65, 0xff, 0x73, 0x17, 0xd8, 0x61, 0xb2, 0xf3, 0xc0, 0x7d, 0xf6, 0x28, 0xa4, 0x8d, 0x42, 0xd2, 0x1a, 0x0e, 0xa9, 0x9e, 0x89, 0x45, 0x48, 0x6c, 0xa3, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4152 = { .name = "ecdsa_secp224r1_sha3_512_4152", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4152_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4152_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4152_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4153 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4153_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4153_msg[] = { 0x31, 0x32, 0x33, 0x30, 0x31, 0x38, 0x31, 0x33, 0x37, 0x39, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4153_sig[] = { 0xe6, 0x76, 0x40, 0xa7, 0x82, 0x68, 0x19, 0x68, 0x97, 0x23, 0x76, 0xb0, 0xfd, 0x72, 0xe5, 0x42, 0x06, 0xaf, 0x32, 0x8a, 0x59, 0xbe, 0x67, 0x1e, 0x61, 0x58, 0x44, 0x8a, 0xf2, 0xa7, 0x6e, 0xd2, 0x67, 0x4b, 0x1f, 0x91, 0x42, 0xf5, 0x4c, 0x8f, 0xe7, 0x6c, 0xb8, 0xdb, 0xff, 0x71, 0xf4, 0xdf, 0x37, 0x75, 0xa2, 0xab, 0xeb, 0x12, 0x0a, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4153 = { .name = "ecdsa_secp224r1_sha3_512_4153", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4153_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4153_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4153_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4154 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4154_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4154_msg[] = { 0x39, 0x31, 0x31, 0x35, 0x33, 0x31, 0x37, 0x36, 0x31, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4154_sig[] = { 0xc5, 0x20, 0xfa, 0xa7, 0x57, 0x4e, 0x13, 0xbe, 0xc8, 0xb3, 0xf9, 0x97, 0xee, 0x9b, 0x84, 0x4b, 0x63, 0x67, 0xd6, 0x1d, 0x26, 0xca, 0x84, 0xdf, 0xe4, 0xeb, 0x24, 0x5b, 0x82, 0x0b, 0xe3, 0xe4, 0x8a, 0xa4, 0xe5, 0x69, 0xdd, 0x6d, 0x7a, 0x50, 0xe7, 0x4d, 0x65, 0xb5, 0x9f, 0xe6, 0x03, 0xc9, 0x65, 0x1d, 0xd3, 0xab, 0xe8, 0xce, 0x97, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4154 = { .name = "ecdsa_secp224r1_sha3_512_4154", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4154_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4154_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4154_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4155 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4155_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4155_msg[] = { 0x32, 0x38, 0x39, 0x34, 0x33, 0x39, 0x37, 0x39, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4155_sig[] = { 0xd8, 0x6d, 0x56, 0x6f, 0xf5, 0xfc, 0xcc, 0xf3, 0xa3, 0x56, 0x78, 0x6e, 0x61, 0x4b, 0x93, 0x40, 0xc2, 0x42, 0x64, 0x8c, 0x15, 0xec, 0x4b, 0x67, 0x0e, 0xa1, 0x1f, 0x07, 0xab, 0xb0, 0xe7, 0xda, 0x14, 0x33, 0x2b, 0x77, 0x42, 0x63, 0x6b, 0x66, 0xb8, 0xb7, 0xbe, 0xb2, 0xac, 0x4a, 0x15, 0x5f, 0xe6, 0x30, 0x8a, 0xae, 0x6c, 0x70, 0x66, 0x0b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4155 = { .name = "ecdsa_secp224r1_sha3_512_4155", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4155_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4155_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4155_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4156 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4156_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4156_msg[] = { 0x31, 0x32, 0x33, 0x33, 0x35, 0x38, 0x33, 0x30, 0x33, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4156_sig[] = { 0x66, 0x12, 0xd8, 0x45, 0xfa, 0x2d, 0x59, 0xbe, 0x90, 0xa0, 0xcd, 0x7f, 0x75, 0xa3, 0x50, 0x94, 0x30, 0xac, 0x80, 0x78, 0x31, 0x7d, 0x38, 0x5f, 0xbe, 0xf5, 0x68, 0xa5, 0xc5, 0xdf, 0x1c, 0xd8, 0x92, 0x0c, 0xd3, 0xb8, 0x72, 0xe2, 0x33, 0x55, 0x22, 0xbe, 0xf8, 0x29, 0x5c, 0xb5, 0x44, 0x08, 0x2d, 0x26, 0x9b, 0x83, 0xaf, 0xf8, 0x4e, 0xca, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4156 = { .name = "ecdsa_secp224r1_sha3_512_4156", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4156_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4156_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4156_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4157 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4157_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4157_msg[] = { 0x32, 0x31, 0x31, 0x32, 0x36, 0x39, 0x32, 0x35, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4157_sig[] = { 0x09, 0x8f, 0x52, 0x93, 0xe6, 0x12, 0x2f, 0xd4, 0x50, 0xe1, 0xf3, 0x18, 0x2e, 0x6f, 0x23, 0x23, 0xb5, 0x87, 0x8b, 0x39, 0xaf, 0xa4, 0x18, 0x48, 0x83, 0x97, 0x7c, 0x3d, 0x93, 0x6a, 0x9a, 0xf9, 0x9a, 0x3c, 0x54, 0xe1, 0xb9, 0x4a, 0x04, 0xfe, 0xf8, 0x6c, 0xc7, 0xa1, 0x65, 0x26, 0xfe, 0xa6, 0x6f, 0x6a, 0x1c, 0x3d, 0x40, 0xda, 0x16, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4157 = { .name = "ecdsa_secp224r1_sha3_512_4157", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4157_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4157_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4157_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4158 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4158_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4158_msg[] = { 0x33, 0x30, 0x30, 0x35, 0x34, 0x38, 0x33, 0x38, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4158_sig[] = { 0xf5, 0xa5, 0x24, 0xac, 0xbb, 0xad, 0xe6, 0x85, 0x2c, 0x29, 0x13, 0x2c, 0x32, 0xd6, 0x1b, 0x06, 0x70, 0x7a, 0x38, 0x8c, 0xb3, 0xce, 0xbd, 0x8e, 0xeb, 0x59, 0xd1, 0xad, 0xd7, 0xde, 0x65, 0xc5, 0x0b, 0x21, 0xa8, 0x4e, 0x6f, 0x49, 0xb7, 0x1f, 0xda, 0xf9, 0x77, 0xe3, 0xd2, 0xee, 0x8f, 0xec, 0x00, 0x8e, 0x47, 0x74, 0x28, 0xb0, 0x85, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4158 = { .name = "ecdsa_secp224r1_sha3_512_4158", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4158_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4158_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4158_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4159 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4159_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4159_msg[] = { 0x38, 0x33, 0x35, 0x36, 0x37, 0x36, 0x32, 0x37, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4159_sig[] = { 0xd7, 0xc5, 0xda, 0x50, 0x9b, 0xf4, 0x29, 0x83, 0xf7, 0xef, 0x6d, 0x75, 0x78, 0xeb, 0x29, 0x7f, 0x58, 0xb5, 0x1b, 0x2c, 0x47, 0x00, 0x1c, 0x6f, 0xdf, 0x3a, 0xaf, 0xe8, 0xc6, 0xac, 0x06, 0x90, 0x05, 0x0f, 0x22, 0xe9, 0xfb, 0x9f, 0x0f, 0xda, 0xa2, 0x4b, 0xd1, 0x55, 0x8f, 0x79, 0x3a, 0x0a, 0x9a, 0x56, 0x92, 0xf8, 0xe5, 0x79, 0x59, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4159 = { .name = "ecdsa_secp224r1_sha3_512_4159", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4159_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4159_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4159_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4160 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4160_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4160_msg[] = { 0x38, 0x33, 0x32, 0x39, 0x35, 0x30, 0x30, 0x37, 0x36, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4160_sig[] = { 0xd6, 0xa3, 0x20, 0x76, 0xb2, 0xf8, 0x53, 0x98, 0x95, 0x9f, 0x54, 0x21, 0x8b, 0xef, 0xef, 0xc3, 0xff, 0xaa, 0xa3, 0xb7, 0xa7, 0x27, 0x2b, 0xb8, 0x5e, 0xd0, 0x67, 0x68, 0x1b, 0xa4, 0x2e, 0xbb, 0x39, 0x27, 0xb3, 0xa7, 0x7b, 0xe0, 0xbb, 0x83, 0x59, 0xa9, 0x15, 0x66, 0x72, 0x8f, 0xb6, 0xb7, 0x9c, 0x20, 0x6b, 0xf0, 0xfd, 0xa9, 0x60, 0xed, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4160 = { .name = "ecdsa_secp224r1_sha3_512_4160", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4160_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4160_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4160_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4161 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4161_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4161_msg[] = { 0x31, 0x39, 0x32, 0x37, 0x30, 0x38, 0x34, 0x31, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4161_sig[] = { 0x87, 0x07, 0x12, 0x6e, 0x07, 0xab, 0x96, 0x35, 0xcb, 0x48, 0xba, 0xd9, 0xe9, 0xb0, 0x3b, 0x43, 0x23, 0x29, 0xee, 0x15, 0x8b, 0x17, 0x3b, 0xd8, 0x75, 0x3e, 0x3f, 0x44, 0x12, 0x14, 0x61, 0x7e, 0x15, 0x47, 0x95, 0x6f, 0x34, 0xf9, 0x70, 0x1d, 0x4a, 0x73, 0x95, 0x8f, 0xfe, 0x91, 0xd9, 0xfa, 0xfe, 0xb8, 0xb2, 0x8f, 0xa3, 0x85, 0x16, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4161 = { .name = "ecdsa_secp224r1_sha3_512_4161", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4161_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4161_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4161_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4162 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4162_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4162_msg[] = { 0x37, 0x33, 0x30, 0x32, 0x33, 0x35, 0x38, 0x32, 0x38, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4162_sig[] = { 0xd2, 0x2d, 0x8e, 0x4c, 0xd3, 0x78, 0xfc, 0xed, 0x31, 0x2d, 0x89, 0x3e, 0x6b, 0x3b, 0x4c, 0x09, 0x04, 0xfe, 0x29, 0x32, 0xeb, 0x80, 0x5b, 0xc0, 0xfa, 0x2e, 0xbc, 0xe2, 0xf0, 0xea, 0xa7, 0xc6, 0xd1, 0x0f, 0xba, 0x23, 0xcd, 0xe0, 0x5b, 0xe6, 0xdf, 0xd7, 0xa1, 0x2c, 0xa7, 0x78, 0x2c, 0xbe, 0x26, 0x39, 0xf1, 0x21, 0x54, 0x00, 0x94, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4162 = { .name = "ecdsa_secp224r1_sha3_512_4162", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4162_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4162_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4162_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4163 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4163_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4163_msg[] = { 0x31, 0x33, 0x34, 0x37, 0x33, 0x37, 0x33, 0x37, 0x33, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4163_sig[] = { 0xf6, 0xe4, 0x06, 0xee, 0x55, 0xff, 0xc2, 0xa6, 0x1f, 0x2a, 0xdb, 0x63, 0xe3, 0xcb, 0x19, 0x28, 0x4b, 0x1c, 0x06, 0x7c, 0x12, 0x8c, 0xf4, 0x45, 0xb6, 0x8d, 0xc2, 0x59, 0xe1, 0x7e, 0x2c, 0x98, 0x58, 0x8c, 0xe6, 0xca, 0xb0, 0x1a, 0xc7, 0xbb, 0xa1, 0xe3, 0xeb, 0xe1, 0xb4, 0x52, 0x66, 0x56, 0x3d, 0x14, 0x82, 0xc9, 0x20, 0xec, 0x8e, 0x8d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4163 = { .name = "ecdsa_secp224r1_sha3_512_4163", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4163_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4163_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4163_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4164 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4164_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4164_msg[] = { 0x32, 0x35, 0x30, 0x31, 0x35, 0x35, 0x33, 0x36, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4164_sig[] = { 0xd9, 0x16, 0x13, 0xf7, 0xe2, 0xf1, 0x45, 0x6d, 0x83, 0x3f, 0x2c, 0x9a, 0xac, 0x07, 0x96, 0x36, 0x60, 0x79, 0xe9, 0x2f, 0x2e, 0x30, 0x98, 0x54, 0x40, 0xa2, 0x94, 0x09, 0xe6, 0x72, 0x17, 0xbd, 0x2b, 0x57, 0x81, 0x72, 0xb9, 0xf2, 0x25, 0xc7, 0x01, 0x4d, 0x6c, 0xdc, 0xf8, 0x75, 0xcd, 0xe0, 0x42, 0x8e, 0x51, 0x55, 0x1b, 0x29, 0x59, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4164 = { .name = "ecdsa_secp224r1_sha3_512_4164", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4164_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4164_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4164_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4165 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4165_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4165_msg[] = { 0x33, 0x35, 0x33, 0x35, 0x30, 0x34, 0x30, 0x30, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4165_sig[] = { 0x9d, 0x0d, 0x16, 0x13, 0x52, 0xc2, 0x89, 0xf9, 0xb1, 0x02, 0x1b, 0x88, 0xc4, 0x67, 0xcd, 0xd1, 0xe6, 0xd3, 0x84, 0xe3, 0xe4, 0x01, 0x9d, 0xa7, 0xc5, 0x6c, 0x49, 0x2d, 0x1c, 0x4c, 0x4b, 0xe4, 0xf3, 0xc9, 0x48, 0x3b, 0x50, 0x27, 0xb5, 0xfc, 0x7d, 0x47, 0x29, 0xcd, 0x74, 0xc3, 0xb9, 0xce, 0xf7, 0x51, 0xef, 0x62, 0xd2, 0x25, 0x01, 0x99, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4165 = { .name = "ecdsa_secp224r1_sha3_512_4165", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4165_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4165_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4165_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4166 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4166_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4166_msg[] = { 0x31, 0x34, 0x32, 0x30, 0x33, 0x35, 0x37, 0x32, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4166_sig[] = { 0xac, 0x98, 0xa4, 0xd2, 0x98, 0xb0, 0x96, 0xe7, 0x84, 0x61, 0x60, 0x21, 0x20, 0xd1, 0x66, 0x03, 0x11, 0xfb, 0x8a, 0xb1, 0xf1, 0x8b, 0x46, 0xea, 0xb3, 0xda, 0x4d, 0x8d, 0x56, 0xff, 0x93, 0xd6, 0x98, 0xfd, 0xa5, 0xd8, 0xd0, 0x1a, 0x59, 0x16, 0xea, 0x6d, 0x34, 0x85, 0x10, 0xf2, 0x08, 0x0c, 0x8d, 0x78, 0x4e, 0x80, 0x1a, 0x83, 0xbe, 0x98, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4166 = { .name = "ecdsa_secp224r1_sha3_512_4166", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4166_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4166_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4166_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4167 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4167_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4167_msg[] = { 0x39, 0x30, 0x35, 0x31, 0x37, 0x35, 0x30, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4167_sig[] = { 0xf6, 0x1a, 0xb8, 0x9e, 0xac, 0x55, 0xf6, 0x22, 0x43, 0x81, 0x07, 0x1c, 0x23, 0x43, 0xdf, 0x90, 0x21, 0x70, 0xb5, 0x83, 0x89, 0xed, 0xcf, 0x7e, 0x54, 0x99, 0xce, 0xc4, 0xef, 0xdc, 0x81, 0x58, 0xe8, 0x39, 0x2d, 0xfe, 0xa1, 0xc5, 0x5c, 0x5d, 0x62, 0xae, 0x7b, 0x69, 0x5f, 0x82, 0x2a, 0x64, 0x07, 0xce, 0x52, 0xc3, 0xdc, 0xd2, 0xf8, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4167 = { .name = "ecdsa_secp224r1_sha3_512_4167", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4167_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4167_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4167_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4168 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4168_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4168_msg[] = { 0x31, 0x36, 0x31, 0x33, 0x37, 0x37, 0x34, 0x32, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4168_sig[] = { 0xe7, 0x35, 0x56, 0xf6, 0x5f, 0xe4, 0x0b, 0x25, 0x99, 0xb3, 0x6a, 0xbd, 0x67, 0x9d, 0xad, 0x75, 0xfe, 0x95, 0x1f, 0x32, 0xb7, 0x77, 0x1e, 0xe6, 0x26, 0x9b, 0x74, 0x70, 0x68, 0x7f, 0xb6, 0x34, 0x2c, 0x4b, 0xd2, 0xf3, 0xa2, 0x15, 0xc0, 0x40, 0x59, 0x41, 0xbe, 0x22, 0x60, 0x22, 0x97, 0x16, 0x4f, 0xa9, 0x11, 0x5f, 0xa9, 0x7f, 0x58, 0xc5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4168 = { .name = "ecdsa_secp224r1_sha3_512_4168", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4168_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4168_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4168_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 285 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4169 for ECDSA, tcId is 286 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4169_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4169_msg[] = { 0x38, 0x37, 0x33, 0x36, 0x37, 0x33, 0x34, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4169_sig[] = { 0x6b, 0x12, 0x01, 0x49, 0x42, 0x85, 0xb6, 0x3e, 0x42, 0xb5, 0x9c, 0xa8, 0xbd, 0x67, 0xbb, 0x65, 0x5f, 0x41, 0xd0, 0x20, 0x48, 0x7c, 0x6d, 0x4b, 0x45, 0xc5, 0x26, 0x8a, 0x95, 0x28, 0xc4, 0xec, 0xfb, 0x75, 0x62, 0x8e, 0xcb, 0xde, 0x99, 0xaa, 0x0a, 0x13, 0x04, 0x63, 0xa1, 0xdf, 0x91, 0xb0, 0x20, 0x5d, 0xe0, 0xb7, 0x26, 0xfe, 0x6f, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4169 = { .name = "ecdsa_secp224r1_sha3_512_4169", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4169_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4169_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4169_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 286 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4170 for ECDSA, tcId is 287 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4170_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4170_msg[] = { 0x34, 0x33, 0x35, 0x35, 0x31, 0x30, 0x36, 0x34, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4170_sig[] = { 0x4e, 0x02, 0x9b, 0x6b, 0x69, 0xd4, 0x1f, 0xfa, 0xc3, 0xc9, 0xd4, 0x6c, 0x79, 0x60, 0x44, 0x66, 0xfa, 0x42, 0xa7, 0xa6, 0x6a, 0x6c, 0xc8, 0x73, 0xde, 0xa2, 0xf5, 0x54, 0xd5, 0x54, 0xc4, 0x22, 0xd0, 0x3c, 0x26, 0x42, 0x84, 0x8e, 0x99, 0x40, 0x0a, 0xaf, 0x41, 0x1d, 0x6e, 0xc8, 0x1f, 0xa0, 0xeb, 0x9b, 0x43, 0xc4, 0xc0, 0xbc, 0xeb, 0x1b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4170 = { .name = "ecdsa_secp224r1_sha3_512_4170", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4170_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4170_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4170_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 287 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4171 for ECDSA, tcId is 288 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4171_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4171_msg[] = { 0x34, 0x35, 0x33, 0x39, 0x35, 0x37, 0x35, 0x38, 0x37, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4171_sig[] = { 0x7b, 0x98, 0xc9, 0xde, 0xe7, 0xac, 0x12, 0xa6, 0xc2, 0xf5, 0x9b, 0x20, 0x54, 0x8a, 0x86, 0xca, 0xfd, 0x77, 0x75, 0xa1, 0x5f, 0xe2, 0x90, 0xd4, 0x84, 0x84, 0xdd, 0x44, 0xe6, 0x69, 0x0c, 0x32, 0xb6, 0xb1, 0xae, 0xc8, 0x25, 0xcf, 0xf9, 0xd2, 0xd4, 0x7a, 0x1b, 0xf5, 0xd6, 0xd2, 0x00, 0x00, 0x98, 0x33, 0x97, 0xbf, 0x48, 0xc0, 0x4c, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4171 = { .name = "ecdsa_secp224r1_sha3_512_4171", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4171_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4171_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4171_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 288 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4172 for ECDSA, tcId is 289 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4172_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4172_msg[] = { 0x38, 0x39, 0x33, 0x36, 0x36, 0x33, 0x32, 0x30, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4172_sig[] = { 0x8e, 0xd3, 0x38, 0x5d, 0xfe, 0x12, 0x2f, 0x21, 0x25, 0x9b, 0x55, 0x02, 0x8c, 0x6b, 0xa2, 0xf9, 0xac, 0x94, 0x59, 0x4b, 0xcb, 0x58, 0x47, 0xb7, 0x64, 0x67, 0x7d, 0xc7, 0xb5, 0xa1, 0x2a, 0x3f, 0x4b, 0x08, 0x85, 0x61, 0xe1, 0xa0, 0x07, 0xe4, 0xf0, 0x52, 0xbc, 0xff, 0xaa, 0xd0, 0x5b, 0x5e, 0x72, 0x7f, 0x3e, 0x93, 0x85, 0x15, 0x40, 0x63, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4172 = { .name = "ecdsa_secp224r1_sha3_512_4172", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4172_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4172_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4172_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 289 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4173 for ECDSA, tcId is 290 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4173_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4173_msg[] = { 0x33, 0x38, 0x30, 0x36, 0x30, 0x36, 0x38, 0x30, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4173_sig[] = { 0xa3, 0xfe, 0x5b, 0xf1, 0xea, 0xe0, 0x43, 0xde, 0xc8, 0x02, 0x1e, 0x5b, 0xc9, 0x09, 0x0f, 0xe8, 0xd5, 0x91, 0x1c, 0x1d, 0x6d, 0x5a, 0x5b, 0x98, 0xb0, 0xf8, 0x88, 0xea, 0x7e, 0xd5, 0x5b, 0xe1, 0xe9, 0xae, 0x72, 0x8f, 0xe9, 0x54, 0xd3, 0x4c, 0x3e, 0xff, 0xea, 0xe4, 0x2d, 0x5f, 0x03, 0x09, 0x2d, 0x7e, 0xeb, 0x07, 0x10, 0xbf, 0x1d, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4173 = { .name = "ecdsa_secp224r1_sha3_512_4173", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4173_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4173_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4173_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 290 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4174 for ECDSA, tcId is 291 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4174_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4174_msg[] = { 0x32, 0x32, 0x33, 0x32, 0x38, 0x31, 0x37, 0x34, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4174_sig[] = { 0x3e, 0x65, 0x73, 0xe0, 0xdc, 0x06, 0x0e, 0xc8, 0x8b, 0xe1, 0x61, 0xec, 0xfb, 0x22, 0x00, 0xc6, 0xf7, 0xff, 0x51, 0x27, 0xa1, 0x38, 0x20, 0xbb, 0xc4, 0x60, 0x2a, 0x54, 0xc8, 0x52, 0xd8, 0x87, 0x55, 0xd4, 0xbd, 0x24, 0x4f, 0x0a, 0xca, 0xfd, 0x41, 0x8e, 0x49, 0x92, 0x45, 0xf2, 0xe6, 0x41, 0x7d, 0xc8, 0xbe, 0x72, 0x51, 0x43, 0xb1, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4174 = { .name = "ecdsa_secp224r1_sha3_512_4174", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4174_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4174_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4174_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 291 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4175 for ECDSA, tcId is 292 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4175_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4175_msg[] = { 0x34, 0x30, 0x37, 0x34, 0x33, 0x32, 0x32, 0x35, 0x35, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4175_sig[] = { 0xcc, 0xdd, 0xf9, 0x9c, 0xfb, 0x3a, 0xe0, 0x6c, 0x47, 0x8e, 0x62, 0xb4, 0x99, 0xcd, 0xb2, 0xe5, 0xa9, 0x8c, 0x66, 0x5d, 0x5f, 0xd3, 0x23, 0xcd, 0x67, 0x33, 0xf2, 0x62, 0xeb, 0x3b, 0x93, 0xb3, 0x5d, 0xdd, 0x92, 0x62, 0xe3, 0x17, 0x4a, 0xaa, 0x32, 0xbc, 0xf4, 0x6a, 0xef, 0x4b, 0xec, 0xd9, 0x91, 0x61, 0x66, 0xfa, 0x3d, 0x7c, 0xb0, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4175 = { .name = "ecdsa_secp224r1_sha3_512_4175", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4175_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4175_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4175_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 292 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4176 for ECDSA, tcId is 293 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4176_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4176_msg[] = { 0x36, 0x31, 0x30, 0x36, 0x37, 0x35, 0x38, 0x32, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4176_sig[] = { 0x08, 0x8d, 0x46, 0x1e, 0x34, 0x99, 0x3c, 0x86, 0xd1, 0x52, 0x0b, 0xfb, 0x3a, 0x90, 0xf1, 0x19, 0x0e, 0x08, 0x86, 0x89, 0x88, 0xbc, 0x62, 0x3c, 0xde, 0x1e, 0xb8, 0x79, 0xa1, 0x18, 0x13, 0x6b, 0xc4, 0x71, 0x81, 0xa4, 0xed, 0xf9, 0xe0, 0x5d, 0x3d, 0xb4, 0xeb, 0x5a, 0xc7, 0x3d, 0xa5, 0x0a, 0x95, 0xb7, 0x51, 0xe4, 0x89, 0x39, 0xbe, 0x39, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4176 = { .name = "ecdsa_secp224r1_sha3_512_4176", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4176_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4176_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4176_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 293 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4177 for ECDSA, tcId is 294 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4177_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4177_msg[] = { 0x31, 0x37, 0x34, 0x31, 0x38, 0x37, 0x33, 0x39, 0x32, 0x31, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4177_sig[] = { 0xb5, 0x1b, 0xf3, 0x89, 0xa8, 0x98, 0x40, 0x73, 0x22, 0xd5, 0xfe, 0x14, 0x2a, 0xb2, 0xf8, 0x14, 0x39, 0x00, 0x5a, 0xb9, 0xb4, 0xac, 0x3f, 0x40, 0x31, 0xc0, 0x6d, 0x43, 0x59, 0x30, 0x03, 0x5a, 0x00, 0xf6, 0xa1, 0xbb, 0x80, 0x5d, 0x8c, 0x7a, 0xcd, 0xf4, 0x2b, 0x18, 0xb0, 0x20, 0xa9, 0x42, 0x6a, 0xb7, 0xe2, 0xce, 0x41, 0xf3, 0x69, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4177 = { .name = "ecdsa_secp224r1_sha3_512_4177", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4177_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4177_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4177_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 294 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4178 for ECDSA, tcId is 295 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4178_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4178_msg[] = { 0x35, 0x31, 0x32, 0x37, 0x38, 0x34, 0x32, 0x32, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4178_sig[] = { 0x56, 0x5c, 0x68, 0x27, 0xc8, 0xf1, 0x8d, 0xaa, 0x21, 0xa6, 0xb1, 0xed, 0xb8, 0xaf, 0x81, 0x19, 0x3e, 0x8e, 0x39, 0x1f, 0x3e, 0x83, 0x60, 0xb3, 0x46, 0xc7, 0xb9, 0x8a, 0x46, 0x8b, 0x8b, 0x2e, 0x16, 0xc5, 0x1e, 0x41, 0xe2, 0x66, 0x51, 0x49, 0x3e, 0x02, 0xf0, 0xdb, 0x3a, 0xf5, 0xc9, 0x98, 0x1e, 0xdf, 0xff, 0x29, 0x91, 0xd1, 0x05, 0x99, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4178 = { .name = "ecdsa_secp224r1_sha3_512_4178", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4178_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4178_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4178_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 295 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4179 for ECDSA, tcId is 296 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4179_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4179_msg[] = { 0x35, 0x30, 0x33, 0x38, 0x36, 0x39, 0x30, 0x38, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4179_sig[] = { 0x60, 0x30, 0xec, 0x07, 0xae, 0x1c, 0xd9, 0x91, 0xdf, 0xbc, 0x6b, 0x48, 0xda, 0x43, 0xc6, 0x24, 0x0b, 0x5b, 0xb8, 0xf7, 0xfe, 0x19, 0x83, 0x2d, 0xf5, 0x96, 0x75, 0x4d, 0x54, 0xb9, 0x3d, 0x4a, 0xe5, 0x2e, 0x4c, 0xb7, 0xeb, 0x96, 0x9a, 0x1e, 0xb6, 0x2f, 0x0b, 0xe3, 0x95, 0xd3, 0x0a, 0x43, 0xe7, 0xd5, 0x73, 0x6d, 0xf6, 0xb5, 0x08, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4179 = { .name = "ecdsa_secp224r1_sha3_512_4179", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4179_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4179_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4179_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 296 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4180 for ECDSA, tcId is 297 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4180_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4180_msg[] = { 0x33, 0x38, 0x37, 0x37, 0x30, 0x34, 0x32, 0x33, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4180_sig[] = { 0x75, 0xc3, 0x99, 0x54, 0xf9, 0xf9, 0x56, 0x18, 0xcb, 0x89, 0x0b, 0x1a, 0x90, 0xb9, 0xe4, 0xfb, 0x5b, 0x8c, 0xec, 0x96, 0x8f, 0x89, 0x68, 0xf5, 0x38, 0x19, 0xd4, 0x97, 0xcd, 0x93, 0xfb, 0x7f, 0x8a, 0xad, 0x56, 0xfc, 0xe1, 0x73, 0x4c, 0x81, 0x22, 0x9c, 0x6b, 0x18, 0x45, 0x63, 0x56, 0x31, 0x20, 0x9f, 0xe4, 0xd3, 0x5a, 0x4b, 0xe9, 0x7e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4180 = { .name = "ecdsa_secp224r1_sha3_512_4180", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4180_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4180_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4180_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 297 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4181 for ECDSA, tcId is 298 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4181_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4181_msg[] = { 0x33, 0x32, 0x31, 0x37, 0x30, 0x38, 0x31, 0x37, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4181_sig[] = { 0x1f, 0xa3, 0x89, 0xd2, 0xf4, 0xe5, 0x86, 0xd5, 0xc1, 0xe9, 0xfc, 0xf3, 0x4b, 0x56, 0xed, 0x6d, 0x35, 0x55, 0x87, 0x14, 0xd5, 0x65, 0xa6, 0x19, 0x24, 0xc5, 0x9e, 0xdf, 0xee, 0x1a, 0x1f, 0x53, 0xd0, 0xf6, 0x5e, 0x00, 0xc6, 0xfc, 0xcd, 0xee, 0xf3, 0x55, 0x66, 0xe3, 0xd3, 0xcb, 0xb5, 0xb9, 0x10, 0x12, 0x7d, 0x0a, 0x40, 0x02, 0x53, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4181 = { .name = "ecdsa_secp224r1_sha3_512_4181", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4181_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4181_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4181_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 298 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4182 for ECDSA, tcId is 299 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4182_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4182_msg[] = { 0x37, 0x36, 0x36, 0x37, 0x30, 0x34, 0x34, 0x32, 0x37, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4182_sig[] = { 0xf1, 0xab, 0x78, 0xcb, 0xc3, 0xc6, 0x0b, 0xf9, 0x7e, 0x58, 0x3a, 0xb5, 0x0a, 0xbe, 0x7c, 0x96, 0x99, 0x6b, 0x2a, 0xf0, 0xc7, 0x1e, 0x13, 0x71, 0xa9, 0x4f, 0x92, 0x35, 0x21, 0xec, 0x71, 0x08, 0xbe, 0x39, 0x8f, 0x85, 0x9f, 0x8f, 0x75, 0xa8, 0xb9, 0xb5, 0x27, 0x91, 0x46, 0x85, 0xc5, 0xf3, 0xc1, 0xeb, 0x26, 0xf9, 0xb0, 0xd4, 0x44, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4182 = { .name = "ecdsa_secp224r1_sha3_512_4182", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4182_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4182_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4182_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 299 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4183 for ECDSA, tcId is 300 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4183_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4183_msg[] = { 0x31, 0x31, 0x30, 0x34, 0x37, 0x34, 0x35, 0x30, 0x34, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4183_sig[] = { 0x50, 0xe0, 0xe4, 0x23, 0xfc, 0xa4, 0x19, 0x46, 0x80, 0xff, 0xad, 0x95, 0xd1, 0xe5, 0xdf, 0x53, 0x47, 0x93, 0xd5, 0x52, 0x40, 0x99, 0xad, 0xdf, 0xda, 0xea, 0xc0, 0xf4, 0x91, 0xc4, 0x49, 0x5a, 0xd7, 0x99, 0x29, 0x33, 0x2b, 0x1c, 0xa3, 0x1a, 0x3b, 0x7d, 0x4b, 0x94, 0xa0, 0x5b, 0x54, 0x4d, 0x02, 0x9f, 0x8d, 0xf6, 0x4e, 0x54, 0xd1, 0x70, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4183 = { .name = "ecdsa_secp224r1_sha3_512_4183", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4183_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4183_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4183_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 300 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4184 for ECDSA, tcId is 301 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4184_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4184_msg[] = { 0x31, 0x35, 0x33, 0x38, 0x37, 0x30, 0x31, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4184_sig[] = { 0x5d, 0xd7, 0xd3, 0x9e, 0x95, 0x16, 0x9c, 0xef, 0xd7, 0x7a, 0x5a, 0x5d, 0xfd, 0x43, 0x5e, 0x2a, 0x87, 0x95, 0x76, 0xfa, 0xf3, 0xa8, 0x45, 0xd2, 0x66, 0xd4, 0x02, 0xca, 0x63, 0x22, 0x50, 0x84, 0xb9, 0x21, 0x9b, 0x15, 0x88, 0x4e, 0x0c, 0xd6, 0x65, 0xac, 0xa9, 0x2e, 0xf1, 0xf4, 0xb5, 0x41, 0x98, 0x7b, 0x98, 0xcb, 0xd0, 0x3e, 0xdb, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4184 = { .name = "ecdsa_secp224r1_sha3_512_4184", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4184_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4184_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4184_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 301 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4185 for ECDSA, tcId is 302 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4185_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4185_msg[] = { 0x32, 0x32, 0x36, 0x31, 0x33, 0x38, 0x35, 0x30, 0x34, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4185_sig[] = { 0x90, 0x2f, 0xbc, 0x7e, 0xed, 0x7c, 0xa4, 0x42, 0xc9, 0x42, 0x40, 0xc7, 0x53, 0x23, 0xdb, 0x9f, 0x69, 0x0a, 0x84, 0x81, 0x7f, 0x82, 0x4b, 0xbe, 0x12, 0xc2, 0xf9, 0xe9, 0x12, 0xe4, 0x9c, 0x4e, 0xd8, 0x89, 0x09, 0x34, 0x4b, 0x61, 0xc4, 0xee, 0xfe, 0xae, 0x4a, 0xae, 0x04, 0x94, 0x04, 0x4b, 0xd0, 0x16, 0x53, 0xe6, 0x6d, 0xbc, 0x48, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4185 = { .name = "ecdsa_secp224r1_sha3_512_4185", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4185_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4185_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4185_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 302 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4186 for ECDSA, tcId is 303 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4186_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4186_msg[] = { 0x37, 0x35, 0x35, 0x38, 0x37, 0x34, 0x37, 0x36, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4186_sig[] = { 0x16, 0x88, 0x1c, 0x4a, 0xe6, 0x0f, 0x32, 0xa6, 0xb8, 0x1d, 0x44, 0x5f, 0x7b, 0xb9, 0x21, 0xce, 0x4f, 0x4d, 0xcd, 0x34, 0x96, 0x95, 0xef, 0xe0, 0xfc, 0x94, 0xd2, 0x13, 0x06, 0x06, 0x63, 0x32, 0xf6, 0x1e, 0xdc, 0x98, 0xa8, 0x8a, 0x21, 0xa4, 0x2f, 0x26, 0xe9, 0x12, 0xc9, 0x9c, 0x54, 0x71, 0x09, 0x3a, 0xca, 0x9b, 0x1c, 0x11, 0xd5, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4186 = { .name = "ecdsa_secp224r1_sha3_512_4186", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4186_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4186_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4186_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 303 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4187 for ECDSA, tcId is 304 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4187_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4187_msg[] = { 0x33, 0x34, 0x39, 0x39, 0x33, 0x36, 0x34, 0x31, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4187_sig[] = { 0x3d, 0x0a, 0xf3, 0x97, 0x60, 0x2f, 0xc0, 0xd1, 0x8d, 0x8a, 0x73, 0x33, 0x77, 0xcc, 0x3e, 0x59, 0x6c, 0x14, 0x3f, 0x75, 0xd6, 0xa9, 0xd2, 0xc6, 0x2c, 0x99, 0xf3, 0x27, 0x30, 0xad, 0x8b, 0xf0, 0xbe, 0xf3, 0xb8, 0xa2, 0xbb, 0x41, 0x58, 0xdb, 0x62, 0x1d, 0xe4, 0x57, 0x0d, 0x75, 0xc5, 0xfe, 0xc7, 0xbb, 0x8c, 0x3e, 0x78, 0xaf, 0x84, 0x45, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4187 = { .name = "ecdsa_secp224r1_sha3_512_4187", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4187_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4187_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4187_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 304 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4188 for ECDSA, tcId is 305 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4188_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4188_msg[] = { 0x32, 0x33, 0x36, 0x39, 0x32, 0x37, 0x33, 0x39, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4188_sig[] = { 0xf9, 0x5c, 0x0f, 0xbf, 0x6c, 0x90, 0xb3, 0x00, 0xd8, 0x07, 0x65, 0xd7, 0xa5, 0x90, 0x2e, 0xf6, 0x90, 0xd4, 0xdc, 0x9a, 0xe9, 0xac, 0xd2, 0x0a, 0x3a, 0x7b, 0x6d, 0x78, 0x73, 0xf3, 0xad, 0x08, 0xda, 0xda, 0xf5, 0xc5, 0x85, 0x4d, 0x35, 0x1d, 0x47, 0xe4, 0xec, 0x32, 0x80, 0x13, 0xeb, 0x7a, 0xe9, 0xc7, 0xe8, 0x3e, 0x11, 0x00, 0x24, 0xad, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4188 = { .name = "ecdsa_secp224r1_sha3_512_4188", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4188_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4188_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4188_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 305 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4189 for ECDSA, tcId is 306 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4189_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4189_msg[] = { 0x34, 0x39, 0x33, 0x38, 0x33, 0x39, 0x35, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4189_sig[] = { 0xb3, 0x24, 0xae, 0xc4, 0x42, 0x0d, 0x11, 0xa7, 0xda, 0x67, 0xd2, 0x87, 0x19, 0x8a, 0xbb, 0xaf, 0x2c, 0x9e, 0x66, 0x06, 0xa2, 0x31, 0xaf, 0xa0, 0x92, 0x4d, 0x59, 0x02, 0xdb, 0x1e, 0xd6, 0xb9, 0x90, 0xf6, 0x5e, 0xbc, 0xdb, 0x8c, 0x5b, 0xc3, 0x8c, 0x7e, 0x1b, 0x83, 0xcf, 0xc8, 0xf8, 0xd0, 0x0b, 0xa4, 0xce, 0xd3, 0x9b, 0xb5, 0x65, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4189 = { .name = "ecdsa_secp224r1_sha3_512_4189", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4189_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4189_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4189_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 306 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4190 for ECDSA, tcId is 307 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4190_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4190_msg[] = { 0x32, 0x35, 0x33, 0x34, 0x33, 0x37, 0x39, 0x39, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4190_sig[] = { 0x7c, 0x20, 0x88, 0x07, 0x6a, 0xb2, 0x8c, 0x40, 0x27, 0x9a, 0xbe, 0xa3, 0xfd, 0xa0, 0xa2, 0x28, 0x6e, 0x0a, 0xfe, 0x96, 0x3b, 0xac, 0xb5, 0xf7, 0x0d, 0xed, 0x65, 0x55, 0xda, 0x35, 0x84, 0x07, 0xc1, 0xcc, 0x5c, 0x2e, 0x77, 0x68, 0x54, 0x50, 0x0f, 0x44, 0xa9, 0x04, 0xb2, 0x62, 0x4a, 0xb9, 0x4c, 0xe1, 0x01, 0xfb, 0x2b, 0x32, 0x6e, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4190 = { .name = "ecdsa_secp224r1_sha3_512_4190", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4190_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4190_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4190_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 307 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4191 for ECDSA, tcId is 308 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4191_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4191_msg[] = { 0x38, 0x33, 0x34, 0x38, 0x30, 0x31, 0x35, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4191_sig[] = { 0xab, 0xbf, 0x69, 0xe0, 0x74, 0xa3, 0x9e, 0x16, 0x7d, 0x6c, 0x4a, 0x61, 0xfe, 0x0e, 0xb2, 0xf4, 0x2a, 0x42, 0xaf, 0xdb, 0xd8, 0x40, 0xf6, 0x3d, 0xdb, 0x3e, 0x05, 0x7d, 0xb1, 0x7e, 0xc9, 0xb0, 0x10, 0x70, 0xd7, 0xd8, 0x82, 0x59, 0x69, 0xbf, 0x5f, 0x72, 0xaa, 0x04, 0x7f, 0xb4, 0x55, 0x7b, 0xf4, 0x52, 0x5b, 0x68, 0x3a, 0x2d, 0xd0, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4191 = { .name = "ecdsa_secp224r1_sha3_512_4191", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4191_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4191_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4191_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 308 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4192 for ECDSA, tcId is 309 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4192_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4192_msg[] = { 0x32, 0x34, 0x31, 0x31, 0x30, 0x35, 0x37, 0x34, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4192_sig[] = { 0x78, 0x7a, 0xf6, 0x03, 0x53, 0x9b, 0x58, 0x52, 0x0a, 0xb7, 0x49, 0x99, 0xfa, 0x2f, 0xc8, 0xfe, 0x90, 0xea, 0x10, 0xf3, 0xc1, 0xb1, 0x6a, 0x18, 0x1f, 0xdc, 0x09, 0x54, 0xfe, 0x25, 0xa9, 0xb1, 0x6e, 0x66, 0xaa, 0x1c, 0x50, 0xa5, 0x90, 0x42, 0xc1, 0xff, 0x0a, 0x85, 0xe2, 0xf4, 0x81, 0x1a, 0x8d, 0x75, 0x40, 0xf8, 0x3a, 0x63, 0x26, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4192 = { .name = "ecdsa_secp224r1_sha3_512_4192", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4192_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4192_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4192_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 309 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4193 for ECDSA, tcId is 310 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4193_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4193_msg[] = { 0x37, 0x38, 0x36, 0x34, 0x36, 0x38, 0x36, 0x33, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4193_sig[] = { 0xc6, 0xfe, 0x29, 0x9f, 0x38, 0x4a, 0x97, 0x8b, 0xe1, 0x8f, 0xd5, 0xdd, 0x2e, 0x94, 0xca, 0x1d, 0xf2, 0x48, 0xcf, 0x17, 0x81, 0x9c, 0x95, 0xd1, 0xb3, 0x17, 0xb2, 0x57, 0x9c, 0x2b, 0xd1, 0x11, 0xdd, 0x41, 0xfb, 0x56, 0xa9, 0xde, 0xd5, 0xce, 0x44, 0xcf, 0x61, 0x6c, 0x3e, 0x73, 0x5e, 0x86, 0x8a, 0x1b, 0x19, 0xd2, 0x57, 0x5f, 0xe8, 0xec, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4193 = { .name = "ecdsa_secp224r1_sha3_512_4193", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4193_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4193_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4193_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 310 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4194 for ECDSA, tcId is 311 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4194_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4194_msg[] = { 0x33, 0x30, 0x35, 0x34, 0x37, 0x37, 0x33, 0x37, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4194_sig[] = { 0xa6, 0x8d, 0x46, 0x78, 0xce, 0x9e, 0x0c, 0xee, 0x7d, 0xdb, 0x75, 0xbf, 0x4b, 0x5f, 0xd1, 0x62, 0xce, 0xd0, 0x9c, 0x1b, 0xdc, 0x36, 0x63, 0x36, 0x18, 0x1e, 0x4d, 0xcd, 0x28, 0x98, 0xae, 0xcf, 0xbd, 0xfb, 0x33, 0xe6, 0xbe, 0x1e, 0xf5, 0x9a, 0x20, 0xf3, 0x07, 0x72, 0x9c, 0x99, 0x54, 0xeb, 0xff, 0x5f, 0x11, 0x9a, 0xda, 0xbb, 0x64, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4194 = { .name = "ecdsa_secp224r1_sha3_512_4194", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4194_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4194_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4194_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 311 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4195 for ECDSA, tcId is 312 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4195_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4195_msg[] = { 0x31, 0x39, 0x32, 0x37, 0x30, 0x31, 0x37, 0x37, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4195_sig[] = { 0x32, 0xc2, 0x8f, 0x72, 0x6d, 0x79, 0xd4, 0x61, 0x0f, 0x63, 0x82, 0xc3, 0x29, 0xa3, 0xa9, 0x55, 0x05, 0x9f, 0x58, 0x76, 0xef, 0x34, 0x35, 0x85, 0x09, 0x8f, 0x40, 0xdb, 0x20, 0xd7, 0xdf, 0x0a, 0xe1, 0x1f, 0x39, 0x09, 0xff, 0xdc, 0x54, 0xb1, 0x2d, 0x05, 0xbd, 0x29, 0x45, 0x05, 0xab, 0x76, 0x05, 0x8c, 0x79, 0xc6, 0x1d, 0xfc, 0xee, 0xdd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4195 = { .name = "ecdsa_secp224r1_sha3_512_4195", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4195_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4195_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4195_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 312 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4196 for ECDSA, tcId is 313 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4196_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4196_msg[] = { 0x31, 0x30, 0x35, 0x31, 0x33, 0x32, 0x35, 0x36, 0x33, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4196_sig[] = { 0x90, 0x0b, 0x8c, 0xb6, 0x6d, 0x0e, 0x2b, 0xf2, 0xf0, 0xc4, 0xbc, 0x3b, 0xf2, 0x69, 0xb5, 0x21, 0x80, 0x1e, 0x88, 0x8f, 0xf1, 0x7c, 0x5b, 0x82, 0x86, 0x40, 0x9a, 0xc2, 0x6a, 0x0e, 0x97, 0x36, 0xee, 0x8a, 0x57, 0x0f, 0xbf, 0x76, 0x86, 0x63, 0x0c, 0x9d, 0xc2, 0x61, 0x3c, 0xb0, 0x84, 0xc6, 0x45, 0x10, 0x0b, 0x39, 0x24, 0xb2, 0xb8, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4196 = { .name = "ecdsa_secp224r1_sha3_512_4196", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4196_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4196_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4196_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 313 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4197 for ECDSA, tcId is 314 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4197_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4197_msg[] = { 0x34, 0x30, 0x31, 0x39, 0x38, 0x36, 0x36, 0x36, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4197_sig[] = { 0xfa, 0xd4, 0x7b, 0x9c, 0xa7, 0xac, 0xb9, 0x4d, 0xa3, 0x4c, 0xc5, 0x95, 0x86, 0xa9, 0xa4, 0x2b, 0x95, 0xa5, 0x2d, 0x80, 0x9e, 0x3d, 0x58, 0x16, 0xcd, 0x1f, 0x2a, 0xf8, 0x42, 0xc8, 0x95, 0xf0, 0x5a, 0x25, 0xa4, 0x43, 0xca, 0x32, 0xa0, 0x70, 0xaf, 0xf7, 0x22, 0x25, 0x11, 0x4b, 0x55, 0x77, 0x34, 0xb9, 0x66, 0x29, 0x3b, 0x65, 0x7e, 0xac, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4197 = { .name = "ecdsa_secp224r1_sha3_512_4197", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4197_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4197_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4197_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 314 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4198 for ECDSA, tcId is 315 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4198_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4198_msg[] = { 0x31, 0x30, 0x34, 0x35, 0x30, 0x32, 0x35, 0x37, 0x33, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4198_sig[] = { 0x43, 0x1e, 0x66, 0x68, 0x43, 0xa0, 0xd5, 0xe1, 0x31, 0x56, 0x7a, 0xb1, 0x3e, 0xc0, 0xac, 0xcd, 0x1f, 0xef, 0x8d, 0x44, 0x1e, 0x96, 0xc4, 0xb8, 0x83, 0x4d, 0x4e, 0x40, 0x0e, 0x7a, 0x8b, 0xb3, 0xce, 0xf5, 0xa6, 0x76, 0xcf, 0x41, 0x48, 0xda, 0x42, 0xb6, 0x14, 0x57, 0xcf, 0x9f, 0xd4, 0x3c, 0x8a, 0x33, 0x24, 0x1d, 0x4b, 0xb8, 0x71, 0x81, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4198 = { .name = "ecdsa_secp224r1_sha3_512_4198", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4198_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4198_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4198_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 315 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4199 for ECDSA, tcId is 316 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4199_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4199_msg[] = { 0x33, 0x32, 0x36, 0x39, 0x35, 0x38, 0x35, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4199_sig[] = { 0x41, 0x32, 0x7e, 0x34, 0x97, 0xa6, 0x15, 0x19, 0x2c, 0x69, 0x7a, 0xe6, 0xa6, 0xf8, 0x62, 0x2b, 0xa4, 0x93, 0x98, 0x7f, 0x61, 0x76, 0x13, 0xe7, 0x6d, 0x13, 0x4f, 0x26, 0xe2, 0x53, 0x9f, 0x0d, 0x61, 0x21, 0xb2, 0x7d, 0x4f, 0x71, 0x77, 0x71, 0x4e, 0xa5, 0xea, 0xd4, 0xf4, 0xd4, 0x92, 0x84, 0x24, 0x3e, 0x3e, 0xbe, 0x96, 0x4f, 0x9c, 0x47, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4199 = { .name = "ecdsa_secp224r1_sha3_512_4199", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4199_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4199_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4199_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 316 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4200 for ECDSA, tcId is 317 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4200_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4200_msg[] = { 0x33, 0x30, 0x37, 0x34, 0x36, 0x35, 0x33, 0x32, 0x34, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4200_sig[] = { 0x37, 0x50, 0x6c, 0xcd, 0x77, 0xf8, 0x09, 0x7e, 0x83, 0xd6, 0x3c, 0x3d, 0x52, 0xaf, 0x63, 0x4c, 0xc0, 0xfe, 0x98, 0x53, 0x56, 0x88, 0xd9, 0x62, 0xb0, 0xbc, 0x36, 0x89, 0xbf, 0x89, 0xec, 0xc5, 0x70, 0x43, 0x6c, 0x2f, 0xb8, 0x5b, 0xee, 0xf3, 0x96, 0x42, 0x26, 0x26, 0xcf, 0x03, 0xf7, 0xc2, 0xdc, 0x16, 0xd4, 0x69, 0x51, 0x10, 0x44, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4200 = { .name = "ecdsa_secp224r1_sha3_512_4200", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4200_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4200_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4200_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 317 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4201 for ECDSA, tcId is 318 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4201_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4201_msg[] = { 0x37, 0x37, 0x31, 0x34, 0x36, 0x38, 0x33, 0x34, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4201_sig[] = { 0xc9, 0x7f, 0xbc, 0x50, 0x27, 0x20, 0x4b, 0x81, 0x1f, 0x4c, 0x25, 0x0c, 0xca, 0xb7, 0x41, 0xe2, 0x28, 0x76, 0xd1, 0xa8, 0xf8, 0xc6, 0x23, 0x7e, 0xa9, 0x15, 0xca, 0x38, 0xc5, 0x1c, 0xef, 0xcf, 0x82, 0xa3, 0x03, 0x93, 0x5b, 0x01, 0x5f, 0x05, 0x51, 0xaf, 0x07, 0xb9, 0x4b, 0xb2, 0x20, 0x3e, 0x2b, 0xc7, 0xcb, 0xd3, 0x45, 0x20, 0xa3, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4201 = { .name = "ecdsa_secp224r1_sha3_512_4201", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4201_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4201_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4201_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 318 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4202 for ECDSA, tcId is 319 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4202_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4202_msg[] = { 0x31, 0x37, 0x39, 0x33, 0x33, 0x38, 0x31, 0x33, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4202_sig[] = { 0x0c, 0x1f, 0x93, 0xe9, 0xbc, 0xb1, 0xcb, 0xdd, 0xd0, 0x50, 0x8b, 0xda, 0x3d, 0xad, 0x7a, 0x96, 0xdd, 0x09, 0xf1, 0x32, 0x11, 0x36, 0x70, 0x8b, 0x58, 0x6a, 0x1e, 0xb9, 0x94, 0x7e, 0xf9, 0xa5, 0x08, 0xba, 0x96, 0x9b, 0x42, 0x2c, 0x1d, 0x8e, 0x16, 0xa8, 0x2e, 0x8a, 0x06, 0xa0, 0x01, 0x4a, 0xfb, 0x73, 0xbc, 0x1f, 0x1b, 0x6d, 0x3a, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4202 = { .name = "ecdsa_secp224r1_sha3_512_4202", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4202_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4202_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4202_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 319 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4203 for ECDSA, tcId is 320 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4203_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4203_msg[] = { 0x34, 0x38, 0x38, 0x30, 0x36, 0x32, 0x35, 0x35, 0x36, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4203_sig[] = { 0xfb, 0x0c, 0xa1, 0x57, 0x2c, 0x10, 0xb3, 0x96, 0x1e, 0x95, 0x39, 0xa9, 0x42, 0x3a, 0x55, 0xdd, 0x08, 0xdd, 0x99, 0x1f, 0xc0, 0x4e, 0x13, 0x20, 0x7b, 0x80, 0x1a, 0x7e, 0x7c, 0x9c, 0x04, 0x98, 0x36, 0xe1, 0x56, 0x6b, 0x88, 0x9c, 0x94, 0x41, 0x6c, 0x04, 0xa4, 0xa8, 0x61, 0xf3, 0x57, 0x3d, 0xe7, 0x71, 0xbe, 0x3e, 0xcf, 0xc0, 0xc6, 0xca, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4203 = { .name = "ecdsa_secp224r1_sha3_512_4203", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4203_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4203_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4203_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 320 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4204 for ECDSA, tcId is 321 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4204_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4204_msg[] = { 0x34, 0x39, 0x34, 0x33, 0x37, 0x36, 0x34, 0x38, 0x38, 0x35, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4204_sig[] = { 0x76, 0x27, 0x64, 0xcf, 0x21, 0x63, 0x75, 0x9d, 0xfc, 0xf7, 0x86, 0x3b, 0x20, 0x84, 0x9c, 0x6d, 0xeb, 0x57, 0x80, 0x8c, 0xb2, 0x08, 0x47, 0x98, 0x14, 0xa2, 0x43, 0xf8, 0x7b, 0x41, 0xa9, 0x73, 0xdf, 0x21, 0x9e, 0xa7, 0x17, 0xa6, 0x53, 0xbd, 0xbe, 0x27, 0x66, 0x9b, 0xba, 0x57, 0xfc, 0x7c, 0x7a, 0xfc, 0x3a, 0xfe, 0x9c, 0x87, 0xd6, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4204 = { .name = "ecdsa_secp224r1_sha3_512_4204", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4204_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4204_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4204_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 321 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4205 for ECDSA, tcId is 322 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4205_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4205_msg[] = { 0x34, 0x37, 0x30, 0x38, 0x36, 0x38, 0x39, 0x37, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4205_sig[] = { 0x5c, 0xc1, 0x08, 0x13, 0x88, 0x81, 0xbe, 0x0c, 0xf7, 0x03, 0x5d, 0xca, 0xd9, 0x4d, 0xb3, 0x60, 0x63, 0xea, 0xf1, 0x48, 0xd2, 0x4f, 0xed, 0xfe, 0x44, 0x72, 0x3e, 0x5d, 0xd1, 0x16, 0x37, 0xa4, 0xeb, 0x1e, 0x2e, 0x43, 0x85, 0x93, 0xed, 0xa3, 0x89, 0x70, 0x53, 0x7a, 0x05, 0x59, 0x0b, 0x3a, 0x9a, 0x50, 0x54, 0xd3, 0xaf, 0xc9, 0xe9, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4205 = { .name = "ecdsa_secp224r1_sha3_512_4205", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4205_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4205_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4205_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 322 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4206 for ECDSA, tcId is 323 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4206_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4206_msg[] = { 0x33, 0x30, 0x32, 0x39, 0x38, 0x37, 0x32, 0x39, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4206_sig[] = { 0x53, 0x1c, 0x06, 0x34, 0x89, 0x05, 0xbb, 0xf1, 0x6d, 0x85, 0xb8, 0xeb, 0xa2, 0x2f, 0x5d, 0x5c, 0xa3, 0x3e, 0x49, 0x01, 0x07, 0xea, 0x97, 0x9f, 0x6f, 0x32, 0x2a, 0x65, 0x01, 0x09, 0x21, 0x5b, 0xf6, 0xd2, 0xaf, 0xbe, 0xdf, 0x4e, 0xfe, 0x48, 0x1f, 0x70, 0x49, 0x63, 0x35, 0x5f, 0x09, 0xf5, 0x9e, 0x19, 0x77, 0xbe, 0x33, 0x09, 0x72, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4206 = { .name = "ecdsa_secp224r1_sha3_512_4206", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4206_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4206_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4206_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 323 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4207 for ECDSA, tcId is 324 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4207_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4207_msg[] = { 0x33, 0x30, 0x31, 0x37, 0x31, 0x39, 0x30, 0x33, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4207_sig[] = { 0xbd, 0xc6, 0x83, 0xa5, 0xe7, 0xcb, 0xe5, 0xdf, 0x33, 0x2c, 0x85, 0xaf, 0x8c, 0x33, 0xd7, 0xed, 0xe2, 0xe2, 0x72, 0xdc, 0xe6, 0xb4, 0x0d, 0x36, 0x0d, 0x66, 0x6a, 0xcf, 0xa7, 0x79, 0xa6, 0xf1, 0xfe, 0x92, 0xba, 0x3f, 0x79, 0x95, 0x95, 0x28, 0x9d, 0x7f, 0x37, 0xd4, 0x7a, 0x11, 0x87, 0x28, 0x5d, 0x76, 0x36, 0x33, 0x0a, 0x21, 0x7a, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4207 = { .name = "ecdsa_secp224r1_sha3_512_4207", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4207_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4207_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4207_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 324 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4208 for ECDSA, tcId is 325 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4208_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4208_msg[] = { 0x39, 0x35, 0x36, 0x33, 0x36, 0x33, 0x39, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4208_sig[] = { 0x70, 0xba, 0x41, 0x4a, 0x66, 0x6f, 0x89, 0xe8, 0x40, 0x64, 0xb2, 0xf9, 0xb0, 0x8d, 0x50, 0x0c, 0x6b, 0xb1, 0x2d, 0x0a, 0x5e, 0xf9, 0xb2, 0x3f, 0x4f, 0xa4, 0x6c, 0xcf, 0x43, 0xd8, 0x8b, 0x7e, 0x94, 0x3f, 0xe8, 0x79, 0x2f, 0xf6, 0x2e, 0xd4, 0x62, 0xea, 0x30, 0x8d, 0x28, 0xf7, 0xf0, 0x3e, 0x4d, 0xc5, 0x9d, 0x62, 0x14, 0xf3, 0x05, 0x07, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4208 = { .name = "ecdsa_secp224r1_sha3_512_4208", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4208_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4208_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4208_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 325 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4209 for ECDSA, tcId is 326 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4209_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4209_msg[] = { 0x35, 0x33, 0x30, 0x30, 0x37, 0x36, 0x34, 0x33, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4209_sig[] = { 0x12, 0x65, 0x07, 0x85, 0x2f, 0x36, 0x06, 0xba, 0xe5, 0x27, 0x74, 0x99, 0x82, 0xc5, 0xb3, 0x03, 0x87, 0x0c, 0xbf, 0x99, 0x9d, 0x2f, 0x01, 0x91, 0xf5, 0xfb, 0x7c, 0x62, 0xf4, 0xc9, 0x29, 0x89, 0x77, 0x5d, 0xd4, 0x18, 0x3c, 0x62, 0xfb, 0xa4, 0x23, 0xe6, 0x28, 0xfc, 0x12, 0x4d, 0xb1, 0x71, 0x86, 0x47, 0xa6, 0x93, 0x16, 0xe0, 0x61, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4209 = { .name = "ecdsa_secp224r1_sha3_512_4209", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4209_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4209_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4209_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 326 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4210 for ECDSA, tcId is 327 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4210_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4210_msg[] = { 0x31, 0x39, 0x33, 0x34, 0x36, 0x36, 0x34, 0x38, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4210_sig[] = { 0x93, 0x42, 0xdb, 0xbf, 0x6c, 0x92, 0x38, 0x76, 0x99, 0xc8, 0x4c, 0xc0, 0xf8, 0xb0, 0x11, 0x69, 0x0c, 0x07, 0x2f, 0x8f, 0x06, 0x7c, 0xfd, 0x5d, 0xe2, 0x13, 0xec, 0xff, 0x09, 0x32, 0x6a, 0xe7, 0x03, 0x0d, 0x26, 0x20, 0x85, 0xde, 0x89, 0x2d, 0xa4, 0xcf, 0xdb, 0xf7, 0x87, 0xcf, 0xfe, 0xaa, 0xa7, 0x1d, 0xfe, 0x00, 0x59, 0xe2, 0x8b, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4210 = { .name = "ecdsa_secp224r1_sha3_512_4210", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4210_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4210_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4210_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 327 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4211 for ECDSA, tcId is 328 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4211_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4211_msg[] = { 0x33, 0x35, 0x35, 0x34, 0x35, 0x30, 0x35, 0x35, 0x39, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4211_sig[] = { 0x1e, 0x6e, 0x37, 0x6f, 0x21, 0x43, 0xd0, 0x20, 0x84, 0x8e, 0xf2, 0x65, 0x3a, 0xed, 0xf7, 0x12, 0x3e, 0x27, 0xfa, 0x8c, 0x67, 0x58, 0x56, 0x55, 0xe7, 0xf9, 0xe5, 0xc6, 0x94, 0xc8, 0xea, 0x35, 0x67, 0xed, 0x77, 0x26, 0xd5, 0xa1, 0x45, 0xf4, 0x17, 0xba, 0x44, 0xbf, 0x7a, 0xfd, 0x58, 0x6e, 0x38, 0xc8, 0x37, 0x48, 0xdc, 0x22, 0x78, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4211 = { .name = "ecdsa_secp224r1_sha3_512_4211", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4211_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4211_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4211_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 328 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4212 for ECDSA, tcId is 329 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4212_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4212_msg[] = { 0x31, 0x33, 0x30, 0x31, 0x37, 0x32, 0x32, 0x31, 0x30, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4212_sig[] = { 0x99, 0xf6, 0x7a, 0x07, 0x6a, 0x74, 0xef, 0x92, 0xd3, 0x3c, 0xb8, 0x9e, 0x39, 0x94, 0x44, 0x23, 0xd6, 0xb6, 0x0d, 0x64, 0x79, 0xf2, 0x2a, 0x63, 0xc2, 0xb2, 0xe6, 0xa1, 0x1c, 0xbc, 0xf7, 0xba, 0xa7, 0x70, 0x2c, 0xdc, 0x17, 0x5d, 0x4d, 0xcc, 0x3d, 0x6a, 0x01, 0x6e, 0x90, 0x04, 0x6e, 0xbf, 0x74, 0xde, 0x51, 0xbd, 0xdf, 0x41, 0xde, 0xac, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4212 = { .name = "ecdsa_secp224r1_sha3_512_4212", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4212_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4212_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4212_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 329 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4213 for ECDSA, tcId is 330 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4213_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4213_msg[] = { 0x35, 0x36, 0x31, 0x37, 0x36, 0x39, 0x31, 0x36, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4213_sig[] = { 0x61, 0xec, 0x8a, 0x8a, 0x6e, 0xa8, 0x2e, 0x84, 0x22, 0x02, 0xf3, 0x27, 0xca, 0x3e, 0x59, 0x71, 0x52, 0x1b, 0xe1, 0x3c, 0x6d, 0xc6, 0x05, 0xe7, 0x79, 0xfa, 0x9b, 0x47, 0x9f, 0x87, 0x29, 0x4c, 0x70, 0x26, 0x76, 0xcc, 0xab, 0x8a, 0x6b, 0x31, 0xae, 0xf5, 0xaa, 0x10, 0x41, 0x39, 0xda, 0x7c, 0xbc, 0x69, 0xb1, 0xa6, 0xd4, 0xd7, 0x7a, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4213 = { .name = "ecdsa_secp224r1_sha3_512_4213", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4213_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4213_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4213_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 330 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4214 for ECDSA, tcId is 331 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4214_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4214_msg[] = { 0x33, 0x35, 0x38, 0x31, 0x39, 0x33, 0x32, 0x35, 0x33, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4214_sig[] = { 0x46, 0x7f, 0xfb, 0xd3, 0x37, 0x2c, 0x95, 0x54, 0x75, 0x37, 0x21, 0x2a, 0xf7, 0x07, 0xe4, 0x12, 0x91, 0x9e, 0xb3, 0x73, 0x1b, 0xa6, 0x61, 0xa2, 0xf2, 0x0e, 0xca, 0x59, 0xbe, 0xee, 0xf3, 0xb4, 0xb3, 0x25, 0xd5, 0x00, 0x4f, 0x0d, 0xbd, 0x99, 0xa7, 0x35, 0x77, 0x8d, 0xb5, 0x3e, 0x0a, 0xa3, 0x81, 0xa0, 0x69, 0xfa, 0x68, 0xf0, 0x08, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4214 = { .name = "ecdsa_secp224r1_sha3_512_4214", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4214_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4214_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4214_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 331 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4215 for ECDSA, tcId is 332 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4215_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4215_msg[] = { 0x31, 0x35, 0x37, 0x31, 0x36, 0x36, 0x37, 0x38, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4215_sig[] = { 0xd4, 0xbb, 0xeb, 0x81, 0x92, 0x2f, 0x0e, 0x5f, 0x10, 0xd6, 0x37, 0xa4, 0x8d, 0xbe, 0x3d, 0x80, 0xcb, 0x53, 0x52, 0x48, 0x76, 0x82, 0x1d, 0xc2, 0xfa, 0xbb, 0x34, 0x57, 0x23, 0xf8, 0xff, 0x09, 0x19, 0xd5, 0x66, 0xe0, 0x5a, 0x26, 0xac, 0x97, 0xd5, 0x1b, 0xdc, 0x79, 0xba, 0x9c, 0x92, 0x0e, 0x2d, 0x6c, 0x77, 0x7b, 0x8d, 0x7c, 0xd4, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4215 = { .name = "ecdsa_secp224r1_sha3_512_4215", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4215_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4215_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4215_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 332 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4216 for ECDSA, tcId is 333 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4216_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4216_msg[] = { 0x33, 0x31, 0x39, 0x39, 0x37, 0x38, 0x33, 0x33, 0x36, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4216_sig[] = { 0xc1, 0x51, 0xab, 0x28, 0xd7, 0xa2, 0x39, 0x86, 0x02, 0x1c, 0xad, 0x0f, 0x2f, 0x93, 0x7b, 0x61, 0xc4, 0xad, 0xab, 0x21, 0xac, 0xf5, 0x08, 0x1c, 0xad, 0xe5, 0x65, 0x85, 0x38, 0x6a, 0xa4, 0x09, 0x27, 0xcb, 0xc4, 0x52, 0x16, 0x56, 0x8b, 0x23, 0xf6, 0xa4, 0xc4, 0x9a, 0xea, 0xb5, 0x25, 0xe9, 0x4b, 0x07, 0x4b, 0x8e, 0xf1, 0x6a, 0xad, 0x64, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4216 = { .name = "ecdsa_secp224r1_sha3_512_4216", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4216_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4216_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4216_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 333 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4217 for ECDSA, tcId is 334 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4217_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4217_msg[] = { 0x37, 0x34, 0x30, 0x34, 0x37, 0x35, 0x30, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4217_sig[] = { 0x40, 0xa4, 0xb6, 0x10, 0x69, 0x60, 0xc1, 0xb2, 0x49, 0xc1, 0x16, 0xd5, 0x39, 0xc9, 0xab, 0x27, 0xf9, 0x92, 0xf0, 0xc1, 0xe9, 0x2d, 0x8e, 0x04, 0xa9, 0x19, 0xa7, 0x49, 0x81, 0x1d, 0x34, 0xda, 0x16, 0x6b, 0x24, 0x47, 0xa2, 0xda, 0x0e, 0x38, 0x21, 0xcf, 0xf1, 0x2c, 0xd4, 0x7a, 0xe0, 0xfb, 0x27, 0x3f, 0xb1, 0x8d, 0xf8, 0x30, 0xd1, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4217 = { .name = "ecdsa_secp224r1_sha3_512_4217", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4217_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4217_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4217_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 334 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4218 for ECDSA, tcId is 335 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4218_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4218_msg[] = { 0x34, 0x31, 0x37, 0x34, 0x33, 0x36, 0x35, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4218_sig[] = { 0x68, 0x08, 0xf8, 0xc1, 0xcf, 0x3a, 0x05, 0x17, 0x24, 0xd0, 0x74, 0xeb, 0xdc, 0x85, 0xfc, 0xdc, 0x14, 0x98, 0x73, 0x24, 0x60, 0x5a, 0x81, 0xdb, 0x75, 0x91, 0xba, 0xa6, 0x02, 0x6f, 0x5e, 0xfe, 0xf2, 0xc6, 0x57, 0xbc, 0x04, 0x8c, 0x88, 0xa1, 0x65, 0xf8, 0x85, 0x62, 0x8e, 0xfc, 0xad, 0x29, 0x3d, 0x80, 0xa5, 0xcf, 0x72, 0x85, 0x54, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4218 = { .name = "ecdsa_secp224r1_sha3_512_4218", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4218_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4218_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4218_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 335 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4219 for ECDSA, tcId is 336 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4219_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4219_msg[] = { 0x31, 0x32, 0x33, 0x35, 0x36, 0x35, 0x38, 0x38, 0x38, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4219_sig[] = { 0xaf, 0x71, 0x77, 0xec, 0x82, 0xb9, 0x07, 0xca, 0xfe, 0x3a, 0xc3, 0xbf, 0xb0, 0xae, 0x2f, 0x2a, 0x2a, 0x83, 0x55, 0x38, 0x0c, 0xe8, 0xb3, 0x12, 0x17, 0xfd, 0xb3, 0xf0, 0x05, 0x28, 0x2a, 0x1d, 0xc8, 0x1c, 0xb4, 0x58, 0xf1, 0xc5, 0x56, 0x87, 0x7d, 0xc2, 0x33, 0x01, 0xcd, 0x8f, 0x69, 0xa5, 0x26, 0x9d, 0xf6, 0x83, 0xba, 0x1d, 0x95, 0x9b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4219 = { .name = "ecdsa_secp224r1_sha3_512_4219", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4219_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4219_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4219_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 336 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4220 for ECDSA, tcId is 337 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4220_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4220_msg[] = { 0x32, 0x34, 0x32, 0x39, 0x32, 0x35, 0x35, 0x34, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4220_sig[] = { 0x4c, 0xb8, 0x75, 0x03, 0xbd, 0xe0, 0xac, 0xa3, 0x23, 0xf9, 0x3b, 0x04, 0xe1, 0x73, 0x5f, 0x84, 0xbc, 0x0e, 0x10, 0x1b, 0xa8, 0xb7, 0x13, 0x32, 0xfb, 0x40, 0xce, 0x4c, 0x0b, 0xbc, 0x59, 0xda, 0xc1, 0x49, 0xa5, 0x64, 0x47, 0x71, 0x11, 0x9b, 0x00, 0xd1, 0xd7, 0x29, 0x05, 0xe4, 0xb0, 0x80, 0xf9, 0xaf, 0xf5, 0xd6, 0xa4, 0x2e, 0x15, 0x65, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4220 = { .name = "ecdsa_secp224r1_sha3_512_4220", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4220_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4220_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4220_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 337 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4221 for ECDSA, tcId is 338 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4221_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4221_msg[] = { 0x35, 0x31, 0x38, 0x30, 0x33, 0x30, 0x32, 0x35, 0x34, 0x36, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4221_sig[] = { 0xae, 0x09, 0x71, 0x8e, 0x0e, 0x6e, 0x7f, 0xb0, 0x23, 0x70, 0x56, 0xf5, 0x31, 0x22, 0x1c, 0x0c, 0x93, 0x30, 0x6b, 0x42, 0x6a, 0x98, 0x5a, 0xc5, 0x1a, 0x70, 0xa8, 0x31, 0xb5, 0x05, 0x99, 0xa4, 0x16, 0x55, 0x3c, 0x34, 0x10, 0x2a, 0x91, 0x79, 0x90, 0xc7, 0x0c, 0x3f, 0x9f, 0x6e, 0xd0, 0x17, 0x19, 0xfa, 0x9e, 0x00, 0x9c, 0x14, 0xa2, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4221 = { .name = "ecdsa_secp224r1_sha3_512_4221", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4221_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4221_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4221_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 338 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4222 for ECDSA, tcId is 339 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4222_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4222_msg[] = { 0x34, 0x34, 0x37, 0x36, 0x33, 0x39, 0x38, 0x32, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4222_sig[] = { 0x7b, 0xd6, 0x1f, 0x75, 0x61, 0x0e, 0xad, 0x31, 0x2a, 0x22, 0x7d, 0x53, 0x68, 0xe0, 0x93, 0x60, 0x6a, 0x46, 0x30, 0x66, 0x38, 0x25, 0x49, 0x0b, 0x39, 0x2a, 0x5a, 0x65, 0x86, 0x55, 0x2b, 0xb6, 0xf4, 0xf3, 0x56, 0x43, 0x49, 0xfc, 0x3f, 0xb4, 0x70, 0x73, 0xc3, 0xc2, 0x8d, 0x10, 0xd9, 0xda, 0xf5, 0xb9, 0x16, 0x6a, 0x82, 0xf8, 0xa6, 0xbb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4222 = { .name = "ecdsa_secp224r1_sha3_512_4222", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4222_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4222_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4222_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 339 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4223 for ECDSA, tcId is 340 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4223_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4223_msg[] = { 0x39, 0x30, 0x36, 0x30, 0x30, 0x33, 0x35, 0x32, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4223_sig[] = { 0xa3, 0xda, 0xf1, 0x23, 0xbc, 0x8a, 0x3e, 0x39, 0x3e, 0x8d, 0x66, 0x9b, 0xd7, 0x6c, 0x44, 0x86, 0xa3, 0xe6, 0x5b, 0xd1, 0x6f, 0xc3, 0x90, 0xe0, 0x9b, 0x23, 0x08, 0xc9, 0x9c, 0x68, 0x0c, 0xdb, 0xca, 0x9d, 0x3a, 0xa3, 0x78, 0xcf, 0xe6, 0x04, 0x81, 0xb2, 0xe6, 0x8d, 0x3b, 0x36, 0x87, 0x36, 0x3e, 0x67, 0x16, 0x54, 0x2d, 0xa5, 0x0a, 0x72, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4223 = { .name = "ecdsa_secp224r1_sha3_512_4223", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4223_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4223_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4223_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 340 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4224 for ECDSA, tcId is 341 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4224_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4224_msg[] = { 0x31, 0x37, 0x35, 0x36, 0x30, 0x35, 0x33, 0x30, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4224_sig[] = { 0xb7, 0x82, 0xf0, 0xaf, 0x65, 0x52, 0xa3, 0xf3, 0x05, 0x30, 0x94, 0x2f, 0x35, 0x16, 0x0c, 0x09, 0xec, 0x77, 0xd0, 0x65, 0x95, 0xac, 0xeb, 0x9d, 0xa8, 0xd2, 0x46, 0xac, 0xf4, 0x1b, 0x82, 0x16, 0xff, 0x29, 0xfc, 0x92, 0x65, 0x55, 0x27, 0xc6, 0xae, 0xfa, 0xc0, 0xba, 0xb8, 0x39, 0xc1, 0x85, 0x25, 0xc0, 0x33, 0x16, 0xb4, 0x6a, 0x4e, 0xdf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4224 = { .name = "ecdsa_secp224r1_sha3_512_4224", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4224_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4224_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4224_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 341 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4225 for ECDSA, tcId is 342 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4225_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4225_msg[] = { 0x34, 0x39, 0x38, 0x30, 0x38, 0x36, 0x30, 0x30, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha3_512_4225_sig[] = { 0x3e, 0xe9, 0x45, 0xc8, 0x7a, 0x9d, 0x4e, 0x74, 0xd8, 0x74, 0x71, 0xf8, 0x3e, 0x4f, 0x79, 0x19, 0x45, 0xb7, 0x73, 0x3a, 0x1b, 0xc7, 0x5f, 0xe6, 0x73, 0x8f, 0x23, 0xec, 0xab, 0x06, 0x85, 0x8d, 0x11, 0x36, 0x16, 0xb6, 0x94, 0xd3, 0x6f, 0xfa, 0xf1, 0x73, 0x65, 0x67, 0xd3, 0x89, 0x5e, 0x00, 0x5e, 0x80, 0xf5, 0x21, 0x31, 0x0b, 0x5e, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4225 = { .name = "ecdsa_secp224r1_sha3_512_4225", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4225_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4225_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4225_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 342 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4226 for ECDSA, tcId is 343 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4226_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4226_msg[] = { 0x33, 0x36, 0x32, 0x31, 0x38, 0x37, 0x35, 0x33, 0x33, 0x35, }; static const unsigned char ecdsa_secp224r1_sha3_512_4226_sig[] = { 0x73, 0x37, 0x52, 0xfa, 0x2b, 0x90, 0x12, 0x1c, 0x01, 0x87, 0x81, 0x70, 0xf2, 0x01, 0x9d, 0x9c, 0x9a, 0x4b, 0x1c, 0x95, 0xe8, 0x2a, 0xca, 0xb1, 0x8a, 0xe9, 0x5d, 0x71, 0x35, 0x8e, 0xb5, 0xd6, 0x99, 0x42, 0xb4, 0xb5, 0xd0, 0xd9, 0x00, 0xbb, 0x84, 0x3d, 0x79, 0xf9, 0x0a, 0xf5, 0x46, 0x63, 0xb3, 0xa9, 0x26, 0xfa, 0xbd, 0x08, 0x1d, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4226 = { .name = "ecdsa_secp224r1_sha3_512_4226", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4226_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4226_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4226_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 343 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4227 for ECDSA, tcId is 344 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4227_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4227_msg[] = { 0x36, 0x36, 0x34, 0x33, 0x33, 0x33, 0x34, 0x37, 0x32, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4227_sig[] = { 0x72, 0xfa, 0x0c, 0xb3, 0x88, 0x63, 0xc0, 0x6e, 0x53, 0x54, 0x02, 0xe0, 0x10, 0xba, 0xc7, 0x09, 0xef, 0x4b, 0xeb, 0x0b, 0x38, 0x11, 0x8c, 0x7b, 0x13, 0x30, 0x8e, 0x83, 0x33, 0xeb, 0x21, 0xf6, 0xc0, 0x81, 0xaf, 0xa7, 0xdb, 0x62, 0xc2, 0xf8, 0xcf, 0x78, 0xed, 0x19, 0x82, 0xcb, 0x76, 0x2a, 0x13, 0x05, 0x09, 0xbd, 0xb5, 0x3f, 0x17, 0x74, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4227 = { .name = "ecdsa_secp224r1_sha3_512_4227", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4227_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4227_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4227_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 344 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4228 for ECDSA, tcId is 345 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4228_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4228_msg[] = { 0x34, 0x34, 0x35, 0x34, 0x39, 0x34, 0x32, 0x37, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4228_sig[] = { 0x92, 0x77, 0xca, 0x6d, 0xb7, 0x35, 0xf4, 0x4b, 0xff, 0x16, 0xc7, 0xce, 0x43, 0xad, 0x45, 0x70, 0x7b, 0xc6, 0xa6, 0xb4, 0x51, 0xe6, 0x45, 0x32, 0xb8, 0x6b, 0x54, 0xaf, 0x43, 0x3c, 0x69, 0xa0, 0x72, 0x34, 0x9f, 0x38, 0x14, 0xc6, 0x36, 0x64, 0x18, 0xd3, 0xeb, 0x7f, 0xb0, 0x55, 0x09, 0xad, 0x09, 0x9a, 0xfe, 0xef, 0x41, 0x1c, 0x6e, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4228 = { .name = "ecdsa_secp224r1_sha3_512_4228", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4228_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4228_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4228_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 345 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4229 for ECDSA, tcId is 346 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4229_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4229_msg[] = { 0x32, 0x30, 0x31, 0x38, 0x34, 0x34, 0x30, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4229_sig[] = { 0x37, 0xe0, 0x5e, 0xbb, 0x37, 0x6e, 0xde, 0x0d, 0x3f, 0xc7, 0x52, 0x8f, 0x19, 0xdb, 0xe4, 0xa3, 0x8e, 0x4f, 0x31, 0x02, 0x95, 0x05, 0x8e, 0x21, 0x73, 0xf8, 0x89, 0x00, 0x4f, 0x8d, 0x5c, 0xa6, 0x27, 0xd4, 0x3c, 0x54, 0xdb, 0x66, 0x74, 0xe1, 0x46, 0x2d, 0x12, 0xc4, 0x26, 0x03, 0xcd, 0xdc, 0x6f, 0x30, 0x67, 0x30, 0x7a, 0xb0, 0x4d, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4229 = { .name = "ecdsa_secp224r1_sha3_512_4229", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4229_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4229_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha3_512_4229_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 346 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4230 for ECDSA, tcId is 347 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4230_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4230_msg[] = { 0x35, 0x38, 0x31, 0x33, 0x32, 0x31, 0x37, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4230_sig[] = { 0xa4, 0x19, 0xd0, 0x9f, 0x64, 0xd2, 0x8e, 0x4c, 0xa6, 0x17, 0x18, 0x77, 0x90, 0xd0, 0x46, 0xe3, 0xb2, 0x9b, 0x87, 0xdc, 0xd6, 0x00, 0x7e, 0xae, 0xef, 0x08, 0xae, 0xf0, 0x39, 0x7f, 0xae, 0x56, 0x99, 0x61, 0x47, 0x8f, 0xd7, 0xd0, 0x75, 0xa3, 0x03, 0x98, 0xa6, 0x46, 0xd9, 0x5c, 0x00, 0xf8, 0x17, 0x16, 0x00, 0xe1, 0xca, 0x23, 0x35, 0xc1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4230 = { .name = "ecdsa_secp224r1_sha3_512_4230", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4230_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4230_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha3_512_4230_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 347 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4231 for ECDSA, tcId is 348 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4231_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4231_msg[] = { 0x31, 0x31, 0x38, 0x33, 0x38, 0x36, 0x31, 0x38, 0x31, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4231_sig[] = { 0x05, 0xea, 0x0f, 0x04, 0xe9, 0xb4, 0xeb, 0x3b, 0x62, 0xfc, 0xf8, 0xf1, 0xf1, 0xd1, 0x20, 0xe5, 0x8a, 0x93, 0x2c, 0xa9, 0xa0, 0x4e, 0x8c, 0x64, 0xbb, 0xee, 0x53, 0x7e, 0x16, 0x66, 0x33, 0xa3, 0xc8, 0xd2, 0xb5, 0xc6, 0x24, 0x6d, 0xa6, 0x9e, 0x06, 0x9f, 0x2f, 0x09, 0xa7, 0x91, 0x2e, 0xfc, 0x35, 0x5c, 0x40, 0x53, 0x02, 0xb2, 0x98, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4231 = { .name = "ecdsa_secp224r1_sha3_512_4231", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4231_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4231_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4231_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 348 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4232 for ECDSA, tcId is 349 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4232_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4232_msg[] = { 0x31, 0x39, 0x32, 0x32, 0x36, 0x30, 0x32, 0x39, 0x30, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4232_sig[] = { 0xfa, 0x2a, 0x62, 0x65, 0xe9, 0xfb, 0xd3, 0x17, 0xfc, 0xda, 0x0a, 0xde, 0xac, 0x30, 0x7f, 0xe2, 0xf0, 0xa9, 0x4a, 0xfd, 0x63, 0x03, 0xc9, 0x19, 0x85, 0xd8, 0x4d, 0x10, 0xdb, 0x93, 0xf0, 0x20, 0x12, 0x84, 0xb5, 0xb6, 0x6a, 0x15, 0xea, 0x17, 0x7f, 0x34, 0xc2, 0x7c, 0x6d, 0x80, 0x47, 0x9c, 0x18, 0xdb, 0x44, 0xf3, 0x86, 0xe8, 0x5d, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4232 = { .name = "ecdsa_secp224r1_sha3_512_4232", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4232_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4232_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4232_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 349 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4233 for ECDSA, tcId is 350 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4233_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4233_msg[] = { 0x39, 0x37, 0x35, 0x31, 0x34, 0x33, 0x32, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4233_sig[] = { 0x2d, 0x58, 0xc2, 0xd0, 0xcb, 0xbe, 0x72, 0x15, 0x42, 0x4b, 0x94, 0x30, 0x06, 0xdd, 0x56, 0xd2, 0x31, 0x59, 0xea, 0x10, 0x14, 0x05, 0x69, 0xdc, 0x22, 0x66, 0x3b, 0xfc, 0x8d, 0x9b, 0xde, 0xc0, 0x63, 0x9a, 0x23, 0x6e, 0x95, 0xfd, 0xb3, 0x5d, 0xc2, 0xce, 0x3d, 0x63, 0xf7, 0xd5, 0x44, 0x7b, 0x6d, 0xd3, 0xd9, 0x52, 0x27, 0xfb, 0xa0, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4233 = { .name = "ecdsa_secp224r1_sha3_512_4233", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4233_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4233_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4233_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 350 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4234 for ECDSA, tcId is 351 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4234_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4234_msg[] = { 0x38, 0x33, 0x31, 0x35, 0x31, 0x31, 0x36, 0x33, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha3_512_4234_sig[] = { 0x1b, 0xc6, 0x4a, 0xaf, 0x83, 0x51, 0x52, 0x75, 0xfd, 0x31, 0x87, 0xa1, 0x8d, 0x36, 0x51, 0xc7, 0x5c, 0xe8, 0x5b, 0x53, 0xf5, 0x57, 0x9e, 0xcf, 0x5f, 0x19, 0x03, 0x34, 0x2e, 0xd9, 0xfc, 0x72, 0x3b, 0xd7, 0x23, 0xcd, 0x4c, 0x8b, 0x62, 0xb7, 0x96, 0x8e, 0x5f, 0x05, 0x8d, 0x25, 0xaa, 0x6f, 0x6b, 0xb4, 0x5e, 0x6b, 0x09, 0x33, 0x77, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4234 = { .name = "ecdsa_secp224r1_sha3_512_4234", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4234_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4234_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4234_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 351 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4235 for ECDSA, tcId is 352 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4235_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4235_msg[] = { 0x33, 0x32, 0x36, 0x33, 0x31, 0x36, 0x38, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha3_512_4235_sig[] = { 0x24, 0x0d, 0x8b, 0x05, 0x88, 0x92, 0x74, 0xd7, 0x16, 0xf5, 0x75, 0x88, 0x53, 0x63, 0x20, 0x77, 0x5a, 0xfe, 0xd8, 0x24, 0xd7, 0x9f, 0x41, 0xf3, 0x2c, 0x35, 0xe7, 0x28, 0x25, 0x03, 0x1a, 0x07, 0x3d, 0x63, 0x81, 0x65, 0xf8, 0xc0, 0xb4, 0x6a, 0x28, 0xe0, 0x08, 0xf1, 0xde, 0x9f, 0xa0, 0xcf, 0x72, 0x6d, 0x31, 0x62, 0x69, 0xf6, 0x69, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4235 = { .name = "ecdsa_secp224r1_sha3_512_4235", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4235_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4235_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha3_512_4235_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 352 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4236 for ECDSA, tcId is 353 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4236_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4236_msg[] = { 0x34, 0x30, 0x32, 0x39, 0x36, 0x38, 0x37, 0x31, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha3_512_4236_sig[] = { 0xfb, 0x2f, 0x81, 0xbd, 0x4e, 0x22, 0x23, 0x0c, 0x0c, 0x95, 0xa7, 0xa0, 0x8e, 0xaf, 0x9a, 0x66, 0x8f, 0x6b, 0x5c, 0x6d, 0x32, 0xbf, 0xfa, 0xf5, 0x38, 0xbe, 0xd1, 0x9d, 0x8a, 0xe8, 0xc1, 0x26, 0xb3, 0x16, 0x81, 0x29, 0xa7, 0x20, 0xa6, 0x74, 0xfa, 0x4d, 0xbb, 0x81, 0xd9, 0x4f, 0x4a, 0x3e, 0x86, 0x2b, 0x83, 0x4e, 0xa3, 0x28, 0xed, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4236 = { .name = "ecdsa_secp224r1_sha3_512_4236", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4236_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4236_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4236_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 353 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4237 for ECDSA, tcId is 354 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4237_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4237_msg[] = { 0x36, 0x33, 0x32, 0x30, 0x38, 0x38, 0x31, 0x31, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4237_sig[] = { 0xfd, 0xcd, 0xf3, 0x94, 0x0d, 0x5b, 0x9b, 0x38, 0x41, 0xfa, 0x0e, 0xe6, 0x67, 0xd4, 0xed, 0x9a, 0xc7, 0x4e, 0x0c, 0xdc, 0xde, 0x96, 0x41, 0x27, 0x0f, 0x2e, 0x65, 0x8d, 0x31, 0x67, 0xf2, 0xb6, 0x60, 0x1b, 0x73, 0x7b, 0xc4, 0xa7, 0x00, 0xdd, 0x09, 0x40, 0xef, 0x86, 0x10, 0x7e, 0xb5, 0x7c, 0x39, 0xef, 0xaf, 0x6b, 0x3d, 0x71, 0xfd, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4237 = { .name = "ecdsa_secp224r1_sha3_512_4237", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4237_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4237_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4237_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 354 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4238 for ECDSA, tcId is 355 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4238_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4238_msg[] = { 0x35, 0x32, 0x32, 0x35, 0x33, 0x39, 0x30, 0x37, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4238_sig[] = { 0x46, 0x40, 0x8d, 0x1a, 0xc7, 0x4a, 0x5b, 0xd0, 0x3c, 0x3f, 0xc0, 0x86, 0x85, 0xf2, 0x74, 0x3e, 0xb3, 0xf7, 0xc4, 0x22, 0x03, 0xf6, 0x36, 0x06, 0x77, 0x5a, 0x42, 0x50, 0x98, 0x13, 0xe4, 0x70, 0x4b, 0x56, 0x5f, 0x94, 0xe5, 0x63, 0xa6, 0x53, 0xa9, 0xd4, 0xe0, 0x31, 0x0e, 0xbc, 0x70, 0x55, 0x72, 0x9f, 0x89, 0xca, 0x4b, 0x02, 0xd9, 0xf0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4238 = { .name = "ecdsa_secp224r1_sha3_512_4238", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4238_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4238_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4238_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 355 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4239 for ECDSA, tcId is 356 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4239_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4239_msg[] = { 0x31, 0x33, 0x34, 0x39, 0x33, 0x39, 0x33, 0x36, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4239_sig[] = { 0xc9, 0x09, 0x60, 0x71, 0xc9, 0x29, 0x73, 0x19, 0x8e, 0xfa, 0xc6, 0x9d, 0x6b, 0x39, 0x12, 0xe4, 0xe1, 0x42, 0x48, 0xbb, 0x07, 0x76, 0x02, 0x87, 0x0c, 0x54, 0x3c, 0xf2, 0x63, 0x1c, 0x99, 0x5c, 0xab, 0x8f, 0x0c, 0xcf, 0x5e, 0x3d, 0xcb, 0x30, 0xd4, 0xb9, 0x95, 0xdc, 0x96, 0xd2, 0x57, 0x3f, 0xac, 0xc6, 0xed, 0x95, 0x61, 0xcb, 0x9d, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4239 = { .name = "ecdsa_secp224r1_sha3_512_4239", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4239_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4239_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha3_512_4239_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 356 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4240 for ECDSA, tcId is 357 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4240_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4240_msg[] = { 0x31, 0x30, 0x33, 0x39, 0x37, 0x39, 0x36, 0x30, 0x37, 0x36, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4240_sig[] = { 0xb5, 0x5b, 0xb2, 0xda, 0x01, 0xe9, 0x9b, 0x08, 0xf6, 0x4d, 0xce, 0xc6, 0xd6, 0xd7, 0x46, 0xb5, 0x62, 0x6a, 0xec, 0x6e, 0xae, 0x23, 0x78, 0xfd, 0x1d, 0xb7, 0x21, 0x07, 0x07, 0xf3, 0x6d, 0x4e, 0xdf, 0x6c, 0x81, 0x12, 0xe2, 0xa6, 0xb9, 0x66, 0x5b, 0x19, 0x60, 0x5f, 0x41, 0xc9, 0x44, 0x9a, 0x7e, 0xab, 0x78, 0x39, 0xd6, 0x38, 0xce, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4240 = { .name = "ecdsa_secp224r1_sha3_512_4240", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4240_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4240_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha3_512_4240_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 357 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4241 for ECDSA, tcId is 358 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4241_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4241_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4241_sig[] = { 0xe6, 0x30, 0x94, 0x9b, 0x06, 0xfd, 0xe0, 0x6a, 0x76, 0x3c, 0xd4, 0x57, 0xfc, 0x17, 0x76, 0xa0, 0x06, 0x93, 0x2c, 0x0f, 0xe0, 0x81, 0x31, 0xf4, 0x4a, 0xa1, 0xca, 0x41, 0x3d, 0xe7, 0xe4, 0x3d, 0x36, 0x71, 0xfa, 0x00, 0xdb, 0x71, 0xd0, 0x3e, 0x7f, 0x4d, 0x9f, 0x80, 0xb0, 0xd6, 0xd7, 0xed, 0xb6, 0x95, 0x03, 0x2e, 0x09, 0xb9, 0x3d, 0x44, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4241 = { .name = "ecdsa_secp224r1_sha3_512_4241", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4241_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4241_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4241_sig, .siglen = 56, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 358 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4242 for ECDSA, tcId is 359 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4242_pubkey[] = { 0x07, 0x8e, 0x4d, 0x1a, 0x56, 0xe6, 0xf4, 0x85, 0xc7, 0x85, 0xd0, 0x1a, 0x8c, 0xb9, 0xbb, 0x2e, 0xf5, 0xc7, 0x64, 0x6f, 0xb1, 0xe8, 0x82, 0x28, 0xab, 0xcf, 0x5e, 0x01, 0xca, 0x1f, 0xb2, 0x6c, 0x93, 0x66, 0xcd, 0x91, 0x86, 0x28, 0x03, 0x3d, 0xad, 0x95, 0x18, 0xa8, 0xf8, 0xa9, 0xff, 0x4a, 0x51, 0x3c, 0x66, 0x05, 0xf5, 0xcd, 0xaa, 0xe9, }; static const unsigned char ecdsa_secp224r1_sha3_512_4242_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4242_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4242 = { .name = "ecdsa_secp224r1_sha3_512_4242", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4242_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4242_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4242_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 359 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4243 for ECDSA, tcId is 360 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4243_pubkey[] = { 0x07, 0x8e, 0x4d, 0x1a, 0x56, 0xe6, 0xf4, 0x85, 0xc7, 0x85, 0xd0, 0x1a, 0x8c, 0xb9, 0xbb, 0x2e, 0xf5, 0xc7, 0x64, 0x6f, 0xb1, 0xe8, 0x82, 0x28, 0xab, 0xcf, 0x5e, 0x01, 0xca, 0x1f, 0xb2, 0x6c, 0x93, 0x66, 0xcd, 0x91, 0x86, 0x28, 0x03, 0x3d, 0xad, 0x95, 0x18, 0xa8, 0xf8, 0xa9, 0xff, 0x4a, 0x51, 0x3c, 0x66, 0x05, 0xf5, 0xcd, 0xaa, 0xe9, }; static const unsigned char ecdsa_secp224r1_sha3_512_4243_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4243_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4243 = { .name = "ecdsa_secp224r1_sha3_512_4243", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4243_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4243_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4243_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 360 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4244 for ECDSA, tcId is 361 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4244_pubkey[] = { 0x22, 0x52, 0x98, 0xc3, 0xaa, 0xb4, 0xee, 0x63, 0x98, 0x34, 0xfe, 0x16, 0xc4, 0x28, 0x96, 0xf6, 0x47, 0x8f, 0x35, 0x17, 0x58, 0x90, 0x64, 0x71, 0x7d, 0x40, 0x95, 0x9e, 0x72, 0x88, 0x1b, 0xdd, 0xef, 0xd6, 0xef, 0x72, 0x4f, 0xec, 0x33, 0xf9, 0x2c, 0x92, 0xd4, 0xfa, 0x2f, 0xff, 0xe7, 0x7c, 0xe2, 0x0a, 0x32, 0x78, 0x45, 0xb1, 0x20, 0x1f, }; static const unsigned char ecdsa_secp224r1_sha3_512_4244_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4244_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4244 = { .name = "ecdsa_secp224r1_sha3_512_4244", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4244_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4244_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4244_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 361 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4245 for ECDSA, tcId is 362 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4245_pubkey[] = { 0x44, 0x8b, 0xad, 0x17, 0xb6, 0x38, 0xf5, 0x53, 0x72, 0xb2, 0x56, 0xc6, 0x71, 0x7a, 0xc0, 0xfe, 0x44, 0x3c, 0x20, 0xaf, 0x13, 0x33, 0x48, 0xbe, 0x8f, 0x72, 0x85, 0x77, 0x42, 0x1c, 0x70, 0x1a, 0xe6, 0x01, 0x5d, 0xa9, 0x8a, 0x2e, 0xc4, 0x14, 0x01, 0x22, 0x09, 0x15, 0x88, 0xc0, 0x13, 0xa7, 0x4f, 0xd7, 0x8b, 0x38, 0x14, 0xc9, 0x81, 0xb2, }; static const unsigned char ecdsa_secp224r1_sha3_512_4245_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4245_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4245 = { .name = "ecdsa_secp224r1_sha3_512_4245", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4245_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4245_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4245_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 362 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4246 for ECDSA, tcId is 363 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4246_pubkey[] = { 0x14, 0x6e, 0x29, 0xfe, 0x57, 0xeb, 0xbf, 0xb9, 0x1f, 0x25, 0x62, 0xde, 0x12, 0x4e, 0x62, 0x40, 0x8e, 0x6c, 0x3e, 0x95, 0x1c, 0x96, 0xfa, 0xbb, 0x83, 0xd2, 0x43, 0xca, 0x80, 0x10, 0x67, 0x84, 0x8d, 0x29, 0x41, 0x0a, 0x16, 0x11, 0x65, 0x68, 0x66, 0xe3, 0xce, 0xce, 0xcf, 0xc5, 0x69, 0x09, 0x13, 0x75, 0xb6, 0x74, 0xd7, 0xe4, 0xd1, 0x67, }; static const unsigned char ecdsa_secp224r1_sha3_512_4246_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4246_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4246 = { .name = "ecdsa_secp224r1_sha3_512_4246", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4246_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4246_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4246_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 363 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4247 for ECDSA, tcId is 364 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4247_pubkey[] = { 0xfa, 0xd9, 0x8d, 0xf6, 0xa5, 0xfb, 0xd9, 0xf3, 0xc0, 0x23, 0xf2, 0xab, 0x80, 0x9c, 0x57, 0xc7, 0x2d, 0xe3, 0x39, 0x6d, 0x1c, 0xae, 0x4b, 0xc3, 0x5d, 0x78, 0xd8, 0xd1, 0x88, 0x9e, 0x37, 0x2a, 0x90, 0x18, 0x9e, 0xce, 0x8f, 0xbc, 0x69, 0x0f, 0xe3, 0xcd, 0xee, 0xef, 0x38, 0xab, 0x12, 0xff, 0xda, 0x72, 0x1f, 0x32, 0xf8, 0x49, 0xae, 0x50, }; static const unsigned char ecdsa_secp224r1_sha3_512_4247_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4247_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4247 = { .name = "ecdsa_secp224r1_sha3_512_4247", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4247_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4247_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4247_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 364 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4248 for ECDSA, tcId is 365 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4248_pubkey[] = { 0xd2, 0xea, 0xeb, 0x6b, 0xe6, 0xb5, 0xdc, 0xed, 0x48, 0xd5, 0x95, 0xb9, 0x5f, 0x73, 0xb0, 0x69, 0xf4, 0x9a, 0x07, 0x85, 0x72, 0xc7, 0x4d, 0xbc, 0x55, 0x7f, 0xa2, 0x5a, 0xa6, 0x38, 0x8c, 0x43, 0x62, 0xe6, 0xaa, 0x12, 0xab, 0x9c, 0x13, 0x50, 0xcd, 0x67, 0x89, 0xd0, 0x95, 0x54, 0x45, 0xd9, 0x19, 0x8e, 0xcc, 0x3a, 0x46, 0x18, 0xda, 0x73, }; static const unsigned char ecdsa_secp224r1_sha3_512_4248_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4248_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4248 = { .name = "ecdsa_secp224r1_sha3_512_4248", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4248_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4248_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4248_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 365 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4249 for ECDSA, tcId is 366 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4249_pubkey[] = { 0x2d, 0xf6, 0xce, 0x60, 0x19, 0xd7, 0x7e, 0x3c, 0x6e, 0x04, 0x90, 0x8a, 0x3f, 0xde, 0x5b, 0x88, 0x33, 0xf9, 0xc4, 0x93, 0xbf, 0x3c, 0xc6, 0x56, 0x8e, 0x3d, 0x40, 0xcb, 0x0c, 0xed, 0x2e, 0x9c, 0xad, 0x2e, 0xd3, 0x63, 0xfd, 0x20, 0xae, 0xb9, 0x98, 0x3b, 0xcb, 0x22, 0x09, 0x1f, 0xcb, 0x55, 0x9c, 0x1f, 0x6f, 0xd5, 0x38, 0xa0, 0xae, 0x04, }; static const unsigned char ecdsa_secp224r1_sha3_512_4249_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4249_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4249 = { .name = "ecdsa_secp224r1_sha3_512_4249", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4249_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4249_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4249_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 366 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4250 for ECDSA, tcId is 367 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4250_pubkey[] = { 0x2d, 0xf6, 0xce, 0x60, 0x19, 0xd7, 0x7e, 0x3c, 0x6e, 0x04, 0x90, 0x8a, 0x3f, 0xde, 0x5b, 0x88, 0x33, 0xf9, 0xc4, 0x93, 0xbf, 0x3c, 0xc6, 0x56, 0x8e, 0x3d, 0x40, 0xcb, 0x0c, 0xed, 0x2e, 0x9c, 0xad, 0x2e, 0xd3, 0x63, 0xfd, 0x20, 0xae, 0xb9, 0x98, 0x3b, 0xcb, 0x22, 0x09, 0x1f, 0xcb, 0x55, 0x9c, 0x1f, 0x6f, 0xd5, 0x38, 0xa0, 0xae, 0x04, }; static const unsigned char ecdsa_secp224r1_sha3_512_4250_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4250_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4250 = { .name = "ecdsa_secp224r1_sha3_512_4250", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4250_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4250_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4250_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 367 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4251 for ECDSA, tcId is 368 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4251_pubkey[] = { 0x93, 0xaa, 0x93, 0x83, 0x87, 0x89, 0x78, 0x26, 0xdb, 0x23, 0xb1, 0x99, 0x03, 0xc5, 0x8a, 0x32, 0xf8, 0x26, 0x9d, 0x93, 0xa5, 0x36, 0x6a, 0x7a, 0x67, 0x3e, 0x30, 0xda, 0x27, 0xac, 0x5a, 0x51, 0x5b, 0x70, 0x81, 0xcd, 0x74, 0xbf, 0x69, 0x52, 0x81, 0x14, 0x24, 0x17, 0x28, 0xda, 0x26, 0xae, 0x68, 0x95, 0xe8, 0x3f, 0xea, 0x25, 0xbe, 0xc4, }; static const unsigned char ecdsa_secp224r1_sha3_512_4251_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4251_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4251 = { .name = "ecdsa_secp224r1_sha3_512_4251", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4251_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4251_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4251_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 368 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4252 for ECDSA, tcId is 369 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4252_pubkey[] = { 0x09, 0xcd, 0xd0, 0x11, 0x9a, 0x39, 0x2a, 0x27, 0x1c, 0x40, 0x55, 0xfa, 0xc2, 0xfa, 0x71, 0xfc, 0xc6, 0x78, 0xb9, 0xc3, 0x18, 0xbf, 0xb9, 0x0d, 0xd1, 0xad, 0x0a, 0xd6, 0x4d, 0xbd, 0x41, 0x87, 0x26, 0xf0, 0xd3, 0xf0, 0xbf, 0x0c, 0xee, 0x7a, 0x1b, 0x36, 0x6d, 0x97, 0x11, 0x79, 0x3c, 0x83, 0x92, 0x06, 0xe6, 0x20, 0x5c, 0x41, 0x6e, 0xbd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4252_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4252_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4252 = { .name = "ecdsa_secp224r1_sha3_512_4252", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4252_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4252_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4252_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 369 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4253 for ECDSA, tcId is 370 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4253_pubkey[] = { 0x8f, 0x71, 0x1e, 0x9f, 0xbe, 0xa4, 0x1b, 0xd2, 0x5a, 0xad, 0xf5, 0x84, 0x99, 0x99, 0x26, 0xa2, 0x9c, 0x28, 0x01, 0xe7, 0xdb, 0xb2, 0xeb, 0x1d, 0xbe, 0x0d, 0x15, 0x86, 0x84, 0x1a, 0x14, 0x3b, 0xde, 0xea, 0xc9, 0x96, 0x9b, 0xe8, 0x7f, 0x57, 0xb4, 0xd7, 0x1a, 0x46, 0x6b, 0x2b, 0x6a, 0xed, 0x24, 0xe8, 0x54, 0xb0, 0x75, 0x70, 0xe6, 0x29, }; static const unsigned char ecdsa_secp224r1_sha3_512_4253_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4253_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4253 = { .name = "ecdsa_secp224r1_sha3_512_4253", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4253_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4253_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4253_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 370 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4254 for ECDSA, tcId is 371 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4254_pubkey[] = { 0xc2, 0x88, 0xdd, 0xd8, 0x17, 0x14, 0xa9, 0xe7, 0x66, 0xb3, 0x5a, 0x03, 0xc8, 0x35, 0xfb, 0xe1, 0xa5, 0x2c, 0x54, 0x0b, 0x74, 0x7b, 0x11, 0xba, 0x3e, 0xba, 0xbd, 0xcc, 0xb2, 0x6b, 0xd0, 0x49, 0xbd, 0x30, 0x88, 0xb5, 0x53, 0x16, 0x22, 0x61, 0xeb, 0x93, 0xab, 0x5a, 0x75, 0xd8, 0x73, 0xbf, 0xca, 0x81, 0x22, 0xa2, 0x29, 0xe2, 0xcf, 0xc7, }; static const unsigned char ecdsa_secp224r1_sha3_512_4254_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4254_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4254 = { .name = "ecdsa_secp224r1_sha3_512_4254", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4254_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4254_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4254_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 371 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4255 for ECDSA, tcId is 372 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4255_pubkey[] = { 0xfd, 0x93, 0x1e, 0x8f, 0x08, 0xb1, 0x2c, 0xa8, 0x2a, 0x6b, 0x05, 0x0e, 0x2c, 0x28, 0x1b, 0x00, 0x69, 0x25, 0x8a, 0xc8, 0x51, 0x13, 0x10, 0x08, 0xf9, 0xc2, 0x85, 0x3c, 0x8b, 0xea, 0xbb, 0x4b, 0xfe, 0xff, 0x98, 0xbe, 0x4e, 0xe2, 0x3f, 0x90, 0xb5, 0x52, 0xcc, 0xc3, 0x8a, 0x72, 0x97, 0x6b, 0xc7, 0x1e, 0x76, 0x37, 0xda, 0xd2, 0x7f, 0xba, }; static const unsigned char ecdsa_secp224r1_sha3_512_4255_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4255_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4255 = { .name = "ecdsa_secp224r1_sha3_512_4255", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4255_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4255_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4255_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 372 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4256 for ECDSA, tcId is 373 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4256_pubkey[] = { 0x1d, 0xfd, 0xd3, 0x50, 0xe4, 0x59, 0x03, 0xef, 0x44, 0xa2, 0x8a, 0xcf, 0x73, 0x99, 0x9a, 0x22, 0xa7, 0x06, 0xa5, 0x89, 0xa3, 0xdd, 0x20, 0xc0, 0x51, 0xdb, 0xe4, 0xe5, 0x41, 0xc1, 0x02, 0x1f, 0xf3, 0xe9, 0x64, 0x6e, 0xad, 0x3e, 0x98, 0x58, 0xc9, 0xc1, 0xbd, 0xae, 0x1e, 0x15, 0x32, 0xb6, 0x9b, 0x2e, 0xc5, 0x2f, 0x85, 0x46, 0xf5, 0x73, }; static const unsigned char ecdsa_secp224r1_sha3_512_4256_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4256_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4256 = { .name = "ecdsa_secp224r1_sha3_512_4256", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4256_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4256_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4256_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 373 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4257 for ECDSA, tcId is 374 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4257_pubkey[] = { 0xfc, 0x06, 0xe8, 0x42, 0x48, 0x39, 0xeb, 0x95, 0x20, 0x31, 0x95, 0xf9, 0xee, 0x12, 0x68, 0x7c, 0x79, 0x0b, 0xbc, 0xc9, 0xa7, 0x40, 0xd4, 0x0c, 0x1b, 0xbb, 0xcf, 0x66, 0x0d, 0x1a, 0xfa, 0x47, 0x36, 0x37, 0xd7, 0x08, 0x95, 0x29, 0x54, 0xa1, 0x80, 0x67, 0xb4, 0xcb, 0xff, 0xe5, 0x84, 0xe9, 0xe8, 0x91, 0x40, 0x35, 0x41, 0xc2, 0x1f, 0xa7, }; static const unsigned char ecdsa_secp224r1_sha3_512_4257_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4257_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4257 = { .name = "ecdsa_secp224r1_sha3_512_4257", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4257_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4257_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4257_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 374 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4258 for ECDSA, tcId is 375 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4258_pubkey[] = { 0xc8, 0x47, 0xd6, 0x75, 0x77, 0x02, 0xdb, 0x5d, 0x47, 0xca, 0xf6, 0x12, 0x9e, 0x86, 0x5a, 0xa2, 0x2d, 0x6b, 0x55, 0xc5, 0x45, 0xf7, 0x0c, 0xe7, 0xe7, 0xad, 0x0e, 0xca, 0xf6, 0x9b, 0xf4, 0xc6, 0x24, 0x11, 0x1e, 0xf1, 0xce, 0x92, 0xe9, 0xe1, 0x0d, 0x12, 0x6f, 0x0c, 0xed, 0xa9, 0x85, 0x1d, 0xcc, 0x53, 0x99, 0x39, 0x30, 0x32, 0x4d, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_512_4258_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4258_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4258 = { .name = "ecdsa_secp224r1_sha3_512_4258", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4258_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4258_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4258_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 375 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4259 for ECDSA, tcId is 376 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4259_pubkey[] = { 0xc8, 0x47, 0xd6, 0x75, 0x77, 0x02, 0xdb, 0x5d, 0x47, 0xca, 0xf6, 0x12, 0x9e, 0x86, 0x5a, 0xa2, 0x2d, 0x6b, 0x55, 0xc5, 0x45, 0xf7, 0x0c, 0xe7, 0xe7, 0xad, 0x0e, 0xca, 0xf6, 0x9b, 0xf4, 0xc6, 0x24, 0x11, 0x1e, 0xf1, 0xce, 0x92, 0xe9, 0xe1, 0x0d, 0x12, 0x6f, 0x0c, 0xed, 0xa9, 0x85, 0x1d, 0xcc, 0x53, 0x99, 0x39, 0x30, 0x32, 0x4d, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_512_4259_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4259_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4259 = { .name = "ecdsa_secp224r1_sha3_512_4259", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4259_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4259_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4259_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 376 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4260 for ECDSA, tcId is 377 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4260_pubkey[] = { 0x61, 0xc0, 0xd0, 0x9f, 0xc4, 0x0d, 0xd5, 0x9a, 0x7b, 0x52, 0x81, 0xaf, 0x54, 0xfd, 0x4d, 0xb8, 0x81, 0x99, 0x97, 0xcf, 0x31, 0x21, 0x2a, 0x4b, 0x35, 0xcf, 0x60, 0x78, 0xa5, 0x5e, 0xf1, 0x4c, 0xaf, 0xac, 0xd5, 0x7c, 0xa5, 0x01, 0x95, 0xaa, 0x19, 0x62, 0xaa, 0x7d, 0x01, 0xf7, 0x59, 0x5d, 0x76, 0xd3, 0x42, 0xd8, 0x3f, 0xed, 0x44, 0xec, }; static const unsigned char ecdsa_secp224r1_sha3_512_4260_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4260_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4260 = { .name = "ecdsa_secp224r1_sha3_512_4260", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4260_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4260_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4260_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 377 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4261 for ECDSA, tcId is 378 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4261_pubkey[] = { 0x66, 0x53, 0x92, 0x75, 0xc7, 0xd5, 0xae, 0x5d, 0xad, 0x25, 0x07, 0xa7, 0x16, 0x9c, 0x48, 0xa9, 0xcf, 0xf0, 0x67, 0xc4, 0xd6, 0xaf, 0xeb, 0x22, 0x56, 0x12, 0x39, 0xb6, 0x12, 0xee, 0xc9, 0xa7, 0xe6, 0x3d, 0x60, 0x2c, 0xf8, 0x7f, 0x35, 0x81, 0xbd, 0xeb, 0x19, 0xce, 0x99, 0x4c, 0x48, 0xb4, 0x10, 0x79, 0xef, 0x81, 0x86, 0x33, 0x9d, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4261_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4261_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4261 = { .name = "ecdsa_secp224r1_sha3_512_4261", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4261_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4261_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4261_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 378 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4262 for ECDSA, tcId is 379 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4262_pubkey[] = { 0x43, 0xa4, 0x5a, 0xdf, 0x3c, 0xd2, 0xa8, 0x66, 0xe0, 0x1e, 0xc4, 0x52, 0x69, 0xf6, 0x04, 0xaf, 0x02, 0x6a, 0x44, 0x83, 0x97, 0x3c, 0xc4, 0x35, 0x6b, 0x47, 0x39, 0x66, 0x2a, 0x84, 0x03, 0xf5, 0xf1, 0x4f, 0xcd, 0x73, 0x7d, 0x2a, 0xed, 0xec, 0x13, 0x6a, 0x53, 0x44, 0x17, 0xe0, 0xd1, 0x9e, 0x1b, 0x98, 0xd5, 0x39, 0x44, 0x10, 0x0d, 0x0f, }; static const unsigned char ecdsa_secp224r1_sha3_512_4262_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4262_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4262 = { .name = "ecdsa_secp224r1_sha3_512_4262", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4262_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4262_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4262_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 379 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4263 for ECDSA, tcId is 380 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4263_pubkey[] = { 0x2e, 0x55, 0xf9, 0x24, 0x35, 0xee, 0x39, 0x67, 0x08, 0xe4, 0x80, 0x5e, 0x3a, 0x2c, 0x4c, 0x61, 0x52, 0xc6, 0x9e, 0x16, 0x71, 0xe9, 0xd6, 0x38, 0x7c, 0x56, 0xf5, 0x8d, 0x3b, 0x4a, 0x17, 0x3a, 0xd9, 0xf4, 0x75, 0x44, 0x85, 0x86, 0xae, 0x0f, 0x53, 0x1e, 0xe0, 0x7f, 0x15, 0x55, 0x3e, 0xba, 0x98, 0x28, 0xb2, 0xbc, 0x8d, 0x72, 0xc5, 0xf1, }; static const unsigned char ecdsa_secp224r1_sha3_512_4263_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4263_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x34, 0x2d, 0xae, 0x75, 0x1a, 0x63, 0xa3, 0xca, 0x81, 0x89, 0xcf, 0x34, 0x2b, 0x3b, 0x34, 0xea, 0xaa, 0x25, 0x65, 0xe2, 0xc7, 0xe2, 0x61, 0x21, 0xc1, 0xbf, 0xd5, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4263 = { .name = "ecdsa_secp224r1_sha3_512_4263", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4263_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4263_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4263_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 380 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4264 for ECDSA, tcId is 381 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4264_pubkey[] = { 0x5b, 0xc1, 0xeb, 0x0a, 0xb6, 0x34, 0x91, 0x46, 0xbf, 0x13, 0xd2, 0xaa, 0xfd, 0x9d, 0x44, 0xc9, 0x09, 0x39, 0x7d, 0x39, 0xc1, 0x23, 0x71, 0xff, 0x7e, 0x56, 0xb1, 0x26, 0x4c, 0x7f, 0x85, 0x00, 0x4a, 0x22, 0xaa, 0x08, 0xc9, 0x3b, 0x7b, 0x14, 0xc0, 0x69, 0x70, 0xfa, 0x19, 0x62, 0x5e, 0x67, 0x1c, 0x1f, 0xb5, 0xb1, 0x6e, 0x8a, 0x0b, 0xd5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4264_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4264_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xcb, 0xd2, 0x51, 0x8a, 0xe5, 0x9c, 0x5c, 0x35, 0x7e, 0x76, 0x30, 0xcb, 0xd4, 0xc3, 0xe1, 0xb8, 0x36, 0x93, 0x8a, 0x5b, 0x4b, 0xfa, 0xc8, 0x23, 0x9a, 0x9c, 0x54, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4264 = { .name = "ecdsa_secp224r1_sha3_512_4264", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4264_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4264_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4264_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 381 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4265 for ECDSA, tcId is 382 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4265_pubkey[] = { 0x14, 0x47, 0x65, 0xb9, 0xd7, 0x87, 0x24, 0xba, 0xbc, 0x43, 0x58, 0xb2, 0x29, 0xdf, 0x98, 0xe9, 0xd6, 0x4d, 0xa2, 0x27, 0x24, 0x38, 0x1e, 0xbf, 0xe4, 0x1d, 0x7e, 0x72, 0x86, 0xe9, 0x58, 0xc2, 0xf6, 0x77, 0x9b, 0x8e, 0xa7, 0x64, 0x33, 0xcd, 0x4d, 0xce, 0x0a, 0xe4, 0xcd, 0x30, 0x08, 0x75, 0xac, 0x1c, 0x7a, 0xd2, 0x18, 0xe5, 0x7a, 0x55, }; static const unsigned char ecdsa_secp224r1_sha3_512_4265_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4265_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4265 = { .name = "ecdsa_secp224r1_sha3_512_4265", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4265_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4265_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4265_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 382 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4266 for ECDSA, tcId is 383 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4266_pubkey[] = { 0xe3, 0xfc, 0x6f, 0xee, 0x21, 0x6e, 0xb1, 0xfa, 0x8a, 0xea, 0x73, 0xfc, 0x28, 0x02, 0x70, 0x9b, 0x2c, 0x5c, 0xd2, 0x9f, 0x99, 0xed, 0x96, 0x4b, 0xcc, 0x08, 0x06, 0xaa, 0x2d, 0xfc, 0x63, 0x4b, 0x90, 0x50, 0xac, 0xf5, 0x68, 0x96, 0x3e, 0x39, 0x96, 0xac, 0xf0, 0xf2, 0xc7, 0x65, 0x6a, 0x3b, 0xc0, 0xf0, 0x91, 0xd7, 0xaa, 0x1a, 0xdf, 0x7a, }; static const unsigned char ecdsa_secp224r1_sha3_512_4266_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4266_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4266 = { .name = "ecdsa_secp224r1_sha3_512_4266", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4266_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4266_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4266_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 383 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4267 for ECDSA, tcId is 384 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4267_pubkey[] = { 0xe5, 0x7b, 0xf5, 0x9d, 0x82, 0x36, 0xb7, 0xb7, 0x89, 0xd4, 0x59, 0x12, 0xee, 0xba, 0xa6, 0x9d, 0xba, 0x56, 0x3b, 0xc7, 0x90, 0xfc, 0xa9, 0x9e, 0xce, 0x5d, 0xa6, 0x65, 0x8b, 0xdd, 0x80, 0xb8, 0x6d, 0x6e, 0x9c, 0xaa, 0x2e, 0x90, 0x86, 0xd2, 0x26, 0x61, 0x42, 0x81, 0xcc, 0x03, 0x8a, 0x23, 0x23, 0x08, 0x3a, 0x41, 0x84, 0x05, 0x7a, 0x37, }; static const unsigned char ecdsa_secp224r1_sha3_512_4267_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4267_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbc, 0x0f, 0x3a, 0x27, 0x08, 0xcb, 0xe1, 0x43, 0x80, 0x83, 0x45, 0x11, 0x63, 0xbd, 0xcb, 0x65, 0x79, 0x32, 0x6c, 0xca, 0x4f, 0xde, 0xe6, 0x8e, 0xd3, 0x7d, 0x63, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4267 = { .name = "ecdsa_secp224r1_sha3_512_4267", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4267_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4267_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4267_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 384 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4268 for ECDSA, tcId is 385 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4268_pubkey[] = { 0xd2, 0x61, 0x2e, 0xd2, 0x0f, 0xe7, 0x86, 0x48, 0x4b, 0x89, 0x55, 0xd6, 0x58, 0x20, 0x07, 0x76, 0xec, 0x21, 0x94, 0x26, 0x47, 0x9c, 0x69, 0x19, 0x4f, 0x8c, 0x1b, 0xaf, 0xa3, 0xaf, 0x3a, 0xa7, 0x78, 0xc1, 0x75, 0x1f, 0x44, 0x74, 0xcc, 0x0f, 0xf2, 0xdb, 0x2a, 0x83, 0x4c, 0x23, 0x2e, 0xc4, 0x9e, 0x9c, 0xe1, 0x42, 0xa5, 0x11, 0x70, 0xb7, }; static const unsigned char ecdsa_secp224r1_sha3_512_4268_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4268_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0x44, 0x65, 0xa5, 0x5b, 0x28, 0x2f, 0x25, 0x2f, 0x2b, 0x47, 0xf9, 0xf7, 0xbf, 0xc0, 0xba, 0x40, 0xec, 0x4d, 0xca, 0x29, 0xf5, 0x67, 0x94, 0x0b, 0x2d, 0x90, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4268 = { .name = "ecdsa_secp224r1_sha3_512_4268", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4268_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4268_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4268_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 385 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4269 for ECDSA, tcId is 386 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4269_pubkey[] = { 0x4c, 0x70, 0xcd, 0x0a, 0xa0, 0x6d, 0x9e, 0xe3, 0x6a, 0x16, 0x20, 0x2b, 0xcf, 0xc8, 0x91, 0xce, 0xb4, 0x1a, 0x26, 0xe0, 0xbc, 0xdd, 0xe9, 0xd9, 0x3d, 0xa8, 0x00, 0x1a, 0xab, 0x77, 0xb5, 0x07, 0xc7, 0x79, 0x31, 0xfc, 0x7e, 0xe2, 0x90, 0xcd, 0xa7, 0xb7, 0xaf, 0x6a, 0xd9, 0x0d, 0x0c, 0x97, 0xb8, 0x36, 0xae, 0x1b, 0x65, 0xb6, 0xec, 0xcb, }; static const unsigned char ecdsa_secp224r1_sha3_512_4269_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4269_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xe8, 0x08, 0xb8, 0x7e, 0x0e, 0x6e, 0x76, 0x36, 0x4c, 0xe3, 0x2f, 0xde, 0x12, 0xf6, 0x92, 0xd6, 0x9d, 0xd3, 0xb3, 0x62, 0xef, 0x4c, 0xf4, 0x99, 0xe0, 0x34, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4269 = { .name = "ecdsa_secp224r1_sha3_512_4269", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4269_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4269_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4269_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 386 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4270 for ECDSA, tcId is 387 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4270_pubkey[] = { 0xef, 0xb7, 0x72, 0x2f, 0xce, 0xaa, 0x8c, 0xd1, 0x91, 0x62, 0xee, 0xe8, 0xb2, 0x93, 0xb5, 0x8d, 0xcb, 0xd0, 0xfd, 0xd3, 0xdc, 0xfc, 0xd6, 0xe6, 0xba, 0x37, 0xba, 0xa5, 0x65, 0x9d, 0x47, 0xec, 0xd7, 0xd2, 0xb7, 0xf6, 0x5f, 0xae, 0xd3, 0xe9, 0xa9, 0xb5, 0x54, 0xdb, 0x19, 0xe9, 0x69, 0x48, 0xa1, 0xc5, 0xb9, 0x54, 0x35, 0x1f, 0x23, 0xa3, }; static const unsigned char ecdsa_secp224r1_sha3_512_4270_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4270_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xb8, 0x36, 0xc9, 0x57, 0x34, 0x2d, 0x75, 0x7e, 0xcb, 0xd2, 0x51, 0x8a, 0xe5, 0x9b, 0xb4, 0x48, 0x9e, 0xcc, 0xe8, 0xb6, 0x58, 0xca, 0x10, 0xe8, 0x22, 0xec, 0xc8, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4270 = { .name = "ecdsa_secp224r1_sha3_512_4270", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4270_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4270_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4270_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 387 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4271 for ECDSA, tcId is 388 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4271_pubkey[] = { 0x79, 0xe5, 0x77, 0xf8, 0x30, 0x3d, 0x4e, 0xd7, 0x4c, 0x3a, 0x19, 0xca, 0xbe, 0x3e, 0xc3, 0x5b, 0xd3, 0x9c, 0xb7, 0x89, 0xbc, 0x73, 0x09, 0x33, 0x5a, 0x57, 0x10, 0xe6, 0x43, 0xcc, 0x43, 0x7d, 0x57, 0x93, 0x93, 0x1f, 0x92, 0xee, 0xa5, 0x60, 0x39, 0xb2, 0x20, 0x88, 0x16, 0x56, 0x93, 0xa7, 0xd9, 0xed, 0x0f, 0xfc, 0x61, 0x88, 0xaa, 0x24, }; static const unsigned char ecdsa_secp224r1_sha3_512_4271_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4271_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x95, 0x73, 0x42, 0xd7, 0x57, 0xec, 0xbd, 0x25, 0x18, 0xae, 0x59, 0xc5, 0xc2, 0xf4, 0xeb, 0xdd, 0x95, 0xca, 0xed, 0xf6, 0x1c, 0x68, 0xb8, 0x93, 0x87, 0xf3, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4271 = { .name = "ecdsa_secp224r1_sha3_512_4271", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4271_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4271_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4271_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 388 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4272 for ECDSA, tcId is 389 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4272_pubkey[] = { 0x73, 0x5e, 0x5b, 0xc2, 0x9e, 0xe5, 0x52, 0x42, 0xa7, 0x19, 0x53, 0xf4, 0xd3, 0x19, 0x54, 0xbc, 0x8c, 0x17, 0x3c, 0x40, 0xbd, 0x84, 0x01, 0x7d, 0xbc, 0x07, 0x6d, 0x4a, 0xce, 0x15, 0xcf, 0xa8, 0x65, 0xa1, 0xb3, 0x76, 0x2e, 0x61, 0xdd, 0x24, 0xcf, 0x61, 0x02, 0x2b, 0xb5, 0x71, 0xa5, 0xfc, 0x8b, 0x5d, 0x5e, 0x7e, 0xa8, 0x0b, 0x24, 0x05, }; static const unsigned char ecdsa_secp224r1_sha3_512_4272_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4272_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd9, 0x2a, 0xe6, 0x85, 0xae, 0xaf, 0xd9, 0x7a, 0x4a, 0x31, 0x5c, 0xb3, 0x8b, 0x85, 0xe9, 0xd7, 0xbb, 0x2b, 0x95, 0xdb, 0xec, 0x38, 0xd1, 0x71, 0x27, 0x0f, 0xe7, 0x92, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4272 = { .name = "ecdsa_secp224r1_sha3_512_4272", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4272_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4272_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4272_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 389 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4273 for ECDSA, tcId is 390 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4273_pubkey[] = { 0xee, 0x25, 0x58, 0xb8, 0xb7, 0x64, 0x22, 0x87, 0xcd, 0xee, 0xdc, 0x8b, 0xca, 0x74, 0x09, 0x74, 0x26, 0x4a, 0x66, 0x7e, 0x5e, 0xde, 0xfe, 0x79, 0xe7, 0xa0, 0x39, 0x00, 0x5c, 0xf3, 0x62, 0xe4, 0x7f, 0xac, 0xa6, 0x49, 0xcf, 0x9b, 0x8f, 0x6c, 0x92, 0x14, 0x53, 0x9e, 0xf2, 0xee, 0xe6, 0xb8, 0x69, 0x35, 0x18, 0x5c, 0x1f, 0xdb, 0x34, 0x92, }; static const unsigned char ecdsa_secp224r1_sha3_512_4273_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4273_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x34, 0x2d, 0x75, 0x7e, 0xcb, 0xd2, 0x51, 0x8a, 0xe5, 0x9c, 0x5c, 0x35, 0x7e, 0x76, 0x01, 0x3b, 0x79, 0xf0, 0x87, 0xe6, 0x2e, 0x58, 0x92, 0x3f, 0x7e, 0xa5, 0xc0, 0x45, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4273 = { .name = "ecdsa_secp224r1_sha3_512_4273", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4273_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4273_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4273_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 390 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4274 for ECDSA, tcId is 391 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4274_pubkey[] = { 0xf8, 0xb4, 0xc3, 0x78, 0xbd, 0x5f, 0x41, 0x7b, 0x56, 0x2a, 0xe1, 0x27, 0xf3, 0x98, 0x25, 0xa2, 0xb0, 0x57, 0x70, 0x08, 0x9b, 0x7c, 0xaf, 0x93, 0x24, 0xd7, 0xce, 0x1a, 0x50, 0x70, 0x81, 0x75, 0xba, 0x24, 0x5e, 0x9c, 0x15, 0x2b, 0xff, 0x3c, 0xa9, 0x57, 0x43, 0xe2, 0x61, 0xb6, 0xf5, 0x79, 0x32, 0x8f, 0x30, 0x68, 0x0f, 0xb6, 0xa2, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha3_512_4274_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4274_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x21, 0xf8, 0x62, 0xec, 0x7b, 0x9a, 0x0f, 0x5e, 0x3f, 0xbe, 0x5d, 0x77, 0x4e, 0x20, 0xa5, 0x9e, 0xb3, 0xc3, 0x41, 0xb9, 0xe1, 0xff, 0x21, 0x5b, 0x44, 0x6f, 0x63, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4274 = { .name = "ecdsa_secp224r1_sha3_512_4274", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4274_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4274_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4274_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 391 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4275 for ECDSA, tcId is 392 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4275_pubkey[] = { 0x5e, 0xb6, 0x3f, 0x0f, 0x7b, 0x7e, 0xc6, 0x67, 0x58, 0x86, 0x70, 0x02, 0x2e, 0x2f, 0x0b, 0x11, 0x24, 0xb1, 0x32, 0xeb, 0xe1, 0x6c, 0x14, 0x3d, 0x6e, 0xd2, 0x46, 0x02, 0xaf, 0x2b, 0x27, 0xb9, 0x2a, 0x44, 0x9a, 0x4e, 0xdc, 0x20, 0x26, 0x7d, 0x25, 0xd0, 0xa2, 0x38, 0xb4, 0x3a, 0xa7, 0x28, 0x93, 0x48, 0xa1, 0x37, 0x8d, 0xb0, 0x79, 0xde, }; static const unsigned char ecdsa_secp224r1_sha3_512_4275_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4275_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x43, 0xf0, 0xc5, 0xd8, 0xf7, 0x34, 0x1e, 0xbc, 0x7f, 0x7c, 0xba, 0xee, 0x9c, 0x41, 0x4b, 0x3d, 0x67, 0x86, 0x83, 0x73, 0xc3, 0xfe, 0x42, 0xb6, 0x88, 0xde, 0xc6, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4275 = { .name = "ecdsa_secp224r1_sha3_512_4275", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4275_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4275_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4275_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 392 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4276 for ECDSA, tcId is 393 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4276_pubkey[] = { 0x28, 0x0a, 0xc7, 0xf1, 0x1a, 0xfa, 0x66, 0x46, 0x5c, 0x37, 0xeb, 0xa8, 0x20, 0xaa, 0x8f, 0x39, 0x3d, 0x13, 0xc5, 0x63, 0x40, 0x22, 0x33, 0x3c, 0x7a, 0x25, 0x24, 0xbd, 0x5c, 0x63, 0xb1, 0xe9, 0xed, 0x18, 0x11, 0x5b, 0x58, 0x9b, 0x56, 0x27, 0x0c, 0x5c, 0x32, 0x81, 0xfa, 0x97, 0x06, 0x0f, 0x1d, 0x30, 0xae, 0xf4, 0x65, 0xf4, 0x45, 0xe2, }; static const unsigned char ecdsa_secp224r1_sha3_512_4276_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4276_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x65, 0xe9, 0x28, 0xc5, 0x72, 0xce, 0x2e, 0x1a, 0xbf, 0x3b, 0x18, 0x65, 0xea, 0x61, 0xf0, 0xdc, 0x1b, 0x49, 0xc5, 0x2d, 0xa5, 0xfd, 0x64, 0x11, 0xcd, 0x4e, 0x2a, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4276 = { .name = "ecdsa_secp224r1_sha3_512_4276", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4276_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4276_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4276_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 393 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4277 for ECDSA, tcId is 394 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4277_pubkey[] = { 0xcd, 0xc6, 0x3e, 0x73, 0xd8, 0xd6, 0xf4, 0xf8, 0x77, 0x0a, 0x97, 0xd9, 0x3b, 0xde, 0x4e, 0x19, 0x74, 0xa2, 0x77, 0xad, 0xad, 0x53, 0xd5, 0x00, 0xcb, 0x07, 0x09, 0x07, 0x53, 0x3c, 0x09, 0x37, 0x94, 0x88, 0xcb, 0x34, 0x4c, 0xe0, 0x1b, 0xb2, 0x9a, 0x2f, 0x12, 0xd6, 0xe0, 0xb9, 0x46, 0xa2, 0x79, 0xc7, 0xf5, 0xd4, 0x78, 0x31, 0x47, 0x7c, }; static const unsigned char ecdsa_secp224r1_sha3_512_4277_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4277_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xf4, 0x04, 0x5c, 0x3f, 0x07, 0x37, 0x3b, 0x1b, 0x26, 0x71, 0x97, 0xef, 0x09, 0x7b, 0x49, 0x6b, 0x4e, 0xe9, 0xd9, 0xb1, 0x77, 0xa6, 0x7a, 0x4c, 0xf0, 0x1a, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4277 = { .name = "ecdsa_secp224r1_sha3_512_4277", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4277_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4277_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4277_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 394 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4278 for ECDSA, tcId is 395 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4278_pubkey[] = { 0x5e, 0x96, 0x3c, 0xe9, 0x07, 0x08, 0x53, 0x9b, 0x00, 0x1d, 0x82, 0x1b, 0x98, 0x84, 0xf4, 0x6e, 0xe4, 0xba, 0x45, 0x2b, 0xfc, 0xd5, 0x39, 0x74, 0x1d, 0x8f, 0xe8, 0x38, 0x4c, 0x8d, 0xc8, 0x74, 0x32, 0x9b, 0xd0, 0xb7, 0x8f, 0xe0, 0x4e, 0x02, 0x91, 0xf1, 0x39, 0x07, 0xff, 0x57, 0x23, 0xe8, 0xd1, 0x51, 0x46, 0xc5, 0x46, 0x9d, 0x7d, 0x9b, }; static const unsigned char ecdsa_secp224r1_sha3_512_4278_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4278_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4278 = { .name = "ecdsa_secp224r1_sha3_512_4278", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4278_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4278_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4278_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 395 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4279 for ECDSA, tcId is 396 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4279_pubkey[] = { 0xaa, 0x7f, 0x2f, 0x92, 0xf8, 0xae, 0x99, 0xc9, 0xbd, 0xac, 0x06, 0x5e, 0x65, 0x9a, 0x4a, 0x2a, 0x05, 0x40, 0xf2, 0x13, 0x69, 0x38, 0x33, 0x34, 0x61, 0x3b, 0x60, 0x86, 0x94, 0xda, 0x15, 0xe1, 0x13, 0xf2, 0x11, 0xa6, 0xe7, 0x93, 0x9c, 0xaf, 0x1f, 0x20, 0xac, 0xc2, 0x79, 0xa3, 0xb5, 0xb5, 0xb0, 0x18, 0x64, 0x51, 0xec, 0x86, 0x03, 0xb4, }; static const unsigned char ecdsa_secp224r1_sha3_512_4279_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4279_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4279 = { .name = "ecdsa_secp224r1_sha3_512_4279", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4279_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4279_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4279_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 396 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4280 for ECDSA, tcId is 397 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4280_pubkey[] = { 0xb9, 0x75, 0x29, 0xfb, 0x4a, 0x1e, 0x02, 0xb5, 0xe8, 0x1d, 0x77, 0xb0, 0xe7, 0x90, 0x9a, 0x2f, 0xde, 0x85, 0x7a, 0x1e, 0xdc, 0x9f, 0xa6, 0x60, 0xd6, 0x00, 0xc8, 0x9a, 0xe5, 0xa8, 0xc9, 0xc5, 0x58, 0x85, 0xcc, 0x20, 0xf5, 0x4f, 0x5c, 0x8f, 0x42, 0x3f, 0x78, 0x5c, 0xaf, 0x42, 0x3d, 0x77, 0xba, 0x0a, 0xfc, 0x31, 0xfc, 0x16, 0xf1, 0x31, }; static const unsigned char ecdsa_secp224r1_sha3_512_4280_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4280_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4280 = { .name = "ecdsa_secp224r1_sha3_512_4280", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4280_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4280_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4280_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 397 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4281 for ECDSA, tcId is 398 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4281_pubkey[] = { 0xa4, 0xb3, 0x44, 0x98, 0x1d, 0x0a, 0x82, 0x65, 0x46, 0x85, 0x5d, 0x21, 0x9a, 0xb4, 0xab, 0x59, 0xd3, 0xff, 0x33, 0x06, 0x76, 0xd9, 0x3b, 0x95, 0x53, 0x80, 0x42, 0x78, 0x41, 0x37, 0x0e, 0x4d, 0xd0, 0xde, 0x4d, 0x09, 0x6c, 0x20, 0x88, 0x1f, 0xc3, 0x5a, 0x9a, 0x0f, 0xf3, 0x77, 0xb5, 0xf0, 0x6d, 0xee, 0xed, 0xc1, 0x9f, 0xeb, 0x48, 0xae, }; static const unsigned char ecdsa_secp224r1_sha3_512_4281_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4281_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4281 = { .name = "ecdsa_secp224r1_sha3_512_4281", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4281_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4281_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4281_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 398 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4282 for ECDSA, tcId is 399 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4282_pubkey[] = { 0xd6, 0x56, 0x04, 0x8b, 0xfd, 0x65, 0xaf, 0x83, 0xd6, 0xdc, 0x3f, 0x7c, 0xb7, 0xd2, 0x40, 0xc9, 0xe0, 0xcd, 0xee, 0x6e, 0x94, 0x6b, 0x15, 0xab, 0xb1, 0x3f, 0x4b, 0x33, 0xd6, 0x15, 0x80, 0xa1, 0x59, 0xca, 0xf9, 0xfd, 0x87, 0x19, 0x4b, 0x7c, 0x9d, 0x78, 0x75, 0x3e, 0x0e, 0x00, 0x56, 0x0a, 0x20, 0x8d, 0x34, 0xc7, 0xdd, 0x4c, 0x6a, 0x63, }; static const unsigned char ecdsa_secp224r1_sha3_512_4282_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4282_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4282 = { .name = "ecdsa_secp224r1_sha3_512_4282", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4282_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4282_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4282_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 399 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4283 for ECDSA, tcId is 400 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4283_pubkey[] = { 0xea, 0x6b, 0x31, 0x00, 0x29, 0x06, 0x27, 0xd3, 0xe5, 0xd8, 0xa0, 0x7d, 0x7d, 0x16, 0x70, 0x22, 0xc5, 0x8e, 0x7b, 0xda, 0xc2, 0x70, 0x17, 0x35, 0x93, 0x18, 0x99, 0xac, 0x39, 0xbc, 0xa5, 0x6a, 0x70, 0x2c, 0x50, 0x8d, 0xd5, 0x1b, 0xc9, 0x6c, 0x63, 0x96, 0x7c, 0x35, 0x9e, 0x92, 0xdb, 0x79, 0x0f, 0x72, 0x63, 0x1d, 0x87, 0x5e, 0x07, 0x19, }; static const unsigned char ecdsa_secp224r1_sha3_512_4283_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4283_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4283 = { .name = "ecdsa_secp224r1_sha3_512_4283", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4283_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4283_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4283_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 400 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4284 for ECDSA, tcId is 401 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4284_pubkey[] = { 0x91, 0x2c, 0xff, 0x3a, 0xb4, 0x33, 0x8f, 0x1f, 0x09, 0xb7, 0x1f, 0x90, 0x9d, 0xd6, 0x81, 0x86, 0xcf, 0xab, 0xeb, 0x74, 0x6b, 0xea, 0xe3, 0x37, 0x00, 0xdd, 0x92, 0x3f, 0xf8, 0x32, 0x46, 0x1c, 0xcf, 0xf9, 0xb8, 0x3c, 0x25, 0x75, 0x4b, 0xc1, 0xde, 0xf8, 0xf1, 0x0c, 0x5f, 0xfb, 0xdc, 0xa0, 0x12, 0x79, 0x14, 0xcf, 0x24, 0x18, 0x48, 0x23, }; static const unsigned char ecdsa_secp224r1_sha3_512_4284_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4284_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4284 = { .name = "ecdsa_secp224r1_sha3_512_4284", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4284_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4284_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4284_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 401 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4285 for ECDSA, tcId is 402 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4285_pubkey[] = { 0x69, 0x52, 0x91, 0x4c, 0xe9, 0x0a, 0x0e, 0x65, 0xb0, 0x3f, 0xff, 0xa7, 0x26, 0x3f, 0x04, 0xa3, 0xf7, 0xbe, 0x03, 0xcc, 0x6b, 0x80, 0x1e, 0x12, 0x04, 0xda, 0xd3, 0x13, 0xf0, 0x47, 0x26, 0xe7, 0x69, 0x89, 0xb5, 0xb0, 0xea, 0xbf, 0x53, 0x78, 0x7d, 0x8c, 0x9f, 0x07, 0x54, 0x95, 0x06, 0xd1, 0x28, 0xa1, 0x48, 0xa6, 0xb4, 0xe9, 0x46, 0x10, }; static const unsigned char ecdsa_secp224r1_sha3_512_4285_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4285_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4285 = { .name = "ecdsa_secp224r1_sha3_512_4285", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4285_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4285_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4285_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 402 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4286 for ECDSA, tcId is 403 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4286_pubkey[] = { 0x86, 0xec, 0x9d, 0x3b, 0xa7, 0xc6, 0xd9, 0x49, 0x80, 0x69, 0xa0, 0x77, 0x61, 0xa9, 0xd8, 0x5e, 0x04, 0xfa, 0x21, 0xfd, 0x59, 0x9c, 0x6a, 0x26, 0x64, 0xe8, 0x62, 0x54, 0xc5, 0x90, 0x0a, 0xa4, 0xb9, 0x88, 0x2b, 0x32, 0x98, 0x3c, 0x5e, 0x02, 0x9f, 0xe6, 0xa5, 0x57, 0x8a, 0xc8, 0x18, 0xe7, 0x9a, 0xcb, 0x20, 0xbe, 0xef, 0x73, 0xe8, 0xee, }; static const unsigned char ecdsa_secp224r1_sha3_512_4286_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4286_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4286 = { .name = "ecdsa_secp224r1_sha3_512_4286", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4286_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4286_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4286_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 403 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4287 for ECDSA, tcId is 404 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4287_pubkey[] = { 0xb0, 0x8c, 0x34, 0xe9, 0x41, 0x67, 0x43, 0xb6, 0xa3, 0xf5, 0x2c, 0x42, 0x04, 0x1a, 0x5f, 0xc3, 0x01, 0x1f, 0x64, 0xdf, 0xfb, 0x54, 0x87, 0x5b, 0xc6, 0x90, 0x39, 0x3e, 0x6a, 0x7c, 0x67, 0x83, 0x36, 0x82, 0xe8, 0x17, 0x19, 0xf9, 0x28, 0xdf, 0x55, 0xfa, 0xac, 0x24, 0xf4, 0x88, 0x02, 0x85, 0x15, 0xb2, 0x6e, 0x03, 0xc1, 0xc9, 0xa0, 0x2c, }; static const unsigned char ecdsa_secp224r1_sha3_512_4287_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4287_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4287 = { .name = "ecdsa_secp224r1_sha3_512_4287", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4287_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4287_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4287_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 404 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4288 for ECDSA, tcId is 405 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4288_pubkey[] = { 0x0a, 0x07, 0xd4, 0xa6, 0x4b, 0x42, 0xe6, 0x10, 0x96, 0xd0, 0xb7, 0xdd, 0x96, 0x74, 0x80, 0x0c, 0xe4, 0x69, 0x16, 0x61, 0x71, 0x59, 0x47, 0x6e, 0xca, 0xe9, 0x40, 0x58, 0x6f, 0x0b, 0x05, 0x84, 0xdb, 0xa9, 0xd9, 0xfb, 0x5c, 0xda, 0x23, 0xa2, 0xc8, 0x2e, 0x3b, 0x28, 0xb1, 0xc1, 0x48, 0x61, 0x50, 0xa3, 0x41, 0x9f, 0xee, 0xcc, 0x45, 0x04, }; static const unsigned char ecdsa_secp224r1_sha3_512_4288_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4288_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4288 = { .name = "ecdsa_secp224r1_sha3_512_4288", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4288_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4288_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4288_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 405 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4289 for ECDSA, tcId is 406 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4289_pubkey[] = { 0xdc, 0xb6, 0x04, 0x4f, 0x8d, 0x2c, 0x6e, 0x3b, 0xab, 0x60, 0xf1, 0x3e, 0x6d, 0xa1, 0x89, 0x6e, 0x25, 0x04, 0xd0, 0x76, 0x9c, 0x2a, 0xf8, 0x24, 0x73, 0x2b, 0x53, 0x26, 0xb8, 0x0a, 0x54, 0x37, 0xb9, 0xd5, 0xeb, 0xe6, 0xd8, 0xeb, 0x49, 0xe7, 0x0f, 0x49, 0x22, 0x0d, 0xd3, 0xe2, 0xc3, 0xc7, 0x86, 0x5b, 0x87, 0xec, 0x98, 0xb5, 0x34, 0x66, }; static const unsigned char ecdsa_secp224r1_sha3_512_4289_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4289_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0xa7, 0x24, 0xb1, 0xfe, 0x42, 0x51, 0xd5, 0xb6, 0xcf, 0xa1, 0x5e, 0xea, 0x5c, 0x64, 0x8b, 0xfe, 0xd7, 0x73, 0x2f, 0xbb, 0xad, 0xc9, 0x30, 0x0c, 0x8b, 0xa4, 0x00, 0x32, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4289 = { .name = "ecdsa_secp224r1_sha3_512_4289", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4289_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4289_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4289_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 406 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4290 for ECDSA, tcId is 407 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4290_pubkey[] = { 0xdc, 0xb6, 0x04, 0x4f, 0x8d, 0x2c, 0x6e, 0x3b, 0xab, 0x60, 0xf1, 0x3e, 0x6d, 0xa1, 0x89, 0x6e, 0x25, 0x04, 0xd0, 0x76, 0x9c, 0x2a, 0xf8, 0x24, 0x73, 0x2b, 0x53, 0x26, 0x47, 0xf5, 0xab, 0xc8, 0x46, 0x2a, 0x14, 0x19, 0x27, 0x14, 0xb6, 0x18, 0xf0, 0xb6, 0xdd, 0xf1, 0x2c, 0x1d, 0x3c, 0x38, 0x79, 0xa4, 0x78, 0x13, 0x67, 0x4a, 0xcb, 0x9b, }; static const unsigned char ecdsa_secp224r1_sha3_512_4290_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4290_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0xa7, 0x24, 0xb1, 0xfe, 0x42, 0x51, 0xd5, 0xb6, 0xcf, 0xa1, 0x5e, 0xea, 0x5c, 0x64, 0x8b, 0xfe, 0xd7, 0x73, 0x2f, 0xbb, 0xad, 0xc9, 0x30, 0x0c, 0x8b, 0xa4, 0x00, 0x32, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4290 = { .name = "ecdsa_secp224r1_sha3_512_4290", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4290_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4290_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4290_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 407 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4291 for ECDSA, tcId is 408 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4291_pubkey[] = { 0xb0, 0x8c, 0x10, 0xbb, 0xd2, 0x77, 0xee, 0x6a, 0xb5, 0x01, 0xaa, 0x71, 0x14, 0x17, 0x33, 0xcb, 0x19, 0x6b, 0x74, 0xde, 0x46, 0x3e, 0xad, 0x5e, 0xa2, 0x24, 0x02, 0x2c, 0x7f, 0x68, 0xbc, 0xde, 0xea, 0xd7, 0xd7, 0x4c, 0xb6, 0x18, 0x6e, 0x32, 0x21, 0x98, 0x46, 0x42, 0x4a, 0x92, 0x6d, 0xec, 0x60, 0xb2, 0xa2, 0x27, 0x41, 0x1a, 0xe8, 0x05, }; static const unsigned char ecdsa_secp224r1_sha3_512_4291_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4291_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4291 = { .name = "ecdsa_secp224r1_sha3_512_4291", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4291_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4291_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4291_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 408 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4292 for ECDSA, tcId is 409 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4292_pubkey[] = { 0xb1, 0xba, 0xbe, 0xfd, 0x03, 0xf6, 0xf7, 0x38, 0xfc, 0x86, 0xd3, 0x2c, 0xa2, 0x45, 0xf5, 0xdb, 0x21, 0xf6, 0x7e, 0x7b, 0xd9, 0x19, 0x07, 0x9b, 0xd7, 0x35, 0xf3, 0x5b, 0xd9, 0xad, 0x5e, 0x68, 0x86, 0xdc, 0xfc, 0x7f, 0x22, 0x72, 0xb9, 0x8c, 0x48, 0xa7, 0xc4, 0x3f, 0x1c, 0x57, 0xa0, 0x24, 0xf2, 0xf0, 0x54, 0xfc, 0x59, 0xbb, 0x43, 0x54, }; static const unsigned char ecdsa_secp224r1_sha3_512_4292_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4292_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4292 = { .name = "ecdsa_secp224r1_sha3_512_4292", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4292_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4292_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4292_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 409 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4293 for ECDSA, tcId is 410 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4293_pubkey[] = { 0x22, 0x2b, 0x75, 0x66, 0xf2, 0x6c, 0x87, 0x76, 0x06, 0x6f, 0x2f, 0x40, 0x65, 0xe4, 0xe6, 0xac, 0x45, 0xa3, 0x06, 0xc3, 0x06, 0xae, 0xab, 0x82, 0x50, 0xb6, 0x52, 0xfc, 0xbc, 0x63, 0x00, 0x49, 0x61, 0xa5, 0x54, 0x04, 0x7c, 0x03, 0x65, 0x5c, 0xea, 0x7d, 0xac, 0x88, 0xe5, 0x73, 0xfd, 0x45, 0xca, 0x4b, 0x40, 0x7b, 0x63, 0x96, 0x72, 0x90, }; static const unsigned char ecdsa_secp224r1_sha3_512_4293_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4293_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4293 = { .name = "ecdsa_secp224r1_sha3_512_4293", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4293_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4293_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4293_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 410 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4294 for ECDSA, tcId is 411 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4294_pubkey[] = { 0xf9, 0x97, 0x3f, 0x68, 0x87, 0x05, 0xdc, 0x10, 0x25, 0xbe, 0xb7, 0x26, 0x63, 0xdf, 0x6f, 0x84, 0xbd, 0xa4, 0xa1, 0x4a, 0x79, 0xe5, 0x95, 0x3d, 0x69, 0x92, 0x69, 0xba, 0x88, 0x6f, 0x01, 0xe6, 0x09, 0x34, 0x55, 0x96, 0x49, 0x44, 0x68, 0x37, 0x8d, 0x75, 0x8c, 0x61, 0x8f, 0x49, 0xe2, 0x16, 0x28, 0x7d, 0x85, 0x55, 0x4a, 0xf8, 0xeb, 0x68, }; static const unsigned char ecdsa_secp224r1_sha3_512_4294_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4294_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4294 = { .name = "ecdsa_secp224r1_sha3_512_4294", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4294_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4294_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4294_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 411 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4295 for ECDSA, tcId is 412 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4295_pubkey[] = { 0xc1, 0x08, 0xca, 0x8a, 0xde, 0xef, 0x82, 0xf1, 0x40, 0xcf, 0x15, 0x8a, 0x70, 0xd3, 0x1f, 0x0a, 0x5b, 0x66, 0xd8, 0x66, 0x12, 0xb5, 0xd4, 0xf0, 0x0e, 0x24, 0x33, 0x86, 0x5c, 0xf0, 0xf2, 0xfa, 0x44, 0x66, 0xeb, 0x35, 0x27, 0x9c, 0xa9, 0x9d, 0xef, 0x17, 0x86, 0x48, 0x35, 0x95, 0x4a, 0x74, 0xd1, 0x2e, 0x6c, 0x7e, 0x84, 0x94, 0x06, 0x0b, }; static const unsigned char ecdsa_secp224r1_sha3_512_4295_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4295_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4295 = { .name = "ecdsa_secp224r1_sha3_512_4295", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4295_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4295_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4295_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 412 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4296 for ECDSA, tcId is 413 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4296_pubkey[] = { 0x0a, 0xc4, 0x69, 0xe8, 0x16, 0x56, 0x5a, 0x6a, 0x74, 0xbe, 0xc8, 0x21, 0xca, 0x20, 0xb8, 0x8a, 0x61, 0x01, 0x8a, 0x03, 0x35, 0x19, 0x9b, 0x5d, 0x7b, 0xd9, 0x69, 0xe9, 0x46, 0x33, 0x55, 0xc7, 0x3a, 0x2d, 0x9c, 0x51, 0x04, 0x9f, 0x7a, 0x94, 0x50, 0x9a, 0x9a, 0xc4, 0xea, 0x01, 0x65, 0x76, 0x3b, 0xa1, 0x13, 0xa3, 0x0d, 0xb9, 0x99, 0xe2, }; static const unsigned char ecdsa_secp224r1_sha3_512_4296_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4296_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4296 = { .name = "ecdsa_secp224r1_sha3_512_4296", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4296_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4296_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4296_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 413 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4297 for ECDSA, tcId is 414 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4297_pubkey[] = { 0x66, 0x2e, 0xb3, 0x28, 0xd2, 0x4f, 0xb5, 0x48, 0xf5, 0x17, 0x92, 0xb5, 0x56, 0x3a, 0xc3, 0xcb, 0x23, 0x7f, 0x0a, 0x65, 0x19, 0x94, 0x60, 0xee, 0xbf, 0xca, 0xa5, 0xc3, 0xe7, 0x58, 0xd1, 0x3e, 0x7b, 0x41, 0x9b, 0x41, 0x7c, 0x8c, 0x97, 0xc4, 0x72, 0x7c, 0x39, 0xfd, 0x37, 0x30, 0x45, 0xe1, 0x87, 0x92, 0xad, 0x80, 0x76, 0xb0, 0x72, 0xb4, }; static const unsigned char ecdsa_secp224r1_sha3_512_4297_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4297_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4297 = { .name = "ecdsa_secp224r1_sha3_512_4297", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4297_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4297_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4297_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 414 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4298 for ECDSA, tcId is 415 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4298_pubkey[] = { 0xae, 0x6d, 0x9c, 0x06, 0x56, 0xd3, 0x63, 0xb2, 0x1e, 0x56, 0x2b, 0x56, 0xf3, 0xc8, 0x5b, 0x6d, 0x77, 0xa6, 0xac, 0xc6, 0x64, 0xad, 0x57, 0x05, 0x34, 0x1a, 0xc2, 0x62, 0xdd, 0x3a, 0x81, 0x4f, 0xf8, 0xf9, 0x04, 0x9e, 0x46, 0x35, 0x35, 0x1d, 0x25, 0x66, 0x9b, 0x50, 0xb5, 0x1b, 0x30, 0xe2, 0xa5, 0xba, 0xfc, 0x9f, 0xce, 0x17, 0x1e, 0x90, }; static const unsigned char ecdsa_secp224r1_sha3_512_4298_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4298_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4298 = { .name = "ecdsa_secp224r1_sha3_512_4298", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4298_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4298_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4298_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 415 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4299 for ECDSA, tcId is 416 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4299_pubkey[] = { 0xaa, 0x93, 0xb4, 0x0a, 0x88, 0xf1, 0x72, 0xa1, 0x48, 0x1a, 0xad, 0x31, 0x2f, 0x4b, 0xcc, 0x0a, 0x7d, 0x92, 0x10, 0x3e, 0x42, 0xfe, 0xeb, 0x98, 0x6b, 0xcd, 0xc4, 0xa4, 0xe6, 0x2a, 0x7c, 0x2e, 0x4d, 0xd3, 0x4f, 0xb7, 0xe5, 0x18, 0x63, 0x0f, 0xee, 0xa5, 0x4a, 0x65, 0x81, 0xce, 0x5f, 0xfa, 0xac, 0xa7, 0xde, 0xea, 0x3b, 0x26, 0xd6, 0x47, }; static const unsigned char ecdsa_secp224r1_sha3_512_4299_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4299_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4299 = { .name = "ecdsa_secp224r1_sha3_512_4299", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4299_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4299_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4299_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 416 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4300 for ECDSA, tcId is 417 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4300_pubkey[] = { 0x42, 0xf4, 0xcf, 0x93, 0x9e, 0x3a, 0xa8, 0x3c, 0x2b, 0xf1, 0x7c, 0xbe, 0x8b, 0xe9, 0x30, 0x69, 0x5a, 0xed, 0x3f, 0xee, 0xa7, 0xe6, 0x4a, 0xdf, 0x68, 0x42, 0xd7, 0x1b, 0xa1, 0x7b, 0x9d, 0xd0, 0x05, 0x89, 0x21, 0x2e, 0x33, 0xbc, 0x19, 0x00, 0x51, 0xbe, 0x87, 0x7a, 0x45, 0x56, 0x22, 0xc2, 0x2a, 0xdc, 0xce, 0x8e, 0xe0, 0x98, 0xfb, 0xee, }; static const unsigned char ecdsa_secp224r1_sha3_512_4300_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4300_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4300 = { .name = "ecdsa_secp224r1_sha3_512_4300", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4300_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4300_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4300_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 417 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4301 for ECDSA, tcId is 418 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4301_pubkey[] = { 0x55, 0xa9, 0x18, 0xf3, 0xc1, 0x90, 0x77, 0x43, 0x2b, 0x22, 0xce, 0xee, 0x7c, 0x2f, 0xf8, 0x7d, 0xfe, 0x9b, 0xa7, 0x32, 0x3c, 0x55, 0x23, 0x7e, 0xe7, 0x5f, 0x02, 0xde, 0x11, 0x0e, 0x99, 0xed, 0x5b, 0xe3, 0xba, 0x0e, 0x03, 0x06, 0x25, 0x77, 0x12, 0x16, 0x87, 0x12, 0xaf, 0xae, 0xe0, 0x08, 0x16, 0x3a, 0x69, 0x3b, 0x60, 0x1f, 0x50, 0x39, }; static const unsigned char ecdsa_secp224r1_sha3_512_4301_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4301_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4301 = { .name = "ecdsa_secp224r1_sha3_512_4301", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4301_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4301_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4301_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 418 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4302 for ECDSA, tcId is 419 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4302_pubkey[] = { 0xbf, 0x18, 0x4f, 0x88, 0xa4, 0x52, 0xb3, 0xbf, 0x85, 0xed, 0xae, 0xa1, 0x50, 0xdd, 0x77, 0x0e, 0x90, 0xf4, 0x9c, 0x87, 0x1b, 0x50, 0x20, 0xa0, 0xa4, 0x0d, 0xea, 0xdc, 0x28, 0xe7, 0xf6, 0xa6, 0x90, 0x33, 0x8e, 0xf4, 0xfe, 0xc8, 0x84, 0x7e, 0x6f, 0x08, 0x5d, 0xc4, 0x70, 0xc6, 0x40, 0x12, 0xb7, 0xa7, 0x47, 0x62, 0x4b, 0xc9, 0xc9, 0x0a, }; static const unsigned char ecdsa_secp224r1_sha3_512_4302_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4302_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4302 = { .name = "ecdsa_secp224r1_sha3_512_4302", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4302_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4302_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4302_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 419 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4303 for ECDSA, tcId is 420 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4303_pubkey[] = { 0x87, 0x2f, 0x11, 0x2c, 0xe4, 0xaa, 0x0f, 0xf8, 0xef, 0xe7, 0x05, 0x43, 0xdc, 0x1c, 0x6b, 0x0b, 0xd1, 0x4d, 0x06, 0x8b, 0xc8, 0x8e, 0xb6, 0x43, 0x62, 0x45, 0x48, 0x1b, 0xa2, 0xae, 0xb5, 0x21, 0xe4, 0x72, 0xe5, 0xe1, 0x92, 0x1a, 0xf1, 0x62, 0x10, 0xfa, 0x63, 0xd3, 0xee, 0xe4, 0x2d, 0xf5, 0xd5, 0xff, 0x31, 0xe6, 0xd0, 0x76, 0x1b, 0x5e, }; static const unsigned char ecdsa_secp224r1_sha3_512_4303_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4303_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4303 = { .name = "ecdsa_secp224r1_sha3_512_4303", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4303_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4303_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4303_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 420 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4304 for ECDSA, tcId is 421 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4304_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4304_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4304_sig[] = { 0x34, 0x2d, 0xae, 0x75, 0x1a, 0x63, 0xa3, 0xca, 0x81, 0x89, 0xcf, 0x34, 0x2b, 0x3b, 0x34, 0xea, 0xaa, 0x25, 0x65, 0xe2, 0xc7, 0xe2, 0x61, 0x21, 0xc1, 0xbf, 0xd5, 0x43, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4304 = { .name = "ecdsa_secp224r1_sha3_512_4304", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4304_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4304_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4304_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 421 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4305 for ECDSA, tcId is 422 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4305_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha3_512_4305_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4305_sig[] = { 0xcb, 0xd2, 0x51, 0x8a, 0xe5, 0x9c, 0x5c, 0x35, 0x7e, 0x76, 0x30, 0xcb, 0xd4, 0xc3, 0xe1, 0xb8, 0x36, 0x93, 0x8a, 0x5b, 0x4b, 0xfa, 0xc8, 0x23, 0x9a, 0x9c, 0x54, 0xfa, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4305 = { .name = "ecdsa_secp224r1_sha3_512_4305", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4305_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4305_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4305_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 422 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4306 for ECDSA, tcId is 423 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4306_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4306_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4306_sig[] = { 0x34, 0x2d, 0xae, 0x75, 0x1a, 0x63, 0xa3, 0xca, 0x81, 0x89, 0xcf, 0x34, 0x2b, 0x3b, 0x34, 0xea, 0xaa, 0x25, 0x65, 0xe2, 0xc7, 0xe2, 0x61, 0x21, 0xc1, 0xbf, 0xd5, 0x43, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4306 = { .name = "ecdsa_secp224r1_sha3_512_4306", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4306_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4306_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4306_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 423 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4307 for ECDSA, tcId is 424 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4307_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4307_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4307_sig[] = { 0xcb, 0xd2, 0x51, 0x8a, 0xe5, 0x9c, 0x5c, 0x35, 0x7e, 0x76, 0x30, 0xcb, 0xd4, 0xc3, 0xe1, 0xb8, 0x36, 0x93, 0x8a, 0x5b, 0x4b, 0xfa, 0xc8, 0x23, 0x9a, 0x9c, 0x54, 0xfa, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4307 = { .name = "ecdsa_secp224r1_sha3_512_4307", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4307_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4307_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4307_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 424 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4308 for ECDSA, tcId is 425 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4308_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_512_4308_sig[] = { 0x8d, 0xe3, 0xb6, 0x62, 0xa5, 0x13, 0x08, 0xa2, 0xdc, 0x06, 0x51, 0xa2, 0xf5, 0x0b, 0xb3, 0x47, 0x53, 0x76, 0xe9, 0x0b, 0xb8, 0x41, 0x82, 0x56, 0xcd, 0x79, 0x1b, 0xcb, 0x09, 0x10, 0xc5, 0xc5, 0x0a, 0x32, 0xa2, 0x4a, 0xad, 0x84, 0xda, 0x25, 0x55, 0x9d, 0xbf, 0x07, 0x7e, 0x53, 0x37, 0xf3, 0xc3, 0xf6, 0x26, 0xfb, 0x15, 0xd3, 0x76, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4308 = { .name = "ecdsa_secp224r1_sha3_512_4308", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4308_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha3_512_4308_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 425 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4309 for ECDSA, tcId is 426 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4309_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_512_4309_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha3_512_4309_sig[] = { 0xdc, 0xed, 0xb0, 0x2a, 0xfd, 0xff, 0xdd, 0x19, 0x9b, 0x47, 0xe5, 0x45, 0xe1, 0x39, 0x6a, 0x1b, 0x17, 0x0f, 0xdf, 0x96, 0xa1, 0x0e, 0xe4, 0xd3, 0xad, 0xd2, 0xb4, 0x96, 0x4a, 0x3c, 0x89, 0x4b, 0x80, 0xde, 0x1b, 0xcd, 0xa5, 0x09, 0xab, 0x58, 0x75, 0x2e, 0x00, 0x56, 0xdc, 0x78, 0xd6, 0x68, 0x3a, 0x85, 0xca, 0x9f, 0x15, 0xc2, 0x51, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4309 = { .name = "ecdsa_secp224r1_sha3_512_4309", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4309_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4309_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha3_512_4309_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 426 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4310 for ECDSA, tcId is 427 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4310_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_512_4310_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha3_512_4310_sig[] = { 0xa7, 0xca, 0xb4, 0x32, 0xdc, 0x7a, 0xbf, 0x26, 0x9c, 0x13, 0x63, 0x25, 0x89, 0xd9, 0xd9, 0xcd, 0xa3, 0x74, 0x82, 0xdb, 0x9e, 0x8d, 0xcf, 0x41, 0x1c, 0x23, 0x44, 0xa4, 0xfb, 0x38, 0xff, 0x0b, 0xea, 0x5f, 0x81, 0x59, 0x56, 0x15, 0x60, 0x8a, 0xd3, 0x34, 0x94, 0xcc, 0xea, 0xec, 0x48, 0xee, 0x60, 0x07, 0xd4, 0x95, 0x1d, 0x2d, 0x5b, 0xd0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4310 = { .name = "ecdsa_secp224r1_sha3_512_4310", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4310_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4310_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha3_512_4310_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 427 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4311 for ECDSA, tcId is 428 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4311_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha3_512_4311_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_512_4311_sig[] = { 0x03, 0x16, 0xa2, 0x25, 0x93, 0x70, 0x44, 0x7c, 0x1b, 0x06, 0xf5, 0x1f, 0x61, 0x89, 0xb0, 0x33, 0xea, 0xd9, 0x56, 0xc1, 0x1e, 0xbb, 0xc3, 0xed, 0xbd, 0xc2, 0xb5, 0xe4, 0x24, 0xbd, 0xa2, 0xd0, 0x65, 0xa0, 0x47, 0x5c, 0x9f, 0xc5, 0xee, 0x30, 0x0f, 0x6c, 0x4c, 0x82, 0x6b, 0x07, 0xa7, 0x40, 0xd4, 0x99, 0x0f, 0xcc, 0x14, 0x60, 0x06, 0xaa, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4311 = { .name = "ecdsa_secp224r1_sha3_512_4311", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4311_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4311_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha3_512_4311_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 428 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4312 for ECDSA, tcId is 429 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4312_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_512_4312_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4312_sig[] = { 0xc8, 0xa9, 0x3a, 0x8f, 0x1b, 0x3a, 0xaa, 0xa9, 0xbb, 0x8e, 0x2d, 0x8c, 0xc4, 0xf5, 0xb5, 0x03, 0x3a, 0x90, 0x9b, 0x15, 0xad, 0x81, 0xb2, 0xda, 0xe1, 0x4c, 0x16, 0x20, 0xe6, 0x86, 0x82, 0x09, 0x12, 0xf2, 0x95, 0xc9, 0xc1, 0xb3, 0x1e, 0x60, 0xc1, 0xfa, 0x27, 0xd8, 0xd0, 0xf4, 0x9c, 0x01, 0x72, 0x49, 0x38, 0x0f, 0x92, 0x8e, 0xcf, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4312 = { .name = "ecdsa_secp224r1_sha3_512_4312", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4312_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4312_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4312_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 429 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4313 for ECDSA, tcId is 430 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4313_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_512_4313_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4313_sig[] = { 0x39, 0x89, 0x32, 0x19, 0x34, 0x70, 0x2e, 0x53, 0x56, 0x35, 0x45, 0x9d, 0x94, 0x09, 0x60, 0x6c, 0xfc, 0x46, 0x34, 0xc3, 0xb2, 0x82, 0xfa, 0x86, 0xa9, 0x3c, 0x80, 0x16, 0xc1, 0xf6, 0xc3, 0x99, 0xcc, 0xb2, 0xae, 0x5a, 0x22, 0xe8, 0x06, 0xf1, 0x41, 0x38, 0x74, 0xfe, 0x57, 0xce, 0xc9, 0x17, 0xb5, 0x76, 0xd3, 0xed, 0x88, 0x7e, 0x38, 0xdc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4313 = { .name = "ecdsa_secp224r1_sha3_512_4313", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4313_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4313_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4313_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 430 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4314 for ECDSA, tcId is 431 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4314_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha3_512_4314_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4314_sig[] = { 0x8c, 0x97, 0x23, 0x2c, 0xd4, 0x30, 0xbb, 0x32, 0xdd, 0x89, 0xf5, 0x15, 0x52, 0x05, 0xf6, 0xae, 0x03, 0xf1, 0x73, 0xf8, 0x8a, 0x1b, 0xe9, 0x6a, 0x2c, 0x33, 0xd9, 0xe1, 0xfb, 0x3b, 0x4e, 0xb5, 0x39, 0x55, 0x3d, 0x66, 0x45, 0xe4, 0x34, 0xbe, 0xfa, 0x76, 0x0c, 0x9f, 0xab, 0x3d, 0x2a, 0xe6, 0x45, 0xce, 0xd0, 0x3f, 0xe7, 0x71, 0x3a, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4314 = { .name = "ecdsa_secp224r1_sha3_512_4314", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4314_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4314_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4314_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 431 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4315 for ECDSA, tcId is 432 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4315_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_512_4315_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4315_sig[] = { 0x72, 0x79, 0x1a, 0x86, 0x43, 0x9f, 0x76, 0xee, 0x40, 0x96, 0x29, 0xd9, 0x23, 0xfa, 0xb7, 0x39, 0x36, 0x51, 0x0e, 0xf8, 0x93, 0x49, 0xee, 0x4c, 0xc3, 0x04, 0xb9, 0x15, 0xed, 0x67, 0xc5, 0xee, 0xdc, 0x4a, 0x59, 0xaf, 0x13, 0xfe, 0x80, 0x90, 0x51, 0x99, 0xde, 0x42, 0xfb, 0xc4, 0x5e, 0xaa, 0xd6, 0xbd, 0x44, 0x32, 0x9c, 0x7c, 0x75, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4315 = { .name = "ecdsa_secp224r1_sha3_512_4315", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4315_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4315_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4315_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 432 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4316 for ECDSA, tcId is 433 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4316_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_512_4316_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4316_sig[] = { 0x24, 0x57, 0x5f, 0xf9, 0xe5, 0xea, 0x77, 0x9d, 0x95, 0x64, 0x4b, 0x5e, 0xf9, 0xaf, 0xfa, 0x67, 0x27, 0x97, 0x85, 0x53, 0xdf, 0x3b, 0x51, 0xfb, 0xc5, 0xa2, 0x78, 0x20, 0x8b, 0x20, 0x00, 0xb4, 0xc0, 0x2a, 0x1f, 0xcc, 0x78, 0x80, 0xa4, 0x2c, 0x6d, 0xbe, 0x07, 0xe3, 0x22, 0xeb, 0xe2, 0x09, 0x40, 0xd6, 0xff, 0x32, 0xa0, 0x8e, 0xad, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4316 = { .name = "ecdsa_secp224r1_sha3_512_4316", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4316_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4316_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4316_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 433 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4317 for ECDSA, tcId is 434 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4317_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha3_512_4317_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4317_sig[] = { 0xe5, 0x58, 0x19, 0xd6, 0x3e, 0x0c, 0xdb, 0x61, 0x66, 0x76, 0xd1, 0x6d, 0x1a, 0xd6, 0xca, 0x2b, 0xb9, 0x79, 0xbe, 0x94, 0x92, 0x45, 0x34, 0xdb, 0xa3, 0xfd, 0x6f, 0x3a, 0x4d, 0xbc, 0x47, 0xc8, 0x30, 0xfd, 0x85, 0xe1, 0x6d, 0x01, 0x3e, 0x05, 0x6b, 0x2f, 0x0b, 0x16, 0x46, 0xd0, 0x48, 0xcd, 0x6f, 0xc2, 0x17, 0x57, 0xaf, 0x42, 0x8f, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4317 = { .name = "ecdsa_secp224r1_sha3_512_4317", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4317_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4317_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4317_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 434 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4318 for ECDSA, tcId is 435 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4318_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_512_4318_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4318_sig[] = { 0xd1, 0x2c, 0x22, 0xb4, 0xef, 0x1f, 0xf2, 0xde, 0x70, 0xc6, 0xe1, 0xa2, 0xc1, 0x8f, 0x7d, 0xc8, 0x7d, 0xfc, 0xfe, 0xc2, 0x25, 0xcb, 0x3f, 0x32, 0x4a, 0x76, 0x65, 0x4b, 0xb6, 0x4b, 0xd7, 0xdd, 0x3e, 0x31, 0x84, 0x07, 0x3a, 0xcf, 0x58, 0x4b, 0xfd, 0x33, 0xdb, 0xc3, 0x71, 0x2a, 0x89, 0xf2, 0x01, 0x38, 0x63, 0x12, 0xf7, 0x13, 0xe1, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4318 = { .name = "ecdsa_secp224r1_sha3_512_4318", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4318_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4318_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4318_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 435 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4319 for ECDSA, tcId is 436 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4319_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_512_4319_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4319_sig[] = { 0xc8, 0xd0, 0x6f, 0x03, 0x92, 0x01, 0xc0, 0x39, 0x95, 0x81, 0x31, 0x52, 0xa1, 0x9f, 0xe5, 0x2e, 0x3c, 0x38, 0xcf, 0x32, 0xb0, 0xf1, 0x3b, 0x8d, 0x8c, 0xec, 0x87, 0xba, 0x44, 0x93, 0x07, 0xf7, 0x92, 0x4f, 0xa2, 0x76, 0xac, 0x1c, 0xa8, 0x29, 0x73, 0xd5, 0xf5, 0x5f, 0xca, 0x7c, 0x66, 0x90, 0xc8, 0x58, 0x1d, 0xbb, 0xe5, 0x50, 0x01, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4319 = { .name = "ecdsa_secp224r1_sha3_512_4319", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4319_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4319_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4319_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 436 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4320 for ECDSA, tcId is 437 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4320_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha3_512_4320_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4320_sig[] = { 0xa3, 0x70, 0xd2, 0x77, 0xf2, 0x8e, 0x3c, 0x86, 0xc9, 0x36, 0x7e, 0x2c, 0x1d, 0x7a, 0xe0, 0x7e, 0x6b, 0x0d, 0xa3, 0x33, 0xda, 0x65, 0xef, 0x27, 0x80, 0xb3, 0x9e, 0x00, 0x13, 0x4f, 0x5f, 0x55, 0xe3, 0x75, 0x25, 0x43, 0xf9, 0x60, 0xe0, 0xe7, 0x25, 0x7c, 0xff, 0xe3, 0xec, 0x41, 0x7b, 0x9b, 0xc5, 0xda, 0x3b, 0x75, 0x57, 0xde, 0x44, 0xea, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4320 = { .name = "ecdsa_secp224r1_sha3_512_4320", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4320_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4320_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4320_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 437 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4321 for ECDSA, tcId is 438 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4321_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4321_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4321_sig[] = { 0x23, 0x36, 0xaf, 0x69, 0xda, 0x82, 0x5f, 0xec, 0x35, 0x10, 0x68, 0x1c, 0x71, 0x6c, 0x9b, 0x50, 0x00, 0xb1, 0x7e, 0xf1, 0xe6, 0xdb, 0x73, 0x70, 0x78, 0x17, 0xb1, 0x45, 0x9e, 0xf5, 0x9c, 0x12, 0x0c, 0xe3, 0x9e, 0x4c, 0x83, 0xe3, 0x41, 0xaf, 0x71, 0xd4, 0xa9, 0x1a, 0x34, 0xc4, 0xbd, 0xd1, 0x2c, 0x92, 0xca, 0xf4, 0x40, 0x5b, 0x79, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4321 = { .name = "ecdsa_secp224r1_sha3_512_4321", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4321_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4321_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4321_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 438 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4322 for ECDSA, tcId is 439 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4322_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4322_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4322_sig[] = { 0x3f, 0xdb, 0x17, 0xcc, 0x44, 0xc9, 0xa0, 0xe9, 0x95, 0x29, 0x0a, 0x45, 0x8c, 0x2f, 0x64, 0xb8, 0x56, 0x55, 0x41, 0xcf, 0x56, 0x13, 0x95, 0x75, 0x21, 0x2e, 0xc1, 0x68, 0x5e, 0x51, 0xc7, 0x78, 0xb5, 0x60, 0xf3, 0xc6, 0x1b, 0xc3, 0xbf, 0x0e, 0xb5, 0x0f, 0xf8, 0xd3, 0x4d, 0xcb, 0x5e, 0xb8, 0x5c, 0xc2, 0x5b, 0x4a, 0xe6, 0xa7, 0x44, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4322 = { .name = "ecdsa_secp224r1_sha3_512_4322", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4322_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4322_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4322_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 439 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4323 for ECDSA, tcId is 440 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4323_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha3_512_4323_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4323_sig[] = { 0x1d, 0x98, 0x25, 0x3a, 0x63, 0xb8, 0x3f, 0x0e, 0x04, 0x2e, 0xd2, 0xc3, 0x42, 0xfd, 0x42, 0x17, 0xc2, 0x9f, 0x99, 0x0f, 0xcd, 0x5b, 0x5c, 0xbb, 0x9e, 0x51, 0x72, 0x1f, 0x49, 0xfc, 0xf5, 0xe4, 0xd6, 0x80, 0xcd, 0xd3, 0x64, 0x05, 0xc5, 0x14, 0x41, 0x4c, 0xc4, 0x7d, 0x97, 0x31, 0xa9, 0x7c, 0x4e, 0xdc, 0xba, 0xc7, 0xb7, 0xb2, 0x7f, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4323 = { .name = "ecdsa_secp224r1_sha3_512_4323", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4323_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4323_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4323_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 440 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4324 for ECDSA, tcId is 441 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4324_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4324_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4324_sig[] = { 0xa0, 0xf6, 0xaa, 0x5f, 0x60, 0x7f, 0x34, 0xe4, 0x9a, 0xf9, 0x76, 0xd8, 0xb0, 0xfb, 0x4f, 0x42, 0xda, 0x17, 0xfd, 0x1c, 0x2b, 0x03, 0xb8, 0x11, 0x9f, 0x7b, 0x83, 0x4b, 0xab, 0x53, 0x95, 0xc0, 0xfa, 0xa4, 0xee, 0x53, 0x10, 0x62, 0x5d, 0x50, 0x1d, 0x6a, 0x0a, 0xf9, 0x66, 0x44, 0x04, 0x0a, 0x33, 0x5f, 0xf8, 0xf4, 0x2b, 0xad, 0x65, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4324 = { .name = "ecdsa_secp224r1_sha3_512_4324", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4324_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4324_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4324_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 441 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4325 for ECDSA, tcId is 442 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4325_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4325_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4325_sig[] = { 0x9a, 0x0f, 0x67, 0x79, 0x26, 0x72, 0xdc, 0xba, 0x4b, 0x19, 0x89, 0x9b, 0xa2, 0xe3, 0x5a, 0xc0, 0xb5, 0x4c, 0xa0, 0x0c, 0xa4, 0x95, 0x72, 0x70, 0xe7, 0xa4, 0x3f, 0x8c, 0xa7, 0x02, 0x88, 0x78, 0x88, 0x51, 0x1d, 0xd1, 0x2e, 0x95, 0x0e, 0xdd, 0xd2, 0x39, 0xb4, 0xa3, 0xc4, 0x23, 0xda, 0x67, 0x3b, 0xba, 0x88, 0x20, 0x82, 0x95, 0x4a, 0x0a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4325 = { .name = "ecdsa_secp224r1_sha3_512_4325", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4325_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4325_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4325_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 442 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4326 for ECDSA, tcId is 443 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4326_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha3_512_4326_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4326_sig[] = { 0x4d, 0x96, 0xe7, 0x43, 0xac, 0x0d, 0xbb, 0xf2, 0x41, 0x37, 0x25, 0xa1, 0x93, 0xc7, 0xe7, 0x09, 0x47, 0xb5, 0x95, 0x01, 0x60, 0x1e, 0x33, 0x76, 0x65, 0x02, 0x3e, 0xe2, 0x76, 0x4e, 0xf7, 0x1a, 0x18, 0x4f, 0x02, 0x44, 0xc0, 0xe1, 0xde, 0x1b, 0x72, 0x9b, 0x84, 0x21, 0xbe, 0x53, 0xbd, 0x0d, 0xed, 0x20, 0x15, 0xdc, 0x3d, 0x1f, 0x1a, 0x13, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4326 = { .name = "ecdsa_secp224r1_sha3_512_4326", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4326_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4326_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4326_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 443 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4327 for ECDSA, tcId is 444 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4327_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_512_4327_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4327_sig[] = { 0x06, 0x0a, 0xc9, 0x61, 0xef, 0xf4, 0xe5, 0x05, 0x3f, 0x70, 0x45, 0xb9, 0xea, 0x1d, 0xb3, 0x38, 0xdd, 0x4b, 0x3a, 0x6c, 0xce, 0x33, 0x13, 0x86, 0xd3, 0x98, 0x86, 0x55, 0x0c, 0xfc, 0x61, 0xa4, 0x3a, 0x67, 0xd0, 0x66, 0x0f, 0xc3, 0x86, 0xef, 0xc1, 0xb6, 0x03, 0xb2, 0x8f, 0x65, 0x18, 0x85, 0xbf, 0xf5, 0x19, 0xc6, 0x32, 0xe1, 0x1a, 0x8c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4327 = { .name = "ecdsa_secp224r1_sha3_512_4327", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4327_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4327_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4327_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 444 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4328 for ECDSA, tcId is 445 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4328_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_512_4328_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4328_sig[] = { 0x34, 0x15, 0xd0, 0x79, 0x0d, 0x9b, 0x9b, 0xa8, 0xff, 0xa8, 0x2f, 0x44, 0x7a, 0x4f, 0xed, 0x58, 0xcc, 0xe3, 0xeb, 0xba, 0xf4, 0x3b, 0x68, 0xc1, 0x62, 0x49, 0x5c, 0x85, 0x1e, 0x0e, 0x20, 0xac, 0x93, 0xd1, 0x9d, 0xbd, 0x9d, 0xdd, 0x63, 0x2e, 0x5c, 0x09, 0x10, 0x56, 0x0e, 0x94, 0x1a, 0xcf, 0x2b, 0xa5, 0xd7, 0xf3, 0xf2, 0xab, 0xe2, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4328 = { .name = "ecdsa_secp224r1_sha3_512_4328", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4328_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4328_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4328_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 445 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4329 for ECDSA, tcId is 446 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4329_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha3_512_4329_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4329_sig[] = { 0x20, 0x66, 0x59, 0x3b, 0xe1, 0x0d, 0xb4, 0x11, 0x1e, 0x03, 0x2c, 0xce, 0x79, 0x00, 0x4a, 0x2e, 0x66, 0xaf, 0xf1, 0x77, 0x4d, 0x59, 0x5a, 0xd4, 0xc3, 0x7b, 0x61, 0xd6, 0x2a, 0xad, 0xdf, 0xe2, 0xab, 0xcb, 0xb1, 0x37, 0xeb, 0xf8, 0x0d, 0x35, 0xc8, 0x6c, 0x7f, 0x81, 0xfc, 0x76, 0x06, 0x40, 0xee, 0xc3, 0x9e, 0xb3, 0xab, 0xe9, 0xee, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4329 = { .name = "ecdsa_secp224r1_sha3_512_4329", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4329_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4329_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4329_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 446 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4330 for ECDSA, tcId is 447 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4330_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_512_4330_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4330_sig[] = { 0xd5, 0x75, 0x1d, 0x00, 0xe6, 0x9e, 0x86, 0x30, 0x2d, 0x95, 0xf3, 0xa4, 0x85, 0xc3, 0x57, 0x86, 0x7b, 0x31, 0xc1, 0xf7, 0x26, 0x02, 0x1f, 0x83, 0x18, 0x33, 0x0e, 0xeb, 0x36, 0xe1, 0x5c, 0x9a, 0xb9, 0x15, 0x2c, 0xa2, 0x4b, 0xd3, 0x2e, 0xdb, 0xd0, 0xde, 0x3a, 0x10, 0xe7, 0xcc, 0xb2, 0x3b, 0x49, 0x3c, 0x38, 0x27, 0x00, 0x97, 0x98, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4330 = { .name = "ecdsa_secp224r1_sha3_512_4330", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4330_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4330_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4330_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 447 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4331 for ECDSA, tcId is 448 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4331_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_512_4331_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4331_sig[] = { 0x2d, 0x73, 0x87, 0x85, 0xb0, 0x42, 0x82, 0x26, 0x14, 0x57, 0xa9, 0xb1, 0x49, 0xa6, 0xc5, 0x1c, 0x4c, 0x61, 0x1f, 0x29, 0xe1, 0x41, 0x13, 0xbb, 0xd2, 0x62, 0x59, 0x81, 0x6c, 0xac, 0xb7, 0x67, 0x17, 0x51, 0x39, 0x4b, 0x93, 0x1a, 0xb8, 0x6a, 0x09, 0x63, 0x1e, 0xe2, 0x6c, 0xd0, 0x77, 0xc0, 0x1a, 0xf8, 0xc3, 0x49, 0x1b, 0x53, 0x59, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4331 = { .name = "ecdsa_secp224r1_sha3_512_4331", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4331_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4331_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4331_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 448 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4332 for ECDSA, tcId is 449 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4332_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha3_512_4332_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4332_sig[] = { 0x12, 0x1f, 0x59, 0x92, 0xff, 0x28, 0x92, 0xa8, 0xe0, 0xb3, 0x6c, 0xf4, 0xf3, 0x13, 0x31, 0xfd, 0xdc, 0xb9, 0xb5, 0x3d, 0x1a, 0xec, 0x2c, 0x7d, 0x9c, 0xd8, 0x87, 0xcb, 0x40, 0x6a, 0x21, 0x9f, 0x57, 0x2c, 0x58, 0xba, 0xab, 0x77, 0x9d, 0x8c, 0x38, 0x6f, 0xe8, 0xe8, 0x48, 0x57, 0x02, 0x4a, 0x21, 0xc0, 0x1f, 0x94, 0x95, 0x05, 0xa6, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4332 = { .name = "ecdsa_secp224r1_sha3_512_4332", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4332_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4332_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4332_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 449 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4333 for ECDSA, tcId is 450 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4333_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_512_4333_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4333_sig[] = { 0xc2, 0x8e, 0x4e, 0x9a, 0x7f, 0x4a, 0x96, 0xf2, 0x2b, 0xab, 0x95, 0xa3, 0xf5, 0x64, 0x09, 0x9e, 0xc4, 0x6d, 0xda, 0x7e, 0xd0, 0xd1, 0x56, 0x8b, 0x34, 0x74, 0xfa, 0x1f, 0xa7, 0xd9, 0x3a, 0xd7, 0x05, 0xf4, 0x60, 0x4b, 0xf8, 0x2d, 0xc0, 0x29, 0xd2, 0x25, 0x79, 0x17, 0xd1, 0xeb, 0x7e, 0x09, 0xd4, 0x79, 0x96, 0x37, 0xbb, 0xc3, 0x16, 0x61, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4333 = { .name = "ecdsa_secp224r1_sha3_512_4333", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4333_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4333_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4333_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 450 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4334 for ECDSA, tcId is 451 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4334_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_512_4334_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4334_sig[] = { 0x8e, 0x5a, 0x9b, 0x74, 0xc3, 0x5d, 0x07, 0xb2, 0xdc, 0x78, 0x8a, 0x9b, 0xaf, 0x13, 0x76, 0x4b, 0xcc, 0xf2, 0x57, 0x0a, 0x07, 0xcb, 0x4b, 0x51, 0xe5, 0x2c, 0x36, 0xf4, 0x1e, 0xba, 0xa0, 0x56, 0x35, 0x36, 0xf7, 0xae, 0x63, 0x37, 0xe4, 0x46, 0xf9, 0xff, 0x99, 0x40, 0x90, 0x1b, 0x4b, 0x1e, 0x6c, 0x8a, 0x6a, 0xf2, 0x83, 0xd5, 0x6b, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4334 = { .name = "ecdsa_secp224r1_sha3_512_4334", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4334_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4334_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4334_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 451 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4335 for ECDSA, tcId is 452 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4335_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha3_512_4335_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4335_sig[] = { 0x97, 0x5b, 0x1e, 0xf8, 0x69, 0x96, 0xb5, 0x36, 0x27, 0x92, 0xd0, 0x44, 0x4e, 0x1c, 0xb8, 0xc6, 0x4f, 0xb5, 0x83, 0xb9, 0x14, 0x77, 0x85, 0x31, 0x62, 0xed, 0x79, 0x14, 0xab, 0xca, 0x04, 0x85, 0x9e, 0x3d, 0xf4, 0x30, 0x8d, 0x9d, 0x40, 0xb3, 0x37, 0x98, 0xc2, 0xf0, 0x90, 0x7d, 0xd0, 0x73, 0xee, 0x75, 0x87, 0x64, 0x6a, 0xcb, 0x2f, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4335 = { .name = "ecdsa_secp224r1_sha3_512_4335", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4335_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4335_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4335_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 452 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4336 for ECDSA, tcId is 453 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4336_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_512_4336_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4336_sig[] = { 0xdc, 0xfd, 0xa6, 0x77, 0x94, 0x87, 0x4a, 0x46, 0x13, 0xc1, 0x59, 0x76, 0x58, 0xdc, 0x52, 0xff, 0x85, 0x04, 0xde, 0x9d, 0xb4, 0x5a, 0x29, 0x09, 0x89, 0x40, 0x52, 0xfd, 0xeb, 0x8f, 0xbc, 0x6e, 0x67, 0xb2, 0x03, 0x09, 0xb9, 0xc0, 0xc1, 0x31, 0x5b, 0xd2, 0x88, 0x30, 0x29, 0xe0, 0x49, 0xb7, 0x70, 0x33, 0xfd, 0xc0, 0xbe, 0x6a, 0x0e, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4336 = { .name = "ecdsa_secp224r1_sha3_512_4336", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4336_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4336_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4336_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 453 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4337 for ECDSA, tcId is 454 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4337_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_512_4337_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4337_sig[] = { 0xad, 0x39, 0xc7, 0x64, 0x45, 0x2e, 0x94, 0xc3, 0x9d, 0xc6, 0x51, 0xbc, 0xa1, 0x49, 0xbf, 0xf4, 0xe3, 0x7b, 0x7e, 0x18, 0x56, 0xab, 0x3d, 0x40, 0x62, 0x5f, 0x95, 0x2e, 0x0f, 0x45, 0x4f, 0x1e, 0xd1, 0x91, 0xe8, 0xce, 0xdc, 0xb9, 0xc2, 0x90, 0x75, 0x8b, 0xd4, 0xb9, 0x74, 0x7a, 0x32, 0xb8, 0x14, 0x85, 0x2b, 0x1d, 0xa4, 0x19, 0xd1, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4337 = { .name = "ecdsa_secp224r1_sha3_512_4337", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4337_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4337_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4337_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 454 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4338 for ECDSA, tcId is 455 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4338_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha3_512_4338_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4338_sig[] = { 0x9f, 0xf6, 0x02, 0xd8, 0x03, 0x7e, 0xf1, 0x2b, 0x2f, 0x22, 0x85, 0x84, 0x11, 0xa9, 0x92, 0xa2, 0x1c, 0x55, 0x4f, 0xe1, 0x0e, 0x07, 0x56, 0x73, 0x38, 0xa0, 0x34, 0x12, 0x92, 0xd1, 0x74, 0xd8, 0x05, 0xbd, 0x0e, 0xae, 0x10, 0x93, 0xb2, 0x0c, 0x4b, 0x3a, 0x74, 0xf9, 0xe0, 0x9d, 0xab, 0x0a, 0x29, 0x2d, 0x41, 0x47, 0x17, 0x38, 0x74, 0xea, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4338 = { .name = "ecdsa_secp224r1_sha3_512_4338", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4338_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4338_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4338_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 455 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4339 for ECDSA, tcId is 456 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4339_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_512_4339_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4339_sig[] = { 0x50, 0x41, 0x00, 0x6f, 0x1d, 0xd0, 0x6d, 0x3b, 0xeb, 0xca, 0xaf, 0x4d, 0x10, 0xe1, 0x37, 0x19, 0x98, 0xd8, 0x71, 0xc0, 0x4f, 0xe2, 0xf7, 0x30, 0xb4, 0x3e, 0xc0, 0x25, 0xcd, 0x2a, 0xc8, 0x34, 0x65, 0x80, 0x9b, 0x3c, 0x65, 0x81, 0x15, 0xd2, 0x86, 0xa8, 0xa0, 0x0f, 0x67, 0xdb, 0x8a, 0x10, 0x68, 0xf8, 0x4e, 0xca, 0xb4, 0x18, 0xbb, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4339 = { .name = "ecdsa_secp224r1_sha3_512_4339", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4339_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4339_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4339_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 456 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4340 for ECDSA, tcId is 457 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4340_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_512_4340_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4340_sig[] = { 0xee, 0x58, 0x7c, 0x28, 0xd2, 0x21, 0x0b, 0x0c, 0xff, 0x7d, 0x47, 0xac, 0x35, 0x09, 0xf5, 0x90, 0x05, 0x33, 0x20, 0xe5, 0x47, 0xd3, 0xe0, 0x34, 0xdf, 0x9c, 0x9a, 0x50, 0x21, 0x53, 0x74, 0xb4, 0xe8, 0x54, 0x1a, 0xe4, 0x97, 0x49, 0x74, 0xed, 0x75, 0x75, 0xd2, 0xc1, 0x55, 0x0d, 0x92, 0x47, 0x08, 0xe3, 0x03, 0xc0, 0xb7, 0x44, 0xee, 0x77, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4340 = { .name = "ecdsa_secp224r1_sha3_512_4340", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4340_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4340_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4340_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 457 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4341 for ECDSA, tcId is 458 in file ecdsa_secp224r1_sha3_512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) static const unsigned char ecdsa_secp224r1_sha3_512_4341_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha3_512_4341_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha3_512_4341_sig[] = { 0xb6, 0x6a, 0x57, 0x9e, 0xa2, 0xdc, 0xa4, 0x0e, 0x3a, 0x48, 0x07, 0x45, 0x67, 0xaf, 0x7d, 0xaa, 0xd3, 0x4f, 0xd7, 0x84, 0xe3, 0xed, 0x09, 0x7d, 0x1b, 0x39, 0x56, 0x9c, 0x94, 0xa2, 0xb7, 0x2c, 0x71, 0x3c, 0x10, 0x91, 0x53, 0x86, 0x3e, 0xbb, 0x71, 0xa8, 0xcc, 0x80, 0xf5, 0x70, 0x94, 0xd8, 0x11, 0xc1, 0x3f, 0xa2, 0x69, 0xe1, 0x4a, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha3_512_4341 = { .name = "ecdsa_secp224r1_sha3_512_4341", .sig_alg = ECDSA, .hash = SHA3_512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha3_512_4341_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha3_512_4341_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha3_512_4341_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 458 in file ecdsa_secp224r1_sha3_512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA3_512) */ /* Test 4342 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4342_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4342_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4342_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x39, 0x47, 0x66, 0xfb, 0x67, 0xa6, 0x5f, 0xe0, 0xaf, 0x6c, 0x15, 0x4f, 0x7c, 0xbd, 0x28, 0x5e, 0xa1, 0x80, 0xb4, 0xc6, 0x15, 0x0c, 0xda, 0xfa, 0xfb, 0x0f, 0x6f, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4342 = { .name = "ecdsa_secp224r1_sha512_4342", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4342_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4342_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4342_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4343 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4343_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4343_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4343_sig[] = { 0x01, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x81, 0x73, 0x42, 0x8b, 0xc4, 0x8a, 0x2c, 0x3f, 0x03, 0x1c, 0xaa, 0xec, 0x3b, 0xbc, 0xe8, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4343 = { .name = "ecdsa_secp224r1_sha512_4343", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4343_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4343_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4343_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4344 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4344_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4344_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4344_sig[] = { 0x96, 0xe3, 0x8d, 0xc2, 0x29, 0x58, 0x0a, 0x2e, 0xe4, 0x73, 0x71, 0x74, 0x2f, 0x7c, 0xba, 0x03, 0x35, 0xad, 0x56, 0x4f, 0xe8, 0xb7, 0x35, 0xdf, 0xcc, 0x7c, 0x97, 0x92, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4344 = { .name = "ecdsa_secp224r1_sha512_4344", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4344_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4344_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4344_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4345 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4345_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4345_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4345_sig[] = { 0x01, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4345 = { .name = "ecdsa_secp224r1_sha512_4345", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4345_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4345_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4345_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4346 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4346_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4346_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4346_sig[] = { 0x96, 0xe3, 0x8d, 0xc2, 0x29, 0x58, 0x0a, 0x2e, 0xe4, 0x73, 0x71, 0x74, 0x2f, 0x7d, 0xa3, 0x60, 0x54, 0xf4, 0x66, 0x11, 0xd4, 0xda, 0x0c, 0x9a, 0x70, 0x20, 0x6d, 0x55, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4346 = { .name = "ecdsa_secp224r1_sha512_4346", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4346_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4346_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4346_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4347 for ECDSA, tcId is 6 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4347_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4347_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4347_sig[] = { 0x00, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x01, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0x04, 0xe7, 0x1f, 0xf1, 0x2b, 0xb6, 0x12, 0xad, 0x77, 0x8f, 0xbd, 0xa8, 0xe5, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4347 = { .name = "ecdsa_secp224r1_sha512_4347", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4347_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4347_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4347_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4348 for ECDSA, tcId is 7 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4348_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4348_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4348_sig[] = { 0x00, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x01, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4348 = { .name = "ecdsa_secp224r1_sha512_4348", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4348_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4348_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4348_sig, .siglen = 58, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4349 for ECDSA, tcId is 8 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4349_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4349_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4349_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x39, 0x47, 0x66, 0xfb, 0x67, 0xa6, 0x5f, 0xe0, 0xaf, 0x6c, 0x15, 0x4f, 0x7c, 0xbe, 0x11, 0xbb, 0xc0, 0xc7, 0xc4, 0x88, 0x01, 0x2f, 0xb1, 0xb5, 0x9e, 0xb3, 0x44, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4349 = { .name = "ecdsa_secp224r1_sha512_4349", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4349_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4349_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4349_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4350 for ECDSA, tcId is 9 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4350_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4350_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4350_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4350 = { .name = "ecdsa_secp224r1_sha512_4350", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4350_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4350_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4350_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4351 for ECDSA, tcId is 10 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4351_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4351_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4351_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4351 = { .name = "ecdsa_secp224r1_sha512_4351", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4351_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4351_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4351_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4352 for ECDSA, tcId is 11 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4352_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4352_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4352_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4352 = { .name = "ecdsa_secp224r1_sha512_4352", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4352_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4352_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4352_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4353 for ECDSA, tcId is 12 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4353_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4353_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4353_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4353 = { .name = "ecdsa_secp224r1_sha512_4353", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4353_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4353_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4353_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4354 for ECDSA, tcId is 13 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4354_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4354_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4354_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4354 = { .name = "ecdsa_secp224r1_sha512_4354", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4354_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4354_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4354_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4355 for ECDSA, tcId is 14 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4355_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4355_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4355_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4355 = { .name = "ecdsa_secp224r1_sha512_4355", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4355_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4355_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4355_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4356 for ECDSA, tcId is 15 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4356_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4356_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4356_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4356 = { .name = "ecdsa_secp224r1_sha512_4356", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4356_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4356_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4356_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4357 for ECDSA, tcId is 16 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4357_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4357_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4357_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4357 = { .name = "ecdsa_secp224r1_sha512_4357", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4357_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4357_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4357_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4358 for ECDSA, tcId is 17 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4358_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4358_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4358_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4358 = { .name = "ecdsa_secp224r1_sha512_4358", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4358_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4358_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4358_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4359 for ECDSA, tcId is 18 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4359_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4359_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4359_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4359 = { .name = "ecdsa_secp224r1_sha512_4359", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4359_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4359_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4359_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4360 for ECDSA, tcId is 19 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4360_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4360_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4360_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4360 = { .name = "ecdsa_secp224r1_sha512_4360", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4360_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4360_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4360_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4361 for ECDSA, tcId is 20 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4361_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4361_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4361_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4361 = { .name = "ecdsa_secp224r1_sha512_4361", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4361_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4361_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4361_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4362 for ECDSA, tcId is 21 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4362_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4362_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4362_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4362 = { .name = "ecdsa_secp224r1_sha512_4362", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4362_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4362_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4362_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4363 for ECDSA, tcId is 22 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4363_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4363_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4363_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4363 = { .name = "ecdsa_secp224r1_sha512_4363", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4363_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4363_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4363_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4364 for ECDSA, tcId is 23 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4364_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4364_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4364_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4364 = { .name = "ecdsa_secp224r1_sha512_4364", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4364_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4364_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4364_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4365 for ECDSA, tcId is 24 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4365_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4365_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4365_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4365 = { .name = "ecdsa_secp224r1_sha512_4365", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4365_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4365_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4365_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4366 for ECDSA, tcId is 25 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4366_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4366_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4366_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4366 = { .name = "ecdsa_secp224r1_sha512_4366", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4366_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4366_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4366_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4367 for ECDSA, tcId is 26 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4367_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4367_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4367_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4367 = { .name = "ecdsa_secp224r1_sha512_4367", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4367_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4367_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4367_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4368 for ECDSA, tcId is 27 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4368_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4368_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4368_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4368 = { .name = "ecdsa_secp224r1_sha512_4368", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4368_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4368_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4368_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4369 for ECDSA, tcId is 28 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4369_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4369_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4369_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4369 = { .name = "ecdsa_secp224r1_sha512_4369", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4369_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4369_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4369_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4370 for ECDSA, tcId is 29 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4370_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4370_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4370_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4370 = { .name = "ecdsa_secp224r1_sha512_4370", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4370_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4370_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4370_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4371 for ECDSA, tcId is 30 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4371_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4371_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4371_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4371 = { .name = "ecdsa_secp224r1_sha512_4371", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4371_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4371_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4371_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4372 for ECDSA, tcId is 31 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4372_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4372_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4372_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4372 = { .name = "ecdsa_secp224r1_sha512_4372", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4372_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4372_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4372_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4373 for ECDSA, tcId is 32 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4373_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4373_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4373_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4373 = { .name = "ecdsa_secp224r1_sha512_4373", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4373_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4373_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4373_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4374 for ECDSA, tcId is 33 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4374_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4374_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4374_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4374 = { .name = "ecdsa_secp224r1_sha512_4374", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4374_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4374_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4374_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4375 for ECDSA, tcId is 34 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4375_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4375_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4375_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4375 = { .name = "ecdsa_secp224r1_sha512_4375", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4375_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4375_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4375_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4376 for ECDSA, tcId is 35 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4376_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4376_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4376_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4376 = { .name = "ecdsa_secp224r1_sha512_4376", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4376_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4376_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4376_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4377 for ECDSA, tcId is 36 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4377_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4377_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4377_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4377 = { .name = "ecdsa_secp224r1_sha512_4377", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4377_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4377_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4377_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4378 for ECDSA, tcId is 37 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4378_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4378_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4378_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4378 = { .name = "ecdsa_secp224r1_sha512_4378", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4378_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4378_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4378_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4379 for ECDSA, tcId is 38 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4379_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4379_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4379_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4379 = { .name = "ecdsa_secp224r1_sha512_4379", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4379_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4379_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4379_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4380 for ECDSA, tcId is 39 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4380_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4380_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4380_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4380 = { .name = "ecdsa_secp224r1_sha512_4380", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4380_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4380_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4380_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4381 for ECDSA, tcId is 40 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4381_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4381_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4381_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4381 = { .name = "ecdsa_secp224r1_sha512_4381", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4381_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4381_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4381_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4382 for ECDSA, tcId is 41 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4382_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4382_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4382_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4382 = { .name = "ecdsa_secp224r1_sha512_4382", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4382_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4382_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4382_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4383 for ECDSA, tcId is 42 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4383_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4383_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4383_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4383 = { .name = "ecdsa_secp224r1_sha512_4383", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4383_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4383_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4383_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4384 for ECDSA, tcId is 43 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4384_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4384_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4384_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4384 = { .name = "ecdsa_secp224r1_sha512_4384", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4384_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4384_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4384_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4385 for ECDSA, tcId is 44 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4385_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4385_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4385_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4385 = { .name = "ecdsa_secp224r1_sha512_4385", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4385_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4385_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4385_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4386 for ECDSA, tcId is 45 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4386_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4386_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4386_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4386 = { .name = "ecdsa_secp224r1_sha512_4386", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4386_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4386_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4386_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4387 for ECDSA, tcId is 46 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4387_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4387_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4387_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4387 = { .name = "ecdsa_secp224r1_sha512_4387", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4387_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4387_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4387_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4388 for ECDSA, tcId is 47 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4388_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4388_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4388_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4388 = { .name = "ecdsa_secp224r1_sha512_4388", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4388_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4388_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4388_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4389 for ECDSA, tcId is 48 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4389_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4389_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4389_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4389 = { .name = "ecdsa_secp224r1_sha512_4389", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4389_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4389_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4389_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4390 for ECDSA, tcId is 49 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4390_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4390_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4390_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4390 = { .name = "ecdsa_secp224r1_sha512_4390", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4390_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4390_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4390_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4391 for ECDSA, tcId is 50 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4391_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4391_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4391_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4391 = { .name = "ecdsa_secp224r1_sha512_4391", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4391_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4391_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4391_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4392 for ECDSA, tcId is 51 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4392_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4392_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4392_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4392 = { .name = "ecdsa_secp224r1_sha512_4392", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4392_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4392_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4392_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4393 for ECDSA, tcId is 52 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4393_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4393_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4393_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4393 = { .name = "ecdsa_secp224r1_sha512_4393", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4393_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4393_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4393_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4394 for ECDSA, tcId is 53 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4394_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4394_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4394_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4394 = { .name = "ecdsa_secp224r1_sha512_4394", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4394_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4394_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4394_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4395 for ECDSA, tcId is 54 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4395_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4395_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4395_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4395 = { .name = "ecdsa_secp224r1_sha512_4395", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4395_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4395_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4395_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4396 for ECDSA, tcId is 55 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4396_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4396_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4396_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4396 = { .name = "ecdsa_secp224r1_sha512_4396", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4396_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4396_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4396_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4397 for ECDSA, tcId is 56 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4397_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4397_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4397_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4397 = { .name = "ecdsa_secp224r1_sha512_4397", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4397_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4397_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4397_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4398 for ECDSA, tcId is 57 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4398_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4398_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4398_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4398 = { .name = "ecdsa_secp224r1_sha512_4398", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4398_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4398_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4398_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4399 for ECDSA, tcId is 58 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4399_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4399_msg[] = { 0x36, 0x39, 0x31, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4399_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x22, 0x1a, 0x25, 0xeb, 0x9c, 0xc8, 0xdd, 0x66, 0xfd, 0xf1, 0x56, 0xb2, 0xf6, 0xab, 0x60, 0x1a, 0xb6, 0xd9, 0xc5, 0x09, 0x24, 0x7f, 0x8d, 0xe5, 0xd2, 0x67, 0x1a, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4399 = { .name = "ecdsa_secp224r1_sha512_4399", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4399_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4399_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha512_4399_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4400 for ECDSA, tcId is 59 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4400_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4400_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x31, 0x39, 0x34, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4400_sig[] = { 0x3b, 0x30, 0x08, 0xed, 0x59, 0x6b, 0x7f, 0xa2, 0x76, 0x49, 0x8d, 0xef, 0x40, 0xd9, 0x6b, 0x1e, 0xb2, 0xff, 0xb7, 0x31, 0xa4, 0x40, 0x50, 0xff, 0xb7, 0x32, 0xe4, 0xe6, 0x6d, 0xbb, 0x08, 0xc5, 0x6d, 0xb7, 0x37, 0xe9, 0x39, 0x2f, 0xf4, 0xf3, 0xa5, 0x4d, 0x8b, 0x80, 0x6d, 0x70, 0xaf, 0x22, 0x6e, 0xcf, 0x41, 0x3b, 0x34, 0x65, 0xde, 0x55, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4400 = { .name = "ecdsa_secp224r1_sha512_4400", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4400_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4400_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4400_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4401 for ECDSA, tcId is 60 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4401_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4401_msg[] = { 0x35, 0x33, 0x36, 0x37, 0x36, 0x34, 0x31, 0x38, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4401_sig[] = { 0xd1, 0xfe, 0x26, 0x9c, 0x30, 0x61, 0xe4, 0xb9, 0x46, 0x04, 0xe8, 0xd6, 0x12, 0xd7, 0x08, 0x87, 0x06, 0x8c, 0xc7, 0xd5, 0x23, 0x2c, 0xd5, 0xa9, 0xb7, 0x29, 0x23, 0xa1, 0x3c, 0x1c, 0xbc, 0x02, 0x7d, 0x33, 0xfb, 0x24, 0x51, 0xd5, 0x2d, 0xce, 0x3a, 0x82, 0x8a, 0x8c, 0x7e, 0xcc, 0x49, 0x0a, 0x28, 0xa9, 0x4e, 0x5e, 0x5b, 0xb2, 0xc4, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4401 = { .name = "ecdsa_secp224r1_sha512_4401", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4401_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4401_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4401_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4402 for ECDSA, tcId is 61 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4402_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4402_msg[] = { 0x35, 0x36, 0x37, 0x31, 0x34, 0x38, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4402_sig[] = { 0x04, 0x58, 0x61, 0x34, 0xcc, 0x67, 0x92, 0x95, 0xdd, 0x93, 0x49, 0x93, 0x11, 0xc4, 0xa8, 0xaf, 0x37, 0xcb, 0x94, 0xda, 0xdb, 0xae, 0x18, 0xd8, 0xee, 0x27, 0x9b, 0x9b, 0xbf, 0x91, 0x70, 0xa1, 0xb6, 0x5b, 0x66, 0x56, 0x64, 0xcf, 0x56, 0x7d, 0x40, 0xa9, 0x95, 0xce, 0x25, 0x2a, 0x23, 0xd6, 0xa9, 0xf9, 0x62, 0xb0, 0x5e, 0x36, 0x44, 0x86, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4402 = { .name = "ecdsa_secp224r1_sha512_4402", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4402_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4402_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4402_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4403 for ECDSA, tcId is 62 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4403_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4403_msg[] = { 0x31, 0x31, 0x32, 0x30, 0x37, 0x31, 0x37, 0x32, 0x39, 0x30, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4403_sig[] = { 0xc1, 0xf5, 0x10, 0x09, 0xb9, 0x35, 0xb4, 0x77, 0x33, 0x74, 0x36, 0x4e, 0xc3, 0xee, 0xd7, 0x2a, 0x24, 0xb7, 0x09, 0x26, 0xe0, 0x34, 0x9c, 0x77, 0x86, 0x2f, 0x34, 0x75, 0x46, 0xdf, 0x3d, 0x98, 0xf1, 0x04, 0xba, 0x66, 0x02, 0xf8, 0x04, 0x1a, 0x5b, 0xf5, 0x49, 0x5f, 0xb2, 0x40, 0xe1, 0x03, 0xd1, 0xbd, 0x17, 0xf2, 0xfa, 0x87, 0x89, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4403 = { .name = "ecdsa_secp224r1_sha512_4403", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4403_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4403_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4403_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4404 for ECDSA, tcId is 63 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4404_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4404_msg[] = { 0x31, 0x31, 0x32, 0x39, 0x38, 0x30, 0x33, 0x34, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4404_sig[] = { 0xe8, 0x22, 0x24, 0x28, 0x72, 0xf1, 0xec, 0xf3, 0x38, 0xa4, 0xf7, 0x73, 0xdf, 0x87, 0xb6, 0x7e, 0x9b, 0x21, 0xbb, 0x28, 0x3a, 0xca, 0xc7, 0xd6, 0x6b, 0x26, 0x55, 0x1e, 0x94, 0xd4, 0xe0, 0xfc, 0x3c, 0x63, 0x59, 0x99, 0x4a, 0x6e, 0xae, 0xdd, 0xdd, 0x15, 0x33, 0xf4, 0x90, 0xf7, 0x2e, 0xf8, 0x51, 0x39, 0xf8, 0xd3, 0xb3, 0x9c, 0xf0, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4404 = { .name = "ecdsa_secp224r1_sha512_4404", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4404_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4404_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4404_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4405 for ECDSA, tcId is 64 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4405_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4405_msg[] = { 0x39, 0x38, 0x37, 0x36, 0x30, 0x32, 0x39, 0x36, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4405_sig[] = { 0x7f, 0xd4, 0x55, 0x28, 0xeb, 0x7b, 0xfc, 0x37, 0x10, 0xe2, 0x73, 0xc4, 0x46, 0x8f, 0x0b, 0x50, 0xeb, 0xf9, 0x3f, 0x94, 0xcd, 0x0e, 0x7a, 0x60, 0x2a, 0x49, 0x29, 0xa6, 0x46, 0x61, 0x3d, 0xd1, 0xff, 0xd8, 0x5d, 0xf8, 0xd7, 0x1f, 0x34, 0x98, 0x00, 0x17, 0x21, 0xfd, 0xa4, 0x98, 0x2c, 0x27, 0xa1, 0xc2, 0x91, 0x35, 0x9b, 0x05, 0xb1, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4405 = { .name = "ecdsa_secp224r1_sha512_4405", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4405_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4405_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4405_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4406 for ECDSA, tcId is 65 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4406_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4406_msg[] = { 0x32, 0x30, 0x32, 0x30, 0x34, 0x32, 0x39, 0x36, 0x35, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4406_sig[] = { 0x36, 0xd1, 0x37, 0xb6, 0x91, 0x71, 0xa4, 0x86, 0x93, 0x3b, 0x50, 0x13, 0x8d, 0x1d, 0xb1, 0x84, 0x27, 0x24, 0x76, 0x6a, 0xfd, 0x25, 0xc8, 0x5b, 0x00, 0x32, 0xda, 0xf5, 0x8e, 0x70, 0x0d, 0xe2, 0x1f, 0x2f, 0xc3, 0x50, 0xa3, 0x4c, 0x7c, 0xc1, 0x90, 0x54, 0xcf, 0x37, 0x1e, 0xca, 0xb6, 0xf7, 0x33, 0x1c, 0xce, 0xcf, 0x68, 0xfc, 0xa0, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4406 = { .name = "ecdsa_secp224r1_sha512_4406", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4406_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4406_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4406_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4407 for ECDSA, tcId is 66 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4407_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4407_msg[] = { 0x31, 0x34, 0x35, 0x31, 0x36, 0x36, 0x39, 0x31, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4407_sig[] = { 0xda, 0x3b, 0x43, 0x69, 0x08, 0xf5, 0xa8, 0x2f, 0x26, 0xbc, 0x17, 0xa8, 0x57, 0x7a, 0xd2, 0xa7, 0x82, 0x94, 0x6e, 0x3a, 0x75, 0x87, 0xb0, 0x1d, 0x25, 0x3b, 0x1d, 0xd0, 0xa6, 0x54, 0x4e, 0x38, 0xf2, 0x4e, 0x81, 0x17, 0x37, 0x0c, 0x04, 0x9b, 0x5d, 0x1f, 0x67, 0x12, 0xea, 0x14, 0x33, 0x7a, 0x94, 0x51, 0x12, 0x24, 0xdf, 0x44, 0x96, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4407 = { .name = "ecdsa_secp224r1_sha512_4407", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4407_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4407_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4407_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4408 for ECDSA, tcId is 67 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4408_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4408_msg[] = { 0x31, 0x30, 0x39, 0x33, 0x36, 0x38, 0x35, 0x39, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4408_sig[] = { 0x43, 0x14, 0xa2, 0xbd, 0x13, 0x9d, 0x47, 0xbe, 0x3d, 0x9f, 0xd9, 0xeb, 0xdd, 0x72, 0xa0, 0x6a, 0x22, 0x02, 0x19, 0xc7, 0x59, 0x6b, 0x94, 0x41, 0x78, 0xee, 0x6f, 0x5f, 0x0e, 0x6f, 0x1d, 0x2f, 0x57, 0xc6, 0x99, 0x65, 0x4e, 0x9c, 0x70, 0x5d, 0x7b, 0x8f, 0xa3, 0xc1, 0xcc, 0xb0, 0xf9, 0x39, 0xf6, 0x36, 0x8b, 0xed, 0x24, 0x6b, 0x2e, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4408 = { .name = "ecdsa_secp224r1_sha512_4408", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4408_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4408_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4408_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4409 for ECDSA, tcId is 68 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4409_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4409_msg[] = { 0x36, 0x32, 0x31, 0x39, 0x35, 0x36, 0x30, 0x32, 0x30, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4409_sig[] = { 0x6a, 0x25, 0x64, 0x34, 0x64, 0x68, 0x26, 0x79, 0xd8, 0x49, 0x70, 0xc6, 0x03, 0x92, 0x7f, 0x4a, 0x8c, 0xa8, 0x3e, 0x7e, 0xf9, 0x71, 0x5d, 0xd1, 0xed, 0x84, 0xc2, 0x8f, 0x93, 0x2b, 0x78, 0xd1, 0x65, 0xc2, 0x25, 0xa5, 0x25, 0x3e, 0x62, 0x01, 0xc0, 0xb1, 0xde, 0xd0, 0x89, 0x8b, 0xa2, 0x4d, 0xe4, 0x4b, 0x23, 0x23, 0x3e, 0xb7, 0x80, 0x54, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4409 = { .name = "ecdsa_secp224r1_sha512_4409", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4409_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4409_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4409_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4410 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4410_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4410_msg[] = { 0x35, 0x36, 0x38, 0x32, 0x34, 0x37, 0x34, 0x33, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4410_sig[] = { 0x47, 0x6a, 0xaa, 0x58, 0x67, 0x7d, 0x9e, 0x60, 0x47, 0x7c, 0xff, 0xd0, 0x26, 0xc4, 0x32, 0x48, 0xe2, 0xcf, 0x3c, 0xc2, 0x1e, 0x8f, 0xdc, 0xcb, 0x75, 0xce, 0xef, 0xad, 0x77, 0x99, 0xfc, 0x7a, 0xf8, 0xf9, 0xb9, 0x29, 0x20, 0x3f, 0xaf, 0x89, 0x9b, 0xb5, 0xca, 0x1a, 0xec, 0xf2, 0x49, 0x25, 0x55, 0x15, 0x72, 0x82, 0xdf, 0xde, 0x79, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4410 = { .name = "ecdsa_secp224r1_sha512_4410", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4410_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4410_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4410_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4411 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4411_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4411_msg[] = { 0x33, 0x37, 0x33, 0x36, 0x35, 0x33, 0x31, 0x37, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4411_sig[] = { 0x63, 0xa9, 0x86, 0x14, 0xa1, 0x42, 0x1e, 0x2e, 0xbb, 0x27, 0x8d, 0xe5, 0x3b, 0x61, 0x61, 0x8b, 0xaf, 0xc7, 0x57, 0x12, 0x26, 0x47, 0xaf, 0xfd, 0x35, 0x8c, 0x66, 0x7a, 0x8e, 0xdb, 0xa8, 0x06, 0xe0, 0xa7, 0xe4, 0x38, 0xca, 0x35, 0xf9, 0x84, 0x05, 0xa8, 0xad, 0x2d, 0x5c, 0x3e, 0x8c, 0xc2, 0xd5, 0xc4, 0x38, 0x42, 0x33, 0xae, 0xf0, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4411 = { .name = "ecdsa_secp224r1_sha512_4411", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4411_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4411_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4411_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4412 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4412_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4412_msg[] = { 0x34, 0x37, 0x39, 0x35, 0x39, 0x30, 0x33, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4412_sig[] = { 0x88, 0x0b, 0x52, 0x38, 0xa0, 0x14, 0xf8, 0xb4, 0x46, 0x55, 0xb8, 0x3c, 0x17, 0x58, 0x80, 0xeb, 0x1e, 0x83, 0x07, 0x89, 0x9a, 0x82, 0x4e, 0xa3, 0xe0, 0x7d, 0xbd, 0x6d, 0xa4, 0x72, 0x4c, 0x86, 0x49, 0xfd, 0x74, 0xe5, 0xbc, 0x8d, 0x7f, 0xe6, 0xa9, 0x06, 0x7a, 0x13, 0x76, 0xfb, 0x8e, 0x08, 0xdb, 0xda, 0xed, 0x68, 0x98, 0x0b, 0x0f, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4412 = { .name = "ecdsa_secp224r1_sha512_4412", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4412_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4412_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4412_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4413 for ECDSA, tcId is 72 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4413_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4413_msg[] = { 0x39, 0x33, 0x39, 0x39, 0x36, 0x31, 0x31, 0x30, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4413_sig[] = { 0xf8, 0x74, 0x35, 0x88, 0x23, 0x46, 0x34, 0xdd, 0x98, 0x91, 0xf4, 0xf2, 0xf4, 0x0f, 0x4e, 0x46, 0xb7, 0x7f, 0x97, 0xb8, 0x2d, 0xc5, 0xdb, 0xe2, 0x34, 0xaa, 0x6b, 0x5d, 0x80, 0x65, 0x6e, 0x52, 0x62, 0xbc, 0x25, 0xe1, 0x58, 0xf3, 0xb7, 0x8f, 0x51, 0xae, 0x0d, 0x6a, 0x41, 0xcc, 0x8c, 0xca, 0x1a, 0xa4, 0x57, 0x22, 0x1b, 0x2e, 0xb7, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4413 = { .name = "ecdsa_secp224r1_sha512_4413", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4413_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4413_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4413_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4414 for ECDSA, tcId is 73 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4414_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4414_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x34, 0x39, 0x31, 0x31, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4414_sig[] = { 0x2a, 0x23, 0x57, 0xe3, 0xd8, 0xfe, 0x34, 0x43, 0x45, 0x82, 0xbe, 0x4d, 0xab, 0xd5, 0x8b, 0x77, 0xb3, 0x88, 0xd1, 0xd5, 0x2a, 0xdc, 0xc6, 0x64, 0xf4, 0x5d, 0xec, 0xe4, 0x94, 0xbe, 0x3a, 0x36, 0x9b, 0x7c, 0x27, 0x88, 0xdf, 0x45, 0x87, 0xec, 0x5b, 0xd4, 0x16, 0x3c, 0x4c, 0xbc, 0x40, 0xb7, 0x7d, 0xe1, 0xa8, 0x5e, 0x8b, 0xcf, 0xb2, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4414 = { .name = "ecdsa_secp224r1_sha512_4414", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4414_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4414_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4414_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4415 for ECDSA, tcId is 74 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4415_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4415_msg[] = { 0x33, 0x32, 0x33, 0x36, 0x36, 0x37, 0x38, 0x35, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4415_sig[] = { 0xb6, 0xb0, 0xc0, 0xab, 0xa6, 0xc6, 0x11, 0x30, 0x0e, 0xca, 0xd8, 0x81, 0x62, 0x42, 0xc4, 0x15, 0xf1, 0x83, 0xa2, 0xbd, 0x4d, 0x46, 0xcd, 0x77, 0x69, 0x03, 0x3d, 0x9b, 0x77, 0x50, 0xb2, 0x4b, 0xe0, 0x2f, 0x22, 0xdc, 0x0b, 0x65, 0x6f, 0xe4, 0xaf, 0x37, 0x74, 0x13, 0xf9, 0x45, 0x3d, 0xff, 0x99, 0x22, 0x69, 0x15, 0xdb, 0xb6, 0xe0, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4415 = { .name = "ecdsa_secp224r1_sha512_4415", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4415_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4415_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4415_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4416 for ECDSA, tcId is 75 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4416_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4416_msg[] = { 0x31, 0x34, 0x34, 0x38, 0x39, 0x39, 0x37, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4416_sig[] = { 0xa5, 0xc1, 0xa7, 0x5c, 0x27, 0x79, 0xf3, 0xeb, 0x83, 0xa6, 0x5e, 0x29, 0x59, 0x27, 0xcc, 0xe4, 0x28, 0x8e, 0x9d, 0x5c, 0x21, 0x32, 0xa4, 0xc7, 0xca, 0x92, 0x52, 0x6e, 0x10, 0xfe, 0x30, 0xf0, 0xbe, 0x33, 0xa7, 0x85, 0x38, 0x51, 0x37, 0xb5, 0x7d, 0x80, 0x61, 0x40, 0xa4, 0x02, 0xb9, 0xbd, 0x3c, 0x1d, 0xf1, 0xb5, 0x7d, 0xe6, 0xda, 0x63, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4416 = { .name = "ecdsa_secp224r1_sha512_4416", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4416_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4416_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4416_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4417 for ECDSA, tcId is 76 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4417_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4417_msg[] = { 0x35, 0x37, 0x31, 0x34, 0x36, 0x33, 0x32, 0x38, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4417_sig[] = { 0xb9, 0x2b, 0x55, 0x21, 0xd1, 0xa7, 0xab, 0xe7, 0x7e, 0x85, 0x24, 0xdb, 0xd3, 0x00, 0x11, 0x21, 0xcf, 0x83, 0xc0, 0x80, 0x17, 0xe3, 0x91, 0x7b, 0xc5, 0x8b, 0x5d, 0x1c, 0x22, 0x4b, 0x11, 0x37, 0x79, 0x01, 0x7f, 0x6a, 0x52, 0x21, 0x71, 0xed, 0xf9, 0x30, 0xf1, 0xb5, 0xd4, 0xf5, 0xe7, 0xde, 0xdc, 0x6d, 0x2d, 0x51, 0x4f, 0xd7, 0x88, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4417 = { .name = "ecdsa_secp224r1_sha512_4417", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4417_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4417_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4417_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4418 for ECDSA, tcId is 77 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4418_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4418_msg[] = { 0x32, 0x32, 0x36, 0x34, 0x38, 0x37, 0x34, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4418_sig[] = { 0xeb, 0xd3, 0xec, 0xf3, 0xaa, 0x64, 0xcd, 0xcd, 0xd1, 0x71, 0x58, 0x5a, 0x14, 0x1a, 0x4a, 0x67, 0x3a, 0x8d, 0x5d, 0xe0, 0xca, 0x08, 0x7d, 0xfc, 0xdf, 0x62, 0x43, 0x2e, 0xe0, 0xf1, 0xa0, 0xf7, 0xb8, 0xf5, 0xac, 0x4a, 0x42, 0x63, 0x2f, 0x87, 0x15, 0x6a, 0xd1, 0x09, 0x40, 0x79, 0x39, 0x3b, 0x03, 0xf2, 0x05, 0x1a, 0x9f, 0xd6, 0x02, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4418 = { .name = "ecdsa_secp224r1_sha512_4418", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4418_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4418_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4418_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4419 for ECDSA, tcId is 78 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4419_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4419_msg[] = { 0x35, 0x33, 0x35, 0x33, 0x34, 0x34, 0x39, 0x34, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4419_sig[] = { 0x6c, 0x38, 0x54, 0x29, 0x7e, 0x1f, 0x26, 0x7b, 0x64, 0xa2, 0x8e, 0x0c, 0xd6, 0x14, 0x8e, 0x0f, 0xad, 0xcf, 0x85, 0xbc, 0x8d, 0x5c, 0x23, 0x94, 0x75, 0x43, 0xbc, 0xb8, 0xaa, 0x05, 0x94, 0xee, 0x11, 0x31, 0x2f, 0x5d, 0x47, 0x67, 0xd2, 0x96, 0xe5, 0xca, 0x83, 0xdf, 0x68, 0x07, 0x28, 0x11, 0xf8, 0x1a, 0x8d, 0x27, 0xe1, 0x78, 0xca, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4419 = { .name = "ecdsa_secp224r1_sha512_4419", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4419_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4419_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4419_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4420 for ECDSA, tcId is 79 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4420_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4420_msg[] = { 0x34, 0x37, 0x38, 0x37, 0x33, 0x30, 0x33, 0x38, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4420_sig[] = { 0x78, 0x5a, 0xc8, 0xc9, 0x56, 0xd7, 0x79, 0x7a, 0xe6, 0x74, 0x98, 0x77, 0x5b, 0x3c, 0x44, 0x6c, 0x41, 0x73, 0x5e, 0xb1, 0x5f, 0x34, 0x30, 0xb4, 0x9f, 0x6a, 0x09, 0xf2, 0x57, 0x10, 0x87, 0x9a, 0xb8, 0x39, 0x94, 0xe8, 0x09, 0xc8, 0xd2, 0xcb, 0xd6, 0xf2, 0xac, 0x5c, 0x20, 0x5b, 0x4b, 0x8d, 0x62, 0x26, 0xe9, 0x8b, 0xe0, 0x3e, 0x79, 0x67, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4420 = { .name = "ecdsa_secp224r1_sha512_4420", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4420_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4420_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4420_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4421 for ECDSA, tcId is 80 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4421_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4421_msg[] = { 0x32, 0x32, 0x33, 0x32, 0x31, 0x39, 0x35, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4421_sig[] = { 0xf1, 0xf3, 0xd0, 0x16, 0x69, 0x31, 0x25, 0xba, 0x73, 0x98, 0x1c, 0x8f, 0x9a, 0x17, 0x48, 0xe5, 0xdc, 0xe1, 0xd9, 0x63, 0x43, 0x55, 0xf2, 0x6f, 0xa5, 0x36, 0x19, 0x0e, 0xb5, 0x74, 0xe9, 0x7d, 0xef, 0x60, 0xdc, 0xd0, 0xe9, 0x17, 0x71, 0x06, 0x48, 0x37, 0x91, 0xb2, 0xed, 0xb4, 0xab, 0x03, 0x42, 0xb9, 0xf5, 0xeb, 0xb9, 0x57, 0xd5, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4421 = { .name = "ecdsa_secp224r1_sha512_4421", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4421_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4421_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4421_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4422 for ECDSA, tcId is 81 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4422_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4422_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x39, 0x33, 0x39, 0x31, 0x39, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4422_sig[] = { 0xe6, 0x4f, 0x33, 0x71, 0x52, 0x2c, 0xb1, 0xa5, 0xf0, 0xd1, 0x51, 0x1b, 0x15, 0x2b, 0x20, 0xe0, 0x1d, 0xec, 0xa0, 0xb3, 0x28, 0x47, 0x86, 0x85, 0x3c, 0xac, 0x27, 0x9a, 0xc9, 0xa2, 0xe5, 0xf4, 0xff, 0xde, 0x22, 0xb9, 0xd4, 0xed, 0x01, 0x79, 0xce, 0x74, 0xff, 0xf4, 0x08, 0xea, 0x91, 0x8d, 0xda, 0x76, 0x85, 0xc7, 0x98, 0x0a, 0xe6, 0x1a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4422 = { .name = "ecdsa_secp224r1_sha512_4422", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4422_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4422_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4422_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4423 for ECDSA, tcId is 82 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4423_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4423_msg[] = { 0x31, 0x38, 0x38, 0x31, 0x30, 0x32, 0x37, 0x33, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4423_sig[] = { 0x1f, 0x99, 0xdd, 0x6e, 0xf7, 0x2f, 0xee, 0xed, 0xa6, 0xc1, 0x23, 0xba, 0xa4, 0xfa, 0xbb, 0x12, 0x6d, 0x7d, 0xed, 0xb6, 0x41, 0x30, 0xfa, 0xe3, 0xf4, 0x23, 0x07, 0x97, 0xe4, 0x41, 0xec, 0x51, 0xdc, 0xa6, 0x27, 0x1b, 0x04, 0x3e, 0x95, 0x75, 0x3c, 0x40, 0x43, 0xd7, 0xcb, 0x4e, 0x76, 0xfd, 0xc1, 0x3d, 0x6a, 0xea, 0x45, 0xfb, 0xf2, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4423 = { .name = "ecdsa_secp224r1_sha512_4423", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4423_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4423_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4423_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4424 for ECDSA, tcId is 83 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4424_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4424_msg[] = { 0x36, 0x30, 0x36, 0x31, 0x36, 0x39, 0x33, 0x39, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4424_sig[] = { 0x86, 0x37, 0xa0, 0x96, 0x27, 0xc5, 0x27, 0x66, 0xbf, 0x96, 0xf0, 0xb6, 0xce, 0xa6, 0xf2, 0xac, 0x3e, 0xb3, 0x03, 0x00, 0x1c, 0x5f, 0x6f, 0xe6, 0xd6, 0x28, 0xe4, 0xba, 0x10, 0xb6, 0x6c, 0x59, 0x94, 0x55, 0xd4, 0x00, 0x77, 0xbb, 0x86, 0x5e, 0xd4, 0x3e, 0x2c, 0x2c, 0xc4, 0x03, 0x47, 0x3b, 0xaa, 0x6d, 0x63, 0xb1, 0x6b, 0xe4, 0x8c, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4424 = { .name = "ecdsa_secp224r1_sha512_4424", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4424_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4424_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4424_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4425 for ECDSA, tcId is 84 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4425_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4425_msg[] = { 0x38, 0x38, 0x39, 0x35, 0x32, 0x32, 0x37, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4425_sig[] = { 0x52, 0xa0, 0x10, 0xa2, 0x3e, 0x4f, 0x9e, 0xbb, 0x45, 0x9b, 0xbe, 0x9f, 0x30, 0x57, 0xe6, 0xc1, 0x97, 0x61, 0xfb, 0x99, 0xd2, 0x5c, 0x9b, 0x16, 0xb8, 0xf0, 0x07, 0xd8, 0x52, 0x6d, 0xc1, 0xf3, 0x44, 0x44, 0xde, 0x00, 0x44, 0x7b, 0xa2, 0x3c, 0x76, 0x95, 0x0f, 0x2c, 0x15, 0x95, 0x79, 0xd5, 0x48, 0xb6, 0x33, 0x5d, 0x12, 0x7e, 0xa3, 0x21, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4425 = { .name = "ecdsa_secp224r1_sha512_4425", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4425_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4425_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4425_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4426 for ECDSA, tcId is 85 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4426_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4426_msg[] = { 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, 0x34, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4426_sig[] = { 0xfc, 0x49, 0xca, 0xaa, 0xda, 0x52, 0x8f, 0x33, 0x57, 0xe5, 0xa2, 0x64, 0xf2, 0xe7, 0xf9, 0x70, 0xca, 0x1b, 0x15, 0xca, 0x5f, 0xee, 0x28, 0x74, 0x1d, 0x12, 0x02, 0xac, 0x17, 0x5e, 0x88, 0x4d, 0x10, 0xd0, 0xbf, 0xd2, 0x0b, 0x39, 0x31, 0x1c, 0xe2, 0xc5, 0x30, 0x83, 0xda, 0x16, 0x7d, 0x1f, 0x3d, 0xfe, 0xb9, 0x90, 0xe5, 0x9e, 0xd6, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4426 = { .name = "ecdsa_secp224r1_sha512_4426", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4426_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4426_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4426_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4427 for ECDSA, tcId is 86 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4427_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4427_msg[] = { 0x33, 0x39, 0x36, 0x35, 0x39, 0x39, 0x31, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4427_sig[] = { 0xd9, 0x5d, 0x53, 0x9a, 0x85, 0xc9, 0xed, 0xac, 0xd4, 0xe0, 0x2e, 0xde, 0x27, 0xb0, 0xe0, 0xb7, 0x37, 0x09, 0x96, 0x12, 0xd1, 0x66, 0xc6, 0x37, 0xc8, 0x3a, 0x9f, 0x34, 0x59, 0x93, 0x6a, 0x2b, 0x90, 0xb7, 0xf3, 0xf3, 0xda, 0x83, 0xf6, 0x4d, 0xec, 0x8e, 0x34, 0x7a, 0x3b, 0xfa, 0x57, 0xba, 0xad, 0xf9, 0xac, 0xea, 0x18, 0xc0, 0x71, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4427 = { .name = "ecdsa_secp224r1_sha512_4427", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4427_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4427_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4427_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4428 for ECDSA, tcId is 87 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4428_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4428_msg[] = { 0x32, 0x32, 0x38, 0x38, 0x37, 0x33, 0x32, 0x31, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4428_sig[] = { 0x18, 0x95, 0xe6, 0x55, 0x93, 0xd7, 0x1e, 0x56, 0x35, 0xcc, 0xe0, 0x22, 0xdd, 0xa1, 0x9b, 0xd1, 0x55, 0xbb, 0x9a, 0x7f, 0x2e, 0x30, 0x7e, 0x5c, 0xe9, 0x12, 0x7a, 0xde, 0x12, 0x1b, 0x48, 0x7c, 0x32, 0x0c, 0x54, 0x4d, 0xcd, 0xd4, 0x71, 0xd4, 0x6f, 0xcd, 0xe2, 0xce, 0x5d, 0xc9, 0xd1, 0x7f, 0xda, 0x70, 0x54, 0x4c, 0x4e, 0xab, 0x50, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4428 = { .name = "ecdsa_secp224r1_sha512_4428", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4428_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4428_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4428_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4429 for ECDSA, tcId is 88 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4429_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4429_msg[] = { 0x32, 0x32, 0x33, 0x30, 0x38, 0x38, 0x37, 0x33, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4429_sig[] = { 0xb5, 0xf4, 0xc8, 0x5b, 0x13, 0xb5, 0x1a, 0x5d, 0xa8, 0x1a, 0x23, 0x6f, 0x11, 0x05, 0x93, 0x7f, 0x3d, 0x98, 0x85, 0x6d, 0x2a, 0xeb, 0x57, 0x10, 0x1b, 0x6b, 0x49, 0x9c, 0x3b, 0xe7, 0x4a, 0xe7, 0x70, 0xfa, 0x64, 0x67, 0xf7, 0x6a, 0x74, 0x2e, 0xb9, 0xe5, 0x04, 0xa8, 0x15, 0xa4, 0xa6, 0x0e, 0x74, 0xb3, 0x8b, 0xca, 0xa8, 0x9f, 0x9b, 0x06, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4429 = { .name = "ecdsa_secp224r1_sha512_4429", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4429_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4429_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4429_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4430 for ECDSA, tcId is 89 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4430_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4430_msg[] = { 0x31, 0x32, 0x39, 0x30, 0x35, 0x36, 0x39, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4430_sig[] = { 0x07, 0xa5, 0x71, 0x97, 0x66, 0x7a, 0x0c, 0x40, 0x42, 0x3d, 0x48, 0x11, 0xff, 0x96, 0x38, 0x4c, 0x93, 0x30, 0x46, 0x7e, 0x8a, 0x28, 0xea, 0xa4, 0xc0, 0xd5, 0x19, 0xf4, 0x01, 0x10, 0x62, 0xc8, 0x69, 0x44, 0x94, 0xba, 0xae, 0xd2, 0x4f, 0xf6, 0x10, 0xe1, 0xe4, 0x22, 0x7e, 0xfb, 0x59, 0xa1, 0x63, 0xc3, 0x3f, 0xaf, 0xd4, 0x01, 0x00, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4430 = { .name = "ecdsa_secp224r1_sha512_4430", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4430_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4430_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4430_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4431 for ECDSA, tcId is 90 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4431_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4431_msg[] = { 0x32, 0x37, 0x34, 0x38, 0x36, 0x35, 0x36, 0x34, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4431_sig[] = { 0x00, 0x7f, 0x71, 0x86, 0x15, 0xba, 0x1d, 0x0a, 0x9d, 0x27, 0xa8, 0xc5, 0xa6, 0x78, 0xa6, 0x22, 0x5f, 0xfe, 0x12, 0x33, 0xed, 0x8b, 0x41, 0x7c, 0x93, 0x43, 0xb3, 0x10, 0xcf, 0x6a, 0x87, 0xe4, 0x49, 0x67, 0x25, 0xc6, 0xa2, 0x61, 0x2f, 0x40, 0x34, 0xdd, 0xf4, 0xb3, 0x1c, 0x74, 0x35, 0xe2, 0xfc, 0x3a, 0x16, 0x3e, 0x92, 0xd4, 0x63, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4431 = { .name = "ecdsa_secp224r1_sha512_4431", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4431_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4431_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4431_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4432 for ECDSA, tcId is 91 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4432_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4432_msg[] = { 0x37, 0x35, 0x38, 0x33, 0x35, 0x30, 0x32, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4432_sig[] = { 0xba, 0x8f, 0x95, 0xa4, 0x36, 0x3c, 0x49, 0x3a, 0x9f, 0x78, 0xbb, 0x61, 0xdb, 0xef, 0xaa, 0x95, 0x87, 0xd0, 0x28, 0xbb, 0x83, 0x44, 0x42, 0x0d, 0xe2, 0xb0, 0xcf, 0x21, 0xb3, 0x79, 0x8c, 0x2d, 0x6e, 0x27, 0xa2, 0x59, 0x1c, 0x2e, 0xdc, 0x18, 0x32, 0x0b, 0x78, 0xbf, 0x11, 0xdf, 0x19, 0x4b, 0x11, 0xb3, 0xfb, 0x49, 0x8c, 0x59, 0x52, 0x32, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4432 = { .name = "ecdsa_secp224r1_sha512_4432", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4432_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4432_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4432_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4433 for ECDSA, tcId is 92 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4433_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4433_msg[] = { 0x32, 0x33, 0x32, 0x37, 0x37, 0x35, 0x34, 0x32, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4433_sig[] = { 0x59, 0x6b, 0x74, 0x07, 0x78, 0x01, 0xdb, 0x2e, 0x88, 0x9d, 0x3b, 0x2a, 0xaa, 0x39, 0x90, 0xfe, 0x18, 0x0a, 0xbc, 0x15, 0x2d, 0x48, 0x52, 0x83, 0x85, 0xca, 0x95, 0x5d, 0x38, 0xbf, 0xfd, 0x41, 0x6f, 0x77, 0x98, 0x43, 0xfa, 0xd3, 0x89, 0x75, 0x00, 0x03, 0xeb, 0x07, 0x08, 0x11, 0x2a, 0x48, 0x34, 0xc5, 0x54, 0xf4, 0x76, 0xa3, 0xe0, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4433 = { .name = "ecdsa_secp224r1_sha512_4433", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4433_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4433_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4433_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4434 for ECDSA, tcId is 93 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4434_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4434_msg[] = { 0x37, 0x37, 0x35, 0x35, 0x30, 0x38, 0x35, 0x38, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4434_sig[] = { 0x85, 0x47, 0xf6, 0x29, 0x67, 0x52, 0x3a, 0x06, 0xc9, 0x69, 0x0e, 0x5f, 0xf6, 0x6c, 0x3f, 0x22, 0x54, 0xcd, 0xa2, 0x8f, 0x09, 0xff, 0xcc, 0xc2, 0x22, 0x43, 0x3d, 0x39, 0x3d, 0x9e, 0xbf, 0x66, 0x4e, 0xe5, 0x51, 0xbb, 0x7b, 0x33, 0x15, 0x7d, 0x6c, 0x6c, 0x5f, 0xd4, 0x56, 0xbd, 0xa3, 0xd4, 0xae, 0x46, 0x02, 0x15, 0xec, 0x1a, 0x5f, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4434 = { .name = "ecdsa_secp224r1_sha512_4434", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4434_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4434_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4434_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4435 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4435_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4435_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x36, 0x34, 0x38, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4435_sig[] = { 0x90, 0xee, 0x3f, 0xab, 0x9c, 0x6c, 0xe3, 0x73, 0xa1, 0xb3, 0x5f, 0xc1, 0x35, 0xfe, 0x87, 0x82, 0x80, 0xee, 0x25, 0xe5, 0x8a, 0x4b, 0xd7, 0x52, 0x9e, 0x91, 0xb4, 0xf0, 0x64, 0x51, 0xe7, 0x52, 0x65, 0x05, 0xb4, 0x4e, 0x88, 0x47, 0x2b, 0x46, 0xed, 0xa3, 0xfd, 0x26, 0x79, 0x82, 0x4d, 0xcd, 0xfc, 0x44, 0x5e, 0x67, 0xf3, 0x5e, 0xa3, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4435 = { .name = "ecdsa_secp224r1_sha512_4435", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4435_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4435_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4435_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4436 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4436_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4436_msg[] = { 0x32, 0x33, 0x39, 0x36, 0x37, 0x37, 0x37, 0x33, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4436_sig[] = { 0x0a, 0x53, 0x05, 0x30, 0xb6, 0xa9, 0x23, 0x8d, 0x2d, 0x1a, 0x3c, 0xf4, 0x68, 0x98, 0x6c, 0x87, 0xf3, 0xb2, 0x08, 0xf6, 0x1e, 0xa0, 0x48, 0x6d, 0x53, 0x14, 0x0c, 0x17, 0x5f, 0x02, 0x7a, 0x73, 0xf3, 0x1a, 0x5c, 0xc2, 0xbe, 0xe8, 0x1f, 0xf0, 0x01, 0x94, 0x77, 0xc5, 0x42, 0xfd, 0x78, 0x2e, 0xcd, 0xe0, 0xe5, 0x51, 0xfc, 0xd3, 0x7e, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4436 = { .name = "ecdsa_secp224r1_sha512_4436", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4436_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4436_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4436_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4437 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4437_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4437_msg[] = { 0x35, 0x39, 0x39, 0x38, 0x31, 0x30, 0x35, 0x38, 0x30, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4437_sig[] = { 0xbe, 0xab, 0x4a, 0xbd, 0x23, 0xdf, 0x5e, 0x2a, 0xcf, 0xff, 0x07, 0xc8, 0x2e, 0x24, 0x5d, 0xfa, 0x7d, 0x58, 0x7d, 0x02, 0x38, 0xc2, 0xc9, 0xab, 0x9c, 0x88, 0xa9, 0x6a, 0x98, 0xc6, 0x50, 0x76, 0x35, 0x53, 0x68, 0x40, 0xed, 0xf6, 0x04, 0xf9, 0xba, 0xae, 0x64, 0x08, 0xce, 0x4d, 0x3f, 0xbe, 0xe6, 0x94, 0xdb, 0x3a, 0xbd, 0x82, 0x50, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4437 = { .name = "ecdsa_secp224r1_sha512_4437", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4437_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4437_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4437_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4438 for ECDSA, tcId is 97 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4438_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4438_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x37, 0x38, 0x32, 0x37, 0x30, 0x35, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4438_sig[] = { 0x3e, 0xc8, 0xc3, 0x63, 0x35, 0xcb, 0x98, 0xfa, 0x07, 0xb9, 0x83, 0xc3, 0x5b, 0x7f, 0xc2, 0x56, 0xf4, 0x4a, 0x5a, 0xa1, 0x92, 0xd6, 0x08, 0x75, 0x95, 0x14, 0x5a, 0x15, 0xc3, 0x2b, 0x7a, 0x47, 0xac, 0x62, 0x71, 0xf4, 0x59, 0x35, 0x62, 0xbb, 0xbf, 0x91, 0xf9, 0xe0, 0x73, 0x95, 0xa5, 0xe4, 0xd4, 0x69, 0x70, 0x49, 0x5c, 0xf2, 0x9f, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4438 = { .name = "ecdsa_secp224r1_sha512_4438", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4438_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4438_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4438_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4439 for ECDSA, tcId is 98 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4439_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4439_msg[] = { 0x32, 0x30, 0x36, 0x32, 0x31, 0x34, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4439_sig[] = { 0xbd, 0x63, 0x5a, 0x74, 0x1f, 0x1f, 0x2a, 0x1d, 0x9a, 0xc1, 0x69, 0x8b, 0xaf, 0x5c, 0xfc, 0x49, 0x1d, 0x5e, 0x3f, 0x8e, 0x15, 0xf1, 0xca, 0xcb, 0xe4, 0xff, 0xe4, 0xdc, 0x4b, 0xb6, 0x06, 0xcf, 0x7c, 0xc1, 0x1d, 0x0d, 0x7d, 0x96, 0xb8, 0x39, 0x66, 0xf4, 0x22, 0x76, 0x09, 0x5c, 0xcc, 0x44, 0x58, 0x82, 0xed, 0x5a, 0xfd, 0xda, 0xbf, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4439 = { .name = "ecdsa_secp224r1_sha512_4439", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4439_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4439_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4439_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4440 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4440_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4440_msg[] = { 0x36, 0x38, 0x34, 0x32, 0x34, 0x39, 0x36, 0x30, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4440_sig[] = { 0x81, 0x2c, 0x08, 0x62, 0x2c, 0x0a, 0x09, 0xd9, 0x49, 0xb7, 0x62, 0x85, 0x85, 0xc4, 0xf4, 0xf2, 0xdb, 0x4c, 0x55, 0x91, 0xb5, 0xda, 0x14, 0x8f, 0xf4, 0x6d, 0x5c, 0xd4, 0x21, 0x04, 0xf9, 0xbc, 0x9d, 0x00, 0x79, 0xac, 0xb3, 0x07, 0x7d, 0x2d, 0xb5, 0x8f, 0x38, 0x81, 0x19, 0x50, 0x0c, 0x53, 0x22, 0xcb, 0x9b, 0x53, 0x89, 0xb5, 0xc5, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4440 = { .name = "ecdsa_secp224r1_sha512_4440", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4440_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4440_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4440_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4441 for ECDSA, tcId is 100 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4441_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4441_msg[] = { 0x33, 0x32, 0x36, 0x39, 0x38, 0x39, 0x37, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4441_sig[] = { 0xfa, 0x4e, 0x1c, 0x8b, 0x00, 0x06, 0xf2, 0x69, 0xc8, 0x55, 0xeb, 0x49, 0x5f, 0xa3, 0xa1, 0x13, 0xf6, 0x43, 0xfa, 0x8b, 0x1f, 0xef, 0x2b, 0x08, 0xab, 0x14, 0x59, 0x94, 0xfe, 0x85, 0xb8, 0xb5, 0x22, 0xc7, 0xf9, 0xe8, 0x94, 0x3e, 0x0f, 0x62, 0x64, 0x33, 0x95, 0xbd, 0x1f, 0xcd, 0xab, 0xc8, 0x92, 0xc3, 0x15, 0xd1, 0x08, 0xb7, 0x5f, 0x65, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4441 = { .name = "ecdsa_secp224r1_sha512_4441", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4441_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4441_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4441_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4442 for ECDSA, tcId is 101 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4442_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4442_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x33, 0x32, 0x34, 0x36, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4442_sig[] = { 0x8c, 0x1d, 0x9b, 0x79, 0x11, 0xba, 0xcb, 0x6b, 0x4a, 0x09, 0x58, 0x26, 0x48, 0xb9, 0x92, 0xd4, 0x6a, 0x18, 0x32, 0xeb, 0x00, 0x61, 0x78, 0xc0, 0xc7, 0x7f, 0xcb, 0x10, 0xbe, 0xcb, 0xe1, 0x2b, 0x99, 0xf2, 0x43, 0x76, 0x6d, 0xa5, 0xbd, 0xad, 0x07, 0x46, 0x1b, 0x92, 0x26, 0xa8, 0x29, 0x86, 0x72, 0xb4, 0xf1, 0xad, 0xb3, 0x53, 0x57, 0xef, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4442 = { .name = "ecdsa_secp224r1_sha512_4442", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4442_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4442_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4442_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4443 for ECDSA, tcId is 102 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4443_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4443_msg[] = { 0x34, 0x31, 0x31, 0x38, 0x38, 0x38, 0x37, 0x35, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4443_sig[] = { 0x78, 0x85, 0x0a, 0x40, 0x53, 0x0a, 0xa2, 0x58, 0xe4, 0x78, 0xe7, 0xc5, 0x47, 0xd3, 0xa5, 0xe4, 0x94, 0x4d, 0x35, 0x24, 0xf1, 0x67, 0x64, 0x43, 0xe4, 0xdf, 0xb3, 0x7d, 0x68, 0x70, 0x58, 0xe1, 0xca, 0x47, 0x8f, 0x52, 0xa3, 0x0c, 0x9a, 0x3f, 0x8e, 0x2e, 0xea, 0x9d, 0x8c, 0x40, 0x59, 0x9c, 0xd4, 0x7e, 0xf6, 0x6b, 0x94, 0x30, 0xd1, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4443 = { .name = "ecdsa_secp224r1_sha512_4443", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4443_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4443_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4443_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4444 for ECDSA, tcId is 103 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4444_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4444_msg[] = { 0x39, 0x38, 0x38, 0x36, 0x30, 0x36, 0x35, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4444_sig[] = { 0x06, 0x6e, 0x72, 0x68, 0xa6, 0xab, 0xef, 0xe1, 0xb4, 0xb9, 0x16, 0xca, 0x51, 0xc3, 0xe9, 0x58, 0xe4, 0x0d, 0xc7, 0x8c, 0x36, 0x61, 0x31, 0x3e, 0x0e, 0xd2, 0xe7, 0x7d, 0x64, 0x04, 0xd8, 0xa3, 0x32, 0xa8, 0x37, 0xf2, 0xab, 0x6b, 0xd1, 0x3e, 0x3e, 0xe4, 0xaa, 0xd1, 0xe9, 0x30, 0x7d, 0x44, 0x9e, 0x7f, 0x9b, 0x7d, 0x63, 0x32, 0x03, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4444 = { .name = "ecdsa_secp224r1_sha512_4444", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4444_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4444_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4444_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4445 for ECDSA, tcId is 104 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4445_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4445_msg[] = { 0x32, 0x34, 0x37, 0x39, 0x31, 0x31, 0x35, 0x38, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4445_sig[] = { 0x4e, 0xca, 0x73, 0x70, 0x9a, 0x67, 0xc4, 0x16, 0x03, 0xca, 0x5a, 0xf4, 0x94, 0xc8, 0x13, 0x24, 0x83, 0xff, 0xc2, 0xe0, 0xbf, 0x17, 0x1b, 0x52, 0xde, 0x5a, 0x5e, 0x81, 0x2c, 0x79, 0x13, 0x7c, 0xd2, 0xad, 0xd3, 0xce, 0x3a, 0x76, 0x79, 0x22, 0x70, 0xe3, 0x47, 0x22, 0x1a, 0x3a, 0xd7, 0x86, 0xea, 0xfc, 0x26, 0x82, 0xb3, 0x9b, 0xcf, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4445 = { .name = "ecdsa_secp224r1_sha512_4445", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4445_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4445_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4445_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4446 for ECDSA, tcId is 105 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4446_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4446_msg[] = { 0x35, 0x30, 0x37, 0x36, 0x38, 0x38, 0x37, 0x33, 0x36, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4446_sig[] = { 0x01, 0x78, 0x51, 0x2f, 0x88, 0x44, 0x98, 0x42, 0x22, 0x39, 0x3a, 0x63, 0x26, 0x3e, 0x0a, 0x00, 0x96, 0x01, 0x86, 0x9e, 0x63, 0x2f, 0x07, 0xeb, 0x74, 0x70, 0xaa, 0x05, 0xe3, 0x26, 0x57, 0xcd, 0xed, 0x11, 0x22, 0xce, 0xe0, 0xa4, 0xf6, 0x6f, 0xf5, 0x0a, 0x32, 0xda, 0x1f, 0x05, 0xde, 0x4c, 0x5e, 0x21, 0x7a, 0xcd, 0xf5, 0xeb, 0x6f, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4446 = { .name = "ecdsa_secp224r1_sha512_4446", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4446_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4446_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4446_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4447 for ECDSA, tcId is 106 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4447_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4447_msg[] = { 0x39, 0x38, 0x38, 0x35, 0x30, 0x36, 0x39, 0x36, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4447_sig[] = { 0xe2, 0xc7, 0xbf, 0x12, 0x22, 0xca, 0x23, 0xa5, 0x64, 0x92, 0x87, 0x3c, 0x2d, 0x3f, 0xa6, 0xc7, 0x03, 0x0c, 0xc1, 0x66, 0xd6, 0x93, 0x14, 0x2d, 0xce, 0xa2, 0x72, 0xb6, 0x71, 0x5a, 0x4c, 0x82, 0xfd, 0xa4, 0x40, 0x42, 0x17, 0xde, 0xa6, 0xc0, 0xbb, 0xf3, 0xac, 0x24, 0xf8, 0xfa, 0xa2, 0xb4, 0x35, 0xfb, 0xc6, 0xd5, 0x1a, 0x32, 0xc4, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4447 = { .name = "ecdsa_secp224r1_sha512_4447", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4447_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4447_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4447_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4448 for ECDSA, tcId is 107 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4448_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4448_msg[] = { 0x32, 0x37, 0x32, 0x31, 0x33, 0x30, 0x36, 0x31, 0x33, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4448_sig[] = { 0x49, 0x88, 0x6a, 0x8c, 0x26, 0xc9, 0x1d, 0x64, 0x9c, 0xbf, 0xec, 0xda, 0x6c, 0xe8, 0xd1, 0x44, 0x1e, 0x76, 0x4c, 0x66, 0xf5, 0xd8, 0x1d, 0xce, 0xed, 0xb6, 0xc5, 0xba, 0x43, 0x70, 0xd8, 0xbc, 0xd4, 0xf0, 0x52, 0xfa, 0xc9, 0x49, 0x1d, 0x62, 0x85, 0x0b, 0x6a, 0x6a, 0x85, 0xd5, 0xac, 0xc4, 0x4d, 0x92, 0x48, 0xc3, 0xdf, 0xf3, 0x0b, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4448 = { .name = "ecdsa_secp224r1_sha512_4448", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4448_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4448_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4448_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4449 for ECDSA, tcId is 108 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4449_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4449_msg[] = { 0x33, 0x32, 0x30, 0x34, 0x31, 0x30, 0x31, 0x36, 0x35, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4449_sig[] = { 0xe1, 0xae, 0x22, 0x5e, 0x1a, 0xec, 0xa4, 0x07, 0x47, 0xff, 0x3e, 0x7a, 0xd1, 0xf7, 0x5e, 0xb9, 0xbc, 0x90, 0xd6, 0x37, 0x16, 0x0a, 0x7f, 0x58, 0xce, 0x12, 0xe5, 0x91, 0xb9, 0x7c, 0xbe, 0xa3, 0xa9, 0x32, 0x31, 0x10, 0x31, 0x57, 0x60, 0xb7, 0xe2, 0xed, 0xe4, 0x96, 0x51, 0x4b, 0x30, 0xf0, 0xee, 0xc5, 0x21, 0xff, 0xeb, 0x07, 0xa6, 0x34, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4449 = { .name = "ecdsa_secp224r1_sha512_4449", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4449_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4449_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4449_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4450 for ECDSA, tcId is 109 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4450_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4450_msg[] = { 0x33, 0x31, 0x35, 0x30, 0x36, 0x38, 0x30, 0x39, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4450_sig[] = { 0x8a, 0x93, 0xb8, 0x7b, 0x46, 0x51, 0x25, 0x44, 0xfb, 0x9a, 0x7a, 0xf5, 0xc4, 0x1e, 0x3a, 0xa7, 0x2e, 0x40, 0x23, 0x5e, 0xf8, 0x7c, 0xcb, 0x71, 0x08, 0xda, 0xae, 0x48, 0x15, 0x7d, 0xb6, 0x17, 0xac, 0x69, 0x7d, 0xf4, 0x07, 0xaf, 0x7a, 0x11, 0x62, 0x6c, 0x52, 0xa1, 0xaf, 0x7e, 0xf1, 0x89, 0x51, 0x4d, 0xa3, 0x99, 0x18, 0xc4, 0x30, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4450 = { .name = "ecdsa_secp224r1_sha512_4450", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4450_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4450_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4450_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4451 for ECDSA, tcId is 110 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4451_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4451_msg[] = { 0x31, 0x37, 0x32, 0x37, 0x34, 0x36, 0x30, 0x31, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4451_sig[] = { 0xeb, 0xde, 0xbe, 0x63, 0x88, 0xb9, 0xf4, 0x60, 0xfc, 0xe6, 0xd8, 0x4f, 0xaa, 0x67, 0xde, 0xd1, 0xe8, 0x64, 0xef, 0x09, 0xe7, 0x7e, 0xa3, 0xce, 0x58, 0xa5, 0xde, 0xff, 0xbe, 0x50, 0x52, 0x03, 0x3e, 0xb4, 0x03, 0x80, 0xc2, 0xb1, 0x32, 0x5f, 0xe9, 0x7d, 0xcc, 0x55, 0x84, 0x1e, 0x14, 0x7a, 0x89, 0xf0, 0x2a, 0x29, 0x6b, 0x45, 0x05, 0xef, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4451 = { .name = "ecdsa_secp224r1_sha512_4451", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4451_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4451_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4451_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4452 for ECDSA, tcId is 111 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4452_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4452_msg[] = { 0x31, 0x34, 0x35, 0x37, 0x31, 0x34, 0x36, 0x31, 0x32, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4452_sig[] = { 0xe8, 0x5d, 0x06, 0x67, 0x97, 0x2d, 0x00, 0x3c, 0x82, 0xaf, 0xb9, 0xe1, 0x8b, 0x70, 0x23, 0x57, 0x11, 0x9b, 0x4f, 0x38, 0x40, 0x1a, 0x5e, 0xbd, 0xfc, 0xbe, 0xa8, 0x8c, 0xeb, 0x7b, 0x3e, 0x52, 0x68, 0xa4, 0xce, 0x62, 0x80, 0xf7, 0x2d, 0x7e, 0x9a, 0x3d, 0x74, 0xe5, 0xca, 0xc5, 0x0b, 0x1c, 0x3a, 0x52, 0x96, 0xcd, 0xb5, 0xa4, 0x9d, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4452 = { .name = "ecdsa_secp224r1_sha512_4452", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4452_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4452_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4452_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4453 for ECDSA, tcId is 112 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4453_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4453_msg[] = { 0x34, 0x31, 0x37, 0x39, 0x35, 0x31, 0x36, 0x30, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4453_sig[] = { 0x3d, 0x24, 0x35, 0x81, 0xc0, 0x87, 0x4f, 0xd4, 0xeb, 0x4d, 0x80, 0xf8, 0x96, 0xc5, 0x06, 0x74, 0x29, 0xad, 0x45, 0x53, 0x14, 0x88, 0x19, 0x51, 0xab, 0x5e, 0xc6, 0xe3, 0x0e, 0xc4, 0x7a, 0xba, 0x08, 0xcc, 0xba, 0x88, 0xc1, 0xa6, 0xdd, 0xc2, 0x89, 0xf5, 0x95, 0xbd, 0xa0, 0x8d, 0xc2, 0xdd, 0x34, 0xd1, 0x2d, 0xce, 0xfb, 0x68, 0x09, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4453 = { .name = "ecdsa_secp224r1_sha512_4453", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4453_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4453_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4453_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4454 for ECDSA, tcId is 113 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4454_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4454_msg[] = { 0x35, 0x38, 0x39, 0x32, 0x37, 0x31, 0x33, 0x30, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4454_sig[] = { 0x75, 0xc9, 0x66, 0xbb, 0xdc, 0xef, 0x91, 0x57, 0xd4, 0x7a, 0x13, 0x42, 0x31, 0x22, 0x9f, 0x9f, 0x5e, 0xe8, 0xce, 0x45, 0x87, 0x75, 0xfc, 0x74, 0x7d, 0x45, 0x09, 0xbd, 0xe3, 0x44, 0xfa, 0x71, 0x6e, 0x20, 0x88, 0xd9, 0x5a, 0x55, 0xd0, 0x2a, 0x97, 0x8a, 0x41, 0x6d, 0xa1, 0x0f, 0x22, 0xa5, 0xcc, 0xcf, 0x35, 0xa2, 0x86, 0x32, 0x27, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4454 = { .name = "ecdsa_secp224r1_sha512_4454", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4454_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4454_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4454_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 113 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4455 for ECDSA, tcId is 114 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4455_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4455_msg[] = { 0x33, 0x38, 0x39, 0x36, 0x31, 0x38, 0x32, 0x32, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4455_sig[] = { 0xcf, 0xdf, 0x59, 0x9e, 0x98, 0x6d, 0x77, 0x0b, 0x73, 0x78, 0x4d, 0x97, 0x14, 0x9f, 0x99, 0x45, 0xfd, 0x16, 0xd2, 0x2c, 0x30, 0x2b, 0xb7, 0x96, 0x15, 0x6e, 0x7f, 0xb4, 0xc6, 0x40, 0x97, 0x85, 0x04, 0x7b, 0x00, 0x83, 0xf0, 0x08, 0x77, 0x1b, 0x40, 0xdb, 0x85, 0x02, 0x58, 0x32, 0x08, 0xb6, 0x1c, 0x89, 0x84, 0x67, 0x1a, 0xcb, 0x09, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4455 = { .name = "ecdsa_secp224r1_sha512_4455", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4455_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4455_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4455_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 114 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4456 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4456_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4456_msg[] = { 0x38, 0x32, 0x38, 0x33, 0x33, 0x34, 0x36, 0x37, 0x33, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4456_sig[] = { 0xc5, 0x3c, 0x4a, 0xee, 0xc8, 0xf2, 0xe7, 0xa5, 0xcc, 0x0e, 0x88, 0x5a, 0x60, 0x31, 0xaa, 0x1a, 0x6c, 0x1b, 0x7b, 0x7f, 0xec, 0x83, 0xb5, 0x08, 0x4c, 0xbe, 0x29, 0x1f, 0xb0, 0xe6, 0xd1, 0x0a, 0x8f, 0xd8, 0x6f, 0x95, 0x8c, 0x3b, 0x0f, 0x46, 0x62, 0xed, 0x8c, 0xa0, 0xd6, 0xea, 0xdb, 0xc8, 0x92, 0xaa, 0xc4, 0x20, 0x0f, 0xcf, 0x83, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4456 = { .name = "ecdsa_secp224r1_sha512_4456", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4456_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4456_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4456_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 115 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4457 for ECDSA, tcId is 116 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4457_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4457_msg[] = { 0x33, 0x33, 0x36, 0x36, 0x39, 0x37, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4457_sig[] = { 0x23, 0x86, 0x55, 0x0d, 0x6e, 0x75, 0x35, 0x0b, 0xcc, 0x32, 0x50, 0x7b, 0xfc, 0x9b, 0xeb, 0x9c, 0x26, 0xd7, 0x2f, 0xf8, 0x2f, 0x67, 0x1c, 0x1f, 0x52, 0x82, 0xe9, 0x8b, 0xa5, 0x5b, 0x8d, 0xe8, 0x08, 0xc4, 0x35, 0x9f, 0xb5, 0x29, 0xb8, 0x0a, 0x80, 0xd9, 0xfc, 0x6e, 0xdd, 0xb5, 0xce, 0x08, 0x08, 0x2c, 0x3b, 0x67, 0x7c, 0x68, 0x99, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4457 = { .name = "ecdsa_secp224r1_sha512_4457", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4457_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4457_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4457_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 116 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4458 for ECDSA, tcId is 117 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4458_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4458_msg[] = { 0x32, 0x31, 0x39, 0x39, 0x31, 0x35, 0x33, 0x32, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4458_sig[] = { 0x1f, 0xbd, 0x19, 0x2d, 0x95, 0x5c, 0xe0, 0x2b, 0x64, 0xa3, 0xbe, 0x5b, 0xb2, 0x1b, 0xef, 0x22, 0xb5, 0x3a, 0x6c, 0x6f, 0x95, 0x76, 0xd8, 0xf8, 0x89, 0xb0, 0x9e, 0x4e, 0xf5, 0xa9, 0xb6, 0x73, 0xa4, 0xee, 0x5a, 0xab, 0xf1, 0xca, 0x8e, 0x82, 0x89, 0xf2, 0x5b, 0x62, 0xa3, 0xe0, 0x8b, 0x95, 0x6f, 0x74, 0x18, 0xc0, 0x3e, 0x2d, 0x30, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4458 = { .name = "ecdsa_secp224r1_sha512_4458", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4458_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4458_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4458_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 117 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4459 for ECDSA, tcId is 118 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4459_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4459_msg[] = { 0x35, 0x36, 0x30, 0x30, 0x33, 0x31, 0x36, 0x38, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4459_sig[] = { 0xb8, 0x0f, 0xfb, 0xa4, 0x51, 0xdb, 0x9f, 0xc2, 0x19, 0x4e, 0x45, 0x0b, 0xdd, 0x43, 0xbc, 0x0f, 0x53, 0xa7, 0xd0, 0xf4, 0xa7, 0x89, 0x00, 0xc0, 0x9f, 0xb8, 0xd9, 0xbc, 0x01, 0x24, 0xee, 0xea, 0xb9, 0x03, 0x5b, 0x6c, 0x84, 0x59, 0x59, 0xe7, 0x0b, 0x04, 0xd1, 0xe1, 0x87, 0xd5, 0x54, 0x80, 0x7d, 0x67, 0x51, 0xaf, 0xab, 0xcc, 0x18, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4459 = { .name = "ecdsa_secp224r1_sha512_4459", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4459_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4459_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4459_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 118 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4460 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4460_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4460_msg[] = { 0x38, 0x36, 0x39, 0x36, 0x35, 0x31, 0x36, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4460_sig[] = { 0x18, 0x7f, 0xb0, 0x26, 0xad, 0xe3, 0xad, 0x16, 0xdd, 0x4b, 0x28, 0x13, 0xe8, 0xeb, 0xda, 0x43, 0x3c, 0xb6, 0xcc, 0x3a, 0xf1, 0x61, 0x5b, 0xed, 0xf4, 0x86, 0xa9, 0xe2, 0x6f, 0xbe, 0xe5, 0x3f, 0xa8, 0x84, 0xd2, 0x96, 0xf3, 0x4f, 0x77, 0x19, 0xf7, 0x49, 0x19, 0x43, 0x4d, 0x1b, 0x70, 0x90, 0xc4, 0x85, 0xee, 0xed, 0x2f, 0xb8, 0xfd, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4460 = { .name = "ecdsa_secp224r1_sha512_4460", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4460_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4460_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4460_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 119 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4461 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4461_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4461_msg[] = { 0x36, 0x35, 0x38, 0x33, 0x39, 0x32, 0x36, 0x33, 0x37, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4461_sig[] = { 0xe5, 0x98, 0xa1, 0x6f, 0xe1, 0x2d, 0xa7, 0x9e, 0x98, 0x14, 0xf6, 0x98, 0x5c, 0x9a, 0x93, 0x34, 0x01, 0x0f, 0x28, 0x7d, 0xc9, 0xe3, 0x8d, 0xe8, 0x57, 0xca, 0x5f, 0xc0, 0x19, 0xe0, 0xed, 0x54, 0xf0, 0xe0, 0x8a, 0xd0, 0x91, 0xa1, 0x63, 0xb4, 0xc7, 0xb8, 0x6d, 0x06, 0x34, 0xda, 0x2c, 0x86, 0xa7, 0xa8, 0x99, 0x1f, 0x5d, 0x87, 0x06, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4461 = { .name = "ecdsa_secp224r1_sha512_4461", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4461_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4461_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4461_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 120 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4462 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4462_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4462_msg[] = { 0x31, 0x33, 0x32, 0x30, 0x35, 0x30, 0x31, 0x35, 0x37, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4462_sig[] = { 0xb3, 0x1a, 0x10, 0x48, 0x0e, 0x39, 0x7c, 0x8a, 0xa4, 0x6f, 0x52, 0xa0, 0xf2, 0xfb, 0x5c, 0x22, 0xeb, 0xc0, 0x53, 0x4f, 0xba, 0x15, 0x67, 0x18, 0xb5, 0x0c, 0xf6, 0xea, 0x60, 0x20, 0x04, 0xdf, 0x4b, 0x47, 0xa2, 0x06, 0x51, 0x30, 0xca, 0x3b, 0x05, 0xf1, 0xeb, 0x02, 0xd0, 0xb3, 0x7b, 0x79, 0xb0, 0x4b, 0x1e, 0xb7, 0x99, 0x40, 0x83, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4462 = { .name = "ecdsa_secp224r1_sha512_4462", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4462_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4462_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4462_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 121 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4463 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4463_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4463_msg[] = { 0x35, 0x30, 0x38, 0x35, 0x33, 0x33, 0x30, 0x37, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4463_sig[] = { 0xbc, 0x47, 0xe2, 0x42, 0xd1, 0x9d, 0xcc, 0x63, 0x21, 0x91, 0x39, 0x80, 0xd7, 0x39, 0x23, 0xe4, 0x30, 0xbc, 0x66, 0x23, 0xd2, 0x19, 0x52, 0x9d, 0x58, 0x66, 0x19, 0xb6, 0x81, 0x39, 0x7d, 0xd2, 0xf5, 0x28, 0x11, 0xb5, 0x34, 0xed, 0x75, 0x4a, 0x93, 0x7d, 0x90, 0x4f, 0x04, 0xa7, 0xde, 0x27, 0x8f, 0xa3, 0xbc, 0x89, 0x26, 0xde, 0x69, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4463 = { .name = "ecdsa_secp224r1_sha512_4463", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4463_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4463_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4463_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 122 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4464 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4464_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4464_msg[] = { 0x37, 0x38, 0x36, 0x36, 0x38, 0x31, 0x33, 0x31, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4464_sig[] = { 0x5b, 0xe0, 0xe0, 0xdf, 0xb2, 0x6b, 0x1c, 0xaa, 0x88, 0xf8, 0x66, 0x50, 0x4a, 0xa8, 0xe7, 0x6f, 0x03, 0x5a, 0x82, 0xab, 0xe0, 0x00, 0x28, 0xd9, 0x62, 0xbc, 0xfa, 0xfa, 0x3c, 0x3c, 0x1d, 0xf0, 0x60, 0x26, 0x12, 0x34, 0x71, 0xbe, 0xd3, 0x24, 0xca, 0x79, 0xc5, 0x1b, 0x28, 0xb3, 0xd1, 0x0b, 0x1c, 0xe8, 0x77, 0xce, 0xf2, 0x1b, 0x85, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4464 = { .name = "ecdsa_secp224r1_sha512_4464", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4464_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4464_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4464_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 123 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4465 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4465_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4465_msg[] = { 0x32, 0x30, 0x38, 0x32, 0x35, 0x33, 0x39, 0x34, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4465_sig[] = { 0xfe, 0x79, 0xd0, 0xcf, 0xe4, 0x55, 0x72, 0x47, 0x92, 0xcb, 0x5a, 0xb0, 0x58, 0x0a, 0xd4, 0xf2, 0x91, 0x8c, 0x14, 0x03, 0xec, 0x12, 0xf0, 0xbd, 0xd2, 0xce, 0x65, 0x28, 0xf1, 0x35, 0x7c, 0xd4, 0xaf, 0xc4, 0x02, 0x99, 0x4a, 0xb8, 0x68, 0xb0, 0x16, 0x3f, 0x41, 0x70, 0x1e, 0x0f, 0x00, 0xe5, 0x61, 0xfd, 0xd9, 0x7e, 0x0d, 0xb6, 0xf7, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4465 = { .name = "ecdsa_secp224r1_sha512_4465", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4465_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4465_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4465_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 124 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4466 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4466_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4466_msg[] = { 0x31, 0x30, 0x30, 0x36, 0x35, 0x39, 0x35, 0x36, 0x36, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4466_sig[] = { 0x18, 0x58, 0xc5, 0xd8, 0x57, 0x12, 0x4c, 0xd7, 0x03, 0xe7, 0xc2, 0xf5, 0xe9, 0x9d, 0x50, 0x25, 0xd6, 0xd9, 0x79, 0x53, 0x9c, 0x6f, 0x50, 0xb1, 0xd0, 0x0f, 0xbd, 0x34, 0xd9, 0x4a, 0x5a, 0xdb, 0x6d, 0x9c, 0x50, 0x01, 0x16, 0x26, 0x20, 0x41, 0x55, 0x41, 0xd4, 0x93, 0x34, 0xfb, 0x92, 0x9b, 0xc8, 0x6a, 0x35, 0x0c, 0xa4, 0x59, 0x11, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4466 = { .name = "ecdsa_secp224r1_sha512_4466", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4466_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4466_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4466_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 125 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4467 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4467_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4467_msg[] = { 0x33, 0x30, 0x32, 0x34, 0x31, 0x38, 0x31, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4467_sig[] = { 0xe6, 0xb2, 0xec, 0x96, 0x7c, 0xfa, 0x25, 0xf5, 0x72, 0x34, 0xb9, 0xef, 0x1d, 0x87, 0xc5, 0x94, 0x55, 0x02, 0xcb, 0xbd, 0x58, 0x31, 0xc8, 0x62, 0xf0, 0x07, 0x74, 0xd1, 0xca, 0xea, 0x26, 0x36, 0x8b, 0xff, 0xc8, 0xe5, 0x62, 0xb2, 0xbd, 0x03, 0xaa, 0x6c, 0x9d, 0xc4, 0x1c, 0x52, 0x96, 0x59, 0xfe, 0xfe, 0x65, 0x97, 0xfc, 0xe9, 0xcd, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4467 = { .name = "ecdsa_secp224r1_sha512_4467", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4467_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4467_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4467_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 126 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4468 for ECDSA, tcId is 127 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4468_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4468_msg[] = { 0x37, 0x37, 0x36, 0x37, 0x38, 0x35, 0x32, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4468_sig[] = { 0xa5, 0x9b, 0x43, 0x8b, 0x24, 0x72, 0x07, 0x4a, 0x93, 0xa2, 0x89, 0xb3, 0x3f, 0x5b, 0x13, 0xe6, 0x04, 0x97, 0x7d, 0xd3, 0xab, 0x4d, 0x74, 0x4d, 0x08, 0xe1, 0x06, 0x1b, 0x69, 0x95, 0x74, 0xa1, 0x7d, 0xc8, 0xc7, 0x29, 0x8c, 0x93, 0x21, 0xca, 0x78, 0x55, 0x2e, 0x51, 0x28, 0xea, 0x80, 0x1d, 0x05, 0x6f, 0x38, 0x7b, 0xa4, 0x2f, 0x7a, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4468 = { .name = "ecdsa_secp224r1_sha512_4468", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4468_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4468_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4468_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 127 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4469 for ECDSA, tcId is 128 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4469_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4469_msg[] = { 0x35, 0x34, 0x34, 0x31, 0x39, 0x39, 0x39, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4469_sig[] = { 0x74, 0x84, 0x81, 0x70, 0x9c, 0x68, 0x82, 0xc4, 0xa1, 0x30, 0x19, 0x38, 0x34, 0xa5, 0x7f, 0x4b, 0xc7, 0x14, 0x90, 0x62, 0x11, 0xec, 0x6c, 0xc1, 0x2c, 0x40, 0x0d, 0xff, 0xee, 0xc6, 0xc9, 0xd5, 0xa0, 0x67, 0x86, 0xf8, 0x21, 0xa8, 0x11, 0x7e, 0xec, 0x3d, 0xc0, 0x25, 0xed, 0x3a, 0xc7, 0x4e, 0x39, 0xe9, 0x8a, 0x16, 0xa4, 0xaa, 0x28, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4469 = { .name = "ecdsa_secp224r1_sha512_4469", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4469_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4469_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4469_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 128 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4470 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4470_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4470_msg[] = { 0x35, 0x38, 0x34, 0x33, 0x34, 0x38, 0x30, 0x33, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4470_sig[] = { 0xbc, 0x89, 0x91, 0xb5, 0x06, 0x99, 0x74, 0x03, 0xe1, 0x23, 0x13, 0x6a, 0x9c, 0x14, 0x0a, 0x43, 0x36, 0x36, 0x47, 0x33, 0xb0, 0x81, 0x5f, 0x40, 0xd1, 0xdb, 0xd5, 0xfe, 0x81, 0x95, 0x03, 0xea, 0x3b, 0x4c, 0x07, 0xfc, 0x15, 0x7f, 0x94, 0x8f, 0x69, 0x49, 0x70, 0x5d, 0x56, 0x0a, 0x88, 0x1f, 0xc1, 0xc6, 0xaf, 0x4b, 0x73, 0x91, 0x76, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4470 = { .name = "ecdsa_secp224r1_sha512_4470", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4470_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4470_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4470_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 129 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4471 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4471_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4471_msg[] = { 0x37, 0x31, 0x38, 0x38, 0x39, 0x32, 0x36, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4471_sig[] = { 0x1c, 0xae, 0xce, 0x75, 0xc8, 0xe3, 0x1b, 0xb0, 0xc5, 0xcc, 0xeb, 0x08, 0x42, 0xf2, 0x36, 0x83, 0xb8, 0x55, 0x7a, 0x97, 0x03, 0x65, 0x74, 0xea, 0x88, 0xce, 0xea, 0xbd, 0x64, 0x5a, 0xd3, 0x27, 0x6a, 0xae, 0xe2, 0x2b, 0x69, 0x36, 0x47, 0xf0, 0x0d, 0xce, 0x5f, 0x91, 0xa0, 0x3b, 0x67, 0x8b, 0x78, 0x9b, 0x66, 0x7c, 0xd3, 0xb8, 0xe7, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4471 = { .name = "ecdsa_secp224r1_sha512_4471", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4471_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4471_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4471_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 130 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4472 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4472_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4472_msg[] = { 0x31, 0x37, 0x34, 0x33, 0x32, 0x32, 0x33, 0x34, 0x34, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4472_sig[] = { 0x3a, 0x7d, 0x58, 0x20, 0x68, 0xaa, 0xec, 0xab, 0xa9, 0x45, 0x20, 0x3b, 0xc4, 0x45, 0xb3, 0x31, 0x2e, 0x5c, 0xb4, 0x08, 0x86, 0x52, 0x29, 0x87, 0xac, 0xed, 0x68, 0xd0, 0x39, 0xb3, 0xc6, 0x12, 0xb6, 0x74, 0x3a, 0x13, 0xbb, 0x2f, 0xfb, 0x83, 0x51, 0x4d, 0x69, 0x0c, 0xfc, 0xb9, 0xa7, 0x05, 0x5e, 0x3a, 0x99, 0x3c, 0xb0, 0x86, 0x39, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4472 = { .name = "ecdsa_secp224r1_sha512_4472", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4472_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4472_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4472_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 131 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4473 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4473_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4473_msg[] = { 0x32, 0x34, 0x30, 0x36, 0x30, 0x30, 0x35, 0x39, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4473_sig[] = { 0xf7, 0x73, 0xc4, 0x9f, 0xd0, 0x64, 0x57, 0x16, 0xd1, 0x6e, 0x55, 0x9e, 0x22, 0xc3, 0x91, 0x01, 0xdf, 0x26, 0x6c, 0xdf, 0xa7, 0xcb, 0x61, 0xce, 0x46, 0xf8, 0x52, 0x80, 0xdf, 0x61, 0x09, 0xfd, 0x77, 0xa2, 0x41, 0x03, 0x1c, 0xf0, 0x3b, 0x37, 0x6e, 0x00, 0x1d, 0x8a, 0x3c, 0xd2, 0xa6, 0xb6, 0x46, 0xed, 0xbf, 0x9e, 0x57, 0x81, 0x33, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4473 = { .name = "ecdsa_secp224r1_sha512_4473", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4473_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4473_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4473_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 132 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4474 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4474_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4474_msg[] = { 0x31, 0x36, 0x31, 0x34, 0x30, 0x33, 0x36, 0x39, 0x38, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4474_sig[] = { 0x79, 0xcf, 0x89, 0x3f, 0x66, 0xf7, 0xfa, 0xa5, 0xca, 0x08, 0x55, 0x3e, 0xa0, 0x34, 0x56, 0x10, 0x7e, 0x7b, 0xb3, 0x91, 0xa5, 0xe5, 0x12, 0x60, 0xce, 0xda, 0xea, 0x84, 0x32, 0xe8, 0xe3, 0x50, 0x94, 0x68, 0xda, 0x72, 0x16, 0xc5, 0x99, 0x75, 0xd4, 0xf3, 0xd5, 0x49, 0x38, 0x48, 0xa0, 0x3f, 0x86, 0x4b, 0x23, 0x32, 0x04, 0x4e, 0x68, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4474 = { .name = "ecdsa_secp224r1_sha512_4474", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4474_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4474_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4474_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 133 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4475 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4475_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4475_msg[] = { 0x32, 0x30, 0x39, 0x35, 0x34, 0x32, 0x35, 0x36, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4475_sig[] = { 0x02, 0x5e, 0xcd, 0x1a, 0x7a, 0xb7, 0x65, 0xfb, 0xfd, 0x25, 0xa6, 0xd7, 0xcd, 0x3c, 0x46, 0x1e, 0x17, 0xf4, 0x65, 0xe6, 0x95, 0x8b, 0xce, 0x9f, 0x49, 0x2b, 0x7a, 0x5a, 0xa1, 0xca, 0x95, 0x03, 0x86, 0x03, 0xd3, 0x02, 0x76, 0x1e, 0x41, 0x69, 0x35, 0xac, 0xbd, 0x6b, 0x71, 0x6a, 0x31, 0x6c, 0x9b, 0x79, 0xc5, 0x7d, 0x40, 0x53, 0xcb, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4475 = { .name = "ecdsa_secp224r1_sha512_4475", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4475_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4475_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4475_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 134 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4476 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4476_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4476_msg[] = { 0x31, 0x30, 0x30, 0x38, 0x30, 0x39, 0x38, 0x39, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4476_sig[] = { 0x3d, 0x14, 0xa4, 0xc2, 0x1b, 0xa4, 0xdb, 0xd3, 0x38, 0xfd, 0xd8, 0xb1, 0x5f, 0xcd, 0xd0, 0xa9, 0x22, 0x8f, 0x15, 0x7c, 0xfa, 0xf2, 0xb0, 0x9d, 0xd4, 0xf2, 0xaa, 0x67, 0xe1, 0x64, 0x0e, 0x8b, 0xd2, 0xa6, 0x11, 0x0d, 0xc1, 0x8d, 0x6f, 0x29, 0x0b, 0x73, 0x25, 0x81, 0x47, 0x10, 0xc0, 0xdc, 0x88, 0xb7, 0x6f, 0x12, 0x7c, 0x5e, 0x9e, 0x21, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4476 = { .name = "ecdsa_secp224r1_sha512_4476", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4476_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4476_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4476_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 135 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4477 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4477_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4477_msg[] = { 0x31, 0x35, 0x37, 0x34, 0x31, 0x34, 0x37, 0x39, 0x32, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4477_sig[] = { 0x25, 0x8d, 0xce, 0x91, 0x6e, 0xf7, 0x8b, 0x9d, 0x8a, 0x87, 0xbe, 0xaf, 0x6e, 0xdd, 0x35, 0xbc, 0xcc, 0xc0, 0x8c, 0x5d, 0xe4, 0x88, 0x58, 0x6e, 0x1b, 0x7b, 0x74, 0x9a, 0x4f, 0xf5, 0x00, 0xdb, 0x4d, 0x66, 0x5c, 0x70, 0x62, 0x17, 0x9c, 0x09, 0x9b, 0x29, 0x85, 0xa8, 0x14, 0xf9, 0x9f, 0xbf, 0xa4, 0x4a, 0x3a, 0x70, 0x90, 0x24, 0xd5, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4477 = { .name = "ecdsa_secp224r1_sha512_4477", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4477_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4477_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4477_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 136 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4478 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4478_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4478_msg[] = { 0x32, 0x38, 0x36, 0x36, 0x37, 0x37, 0x31, 0x35, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4478_sig[] = { 0xce, 0xcf, 0x0a, 0xec, 0x53, 0x57, 0x74, 0x9f, 0x35, 0x7c, 0x45, 0x95, 0x75, 0x29, 0x8a, 0x33, 0x84, 0xdc, 0x4a, 0xc3, 0x81, 0x43, 0x8f, 0xf9, 0x9a, 0xcd, 0x99, 0x93, 0xda, 0x7a, 0xdb, 0x09, 0x2a, 0x68, 0x90, 0xe0, 0x91, 0x8c, 0x23, 0x5a, 0x62, 0xd4, 0xa9, 0x49, 0xb0, 0xca, 0xe5, 0xe5, 0x78, 0x56, 0x97, 0x51, 0x08, 0xfb, 0x2b, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4478 = { .name = "ecdsa_secp224r1_sha512_4478", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4478_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4478_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4478_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 137 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4479 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4479_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4479_msg[] = { 0x31, 0x36, 0x39, 0x34, 0x32, 0x38, 0x30, 0x37, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4479_sig[] = { 0xd7, 0x7f, 0x2e, 0x54, 0x7f, 0xd6, 0x8d, 0x5d, 0xb3, 0x14, 0x90, 0x1d, 0xa1, 0xff, 0x7e, 0xca, 0xf3, 0xd0, 0xc1, 0x7e, 0xc0, 0x47, 0xa9, 0x74, 0xa7, 0xce, 0xc3, 0x3e, 0x44, 0x3a, 0x97, 0xaf, 0xdf, 0x88, 0x22, 0x72, 0xbf, 0x02, 0x33, 0xc8, 0xc4, 0xa8, 0xd2, 0x3c, 0x93, 0x52, 0xad, 0x89, 0xb1, 0x77, 0x0c, 0x26, 0x24, 0x0f, 0x66, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4479 = { .name = "ecdsa_secp224r1_sha512_4479", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4479_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4479_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4479_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 138 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4480 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4480_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4480_msg[] = { 0x39, 0x39, 0x32, 0x31, 0x36, 0x39, 0x32, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4480_sig[] = { 0xd5, 0xdc, 0xf9, 0x3e, 0x6e, 0x1b, 0x93, 0x32, 0x3e, 0xa2, 0x64, 0x2d, 0x34, 0x05, 0xa7, 0x42, 0x3c, 0xb0, 0x4f, 0x59, 0xc0, 0x34, 0x20, 0x19, 0x3f, 0x39, 0x48, 0x86, 0xdd, 0xd5, 0x84, 0x2e, 0x49, 0x28, 0xee, 0x4b, 0x5d, 0x77, 0xd4, 0x3d, 0x4a, 0x4b, 0xfc, 0x7f, 0x99, 0x1c, 0x89, 0x97, 0x27, 0xb7, 0x5f, 0xc9, 0x41, 0xb5, 0x29, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4480 = { .name = "ecdsa_secp224r1_sha512_4480", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4480_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4480_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4480_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 139 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4481 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4481_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4481_msg[] = { 0x31, 0x31, 0x36, 0x30, 0x39, 0x34, 0x33, 0x39, 0x37, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4481_sig[] = { 0xa9, 0xbc, 0x3e, 0xbc, 0x6e, 0xe3, 0x44, 0x21, 0x32, 0x67, 0x11, 0xce, 0x29, 0x51, 0x8d, 0x02, 0xbd, 0x40, 0x3e, 0xad, 0x80, 0x6a, 0x3e, 0x45, 0x02, 0xef, 0xa0, 0xce, 0x12, 0x61, 0x0b, 0x89, 0xa6, 0x16, 0x89, 0xa8, 0xeb, 0x6e, 0x06, 0x2d, 0x25, 0x24, 0x27, 0x81, 0x55, 0xfe, 0x49, 0x9f, 0xfe, 0xcc, 0x0e, 0x0d, 0x94, 0x0d, 0x48, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4481 = { .name = "ecdsa_secp224r1_sha512_4481", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4481_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4481_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4481_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 140 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4482 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4482_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4482_msg[] = { 0x37, 0x31, 0x38, 0x36, 0x31, 0x36, 0x32, 0x31, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4482_sig[] = { 0xc7, 0x03, 0xc5, 0x08, 0x78, 0x4e, 0xf7, 0x1b, 0x59, 0x6d, 0xcd, 0x61, 0xc5, 0xb0, 0x1b, 0x45, 0xc6, 0xc6, 0x9d, 0x2b, 0x36, 0xa5, 0xa3, 0xb7, 0x70, 0x1e, 0x59, 0x76, 0xf0, 0x54, 0x44, 0xa7, 0x77, 0x20, 0x41, 0x18, 0xf3, 0xac, 0x2a, 0xfc, 0x92, 0xd0, 0x21, 0x28, 0x31, 0xbf, 0x70, 0x02, 0x15, 0x8e, 0x7c, 0x65, 0x6f, 0x4c, 0x07, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4482 = { .name = "ecdsa_secp224r1_sha512_4482", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4482_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4482_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4482_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 141 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4483 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4483_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4483_msg[] = { 0x33, 0x32, 0x39, 0x34, 0x33, 0x34, 0x37, 0x31, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4483_sig[] = { 0x80, 0x67, 0x4b, 0x74, 0x0b, 0x64, 0xd3, 0x83, 0x67, 0x7c, 0x04, 0x9a, 0x6f, 0x4b, 0xae, 0xb2, 0x14, 0xf4, 0xa6, 0xb5, 0x93, 0x30, 0x33, 0x85, 0x3e, 0x63, 0x45, 0x78, 0x9b, 0x3a, 0x80, 0x4c, 0x75, 0xed, 0x79, 0x0e, 0x31, 0x96, 0x6b, 0xc2, 0x57, 0x30, 0xb7, 0x42, 0x8a, 0xf8, 0xc7, 0x3c, 0x65, 0xfb, 0x50, 0x3c, 0x06, 0xc5, 0x97, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4483 = { .name = "ecdsa_secp224r1_sha512_4483", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4483_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4483_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4483_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 142 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4484 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4484_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4484_msg[] = { 0x31, 0x38, 0x35, 0x31, 0x34, 0x34, 0x35, 0x35, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4484_sig[] = { 0x7e, 0xd6, 0x58, 0xc3, 0x0f, 0x4a, 0x0d, 0xcc, 0x89, 0x4c, 0x39, 0xf9, 0x32, 0x0f, 0x59, 0xa1, 0x85, 0x50, 0x9f, 0xfe, 0xe4, 0x5e, 0xac, 0x60, 0x23, 0x57, 0x7c, 0x7c, 0x47, 0xac, 0x94, 0xa5, 0x01, 0x80, 0x6d, 0x5a, 0xdf, 0xfe, 0xa9, 0xfc, 0xf3, 0xcc, 0xd8, 0xcf, 0x79, 0xf3, 0xcc, 0x47, 0xec, 0xa9, 0xfe, 0x38, 0xfc, 0x48, 0x86, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4484 = { .name = "ecdsa_secp224r1_sha512_4484", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4484_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4484_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4484_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 143 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4485 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4485_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4485_msg[] = { 0x34, 0x37, 0x36, 0x30, 0x34, 0x33, 0x39, 0x33, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4485_sig[] = { 0x39, 0x7f, 0x66, 0x9c, 0xc3, 0x99, 0xa9, 0x1d, 0xa9, 0x6c, 0x16, 0xef, 0xd2, 0x33, 0xf6, 0xfe, 0x60, 0xd1, 0xb7, 0xca, 0xa3, 0x97, 0xcc, 0x25, 0x78, 0x43, 0xb3, 0x0b, 0xf1, 0x93, 0x75, 0xfe, 0x66, 0xea, 0xe4, 0x73, 0x8e, 0xc9, 0xdc, 0x5b, 0x7e, 0xf5, 0x1c, 0xb3, 0x3d, 0x4c, 0xb2, 0x58, 0xf3, 0x69, 0x44, 0xd3, 0x7d, 0xd2, 0x45, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4485 = { .name = "ecdsa_secp224r1_sha512_4485", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4485_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4485_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4485_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 144 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4486 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4486_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4486_msg[] = { 0x32, 0x35, 0x36, 0x37, 0x33, 0x37, 0x38, 0x37, 0x34, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4486_sig[] = { 0x53, 0x7e, 0xc3, 0x69, 0xb3, 0xf0, 0xd8, 0x91, 0xe1, 0x66, 0xf6, 0xc7, 0x4e, 0x5d, 0x73, 0xdd, 0x2c, 0x48, 0x22, 0x21, 0x0c, 0x5f, 0xe5, 0xf9, 0x78, 0xc3, 0x40, 0x72, 0x0b, 0x18, 0x3c, 0x48, 0xb5, 0xf6, 0xe6, 0x92, 0x45, 0xcb, 0x76, 0xe1, 0xe2, 0xc3, 0x96, 0x63, 0xee, 0xdf, 0xb7, 0x4b, 0xa9, 0x53, 0x87, 0x39, 0xac, 0x49, 0x5f, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4486 = { .name = "ecdsa_secp224r1_sha512_4486", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4486_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4486_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4486_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 145 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4487 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4487_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4487_msg[] = { 0x35, 0x37, 0x33, 0x39, 0x39, 0x33, 0x34, 0x39, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4487_sig[] = { 0xd0, 0xed, 0x71, 0x59, 0xcc, 0x3a, 0x79, 0x98, 0x8f, 0x3c, 0x27, 0x92, 0x87, 0xca, 0x8e, 0xd1, 0x0b, 0xb8, 0xf0, 0x2c, 0x8b, 0x5a, 0x62, 0x04, 0xae, 0xad, 0x12, 0x23, 0x75, 0xee, 0x1e, 0x5c, 0x00, 0xe8, 0x18, 0x99, 0xbf, 0xa8, 0x54, 0x5e, 0xdc, 0xc6, 0x4f, 0xdf, 0x70, 0x7d, 0xae, 0x1f, 0x61, 0xd9, 0x76, 0xd2, 0xf0, 0x88, 0x37, 0x77, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4487 = { .name = "ecdsa_secp224r1_sha512_4487", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4487_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4487_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4487_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 146 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4488 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4488_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4488_msg[] = { 0x33, 0x34, 0x37, 0x38, 0x33, 0x36, 0x36, 0x31, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4488_sig[] = { 0xcf, 0x43, 0x32, 0x9a, 0x97, 0x81, 0xdb, 0x80, 0x44, 0xa9, 0x20, 0x75, 0x8e, 0x58, 0x39, 0x98, 0x66, 0xfe, 0x77, 0x48, 0xc0, 0xf5, 0xd6, 0xa3, 0xbc, 0xdc, 0xbc, 0xbd, 0xd9, 0x74, 0x0d, 0x2d, 0xd7, 0x16, 0x29, 0x0a, 0xd4, 0x16, 0x03, 0x45, 0xbc, 0xd4, 0xaf, 0x03, 0xaf, 0x01, 0xc4, 0x4b, 0x61, 0x0b, 0x1e, 0x59, 0x53, 0x19, 0x90, 0x75, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4488 = { .name = "ecdsa_secp224r1_sha512_4488", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4488_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4488_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4488_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 147 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4489 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4489_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4489_msg[] = { 0x36, 0x34, 0x39, 0x30, 0x35, 0x32, 0x36, 0x30, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4489_sig[] = { 0x8a, 0xb2, 0xe9, 0x2c, 0x8c, 0x91, 0x43, 0xf9, 0xd8, 0xda, 0x3b, 0xdb, 0x1d, 0x93, 0x5c, 0xce, 0x3a, 0xb6, 0x0a, 0xe9, 0x9b, 0x3c, 0xcf, 0xe8, 0x63, 0xb1, 0x5d, 0x14, 0x88, 0xc8, 0x93, 0x02, 0xe8, 0xa9, 0xc5, 0x91, 0xc6, 0xed, 0x16, 0xb1, 0xae, 0x46, 0xf9, 0x66, 0x00, 0x4d, 0x0b, 0x26, 0x85, 0x44, 0x98, 0x42, 0xe2, 0x91, 0xd7, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4489 = { .name = "ecdsa_secp224r1_sha512_4489", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4489_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4489_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4489_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 148 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4490 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4490_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4490_msg[] = { 0x34, 0x37, 0x36, 0x33, 0x38, 0x38, 0x37, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4490_sig[] = { 0x04, 0xf6, 0x0f, 0x84, 0x50, 0xb4, 0x48, 0x19, 0x8c, 0xf7, 0x98, 0x11, 0x16, 0xde, 0x06, 0xd4, 0xc4, 0x88, 0x8c, 0xd2, 0x6b, 0xe3, 0xa5, 0x94, 0x70, 0x92, 0x23, 0x8f, 0xcb, 0x23, 0xfc, 0xb3, 0x3c, 0x14, 0xf0, 0x89, 0xc2, 0xae, 0x03, 0x01, 0x46, 0xd6, 0x8f, 0xa6, 0x5e, 0xb9, 0xb0, 0x86, 0xfa, 0x79, 0x2f, 0x95, 0xbe, 0x8e, 0xcf, 0x35, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4490 = { .name = "ecdsa_secp224r1_sha512_4490", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4490_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4490_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4490_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 149 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4491 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4491_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4491_msg[] = { 0x35, 0x37, 0x39, 0x30, 0x32, 0x30, 0x30, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4491_sig[] = { 0xf2, 0x70, 0xf7, 0xa7, 0x0a, 0x96, 0xa0, 0xf9, 0x16, 0xc7, 0x53, 0x0c, 0x6d, 0xea, 0x71, 0x78, 0xe6, 0xc0, 0x87, 0xdd, 0xbc, 0xc6, 0x0a, 0xac, 0xd8, 0xa7, 0xc5, 0x53, 0x8b, 0x2c, 0x37, 0x85, 0x54, 0x12, 0x13, 0x65, 0xa1, 0x80, 0xad, 0x4e, 0xdf, 0x1a, 0x12, 0xe5, 0x66, 0xba, 0x55, 0xee, 0xab, 0xf5, 0x25, 0x35, 0x67, 0x83, 0xe6, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4491 = { .name = "ecdsa_secp224r1_sha512_4491", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4491_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4491_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4491_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 150 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4492 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4492_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4492_msg[] = { 0x35, 0x33, 0x34, 0x34, 0x37, 0x38, 0x37, 0x38, 0x34, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4492_sig[] = { 0x85, 0xad, 0x01, 0xb2, 0x36, 0xca, 0x4a, 0x54, 0x51, 0x96, 0x92, 0x42, 0xe1, 0x61, 0x65, 0xd3, 0x22, 0x42, 0x82, 0x35, 0xa2, 0xaf, 0x8f, 0xdc, 0xd6, 0xc4, 0xc7, 0xb9, 0x8e, 0xb2, 0x99, 0x8c, 0x5e, 0x0a, 0xaf, 0x27, 0x97, 0x93, 0xca, 0xff, 0x59, 0xa2, 0x66, 0xca, 0x20, 0x68, 0xd9, 0x4e, 0xbf, 0x77, 0xba, 0xe8, 0x1f, 0xd0, 0xfb, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4492 = { .name = "ecdsa_secp224r1_sha512_4492", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4492_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4492_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4492_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 151 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4493 for ECDSA, tcId is 152 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4493_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4493_msg[] = { 0x31, 0x39, 0x32, 0x36, 0x36, 0x34, 0x31, 0x30, 0x39, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4493_sig[] = { 0xcf, 0xfd, 0xb8, 0xd6, 0x4b, 0x5b, 0x84, 0xb4, 0x90, 0xff, 0x73, 0xd7, 0x7e, 0x51, 0xcc, 0x77, 0x97, 0xbf, 0x67, 0xc5, 0xee, 0x0a, 0x49, 0x99, 0xde, 0xf1, 0x72, 0x30, 0x3b, 0xaf, 0x4b, 0x34, 0xe1, 0xa3, 0x5e, 0x96, 0x06, 0xa4, 0x60, 0xb3, 0x95, 0x06, 0x3a, 0x55, 0x42, 0x64, 0xa9, 0xc4, 0x3c, 0xc3, 0x02, 0xab, 0x5a, 0xbf, 0x47, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4493 = { .name = "ecdsa_secp224r1_sha512_4493", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4493_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4493_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4493_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 152 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4494 for ECDSA, tcId is 153 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4494_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4494_msg[] = { 0x33, 0x37, 0x30, 0x33, 0x39, 0x31, 0x35, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4494_sig[] = { 0x66, 0xcd, 0xa5, 0x8a, 0x5a, 0x6d, 0xdb, 0x94, 0x76, 0xe3, 0x6d, 0xba, 0xd5, 0xdf, 0x54, 0x2b, 0xe8, 0x8d, 0x7e, 0x44, 0x7b, 0xdc, 0x3d, 0xfe, 0x1d, 0x9e, 0x8b, 0x2c, 0x0d, 0x99, 0xd3, 0x87, 0x48, 0x6a, 0x96, 0x4e, 0xba, 0xb4, 0xe2, 0x9b, 0xad, 0x58, 0x3e, 0x46, 0xa5, 0xa2, 0x00, 0x39, 0x1d, 0x10, 0x65, 0x76, 0x8a, 0x4e, 0x35, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4494 = { .name = "ecdsa_secp224r1_sha512_4494", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4494_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4494_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4494_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 153 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4495 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4495_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4495_msg[] = { 0x38, 0x31, 0x35, 0x34, 0x35, 0x37, 0x37, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4495_sig[] = { 0x32, 0x00, 0x76, 0x19, 0x02, 0x82, 0x5b, 0xd3, 0x53, 0x90, 0x8a, 0xcc, 0xd2, 0xbe, 0x6b, 0x48, 0x26, 0x45, 0x64, 0x69, 0x71, 0xf9, 0x6d, 0xc4, 0x90, 0x70, 0x6a, 0x37, 0x3e, 0xd7, 0x78, 0x99, 0xef, 0xdb, 0xe4, 0x18, 0x37, 0x0f, 0xa7, 0x99, 0x8d, 0xf3, 0xb7, 0xc9, 0x24, 0xbe, 0xd6, 0x86, 0x45, 0x35, 0x27, 0x7f, 0x80, 0x5c, 0x89, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4495 = { .name = "ecdsa_secp224r1_sha512_4495", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4495_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4495_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha512_4495_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 154 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4496 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4496_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4496_msg[] = { 0x31, 0x39, 0x35, 0x35, 0x33, 0x30, 0x33, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4496_sig[] = { 0xba, 0x0e, 0xff, 0x0e, 0xe4, 0x6a, 0xa9, 0xfc, 0xa5, 0xab, 0x8a, 0xd6, 0x4a, 0xee, 0x40, 0x37, 0x93, 0x1d, 0x3a, 0xd0, 0xb9, 0x53, 0xd4, 0x04, 0xef, 0x9f, 0x7b, 0xdc, 0xaf, 0xdf, 0x21, 0xdf, 0x0d, 0xcb, 0xe3, 0x9c, 0x2f, 0x5f, 0xa9, 0xef, 0x7e, 0x1a, 0x2b, 0xca, 0x87, 0xd1, 0x21, 0x3d, 0x1e, 0xca, 0x43, 0x89, 0x29, 0xad, 0x89, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4496 = { .name = "ecdsa_secp224r1_sha512_4496", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4496_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4496_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4496_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 155 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4497 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4497_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4497_msg[] = { 0x31, 0x32, 0x36, 0x37, 0x38, 0x31, 0x30, 0x39, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4497_sig[] = { 0xa2, 0x0c, 0x68, 0x83, 0xfc, 0x6e, 0xc1, 0xca, 0x4b, 0xb3, 0x78, 0xac, 0x88, 0xed, 0x67, 0x0a, 0x74, 0x2a, 0x62, 0x84, 0x11, 0x3d, 0x5f, 0xa3, 0x18, 0x2a, 0x18, 0x58, 0xe0, 0xa7, 0x3b, 0x91, 0x3b, 0x94, 0x16, 0x31, 0x75, 0xd2, 0x64, 0x22, 0x4c, 0xc7, 0x07, 0x36, 0xf2, 0xfb, 0x8e, 0x8d, 0x58, 0xe9, 0x14, 0xb1, 0x8c, 0x92, 0x13, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4497 = { .name = "ecdsa_secp224r1_sha512_4497", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4497_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4497_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4497_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 156 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4498 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4498_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4498_msg[] = { 0x31, 0x31, 0x31, 0x38, 0x30, 0x37, 0x32, 0x30, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4498_sig[] = { 0xf2, 0xf4, 0xaf, 0x95, 0x6b, 0x0c, 0x54, 0x09, 0x94, 0x9d, 0x37, 0x7e, 0x9b, 0xc6, 0x8e, 0x4f, 0x1a, 0xbe, 0xf7, 0x96, 0x9b, 0x51, 0x8f, 0x8b, 0xea, 0xcf, 0x27, 0xdb, 0xdf, 0x3a, 0x7b, 0x59, 0x93, 0xd2, 0x39, 0x3a, 0xde, 0x70, 0xa2, 0xcf, 0xc1, 0xe8, 0x67, 0x1a, 0x78, 0xca, 0x4f, 0xec, 0xb5, 0x64, 0x25, 0xa6, 0x61, 0xa2, 0xd2, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4498 = { .name = "ecdsa_secp224r1_sha512_4498", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4498_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4498_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4498_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 157 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4499 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4499_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4499_msg[] = { 0x38, 0x33, 0x38, 0x31, 0x38, 0x36, 0x39, 0x32, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4499_sig[] = { 0x33, 0x1a, 0x1a, 0x55, 0x34, 0x94, 0xf8, 0x52, 0x4a, 0xdb, 0x4e, 0x8a, 0x72, 0x2d, 0x55, 0x89, 0x65, 0xfb, 0x70, 0x3a, 0xe4, 0x32, 0xbf, 0x3c, 0xbd, 0xb2, 0x55, 0xc2, 0x5a, 0xb6, 0xe3, 0xde, 0xe6, 0xa2, 0x51, 0x6f, 0xc4, 0xe0, 0xac, 0x88, 0xe6, 0xdf, 0xc8, 0x1d, 0x2b, 0xc3, 0x7c, 0x98, 0x94, 0x9c, 0xc0, 0x3e, 0x52, 0x1d, 0x38, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4499 = { .name = "ecdsa_secp224r1_sha512_4499", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4499_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4499_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4499_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 158 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4500 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4500_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4500_msg[] = { 0x33, 0x31, 0x33, 0x31, 0x32, 0x38, 0x37, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4500_sig[] = { 0x86, 0x71, 0x35, 0x55, 0x8e, 0x06, 0xe1, 0x97, 0x96, 0xeb, 0xce, 0x8e, 0x35, 0x55, 0xc6, 0x07, 0xa6, 0x60, 0x7d, 0x46, 0xf7, 0xc8, 0xda, 0x6b, 0x85, 0x52, 0xff, 0xc1, 0x8e, 0x82, 0x7e, 0x8b, 0x9a, 0x4f, 0x74, 0xef, 0xee, 0xc7, 0xd7, 0xba, 0x5c, 0x23, 0x42, 0x8f, 0xde, 0x02, 0x27, 0xdf, 0x55, 0xa1, 0xef, 0xc1, 0x79, 0xa3, 0x53, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4500 = { .name = "ecdsa_secp224r1_sha512_4500", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4500_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4500_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4500_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 159 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4501 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4501_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4501_msg[] = { 0x31, 0x34, 0x33, 0x33, 0x31, 0x39, 0x32, 0x36, 0x35, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4501_sig[] = { 0x67, 0x46, 0x90, 0x3c, 0xa0, 0x95, 0xbf, 0xd3, 0xf6, 0x37, 0x8a, 0x70, 0x09, 0x27, 0x23, 0x48, 0x3c, 0xa1, 0x90, 0xb2, 0x39, 0x2d, 0x8b, 0x1a, 0xd3, 0x37, 0x96, 0x9f, 0xf3, 0x3b, 0xfa, 0xe0, 0x83, 0x5c, 0x23, 0xa8, 0x0e, 0xc9, 0xf3, 0x3c, 0xe9, 0xa9, 0x03, 0x5c, 0x19, 0x28, 0x36, 0xa0, 0xb2, 0xfa, 0xdd, 0x34, 0x7d, 0x80, 0x3f, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4501 = { .name = "ecdsa_secp224r1_sha512_4501", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4501_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4501_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4501_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 160 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4502 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4502_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4502_msg[] = { 0x33, 0x34, 0x34, 0x39, 0x30, 0x38, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4502_sig[] = { 0x7f, 0xc0, 0xd8, 0x73, 0x9e, 0xcf, 0xe3, 0x49, 0xe5, 0x06, 0xe7, 0x12, 0x03, 0xa6, 0xe6, 0x0e, 0x62, 0x8a, 0x1b, 0xb0, 0xc6, 0x7d, 0x5e, 0x57, 0x4c, 0xb8, 0x83, 0x1c, 0xcf, 0x8b, 0xb1, 0x55, 0x71, 0x52, 0xc5, 0x75, 0x50, 0xa0, 0xfd, 0xe6, 0x57, 0x14, 0x56, 0xfa, 0x75, 0x27, 0x82, 0xf7, 0xf9, 0x2f, 0x7b, 0xb2, 0x35, 0xdd, 0xe3, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4502 = { .name = "ecdsa_secp224r1_sha512_4502", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4502_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4502_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4502_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 161 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4503 for ECDSA, tcId is 162 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4503_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4503_msg[] = { 0x36, 0x38, 0x32, 0x39, 0x38, 0x33, 0x35, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4503_sig[] = { 0xb4, 0x48, 0x6e, 0x31, 0x39, 0xe0, 0xb1, 0x54, 0x28, 0x92, 0xdb, 0x3d, 0x3f, 0x51, 0xb0, 0x52, 0x48, 0x94, 0xe1, 0x9c, 0xb0, 0x0c, 0xd0, 0x7b, 0x03, 0xee, 0x9c, 0x97, 0xad, 0x97, 0x28, 0xd7, 0x7a, 0x8b, 0x7b, 0x4f, 0xa4, 0x35, 0xb3, 0x34, 0x58, 0x47, 0x86, 0x0c, 0x33, 0x2d, 0x65, 0xd8, 0x15, 0x2a, 0xa6, 0x50, 0x3a, 0xb1, 0x87, 0x55, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4503 = { .name = "ecdsa_secp224r1_sha512_4503", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4503_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4503_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4503_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 162 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4504 for ECDSA, tcId is 163 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4504_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4504_msg[] = { 0x33, 0x34, 0x34, 0x35, 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4504_sig[] = { 0xaf, 0xbb, 0xdc, 0x8e, 0x50, 0xe8, 0x01, 0xec, 0xbd, 0x2e, 0x37, 0x05, 0x07, 0x97, 0x17, 0xf4, 0xf9, 0xd6, 0x9f, 0x3b, 0x3d, 0x85, 0x21, 0x5a, 0xee, 0xcb, 0x4f, 0xbc, 0xec, 0xea, 0xdd, 0x4e, 0x2c, 0xc9, 0xce, 0xa1, 0x0b, 0x56, 0xd1, 0x6a, 0x03, 0xfa, 0x55, 0x1f, 0xec, 0x3e, 0xb8, 0x08, 0xbd, 0x8d, 0x9f, 0x09, 0x26, 0xd1, 0x4e, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4504 = { .name = "ecdsa_secp224r1_sha512_4504", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4504_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4504_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4504_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 163 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4505 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4505_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4505_msg[] = { 0x31, 0x32, 0x36, 0x39, 0x37, 0x39, 0x38, 0x37, 0x36, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4505_sig[] = { 0x4a, 0x76, 0x2f, 0x7d, 0x14, 0x6f, 0x9e, 0xaf, 0xff, 0x5a, 0xd1, 0x1a, 0x69, 0x78, 0x26, 0x0c, 0x81, 0x8b, 0x80, 0x1c, 0x34, 0x88, 0xdd, 0x60, 0x41, 0x1f, 0x5c, 0xf6, 0x9e, 0xa7, 0x75, 0x12, 0x58, 0x56, 0x20, 0xef, 0x2c, 0xfa, 0xe8, 0xb8, 0xc9, 0xd8, 0x17, 0x12, 0x29, 0xa3, 0x21, 0x97, 0xe1, 0x94, 0x95, 0x61, 0xbb, 0x75, 0xa0, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4505 = { .name = "ecdsa_secp224r1_sha512_4505", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4505_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4505_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4505_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 164 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4506 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4506_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4506_msg[] = { 0x33, 0x39, 0x39, 0x32, 0x34, 0x32, 0x35, 0x35, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4506_sig[] = { 0x22, 0x7f, 0xe5, 0x2b, 0x57, 0x98, 0x33, 0xfe, 0xee, 0x16, 0xc2, 0x87, 0xd2, 0x92, 0x73, 0xe2, 0x25, 0x6d, 0xf6, 0x8a, 0xff, 0x0b, 0x94, 0xd2, 0x75, 0x2d, 0x87, 0x7b, 0xbd, 0x79, 0x93, 0x5e, 0x5f, 0xaa, 0x8e, 0x93, 0x56, 0x62, 0x2f, 0xea, 0x01, 0x35, 0xec, 0xf7, 0x96, 0xda, 0xf6, 0x03, 0x33, 0xd5, 0xab, 0x12, 0x5f, 0x71, 0xe5, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4506 = { .name = "ecdsa_secp224r1_sha512_4506", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4506_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4506_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4506_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 165 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4507 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4507_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4507_msg[] = { 0x31, 0x36, 0x30, 0x31, 0x39, 0x37, 0x37, 0x39, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4507_sig[] = { 0xcd, 0x53, 0x65, 0x98, 0x3e, 0xb1, 0x65, 0xdb, 0x39, 0xba, 0x0c, 0x66, 0xc3, 0xa4, 0x5b, 0x2c, 0xe1, 0x37, 0x0c, 0x9a, 0xd1, 0x4a, 0x9a, 0xa7, 0x6d, 0xd4, 0x63, 0x3a, 0xa8, 0xc7, 0x7c, 0xe4, 0x2a, 0xb1, 0xc8, 0x88, 0xa6, 0xb5, 0xd0, 0x4b, 0x71, 0x13, 0x9f, 0xd8, 0x82, 0x32, 0x86, 0x22, 0xe1, 0x5e, 0x80, 0x25, 0x2e, 0x5c, 0xf7, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4507 = { .name = "ecdsa_secp224r1_sha512_4507", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4507_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4507_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4507_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 166 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4508 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4508_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4508_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x35, 0x35, 0x31, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4508_sig[] = { 0x54, 0xd6, 0xd4, 0x43, 0x73, 0xf7, 0xdf, 0xc9, 0x84, 0x55, 0xa2, 0x2c, 0xd3, 0x9a, 0x0b, 0x32, 0x0f, 0xab, 0xc3, 0x32, 0x15, 0x21, 0x6b, 0x37, 0x36, 0x5b, 0x5a, 0x16, 0x29, 0xcc, 0x69, 0x0f, 0x24, 0x67, 0xc0, 0x2e, 0x07, 0xbc, 0x41, 0x6a, 0xd4, 0x72, 0x04, 0x97, 0x5a, 0xf8, 0xc5, 0xc3, 0x34, 0x69, 0x73, 0xf2, 0xb0, 0x3d, 0xed, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4508 = { .name = "ecdsa_secp224r1_sha512_4508", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4508_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4508_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4508_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 167 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4509 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4509_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4509_msg[] = { 0x37, 0x30, 0x30, 0x34, 0x32, 0x35, 0x32, 0x39, 0x39, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4509_sig[] = { 0x2f, 0x50, 0x48, 0xc9, 0xef, 0x9f, 0x30, 0xda, 0x7c, 0xb3, 0xfe, 0x46, 0x24, 0x55, 0x22, 0x00, 0xf9, 0xe5, 0x7a, 0x46, 0xd7, 0x9d, 0xb0, 0x48, 0x4a, 0x0d, 0x9c, 0xf2, 0x06, 0xda, 0xd3, 0xa4, 0x68, 0x27, 0x25, 0x85, 0x28, 0x69, 0xa1, 0xa4, 0x59, 0xbe, 0xc8, 0x65, 0x66, 0x1e, 0x1a, 0x38, 0xa9, 0xe5, 0x46, 0xee, 0xaa, 0xc7, 0xcb, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4509 = { .name = "ecdsa_secp224r1_sha512_4509", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4509_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4509_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4509_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 168 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4510 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4510_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4510_msg[] = { 0x31, 0x35, 0x36, 0x35, 0x33, 0x32, 0x35, 0x32, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4510_sig[] = { 0xab, 0xbf, 0x0a, 0x02, 0x33, 0x2f, 0xbe, 0xa7, 0x79, 0x89, 0x9d, 0x31, 0xd3, 0xab, 0xd2, 0xd2, 0x2c, 0x9c, 0x02, 0xd4, 0x05, 0x8c, 0xed, 0x63, 0x9b, 0xf0, 0x6c, 0x45, 0xcc, 0xe0, 0x57, 0x0f, 0x38, 0x12, 0xe5, 0xcf, 0xcb, 0x23, 0x37, 0x6c, 0x55, 0x4c, 0x7f, 0xc3, 0x5d, 0xbc, 0xfe, 0xb6, 0x23, 0xa7, 0x95, 0x8c, 0x66, 0x4a, 0xc6, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4510 = { .name = "ecdsa_secp224r1_sha512_4510", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4510_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4510_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4510_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 169 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4511 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4511_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4511_msg[] = { 0x32, 0x33, 0x38, 0x32, 0x36, 0x33, 0x34, 0x32, 0x33, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4511_sig[] = { 0x1c, 0x30, 0xcb, 0x8b, 0xc2, 0x10, 0x87, 0xb7, 0x7e, 0xb1, 0x21, 0x6e, 0xe8, 0x62, 0x9e, 0x36, 0x76, 0xd9, 0x25, 0xf1, 0xae, 0x15, 0x07, 0x7c, 0xc6, 0x31, 0xda, 0x4f, 0xee, 0x99, 0x81, 0x57, 0xbd, 0xef, 0xb7, 0x7d, 0x10, 0x44, 0xe9, 0x83, 0xa6, 0xaf, 0xec, 0x7d, 0x91, 0xa2, 0x3d, 0x95, 0xc9, 0x37, 0xfc, 0x5c, 0x65, 0x48, 0xc9, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4511 = { .name = "ecdsa_secp224r1_sha512_4511", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4511_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4511_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4511_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 170 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4512 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4512_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4512_msg[] = { 0x31, 0x34, 0x34, 0x37, 0x38, 0x34, 0x37, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4512_sig[] = { 0x43, 0xee, 0x11, 0xa7, 0xab, 0x62, 0xe2, 0x12, 0x5e, 0x76, 0x5c, 0x2c, 0xe5, 0xd4, 0xf8, 0x47, 0x04, 0x18, 0x35, 0x39, 0x81, 0x05, 0x12, 0x26, 0x8d, 0x87, 0xf1, 0x95, 0x65, 0x89, 0x7e, 0x54, 0x02, 0x57, 0x77, 0x65, 0x9e, 0xe8, 0x02, 0xb3, 0x9c, 0x6b, 0xfd, 0x5c, 0xcc, 0x57, 0x06, 0xa9, 0xd1, 0xb3, 0x8f, 0x95, 0xc0, 0x78, 0xab, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4512 = { .name = "ecdsa_secp224r1_sha512_4512", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4512_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4512_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4512_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 171 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4513 for ECDSA, tcId is 172 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4513_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4513_msg[] = { 0x31, 0x34, 0x32, 0x36, 0x30, 0x32, 0x30, 0x35, 0x35, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4513_sig[] = { 0xa1, 0xfe, 0x3f, 0x4d, 0x3f, 0x43, 0xaa, 0xa3, 0xdc, 0xaf, 0xa7, 0x9e, 0xd9, 0x9f, 0xbc, 0x04, 0x5c, 0x11, 0xc3, 0x52, 0xca, 0xac, 0xd8, 0x9f, 0x0f, 0x63, 0x84, 0x7e, 0xca, 0x2e, 0x37, 0xbd, 0x2c, 0x13, 0xb9, 0xfb, 0x3f, 0x8a, 0x55, 0xb7, 0xa6, 0x7e, 0xb0, 0x34, 0x24, 0x03, 0x95, 0xab, 0xd3, 0x9f, 0xec, 0xde, 0x75, 0x14, 0x13, 0x36, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4513 = { .name = "ecdsa_secp224r1_sha512_4513", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4513_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4513_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4513_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 172 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4514 for ECDSA, tcId is 173 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4514_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4514_msg[] = { 0x31, 0x39, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4514_sig[] = { 0xbd, 0x29, 0x02, 0x86, 0xca, 0x08, 0x48, 0x5e, 0xa4, 0x13, 0x70, 0x10, 0xc6, 0x72, 0x03, 0xc2, 0x45, 0x5e, 0x7b, 0x66, 0x9d, 0x15, 0x3c, 0x6b, 0xe4, 0x00, 0x87, 0xc7, 0x97, 0xdd, 0x75, 0x02, 0xba, 0x36, 0x37, 0xf3, 0x3b, 0xae, 0xa5, 0xb2, 0x39, 0x86, 0x47, 0xad, 0x24, 0xc0, 0xfe, 0x35, 0x07, 0x2b, 0xd9, 0x63, 0x14, 0x9b, 0x5a, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4514 = { .name = "ecdsa_secp224r1_sha512_4514", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4514_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4514_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4514_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 173 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4515 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4515_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4515_msg[] = { 0x34, 0x32, 0x39, 0x32, 0x31, 0x35, 0x33, 0x35, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4515_sig[] = { 0xc9, 0x17, 0x26, 0x9a, 0x5a, 0x4c, 0xe8, 0x0b, 0x7f, 0xe5, 0x4a, 0x8b, 0xed, 0x49, 0x32, 0x6b, 0x50, 0x52, 0x7a, 0x4d, 0x2f, 0xb0, 0xa3, 0x09, 0x31, 0x82, 0xb5, 0xa5, 0xa1, 0x95, 0xec, 0x0e, 0x69, 0xe3, 0x17, 0x2e, 0x85, 0x4e, 0x87, 0xdd, 0x65, 0x1b, 0x44, 0x43, 0x3f, 0xcd, 0x7d, 0xcb, 0xb7, 0xbd, 0x59, 0x51, 0x5d, 0x2a, 0xfe, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4515 = { .name = "ecdsa_secp224r1_sha512_4515", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4515_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4515_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4515_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 174 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4516 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4516_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4516_msg[] = { 0x34, 0x34, 0x35, 0x39, 0x39, 0x30, 0x31, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4516_sig[] = { 0x0b, 0x7b, 0x5a, 0xab, 0x83, 0x64, 0xdd, 0x4b, 0x11, 0x00, 0x1a, 0x0b, 0x98, 0x6d, 0x5a, 0xa4, 0xfb, 0x61, 0xee, 0x72, 0x02, 0x37, 0x41, 0x7a, 0x7f, 0x63, 0x72, 0x2f, 0x7f, 0x13, 0xb4, 0x11, 0xe6, 0x45, 0xe8, 0x19, 0xfe, 0xd1, 0xb9, 0x25, 0xeb, 0xe8, 0x07, 0xd9, 0x56, 0x0b, 0x44, 0xd0, 0xba, 0x1b, 0x75, 0xbd, 0x2f, 0xbd, 0x12, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4516 = { .name = "ecdsa_secp224r1_sha512_4516", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4516_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4516_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4516_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 175 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4517 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4517_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4517_msg[] = { 0x31, 0x33, 0x39, 0x33, 0x39, 0x37, 0x31, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4517_sig[] = { 0x50, 0x5b, 0x97, 0x4f, 0x8e, 0xcf, 0x07, 0xb6, 0x0f, 0xfd, 0xbd, 0x2b, 0x2d, 0xf9, 0x32, 0x4d, 0xe9, 0x2b, 0x39, 0x47, 0x6e, 0xb7, 0x63, 0xa4, 0xc2, 0x5f, 0x12, 0x6a, 0x1c, 0x36, 0xed, 0x1d, 0xee, 0x77, 0x2c, 0x72, 0x42, 0x05, 0xf7, 0x17, 0xc3, 0x83, 0xf4, 0x9a, 0x87, 0xa5, 0xbc, 0x3c, 0xaa, 0x0e, 0xf8, 0x13, 0x60, 0xf9, 0xd8, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4517 = { .name = "ecdsa_secp224r1_sha512_4517", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4517_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4517_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4517_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 176 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4518 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4518_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4518_msg[] = { 0x32, 0x33, 0x39, 0x30, 0x36, 0x39, 0x36, 0x34, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4518_sig[] = { 0x24, 0x21, 0x9e, 0x49, 0xb9, 0x8a, 0x9b, 0x64, 0xe5, 0x6d, 0x21, 0xc9, 0x08, 0xc8, 0x70, 0xeb, 0x88, 0xb4, 0x47, 0xd9, 0xf1, 0xdd, 0xb7, 0x35, 0x08, 0x3d, 0x6d, 0xf2, 0xbc, 0x4d, 0x76, 0x44, 0xfa, 0xef, 0xf1, 0xe1, 0x34, 0x44, 0x3b, 0x2b, 0xb3, 0xbb, 0x2a, 0x20, 0xe2, 0xa4, 0xa7, 0xc1, 0x93, 0x18, 0x06, 0x26, 0x12, 0x7c, 0xe9, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4518 = { .name = "ecdsa_secp224r1_sha512_4518", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4518_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4518_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4518_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 177 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4519 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4519_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4519_msg[] = { 0x31, 0x31, 0x34, 0x34, 0x36, 0x30, 0x35, 0x36, 0x32, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4519_sig[] = { 0x08, 0x32, 0x46, 0x08, 0x1c, 0xf2, 0xf8, 0xc5, 0xe1, 0xcd, 0x42, 0xb6, 0x04, 0x50, 0xfc, 0x6c, 0xac, 0x3b, 0x0a, 0xb0, 0x3d, 0x38, 0xbd, 0xd2, 0x71, 0xcd, 0x73, 0x70, 0x8d, 0x11, 0x7e, 0xc3, 0x2d, 0xbf, 0x93, 0x93, 0x94, 0x49, 0x9f, 0x7d, 0xbc, 0x2a, 0xb7, 0x72, 0x90, 0xe9, 0x22, 0x2d, 0x6d, 0x60, 0xea, 0x02, 0xce, 0x45, 0xc5, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4519 = { .name = "ecdsa_secp224r1_sha512_4519", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4519_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4519_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4519_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 178 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4520 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4520_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4520_msg[] = { 0x36, 0x38, 0x35, 0x30, 0x30, 0x34, 0x37, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4520_sig[] = { 0x24, 0x91, 0x69, 0x61, 0xdd, 0x0d, 0x16, 0x8c, 0x28, 0x78, 0xca, 0x4f, 0xd0, 0x65, 0xb8, 0x13, 0x11, 0xc0, 0x3b, 0x7f, 0x23, 0xf8, 0x41, 0x6f, 0x4a, 0x23, 0xb1, 0x4b, 0x1e, 0x37, 0xe3, 0xc0, 0x3b, 0x23, 0x33, 0xb3, 0x3b, 0xbb, 0x2e, 0xbe, 0x05, 0xb0, 0x31, 0x04, 0x2a, 0xf1, 0x93, 0x15, 0xad, 0xfd, 0xcc, 0xdf, 0xc8, 0xd0, 0x78, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4520 = { .name = "ecdsa_secp224r1_sha512_4520", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4520_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4520_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4520_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 179 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4521 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4521_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4521_msg[] = { 0x32, 0x32, 0x32, 0x30, 0x35, 0x33, 0x36, 0x30, 0x36, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4521_sig[] = { 0x8d, 0xf5, 0x46, 0x8b, 0x12, 0x3b, 0x92, 0x47, 0x7a, 0x5c, 0x57, 0xea, 0x86, 0xc5, 0x4c, 0x5c, 0x9e, 0x41, 0xd1, 0x19, 0x37, 0x0d, 0xc1, 0x89, 0x22, 0xaa, 0x83, 0x03, 0x86, 0xbd, 0xf0, 0x6b, 0x75, 0xf4, 0xd4, 0x9d, 0x02, 0xc5, 0x80, 0x69, 0x26, 0xf5, 0xd0, 0x1b, 0x1a, 0x4f, 0x6a, 0x81, 0x46, 0x66, 0x4a, 0x03, 0xfa, 0x82, 0x07, 0x72, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4521 = { .name = "ecdsa_secp224r1_sha512_4521", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4521_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4521_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4521_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 180 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4522 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4522_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4522_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x36, 0x36, 0x35, 0x31, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4522_sig[] = { 0xf6, 0x5b, 0xf1, 0x6f, 0x7c, 0xed, 0x97, 0xb0, 0xcd, 0xc2, 0x2b, 0x08, 0xc6, 0x2e, 0xf8, 0x11, 0x30, 0x68, 0x13, 0x13, 0x4b, 0x00, 0x1b, 0xc5, 0x11, 0x40, 0xe8, 0x28, 0x3a, 0x9b, 0x7c, 0x00, 0x8c, 0xda, 0xf8, 0x03, 0x36, 0x8d, 0xf9, 0xee, 0x50, 0xe2, 0x74, 0xc7, 0xa9, 0xf9, 0x36, 0x93, 0x44, 0xd9, 0x91, 0x8e, 0x0c, 0x08, 0xdb, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4522 = { .name = "ecdsa_secp224r1_sha512_4522", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4522_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4522_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4522_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 181 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4523 for ECDSA, tcId is 182 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4523_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4523_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4523_sig[] = { 0x62, 0x39, 0x87, 0x74, 0x30, 0xe2, 0x68, 0xf1, 0xa3, 0xad, 0xa2, 0xc9, 0x03, 0x57, 0x24, 0x7c, 0x6c, 0xa6, 0x68, 0x7f, 0x49, 0x02, 0x3b, 0xed, 0x0f, 0xb5, 0xb5, 0x97, 0x35, 0x5c, 0x60, 0xc0, 0x9f, 0x0d, 0xac, 0xb9, 0xd7, 0x4b, 0x7c, 0xcd, 0xe7, 0x18, 0x06, 0xc5, 0x0f, 0xda, 0x87, 0x50, 0xc6, 0xec, 0xb7, 0xab, 0xba, 0x91, 0x0a, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4523 = { .name = "ecdsa_secp224r1_sha512_4523", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4523_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4523_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4523_sig, .siglen = 56, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 182 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4524 for ECDSA, tcId is 183 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4524_pubkey[] = { 0x44, 0x08, 0xe5, 0xc9, 0x5e, 0x33, 0x2a, 0xb6, 0xc2, 0x82, 0x3a, 0x63, 0x95, 0x93, 0x91, 0xd6, 0x0a, 0x6d, 0x69, 0xc5, 0x9e, 0xb1, 0xf7, 0xbd, 0x27, 0x22, 0x06, 0xb9, 0xf5, 0x27, 0x8e, 0x90, 0x1f, 0xb4, 0x77, 0x3a, 0xee, 0xb2, 0xd8, 0x25, 0x5b, 0xa4, 0xdf, 0x3c, 0xf3, 0xdb, 0x7e, 0x05, 0x57, 0xdb, 0xc6, 0x13, 0x4c, 0x55, 0xf3, 0xa6, }; static const unsigned char ecdsa_secp224r1_sha512_4524_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4524_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4524 = { .name = "ecdsa_secp224r1_sha512_4524", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4524_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4524_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4524_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 183 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4525 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4525_pubkey[] = { 0x44, 0x08, 0xe5, 0xc9, 0x5e, 0x33, 0x2a, 0xb6, 0xc2, 0x82, 0x3a, 0x63, 0x95, 0x93, 0x91, 0xd6, 0x0a, 0x6d, 0x69, 0xc5, 0x9e, 0xb1, 0xf7, 0xbd, 0x27, 0x22, 0x06, 0xb9, 0xf5, 0x27, 0x8e, 0x90, 0x1f, 0xb4, 0x77, 0x3a, 0xee, 0xb2, 0xd8, 0x25, 0x5b, 0xa4, 0xdf, 0x3c, 0xf3, 0xdb, 0x7e, 0x05, 0x57, 0xdb, 0xc6, 0x13, 0x4c, 0x55, 0xf3, 0xa6, }; static const unsigned char ecdsa_secp224r1_sha512_4525_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4525_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4525 = { .name = "ecdsa_secp224r1_sha512_4525", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4525_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4525_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4525_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 184 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4526 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4526_pubkey[] = { 0x31, 0x5a, 0x83, 0x00, 0x8d, 0xba, 0x00, 0xb3, 0x51, 0xc3, 0xf9, 0xfc, 0xa0, 0x81, 0x1c, 0x3a, 0xe1, 0x88, 0x4f, 0xa9, 0xa2, 0xa7, 0x5e, 0x6d, 0x5e, 0x71, 0xf2, 0x69, 0x50, 0x4b, 0xbe, 0x6a, 0x25, 0xbe, 0x25, 0x3b, 0x58, 0x2e, 0xfa, 0xb4, 0xb8, 0xb9, 0xe6, 0x13, 0x72, 0x76, 0x7a, 0x7a, 0x3a, 0x42, 0x3c, 0x09, 0x43, 0x12, 0x72, 0x96, }; static const unsigned char ecdsa_secp224r1_sha512_4526_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4526_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4526 = { .name = "ecdsa_secp224r1_sha512_4526", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4526_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4526_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4526_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 185 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4527 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4527_pubkey[] = { 0x2f, 0x69, 0x83, 0xb6, 0xe9, 0xf8, 0xef, 0x96, 0xc2, 0xd9, 0x81, 0xf6, 0x9b, 0xe5, 0x4b, 0x06, 0x59, 0x1e, 0xd7, 0x3f, 0xe4, 0x0c, 0x8a, 0x54, 0x6b, 0x93, 0x6a, 0x79, 0x71, 0xbf, 0x57, 0x72, 0x6c, 0x26, 0xc8, 0x11, 0xd7, 0x62, 0x5a, 0x9d, 0x85, 0x19, 0x51, 0xc1, 0xff, 0xfe, 0x23, 0x6b, 0x0e, 0xb3, 0xb8, 0x96, 0xbc, 0x4c, 0x98, 0xef, }; static const unsigned char ecdsa_secp224r1_sha512_4527_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4527_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4527 = { .name = "ecdsa_secp224r1_sha512_4527", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4527_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4527_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4527_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 186 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4528 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4528_pubkey[] = { 0xd1, 0xf5, 0x15, 0x97, 0x1c, 0xc9, 0x39, 0x11, 0x53, 0x56, 0x9c, 0x2b, 0xef, 0xa1, 0xf9, 0x15, 0xe2, 0x93, 0x11, 0x10, 0x75, 0x77, 0x60, 0xeb, 0xd7, 0xe6, 0x1f, 0x86, 0x41, 0xc3, 0xdb, 0x8b, 0xee, 0xa2, 0x0b, 0x13, 0x20, 0x53, 0x89, 0xdc, 0xc4, 0xba, 0x8a, 0x6a, 0xf4, 0xd6, 0xda, 0x26, 0x04, 0xca, 0xcd, 0x71, 0x84, 0xec, 0x9d, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4528_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4528_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4528 = { .name = "ecdsa_secp224r1_sha512_4528", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4528_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4528_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4528_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 187 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4529 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4529_pubkey[] = { 0xe8, 0xf9, 0x0a, 0x71, 0x77, 0x14, 0xf0, 0x15, 0x8d, 0x95, 0x21, 0xf1, 0x8c, 0x14, 0xae, 0x8c, 0x83, 0xbf, 0x1e, 0xeb, 0xa1, 0x15, 0xc4, 0x6c, 0xbd, 0xab, 0xb2, 0x0b, 0x66, 0xf5, 0x0a, 0xc1, 0x34, 0x61, 0xc0, 0x2d, 0xa0, 0x2e, 0xdf, 0xe4, 0x29, 0x6a, 0x1f, 0x54, 0x3d, 0xde, 0x7b, 0x43, 0x59, 0xf9, 0x05, 0xe0, 0x41, 0x93, 0xd3, 0xcf, }; static const unsigned char ecdsa_secp224r1_sha512_4529_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4529_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4529 = { .name = "ecdsa_secp224r1_sha512_4529", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4529_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4529_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4529_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 188 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4530 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4530_pubkey[] = { 0xe8, 0xf9, 0x0a, 0x71, 0x77, 0x14, 0xf0, 0x15, 0x8d, 0x95, 0x21, 0xf1, 0x8c, 0x14, 0xae, 0x8c, 0x83, 0xbf, 0x1e, 0xeb, 0xa1, 0x15, 0xc4, 0x6c, 0xbd, 0xab, 0xb2, 0x0b, 0x66, 0xf5, 0x0a, 0xc1, 0x34, 0x61, 0xc0, 0x2d, 0xa0, 0x2e, 0xdf, 0xe4, 0x29, 0x6a, 0x1f, 0x54, 0x3d, 0xde, 0x7b, 0x43, 0x59, 0xf9, 0x05, 0xe0, 0x41, 0x93, 0xd3, 0xcf, }; static const unsigned char ecdsa_secp224r1_sha512_4530_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4530_sig[] = { 0x03, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4530 = { .name = "ecdsa_secp224r1_sha512_4530", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4530_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4530_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4530_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 189 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4531 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4531_pubkey[] = { 0x72, 0x3b, 0xc0, 0xc9, 0xb7, 0xce, 0x6e, 0xa7, 0x84, 0xec, 0x07, 0x50, 0x36, 0xce, 0xde, 0x90, 0x45, 0x2c, 0x76, 0x57, 0x6b, 0xd8, 0xfb, 0x5b, 0xe4, 0xdc, 0x0f, 0xb1, 0xcf, 0x40, 0x58, 0x20, 0xd9, 0x2f, 0x48, 0x55, 0x2b, 0x55, 0x1c, 0x7b, 0x11, 0xf4, 0x94, 0x06, 0xdc, 0x89, 0x2f, 0xd6, 0x59, 0x97, 0x1a, 0xe7, 0xf9, 0xe7, 0x4b, 0x59, }; static const unsigned char ecdsa_secp224r1_sha512_4531_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4531_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4531 = { .name = "ecdsa_secp224r1_sha512_4531", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4531_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4531_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4531_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 190 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4532 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4532_pubkey[] = { 0x72, 0x3b, 0xc0, 0xc9, 0xb7, 0xce, 0x6e, 0xa7, 0x84, 0xec, 0x07, 0x50, 0x36, 0xce, 0xde, 0x90, 0x45, 0x2c, 0x76, 0x57, 0x6b, 0xd8, 0xfb, 0x5b, 0xe4, 0xdc, 0x0f, 0xb1, 0xcf, 0x40, 0x58, 0x20, 0xd9, 0x2f, 0x48, 0x55, 0x2b, 0x55, 0x1c, 0x7b, 0x11, 0xf4, 0x94, 0x06, 0xdc, 0x89, 0x2f, 0xd6, 0x59, 0x97, 0x1a, 0xe7, 0xf9, 0xe7, 0x4b, 0x59, }; static const unsigned char ecdsa_secp224r1_sha512_4532_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4532_sig[] = { 0x03, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4532 = { .name = "ecdsa_secp224r1_sha512_4532", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4532_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4532_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4532_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 191 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4533 for ECDSA, tcId is 192 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4533_pubkey[] = { 0xa0, 0xdc, 0xce, 0x12, 0x70, 0x84, 0xf9, 0x55, 0xa4, 0xe4, 0x9a, 0x7c, 0x86, 0xb9, 0xb9, 0x1b, 0x05, 0xae, 0x7a, 0xfd, 0x6e, 0xb0, 0x72, 0x25, 0xa6, 0x54, 0x1d, 0x88, 0xf1, 0x0a, 0x1d, 0x4f, 0xef, 0x93, 0x93, 0x49, 0x67, 0xbb, 0x6c, 0x5d, 0x87, 0x92, 0xbb, 0xd4, 0x7a, 0xb3, 0xab, 0xb4, 0x06, 0x89, 0x9a, 0x00, 0xb1, 0xc9, 0x1b, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha512_4533_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4533_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4533 = { .name = "ecdsa_secp224r1_sha512_4533", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4533_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4533_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4533_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 192 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4534 for ECDSA, tcId is 193 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4534_pubkey[] = { 0xa0, 0xdc, 0xce, 0x12, 0x70, 0x84, 0xf9, 0x55, 0xa4, 0xe4, 0x9a, 0x7c, 0x86, 0xb9, 0xb9, 0x1b, 0x05, 0xae, 0x7a, 0xfd, 0x6e, 0xb0, 0x72, 0x25, 0xa6, 0x54, 0x1d, 0x88, 0xf1, 0x0a, 0x1d, 0x4f, 0xef, 0x93, 0x93, 0x49, 0x67, 0xbb, 0x6c, 0x5d, 0x87, 0x92, 0xbb, 0xd4, 0x7a, 0xb3, 0xab, 0xb4, 0x06, 0x89, 0x9a, 0x00, 0xb1, 0xc9, 0x1b, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha512_4534_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4534_sig[] = { 0x03, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4534 = { .name = "ecdsa_secp224r1_sha512_4534", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4534_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4534_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4534_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 193 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4535 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4535_pubkey[] = { 0xa0, 0xdc, 0xce, 0x12, 0x70, 0x84, 0xf9, 0x55, 0xa4, 0xe4, 0x9a, 0x7c, 0x86, 0xb9, 0xb9, 0x1b, 0x05, 0xae, 0x7a, 0xfd, 0x6e, 0xb0, 0x72, 0x25, 0xa6, 0x54, 0x1d, 0x88, 0xf1, 0x0a, 0x1d, 0x4f, 0xef, 0x93, 0x93, 0x49, 0x67, 0xbb, 0x6c, 0x5d, 0x87, 0x92, 0xbb, 0xd4, 0x7a, 0xb3, 0xab, 0xb4, 0x06, 0x89, 0x9a, 0x00, 0xb1, 0xc9, 0x1b, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha512_4535_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4535_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4535 = { .name = "ecdsa_secp224r1_sha512_4535", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4535_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4535_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4535_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 194 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4536 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4536_pubkey[] = { 0xe1, 0x0a, 0xbc, 0x9f, 0xe1, 0x5b, 0xcc, 0x63, 0xf0, 0x09, 0xe1, 0x61, 0xaa, 0xee, 0x26, 0x60, 0x24, 0x15, 0xbc, 0xb4, 0x5b, 0xc6, 0xc9, 0x9c, 0xe7, 0xab, 0x2b, 0x10, 0xfb, 0xeb, 0xff, 0x4e, 0x4d, 0xe0, 0xdf, 0xaa, 0xf0, 0x45, 0x94, 0xdd, 0x60, 0x3c, 0xee, 0x80, 0xb5, 0xd9, 0xab, 0x78, 0xb6, 0x70, 0x76, 0x08, 0xa9, 0x5e, 0x57, 0x4d, }; static const unsigned char ecdsa_secp224r1_sha512_4536_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4536_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4536 = { .name = "ecdsa_secp224r1_sha512_4536", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4536_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4536_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4536_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 195 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4537 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4537_pubkey[] = { 0xfb, 0xfa, 0xbe, 0x6c, 0x64, 0x08, 0x56, 0xae, 0x5d, 0xcd, 0xc9, 0xe4, 0xb7, 0x06, 0xfb, 0x3d, 0xb2, 0x3d, 0xdc, 0xa4, 0x6b, 0x80, 0xb9, 0x05, 0x7a, 0xb9, 0xe4, 0x4f, 0x6b, 0x62, 0xd4, 0x69, 0x79, 0x77, 0xff, 0xe1, 0x9b, 0xf3, 0x18, 0x50, 0x83, 0xb1, 0xed, 0xe2, 0x16, 0x1a, 0xa5, 0x72, 0x54, 0x01, 0xa8, 0xf5, 0x78, 0x51, 0xfc, 0x82, }; static const unsigned char ecdsa_secp224r1_sha512_4537_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4537_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4537 = { .name = "ecdsa_secp224r1_sha512_4537", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4537_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4537_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4537_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 196 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4538 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4538_pubkey[] = { 0x91, 0xa8, 0x5b, 0x3c, 0x5e, 0x90, 0xb4, 0x09, 0xf6, 0xb8, 0xd3, 0xbc, 0xa9, 0x11, 0x7a, 0x54, 0xa4, 0x0f, 0x41, 0x62, 0xb3, 0x88, 0xbb, 0x93, 0x67, 0xfd, 0x64, 0x39, 0xf1, 0xce, 0xdf, 0x20, 0xab, 0x52, 0xeb, 0x71, 0x54, 0xb7, 0xea, 0x1f, 0x29, 0x34, 0xa9, 0xc8, 0x29, 0x29, 0x06, 0xe1, 0x8a, 0x0e, 0x57, 0x20, 0x02, 0xcd, 0x2f, 0x7c, }; static const unsigned char ecdsa_secp224r1_sha512_4538_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4538_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4538 = { .name = "ecdsa_secp224r1_sha512_4538", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4538_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4538_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4538_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 197 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4539 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4539_pubkey[] = { 0xd1, 0xca, 0x7a, 0x5c, 0x1a, 0xa0, 0x86, 0xb2, 0x95, 0x1c, 0x1a, 0xc1, 0x4e, 0x00, 0x5f, 0x00, 0x72, 0xfb, 0x28, 0x38, 0x39, 0x73, 0xa0, 0x51, 0x17, 0xf9, 0x65, 0x2c, 0xce, 0x52, 0x3c, 0x05, 0xeb, 0xe9, 0x49, 0x91, 0xc4, 0x7f, 0xec, 0xd2, 0x41, 0xd0, 0xa0, 0x7e, 0x86, 0xc8, 0x8a, 0xb3, 0xc6, 0x20, 0xea, 0xe7, 0x92, 0xab, 0xa3, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha512_4539_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4539_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4539 = { .name = "ecdsa_secp224r1_sha512_4539", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4539_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4539_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4539_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 198 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4540 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4540_pubkey[] = { 0x35, 0x65, 0xaf, 0x2a, 0x48, 0x1f, 0x93, 0x90, 0xe7, 0x1d, 0x76, 0x42, 0x71, 0x7d, 0x04, 0x27, 0xe0, 0x2e, 0x5e, 0x7d, 0xe8, 0xa3, 0xc0, 0xc1, 0xff, 0xd5, 0xf3, 0x3e, 0x94, 0x74, 0x54, 0x7e, 0x0d, 0x54, 0xdc, 0xaa, 0xe8, 0x54, 0x94, 0xc7, 0x4f, 0xaa, 0x23, 0x39, 0x4a, 0x05, 0x6e, 0x41, 0xc2, 0x83, 0x96, 0x38, 0xb8, 0x52, 0x3b, 0x72, }; static const unsigned char ecdsa_secp224r1_sha512_4540_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4540_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4540 = { .name = "ecdsa_secp224r1_sha512_4540", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4540_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4540_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4540_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 199 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4541 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4541_pubkey[] = { 0x29, 0xc6, 0x94, 0x79, 0x0f, 0xbd, 0x23, 0x77, 0x7c, 0xfd, 0xe4, 0x34, 0xba, 0xdc, 0xb0, 0x61, 0xa3, 0x26, 0xa5, 0x53, 0x42, 0x64, 0xbc, 0xfe, 0x19, 0x3c, 0x71, 0x6c, 0x17, 0x8a, 0x94, 0x3f, 0x7b, 0xd4, 0xfb, 0x13, 0x25, 0x65, 0xba, 0x60, 0x23, 0x58, 0xb1, 0x34, 0x33, 0xa5, 0x21, 0x7a, 0xc0, 0x4c, 0xc0, 0x35, 0x56, 0x6c, 0x73, 0xf8, }; static const unsigned char ecdsa_secp224r1_sha512_4541_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4541_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4541 = { .name = "ecdsa_secp224r1_sha512_4541", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4541_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4541_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4541_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 200 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4542 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4542_pubkey[] = { 0x8f, 0xd4, 0x3a, 0xac, 0x85, 0x56, 0xf4, 0x66, 0x5f, 0xd4, 0xc1, 0x3f, 0x4e, 0x15, 0x11, 0x40, 0xf4, 0x2a, 0x39, 0x57, 0x63, 0xc5, 0xda, 0x24, 0x7a, 0x39, 0x8f, 0x97, 0x96, 0x87, 0xd2, 0x4a, 0x9f, 0xcd, 0x6b, 0x20, 0xa5, 0x94, 0x51, 0xc3, 0x48, 0xa6, 0x36, 0x4d, 0x0f, 0xfa, 0xf0, 0xec, 0xfe, 0x16, 0x43, 0x13, 0xdb, 0x65, 0x94, 0xab, }; static const unsigned char ecdsa_secp224r1_sha512_4542_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4542_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4542 = { .name = "ecdsa_secp224r1_sha512_4542", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4542_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4542_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4542_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 201 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4543 for ECDSA, tcId is 202 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4543_pubkey[] = { 0xc2, 0xae, 0x0e, 0x35, 0x7a, 0x43, 0xf9, 0x75, 0x49, 0xa7, 0x25, 0xae, 0x37, 0x04, 0x44, 0x90, 0x51, 0xc9, 0x6b, 0xf3, 0x63, 0x33, 0x55, 0xc3, 0x5b, 0x6e, 0xb7, 0xe9, 0x6a, 0x84, 0xdf, 0xb6, 0xd4, 0x51, 0x7d, 0x1d, 0xe4, 0x6b, 0x18, 0x78, 0x6a, 0x50, 0x61, 0x78, 0x72, 0x4b, 0xf4, 0xae, 0x4f, 0x9e, 0x41, 0x8c, 0x75, 0xab, 0x17, 0xef, }; static const unsigned char ecdsa_secp224r1_sha512_4543_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4543_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4543 = { .name = "ecdsa_secp224r1_sha512_4543", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4543_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4543_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4543_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 202 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4544 for ECDSA, tcId is 203 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4544_pubkey[] = { 0xc2, 0xae, 0x0e, 0x35, 0x7a, 0x43, 0xf9, 0x75, 0x49, 0xa7, 0x25, 0xae, 0x37, 0x04, 0x44, 0x90, 0x51, 0xc9, 0x6b, 0xf3, 0x63, 0x33, 0x55, 0xc3, 0x5b, 0x6e, 0xb7, 0xe9, 0x6a, 0x84, 0xdf, 0xb6, 0xd4, 0x51, 0x7d, 0x1d, 0xe4, 0x6b, 0x18, 0x78, 0x6a, 0x50, 0x61, 0x78, 0x72, 0x4b, 0xf4, 0xae, 0x4f, 0x9e, 0x41, 0x8c, 0x75, 0xab, 0x17, 0xef, }; static const unsigned char ecdsa_secp224r1_sha512_4544_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4544_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4544 = { .name = "ecdsa_secp224r1_sha512_4544", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4544_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4544_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4544_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 203 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4545 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4545_pubkey[] = { 0x96, 0x16, 0x17, 0xd9, 0x85, 0x5f, 0x20, 0x2f, 0xd6, 0x00, 0xb5, 0x84, 0xab, 0xe9, 0x4a, 0x46, 0x67, 0x49, 0x27, 0xcf, 0xdc, 0x63, 0x33, 0xc5, 0xbe, 0x56, 0xce, 0x7b, 0x89, 0xb4, 0x15, 0x0d, 0x9c, 0xcd, 0xfb, 0xd7, 0x7e, 0x76, 0x82, 0xca, 0x86, 0x2c, 0x0c, 0x3e, 0x96, 0xd8, 0x9c, 0x91, 0x8b, 0x7d, 0x3b, 0x7b, 0xbb, 0x92, 0xff, 0x43, }; static const unsigned char ecdsa_secp224r1_sha512_4545_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4545_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4545 = { .name = "ecdsa_secp224r1_sha512_4545", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4545_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4545_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4545_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 204 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4546 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4546_pubkey[] = { 0x8d, 0xb5, 0x3f, 0xe4, 0x16, 0x8d, 0xf4, 0x3e, 0xe5, 0x38, 0xbc, 0x9d, 0x75, 0x8b, 0x8c, 0x26, 0xfa, 0x43, 0x3f, 0xb0, 0x10, 0x1b, 0xcb, 0xad, 0x03, 0x95, 0x85, 0xde, 0x23, 0x10, 0xdf, 0xc2, 0x08, 0x35, 0x37, 0x9e, 0xa4, 0x06, 0x99, 0x30, 0x36, 0xfd, 0x4b, 0xb0, 0xf6, 0x7d, 0x14, 0x76, 0x0e, 0x1e, 0xb4, 0x14, 0xc3, 0x2d, 0xd1, 0xf3, }; static const unsigned char ecdsa_secp224r1_sha512_4546_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4546_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4546 = { .name = "ecdsa_secp224r1_sha512_4546", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4546_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4546_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4546_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 205 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4547 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4547_pubkey[] = { 0x0b, 0x7f, 0xa6, 0x19, 0x83, 0xe7, 0xa2, 0x27, 0xf7, 0x38, 0x84, 0x7d, 0x45, 0x7f, 0x3e, 0x8c, 0xf0, 0xa4, 0x08, 0x5c, 0x31, 0x2f, 0xb6, 0xdc, 0xec, 0x82, 0x25, 0x70, 0xee, 0x74, 0x34, 0xce, 0x2f, 0xf3, 0xfb, 0xcc, 0x1d, 0x09, 0x60, 0x37, 0x98, 0x76, 0xe9, 0xdd, 0x5b, 0xed, 0x28, 0xaa, 0xd5, 0x76, 0xee, 0xa2, 0x33, 0xa4, 0x4b, 0x0d, }; static const unsigned char ecdsa_secp224r1_sha512_4547_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4547_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4547 = { .name = "ecdsa_secp224r1_sha512_4547", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4547_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4547_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4547_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 206 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4548 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4548_pubkey[] = { 0x55, 0xb2, 0x12, 0x91, 0x9c, 0xd6, 0x88, 0x6b, 0x13, 0xcd, 0x7a, 0x25, 0x56, 0x43, 0x0c, 0xe4, 0x42, 0xe8, 0x69, 0x42, 0xf1, 0xbf, 0x6e, 0x46, 0x18, 0xae, 0x36, 0x3e, 0x79, 0x5c, 0x66, 0x4a, 0xe9, 0x60, 0xee, 0x11, 0x06, 0x30, 0x8b, 0x7d, 0xba, 0x91, 0x24, 0x0a, 0xb0, 0xc3, 0xef, 0x8b, 0xeb, 0x7d, 0x0a, 0x4d, 0x7a, 0x10, 0x2a, 0x7f, }; static const unsigned char ecdsa_secp224r1_sha512_4548_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4548_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4548 = { .name = "ecdsa_secp224r1_sha512_4548", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4548_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4548_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4548_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 207 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4549 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4549_pubkey[] = { 0xc0, 0x28, 0x8a, 0x63, 0xce, 0x32, 0x26, 0x3f, 0x36, 0x51, 0x19, 0x8d, 0xab, 0x80, 0x1c, 0x89, 0x6f, 0xb9, 0x30, 0x83, 0x62, 0xfc, 0x40, 0xe3, 0x59, 0x59, 0xe1, 0x40, 0x10, 0xd0, 0x0b, 0xd1, 0xc2, 0x28, 0xcf, 0xb6, 0xa5, 0xfa, 0xa6, 0x47, 0x38, 0x78, 0x04, 0xe3, 0x4f, 0xa1, 0xa7, 0xf9, 0xfc, 0xc4, 0x72, 0xc0, 0x5e, 0xa2, 0xee, 0xda, }; static const unsigned char ecdsa_secp224r1_sha512_4549_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4549_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x50, 0x86, 0xa4, 0x32, 0x52, 0x11, 0xe6, 0x96, 0xeb, 0x6b, 0x31, 0xda, 0x8f, 0xf5, 0xc2, 0xc7, 0x28, 0xd3, 0x8d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4549 = { .name = "ecdsa_secp224r1_sha512_4549", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4549_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4549_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4549_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 208 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4550 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4550_pubkey[] = { 0x0c, 0x8e, 0x2c, 0xb5, 0xf6, 0xa9, 0x03, 0xe1, 0xcc, 0xcf, 0x3a, 0xc2, 0xd4, 0x65, 0xf1, 0xd0, 0xdc, 0x34, 0x52, 0x23, 0x7f, 0xd9, 0xe8, 0xa4, 0xdf, 0x5d, 0x53, 0x41, 0xd0, 0x44, 0xca, 0x8c, 0xee, 0xcb, 0x54, 0xa1, 0xb9, 0x51, 0x27, 0x09, 0x71, 0xe5, 0xab, 0x4e, 0xb2, 0x26, 0x11, 0x6c, 0x48, 0xc5, 0x53, 0x49, 0x9d, 0x1a, 0x48, 0x99, }; static const unsigned char ecdsa_secp224r1_sha512_4550_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4550_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4550 = { .name = "ecdsa_secp224r1_sha512_4550", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4550_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4550_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4550_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 209 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4551 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4551_pubkey[] = { 0x1f, 0xf6, 0xb9, 0x90, 0x17, 0x84, 0xd8, 0x8b, 0x25, 0x52, 0x7b, 0x37, 0x02, 0x62, 0x2a, 0x27, 0x34, 0xb8, 0x3d, 0x8a, 0x0f, 0xed, 0x0f, 0x74, 0x0b, 0xb7, 0x84, 0xe2, 0x0e, 0x83, 0xee, 0x0a, 0xa8, 0x29, 0x33, 0xdc, 0xdc, 0x63, 0x7a, 0x37, 0x60, 0x60, 0x6a, 0x04, 0x97, 0x4c, 0x2d, 0xc7, 0x5f, 0x12, 0x09, 0x5f, 0x8f, 0xda, 0xf0, 0x03, }; static const unsigned char ecdsa_secp224r1_sha512_4551_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4551_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4551 = { .name = "ecdsa_secp224r1_sha512_4551", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4551_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4551_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4551_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 210 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4552 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4552_pubkey[] = { 0xb2, 0x1f, 0xac, 0xa1, 0x7b, 0x68, 0x05, 0x87, 0x52, 0xd9, 0x43, 0xa8, 0x1f, 0x85, 0x3b, 0x80, 0x05, 0x62, 0xdf, 0x8b, 0x21, 0x72, 0xe1, 0x50, 0x95, 0x3c, 0x62, 0x42, 0x01, 0xc2, 0xc0, 0xf5, 0xed, 0x3b, 0x34, 0x29, 0x56, 0xca, 0xcd, 0x26, 0xf9, 0x09, 0x75, 0x62, 0xd0, 0xfb, 0x0a, 0x3d, 0xda, 0xb9, 0x1c, 0x5a, 0xe7, 0xe9, 0x0c, 0x01, }; static const unsigned char ecdsa_secp224r1_sha512_4552_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4552_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc1, 0x52, 0xaa, 0xfe, 0xa3, 0xa8, 0x61, 0x2e, 0xc8, 0x3a, 0x7d, 0xc9, 0x44, 0x8e, 0x66, 0x00, 0xae, 0x6a, 0x77, 0x2d, 0x75, 0xad, 0x2c, 0xaf, 0x19, 0xf9, 0x39, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4552 = { .name = "ecdsa_secp224r1_sha512_4552", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4552_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4552_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4552_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 211 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4553 for ECDSA, tcId is 212 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4553_pubkey[] = { 0xf4, 0x92, 0x78, 0x41, 0x9e, 0x4f, 0x50, 0x68, 0x89, 0xb0, 0x16, 0x8b, 0x1f, 0xce, 0x1f, 0x87, 0xee, 0x5b, 0x61, 0xef, 0xa0, 0xe7, 0x3c, 0x78, 0x33, 0xee, 0xb2, 0x9c, 0xb1, 0xb3, 0x34, 0xf8, 0x1b, 0xe8, 0xf0, 0x5f, 0x3b, 0x2e, 0x98, 0xd3, 0x8b, 0x03, 0x0c, 0xff, 0x57, 0x94, 0x7b, 0x96, 0x13, 0x5e, 0xc4, 0x46, 0x5c, 0x5e, 0x53, 0xf3, }; static const unsigned char ecdsa_secp224r1_sha512_4553_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4553_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4e, 0x15, 0x8e, 0xf8, 0x6c, 0xc5, 0x30, 0x54, 0xf1, 0x63, 0x5c, 0x74, 0xe6, 0x55, 0x08, 0x20, 0x60, 0x48, 0x92, 0x93, 0x15, 0xe0, 0x97, 0xa5, 0x9f, 0x15, 0x19, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4553 = { .name = "ecdsa_secp224r1_sha512_4553", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4553_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4553_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4553_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 212 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4554 for ECDSA, tcId is 213 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4554_pubkey[] = { 0x75, 0xc6, 0xa8, 0x86, 0xe2, 0x2b, 0xc0, 0x4b, 0x99, 0x6d, 0x4a, 0x19, 0x57, 0x5c, 0xe0, 0xc6, 0x68, 0x6b, 0x44, 0x9b, 0x6e, 0x05, 0xef, 0x13, 0x01, 0xbd, 0x8b, 0xa2, 0x33, 0xab, 0x29, 0xf6, 0x5d, 0xf2, 0xd4, 0x14, 0x4d, 0xa2, 0xb2, 0x1e, 0x90, 0x35, 0x9a, 0x06, 0x47, 0x65, 0xc9, 0x5e, 0x32, 0x5b, 0xb7, 0xe5, 0x4c, 0xa2, 0x8e, 0x40, }; static const unsigned char ecdsa_secp224r1_sha512_4554_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4554_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xe2, 0xac, 0x0b, 0x24, 0x51, 0x2e, 0x84, 0xf6, 0xfb, 0x01, 0x56, 0x20, 0xd6, 0x89, 0xd3, 0x0d, 0x14, 0x73, 0x6c, 0xf0, 0x0c, 0x18, 0x83, 0x87, 0x53, 0xc3, 0x81, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4554 = { .name = "ecdsa_secp224r1_sha512_4554", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4554_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4554_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4554_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 213 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4555 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4555_pubkey[] = { 0xf5, 0x54, 0x01, 0x4c, 0xc1, 0x4f, 0x31, 0x9c, 0x18, 0xf5, 0xfa, 0x6c, 0xd7, 0x39, 0x24, 0x90, 0x75, 0xff, 0x35, 0xba, 0x3b, 0x2a, 0xfd, 0xab, 0x53, 0x29, 0xef, 0x0f, 0xd2, 0xc5, 0x01, 0xf2, 0x5a, 0x70, 0x4a, 0xdd, 0xbd, 0x85, 0xc0, 0xe0, 0x22, 0x74, 0x89, 0x56, 0xe5, 0x99, 0x8d, 0x99, 0xc3, 0x87, 0xfb, 0xfd, 0x34, 0x3c, 0x89, 0xe0, }; static const unsigned char ecdsa_secp224r1_sha512_4555_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4555_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x52, 0x21, 0xf3, 0xc2, 0xde, 0x0c, 0x6f, 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0x79, 0xb5, 0x7f, 0x57, 0x51, 0x2b, 0x81, 0x4f, 0x41, 0x3a, 0xeb, 0xaf, 0xe7, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4555 = { .name = "ecdsa_secp224r1_sha512_4555", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4555_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4555_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4555_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 214 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4556 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4556_pubkey[] = { 0xbc, 0xfa, 0x8d, 0xb7, 0x04, 0xac, 0xa5, 0x6f, 0xeb, 0x23, 0xbd, 0x4b, 0x40, 0x49, 0x21, 0x32, 0x33, 0xaa, 0x65, 0x20, 0x45, 0xa0, 0xa8, 0x1a, 0x2e, 0x0d, 0xa6, 0x4c, 0x09, 0x1b, 0x35, 0x9f, 0x7b, 0xe7, 0xae, 0x00, 0xa0, 0xe9, 0x77, 0x7d, 0x95, 0x10, 0xf8, 0x47, 0x43, 0x0b, 0x5d, 0xfd, 0xa8, 0x78, 0xe6, 0x6d, 0x4f, 0xb0, 0xd6, 0x2f, }; static const unsigned char ecdsa_secp224r1_sha512_4556_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4556_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x22, 0x1f, 0x3c, 0x2d, 0xe0, 0xc6, 0xfb, 0xc0, 0x7f, 0xf0, 0x41, 0x50, 0x6d, 0xc7, 0x1b, 0x5a, 0x31, 0x20, 0x63, 0xd8, 0x7b, 0xeb, 0x4c, 0x30, 0xc2, 0x89, 0x21, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4556 = { .name = "ecdsa_secp224r1_sha512_4556", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4556_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4556_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4556_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 215 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4557 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4557_pubkey[] = { 0x9f, 0xd4, 0xd8, 0x28, 0xae, 0x98, 0x05, 0x6b, 0xe5, 0x8f, 0xa6, 0x9e, 0xaf, 0x9c, 0xde, 0x98, 0xca, 0x0e, 0xd9, 0xb4, 0x15, 0xd6, 0x46, 0x3f, 0xa1, 0x86, 0x4d, 0x9f, 0xb2, 0xa5, 0xe4, 0x1f, 0x10, 0xe8, 0x78, 0x94, 0x50, 0x21, 0x7d, 0xaa, 0xfd, 0x25, 0x9f, 0x20, 0x4a, 0xed, 0x87, 0xb0, 0xe2, 0x61, 0x00, 0xf4, 0x3f, 0x7c, 0x5b, 0xad, }; static const unsigned char ecdsa_secp224r1_sha512_4557_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4557_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x44, 0x3e, 0x78, 0x5b, 0xc1, 0x8d, 0xf7, 0x80, 0xff, 0xe0, 0x82, 0xa0, 0xdb, 0x8e, 0x36, 0xb4, 0x62, 0x40, 0xc7, 0xb0, 0xf7, 0xd6, 0x98, 0x61, 0x85, 0x12, 0x42, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4557 = { .name = "ecdsa_secp224r1_sha512_4557", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4557_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4557_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4557_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 216 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4558 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4558_pubkey[] = { 0x61, 0x23, 0xa3, 0x39, 0x69, 0xf2, 0xe0, 0x36, 0xfc, 0x27, 0x88, 0x5f, 0x55, 0x75, 0x5d, 0x39, 0x1c, 0xb0, 0xc2, 0xd3, 0xfa, 0xfb, 0x0c, 0x40, 0x56, 0xc1, 0x99, 0x5d, 0xa0, 0x3b, 0xb4, 0x90, 0x04, 0x7e, 0x88, 0xfe, 0x7e, 0x60, 0x89, 0x12, 0xa6, 0x20, 0x5b, 0x65, 0xf9, 0x50, 0xa8, 0xa0, 0xa3, 0x60, 0x36, 0x2d, 0x33, 0x39, 0xe6, 0x2c, }; static const unsigned char ecdsa_secp224r1_sha512_4558_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4558_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc2, 0xde, 0x0c, 0x6f, 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x4f, 0xd5, 0x01, 0x36, 0x87, 0x8b, 0x7e, 0x13, 0x41, 0x52, 0x1b, 0x2f, 0x88, 0x0b, 0x19, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4558 = { .name = "ecdsa_secp224r1_sha512_4558", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4558_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4558_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4558_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 217 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4559 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4559_pubkey[] = { 0xa1, 0x0b, 0x7a, 0xa7, 0x78, 0x5b, 0x2f, 0x27, 0x91, 0xb1, 0xd4, 0xc4, 0x3e, 0x12, 0x7a, 0xab, 0x56, 0x69, 0x61, 0x2d, 0x74, 0x0b, 0x38, 0xab, 0xaa, 0x0d, 0x30, 0x6e, 0xc1, 0x78, 0xf2, 0x16, 0xfa, 0xd3, 0x79, 0xad, 0x80, 0xba, 0xa0, 0xea, 0xc5, 0x7b, 0xf9, 0xa5, 0x6d, 0x44, 0x6d, 0x68, 0x55, 0x76, 0x37, 0x1b, 0x74, 0x76, 0x23, 0x82, }; static const unsigned char ecdsa_secp224r1_sha512_4559_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4559_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x9f, 0x56, 0xaa, 0x80, 0xae, 0x2b, 0xcf, 0x68, 0x9b, 0xe2, 0xc1, 0x1b, 0x5d, 0xb7, 0xe3, 0xa2, 0x89, 0x83, 0xb4, 0xa7, 0x59, 0x06, 0x92, 0xed, 0xcf, 0x5f, 0x8d, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4559 = { .name = "ecdsa_secp224r1_sha512_4559", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4559_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4559_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4559_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 218 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4560 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4560_pubkey[] = { 0xe0, 0x12, 0xc2, 0x3c, 0x68, 0x67, 0xe9, 0x55, 0x33, 0x13, 0xd0, 0x17, 0x9e, 0x9d, 0xb9, 0x53, 0xde, 0x7c, 0x36, 0x8c, 0xdb, 0x59, 0xab, 0xe0, 0x5f, 0x1c, 0x52, 0xba, 0xd3, 0x52, 0xa5, 0x7b, 0xb5, 0x9c, 0x45, 0x15, 0x93, 0x52, 0xc1, 0x14, 0xee, 0xb6, 0x96, 0xec, 0x3b, 0x79, 0xca, 0xa8, 0x35, 0xef, 0x5c, 0x2a, 0xe7, 0x1d, 0xdc, 0xfa, }; static const unsigned char ecdsa_secp224r1_sha512_4560_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4560_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0xad, 0x55, 0x01, 0x5c, 0x57, 0x9e, 0xd1, 0x37, 0xc5, 0x82, 0x36, 0xbb, 0x70, 0xb0, 0xa2, 0x32, 0x4e, 0x79, 0x10, 0x9e, 0x2f, 0xfc, 0x96, 0x42, 0x62, 0xf1, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4560 = { .name = "ecdsa_secp224r1_sha512_4560", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4560_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4560_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4560_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 219 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4561 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4561_pubkey[] = { 0xb9, 0xcc, 0xd7, 0xf0, 0xf3, 0x59, 0x49, 0x54, 0xaa, 0x72, 0x9b, 0xda, 0x4b, 0xe8, 0x83, 0xe1, 0x07, 0xe7, 0xf1, 0x22, 0x64, 0x65, 0xb6, 0x4c, 0x2c, 0xa7, 0x10, 0x57, 0x89, 0x82, 0x9d, 0x78, 0x70, 0x16, 0xc5, 0xc1, 0x18, 0xd3, 0xba, 0x33, 0x17, 0xa2, 0xda, 0x0a, 0x0d, 0xaa, 0xf5, 0x6d, 0x30, 0x04, 0xc1, 0x09, 0x62, 0x33, 0x3a, 0x9f, }; static const unsigned char ecdsa_secp224r1_sha512_4561_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4561_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xde, 0x03, 0xff, 0x82, 0x0a, 0x83, 0x6e, 0x39, 0xd3, 0xa8, 0x43, 0x52, 0x19, 0x28, 0x94, 0x44, 0xbb, 0xd2, 0x2d, 0xb7, 0xf7, 0x36, 0x8f, 0x84, 0x11, 0xc2, 0x7e, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4561 = { .name = "ecdsa_secp224r1_sha512_4561", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4561_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4561_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4561_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 220 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4562 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4562_pubkey[] = { 0x32, 0x1a, 0x17, 0xde, 0x02, 0x4f, 0xe8, 0x9c, 0x18, 0x64, 0xe1, 0x28, 0xb9, 0xe0, 0xaf, 0x3e, 0x6b, 0x48, 0x80, 0x0a, 0x70, 0xd6, 0xe8, 0x02, 0xb8, 0xb6, 0xdf, 0xfe, 0xb1, 0xa8, 0xae, 0x96, 0x91, 0x1d, 0xdb, 0xde, 0xb8, 0x39, 0x48, 0xa9, 0x92, 0xb1, 0xb0, 0xfe, 0x31, 0x66, 0x79, 0xc6, 0x48, 0x14, 0xb6, 0xa4, 0x5e, 0xc5, 0x6f, 0xe9, }; static const unsigned char ecdsa_secp224r1_sha512_4562_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4562_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xf1, 0x56, 0x05, 0x92, 0x28, 0x97, 0x42, 0x7b, 0x7d, 0x80, 0xab, 0x10, 0x6b, 0x44, 0x74, 0xd7, 0xfa, 0x96, 0x2e, 0x97, 0x0f, 0xfa, 0xd6, 0x66, 0x58, 0x0f, 0xd5, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4562 = { .name = "ecdsa_secp224r1_sha512_4562", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4562_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4562_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4562_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 221 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4563 for ECDSA, tcId is 222 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4563_pubkey[] = { 0x08, 0x84, 0x2f, 0x19, 0xb1, 0x14, 0xd1, 0x6b, 0xe2, 0x7b, 0xb4, 0xb6, 0x97, 0x13, 0x77, 0xed, 0x6b, 0x1d, 0x09, 0x15, 0xe1, 0x33, 0xa9, 0xeb, 0xf0, 0x16, 0x74, 0xee, 0x4c, 0x97, 0x73, 0x8b, 0x69, 0x12, 0xff, 0x71, 0x55, 0x3c, 0x4a, 0x74, 0x7c, 0x78, 0x2e, 0xdd, 0xd9, 0xd2, 0xa2, 0x0f, 0xbe, 0xae, 0x38, 0x86, 0x4d, 0x21, 0x78, 0x59, }; static const unsigned char ecdsa_secp224r1_sha512_4563_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4563_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4563 = { .name = "ecdsa_secp224r1_sha512_4563", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4563_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4563_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4563_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 222 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4564 for ECDSA, tcId is 223 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4564_pubkey[] = { 0x84, 0xd6, 0x51, 0x59, 0x6f, 0xd2, 0x34, 0x8f, 0x1b, 0xb5, 0xc8, 0xae, 0x9d, 0x22, 0xc8, 0xb2, 0x1c, 0x4f, 0x75, 0x09, 0x24, 0x0b, 0x60, 0x9a, 0xba, 0xd5, 0xcc, 0x24, 0x31, 0x96, 0xb6, 0x7b, 0x4c, 0xfa, 0xff, 0xaf, 0x0d, 0xce, 0x25, 0xab, 0x00, 0xbf, 0xea, 0xa1, 0xa6, 0x48, 0x21, 0x33, 0x2e, 0xfa, 0x6d, 0xed, 0xd8, 0x7c, 0xc9, 0xe7, }; static const unsigned char ecdsa_secp224r1_sha512_4564_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4564_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4564 = { .name = "ecdsa_secp224r1_sha512_4564", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4564_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4564_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4564_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 223 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4565 for ECDSA, tcId is 224 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4565_pubkey[] = { 0x8f, 0xbe, 0x39, 0xe7, 0x5b, 0xc4, 0xfd, 0x8a, 0x15, 0xe4, 0xb5, 0x2e, 0x4b, 0xbe, 0xbe, 0x20, 0x47, 0xd5, 0x43, 0x85, 0xa7, 0x11, 0x7e, 0x17, 0xa4, 0xd0, 0xb2, 0xb2, 0x07, 0xab, 0xdb, 0x40, 0x82, 0x45, 0x38, 0xe5, 0x78, 0x7c, 0x71, 0x8d, 0x65, 0x48, 0x58, 0x3f, 0x52, 0x3f, 0x6b, 0x5b, 0xbf, 0xa2, 0x39, 0xa7, 0xf6, 0x22, 0xc8, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha512_4565_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4565_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4565 = { .name = "ecdsa_secp224r1_sha512_4565", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4565_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4565_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4565_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 224 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4566 for ECDSA, tcId is 225 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4566_pubkey[] = { 0xc3, 0x36, 0xb3, 0x40, 0xbc, 0x99, 0xd4, 0x6c, 0x2c, 0x52, 0xdf, 0x54, 0x28, 0xb6, 0xa0, 0xc4, 0xeb, 0x2d, 0xa7, 0x6c, 0x42, 0x35, 0x30, 0xf7, 0x67, 0xcc, 0x76, 0x52, 0xf3, 0xab, 0x99, 0x81, 0xbd, 0x05, 0xd2, 0x95, 0x51, 0x23, 0x93, 0x5a, 0x37, 0x9c, 0xbb, 0x2d, 0x43, 0x61, 0xa1, 0x7d, 0x19, 0x87, 0x86, 0x73, 0xe1, 0xe1, 0x7d, 0xcc, }; static const unsigned char ecdsa_secp224r1_sha512_4566_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4566_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4566 = { .name = "ecdsa_secp224r1_sha512_4566", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4566_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4566_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4566_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 225 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4567 for ECDSA, tcId is 226 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4567_pubkey[] = { 0x81, 0x6f, 0xdc, 0xf3, 0x70, 0x82, 0x7e, 0x3f, 0x77, 0x71, 0x56, 0x4e, 0x1a, 0xa7, 0x3e, 0xd7, 0x3e, 0x62, 0x55, 0x6d, 0xea, 0xda, 0xd8, 0x97, 0x11, 0xce, 0xf6, 0x63, 0xed, 0xcd, 0xa0, 0xea, 0x42, 0x23, 0x5f, 0x4c, 0x9a, 0x8c, 0x13, 0xf7, 0x87, 0x35, 0x1f, 0xfe, 0x5c, 0xeb, 0x32, 0xf1, 0x5f, 0xc0, 0xcc, 0xb2, 0x4e, 0x0a, 0x40, 0x9c, }; static const unsigned char ecdsa_secp224r1_sha512_4567_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4567_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4567 = { .name = "ecdsa_secp224r1_sha512_4567", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4567_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4567_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4567_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 226 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4568 for ECDSA, tcId is 227 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4568_pubkey[] = { 0x64, 0x29, 0xd2, 0xb7, 0xb0, 0x7a, 0xb0, 0xd5, 0xea, 0x35, 0x29, 0x02, 0xdf, 0x0e, 0xfc, 0x03, 0x6d, 0x72, 0x70, 0xa0, 0xa6, 0xed, 0x39, 0xf6, 0x35, 0xd0, 0x4f, 0x39, 0x4f, 0x79, 0x32, 0x88, 0x3b, 0xc4, 0x53, 0x94, 0x15, 0x13, 0x24, 0xaa, 0xb2, 0x6a, 0xe2, 0x9b, 0xbd, 0x73, 0x85, 0xfa, 0x6a, 0x42, 0xc3, 0xdb, 0x84, 0x43, 0x28, 0x97, }; static const unsigned char ecdsa_secp224r1_sha512_4568_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4568_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4568 = { .name = "ecdsa_secp224r1_sha512_4568", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4568_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4568_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4568_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 227 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4569 for ECDSA, tcId is 228 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4569_pubkey[] = { 0x28, 0x8f, 0x38, 0xfd, 0x77, 0xdd, 0x16, 0x03, 0xff, 0x02, 0x75, 0xcb, 0x11, 0xcb, 0xa2, 0x80, 0xae, 0x34, 0x08, 0xaf, 0xfa, 0x6a, 0x76, 0x0f, 0x39, 0x6f, 0x1a, 0x1e, 0xc8, 0x4c, 0xa6, 0xfd, 0x77, 0x2c, 0x6a, 0xc6, 0xcc, 0x52, 0x3c, 0xc7, 0x2c, 0x2e, 0x7e, 0x95, 0xeb, 0x6a, 0x36, 0xa6, 0x6b, 0x5c, 0xca, 0x5a, 0x58, 0xba, 0x07, 0x8a, }; static const unsigned char ecdsa_secp224r1_sha512_4569_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4569_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4569 = { .name = "ecdsa_secp224r1_sha512_4569", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4569_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4569_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4569_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 228 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4570 for ECDSA, tcId is 229 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4570_pubkey[] = { 0xc7, 0x69, 0xc1, 0x38, 0xf9, 0xd7, 0x1f, 0xff, 0xf1, 0x13, 0x27, 0x3b, 0x71, 0xa4, 0xaf, 0xde, 0x4f, 0x99, 0x96, 0xa1, 0xc4, 0xbe, 0x65, 0x8a, 0x39, 0x03, 0xcf, 0x7f, 0x43, 0x0e, 0x51, 0x2b, 0x86, 0x8b, 0x37, 0xbb, 0x96, 0xbc, 0x17, 0xa0, 0x9b, 0x0a, 0xb0, 0x1b, 0x26, 0x2f, 0x2e, 0x23, 0xf3, 0x4f, 0x00, 0x41, 0x8f, 0x6b, 0x63, 0xd6, }; static const unsigned char ecdsa_secp224r1_sha512_4570_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4570_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4570 = { .name = "ecdsa_secp224r1_sha512_4570", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4570_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4570_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4570_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 229 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4571 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4571_pubkey[] = { 0x75, 0xf0, 0x07, 0xc1, 0x1b, 0x93, 0xe6, 0xf4, 0x6e, 0x9a, 0x81, 0x5c, 0xb7, 0x65, 0x99, 0x0a, 0x83, 0x05, 0xd3, 0xad, 0x8d, 0x22, 0xc7, 0x6f, 0xe6, 0xb2, 0x57, 0xcc, 0x71, 0xb5, 0xc1, 0x95, 0x1b, 0x5d, 0x46, 0x4c, 0x66, 0xdf, 0x7c, 0x29, 0x0c, 0xf0, 0xa4, 0xf1, 0x56, 0xbb, 0xf5, 0x2f, 0x1e, 0x41, 0xa7, 0x9d, 0xc6, 0x3a, 0xbc, 0xe5, }; static const unsigned char ecdsa_secp224r1_sha512_4571_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4571_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4571 = { .name = "ecdsa_secp224r1_sha512_4571", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4571_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4571_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4571_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 230 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4572 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4572_pubkey[] = { 0x12, 0x55, 0xfb, 0x94, 0xa0, 0xf2, 0x0e, 0x6f, 0xaa, 0x25, 0x05, 0xc3, 0x94, 0xcc, 0x3c, 0x39, 0xf0, 0x7d, 0xef, 0x41, 0x07, 0x12, 0x7d, 0xff, 0xc4, 0xda, 0xcb, 0x6e, 0xea, 0x73, 0xc1, 0x04, 0x45, 0x44, 0xa1, 0x49, 0x65, 0x60, 0xbd, 0x1b, 0x04, 0x9f, 0xf6, 0x15, 0xe6, 0x8a, 0xe0, 0xd4, 0x83, 0x22, 0x03, 0x27, 0x56, 0x98, 0x84, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4572_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4572_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4572 = { .name = "ecdsa_secp224r1_sha512_4572", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4572_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4572_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4572_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 231 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4573 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4573_pubkey[] = { 0xf6, 0x56, 0xa6, 0x32, 0xa0, 0x80, 0x4c, 0xf6, 0x88, 0x44, 0x6b, 0x26, 0x12, 0x08, 0xf7, 0x93, 0x37, 0x3c, 0x5f, 0xf4, 0x45, 0x4b, 0xd1, 0xe0, 0xa8, 0x82, 0x11, 0x3f, 0x30, 0xa2, 0x5d, 0x6f, 0x58, 0x6e, 0x02, 0xdd, 0x4d, 0xcb, 0xf7, 0x3d, 0x96, 0xaf, 0x3e, 0x48, 0x3b, 0x7a, 0xcb, 0x5f, 0x8f, 0x4c, 0x06, 0x45, 0x0d, 0xec, 0x19, 0x82, }; static const unsigned char ecdsa_secp224r1_sha512_4573_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4573_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4573 = { .name = "ecdsa_secp224r1_sha512_4573", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4573_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4573_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4573_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 232 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4574 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4574_pubkey[] = { 0x8f, 0xb5, 0x72, 0xde, 0x4d, 0xaf, 0x76, 0x70, 0x26, 0x24, 0xce, 0x4e, 0xd8, 0x19, 0xd0, 0x26, 0x76, 0x22, 0x24, 0xe8, 0xa5, 0x42, 0x15, 0xbf, 0x81, 0xb2, 0x02, 0xa3, 0xf0, 0x74, 0xd2, 0x0e, 0x1d, 0xa7, 0x23, 0x2d, 0x27, 0x94, 0x61, 0x73, 0x2b, 0xc1, 0xba, 0xe0, 0xc5, 0x41, 0x6a, 0xb9, 0xd6, 0x96, 0x30, 0x86, 0x22, 0xe7, 0xff, 0xe8, }; static const unsigned char ecdsa_secp224r1_sha512_4574_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4574_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0xec, 0x0c, 0xe3, 0xfa, 0x72, 0x5c, 0x10, 0x27, 0x47, 0x5a, 0x5f, 0x5b, 0xf4, 0xee, 0x98, 0x0d, 0xe6, 0x1c, 0x3b, 0x48, 0x75, 0xaf, 0xe8, 0xb6, 0x54, 0xb2, 0x4e, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4574 = { .name = "ecdsa_secp224r1_sha512_4574", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4574_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4574_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4574_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 233 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4575 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4575_pubkey[] = { 0x8f, 0xb5, 0x72, 0xde, 0x4d, 0xaf, 0x76, 0x70, 0x26, 0x24, 0xce, 0x4e, 0xd8, 0x19, 0xd0, 0x26, 0x76, 0x22, 0x24, 0xe8, 0xa5, 0x42, 0x15, 0xbf, 0x81, 0xb2, 0x02, 0xa3, 0x0f, 0x8b, 0x2d, 0xf1, 0xe2, 0x58, 0xdc, 0xd2, 0xd8, 0x6b, 0x9e, 0x8c, 0xd4, 0x3e, 0x45, 0x1e, 0x3a, 0xbe, 0x95, 0x46, 0x29, 0x69, 0xcf, 0x79, 0xdd, 0x18, 0x00, 0x19, }; static const unsigned char ecdsa_secp224r1_sha512_4575_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4575_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0xec, 0x0c, 0xe3, 0xfa, 0x72, 0x5c, 0x10, 0x27, 0x47, 0x5a, 0x5f, 0x5b, 0xf4, 0xee, 0x98, 0x0d, 0xe6, 0x1c, 0x3b, 0x48, 0x75, 0xaf, 0xe8, 0xb6, 0x54, 0xb2, 0x4e, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4575 = { .name = "ecdsa_secp224r1_sha512_4575", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4575_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4575_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4575_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 234 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4576 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4576_pubkey[] = { 0xe5, 0x46, 0x2d, 0x3a, 0x83, 0x8d, 0x4a, 0x14, 0xde, 0x96, 0xa7, 0xb0, 0xb1, 0x07, 0x1e, 0xb6, 0x22, 0xae, 0x6e, 0x71, 0xed, 0xe8, 0xf9, 0x5f, 0xf0, 0x1c, 0x21, 0x21, 0x36, 0x8e, 0x3a, 0x90, 0xd8, 0x58, 0x4e, 0x19, 0x46, 0x16, 0xd3, 0x21, 0x1a, 0x75, 0x41, 0xf6, 0xa0, 0x96, 0x03, 0x39, 0xca, 0xb2, 0x8e, 0x8b, 0xfd, 0x6b, 0x1d, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4576_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4576_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4576 = { .name = "ecdsa_secp224r1_sha512_4576", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4576_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4576_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4576_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 235 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4577 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4577_pubkey[] = { 0x5d, 0x97, 0x67, 0x0c, 0x1f, 0x12, 0x1f, 0x7f, 0x1b, 0xa5, 0x41, 0x50, 0x56, 0x09, 0xf2, 0x01, 0x43, 0xb3, 0x12, 0xa7, 0xbb, 0x49, 0xd3, 0x76, 0x69, 0x0e, 0x18, 0x31, 0xc1, 0xb4, 0x56, 0x71, 0x41, 0xa7, 0xb5, 0x34, 0xe2, 0x1b, 0xd2, 0xf7, 0x06, 0xae, 0x03, 0x41, 0x69, 0xab, 0x9c, 0x3f, 0x85, 0x36, 0x14, 0x79, 0x04, 0xde, 0x8c, 0x5f, }; static const unsigned char ecdsa_secp224r1_sha512_4577_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4577_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4577 = { .name = "ecdsa_secp224r1_sha512_4577", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4577_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4577_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4577_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 236 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4578 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4578_pubkey[] = { 0xd2, 0x67, 0x52, 0x78, 0xda, 0x2d, 0x7d, 0xaa, 0x83, 0x73, 0xdd, 0x63, 0xb7, 0xaa, 0x46, 0xcb, 0x14, 0x76, 0x65, 0x71, 0xc2, 0xd8, 0x09, 0x8b, 0x83, 0xa1, 0x02, 0xa5, 0x69, 0x9b, 0x57, 0x2d, 0x4b, 0x95, 0x14, 0x97, 0x41, 0x8a, 0x37, 0x69, 0x30, 0x02, 0x2d, 0x48, 0xfe, 0x59, 0x96, 0x6b, 0x15, 0x8f, 0xa0, 0x83, 0x40, 0xe2, 0x4b, 0x98, }; static const unsigned char ecdsa_secp224r1_sha512_4578_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4578_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4578 = { .name = "ecdsa_secp224r1_sha512_4578", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4578_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4578_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4578_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 237 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4579 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4579_pubkey[] = { 0x5a, 0x5c, 0xd1, 0x16, 0x23, 0x88, 0x34, 0x87, 0x34, 0xda, 0xe2, 0x0e, 0x22, 0x35, 0xae, 0x2c, 0x46, 0x4a, 0xde, 0xf0, 0xa1, 0x96, 0xf9, 0xaa, 0xf0, 0x24, 0x82, 0xca, 0x2a, 0xe9, 0x4e, 0x8b, 0x9a, 0x02, 0x43, 0x75, 0x03, 0x64, 0x29, 0xb6, 0x32, 0xab, 0x48, 0x5e, 0x02, 0xc5, 0xa9, 0x66, 0x5b, 0x28, 0x9b, 0x8a, 0x47, 0xba, 0xde, 0x8f, }; static const unsigned char ecdsa_secp224r1_sha512_4579_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4579_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4579 = { .name = "ecdsa_secp224r1_sha512_4579", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4579_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4579_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4579_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 238 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4580 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4580_pubkey[] = { 0xca, 0xcd, 0x93, 0xeb, 0x11, 0xa8, 0x21, 0xde, 0x3d, 0x88, 0x2b, 0xab, 0x74, 0x11, 0xe7, 0xc7, 0x7f, 0x23, 0xc0, 0x8d, 0xa1, 0x74, 0x18, 0x9c, 0xc9, 0x87, 0xdc, 0x41, 0x71, 0x6f, 0xe3, 0x78, 0xab, 0x84, 0x21, 0x61, 0xbc, 0x16, 0xde, 0xf6, 0xe0, 0x37, 0xd4, 0xba, 0x9d, 0x30, 0xd8, 0xcb, 0x41, 0xad, 0x30, 0xcf, 0x06, 0x56, 0xe5, 0x0b, }; static const unsigned char ecdsa_secp224r1_sha512_4580_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4580_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4580 = { .name = "ecdsa_secp224r1_sha512_4580", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4580_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4580_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4580_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 239 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4581 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4581_pubkey[] = { 0xcf, 0x46, 0x96, 0x00, 0x60, 0x45, 0x3e, 0x55, 0x57, 0x7f, 0x1b, 0xee, 0x6a, 0x9c, 0x47, 0x09, 0xe7, 0xcd, 0xcb, 0xa4, 0x5c, 0xa8, 0x02, 0x0b, 0xb3, 0x53, 0x69, 0x31, 0xea, 0x4e, 0xc3, 0x33, 0x09, 0x21, 0x38, 0x64, 0xa1, 0x31, 0x8a, 0xee, 0x0a, 0x86, 0xd8, 0xb6, 0xf0, 0xc1, 0xb9, 0x74, 0x1c, 0xd6, 0xbd, 0x5d, 0xea, 0x4f, 0x40, 0x66, }; static const unsigned char ecdsa_secp224r1_sha512_4581_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4581_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4581 = { .name = "ecdsa_secp224r1_sha512_4581", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4581_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4581_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4581_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 240 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4582 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4582_pubkey[] = { 0x62, 0xf4, 0xea, 0xf3, 0x79, 0x7b, 0xdc, 0x3d, 0x5d, 0x8c, 0xfa, 0xa0, 0x7b, 0x5a, 0xf7, 0x06, 0x0e, 0x13, 0x1b, 0x18, 0x3c, 0xa4, 0xed, 0xed, 0x48, 0x19, 0xe5, 0x61, 0xbf, 0xf3, 0xea, 0xdd, 0x7b, 0x55, 0xdb, 0x2d, 0xc0, 0x1b, 0xd2, 0x05, 0x69, 0xe6, 0xc4, 0x7c, 0x92, 0x12, 0xf9, 0xb2, 0xd6, 0x79, 0x37, 0x95, 0xb5, 0x1e, 0x4f, 0x6c, }; static const unsigned char ecdsa_secp224r1_sha512_4582_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4582_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4582 = { .name = "ecdsa_secp224r1_sha512_4582", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4582_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4582_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4582_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 241 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4583 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4583_pubkey[] = { 0xc4, 0xa4, 0xbf, 0x5a, 0xe0, 0x13, 0x85, 0x87, 0xf5, 0x0a, 0xb7, 0xa2, 0xc3, 0x36, 0xa4, 0x30, 0x52, 0x7a, 0x86, 0xf5, 0x9f, 0x97, 0x65, 0xc2, 0xf3, 0xf5, 0x48, 0x8d, 0xf9, 0x41, 0x9b, 0xf9, 0xdf, 0x5f, 0x12, 0x1d, 0xe3, 0xa3, 0x2d, 0xb1, 0x7b, 0x49, 0xc7, 0x2b, 0x60, 0x6b, 0x2b, 0xe5, 0xce, 0x56, 0xac, 0xb5, 0x65, 0xcc, 0x12, 0xb7, }; static const unsigned char ecdsa_secp224r1_sha512_4583_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4583_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4583 = { .name = "ecdsa_secp224r1_sha512_4583", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4583_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4583_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4583_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 242 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4584 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4584_pubkey[] = { 0xe7, 0xcb, 0x5a, 0xe5, 0x4d, 0xbe, 0x61, 0x9a, 0xb5, 0x06, 0x9f, 0x14, 0x56, 0x62, 0x36, 0xb3, 0xc6, 0xb0, 0xb4, 0x4f, 0x1c, 0x4c, 0x53, 0x1e, 0x66, 0xd8, 0x9b, 0x3e, 0x64, 0xbe, 0x7f, 0xdc, 0x18, 0x78, 0x96, 0x29, 0xdf, 0xdd, 0xf7, 0x15, 0x8f, 0x8f, 0xf2, 0x7a, 0xbd, 0x55, 0x3b, 0xfa, 0xc3, 0xf7, 0xc8, 0x74, 0xbc, 0xcd, 0xc3, 0x1b, }; static const unsigned char ecdsa_secp224r1_sha512_4584_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4584_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4584 = { .name = "ecdsa_secp224r1_sha512_4584", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4584_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4584_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4584_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 243 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4585 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4585_pubkey[] = { 0x30, 0xdb, 0x5d, 0x82, 0x79, 0x31, 0x9c, 0xf5, 0xa3, 0xb6, 0x76, 0x8a, 0x0c, 0x5e, 0x5c, 0x84, 0x75, 0x2f, 0x63, 0x14, 0xf7, 0x35, 0xd6, 0x3f, 0x6c, 0x56, 0x50, 0xcd, 0xd3, 0x2f, 0xb5, 0x4f, 0x74, 0xd4, 0xa5, 0x08, 0x8e, 0x67, 0x74, 0xa1, 0x32, 0x01, 0x68, 0x36, 0x42, 0x79, 0x0d, 0x2e, 0x69, 0xe5, 0x5e, 0x4f, 0x47, 0x61, 0x29, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4585_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4585_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4585 = { .name = "ecdsa_secp224r1_sha512_4585", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4585_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4585_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4585_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 244 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4586 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4586_pubkey[] = { 0x7d, 0xb2, 0x7d, 0xa4, 0xd6, 0x7a, 0x2d, 0xe0, 0xc7, 0x88, 0x15, 0x80, 0x97, 0x19, 0xbd, 0xf6, 0x97, 0x63, 0x32, 0xc6, 0x7e, 0xf0, 0xf3, 0x82, 0x7d, 0xf4, 0xad, 0xc2, 0x2a, 0xb3, 0x7a, 0xec, 0x2e, 0xed, 0x0d, 0x5e, 0x67, 0xac, 0xfd, 0x6a, 0x19, 0x5f, 0x21, 0x03, 0x2d, 0x9a, 0xf7, 0x1c, 0xe7, 0x3e, 0x12, 0x0f, 0xdd, 0xa2, 0x9f, 0x1a, }; static const unsigned char ecdsa_secp224r1_sha512_4586_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4586_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4586 = { .name = "ecdsa_secp224r1_sha512_4586", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4586_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4586_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4586_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 245 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4587 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4587_pubkey[] = { 0xd1, 0xc1, 0x9d, 0x46, 0xb5, 0x17, 0xbb, 0x3b, 0xd7, 0xbd, 0xf0, 0x74, 0xff, 0x97, 0x5c, 0x0d, 0xbd, 0x2b, 0xde, 0x10, 0xd1, 0xad, 0x21, 0x7e, 0x58, 0xeb, 0xc8, 0xc5, 0x5a, 0xc8, 0x98, 0xc0, 0x40, 0xa1, 0x85, 0x80, 0x4d, 0xdb, 0x03, 0x2b, 0x48, 0x10, 0x3d, 0x6c, 0x8d, 0x12, 0x04, 0x3d, 0x3a, 0x4f, 0xec, 0x93, 0xab, 0xa7, 0xa6, 0xd7, }; static const unsigned char ecdsa_secp224r1_sha512_4587_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4587_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4587 = { .name = "ecdsa_secp224r1_sha512_4587", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4587_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4587_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4587_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 246 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4588 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4588_pubkey[] = { 0xd9, 0x5a, 0xc9, 0x6a, 0xe9, 0xdb, 0xfb, 0x80, 0x91, 0x18, 0x62, 0xe0, 0x0a, 0x4c, 0xad, 0xbc, 0xb2, 0x35, 0x9f, 0x49, 0x9b, 0x53, 0xbe, 0x00, 0x7f, 0x07, 0x11, 0xc0, 0x93, 0xd3, 0xda, 0x93, 0x1a, 0xcb, 0xb9, 0x24, 0x28, 0x00, 0xdc, 0x52, 0x16, 0x95, 0xb4, 0xf1, 0x9f, 0xf2, 0xdf, 0xfc, 0x36, 0x13, 0xf4, 0x0b, 0xdb, 0x15, 0xc3, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha512_4588_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4588_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4588 = { .name = "ecdsa_secp224r1_sha512_4588", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4588_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4588_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4588_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 247 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4589 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4589_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4589_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4589_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4589 = { .name = "ecdsa_secp224r1_sha512_4589", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4589_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4589_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4589_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 248 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4590 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4590_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4590_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4590_sig[] = { 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x50, 0x86, 0xa4, 0x32, 0x52, 0x11, 0xe6, 0x96, 0xeb, 0x6b, 0x31, 0xda, 0x8f, 0xf5, 0xc2, 0xc7, 0x28, 0xd3, 0x8d, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4590 = { .name = "ecdsa_secp224r1_sha512_4590", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4590_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4590_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4590_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 249 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4591 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4591_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha512_4591_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4591_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4591 = { .name = "ecdsa_secp224r1_sha512_4591", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4591_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4591_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4591_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 250 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4592 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4592_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha512_4592_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4592_sig[] = { 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x50, 0x86, 0xa4, 0x32, 0x52, 0x11, 0xe6, 0x96, 0xeb, 0x6b, 0x31, 0xda, 0x8f, 0xf5, 0xc2, 0xc7, 0x28, 0xd3, 0x8d, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4592 = { .name = "ecdsa_secp224r1_sha512_4592", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4592_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4592_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4592_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 251 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4593 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4593_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4593_sig[] = { 0xf7, 0x29, 0x15, 0xd6, 0xd9, 0x16, 0x01, 0x42, 0x79, 0x61, 0x61, 0x86, 0x86, 0x9a, 0x01, 0x22, 0x8f, 0xcd, 0x9f, 0x1b, 0x40, 0x78, 0x35, 0x30, 0x18, 0xb3, 0x99, 0xab, 0xb6, 0x7f, 0x2b, 0x91, 0xee, 0xeb, 0x91, 0x03, 0x81, 0xf5, 0xb4, 0x61, 0xa4, 0xa3, 0x9c, 0x64, 0x2a, 0xea, 0x47, 0x92, 0x01, 0x3d, 0x4e, 0xb6, 0x3d, 0xa1, 0x83, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4593 = { .name = "ecdsa_secp224r1_sha512_4593", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4593_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha512_4593_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 252 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4594 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4594_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4594_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha512_4594_sig[] = { 0xa5, 0xd1, 0x79, 0xc3, 0x36, 0xcc, 0xdc, 0x76, 0x0d, 0xfd, 0xdd, 0x91, 0x3c, 0xdf, 0x8e, 0xa4, 0x68, 0xd0, 0xf4, 0x68, 0x6f, 0x7b, 0x2d, 0x38, 0x25, 0x69, 0x8e, 0xd7, 0xa7, 0x7f, 0x12, 0x06, 0x0a, 0x4d, 0x1b, 0x94, 0xb0, 0xd1, 0xc4, 0x43, 0xea, 0xe3, 0xad, 0x6e, 0x21, 0xb7, 0xea, 0xcf, 0xdf, 0x6f, 0xbf, 0x39, 0xa2, 0xb2, 0x96, 0x58, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4594 = { .name = "ecdsa_secp224r1_sha512_4594", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4594_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4594_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha512_4594_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 253 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4595 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4595_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4595_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4595_sig[] = { 0xb7, 0xc6, 0x5d, 0xce, 0x56, 0xab, 0xe2, 0x4f, 0xb4, 0x59, 0x2e, 0xce, 0x5a, 0xc1, 0xe6, 0xee, 0x83, 0x53, 0x43, 0x1f, 0x74, 0x52, 0x40, 0x9a, 0xdd, 0x73, 0x68, 0x84, 0xe5, 0xfe, 0x5d, 0xb7, 0x98, 0x89, 0x31, 0x02, 0x6b, 0x93, 0x7d, 0xc4, 0xef, 0x98, 0x3f, 0xe4, 0x46, 0xca, 0x13, 0x4d, 0x29, 0xb9, 0x4a, 0xc7, 0x77, 0xcd, 0xe3, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4595 = { .name = "ecdsa_secp224r1_sha512_4595", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4595_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4595_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4595_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 254 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4596 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4596_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4596_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4596_sig[] = { 0x05, 0xc5, 0x63, 0xd3, 0xa4, 0xba, 0xd8, 0x74, 0xe4, 0x61, 0x0a, 0xdf, 0xa5, 0x77, 0x77, 0xa5, 0x9f, 0x99, 0x5b, 0xfa, 0x06, 0xef, 0x97, 0xbf, 0x12, 0x5a, 0x49, 0x88, 0x97, 0xed, 0x68, 0xf5, 0x46, 0xcf, 0x4b, 0xb4, 0x99, 0x85, 0x24, 0xc1, 0x83, 0x56, 0xf3, 0xaf, 0x16, 0x2d, 0x2b, 0xf2, 0x74, 0x4b, 0xe9, 0x33, 0x57, 0xbc, 0x4b, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4596 = { .name = "ecdsa_secp224r1_sha512_4596", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4596_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4596_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha512_4596_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 255 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4597 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4597_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4597_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4597_sig[] = { 0xc7, 0xa6, 0xf3, 0x58, 0xb7, 0xd9, 0x38, 0x15, 0x18, 0x9a, 0xe5, 0xd2, 0xc3, 0xab, 0x4d, 0x4e, 0x05, 0xf4, 0x31, 0x76, 0xa5, 0x2d, 0xd4, 0xfc, 0x5b, 0x48, 0xa3, 0x4a, 0xa2, 0x45, 0x85, 0x12, 0xbb, 0x8d, 0xbe, 0x6f, 0x1b, 0xd6, 0xeb, 0x01, 0xd2, 0xd7, 0x7d, 0x56, 0x24, 0xe8, 0x54, 0x7b, 0xf8, 0x7d, 0x85, 0xfc, 0x73, 0x1c, 0x0c, 0x86, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4597 = { .name = "ecdsa_secp224r1_sha512_4597", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4597_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4597_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4597_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 256 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4598 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4598_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4598_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4598_sig[] = { 0x5f, 0x56, 0xca, 0x58, 0x7d, 0x16, 0x66, 0x4a, 0x20, 0xda, 0xd1, 0x3d, 0xf8, 0x5a, 0x47, 0x59, 0x78, 0xe5, 0xce, 0xe8, 0x1a, 0x8d, 0x0f, 0x49, 0xfa, 0xaf, 0x61, 0x58, 0xb6, 0x4e, 0xf5, 0x9d, 0x79, 0x46, 0x1f, 0xe1, 0xa0, 0x9a, 0x58, 0x64, 0x90, 0x74, 0x35, 0xf7, 0x0b, 0xd7, 0x5f, 0x18, 0x3a, 0xfb, 0x11, 0x90, 0x3f, 0x56, 0x0b, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4598 = { .name = "ecdsa_secp224r1_sha512_4598", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4598_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4598_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4598_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 257 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4599 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4599_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4599_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4599_sig[] = { 0xdd, 0x94, 0xf5, 0xb5, 0x6e, 0x99, 0x47, 0xd0, 0x07, 0xe7, 0xc8, 0xef, 0xd8, 0x94, 0xa5, 0xc8, 0x82, 0xf1, 0xd0, 0xb5, 0xdd, 0x56, 0xc3, 0x2b, 0x5b, 0x26, 0x65, 0x21, 0xfb, 0xc8, 0x83, 0x74, 0x1b, 0xd2, 0x7c, 0x59, 0x95, 0x8a, 0xe1, 0x7b, 0xa6, 0xe4, 0xa4, 0x1a, 0xd1, 0xed, 0xec, 0xa9, 0xa3, 0xba, 0x31, 0xc8, 0xf2, 0x33, 0xb5, 0xac, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4599 = { .name = "ecdsa_secp224r1_sha512_4599", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4599_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4599_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4599_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 258 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4600 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4600_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha512_4600_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4600_sig[] = { 0x80, 0x71, 0xe6, 0x68, 0x2c, 0x6e, 0x8a, 0x32, 0x70, 0x6d, 0xc7, 0xe4, 0x11, 0x50, 0x39, 0x46, 0x54, 0x6b, 0x31, 0xff, 0xf2, 0x7d, 0xcc, 0xe1, 0x88, 0xae, 0x38, 0x9f, 0xdc, 0x39, 0x6c, 0x79, 0x7d, 0x44, 0xed, 0xf7, 0x94, 0x43, 0x2d, 0x1d, 0xa0, 0x91, 0xf8, 0xc7, 0x62, 0x97, 0x4d, 0x8c, 0xe1, 0xf0, 0x6e, 0x08, 0xca, 0x01, 0x36, 0x22, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4600 = { .name = "ecdsa_secp224r1_sha512_4600", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4600_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4600_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4600_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 259 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4601 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4601_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha512_4601_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4601_sig[] = { 0x79, 0x16, 0x24, 0xe5, 0xf2, 0x34, 0xb8, 0x95, 0x0d, 0x50, 0x9d, 0x0b, 0x45, 0x6e, 0xf6, 0xfa, 0x77, 0x8b, 0x19, 0xdc, 0xcd, 0x60, 0x9d, 0x49, 0x6b, 0x62, 0xa2, 0x11, 0x6c, 0x51, 0xe8, 0x46, 0xfa, 0x53, 0xd0, 0x3d, 0x42, 0xf7, 0x98, 0xe6, 0xbb, 0x90, 0x95, 0x4f, 0x9a, 0x48, 0xc1, 0x79, 0x4b, 0x47, 0xe8, 0x4a, 0xc9, 0x7b, 0x46, 0x0a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4601 = { .name = "ecdsa_secp224r1_sha512_4601", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4601_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4601_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4601_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 260 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4602 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4602_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha512_4602_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4602_sig[] = { 0x00, 0x34, 0xbe, 0xfa, 0x1d, 0x25, 0xb7, 0x56, 0xce, 0x76, 0xb3, 0x83, 0xa6, 0xe8, 0x75, 0x37, 0x41, 0xc1, 0x2a, 0x59, 0x26, 0x6c, 0x2c, 0x79, 0x21, 0xff, 0x6e, 0x8b, 0xbc, 0x44, 0xe3, 0x82, 0x3e, 0x4d, 0x80, 0x7c, 0xbc, 0x92, 0xfa, 0x78, 0x6a, 0x89, 0xe6, 0x2a, 0x4b, 0x21, 0x7b, 0x5f, 0xb0, 0xc0, 0xf1, 0x86, 0x5d, 0x4a, 0x7e, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4602 = { .name = "ecdsa_secp224r1_sha512_4602", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4602_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4602_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4602_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 261 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4603 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4603_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha512_4603_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4603_sig[] = { 0x22, 0x4a, 0x38, 0xe7, 0x33, 0xeb, 0xd3, 0xfa, 0xc2, 0x74, 0xec, 0xc5, 0x0e, 0xce, 0xf2, 0xe7, 0xc3, 0x18, 0x9b, 0xe2, 0xb9, 0xd0, 0x93, 0xa8, 0xdc, 0xc6, 0xfa, 0x3a, 0x13, 0x4f, 0xa5, 0xa4, 0xf9, 0x23, 0xd2, 0x96, 0xb3, 0xc6, 0xdd, 0x46, 0x83, 0xd2, 0x49, 0xcc, 0xf0, 0xad, 0x27, 0x28, 0x90, 0xe4, 0x14, 0x9c, 0x9a, 0x0d, 0x74, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4603 = { .name = "ecdsa_secp224r1_sha512_4603", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4603_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4603_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4603_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 262 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4604 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4604_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha512_4604_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4604_sig[] = { 0x33, 0x8d, 0x07, 0xd9, 0x90, 0x87, 0x9a, 0xd8, 0x44, 0xe2, 0x4c, 0x17, 0x88, 0xe3, 0x62, 0x26, 0x9d, 0x8a, 0xca, 0x70, 0x50, 0x03, 0x57, 0xd3, 0x85, 0x76, 0x82, 0x27, 0xf7, 0x45, 0xcc, 0x4e, 0xba, 0xaf, 0x1c, 0xd4, 0x28, 0x30, 0x02, 0x6a, 0x66, 0xe5, 0xb9, 0x55, 0x64, 0xcd, 0xbe, 0xe5, 0xed, 0xf8, 0x53, 0xbb, 0x2c, 0xc9, 0x12, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4604 = { .name = "ecdsa_secp224r1_sha512_4604", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4604_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4604_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4604_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 263 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4605 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4605_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha512_4605_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4605_sig[] = { 0x68, 0x9f, 0xce, 0x4b, 0x33, 0xd8, 0x21, 0x2a, 0x66, 0x36, 0x40, 0xa1, 0xae, 0x0e, 0xfa, 0xa7, 0xa7, 0xd7, 0x71, 0x1b, 0xeb, 0xa7, 0x19, 0x37, 0x4f, 0xe6, 0x34, 0xee, 0x04, 0xbd, 0x99, 0x81, 0xfa, 0x52, 0x29, 0x30, 0x63, 0x07, 0x6f, 0x0f, 0xd7, 0x0f, 0xc3, 0x18, 0x75, 0xd5, 0x80, 0xef, 0x94, 0xf0, 0x20, 0xd2, 0xf9, 0x54, 0x40, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4605 = { .name = "ecdsa_secp224r1_sha512_4605", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4605_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4605_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4605_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 264 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4606 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4606_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4606_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4606_sig[] = { 0x2a, 0x42, 0x87, 0xe0, 0x15, 0x10, 0xe7, 0xfb, 0x5f, 0xed, 0x2e, 0x1c, 0xcc, 0x3f, 0x2a, 0x69, 0x29, 0xcf, 0x7d, 0x03, 0x85, 0x0e, 0x49, 0xd7, 0xae, 0x8a, 0x50, 0x4a, 0x35, 0x5c, 0x39, 0x15, 0xf3, 0xfa, 0x96, 0x37, 0xdc, 0x80, 0x01, 0x43, 0x8a, 0x8c, 0x04, 0xe1, 0x5d, 0x14, 0x93, 0x4c, 0xab, 0xd4, 0x30, 0xfe, 0xb0, 0xcb, 0x5b, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4606 = { .name = "ecdsa_secp224r1_sha512_4606", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4606_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4606_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4606_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 265 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4607 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4607_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4607_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4607_sig[] = { 0xb5, 0xbf, 0x79, 0x5a, 0x38, 0xad, 0xb0, 0x52, 0xb4, 0x01, 0x46, 0x8f, 0xfc, 0xab, 0x81, 0x10, 0x3d, 0x2d, 0x9f, 0xca, 0x2e, 0x15, 0xb8, 0xd0, 0x8a, 0xb9, 0x8c, 0xe8, 0x5e, 0xc0, 0xd2, 0xc6, 0xae, 0xc7, 0x18, 0x88, 0xc9, 0x41, 0xaf, 0x32, 0x4c, 0x72, 0x72, 0xbe, 0xc1, 0x92, 0xab, 0xb2, 0x92, 0xf9, 0xdf, 0x82, 0xa2, 0x4e, 0x8a, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4607 = { .name = "ecdsa_secp224r1_sha512_4607", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4607_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4607_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4607_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 266 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4608 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4608_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4608_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4608_sig[] = { 0x10, 0x0e, 0xd0, 0x7f, 0x46, 0x71, 0x33, 0xbf, 0x10, 0x91, 0x7f, 0x7a, 0x15, 0xab, 0x2b, 0xfd, 0xa5, 0x19, 0xbd, 0xbc, 0x26, 0x53, 0xb9, 0x59, 0x55, 0xe2, 0x22, 0x11, 0xb3, 0x8a, 0x08, 0x1f, 0x7c, 0x2e, 0x2b, 0x77, 0x5d, 0x1d, 0xa8, 0x68, 0xd0, 0x38, 0x1c, 0x09, 0xba, 0x15, 0x59, 0xc9, 0x61, 0x3b, 0x5b, 0xe7, 0x15, 0x93, 0x63, 0xad, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4608 = { .name = "ecdsa_secp224r1_sha512_4608", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4608_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4608_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4608_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 267 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4609 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4609_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha512_4609_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4609_sig[] = { 0x54, 0xe6, 0xad, 0xd8, 0xac, 0x91, 0x0e, 0x52, 0xc6, 0x22, 0x8f, 0xe3, 0x98, 0x0d, 0x8f, 0x58, 0x62, 0x18, 0x33, 0x4d, 0x8d, 0x85, 0x9b, 0xa9, 0xa3, 0x32, 0x99, 0x17, 0x58, 0x36, 0xcc, 0x79, 0xec, 0x88, 0x51, 0x9e, 0xab, 0x4a, 0x6b, 0x26, 0x14, 0xc5, 0x01, 0x62, 0x8c, 0x9f, 0xee, 0x32, 0xfb, 0xaf, 0xd9, 0x3e, 0x32, 0x15, 0x84, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4609 = { .name = "ecdsa_secp224r1_sha512_4609", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4609_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4609_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4609_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 268 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4610 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4610_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha512_4610_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4610_sig[] = { 0x12, 0x30, 0xd5, 0x40, 0x9f, 0x37, 0x95, 0x84, 0xb4, 0xd5, 0x48, 0xb7, 0xbc, 0xcb, 0xa6, 0x4b, 0xaf, 0x81, 0xd5, 0x12, 0xa9, 0xf2, 0xe6, 0x39, 0x8c, 0x4e, 0x3a, 0x66, 0x19, 0x37, 0xa2, 0x98, 0xf8, 0xcb, 0xdf, 0xa8, 0x5b, 0x8e, 0x6f, 0xcf, 0x0a, 0x12, 0xbe, 0x49, 0x66, 0xd8, 0x02, 0x70, 0xca, 0xde, 0x85, 0xa0, 0xc3, 0x7e, 0xe6, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4610 = { .name = "ecdsa_secp224r1_sha512_4610", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4610_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4610_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4610_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 269 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4611 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4611_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha512_4611_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4611_sig[] = { 0x86, 0x2f, 0x43, 0xb0, 0x44, 0xfb, 0x32, 0xad, 0xb4, 0x5e, 0x00, 0x37, 0x8b, 0xa0, 0x83, 0xae, 0x76, 0x1c, 0x84, 0x45, 0x20, 0x54, 0xf1, 0x7b, 0x13, 0x41, 0xbf, 0x5b, 0x95, 0xd8, 0xd8, 0xe5, 0xe3, 0xa6, 0xcc, 0x2b, 0x0a, 0x06, 0xc7, 0x92, 0x25, 0x2c, 0xa1, 0x1a, 0x64, 0x22, 0x57, 0x72, 0x18, 0x31, 0x57, 0x85, 0x20, 0xf9, 0x6b, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4611 = { .name = "ecdsa_secp224r1_sha512_4611", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4611_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4611_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4611_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 270 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4612 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4612_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha512_4612_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4612_sig[] = { 0xcb, 0x5c, 0xab, 0xb1, 0xca, 0x01, 0xb8, 0x47, 0xa6, 0xbc, 0x70, 0x55, 0x8d, 0x1e, 0x5d, 0x3a, 0x20, 0x4d, 0x17, 0x41, 0xbb, 0xe8, 0x00, 0xf4, 0xb1, 0x59, 0xaf, 0x35, 0x35, 0x80, 0xcc, 0x85, 0xf2, 0x18, 0x39, 0x41, 0x30, 0xbd, 0xdf, 0x1c, 0x4e, 0xac, 0x04, 0xfe, 0x96, 0xf5, 0x9f, 0x14, 0xfb, 0x43, 0x66, 0x86, 0x95, 0x03, 0x98, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4612 = { .name = "ecdsa_secp224r1_sha512_4612", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4612_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4612_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4612_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 271 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4613 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4613_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha512_4613_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4613_sig[] = { 0xc9, 0xd8, 0x3d, 0xc0, 0x4c, 0xf4, 0xee, 0x89, 0xc4, 0x05, 0x04, 0x5d, 0x0f, 0xd1, 0xd7, 0x04, 0xf6, 0x27, 0xca, 0x5b, 0xbe, 0x35, 0x0f, 0x40, 0xb8, 0x26, 0xbb, 0xc1, 0x74, 0xfe, 0xdc, 0x9e, 0x55, 0x04, 0x5e, 0x97, 0x59, 0xf2, 0x12, 0x44, 0x60, 0xfd, 0xfb, 0x99, 0x1d, 0xc6, 0x20, 0xcf, 0xee, 0x6e, 0xff, 0xc0, 0xb4, 0xad, 0xaa, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4613 = { .name = "ecdsa_secp224r1_sha512_4613", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4613_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4613_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4613_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 272 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4614 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4614_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha512_4614_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4614_sig[] = { 0x46, 0xdd, 0x65, 0xb6, 0xe7, 0xf1, 0x0c, 0x08, 0x41, 0x84, 0x1b, 0x01, 0x03, 0x3a, 0x5b, 0xef, 0xd3, 0xa0, 0xe7, 0x8c, 0x85, 0xf1, 0xf3, 0x90, 0xbb, 0x3c, 0xdf, 0x25, 0xf3, 0x3a, 0xce, 0xa3, 0xd4, 0x7c, 0xf0, 0xdd, 0x52, 0x73, 0x73, 0x5b, 0x00, 0x41, 0x04, 0xf6, 0x51, 0x2e, 0xd6, 0x41, 0x05, 0x25, 0x09, 0x42, 0x2c, 0x03, 0x25, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4614 = { .name = "ecdsa_secp224r1_sha512_4614", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4614_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4614_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4614_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 273 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4615 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4615_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4615_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4615_sig[] = { 0xdd, 0xb4, 0xa7, 0xe4, 0x00, 0xa1, 0xe9, 0x81, 0x18, 0xf4, 0x74, 0x72, 0x2d, 0xa3, 0xf4, 0x21, 0xf6, 0x5a, 0x76, 0xee, 0xc6, 0x1f, 0x4f, 0x7b, 0x69, 0x9f, 0xaf, 0x07, 0xdb, 0x80, 0xcb, 0xa1, 0x99, 0x85, 0x9c, 0xdf, 0xe9, 0x16, 0xd6, 0xab, 0x3d, 0xeb, 0x91, 0xd7, 0x6a, 0xaf, 0x0e, 0xd5, 0x54, 0xc8, 0xf9, 0xed, 0x7e, 0x5a, 0xa5, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4615 = { .name = "ecdsa_secp224r1_sha512_4615", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4615_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4615_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4615_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 274 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4616 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4616_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4616_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4616_sig[] = { 0x4c, 0x26, 0x0b, 0x54, 0x62, 0x80, 0x60, 0x4e, 0x4c, 0x80, 0x38, 0x47, 0x21, 0xc9, 0xe8, 0x03, 0xef, 0x70, 0x4e, 0x7f, 0xb7, 0x01, 0x68, 0xe6, 0x73, 0x0f, 0xc1, 0xf3, 0xa8, 0xac, 0xea, 0xe2, 0x19, 0xac, 0x25, 0xc9, 0xf0, 0x42, 0x31, 0xb4, 0xe0, 0xc1, 0x71, 0x41, 0x3d, 0xb1, 0xd2, 0x6d, 0xf1, 0xc1, 0xe8, 0x43, 0x00, 0x62, 0xeb, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4616 = { .name = "ecdsa_secp224r1_sha512_4616", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4616_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4616_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4616_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 275 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4617 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4617_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4617_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4617_sig[] = { 0xf4, 0x09, 0x8d, 0x2c, 0x02, 0x40, 0xe7, 0x8f, 0xce, 0xab, 0xb0, 0x18, 0x3d, 0xf0, 0xb3, 0x9e, 0x7a, 0xd3, 0xe7, 0xf5, 0xd6, 0xda, 0x15, 0x87, 0xfa, 0x09, 0x85, 0x3c, 0xd4, 0x24, 0x12, 0xb2, 0xab, 0xaa, 0x61, 0x4c, 0x95, 0xeb, 0x11, 0xf9, 0xb9, 0x34, 0x62, 0x82, 0xce, 0x3a, 0x1c, 0x93, 0xaa, 0xc3, 0x5c, 0xe7, 0xaa, 0x37, 0x2f, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4617 = { .name = "ecdsa_secp224r1_sha512_4617", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4617_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4617_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4617_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 276 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4618 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4618_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha512_4618_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4618_sig[] = { 0x48, 0xdd, 0xc4, 0x97, 0xf9, 0xa4, 0x73, 0x2c, 0x67, 0x7e, 0x46, 0xc0, 0xe2, 0xbd, 0xab, 0xec, 0x54, 0xfc, 0x9d, 0x27, 0xe4, 0x6a, 0xb5, 0x95, 0x05, 0x6d, 0xb4, 0xd9, 0xb8, 0x21, 0x9e, 0xbb, 0xfa, 0xeb, 0xc2, 0xfe, 0x43, 0x11, 0xef, 0xab, 0x0c, 0x35, 0xd4, 0x39, 0x27, 0x51, 0x35, 0x1b, 0xcc, 0x19, 0x71, 0xe8, 0xd0, 0x19, 0x41, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4618 = { .name = "ecdsa_secp224r1_sha512_4618", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4618_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4618_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4618_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 277 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4619 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4619_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha512_4619_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4619_sig[] = { 0xe1, 0xab, 0xaf, 0x51, 0xd2, 0x7a, 0x6d, 0x7d, 0x4c, 0x9b, 0x28, 0x07, 0x83, 0x25, 0xca, 0xc2, 0xd7, 0xce, 0x3d, 0x54, 0x03, 0x91, 0x6c, 0x68, 0x90, 0x37, 0x60, 0xb7, 0x2c, 0x45, 0xa9, 0x9e, 0x27, 0x70, 0xf7, 0x82, 0xfe, 0xe5, 0xca, 0x1d, 0x71, 0x3e, 0xae, 0xcf, 0x07, 0xe6, 0x2d, 0x53, 0xc6, 0x4b, 0x7c, 0xf9, 0x3d, 0xe9, 0x90, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4619 = { .name = "ecdsa_secp224r1_sha512_4619", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4619_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4619_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4619_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 278 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4620 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4620_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha512_4620_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4620_sig[] = { 0x86, 0x8c, 0xd1, 0x27, 0xc9, 0x9e, 0x11, 0x49, 0xf7, 0xfc, 0x8d, 0x87, 0x8c, 0xdf, 0xa9, 0x86, 0xb6, 0x2e, 0x99, 0xad, 0xde, 0xa2, 0x81, 0x14, 0x96, 0x11, 0xff, 0x15, 0x16, 0xe5, 0x95, 0x38, 0x20, 0x13, 0x5b, 0x7d, 0x46, 0x2c, 0xe5, 0x43, 0x4e, 0xf8, 0x59, 0x20, 0xe9, 0x73, 0xee, 0xc9, 0xe4, 0xd1, 0x4d, 0x7c, 0xb3, 0xcc, 0x2a, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4620 = { .name = "ecdsa_secp224r1_sha512_4620", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4620_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4620_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4620_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 279 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4621 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4621_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4621_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4621_sig[] = { 0xa3, 0x75, 0x92, 0x97, 0x18, 0xec, 0x4e, 0x6a, 0xda, 0x9c, 0x93, 0x70, 0xc5, 0x1d, 0xf6, 0xbd, 0xae, 0xe7, 0xeb, 0xab, 0x2a, 0x70, 0x67, 0x5d, 0x42, 0xa0, 0xb6, 0xb3, 0x9e, 0xaf, 0x48, 0x02, 0xef, 0xaf, 0x7c, 0xa0, 0x82, 0xff, 0xbf, 0x5e, 0xd7, 0x74, 0xaf, 0x43, 0x79, 0x2d, 0x9b, 0x3f, 0xd7, 0x11, 0xc6, 0xb1, 0xc3, 0x61, 0x12, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4621 = { .name = "ecdsa_secp224r1_sha512_4621", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4621_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4621_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4621_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 280 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4622 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4622_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4622_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4622_sig[] = { 0xd9, 0x7b, 0x32, 0xf3, 0xbf, 0x8b, 0xc1, 0x1e, 0xc2, 0x67, 0x2d, 0xd6, 0x32, 0x04, 0x18, 0xbe, 0xee, 0xd9, 0x95, 0x27, 0xa6, 0x3f, 0xe4, 0xc5, 0x21, 0x99, 0xec, 0x61, 0x68, 0xdd, 0x90, 0x06, 0xb0, 0x33, 0x19, 0xcc, 0xbe, 0x65, 0x1d, 0x0b, 0xda, 0xf8, 0x4c, 0x63, 0x35, 0x6f, 0x03, 0xcb, 0x00, 0x7a, 0x68, 0x65, 0xee, 0x3e, 0x02, 0x06, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4622 = { .name = "ecdsa_secp224r1_sha512_4622", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4622_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4622_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4622_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 281 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4623 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4623_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4623_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4623_sig[] = { 0x8e, 0xe5, 0x79, 0x4d, 0xc2, 0xe6, 0x6f, 0x25, 0x84, 0x91, 0x0e, 0xa1, 0xd8, 0x36, 0x1e, 0x5b, 0x53, 0xdb, 0x53, 0x5a, 0xdc, 0xf5, 0xc1, 0xc3, 0x5e, 0x12, 0x83, 0x09, 0x5d, 0x1d, 0x8b, 0x9b, 0x99, 0x6c, 0x0a, 0x48, 0x8e, 0x05, 0xaf, 0x14, 0x42, 0x1b, 0x86, 0xe9, 0x84, 0x1f, 0x0c, 0xba, 0x70, 0x60, 0x27, 0xfc, 0x82, 0x7d, 0x4d, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4623 = { .name = "ecdsa_secp224r1_sha512_4623", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4623_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4623_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4623_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 282 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4624 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4624_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha512_4624_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4624_sig[] = { 0x79, 0x99, 0x72, 0x7c, 0x0c, 0xc0, 0x2d, 0x88, 0xef, 0x27, 0x40, 0x12, 0xa7, 0x62, 0xaf, 0xcb, 0xb1, 0x9e, 0x7f, 0xce, 0x19, 0x09, 0x1a, 0x02, 0xac, 0xd0, 0x05, 0x64, 0xdb, 0xfa, 0xcf, 0x67, 0x99, 0x9f, 0x22, 0xc4, 0x99, 0xd4, 0x8a, 0x60, 0xa6, 0xfe, 0x4b, 0xbb, 0x74, 0x61, 0x99, 0xc2, 0x99, 0x57, 0xa1, 0xec, 0x7a, 0x09, 0x00, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4624 = { .name = "ecdsa_secp224r1_sha512_4624", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4624_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4624_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4624_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 283 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4625 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4625_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha512_4625_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4625_sig[] = { 0x57, 0x97, 0xc2, 0x1c, 0x01, 0x62, 0xe4, 0x2f, 0x69, 0x69, 0x3c, 0x6c, 0x02, 0x44, 0xdf, 0xdf, 0x92, 0x18, 0xc0, 0x1e, 0x92, 0x35, 0x76, 0x01, 0x77, 0xb6, 0x1a, 0x54, 0x54, 0x52, 0xc8, 0x87, 0xb2, 0x7f, 0xb3, 0x42, 0xa8, 0xa0, 0x0d, 0x27, 0x57, 0x9c, 0x71, 0x95, 0xdd, 0xdb, 0x73, 0xdf, 0x39, 0x92, 0x33, 0xed, 0x0d, 0xea, 0x56, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4625 = { .name = "ecdsa_secp224r1_sha512_4625", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4625_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4625_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4625_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 284 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4626 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha512_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4626_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha512_4626_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4626_sig[] = { 0x0e, 0xb9, 0xdc, 0x5d, 0x67, 0xbb, 0x0d, 0x40, 0x09, 0x54, 0x4f, 0x86, 0x54, 0x97, 0x79, 0x07, 0xdf, 0xe7, 0x70, 0xe7, 0xfa, 0xe4, 0x57, 0x1d, 0x31, 0xd7, 0xb4, 0xfa, 0xab, 0x5c, 0xda, 0x53, 0xe8, 0x68, 0xbf, 0xf5, 0x19, 0x8b, 0xe4, 0xbe, 0x36, 0x81, 0xb1, 0x86, 0xcb, 0x0c, 0x13, 0x96, 0xd2, 0x72, 0xc7, 0x1f, 0x09, 0x3f, 0x8b, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4626 = { .name = "ecdsa_secp224r1_sha512_4626", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4626_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4626_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4626_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 285 in file ecdsa_secp224r1_sha512_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4627 for ECDSA, tcId is 1 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4627_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4627_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4627_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x39, 0x47, 0x66, 0xfb, 0x67, 0xa6, 0x5f, 0xe0, 0xaf, 0x6c, 0x15, 0x4f, 0x7c, 0xbd, 0x28, 0x5e, 0xa1, 0x80, 0xb4, 0xc6, 0x15, 0x0c, 0xda, 0xfa, 0xfb, 0x0f, 0x6f, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4627 = { .name = "ecdsa_secp224r1_sha512_4627", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4627_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4627_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4627_sig, .siglen = 56, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4628 for ECDSA, tcId is 2 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4628_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4628_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4628_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4628 = { .name = "ecdsa_secp224r1_sha512_4628", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4628_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4628_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4628_sig, .siglen = 56, .result = 0, .comment = "Legacy:ASN encoding of s misses leading 0, tcId is 2 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4629 for ECDSA, tcId is 3 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4629_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4629_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4629_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4629 = { .name = "ecdsa_secp224r1_sha512_4629", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4629_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4629_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4629_sig, .siglen = 56, .result = 1, .comment = "valid, tcId is 3 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4630 for ECDSA, tcId is 4 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4630_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4630_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4630_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4630 = { .name = "ecdsa_secp224r1_sha512_4630", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4630_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4630_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4630_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of sequence, tcId is 4 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4631 for ECDSA, tcId is 5 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4631_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4631_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4631_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4631 = { .name = "ecdsa_secp224r1_sha512_4631", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4631_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4631_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4631_sig, .siglen = 56, .result = 0, .comment = "length of sequence contains leading 0, tcId is 5 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4632 for ECDSA, tcId is 68 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4632_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4632_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4632_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4632 = { .name = "ecdsa_secp224r1_sha512_4632", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4632_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4632_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4632_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4633 for ECDSA, tcId is 69 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4633_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4633_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4633_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4633 = { .name = "ecdsa_secp224r1_sha512_4633", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4633_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4633_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4633_sig, .siglen = 56, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4634 for ECDSA, tcId is 70 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4634_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4634_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4634_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4634 = { .name = "ecdsa_secp224r1_sha512_4634", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4634_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4634_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4634_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4635 for ECDSA, tcId is 71 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4635_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4635_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4635_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4635 = { .name = "ecdsa_secp224r1_sha512_4635", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4635_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4635_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4635_sig, .siglen = 56, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4636 for ECDSA, tcId is 93 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4636_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4636_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4636_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x00, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4636 = { .name = "ecdsa_secp224r1_sha512_4636", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4636_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4636_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4636_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4637 for ECDSA, tcId is 94 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4637_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4637_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4637_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4637 = { .name = "ecdsa_secp224r1_sha512_4637", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4637_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4637_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4637_sig, .siglen = 58, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4638 for ECDSA, tcId is 95 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4638_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4638_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4638_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4638 = { .name = "ecdsa_secp224r1_sha512_4638", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4638_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4638_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4638_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4639 for ECDSA, tcId is 96 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4639_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4639_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4639_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4639 = { .name = "ecdsa_secp224r1_sha512_4639", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4639_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4639_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4639_sig, .siglen = 56, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4640 for ECDSA, tcId is 98 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4640_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4640_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4640_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x05, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4640 = { .name = "ecdsa_secp224r1_sha512_4640", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4640_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4640_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4640_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4641 for ECDSA, tcId is 99 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4641_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4641_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4641_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4641 = { .name = "ecdsa_secp224r1_sha512_4641", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4641_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4641_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4641_sig, .siglen = 58, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4642 for ECDSA, tcId is 114 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4642_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4642_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4642_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4642 = { .name = "ecdsa_secp224r1_sha512_4642", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4642_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4642_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4642_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4643 for ECDSA, tcId is 115 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4643_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4643_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4643_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4643 = { .name = "ecdsa_secp224r1_sha512_4643", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4643_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4643_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4643_sig, .siglen = 56, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4644 for ECDSA, tcId is 118 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4644_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4644_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4644_sig[] = { 0x6b, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4644 = { .name = "ecdsa_secp224r1_sha512_4644", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4644_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4644_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4644_sig, .siglen = 56, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4645 for ECDSA, tcId is 119 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4645_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4645_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4645_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x02, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4645 = { .name = "ecdsa_secp224r1_sha512_4645", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4645_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4645_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4645_sig, .siglen = 57, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4646 for ECDSA, tcId is 120 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4646_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4646_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4646_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0x2b, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4646 = { .name = "ecdsa_secp224r1_sha512_4646", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4646_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4646_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4646_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4647 for ECDSA, tcId is 121 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4647_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4647_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4647_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0xae, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4647 = { .name = "ecdsa_secp224r1_sha512_4647", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4647_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4647_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4647_sig, .siglen = 56, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4648 for ECDSA, tcId is 122 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4648_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4648_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4648_sig[] = { 0x00, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4648 = { .name = "ecdsa_secp224r1_sha512_4648", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4648_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4648_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4648_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4649 for ECDSA, tcId is 123 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4649_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4649_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4649_sig[] = { 0x00, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4649 = { .name = "ecdsa_secp224r1_sha512_4649", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4649_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4649_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4649_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4650 for ECDSA, tcId is 124 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4650_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4650_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4650_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4650 = { .name = "ecdsa_secp224r1_sha512_4650", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4650_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4650_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4650_sig, .siglen = 56, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4651 for ECDSA, tcId is 125 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4651_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4651_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4651_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4651 = { .name = "ecdsa_secp224r1_sha512_4651", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4651_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4651_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4651_sig, .siglen = 56, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4652 for ECDSA, tcId is 126 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4652_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4652_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4652_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4652 = { .name = "ecdsa_secp224r1_sha512_4652", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4652_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4652_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4652_sig, .siglen = 57, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp224r1_sha512_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4653 for ECDSA, tcId is 129 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4653_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4653_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4653_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4653 = { .name = "ecdsa_secp224r1_sha512_4653", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4653_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4653_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4653_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4654 for ECDSA, tcId is 130 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4654_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4654_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4654_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4654 = { .name = "ecdsa_secp224r1_sha512_4654", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4654_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4654_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4654_sig, .siglen = 56, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4655 for ECDSA, tcId is 131 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4655_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4655_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4655_sig[] = { 0x01, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x81, 0x73, 0x42, 0x8b, 0xc4, 0x8a, 0x2c, 0x3f, 0x03, 0x1c, 0xaa, 0xec, 0x3b, 0xbc, 0xe8, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4655 = { .name = "ecdsa_secp224r1_sha512_4655", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4655_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4655_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4655_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4656 for ECDSA, tcId is 132 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4656_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4656_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4656_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x83, 0x45, 0xfc, 0xca, 0x52, 0xa9, 0xb0, 0x17, 0x48, 0xca, 0x20, 0x33, 0x83, 0x68, 0x6e, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4656 = { .name = "ecdsa_secp224r1_sha512_4656", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4656_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4656_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4656_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4657 for ECDSA, tcId is 133 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4657_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4657_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4657_sig[] = { 0x96, 0xe3, 0x8d, 0xc2, 0x29, 0x58, 0x0a, 0x2e, 0xe4, 0x73, 0x71, 0x74, 0x2f, 0x7d, 0xa3, 0x60, 0x54, 0xf4, 0x66, 0x11, 0xd4, 0xda, 0x0c, 0x9a, 0x70, 0x20, 0x6d, 0x55, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4657 = { .name = "ecdsa_secp224r1_sha512_4657", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4657_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4657_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4657_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4658 for ECDSA, tcId is 134 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4658_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4658_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4658_sig[] = { 0x96, 0xe3, 0x8d, 0xc2, 0x29, 0x58, 0x0a, 0x2e, 0xe4, 0x73, 0x71, 0x74, 0x2f, 0x7c, 0xba, 0x03, 0x35, 0xad, 0x56, 0x4f, 0xe8, 0xb7, 0x35, 0xdf, 0xcc, 0x7c, 0x97, 0x92, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4658 = { .name = "ecdsa_secp224r1_sha512_4658", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4658_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4658_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4658_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4659 for ECDSA, tcId is 135 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4659_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4659_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4659_sig[] = { 0xfe, 0x96, 0xe3, 0x8d, 0xc2, 0x29, 0x58, 0x0a, 0x2e, 0xe4, 0x73, 0x71, 0x74, 0x2f, 0x7e, 0x8c, 0xbd, 0x74, 0x3b, 0x75, 0xd3, 0xc0, 0xfc, 0xe3, 0x55, 0x13, 0xc4, 0x43, 0x18, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4659 = { .name = "ecdsa_secp224r1_sha512_4659", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4659_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4659_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4659_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4660 for ECDSA, tcId is 136 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4660_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4660_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4660_sig[] = { 0x01, 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4660 = { .name = "ecdsa_secp224r1_sha512_4660", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4660_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4660_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4660_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4661 for ECDSA, tcId is 137 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4661_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4661_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4661_sig[] = { 0x96, 0xe3, 0x8d, 0xc2, 0x29, 0x58, 0x0a, 0x2e, 0xe4, 0x73, 0x71, 0x74, 0x2f, 0x7d, 0xa3, 0x60, 0x54, 0xf4, 0x66, 0x11, 0xd4, 0xda, 0x0c, 0x9a, 0x70, 0x20, 0x6d, 0x55, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4661 = { .name = "ecdsa_secp224r1_sha512_4661", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4661_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4661_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4661_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4662 for ECDSA, tcId is 138 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4662_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4662_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4662_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x01, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0x04, 0xe7, 0x1f, 0xf1, 0x2b, 0xb6, 0x12, 0xad, 0x77, 0x8f, 0xbd, 0xa8, 0xe5, 0x6b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4662 = { .name = "ecdsa_secp224r1_sha512_4662", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4662_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4662_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4662_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4663 for ECDSA, tcId is 139 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4663_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4663_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4663_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x42, 0xd7, 0xa1, 0x5e, 0x7f, 0x4b, 0x39, 0xea, 0xf3, 0x25, 0x05, 0x04, 0xf0, 0x90, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4663 = { .name = "ecdsa_secp224r1_sha512_4663", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4663_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4663_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4663_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4664 for ECDSA, tcId is 140 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4664_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4664_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4664_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x39, 0x47, 0x66, 0xfb, 0x67, 0xa6, 0x5f, 0xe0, 0xaf, 0x6c, 0x15, 0x4f, 0x7c, 0xbe, 0x11, 0xbb, 0xc0, 0xc7, 0xc4, 0x88, 0x01, 0x2f, 0xb1, 0xb5, 0x9e, 0xb3, 0x44, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4664 = { .name = "ecdsa_secp224r1_sha512_4664", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4664_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4664_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4664_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4665 for ECDSA, tcId is 141 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4665_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4665_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4665_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0xfe, 0x39, 0x47, 0x66, 0xfb, 0x67, 0xa6, 0x5f, 0xe0, 0xaf, 0x6c, 0x15, 0x4f, 0x7c, 0xbe, 0xfb, 0x18, 0xe0, 0x0e, 0xd4, 0x49, 0xed, 0x52, 0x88, 0x70, 0x42, 0x57, 0x1a, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4665 = { .name = "ecdsa_secp224r1_sha512_4665", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4665_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4665_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4665_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4666 for ECDSA, tcId is 142 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4666_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4666_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4666_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x01, 0xc6, 0xb8, 0x99, 0x04, 0x98, 0x59, 0xa0, 0x1f, 0x50, 0x93, 0xea, 0xb0, 0x83, 0x41, 0xee, 0x44, 0x3f, 0x38, 0x3b, 0x77, 0xfe, 0xd0, 0x4e, 0x4a, 0x61, 0x4c, 0xbb, 0x2e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4666 = { .name = "ecdsa_secp224r1_sha512_4666", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4666_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4666_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4666_sig, .siglen = 57, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4667 for ECDSA, tcId is 143 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4667_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4667_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4667_sig[] = { 0x69, 0x1c, 0x72, 0x3d, 0xd6, 0xa7, 0xf5, 0xd1, 0x1b, 0x8c, 0x8e, 0x8b, 0xd0, 0x82, 0x5c, 0x9f, 0xab, 0x0b, 0x99, 0xee, 0x2b, 0x25, 0xf3, 0x65, 0x8f, 0xdf, 0x92, 0xab, 0x39, 0x47, 0x66, 0xfb, 0x67, 0xa6, 0x5f, 0xe0, 0xaf, 0x6c, 0x15, 0x4f, 0x7c, 0xbe, 0x11, 0xbb, 0xc0, 0xc7, 0xc4, 0x88, 0x01, 0x2f, 0xb1, 0xb5, 0x9e, 0xb3, 0x44, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4667 = { .name = "ecdsa_secp224r1_sha512_4667", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4667_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4667_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4667_sig, .siglen = 56, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4668 for ECDSA, tcId is 144 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4668_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4668_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4668_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4668 = { .name = "ecdsa_secp224r1_sha512_4668", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4668_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4668_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4668_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4669 for ECDSA, tcId is 145 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4669_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4669_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4669_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4669 = { .name = "ecdsa_secp224r1_sha512_4669", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4669_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4669_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4669_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4670 for ECDSA, tcId is 146 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4670_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4670_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4670_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4670 = { .name = "ecdsa_secp224r1_sha512_4670", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4670_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4670_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4670_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4671 for ECDSA, tcId is 147 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4671_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4671_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4671_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4671 = { .name = "ecdsa_secp224r1_sha512_4671", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4671_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4671_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4671_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4672 for ECDSA, tcId is 148 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4672_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4672_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4672_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4672 = { .name = "ecdsa_secp224r1_sha512_4672", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4672_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4672_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4672_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4673 for ECDSA, tcId is 149 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4673_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4673_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4673_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4673 = { .name = "ecdsa_secp224r1_sha512_4673", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4673_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4673_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4673_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4674 for ECDSA, tcId is 150 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4674_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4674_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4674_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4674 = { .name = "ecdsa_secp224r1_sha512_4674", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4674_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4674_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4674_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4675 for ECDSA, tcId is 151 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4675_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4675_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4675_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4675 = { .name = "ecdsa_secp224r1_sha512_4675", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4675_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4675_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4675_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4676 for ECDSA, tcId is 154 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4676_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4676_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4676_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4676 = { .name = "ecdsa_secp224r1_sha512_4676", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4676_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4676_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4676_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4677 for ECDSA, tcId is 155 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4677_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4677_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4677_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4677 = { .name = "ecdsa_secp224r1_sha512_4677", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4677_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4677_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4677_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4678 for ECDSA, tcId is 156 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4678_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4678_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4678_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4678 = { .name = "ecdsa_secp224r1_sha512_4678", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4678_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4678_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4678_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4679 for ECDSA, tcId is 157 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4679_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4679_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4679_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4679 = { .name = "ecdsa_secp224r1_sha512_4679", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4679_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4679_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4679_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4680 for ECDSA, tcId is 158 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4680_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4680_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4680_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4680 = { .name = "ecdsa_secp224r1_sha512_4680", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4680_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4680_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4680_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4681 for ECDSA, tcId is 159 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4681_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4681_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4681_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4681 = { .name = "ecdsa_secp224r1_sha512_4681", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4681_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4681_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4681_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4682 for ECDSA, tcId is 160 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4682_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4682_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4682_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4682 = { .name = "ecdsa_secp224r1_sha512_4682", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4682_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4682_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4682_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4683 for ECDSA, tcId is 161 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4683_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4683_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4683_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4683 = { .name = "ecdsa_secp224r1_sha512_4683", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4683_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4683_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4683_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4684 for ECDSA, tcId is 164 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4684_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4684_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4684_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4684 = { .name = "ecdsa_secp224r1_sha512_4684", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4684_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4684_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4684_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4685 for ECDSA, tcId is 165 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4685_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4685_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4685_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4685 = { .name = "ecdsa_secp224r1_sha512_4685", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4685_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4685_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4685_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4686 for ECDSA, tcId is 166 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4686_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4686_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4686_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4686 = { .name = "ecdsa_secp224r1_sha512_4686", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4686_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4686_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4686_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 166 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4687 for ECDSA, tcId is 167 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4687_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4687_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4687_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4687 = { .name = "ecdsa_secp224r1_sha512_4687", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4687_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4687_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4687_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 167 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4688 for ECDSA, tcId is 168 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4688_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4688_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4688_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4688 = { .name = "ecdsa_secp224r1_sha512_4688", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4688_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4688_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4688_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 168 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4689 for ECDSA, tcId is 169 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4689_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4689_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4689_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4689 = { .name = "ecdsa_secp224r1_sha512_4689", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4689_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4689_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4689_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 169 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4690 for ECDSA, tcId is 170 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4690_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4690_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4690_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4690 = { .name = "ecdsa_secp224r1_sha512_4690", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4690_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4690_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4690_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 170 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4691 for ECDSA, tcId is 171 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4691_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4691_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4691_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4691 = { .name = "ecdsa_secp224r1_sha512_4691", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4691_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4691_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4691_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 171 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4692 for ECDSA, tcId is 174 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4692_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4692_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4692_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4692 = { .name = "ecdsa_secp224r1_sha512_4692", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4692_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4692_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4692_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 174 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4693 for ECDSA, tcId is 175 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4693_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4693_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4693_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4693 = { .name = "ecdsa_secp224r1_sha512_4693", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4693_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4693_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4693_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 175 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4694 for ECDSA, tcId is 176 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4694_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4694_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4694_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4694 = { .name = "ecdsa_secp224r1_sha512_4694", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4694_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4694_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4694_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 176 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4695 for ECDSA, tcId is 177 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4695_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4695_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4695_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4695 = { .name = "ecdsa_secp224r1_sha512_4695", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4695_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4695_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4695_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 177 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4696 for ECDSA, tcId is 178 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4696_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4696_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4696_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4696 = { .name = "ecdsa_secp224r1_sha512_4696", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4696_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4696_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4696_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 178 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4697 for ECDSA, tcId is 179 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4697_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4697_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4697_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4697 = { .name = "ecdsa_secp224r1_sha512_4697", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4697_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4697_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4697_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 179 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4698 for ECDSA, tcId is 180 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4698_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4698_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4698_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4698 = { .name = "ecdsa_secp224r1_sha512_4698", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4698_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4698_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4698_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 180 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4699 for ECDSA, tcId is 181 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4699_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4699_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4699_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4699 = { .name = "ecdsa_secp224r1_sha512_4699", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4699_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4699_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4699_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 181 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4700 for ECDSA, tcId is 184 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4700_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4700_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4700_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4700 = { .name = "ecdsa_secp224r1_sha512_4700", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4700_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4700_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4700_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 184 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4701 for ECDSA, tcId is 185 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4701_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4701_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4701_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4701 = { .name = "ecdsa_secp224r1_sha512_4701", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4701_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4701_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4701_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 185 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4702 for ECDSA, tcId is 186 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4702_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4702_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4702_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4702 = { .name = "ecdsa_secp224r1_sha512_4702", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4702_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4702_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4702_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 186 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4703 for ECDSA, tcId is 187 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4703_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4703_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4703_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4703 = { .name = "ecdsa_secp224r1_sha512_4703", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4703_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4703_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4703_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 187 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4704 for ECDSA, tcId is 188 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4704_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4704_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4704_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4704 = { .name = "ecdsa_secp224r1_sha512_4704", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4704_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4704_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4704_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 188 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4705 for ECDSA, tcId is 189 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4705_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4705_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4705_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4705 = { .name = "ecdsa_secp224r1_sha512_4705", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4705_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4705_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4705_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 189 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4706 for ECDSA, tcId is 190 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4706_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4706_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4706_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4706 = { .name = "ecdsa_secp224r1_sha512_4706", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4706_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4706_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4706_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 190 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4707 for ECDSA, tcId is 191 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4707_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4707_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4707_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4707 = { .name = "ecdsa_secp224r1_sha512_4707", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4707_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4707_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4707_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 191 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4708 for ECDSA, tcId is 194 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4708_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4708_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4708_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4708 = { .name = "ecdsa_secp224r1_sha512_4708", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4708_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4708_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4708_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 194 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4709 for ECDSA, tcId is 195 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4709_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4709_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4709_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4709 = { .name = "ecdsa_secp224r1_sha512_4709", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4709_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4709_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4709_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 195 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4710 for ECDSA, tcId is 196 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4710_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4710_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4710_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4710 = { .name = "ecdsa_secp224r1_sha512_4710", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4710_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4710_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4710_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 196 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4711 for ECDSA, tcId is 197 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4711_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4711_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4711_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4711 = { .name = "ecdsa_secp224r1_sha512_4711", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4711_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4711_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4711_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 197 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4712 for ECDSA, tcId is 198 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4712_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4712_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4712_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4712 = { .name = "ecdsa_secp224r1_sha512_4712", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4712_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4712_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4712_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 198 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4713 for ECDSA, tcId is 199 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4713_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4713_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4713_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4713 = { .name = "ecdsa_secp224r1_sha512_4713", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4713_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4713_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4713_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 199 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4714 for ECDSA, tcId is 200 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4714_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4714_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4714_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4714 = { .name = "ecdsa_secp224r1_sha512_4714", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4714_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4714_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4714_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 200 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4715 for ECDSA, tcId is 201 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4715_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4715_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4715_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4715 = { .name = "ecdsa_secp224r1_sha512_4715", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4715_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4715_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4715_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 201 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4716 for ECDSA, tcId is 204 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4716_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4716_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4716_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4716 = { .name = "ecdsa_secp224r1_sha512_4716", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4716_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4716_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4716_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 204 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4717 for ECDSA, tcId is 205 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4717_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4717_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4717_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4717 = { .name = "ecdsa_secp224r1_sha512_4717", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4717_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4717_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4717_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 205 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4718 for ECDSA, tcId is 206 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4718_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4718_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4718_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4718 = { .name = "ecdsa_secp224r1_sha512_4718", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4718_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4718_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4718_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 206 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4719 for ECDSA, tcId is 207 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4719_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4719_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4719_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4719 = { .name = "ecdsa_secp224r1_sha512_4719", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4719_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4719_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4719_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 207 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4720 for ECDSA, tcId is 208 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4720_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4720_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4720_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4720 = { .name = "ecdsa_secp224r1_sha512_4720", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4720_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4720_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4720_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 208 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4721 for ECDSA, tcId is 209 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4721_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4721_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4721_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4721 = { .name = "ecdsa_secp224r1_sha512_4721", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4721_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4721_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4721_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 209 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4722 for ECDSA, tcId is 210 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4722_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4722_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4722_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4722 = { .name = "ecdsa_secp224r1_sha512_4722", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4722_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4722_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4722_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 210 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4723 for ECDSA, tcId is 211 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4723_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4723_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4723_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4723 = { .name = "ecdsa_secp224r1_sha512_4723", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4723_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4723_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4723_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 211 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4724 for ECDSA, tcId is 214 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4724_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4724_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4724_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4724 = { .name = "ecdsa_secp224r1_sha512_4724", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4724_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4724_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4724_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 214 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4725 for ECDSA, tcId is 215 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4725_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4725_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4725_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4725 = { .name = "ecdsa_secp224r1_sha512_4725", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4725_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4725_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4725_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 215 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4726 for ECDSA, tcId is 216 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4726_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4726_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4726_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4726 = { .name = "ecdsa_secp224r1_sha512_4726", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4726_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4726_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4726_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 216 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4727 for ECDSA, tcId is 217 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4727_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4727_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4727_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4727 = { .name = "ecdsa_secp224r1_sha512_4727", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4727_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4727_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4727_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 217 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4728 for ECDSA, tcId is 218 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4728_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4728_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4728_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4728 = { .name = "ecdsa_secp224r1_sha512_4728", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4728_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4728_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4728_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 218 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4729 for ECDSA, tcId is 219 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4729_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4729_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4729_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4729 = { .name = "ecdsa_secp224r1_sha512_4729", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4729_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4729_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4729_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 219 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4730 for ECDSA, tcId is 220 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4730_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4730_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4730_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4730 = { .name = "ecdsa_secp224r1_sha512_4730", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4730_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4730_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4730_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 220 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4731 for ECDSA, tcId is 221 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4731_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4731_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4731_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4731 = { .name = "ecdsa_secp224r1_sha512_4731", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4731_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4731_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4731_sig, .siglen = 56, .result = -1, .comment = "Signature with special case values for r and s, tcId is 221 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4732 for ECDSA, tcId is 230 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4732_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4732_msg[] = { 0x36, 0x39, 0x31, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4732_sig[] = { 0x32, 0x6b, 0xc0, 0x63, 0x53, 0xf7, 0xf9, 0xc9, 0xf7, 0x7b, 0x8f, 0x4b, 0x55, 0x46, 0x4e, 0x86, 0x19, 0x94, 0x4e, 0x78, 0x79, 0x40, 0x2c, 0xca, 0x57, 0x2e, 0x04, 0x1a, 0x22, 0x1a, 0x25, 0xeb, 0x9c, 0xc8, 0xdd, 0x66, 0xfd, 0xf1, 0x56, 0xb2, 0xf6, 0xab, 0x60, 0x1a, 0xb6, 0xd9, 0xc5, 0x09, 0x24, 0x7f, 0x8d, 0xe5, 0xd2, 0x67, 0x1a, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4732 = { .name = "ecdsa_secp224r1_sha512_4732", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4732_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4732_msg, .msglen = 5, .sig = ecdsa_secp224r1_sha512_4732_sig, .siglen = 56, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 230 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4733 for ECDSA, tcId is 231 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4733_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4733_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x31, 0x39, 0x34, 0x31, 0x37, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4733_sig[] = { 0x3b, 0x30, 0x08, 0xed, 0x59, 0x6b, 0x7f, 0xa2, 0x76, 0x49, 0x8d, 0xef, 0x40, 0xd9, 0x6b, 0x1e, 0xb2, 0xff, 0xb7, 0x31, 0xa4, 0x40, 0x50, 0xff, 0xb7, 0x32, 0xe4, 0xe6, 0x6d, 0xbb, 0x08, 0xc5, 0x6d, 0xb7, 0x37, 0xe9, 0x39, 0x2f, 0xf4, 0xf3, 0xa5, 0x4d, 0x8b, 0x80, 0x6d, 0x70, 0xaf, 0x22, 0x6e, 0xcf, 0x41, 0x3b, 0x34, 0x65, 0xde, 0x55, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4733 = { .name = "ecdsa_secp224r1_sha512_4733", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4733_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4733_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4733_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 231 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4734 for ECDSA, tcId is 232 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4734_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4734_msg[] = { 0x35, 0x33, 0x36, 0x37, 0x36, 0x34, 0x31, 0x38, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4734_sig[] = { 0xd1, 0xfe, 0x26, 0x9c, 0x30, 0x61, 0xe4, 0xb9, 0x46, 0x04, 0xe8, 0xd6, 0x12, 0xd7, 0x08, 0x87, 0x06, 0x8c, 0xc7, 0xd5, 0x23, 0x2c, 0xd5, 0xa9, 0xb7, 0x29, 0x23, 0xa1, 0x3c, 0x1c, 0xbc, 0x02, 0x7d, 0x33, 0xfb, 0x24, 0x51, 0xd5, 0x2d, 0xce, 0x3a, 0x82, 0x8a, 0x8c, 0x7e, 0xcc, 0x49, 0x0a, 0x28, 0xa9, 0x4e, 0x5e, 0x5b, 0xb2, 0xc4, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4734 = { .name = "ecdsa_secp224r1_sha512_4734", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4734_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4734_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4734_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 232 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4735 for ECDSA, tcId is 233 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4735_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4735_msg[] = { 0x35, 0x36, 0x37, 0x31, 0x34, 0x38, 0x31, 0x30, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4735_sig[] = { 0x04, 0x58, 0x61, 0x34, 0xcc, 0x67, 0x92, 0x95, 0xdd, 0x93, 0x49, 0x93, 0x11, 0xc4, 0xa8, 0xaf, 0x37, 0xcb, 0x94, 0xda, 0xdb, 0xae, 0x18, 0xd8, 0xee, 0x27, 0x9b, 0x9b, 0xbf, 0x91, 0x70, 0xa1, 0xb6, 0x5b, 0x66, 0x56, 0x64, 0xcf, 0x56, 0x7d, 0x40, 0xa9, 0x95, 0xce, 0x25, 0x2a, 0x23, 0xd6, 0xa9, 0xf9, 0x62, 0xb0, 0x5e, 0x36, 0x44, 0x86, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4735 = { .name = "ecdsa_secp224r1_sha512_4735", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4735_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4735_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4735_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 233 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4736 for ECDSA, tcId is 234 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4736_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4736_msg[] = { 0x31, 0x31, 0x32, 0x30, 0x37, 0x31, 0x37, 0x32, 0x39, 0x30, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4736_sig[] = { 0xc1, 0xf5, 0x10, 0x09, 0xb9, 0x35, 0xb4, 0x77, 0x33, 0x74, 0x36, 0x4e, 0xc3, 0xee, 0xd7, 0x2a, 0x24, 0xb7, 0x09, 0x26, 0xe0, 0x34, 0x9c, 0x77, 0x86, 0x2f, 0x34, 0x75, 0x46, 0xdf, 0x3d, 0x98, 0xf1, 0x04, 0xba, 0x66, 0x02, 0xf8, 0x04, 0x1a, 0x5b, 0xf5, 0x49, 0x5f, 0xb2, 0x40, 0xe1, 0x03, 0xd1, 0xbd, 0x17, 0xf2, 0xfa, 0x87, 0x89, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4736 = { .name = "ecdsa_secp224r1_sha512_4736", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4736_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4736_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4736_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 234 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4737 for ECDSA, tcId is 235 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4737_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4737_msg[] = { 0x31, 0x31, 0x32, 0x39, 0x38, 0x30, 0x33, 0x34, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4737_sig[] = { 0xe8, 0x22, 0x24, 0x28, 0x72, 0xf1, 0xec, 0xf3, 0x38, 0xa4, 0xf7, 0x73, 0xdf, 0x87, 0xb6, 0x7e, 0x9b, 0x21, 0xbb, 0x28, 0x3a, 0xca, 0xc7, 0xd6, 0x6b, 0x26, 0x55, 0x1e, 0x94, 0xd4, 0xe0, 0xfc, 0x3c, 0x63, 0x59, 0x99, 0x4a, 0x6e, 0xae, 0xdd, 0xdd, 0x15, 0x33, 0xf4, 0x90, 0xf7, 0x2e, 0xf8, 0x51, 0x39, 0xf8, 0xd3, 0xb3, 0x9c, 0xf0, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4737 = { .name = "ecdsa_secp224r1_sha512_4737", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4737_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4737_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4737_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 235 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4738 for ECDSA, tcId is 236 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4738_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4738_msg[] = { 0x39, 0x38, 0x37, 0x36, 0x30, 0x32, 0x39, 0x36, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4738_sig[] = { 0x7f, 0xd4, 0x55, 0x28, 0xeb, 0x7b, 0xfc, 0x37, 0x10, 0xe2, 0x73, 0xc4, 0x46, 0x8f, 0x0b, 0x50, 0xeb, 0xf9, 0x3f, 0x94, 0xcd, 0x0e, 0x7a, 0x60, 0x2a, 0x49, 0x29, 0xa6, 0x46, 0x61, 0x3d, 0xd1, 0xff, 0xd8, 0x5d, 0xf8, 0xd7, 0x1f, 0x34, 0x98, 0x00, 0x17, 0x21, 0xfd, 0xa4, 0x98, 0x2c, 0x27, 0xa1, 0xc2, 0x91, 0x35, 0x9b, 0x05, 0xb1, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4738 = { .name = "ecdsa_secp224r1_sha512_4738", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4738_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4738_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4738_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 236 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4739 for ECDSA, tcId is 237 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4739_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4739_msg[] = { 0x32, 0x30, 0x32, 0x30, 0x34, 0x32, 0x39, 0x36, 0x35, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4739_sig[] = { 0x36, 0xd1, 0x37, 0xb6, 0x91, 0x71, 0xa4, 0x86, 0x93, 0x3b, 0x50, 0x13, 0x8d, 0x1d, 0xb1, 0x84, 0x27, 0x24, 0x76, 0x6a, 0xfd, 0x25, 0xc8, 0x5b, 0x00, 0x32, 0xda, 0xf5, 0x8e, 0x70, 0x0d, 0xe2, 0x1f, 0x2f, 0xc3, 0x50, 0xa3, 0x4c, 0x7c, 0xc1, 0x90, 0x54, 0xcf, 0x37, 0x1e, 0xca, 0xb6, 0xf7, 0x33, 0x1c, 0xce, 0xcf, 0x68, 0xfc, 0xa0, 0xf4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4739 = { .name = "ecdsa_secp224r1_sha512_4739", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4739_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4739_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4739_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 237 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4740 for ECDSA, tcId is 238 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4740_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4740_msg[] = { 0x31, 0x34, 0x35, 0x31, 0x36, 0x36, 0x39, 0x31, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4740_sig[] = { 0xda, 0x3b, 0x43, 0x69, 0x08, 0xf5, 0xa8, 0x2f, 0x26, 0xbc, 0x17, 0xa8, 0x57, 0x7a, 0xd2, 0xa7, 0x82, 0x94, 0x6e, 0x3a, 0x75, 0x87, 0xb0, 0x1d, 0x25, 0x3b, 0x1d, 0xd0, 0xa6, 0x54, 0x4e, 0x38, 0xf2, 0x4e, 0x81, 0x17, 0x37, 0x0c, 0x04, 0x9b, 0x5d, 0x1f, 0x67, 0x12, 0xea, 0x14, 0x33, 0x7a, 0x94, 0x51, 0x12, 0x24, 0xdf, 0x44, 0x96, 0xa3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4740 = { .name = "ecdsa_secp224r1_sha512_4740", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4740_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4740_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4740_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 238 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4741 for ECDSA, tcId is 239 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4741_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4741_msg[] = { 0x31, 0x30, 0x39, 0x33, 0x36, 0x38, 0x35, 0x39, 0x35, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4741_sig[] = { 0x43, 0x14, 0xa2, 0xbd, 0x13, 0x9d, 0x47, 0xbe, 0x3d, 0x9f, 0xd9, 0xeb, 0xdd, 0x72, 0xa0, 0x6a, 0x22, 0x02, 0x19, 0xc7, 0x59, 0x6b, 0x94, 0x41, 0x78, 0xee, 0x6f, 0x5f, 0x0e, 0x6f, 0x1d, 0x2f, 0x57, 0xc6, 0x99, 0x65, 0x4e, 0x9c, 0x70, 0x5d, 0x7b, 0x8f, 0xa3, 0xc1, 0xcc, 0xb0, 0xf9, 0x39, 0xf6, 0x36, 0x8b, 0xed, 0x24, 0x6b, 0x2e, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4741 = { .name = "ecdsa_secp224r1_sha512_4741", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4741_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4741_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4741_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 239 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4742 for ECDSA, tcId is 240 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4742_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4742_msg[] = { 0x36, 0x32, 0x31, 0x39, 0x35, 0x36, 0x30, 0x32, 0x30, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4742_sig[] = { 0x6a, 0x25, 0x64, 0x34, 0x64, 0x68, 0x26, 0x79, 0xd8, 0x49, 0x70, 0xc6, 0x03, 0x92, 0x7f, 0x4a, 0x8c, 0xa8, 0x3e, 0x7e, 0xf9, 0x71, 0x5d, 0xd1, 0xed, 0x84, 0xc2, 0x8f, 0x93, 0x2b, 0x78, 0xd1, 0x65, 0xc2, 0x25, 0xa5, 0x25, 0x3e, 0x62, 0x01, 0xc0, 0xb1, 0xde, 0xd0, 0x89, 0x8b, 0xa2, 0x4d, 0xe4, 0x4b, 0x23, 0x23, 0x3e, 0xb7, 0x80, 0x54, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4742 = { .name = "ecdsa_secp224r1_sha512_4742", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4742_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4742_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4742_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 240 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4743 for ECDSA, tcId is 241 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4743_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4743_msg[] = { 0x35, 0x36, 0x38, 0x32, 0x34, 0x37, 0x34, 0x33, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4743_sig[] = { 0x47, 0x6a, 0xaa, 0x58, 0x67, 0x7d, 0x9e, 0x60, 0x47, 0x7c, 0xff, 0xd0, 0x26, 0xc4, 0x32, 0x48, 0xe2, 0xcf, 0x3c, 0xc2, 0x1e, 0x8f, 0xdc, 0xcb, 0x75, 0xce, 0xef, 0xad, 0x77, 0x99, 0xfc, 0x7a, 0xf8, 0xf9, 0xb9, 0x29, 0x20, 0x3f, 0xaf, 0x89, 0x9b, 0xb5, 0xca, 0x1a, 0xec, 0xf2, 0x49, 0x25, 0x55, 0x15, 0x72, 0x82, 0xdf, 0xde, 0x79, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4743 = { .name = "ecdsa_secp224r1_sha512_4743", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4743_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4743_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4743_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 241 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4744 for ECDSA, tcId is 242 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4744_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4744_msg[] = { 0x33, 0x37, 0x33, 0x36, 0x35, 0x33, 0x31, 0x37, 0x38, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4744_sig[] = { 0x63, 0xa9, 0x86, 0x14, 0xa1, 0x42, 0x1e, 0x2e, 0xbb, 0x27, 0x8d, 0xe5, 0x3b, 0x61, 0x61, 0x8b, 0xaf, 0xc7, 0x57, 0x12, 0x26, 0x47, 0xaf, 0xfd, 0x35, 0x8c, 0x66, 0x7a, 0x8e, 0xdb, 0xa8, 0x06, 0xe0, 0xa7, 0xe4, 0x38, 0xca, 0x35, 0xf9, 0x84, 0x05, 0xa8, 0xad, 0x2d, 0x5c, 0x3e, 0x8c, 0xc2, 0xd5, 0xc4, 0x38, 0x42, 0x33, 0xae, 0xf0, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4744 = { .name = "ecdsa_secp224r1_sha512_4744", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4744_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4744_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4744_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 242 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4745 for ECDSA, tcId is 243 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4745_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4745_msg[] = { 0x34, 0x37, 0x39, 0x35, 0x39, 0x30, 0x33, 0x37, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4745_sig[] = { 0x88, 0x0b, 0x52, 0x38, 0xa0, 0x14, 0xf8, 0xb4, 0x46, 0x55, 0xb8, 0x3c, 0x17, 0x58, 0x80, 0xeb, 0x1e, 0x83, 0x07, 0x89, 0x9a, 0x82, 0x4e, 0xa3, 0xe0, 0x7d, 0xbd, 0x6d, 0xa4, 0x72, 0x4c, 0x86, 0x49, 0xfd, 0x74, 0xe5, 0xbc, 0x8d, 0x7f, 0xe6, 0xa9, 0x06, 0x7a, 0x13, 0x76, 0xfb, 0x8e, 0x08, 0xdb, 0xda, 0xed, 0x68, 0x98, 0x0b, 0x0f, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4745 = { .name = "ecdsa_secp224r1_sha512_4745", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4745_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4745_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4745_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 243 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4746 for ECDSA, tcId is 244 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4746_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4746_msg[] = { 0x39, 0x33, 0x39, 0x39, 0x36, 0x31, 0x31, 0x30, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4746_sig[] = { 0xf8, 0x74, 0x35, 0x88, 0x23, 0x46, 0x34, 0xdd, 0x98, 0x91, 0xf4, 0xf2, 0xf4, 0x0f, 0x4e, 0x46, 0xb7, 0x7f, 0x97, 0xb8, 0x2d, 0xc5, 0xdb, 0xe2, 0x34, 0xaa, 0x6b, 0x5d, 0x80, 0x65, 0x6e, 0x52, 0x62, 0xbc, 0x25, 0xe1, 0x58, 0xf3, 0xb7, 0x8f, 0x51, 0xae, 0x0d, 0x6a, 0x41, 0xcc, 0x8c, 0xca, 0x1a, 0xa4, 0x57, 0x22, 0x1b, 0x2e, 0xb7, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4746 = { .name = "ecdsa_secp224r1_sha512_4746", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4746_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4746_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4746_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 244 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4747 for ECDSA, tcId is 245 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4747_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4747_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x34, 0x39, 0x31, 0x31, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4747_sig[] = { 0x2a, 0x23, 0x57, 0xe3, 0xd8, 0xfe, 0x34, 0x43, 0x45, 0x82, 0xbe, 0x4d, 0xab, 0xd5, 0x8b, 0x77, 0xb3, 0x88, 0xd1, 0xd5, 0x2a, 0xdc, 0xc6, 0x64, 0xf4, 0x5d, 0xec, 0xe4, 0x94, 0xbe, 0x3a, 0x36, 0x9b, 0x7c, 0x27, 0x88, 0xdf, 0x45, 0x87, 0xec, 0x5b, 0xd4, 0x16, 0x3c, 0x4c, 0xbc, 0x40, 0xb7, 0x7d, 0xe1, 0xa8, 0x5e, 0x8b, 0xcf, 0xb2, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4747 = { .name = "ecdsa_secp224r1_sha512_4747", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4747_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4747_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4747_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 245 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4748 for ECDSA, tcId is 246 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4748_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4748_msg[] = { 0x33, 0x32, 0x33, 0x36, 0x36, 0x37, 0x38, 0x35, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4748_sig[] = { 0xb6, 0xb0, 0xc0, 0xab, 0xa6, 0xc6, 0x11, 0x30, 0x0e, 0xca, 0xd8, 0x81, 0x62, 0x42, 0xc4, 0x15, 0xf1, 0x83, 0xa2, 0xbd, 0x4d, 0x46, 0xcd, 0x77, 0x69, 0x03, 0x3d, 0x9b, 0x77, 0x50, 0xb2, 0x4b, 0xe0, 0x2f, 0x22, 0xdc, 0x0b, 0x65, 0x6f, 0xe4, 0xaf, 0x37, 0x74, 0x13, 0xf9, 0x45, 0x3d, 0xff, 0x99, 0x22, 0x69, 0x15, 0xdb, 0xb6, 0xe0, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4748 = { .name = "ecdsa_secp224r1_sha512_4748", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4748_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4748_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4748_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 246 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4749 for ECDSA, tcId is 247 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4749_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4749_msg[] = { 0x31, 0x34, 0x34, 0x38, 0x39, 0x39, 0x37, 0x37, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4749_sig[] = { 0xa5, 0xc1, 0xa7, 0x5c, 0x27, 0x79, 0xf3, 0xeb, 0x83, 0xa6, 0x5e, 0x29, 0x59, 0x27, 0xcc, 0xe4, 0x28, 0x8e, 0x9d, 0x5c, 0x21, 0x32, 0xa4, 0xc7, 0xca, 0x92, 0x52, 0x6e, 0x10, 0xfe, 0x30, 0xf0, 0xbe, 0x33, 0xa7, 0x85, 0x38, 0x51, 0x37, 0xb5, 0x7d, 0x80, 0x61, 0x40, 0xa4, 0x02, 0xb9, 0xbd, 0x3c, 0x1d, 0xf1, 0xb5, 0x7d, 0xe6, 0xda, 0x63, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4749 = { .name = "ecdsa_secp224r1_sha512_4749", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4749_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4749_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4749_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 247 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4750 for ECDSA, tcId is 248 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4750_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4750_msg[] = { 0x35, 0x37, 0x31, 0x34, 0x36, 0x33, 0x32, 0x38, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4750_sig[] = { 0xb9, 0x2b, 0x55, 0x21, 0xd1, 0xa7, 0xab, 0xe7, 0x7e, 0x85, 0x24, 0xdb, 0xd3, 0x00, 0x11, 0x21, 0xcf, 0x83, 0xc0, 0x80, 0x17, 0xe3, 0x91, 0x7b, 0xc5, 0x8b, 0x5d, 0x1c, 0x22, 0x4b, 0x11, 0x37, 0x79, 0x01, 0x7f, 0x6a, 0x52, 0x21, 0x71, 0xed, 0xf9, 0x30, 0xf1, 0xb5, 0xd4, 0xf5, 0xe7, 0xde, 0xdc, 0x6d, 0x2d, 0x51, 0x4f, 0xd7, 0x88, 0x3c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4750 = { .name = "ecdsa_secp224r1_sha512_4750", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4750_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4750_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4750_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 248 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4751 for ECDSA, tcId is 249 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4751_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4751_msg[] = { 0x32, 0x32, 0x36, 0x34, 0x38, 0x37, 0x34, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4751_sig[] = { 0xeb, 0xd3, 0xec, 0xf3, 0xaa, 0x64, 0xcd, 0xcd, 0xd1, 0x71, 0x58, 0x5a, 0x14, 0x1a, 0x4a, 0x67, 0x3a, 0x8d, 0x5d, 0xe0, 0xca, 0x08, 0x7d, 0xfc, 0xdf, 0x62, 0x43, 0x2e, 0xe0, 0xf1, 0xa0, 0xf7, 0xb8, 0xf5, 0xac, 0x4a, 0x42, 0x63, 0x2f, 0x87, 0x15, 0x6a, 0xd1, 0x09, 0x40, 0x79, 0x39, 0x3b, 0x03, 0xf2, 0x05, 0x1a, 0x9f, 0xd6, 0x02, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4751 = { .name = "ecdsa_secp224r1_sha512_4751", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4751_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4751_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4751_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 249 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4752 for ECDSA, tcId is 250 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4752_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4752_msg[] = { 0x35, 0x33, 0x35, 0x33, 0x34, 0x34, 0x39, 0x34, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4752_sig[] = { 0x6c, 0x38, 0x54, 0x29, 0x7e, 0x1f, 0x26, 0x7b, 0x64, 0xa2, 0x8e, 0x0c, 0xd6, 0x14, 0x8e, 0x0f, 0xad, 0xcf, 0x85, 0xbc, 0x8d, 0x5c, 0x23, 0x94, 0x75, 0x43, 0xbc, 0xb8, 0xaa, 0x05, 0x94, 0xee, 0x11, 0x31, 0x2f, 0x5d, 0x47, 0x67, 0xd2, 0x96, 0xe5, 0xca, 0x83, 0xdf, 0x68, 0x07, 0x28, 0x11, 0xf8, 0x1a, 0x8d, 0x27, 0xe1, 0x78, 0xca, 0x5d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4752 = { .name = "ecdsa_secp224r1_sha512_4752", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4752_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4752_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4752_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 250 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4753 for ECDSA, tcId is 251 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4753_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4753_msg[] = { 0x34, 0x37, 0x38, 0x37, 0x33, 0x30, 0x33, 0x38, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4753_sig[] = { 0x78, 0x5a, 0xc8, 0xc9, 0x56, 0xd7, 0x79, 0x7a, 0xe6, 0x74, 0x98, 0x77, 0x5b, 0x3c, 0x44, 0x6c, 0x41, 0x73, 0x5e, 0xb1, 0x5f, 0x34, 0x30, 0xb4, 0x9f, 0x6a, 0x09, 0xf2, 0x57, 0x10, 0x87, 0x9a, 0xb8, 0x39, 0x94, 0xe8, 0x09, 0xc8, 0xd2, 0xcb, 0xd6, 0xf2, 0xac, 0x5c, 0x20, 0x5b, 0x4b, 0x8d, 0x62, 0x26, 0xe9, 0x8b, 0xe0, 0x3e, 0x79, 0x67, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4753 = { .name = "ecdsa_secp224r1_sha512_4753", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4753_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4753_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4753_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 251 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4754 for ECDSA, tcId is 252 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4754_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4754_msg[] = { 0x32, 0x32, 0x33, 0x32, 0x31, 0x39, 0x35, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4754_sig[] = { 0xf1, 0xf3, 0xd0, 0x16, 0x69, 0x31, 0x25, 0xba, 0x73, 0x98, 0x1c, 0x8f, 0x9a, 0x17, 0x48, 0xe5, 0xdc, 0xe1, 0xd9, 0x63, 0x43, 0x55, 0xf2, 0x6f, 0xa5, 0x36, 0x19, 0x0e, 0xb5, 0x74, 0xe9, 0x7d, 0xef, 0x60, 0xdc, 0xd0, 0xe9, 0x17, 0x71, 0x06, 0x48, 0x37, 0x91, 0xb2, 0xed, 0xb4, 0xab, 0x03, 0x42, 0xb9, 0xf5, 0xeb, 0xb9, 0x57, 0xd5, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4754 = { .name = "ecdsa_secp224r1_sha512_4754", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4754_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4754_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4754_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 252 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4755 for ECDSA, tcId is 253 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4755_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4755_msg[] = { 0x31, 0x30, 0x37, 0x33, 0x39, 0x33, 0x39, 0x31, 0x39, 0x31, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4755_sig[] = { 0xe6, 0x4f, 0x33, 0x71, 0x52, 0x2c, 0xb1, 0xa5, 0xf0, 0xd1, 0x51, 0x1b, 0x15, 0x2b, 0x20, 0xe0, 0x1d, 0xec, 0xa0, 0xb3, 0x28, 0x47, 0x86, 0x85, 0x3c, 0xac, 0x27, 0x9a, 0xc9, 0xa2, 0xe5, 0xf4, 0xff, 0xde, 0x22, 0xb9, 0xd4, 0xed, 0x01, 0x79, 0xce, 0x74, 0xff, 0xf4, 0x08, 0xea, 0x91, 0x8d, 0xda, 0x76, 0x85, 0xc7, 0x98, 0x0a, 0xe6, 0x1a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4755 = { .name = "ecdsa_secp224r1_sha512_4755", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4755_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4755_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4755_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 253 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4756 for ECDSA, tcId is 254 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4756_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4756_msg[] = { 0x31, 0x38, 0x38, 0x31, 0x30, 0x32, 0x37, 0x33, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4756_sig[] = { 0x1f, 0x99, 0xdd, 0x6e, 0xf7, 0x2f, 0xee, 0xed, 0xa6, 0xc1, 0x23, 0xba, 0xa4, 0xfa, 0xbb, 0x12, 0x6d, 0x7d, 0xed, 0xb6, 0x41, 0x30, 0xfa, 0xe3, 0xf4, 0x23, 0x07, 0x97, 0xe4, 0x41, 0xec, 0x51, 0xdc, 0xa6, 0x27, 0x1b, 0x04, 0x3e, 0x95, 0x75, 0x3c, 0x40, 0x43, 0xd7, 0xcb, 0x4e, 0x76, 0xfd, 0xc1, 0x3d, 0x6a, 0xea, 0x45, 0xfb, 0xf2, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4756 = { .name = "ecdsa_secp224r1_sha512_4756", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4756_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4756_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4756_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 254 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4757 for ECDSA, tcId is 255 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4757_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4757_msg[] = { 0x36, 0x30, 0x36, 0x31, 0x36, 0x39, 0x33, 0x39, 0x30, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4757_sig[] = { 0x86, 0x37, 0xa0, 0x96, 0x27, 0xc5, 0x27, 0x66, 0xbf, 0x96, 0xf0, 0xb6, 0xce, 0xa6, 0xf2, 0xac, 0x3e, 0xb3, 0x03, 0x00, 0x1c, 0x5f, 0x6f, 0xe6, 0xd6, 0x28, 0xe4, 0xba, 0x10, 0xb6, 0x6c, 0x59, 0x94, 0x55, 0xd4, 0x00, 0x77, 0xbb, 0x86, 0x5e, 0xd4, 0x3e, 0x2c, 0x2c, 0xc4, 0x03, 0x47, 0x3b, 0xaa, 0x6d, 0x63, 0xb1, 0x6b, 0xe4, 0x8c, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4757 = { .name = "ecdsa_secp224r1_sha512_4757", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4757_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4757_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4757_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 255 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4758 for ECDSA, tcId is 256 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4758_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4758_msg[] = { 0x38, 0x38, 0x39, 0x35, 0x32, 0x32, 0x37, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4758_sig[] = { 0x52, 0xa0, 0x10, 0xa2, 0x3e, 0x4f, 0x9e, 0xbb, 0x45, 0x9b, 0xbe, 0x9f, 0x30, 0x57, 0xe6, 0xc1, 0x97, 0x61, 0xfb, 0x99, 0xd2, 0x5c, 0x9b, 0x16, 0xb8, 0xf0, 0x07, 0xd8, 0x52, 0x6d, 0xc1, 0xf3, 0x44, 0x44, 0xde, 0x00, 0x44, 0x7b, 0xa2, 0x3c, 0x76, 0x95, 0x0f, 0x2c, 0x15, 0x95, 0x79, 0xd5, 0x48, 0xb6, 0x33, 0x5d, 0x12, 0x7e, 0xa3, 0x21, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4758 = { .name = "ecdsa_secp224r1_sha512_4758", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4758_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4758_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4758_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 256 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4759 for ECDSA, tcId is 257 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4759_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4759_msg[] = { 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, 0x34, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4759_sig[] = { 0xfc, 0x49, 0xca, 0xaa, 0xda, 0x52, 0x8f, 0x33, 0x57, 0xe5, 0xa2, 0x64, 0xf2, 0xe7, 0xf9, 0x70, 0xca, 0x1b, 0x15, 0xca, 0x5f, 0xee, 0x28, 0x74, 0x1d, 0x12, 0x02, 0xac, 0x17, 0x5e, 0x88, 0x4d, 0x10, 0xd0, 0xbf, 0xd2, 0x0b, 0x39, 0x31, 0x1c, 0xe2, 0xc5, 0x30, 0x83, 0xda, 0x16, 0x7d, 0x1f, 0x3d, 0xfe, 0xb9, 0x90, 0xe5, 0x9e, 0xd6, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4759 = { .name = "ecdsa_secp224r1_sha512_4759", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4759_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4759_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4759_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 257 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4760 for ECDSA, tcId is 258 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4760_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4760_msg[] = { 0x33, 0x39, 0x36, 0x35, 0x39, 0x39, 0x31, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4760_sig[] = { 0xd9, 0x5d, 0x53, 0x9a, 0x85, 0xc9, 0xed, 0xac, 0xd4, 0xe0, 0x2e, 0xde, 0x27, 0xb0, 0xe0, 0xb7, 0x37, 0x09, 0x96, 0x12, 0xd1, 0x66, 0xc6, 0x37, 0xc8, 0x3a, 0x9f, 0x34, 0x59, 0x93, 0x6a, 0x2b, 0x90, 0xb7, 0xf3, 0xf3, 0xda, 0x83, 0xf6, 0x4d, 0xec, 0x8e, 0x34, 0x7a, 0x3b, 0xfa, 0x57, 0xba, 0xad, 0xf9, 0xac, 0xea, 0x18, 0xc0, 0x71, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4760 = { .name = "ecdsa_secp224r1_sha512_4760", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4760_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4760_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4760_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 258 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4761 for ECDSA, tcId is 259 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4761_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4761_msg[] = { 0x32, 0x32, 0x38, 0x38, 0x37, 0x33, 0x32, 0x31, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4761_sig[] = { 0x18, 0x95, 0xe6, 0x55, 0x93, 0xd7, 0x1e, 0x56, 0x35, 0xcc, 0xe0, 0x22, 0xdd, 0xa1, 0x9b, 0xd1, 0x55, 0xbb, 0x9a, 0x7f, 0x2e, 0x30, 0x7e, 0x5c, 0xe9, 0x12, 0x7a, 0xde, 0x12, 0x1b, 0x48, 0x7c, 0x32, 0x0c, 0x54, 0x4d, 0xcd, 0xd4, 0x71, 0xd4, 0x6f, 0xcd, 0xe2, 0xce, 0x5d, 0xc9, 0xd1, 0x7f, 0xda, 0x70, 0x54, 0x4c, 0x4e, 0xab, 0x50, 0xa2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4761 = { .name = "ecdsa_secp224r1_sha512_4761", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4761_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4761_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4761_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 259 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4762 for ECDSA, tcId is 260 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4762_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4762_msg[] = { 0x32, 0x32, 0x33, 0x30, 0x38, 0x38, 0x37, 0x33, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4762_sig[] = { 0xb5, 0xf4, 0xc8, 0x5b, 0x13, 0xb5, 0x1a, 0x5d, 0xa8, 0x1a, 0x23, 0x6f, 0x11, 0x05, 0x93, 0x7f, 0x3d, 0x98, 0x85, 0x6d, 0x2a, 0xeb, 0x57, 0x10, 0x1b, 0x6b, 0x49, 0x9c, 0x3b, 0xe7, 0x4a, 0xe7, 0x70, 0xfa, 0x64, 0x67, 0xf7, 0x6a, 0x74, 0x2e, 0xb9, 0xe5, 0x04, 0xa8, 0x15, 0xa4, 0xa6, 0x0e, 0x74, 0xb3, 0x8b, 0xca, 0xa8, 0x9f, 0x9b, 0x06, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4762 = { .name = "ecdsa_secp224r1_sha512_4762", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4762_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4762_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4762_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 260 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4763 for ECDSA, tcId is 261 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4763_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4763_msg[] = { 0x31, 0x32, 0x39, 0x30, 0x35, 0x36, 0x39, 0x33, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4763_sig[] = { 0x07, 0xa5, 0x71, 0x97, 0x66, 0x7a, 0x0c, 0x40, 0x42, 0x3d, 0x48, 0x11, 0xff, 0x96, 0x38, 0x4c, 0x93, 0x30, 0x46, 0x7e, 0x8a, 0x28, 0xea, 0xa4, 0xc0, 0xd5, 0x19, 0xf4, 0x01, 0x10, 0x62, 0xc8, 0x69, 0x44, 0x94, 0xba, 0xae, 0xd2, 0x4f, 0xf6, 0x10, 0xe1, 0xe4, 0x22, 0x7e, 0xfb, 0x59, 0xa1, 0x63, 0xc3, 0x3f, 0xaf, 0xd4, 0x01, 0x00, 0xf9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4763 = { .name = "ecdsa_secp224r1_sha512_4763", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4763_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4763_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4763_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 261 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4764 for ECDSA, tcId is 262 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4764_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4764_msg[] = { 0x32, 0x37, 0x34, 0x38, 0x36, 0x35, 0x36, 0x34, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4764_sig[] = { 0x00, 0x7f, 0x71, 0x86, 0x15, 0xba, 0x1d, 0x0a, 0x9d, 0x27, 0xa8, 0xc5, 0xa6, 0x78, 0xa6, 0x22, 0x5f, 0xfe, 0x12, 0x33, 0xed, 0x8b, 0x41, 0x7c, 0x93, 0x43, 0xb3, 0x10, 0xcf, 0x6a, 0x87, 0xe4, 0x49, 0x67, 0x25, 0xc6, 0xa2, 0x61, 0x2f, 0x40, 0x34, 0xdd, 0xf4, 0xb3, 0x1c, 0x74, 0x35, 0xe2, 0xfc, 0x3a, 0x16, 0x3e, 0x92, 0xd4, 0x63, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4764 = { .name = "ecdsa_secp224r1_sha512_4764", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4764_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4764_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4764_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 262 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4765 for ECDSA, tcId is 263 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4765_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4765_msg[] = { 0x37, 0x35, 0x38, 0x33, 0x35, 0x30, 0x32, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4765_sig[] = { 0xba, 0x8f, 0x95, 0xa4, 0x36, 0x3c, 0x49, 0x3a, 0x9f, 0x78, 0xbb, 0x61, 0xdb, 0xef, 0xaa, 0x95, 0x87, 0xd0, 0x28, 0xbb, 0x83, 0x44, 0x42, 0x0d, 0xe2, 0xb0, 0xcf, 0x21, 0xb3, 0x79, 0x8c, 0x2d, 0x6e, 0x27, 0xa2, 0x59, 0x1c, 0x2e, 0xdc, 0x18, 0x32, 0x0b, 0x78, 0xbf, 0x11, 0xdf, 0x19, 0x4b, 0x11, 0xb3, 0xfb, 0x49, 0x8c, 0x59, 0x52, 0x32, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4765 = { .name = "ecdsa_secp224r1_sha512_4765", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4765_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4765_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4765_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 263 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4766 for ECDSA, tcId is 264 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4766_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4766_msg[] = { 0x32, 0x33, 0x32, 0x37, 0x37, 0x35, 0x34, 0x32, 0x37, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4766_sig[] = { 0x59, 0x6b, 0x74, 0x07, 0x78, 0x01, 0xdb, 0x2e, 0x88, 0x9d, 0x3b, 0x2a, 0xaa, 0x39, 0x90, 0xfe, 0x18, 0x0a, 0xbc, 0x15, 0x2d, 0x48, 0x52, 0x83, 0x85, 0xca, 0x95, 0x5d, 0x38, 0xbf, 0xfd, 0x41, 0x6f, 0x77, 0x98, 0x43, 0xfa, 0xd3, 0x89, 0x75, 0x00, 0x03, 0xeb, 0x07, 0x08, 0x11, 0x2a, 0x48, 0x34, 0xc5, 0x54, 0xf4, 0x76, 0xa3, 0xe0, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4766 = { .name = "ecdsa_secp224r1_sha512_4766", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4766_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4766_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4766_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 264 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4767 for ECDSA, tcId is 265 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4767_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4767_msg[] = { 0x37, 0x37, 0x35, 0x35, 0x30, 0x38, 0x35, 0x38, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4767_sig[] = { 0x85, 0x47, 0xf6, 0x29, 0x67, 0x52, 0x3a, 0x06, 0xc9, 0x69, 0x0e, 0x5f, 0xf6, 0x6c, 0x3f, 0x22, 0x54, 0xcd, 0xa2, 0x8f, 0x09, 0xff, 0xcc, 0xc2, 0x22, 0x43, 0x3d, 0x39, 0x3d, 0x9e, 0xbf, 0x66, 0x4e, 0xe5, 0x51, 0xbb, 0x7b, 0x33, 0x15, 0x7d, 0x6c, 0x6c, 0x5f, 0xd4, 0x56, 0xbd, 0xa3, 0xd4, 0xae, 0x46, 0x02, 0x15, 0xec, 0x1a, 0x5f, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4767 = { .name = "ecdsa_secp224r1_sha512_4767", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4767_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4767_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4767_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 265 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4768 for ECDSA, tcId is 266 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4768_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4768_msg[] = { 0x31, 0x37, 0x39, 0x38, 0x32, 0x36, 0x34, 0x38, 0x33, 0x38, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4768_sig[] = { 0x90, 0xee, 0x3f, 0xab, 0x9c, 0x6c, 0xe3, 0x73, 0xa1, 0xb3, 0x5f, 0xc1, 0x35, 0xfe, 0x87, 0x82, 0x80, 0xee, 0x25, 0xe5, 0x8a, 0x4b, 0xd7, 0x52, 0x9e, 0x91, 0xb4, 0xf0, 0x64, 0x51, 0xe7, 0x52, 0x65, 0x05, 0xb4, 0x4e, 0x88, 0x47, 0x2b, 0x46, 0xed, 0xa3, 0xfd, 0x26, 0x79, 0x82, 0x4d, 0xcd, 0xfc, 0x44, 0x5e, 0x67, 0xf3, 0x5e, 0xa3, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4768 = { .name = "ecdsa_secp224r1_sha512_4768", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4768_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4768_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4768_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 266 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4769 for ECDSA, tcId is 267 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4769_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4769_msg[] = { 0x32, 0x33, 0x39, 0x36, 0x37, 0x37, 0x37, 0x33, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4769_sig[] = { 0x0a, 0x53, 0x05, 0x30, 0xb6, 0xa9, 0x23, 0x8d, 0x2d, 0x1a, 0x3c, 0xf4, 0x68, 0x98, 0x6c, 0x87, 0xf3, 0xb2, 0x08, 0xf6, 0x1e, 0xa0, 0x48, 0x6d, 0x53, 0x14, 0x0c, 0x17, 0x5f, 0x02, 0x7a, 0x73, 0xf3, 0x1a, 0x5c, 0xc2, 0xbe, 0xe8, 0x1f, 0xf0, 0x01, 0x94, 0x77, 0xc5, 0x42, 0xfd, 0x78, 0x2e, 0xcd, 0xe0, 0xe5, 0x51, 0xfc, 0xd3, 0x7e, 0x93, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4769 = { .name = "ecdsa_secp224r1_sha512_4769", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4769_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4769_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4769_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 267 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4770 for ECDSA, tcId is 268 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4770_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4770_msg[] = { 0x35, 0x39, 0x39, 0x38, 0x31, 0x30, 0x35, 0x38, 0x30, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4770_sig[] = { 0xbe, 0xab, 0x4a, 0xbd, 0x23, 0xdf, 0x5e, 0x2a, 0xcf, 0xff, 0x07, 0xc8, 0x2e, 0x24, 0x5d, 0xfa, 0x7d, 0x58, 0x7d, 0x02, 0x38, 0xc2, 0xc9, 0xab, 0x9c, 0x88, 0xa9, 0x6a, 0x98, 0xc6, 0x50, 0x76, 0x35, 0x53, 0x68, 0x40, 0xed, 0xf6, 0x04, 0xf9, 0xba, 0xae, 0x64, 0x08, 0xce, 0x4d, 0x3f, 0xbe, 0xe6, 0x94, 0xdb, 0x3a, 0xbd, 0x82, 0x50, 0x11, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4770 = { .name = "ecdsa_secp224r1_sha512_4770", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4770_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4770_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4770_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 268 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4771 for ECDSA, tcId is 269 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4771_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4771_msg[] = { 0x31, 0x36, 0x36, 0x37, 0x37, 0x38, 0x32, 0x37, 0x30, 0x35, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4771_sig[] = { 0x3e, 0xc8, 0xc3, 0x63, 0x35, 0xcb, 0x98, 0xfa, 0x07, 0xb9, 0x83, 0xc3, 0x5b, 0x7f, 0xc2, 0x56, 0xf4, 0x4a, 0x5a, 0xa1, 0x92, 0xd6, 0x08, 0x75, 0x95, 0x14, 0x5a, 0x15, 0xc3, 0x2b, 0x7a, 0x47, 0xac, 0x62, 0x71, 0xf4, 0x59, 0x35, 0x62, 0xbb, 0xbf, 0x91, 0xf9, 0xe0, 0x73, 0x95, 0xa5, 0xe4, 0xd4, 0x69, 0x70, 0x49, 0x5c, 0xf2, 0x9f, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4771 = { .name = "ecdsa_secp224r1_sha512_4771", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4771_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4771_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4771_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 269 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4772 for ECDSA, tcId is 270 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4772_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4772_msg[] = { 0x32, 0x30, 0x36, 0x32, 0x31, 0x34, 0x33, 0x36, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4772_sig[] = { 0xbd, 0x63, 0x5a, 0x74, 0x1f, 0x1f, 0x2a, 0x1d, 0x9a, 0xc1, 0x69, 0x8b, 0xaf, 0x5c, 0xfc, 0x49, 0x1d, 0x5e, 0x3f, 0x8e, 0x15, 0xf1, 0xca, 0xcb, 0xe4, 0xff, 0xe4, 0xdc, 0x4b, 0xb6, 0x06, 0xcf, 0x7c, 0xc1, 0x1d, 0x0d, 0x7d, 0x96, 0xb8, 0x39, 0x66, 0xf4, 0x22, 0x76, 0x09, 0x5c, 0xcc, 0x44, 0x58, 0x82, 0xed, 0x5a, 0xfd, 0xda, 0xbf, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4772 = { .name = "ecdsa_secp224r1_sha512_4772", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4772_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4772_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4772_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 270 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4773 for ECDSA, tcId is 271 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4773_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4773_msg[] = { 0x36, 0x38, 0x34, 0x32, 0x34, 0x39, 0x36, 0x30, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4773_sig[] = { 0x81, 0x2c, 0x08, 0x62, 0x2c, 0x0a, 0x09, 0xd9, 0x49, 0xb7, 0x62, 0x85, 0x85, 0xc4, 0xf4, 0xf2, 0xdb, 0x4c, 0x55, 0x91, 0xb5, 0xda, 0x14, 0x8f, 0xf4, 0x6d, 0x5c, 0xd4, 0x21, 0x04, 0xf9, 0xbc, 0x9d, 0x00, 0x79, 0xac, 0xb3, 0x07, 0x7d, 0x2d, 0xb5, 0x8f, 0x38, 0x81, 0x19, 0x50, 0x0c, 0x53, 0x22, 0xcb, 0x9b, 0x53, 0x89, 0xb5, 0xc5, 0xd7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4773 = { .name = "ecdsa_secp224r1_sha512_4773", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4773_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4773_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4773_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 271 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4774 for ECDSA, tcId is 272 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4774_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4774_msg[] = { 0x33, 0x32, 0x36, 0x39, 0x38, 0x39, 0x37, 0x33, 0x32, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4774_sig[] = { 0xfa, 0x4e, 0x1c, 0x8b, 0x00, 0x06, 0xf2, 0x69, 0xc8, 0x55, 0xeb, 0x49, 0x5f, 0xa3, 0xa1, 0x13, 0xf6, 0x43, 0xfa, 0x8b, 0x1f, 0xef, 0x2b, 0x08, 0xab, 0x14, 0x59, 0x94, 0xfe, 0x85, 0xb8, 0xb5, 0x22, 0xc7, 0xf9, 0xe8, 0x94, 0x3e, 0x0f, 0x62, 0x64, 0x33, 0x95, 0xbd, 0x1f, 0xcd, 0xab, 0xc8, 0x92, 0xc3, 0x15, 0xd1, 0x08, 0xb7, 0x5f, 0x65, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4774 = { .name = "ecdsa_secp224r1_sha512_4774", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4774_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4774_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4774_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 272 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4775 for ECDSA, tcId is 273 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4775_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4775_msg[] = { 0x31, 0x33, 0x38, 0x37, 0x33, 0x32, 0x34, 0x36, 0x39, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4775_sig[] = { 0x8c, 0x1d, 0x9b, 0x79, 0x11, 0xba, 0xcb, 0x6b, 0x4a, 0x09, 0x58, 0x26, 0x48, 0xb9, 0x92, 0xd4, 0x6a, 0x18, 0x32, 0xeb, 0x00, 0x61, 0x78, 0xc0, 0xc7, 0x7f, 0xcb, 0x10, 0xbe, 0xcb, 0xe1, 0x2b, 0x99, 0xf2, 0x43, 0x76, 0x6d, 0xa5, 0xbd, 0xad, 0x07, 0x46, 0x1b, 0x92, 0x26, 0xa8, 0x29, 0x86, 0x72, 0xb4, 0xf1, 0xad, 0xb3, 0x53, 0x57, 0xef, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4775 = { .name = "ecdsa_secp224r1_sha512_4775", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4775_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4775_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4775_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 273 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4776 for ECDSA, tcId is 274 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4776_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4776_msg[] = { 0x34, 0x31, 0x31, 0x38, 0x38, 0x38, 0x37, 0x35, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4776_sig[] = { 0x78, 0x85, 0x0a, 0x40, 0x53, 0x0a, 0xa2, 0x58, 0xe4, 0x78, 0xe7, 0xc5, 0x47, 0xd3, 0xa5, 0xe4, 0x94, 0x4d, 0x35, 0x24, 0xf1, 0x67, 0x64, 0x43, 0xe4, 0xdf, 0xb3, 0x7d, 0x68, 0x70, 0x58, 0xe1, 0xca, 0x47, 0x8f, 0x52, 0xa3, 0x0c, 0x9a, 0x3f, 0x8e, 0x2e, 0xea, 0x9d, 0x8c, 0x40, 0x59, 0x9c, 0xd4, 0x7e, 0xf6, 0x6b, 0x94, 0x30, 0xd1, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4776 = { .name = "ecdsa_secp224r1_sha512_4776", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4776_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4776_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4776_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 274 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4777 for ECDSA, tcId is 275 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4777_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4777_msg[] = { 0x39, 0x38, 0x38, 0x36, 0x30, 0x36, 0x35, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4777_sig[] = { 0x06, 0x6e, 0x72, 0x68, 0xa6, 0xab, 0xef, 0xe1, 0xb4, 0xb9, 0x16, 0xca, 0x51, 0xc3, 0xe9, 0x58, 0xe4, 0x0d, 0xc7, 0x8c, 0x36, 0x61, 0x31, 0x3e, 0x0e, 0xd2, 0xe7, 0x7d, 0x64, 0x04, 0xd8, 0xa3, 0x32, 0xa8, 0x37, 0xf2, 0xab, 0x6b, 0xd1, 0x3e, 0x3e, 0xe4, 0xaa, 0xd1, 0xe9, 0x30, 0x7d, 0x44, 0x9e, 0x7f, 0x9b, 0x7d, 0x63, 0x32, 0x03, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4777 = { .name = "ecdsa_secp224r1_sha512_4777", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4777_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4777_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4777_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 275 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4778 for ECDSA, tcId is 276 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4778_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4778_msg[] = { 0x32, 0x34, 0x37, 0x39, 0x31, 0x31, 0x35, 0x38, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4778_sig[] = { 0x4e, 0xca, 0x73, 0x70, 0x9a, 0x67, 0xc4, 0x16, 0x03, 0xca, 0x5a, 0xf4, 0x94, 0xc8, 0x13, 0x24, 0x83, 0xff, 0xc2, 0xe0, 0xbf, 0x17, 0x1b, 0x52, 0xde, 0x5a, 0x5e, 0x81, 0x2c, 0x79, 0x13, 0x7c, 0xd2, 0xad, 0xd3, 0xce, 0x3a, 0x76, 0x79, 0x22, 0x70, 0xe3, 0x47, 0x22, 0x1a, 0x3a, 0xd7, 0x86, 0xea, 0xfc, 0x26, 0x82, 0xb3, 0x9b, 0xcf, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4778 = { .name = "ecdsa_secp224r1_sha512_4778", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4778_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4778_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4778_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 276 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4779 for ECDSA, tcId is 277 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4779_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4779_msg[] = { 0x35, 0x30, 0x37, 0x36, 0x38, 0x38, 0x37, 0x33, 0x36, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4779_sig[] = { 0x01, 0x78, 0x51, 0x2f, 0x88, 0x44, 0x98, 0x42, 0x22, 0x39, 0x3a, 0x63, 0x26, 0x3e, 0x0a, 0x00, 0x96, 0x01, 0x86, 0x9e, 0x63, 0x2f, 0x07, 0xeb, 0x74, 0x70, 0xaa, 0x05, 0xe3, 0x26, 0x57, 0xcd, 0xed, 0x11, 0x22, 0xce, 0xe0, 0xa4, 0xf6, 0x6f, 0xf5, 0x0a, 0x32, 0xda, 0x1f, 0x05, 0xde, 0x4c, 0x5e, 0x21, 0x7a, 0xcd, 0xf5, 0xeb, 0x6f, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4779 = { .name = "ecdsa_secp224r1_sha512_4779", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4779_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4779_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4779_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 277 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4780 for ECDSA, tcId is 278 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4780_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4780_msg[] = { 0x39, 0x38, 0x38, 0x35, 0x30, 0x36, 0x39, 0x36, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4780_sig[] = { 0xe2, 0xc7, 0xbf, 0x12, 0x22, 0xca, 0x23, 0xa5, 0x64, 0x92, 0x87, 0x3c, 0x2d, 0x3f, 0xa6, 0xc7, 0x03, 0x0c, 0xc1, 0x66, 0xd6, 0x93, 0x14, 0x2d, 0xce, 0xa2, 0x72, 0xb6, 0x71, 0x5a, 0x4c, 0x82, 0xfd, 0xa4, 0x40, 0x42, 0x17, 0xde, 0xa6, 0xc0, 0xbb, 0xf3, 0xac, 0x24, 0xf8, 0xfa, 0xa2, 0xb4, 0x35, 0xfb, 0xc6, 0xd5, 0x1a, 0x32, 0xc4, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4780 = { .name = "ecdsa_secp224r1_sha512_4780", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4780_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4780_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4780_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 278 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4781 for ECDSA, tcId is 279 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4781_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4781_msg[] = { 0x32, 0x37, 0x32, 0x31, 0x33, 0x30, 0x36, 0x31, 0x33, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4781_sig[] = { 0x49, 0x88, 0x6a, 0x8c, 0x26, 0xc9, 0x1d, 0x64, 0x9c, 0xbf, 0xec, 0xda, 0x6c, 0xe8, 0xd1, 0x44, 0x1e, 0x76, 0x4c, 0x66, 0xf5, 0xd8, 0x1d, 0xce, 0xed, 0xb6, 0xc5, 0xba, 0x43, 0x70, 0xd8, 0xbc, 0xd4, 0xf0, 0x52, 0xfa, 0xc9, 0x49, 0x1d, 0x62, 0x85, 0x0b, 0x6a, 0x6a, 0x85, 0xd5, 0xac, 0xc4, 0x4d, 0x92, 0x48, 0xc3, 0xdf, 0xf3, 0x0b, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4781 = { .name = "ecdsa_secp224r1_sha512_4781", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4781_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4781_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4781_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 279 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4782 for ECDSA, tcId is 280 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4782_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4782_msg[] = { 0x33, 0x32, 0x30, 0x34, 0x31, 0x30, 0x31, 0x36, 0x35, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4782_sig[] = { 0xe1, 0xae, 0x22, 0x5e, 0x1a, 0xec, 0xa4, 0x07, 0x47, 0xff, 0x3e, 0x7a, 0xd1, 0xf7, 0x5e, 0xb9, 0xbc, 0x90, 0xd6, 0x37, 0x16, 0x0a, 0x7f, 0x58, 0xce, 0x12, 0xe5, 0x91, 0xb9, 0x7c, 0xbe, 0xa3, 0xa9, 0x32, 0x31, 0x10, 0x31, 0x57, 0x60, 0xb7, 0xe2, 0xed, 0xe4, 0x96, 0x51, 0x4b, 0x30, 0xf0, 0xee, 0xc5, 0x21, 0xff, 0xeb, 0x07, 0xa6, 0x34, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4782 = { .name = "ecdsa_secp224r1_sha512_4782", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4782_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4782_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4782_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 280 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4783 for ECDSA, tcId is 281 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4783_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4783_msg[] = { 0x33, 0x31, 0x35, 0x30, 0x36, 0x38, 0x30, 0x39, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4783_sig[] = { 0x8a, 0x93, 0xb8, 0x7b, 0x46, 0x51, 0x25, 0x44, 0xfb, 0x9a, 0x7a, 0xf5, 0xc4, 0x1e, 0x3a, 0xa7, 0x2e, 0x40, 0x23, 0x5e, 0xf8, 0x7c, 0xcb, 0x71, 0x08, 0xda, 0xae, 0x48, 0x15, 0x7d, 0xb6, 0x17, 0xac, 0x69, 0x7d, 0xf4, 0x07, 0xaf, 0x7a, 0x11, 0x62, 0x6c, 0x52, 0xa1, 0xaf, 0x7e, 0xf1, 0x89, 0x51, 0x4d, 0xa3, 0x99, 0x18, 0xc4, 0x30, 0x10, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4783 = { .name = "ecdsa_secp224r1_sha512_4783", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4783_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4783_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4783_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 281 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4784 for ECDSA, tcId is 282 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4784_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4784_msg[] = { 0x31, 0x37, 0x32, 0x37, 0x34, 0x36, 0x30, 0x31, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4784_sig[] = { 0xeb, 0xde, 0xbe, 0x63, 0x88, 0xb9, 0xf4, 0x60, 0xfc, 0xe6, 0xd8, 0x4f, 0xaa, 0x67, 0xde, 0xd1, 0xe8, 0x64, 0xef, 0x09, 0xe7, 0x7e, 0xa3, 0xce, 0x58, 0xa5, 0xde, 0xff, 0xbe, 0x50, 0x52, 0x03, 0x3e, 0xb4, 0x03, 0x80, 0xc2, 0xb1, 0x32, 0x5f, 0xe9, 0x7d, 0xcc, 0x55, 0x84, 0x1e, 0x14, 0x7a, 0x89, 0xf0, 0x2a, 0x29, 0x6b, 0x45, 0x05, 0xef, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4784 = { .name = "ecdsa_secp224r1_sha512_4784", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4784_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4784_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4784_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 282 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4785 for ECDSA, tcId is 283 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4785_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4785_msg[] = { 0x31, 0x34, 0x35, 0x37, 0x31, 0x34, 0x36, 0x31, 0x32, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4785_sig[] = { 0xe8, 0x5d, 0x06, 0x67, 0x97, 0x2d, 0x00, 0x3c, 0x82, 0xaf, 0xb9, 0xe1, 0x8b, 0x70, 0x23, 0x57, 0x11, 0x9b, 0x4f, 0x38, 0x40, 0x1a, 0x5e, 0xbd, 0xfc, 0xbe, 0xa8, 0x8c, 0xeb, 0x7b, 0x3e, 0x52, 0x68, 0xa4, 0xce, 0x62, 0x80, 0xf7, 0x2d, 0x7e, 0x9a, 0x3d, 0x74, 0xe5, 0xca, 0xc5, 0x0b, 0x1c, 0x3a, 0x52, 0x96, 0xcd, 0xb5, 0xa4, 0x9d, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4785 = { .name = "ecdsa_secp224r1_sha512_4785", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4785_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4785_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4785_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 283 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4786 for ECDSA, tcId is 284 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4786_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4786_msg[] = { 0x34, 0x31, 0x37, 0x39, 0x35, 0x31, 0x36, 0x30, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4786_sig[] = { 0x3d, 0x24, 0x35, 0x81, 0xc0, 0x87, 0x4f, 0xd4, 0xeb, 0x4d, 0x80, 0xf8, 0x96, 0xc5, 0x06, 0x74, 0x29, 0xad, 0x45, 0x53, 0x14, 0x88, 0x19, 0x51, 0xab, 0x5e, 0xc6, 0xe3, 0x0e, 0xc4, 0x7a, 0xba, 0x08, 0xcc, 0xba, 0x88, 0xc1, 0xa6, 0xdd, 0xc2, 0x89, 0xf5, 0x95, 0xbd, 0xa0, 0x8d, 0xc2, 0xdd, 0x34, 0xd1, 0x2d, 0xce, 0xfb, 0x68, 0x09, 0x4d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4786 = { .name = "ecdsa_secp224r1_sha512_4786", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4786_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4786_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4786_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 284 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4787 for ECDSA, tcId is 285 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4787_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4787_msg[] = { 0x35, 0x38, 0x39, 0x32, 0x37, 0x31, 0x33, 0x30, 0x35, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4787_sig[] = { 0x75, 0xc9, 0x66, 0xbb, 0xdc, 0xef, 0x91, 0x57, 0xd4, 0x7a, 0x13, 0x42, 0x31, 0x22, 0x9f, 0x9f, 0x5e, 0xe8, 0xce, 0x45, 0x87, 0x75, 0xfc, 0x74, 0x7d, 0x45, 0x09, 0xbd, 0xe3, 0x44, 0xfa, 0x71, 0x6e, 0x20, 0x88, 0xd9, 0x5a, 0x55, 0xd0, 0x2a, 0x97, 0x8a, 0x41, 0x6d, 0xa1, 0x0f, 0x22, 0xa5, 0xcc, 0xcf, 0x35, 0xa2, 0x86, 0x32, 0x27, 0xcf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4787 = { .name = "ecdsa_secp224r1_sha512_4787", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4787_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4787_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4787_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 285 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4788 for ECDSA, tcId is 286 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4788_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4788_msg[] = { 0x33, 0x38, 0x39, 0x36, 0x31, 0x38, 0x32, 0x32, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4788_sig[] = { 0xcf, 0xdf, 0x59, 0x9e, 0x98, 0x6d, 0x77, 0x0b, 0x73, 0x78, 0x4d, 0x97, 0x14, 0x9f, 0x99, 0x45, 0xfd, 0x16, 0xd2, 0x2c, 0x30, 0x2b, 0xb7, 0x96, 0x15, 0x6e, 0x7f, 0xb4, 0xc6, 0x40, 0x97, 0x85, 0x04, 0x7b, 0x00, 0x83, 0xf0, 0x08, 0x77, 0x1b, 0x40, 0xdb, 0x85, 0x02, 0x58, 0x32, 0x08, 0xb6, 0x1c, 0x89, 0x84, 0x67, 0x1a, 0xcb, 0x09, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4788 = { .name = "ecdsa_secp224r1_sha512_4788", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4788_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4788_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4788_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 286 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4789 for ECDSA, tcId is 287 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4789_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4789_msg[] = { 0x38, 0x32, 0x38, 0x33, 0x33, 0x34, 0x36, 0x37, 0x33, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4789_sig[] = { 0xc5, 0x3c, 0x4a, 0xee, 0xc8, 0xf2, 0xe7, 0xa5, 0xcc, 0x0e, 0x88, 0x5a, 0x60, 0x31, 0xaa, 0x1a, 0x6c, 0x1b, 0x7b, 0x7f, 0xec, 0x83, 0xb5, 0x08, 0x4c, 0xbe, 0x29, 0x1f, 0xb0, 0xe6, 0xd1, 0x0a, 0x8f, 0xd8, 0x6f, 0x95, 0x8c, 0x3b, 0x0f, 0x46, 0x62, 0xed, 0x8c, 0xa0, 0xd6, 0xea, 0xdb, 0xc8, 0x92, 0xaa, 0xc4, 0x20, 0x0f, 0xcf, 0x83, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4789 = { .name = "ecdsa_secp224r1_sha512_4789", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4789_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4789_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4789_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 287 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4790 for ECDSA, tcId is 288 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4790_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4790_msg[] = { 0x33, 0x33, 0x36, 0x36, 0x39, 0x37, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4790_sig[] = { 0x23, 0x86, 0x55, 0x0d, 0x6e, 0x75, 0x35, 0x0b, 0xcc, 0x32, 0x50, 0x7b, 0xfc, 0x9b, 0xeb, 0x9c, 0x26, 0xd7, 0x2f, 0xf8, 0x2f, 0x67, 0x1c, 0x1f, 0x52, 0x82, 0xe9, 0x8b, 0xa5, 0x5b, 0x8d, 0xe8, 0x08, 0xc4, 0x35, 0x9f, 0xb5, 0x29, 0xb8, 0x0a, 0x80, 0xd9, 0xfc, 0x6e, 0xdd, 0xb5, 0xce, 0x08, 0x08, 0x2c, 0x3b, 0x67, 0x7c, 0x68, 0x99, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4790 = { .name = "ecdsa_secp224r1_sha512_4790", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4790_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4790_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4790_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 288 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4791 for ECDSA, tcId is 289 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4791_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4791_msg[] = { 0x32, 0x31, 0x39, 0x39, 0x31, 0x35, 0x33, 0x32, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4791_sig[] = { 0x1f, 0xbd, 0x19, 0x2d, 0x95, 0x5c, 0xe0, 0x2b, 0x64, 0xa3, 0xbe, 0x5b, 0xb2, 0x1b, 0xef, 0x22, 0xb5, 0x3a, 0x6c, 0x6f, 0x95, 0x76, 0xd8, 0xf8, 0x89, 0xb0, 0x9e, 0x4e, 0xf5, 0xa9, 0xb6, 0x73, 0xa4, 0xee, 0x5a, 0xab, 0xf1, 0xca, 0x8e, 0x82, 0x89, 0xf2, 0x5b, 0x62, 0xa3, 0xe0, 0x8b, 0x95, 0x6f, 0x74, 0x18, 0xc0, 0x3e, 0x2d, 0x30, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4791 = { .name = "ecdsa_secp224r1_sha512_4791", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4791_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4791_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4791_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 289 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4792 for ECDSA, tcId is 290 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4792_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4792_msg[] = { 0x35, 0x36, 0x30, 0x30, 0x33, 0x31, 0x36, 0x38, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4792_sig[] = { 0xb8, 0x0f, 0xfb, 0xa4, 0x51, 0xdb, 0x9f, 0xc2, 0x19, 0x4e, 0x45, 0x0b, 0xdd, 0x43, 0xbc, 0x0f, 0x53, 0xa7, 0xd0, 0xf4, 0xa7, 0x89, 0x00, 0xc0, 0x9f, 0xb8, 0xd9, 0xbc, 0x01, 0x24, 0xee, 0xea, 0xb9, 0x03, 0x5b, 0x6c, 0x84, 0x59, 0x59, 0xe7, 0x0b, 0x04, 0xd1, 0xe1, 0x87, 0xd5, 0x54, 0x80, 0x7d, 0x67, 0x51, 0xaf, 0xab, 0xcc, 0x18, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4792 = { .name = "ecdsa_secp224r1_sha512_4792", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4792_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4792_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4792_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 290 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4793 for ECDSA, tcId is 291 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4793_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4793_msg[] = { 0x38, 0x36, 0x39, 0x36, 0x35, 0x31, 0x36, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4793_sig[] = { 0x18, 0x7f, 0xb0, 0x26, 0xad, 0xe3, 0xad, 0x16, 0xdd, 0x4b, 0x28, 0x13, 0xe8, 0xeb, 0xda, 0x43, 0x3c, 0xb6, 0xcc, 0x3a, 0xf1, 0x61, 0x5b, 0xed, 0xf4, 0x86, 0xa9, 0xe2, 0x6f, 0xbe, 0xe5, 0x3f, 0xa8, 0x84, 0xd2, 0x96, 0xf3, 0x4f, 0x77, 0x19, 0xf7, 0x49, 0x19, 0x43, 0x4d, 0x1b, 0x70, 0x90, 0xc4, 0x85, 0xee, 0xed, 0x2f, 0xb8, 0xfd, 0x6c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4793 = { .name = "ecdsa_secp224r1_sha512_4793", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4793_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4793_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4793_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 291 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4794 for ECDSA, tcId is 292 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4794_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4794_msg[] = { 0x36, 0x35, 0x38, 0x33, 0x39, 0x32, 0x36, 0x33, 0x37, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4794_sig[] = { 0xe5, 0x98, 0xa1, 0x6f, 0xe1, 0x2d, 0xa7, 0x9e, 0x98, 0x14, 0xf6, 0x98, 0x5c, 0x9a, 0x93, 0x34, 0x01, 0x0f, 0x28, 0x7d, 0xc9, 0xe3, 0x8d, 0xe8, 0x57, 0xca, 0x5f, 0xc0, 0x19, 0xe0, 0xed, 0x54, 0xf0, 0xe0, 0x8a, 0xd0, 0x91, 0xa1, 0x63, 0xb4, 0xc7, 0xb8, 0x6d, 0x06, 0x34, 0xda, 0x2c, 0x86, 0xa7, 0xa8, 0x99, 0x1f, 0x5d, 0x87, 0x06, 0xd8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4794 = { .name = "ecdsa_secp224r1_sha512_4794", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4794_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4794_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4794_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 292 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4795 for ECDSA, tcId is 293 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4795_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4795_msg[] = { 0x31, 0x33, 0x32, 0x30, 0x35, 0x30, 0x31, 0x35, 0x37, 0x32, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4795_sig[] = { 0xb3, 0x1a, 0x10, 0x48, 0x0e, 0x39, 0x7c, 0x8a, 0xa4, 0x6f, 0x52, 0xa0, 0xf2, 0xfb, 0x5c, 0x22, 0xeb, 0xc0, 0x53, 0x4f, 0xba, 0x15, 0x67, 0x18, 0xb5, 0x0c, 0xf6, 0xea, 0x60, 0x20, 0x04, 0xdf, 0x4b, 0x47, 0xa2, 0x06, 0x51, 0x30, 0xca, 0x3b, 0x05, 0xf1, 0xeb, 0x02, 0xd0, 0xb3, 0x7b, 0x79, 0xb0, 0x4b, 0x1e, 0xb7, 0x99, 0x40, 0x83, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4795 = { .name = "ecdsa_secp224r1_sha512_4795", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4795_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4795_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4795_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 293 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4796 for ECDSA, tcId is 294 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4796_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4796_msg[] = { 0x35, 0x30, 0x38, 0x35, 0x33, 0x33, 0x30, 0x37, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4796_sig[] = { 0xbc, 0x47, 0xe2, 0x42, 0xd1, 0x9d, 0xcc, 0x63, 0x21, 0x91, 0x39, 0x80, 0xd7, 0x39, 0x23, 0xe4, 0x30, 0xbc, 0x66, 0x23, 0xd2, 0x19, 0x52, 0x9d, 0x58, 0x66, 0x19, 0xb6, 0x81, 0x39, 0x7d, 0xd2, 0xf5, 0x28, 0x11, 0xb5, 0x34, 0xed, 0x75, 0x4a, 0x93, 0x7d, 0x90, 0x4f, 0x04, 0xa7, 0xde, 0x27, 0x8f, 0xa3, 0xbc, 0x89, 0x26, 0xde, 0x69, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4796 = { .name = "ecdsa_secp224r1_sha512_4796", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4796_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4796_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4796_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 294 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4797 for ECDSA, tcId is 295 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4797_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4797_msg[] = { 0x37, 0x38, 0x36, 0x36, 0x38, 0x31, 0x33, 0x31, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4797_sig[] = { 0x5b, 0xe0, 0xe0, 0xdf, 0xb2, 0x6b, 0x1c, 0xaa, 0x88, 0xf8, 0x66, 0x50, 0x4a, 0xa8, 0xe7, 0x6f, 0x03, 0x5a, 0x82, 0xab, 0xe0, 0x00, 0x28, 0xd9, 0x62, 0xbc, 0xfa, 0xfa, 0x3c, 0x3c, 0x1d, 0xf0, 0x60, 0x26, 0x12, 0x34, 0x71, 0xbe, 0xd3, 0x24, 0xca, 0x79, 0xc5, 0x1b, 0x28, 0xb3, 0xd1, 0x0b, 0x1c, 0xe8, 0x77, 0xce, 0xf2, 0x1b, 0x85, 0x2d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4797 = { .name = "ecdsa_secp224r1_sha512_4797", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4797_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4797_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4797_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 295 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4798 for ECDSA, tcId is 296 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4798_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4798_msg[] = { 0x32, 0x30, 0x38, 0x32, 0x35, 0x33, 0x39, 0x34, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4798_sig[] = { 0xfe, 0x79, 0xd0, 0xcf, 0xe4, 0x55, 0x72, 0x47, 0x92, 0xcb, 0x5a, 0xb0, 0x58, 0x0a, 0xd4, 0xf2, 0x91, 0x8c, 0x14, 0x03, 0xec, 0x12, 0xf0, 0xbd, 0xd2, 0xce, 0x65, 0x28, 0xf1, 0x35, 0x7c, 0xd4, 0xaf, 0xc4, 0x02, 0x99, 0x4a, 0xb8, 0x68, 0xb0, 0x16, 0x3f, 0x41, 0x70, 0x1e, 0x0f, 0x00, 0xe5, 0x61, 0xfd, 0xd9, 0x7e, 0x0d, 0xb6, 0xf7, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4798 = { .name = "ecdsa_secp224r1_sha512_4798", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4798_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4798_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4798_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 296 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4799 for ECDSA, tcId is 297 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4799_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4799_msg[] = { 0x31, 0x30, 0x30, 0x36, 0x35, 0x39, 0x35, 0x36, 0x36, 0x39, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4799_sig[] = { 0x18, 0x58, 0xc5, 0xd8, 0x57, 0x12, 0x4c, 0xd7, 0x03, 0xe7, 0xc2, 0xf5, 0xe9, 0x9d, 0x50, 0x25, 0xd6, 0xd9, 0x79, 0x53, 0x9c, 0x6f, 0x50, 0xb1, 0xd0, 0x0f, 0xbd, 0x34, 0xd9, 0x4a, 0x5a, 0xdb, 0x6d, 0x9c, 0x50, 0x01, 0x16, 0x26, 0x20, 0x41, 0x55, 0x41, 0xd4, 0x93, 0x34, 0xfb, 0x92, 0x9b, 0xc8, 0x6a, 0x35, 0x0c, 0xa4, 0x59, 0x11, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4799 = { .name = "ecdsa_secp224r1_sha512_4799", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4799_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4799_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4799_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 297 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4800 for ECDSA, tcId is 298 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4800_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4800_msg[] = { 0x33, 0x30, 0x32, 0x34, 0x31, 0x38, 0x31, 0x36, 0x30, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4800_sig[] = { 0xe6, 0xb2, 0xec, 0x96, 0x7c, 0xfa, 0x25, 0xf5, 0x72, 0x34, 0xb9, 0xef, 0x1d, 0x87, 0xc5, 0x94, 0x55, 0x02, 0xcb, 0xbd, 0x58, 0x31, 0xc8, 0x62, 0xf0, 0x07, 0x74, 0xd1, 0xca, 0xea, 0x26, 0x36, 0x8b, 0xff, 0xc8, 0xe5, 0x62, 0xb2, 0xbd, 0x03, 0xaa, 0x6c, 0x9d, 0xc4, 0x1c, 0x52, 0x96, 0x59, 0xfe, 0xfe, 0x65, 0x97, 0xfc, 0xe9, 0xcd, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4800 = { .name = "ecdsa_secp224r1_sha512_4800", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4800_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4800_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4800_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 298 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4801 for ECDSA, tcId is 299 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4801_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4801_msg[] = { 0x37, 0x37, 0x36, 0x37, 0x38, 0x35, 0x32, 0x38, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4801_sig[] = { 0xa5, 0x9b, 0x43, 0x8b, 0x24, 0x72, 0x07, 0x4a, 0x93, 0xa2, 0x89, 0xb3, 0x3f, 0x5b, 0x13, 0xe6, 0x04, 0x97, 0x7d, 0xd3, 0xab, 0x4d, 0x74, 0x4d, 0x08, 0xe1, 0x06, 0x1b, 0x69, 0x95, 0x74, 0xa1, 0x7d, 0xc8, 0xc7, 0x29, 0x8c, 0x93, 0x21, 0xca, 0x78, 0x55, 0x2e, 0x51, 0x28, 0xea, 0x80, 0x1d, 0x05, 0x6f, 0x38, 0x7b, 0xa4, 0x2f, 0x7a, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4801 = { .name = "ecdsa_secp224r1_sha512_4801", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4801_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4801_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4801_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 299 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4802 for ECDSA, tcId is 300 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4802_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4802_msg[] = { 0x35, 0x34, 0x34, 0x31, 0x39, 0x39, 0x39, 0x37, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4802_sig[] = { 0x74, 0x84, 0x81, 0x70, 0x9c, 0x68, 0x82, 0xc4, 0xa1, 0x30, 0x19, 0x38, 0x34, 0xa5, 0x7f, 0x4b, 0xc7, 0x14, 0x90, 0x62, 0x11, 0xec, 0x6c, 0xc1, 0x2c, 0x40, 0x0d, 0xff, 0xee, 0xc6, 0xc9, 0xd5, 0xa0, 0x67, 0x86, 0xf8, 0x21, 0xa8, 0x11, 0x7e, 0xec, 0x3d, 0xc0, 0x25, 0xed, 0x3a, 0xc7, 0x4e, 0x39, 0xe9, 0x8a, 0x16, 0xa4, 0xaa, 0x28, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4802 = { .name = "ecdsa_secp224r1_sha512_4802", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4802_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4802_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4802_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 300 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4803 for ECDSA, tcId is 301 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4803_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4803_msg[] = { 0x35, 0x38, 0x34, 0x33, 0x34, 0x38, 0x30, 0x33, 0x39, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4803_sig[] = { 0xbc, 0x89, 0x91, 0xb5, 0x06, 0x99, 0x74, 0x03, 0xe1, 0x23, 0x13, 0x6a, 0x9c, 0x14, 0x0a, 0x43, 0x36, 0x36, 0x47, 0x33, 0xb0, 0x81, 0x5f, 0x40, 0xd1, 0xdb, 0xd5, 0xfe, 0x81, 0x95, 0x03, 0xea, 0x3b, 0x4c, 0x07, 0xfc, 0x15, 0x7f, 0x94, 0x8f, 0x69, 0x49, 0x70, 0x5d, 0x56, 0x0a, 0x88, 0x1f, 0xc1, 0xc6, 0xaf, 0x4b, 0x73, 0x91, 0x76, 0x5c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4803 = { .name = "ecdsa_secp224r1_sha512_4803", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4803_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4803_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4803_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 301 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4804 for ECDSA, tcId is 302 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4804_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4804_msg[] = { 0x37, 0x31, 0x38, 0x38, 0x39, 0x32, 0x36, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4804_sig[] = { 0x1c, 0xae, 0xce, 0x75, 0xc8, 0xe3, 0x1b, 0xb0, 0xc5, 0xcc, 0xeb, 0x08, 0x42, 0xf2, 0x36, 0x83, 0xb8, 0x55, 0x7a, 0x97, 0x03, 0x65, 0x74, 0xea, 0x88, 0xce, 0xea, 0xbd, 0x64, 0x5a, 0xd3, 0x27, 0x6a, 0xae, 0xe2, 0x2b, 0x69, 0x36, 0x47, 0xf0, 0x0d, 0xce, 0x5f, 0x91, 0xa0, 0x3b, 0x67, 0x8b, 0x78, 0x9b, 0x66, 0x7c, 0xd3, 0xb8, 0xe7, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4804 = { .name = "ecdsa_secp224r1_sha512_4804", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4804_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4804_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4804_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 302 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4805 for ECDSA, tcId is 303 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4805_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4805_msg[] = { 0x31, 0x37, 0x34, 0x33, 0x32, 0x32, 0x33, 0x34, 0x34, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4805_sig[] = { 0x3a, 0x7d, 0x58, 0x20, 0x68, 0xaa, 0xec, 0xab, 0xa9, 0x45, 0x20, 0x3b, 0xc4, 0x45, 0xb3, 0x31, 0x2e, 0x5c, 0xb4, 0x08, 0x86, 0x52, 0x29, 0x87, 0xac, 0xed, 0x68, 0xd0, 0x39, 0xb3, 0xc6, 0x12, 0xb6, 0x74, 0x3a, 0x13, 0xbb, 0x2f, 0xfb, 0x83, 0x51, 0x4d, 0x69, 0x0c, 0xfc, 0xb9, 0xa7, 0x05, 0x5e, 0x3a, 0x99, 0x3c, 0xb0, 0x86, 0x39, 0x38, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4805 = { .name = "ecdsa_secp224r1_sha512_4805", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4805_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4805_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4805_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 303 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4806 for ECDSA, tcId is 304 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4806_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4806_msg[] = { 0x32, 0x34, 0x30, 0x36, 0x30, 0x30, 0x35, 0x39, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4806_sig[] = { 0xf7, 0x73, 0xc4, 0x9f, 0xd0, 0x64, 0x57, 0x16, 0xd1, 0x6e, 0x55, 0x9e, 0x22, 0xc3, 0x91, 0x01, 0xdf, 0x26, 0x6c, 0xdf, 0xa7, 0xcb, 0x61, 0xce, 0x46, 0xf8, 0x52, 0x80, 0xdf, 0x61, 0x09, 0xfd, 0x77, 0xa2, 0x41, 0x03, 0x1c, 0xf0, 0x3b, 0x37, 0x6e, 0x00, 0x1d, 0x8a, 0x3c, 0xd2, 0xa6, 0xb6, 0x46, 0xed, 0xbf, 0x9e, 0x57, 0x81, 0x33, 0xf1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4806 = { .name = "ecdsa_secp224r1_sha512_4806", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4806_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4806_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4806_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 304 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4807 for ECDSA, tcId is 305 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4807_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4807_msg[] = { 0x31, 0x36, 0x31, 0x34, 0x30, 0x33, 0x36, 0x39, 0x38, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4807_sig[] = { 0x79, 0xcf, 0x89, 0x3f, 0x66, 0xf7, 0xfa, 0xa5, 0xca, 0x08, 0x55, 0x3e, 0xa0, 0x34, 0x56, 0x10, 0x7e, 0x7b, 0xb3, 0x91, 0xa5, 0xe5, 0x12, 0x60, 0xce, 0xda, 0xea, 0x84, 0x32, 0xe8, 0xe3, 0x50, 0x94, 0x68, 0xda, 0x72, 0x16, 0xc5, 0x99, 0x75, 0xd4, 0xf3, 0xd5, 0x49, 0x38, 0x48, 0xa0, 0x3f, 0x86, 0x4b, 0x23, 0x32, 0x04, 0x4e, 0x68, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4807 = { .name = "ecdsa_secp224r1_sha512_4807", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4807_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4807_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4807_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 305 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4808 for ECDSA, tcId is 306 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4808_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4808_msg[] = { 0x32, 0x30, 0x39, 0x35, 0x34, 0x32, 0x35, 0x36, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4808_sig[] = { 0x02, 0x5e, 0xcd, 0x1a, 0x7a, 0xb7, 0x65, 0xfb, 0xfd, 0x25, 0xa6, 0xd7, 0xcd, 0x3c, 0x46, 0x1e, 0x17, 0xf4, 0x65, 0xe6, 0x95, 0x8b, 0xce, 0x9f, 0x49, 0x2b, 0x7a, 0x5a, 0xa1, 0xca, 0x95, 0x03, 0x86, 0x03, 0xd3, 0x02, 0x76, 0x1e, 0x41, 0x69, 0x35, 0xac, 0xbd, 0x6b, 0x71, 0x6a, 0x31, 0x6c, 0x9b, 0x79, 0xc5, 0x7d, 0x40, 0x53, 0xcb, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4808 = { .name = "ecdsa_secp224r1_sha512_4808", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4808_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4808_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4808_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 306 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4809 for ECDSA, tcId is 307 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4809_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4809_msg[] = { 0x31, 0x30, 0x30, 0x38, 0x30, 0x39, 0x38, 0x39, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4809_sig[] = { 0x3d, 0x14, 0xa4, 0xc2, 0x1b, 0xa4, 0xdb, 0xd3, 0x38, 0xfd, 0xd8, 0xb1, 0x5f, 0xcd, 0xd0, 0xa9, 0x22, 0x8f, 0x15, 0x7c, 0xfa, 0xf2, 0xb0, 0x9d, 0xd4, 0xf2, 0xaa, 0x67, 0xe1, 0x64, 0x0e, 0x8b, 0xd2, 0xa6, 0x11, 0x0d, 0xc1, 0x8d, 0x6f, 0x29, 0x0b, 0x73, 0x25, 0x81, 0x47, 0x10, 0xc0, 0xdc, 0x88, 0xb7, 0x6f, 0x12, 0x7c, 0x5e, 0x9e, 0x21, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4809 = { .name = "ecdsa_secp224r1_sha512_4809", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4809_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4809_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4809_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 307 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4810 for ECDSA, tcId is 308 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4810_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4810_msg[] = { 0x31, 0x35, 0x37, 0x34, 0x31, 0x34, 0x37, 0x39, 0x32, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4810_sig[] = { 0x25, 0x8d, 0xce, 0x91, 0x6e, 0xf7, 0x8b, 0x9d, 0x8a, 0x87, 0xbe, 0xaf, 0x6e, 0xdd, 0x35, 0xbc, 0xcc, 0xc0, 0x8c, 0x5d, 0xe4, 0x88, 0x58, 0x6e, 0x1b, 0x7b, 0x74, 0x9a, 0x4f, 0xf5, 0x00, 0xdb, 0x4d, 0x66, 0x5c, 0x70, 0x62, 0x17, 0x9c, 0x09, 0x9b, 0x29, 0x85, 0xa8, 0x14, 0xf9, 0x9f, 0xbf, 0xa4, 0x4a, 0x3a, 0x70, 0x90, 0x24, 0xd5, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4810 = { .name = "ecdsa_secp224r1_sha512_4810", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4810_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4810_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4810_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 308 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4811 for ECDSA, tcId is 309 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4811_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4811_msg[] = { 0x32, 0x38, 0x36, 0x36, 0x37, 0x37, 0x31, 0x35, 0x32, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4811_sig[] = { 0xce, 0xcf, 0x0a, 0xec, 0x53, 0x57, 0x74, 0x9f, 0x35, 0x7c, 0x45, 0x95, 0x75, 0x29, 0x8a, 0x33, 0x84, 0xdc, 0x4a, 0xc3, 0x81, 0x43, 0x8f, 0xf9, 0x9a, 0xcd, 0x99, 0x93, 0xda, 0x7a, 0xdb, 0x09, 0x2a, 0x68, 0x90, 0xe0, 0x91, 0x8c, 0x23, 0x5a, 0x62, 0xd4, 0xa9, 0x49, 0xb0, 0xca, 0xe5, 0xe5, 0x78, 0x56, 0x97, 0x51, 0x08, 0xfb, 0x2b, 0x91, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4811 = { .name = "ecdsa_secp224r1_sha512_4811", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4811_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4811_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4811_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 309 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4812 for ECDSA, tcId is 310 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4812_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4812_msg[] = { 0x31, 0x36, 0x39, 0x34, 0x32, 0x38, 0x30, 0x37, 0x38, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4812_sig[] = { 0xd7, 0x7f, 0x2e, 0x54, 0x7f, 0xd6, 0x8d, 0x5d, 0xb3, 0x14, 0x90, 0x1d, 0xa1, 0xff, 0x7e, 0xca, 0xf3, 0xd0, 0xc1, 0x7e, 0xc0, 0x47, 0xa9, 0x74, 0xa7, 0xce, 0xc3, 0x3e, 0x44, 0x3a, 0x97, 0xaf, 0xdf, 0x88, 0x22, 0x72, 0xbf, 0x02, 0x33, 0xc8, 0xc4, 0xa8, 0xd2, 0x3c, 0x93, 0x52, 0xad, 0x89, 0xb1, 0x77, 0x0c, 0x26, 0x24, 0x0f, 0x66, 0x50, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4812 = { .name = "ecdsa_secp224r1_sha512_4812", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4812_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4812_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4812_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 310 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4813 for ECDSA, tcId is 311 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4813_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4813_msg[] = { 0x39, 0x39, 0x32, 0x31, 0x36, 0x39, 0x32, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4813_sig[] = { 0xd5, 0xdc, 0xf9, 0x3e, 0x6e, 0x1b, 0x93, 0x32, 0x3e, 0xa2, 0x64, 0x2d, 0x34, 0x05, 0xa7, 0x42, 0x3c, 0xb0, 0x4f, 0x59, 0xc0, 0x34, 0x20, 0x19, 0x3f, 0x39, 0x48, 0x86, 0xdd, 0xd5, 0x84, 0x2e, 0x49, 0x28, 0xee, 0x4b, 0x5d, 0x77, 0xd4, 0x3d, 0x4a, 0x4b, 0xfc, 0x7f, 0x99, 0x1c, 0x89, 0x97, 0x27, 0xb7, 0x5f, 0xc9, 0x41, 0xb5, 0x29, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4813 = { .name = "ecdsa_secp224r1_sha512_4813", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4813_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4813_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4813_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 311 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4814 for ECDSA, tcId is 312 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4814_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4814_msg[] = { 0x31, 0x31, 0x36, 0x30, 0x39, 0x34, 0x33, 0x39, 0x37, 0x39, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4814_sig[] = { 0xa9, 0xbc, 0x3e, 0xbc, 0x6e, 0xe3, 0x44, 0x21, 0x32, 0x67, 0x11, 0xce, 0x29, 0x51, 0x8d, 0x02, 0xbd, 0x40, 0x3e, 0xad, 0x80, 0x6a, 0x3e, 0x45, 0x02, 0xef, 0xa0, 0xce, 0x12, 0x61, 0x0b, 0x89, 0xa6, 0x16, 0x89, 0xa8, 0xeb, 0x6e, 0x06, 0x2d, 0x25, 0x24, 0x27, 0x81, 0x55, 0xfe, 0x49, 0x9f, 0xfe, 0xcc, 0x0e, 0x0d, 0x94, 0x0d, 0x48, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4814 = { .name = "ecdsa_secp224r1_sha512_4814", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4814_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4814_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4814_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 312 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4815 for ECDSA, tcId is 313 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4815_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4815_msg[] = { 0x37, 0x31, 0x38, 0x36, 0x31, 0x36, 0x32, 0x31, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4815_sig[] = { 0xc7, 0x03, 0xc5, 0x08, 0x78, 0x4e, 0xf7, 0x1b, 0x59, 0x6d, 0xcd, 0x61, 0xc5, 0xb0, 0x1b, 0x45, 0xc6, 0xc6, 0x9d, 0x2b, 0x36, 0xa5, 0xa3, 0xb7, 0x70, 0x1e, 0x59, 0x76, 0xf0, 0x54, 0x44, 0xa7, 0x77, 0x20, 0x41, 0x18, 0xf3, 0xac, 0x2a, 0xfc, 0x92, 0xd0, 0x21, 0x28, 0x31, 0xbf, 0x70, 0x02, 0x15, 0x8e, 0x7c, 0x65, 0x6f, 0x4c, 0x07, 0xdb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4815 = { .name = "ecdsa_secp224r1_sha512_4815", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4815_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4815_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4815_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 313 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4816 for ECDSA, tcId is 314 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4816_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4816_msg[] = { 0x33, 0x32, 0x39, 0x34, 0x33, 0x34, 0x37, 0x31, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4816_sig[] = { 0x80, 0x67, 0x4b, 0x74, 0x0b, 0x64, 0xd3, 0x83, 0x67, 0x7c, 0x04, 0x9a, 0x6f, 0x4b, 0xae, 0xb2, 0x14, 0xf4, 0xa6, 0xb5, 0x93, 0x30, 0x33, 0x85, 0x3e, 0x63, 0x45, 0x78, 0x9b, 0x3a, 0x80, 0x4c, 0x75, 0xed, 0x79, 0x0e, 0x31, 0x96, 0x6b, 0xc2, 0x57, 0x30, 0xb7, 0x42, 0x8a, 0xf8, 0xc7, 0x3c, 0x65, 0xfb, 0x50, 0x3c, 0x06, 0xc5, 0x97, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4816 = { .name = "ecdsa_secp224r1_sha512_4816", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4816_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4816_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4816_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 314 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4817 for ECDSA, tcId is 315 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4817_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4817_msg[] = { 0x31, 0x38, 0x35, 0x31, 0x34, 0x34, 0x35, 0x35, 0x31, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4817_sig[] = { 0x7e, 0xd6, 0x58, 0xc3, 0x0f, 0x4a, 0x0d, 0xcc, 0x89, 0x4c, 0x39, 0xf9, 0x32, 0x0f, 0x59, 0xa1, 0x85, 0x50, 0x9f, 0xfe, 0xe4, 0x5e, 0xac, 0x60, 0x23, 0x57, 0x7c, 0x7c, 0x47, 0xac, 0x94, 0xa5, 0x01, 0x80, 0x6d, 0x5a, 0xdf, 0xfe, 0xa9, 0xfc, 0xf3, 0xcc, 0xd8, 0xcf, 0x79, 0xf3, 0xcc, 0x47, 0xec, 0xa9, 0xfe, 0x38, 0xfc, 0x48, 0x86, 0xb4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4817 = { .name = "ecdsa_secp224r1_sha512_4817", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4817_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4817_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4817_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 315 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4818 for ECDSA, tcId is 316 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4818_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4818_msg[] = { 0x34, 0x37, 0x36, 0x30, 0x34, 0x33, 0x39, 0x33, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4818_sig[] = { 0x39, 0x7f, 0x66, 0x9c, 0xc3, 0x99, 0xa9, 0x1d, 0xa9, 0x6c, 0x16, 0xef, 0xd2, 0x33, 0xf6, 0xfe, 0x60, 0xd1, 0xb7, 0xca, 0xa3, 0x97, 0xcc, 0x25, 0x78, 0x43, 0xb3, 0x0b, 0xf1, 0x93, 0x75, 0xfe, 0x66, 0xea, 0xe4, 0x73, 0x8e, 0xc9, 0xdc, 0x5b, 0x7e, 0xf5, 0x1c, 0xb3, 0x3d, 0x4c, 0xb2, 0x58, 0xf3, 0x69, 0x44, 0xd3, 0x7d, 0xd2, 0x45, 0xcb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4818 = { .name = "ecdsa_secp224r1_sha512_4818", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4818_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4818_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4818_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 316 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4819 for ECDSA, tcId is 317 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4819_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4819_msg[] = { 0x32, 0x35, 0x36, 0x37, 0x33, 0x37, 0x38, 0x37, 0x34, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4819_sig[] = { 0x53, 0x7e, 0xc3, 0x69, 0xb3, 0xf0, 0xd8, 0x91, 0xe1, 0x66, 0xf6, 0xc7, 0x4e, 0x5d, 0x73, 0xdd, 0x2c, 0x48, 0x22, 0x21, 0x0c, 0x5f, 0xe5, 0xf9, 0x78, 0xc3, 0x40, 0x72, 0x0b, 0x18, 0x3c, 0x48, 0xb5, 0xf6, 0xe6, 0x92, 0x45, 0xcb, 0x76, 0xe1, 0xe2, 0xc3, 0x96, 0x63, 0xee, 0xdf, 0xb7, 0x4b, 0xa9, 0x53, 0x87, 0x39, 0xac, 0x49, 0x5f, 0xf5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4819 = { .name = "ecdsa_secp224r1_sha512_4819", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4819_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4819_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4819_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 317 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4820 for ECDSA, tcId is 318 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4820_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4820_msg[] = { 0x35, 0x37, 0x33, 0x39, 0x39, 0x33, 0x34, 0x39, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4820_sig[] = { 0xd0, 0xed, 0x71, 0x59, 0xcc, 0x3a, 0x79, 0x98, 0x8f, 0x3c, 0x27, 0x92, 0x87, 0xca, 0x8e, 0xd1, 0x0b, 0xb8, 0xf0, 0x2c, 0x8b, 0x5a, 0x62, 0x04, 0xae, 0xad, 0x12, 0x23, 0x75, 0xee, 0x1e, 0x5c, 0x00, 0xe8, 0x18, 0x99, 0xbf, 0xa8, 0x54, 0x5e, 0xdc, 0xc6, 0x4f, 0xdf, 0x70, 0x7d, 0xae, 0x1f, 0x61, 0xd9, 0x76, 0xd2, 0xf0, 0x88, 0x37, 0x77, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4820 = { .name = "ecdsa_secp224r1_sha512_4820", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4820_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4820_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4820_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 318 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4821 for ECDSA, tcId is 319 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4821_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4821_msg[] = { 0x33, 0x34, 0x37, 0x38, 0x33, 0x36, 0x36, 0x31, 0x33, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4821_sig[] = { 0xcf, 0x43, 0x32, 0x9a, 0x97, 0x81, 0xdb, 0x80, 0x44, 0xa9, 0x20, 0x75, 0x8e, 0x58, 0x39, 0x98, 0x66, 0xfe, 0x77, 0x48, 0xc0, 0xf5, 0xd6, 0xa3, 0xbc, 0xdc, 0xbc, 0xbd, 0xd9, 0x74, 0x0d, 0x2d, 0xd7, 0x16, 0x29, 0x0a, 0xd4, 0x16, 0x03, 0x45, 0xbc, 0xd4, 0xaf, 0x03, 0xaf, 0x01, 0xc4, 0x4b, 0x61, 0x0b, 0x1e, 0x59, 0x53, 0x19, 0x90, 0x75, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4821 = { .name = "ecdsa_secp224r1_sha512_4821", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4821_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4821_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4821_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 319 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4822 for ECDSA, tcId is 320 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4822_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4822_msg[] = { 0x36, 0x34, 0x39, 0x30, 0x35, 0x32, 0x36, 0x30, 0x32, }; static const unsigned char ecdsa_secp224r1_sha512_4822_sig[] = { 0x8a, 0xb2, 0xe9, 0x2c, 0x8c, 0x91, 0x43, 0xf9, 0xd8, 0xda, 0x3b, 0xdb, 0x1d, 0x93, 0x5c, 0xce, 0x3a, 0xb6, 0x0a, 0xe9, 0x9b, 0x3c, 0xcf, 0xe8, 0x63, 0xb1, 0x5d, 0x14, 0x88, 0xc8, 0x93, 0x02, 0xe8, 0xa9, 0xc5, 0x91, 0xc6, 0xed, 0x16, 0xb1, 0xae, 0x46, 0xf9, 0x66, 0x00, 0x4d, 0x0b, 0x26, 0x85, 0x44, 0x98, 0x42, 0xe2, 0x91, 0xd7, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4822 = { .name = "ecdsa_secp224r1_sha512_4822", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4822_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4822_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4822_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 320 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4823 for ECDSA, tcId is 321 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4823_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4823_msg[] = { 0x34, 0x37, 0x36, 0x33, 0x38, 0x38, 0x37, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4823_sig[] = { 0x04, 0xf6, 0x0f, 0x84, 0x50, 0xb4, 0x48, 0x19, 0x8c, 0xf7, 0x98, 0x11, 0x16, 0xde, 0x06, 0xd4, 0xc4, 0x88, 0x8c, 0xd2, 0x6b, 0xe3, 0xa5, 0x94, 0x70, 0x92, 0x23, 0x8f, 0xcb, 0x23, 0xfc, 0xb3, 0x3c, 0x14, 0xf0, 0x89, 0xc2, 0xae, 0x03, 0x01, 0x46, 0xd6, 0x8f, 0xa6, 0x5e, 0xb9, 0xb0, 0x86, 0xfa, 0x79, 0x2f, 0x95, 0xbe, 0x8e, 0xcf, 0x35, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4823 = { .name = "ecdsa_secp224r1_sha512_4823", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4823_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4823_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4823_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 321 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4824 for ECDSA, tcId is 322 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4824_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4824_msg[] = { 0x35, 0x37, 0x39, 0x30, 0x32, 0x30, 0x30, 0x38, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4824_sig[] = { 0xf2, 0x70, 0xf7, 0xa7, 0x0a, 0x96, 0xa0, 0xf9, 0x16, 0xc7, 0x53, 0x0c, 0x6d, 0xea, 0x71, 0x78, 0xe6, 0xc0, 0x87, 0xdd, 0xbc, 0xc6, 0x0a, 0xac, 0xd8, 0xa7, 0xc5, 0x53, 0x8b, 0x2c, 0x37, 0x85, 0x54, 0x12, 0x13, 0x65, 0xa1, 0x80, 0xad, 0x4e, 0xdf, 0x1a, 0x12, 0xe5, 0x66, 0xba, 0x55, 0xee, 0xab, 0xf5, 0x25, 0x35, 0x67, 0x83, 0xe6, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4824 = { .name = "ecdsa_secp224r1_sha512_4824", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4824_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4824_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4824_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 322 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4825 for ECDSA, tcId is 323 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4825_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4825_msg[] = { 0x35, 0x33, 0x34, 0x34, 0x37, 0x38, 0x37, 0x38, 0x34, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4825_sig[] = { 0x85, 0xad, 0x01, 0xb2, 0x36, 0xca, 0x4a, 0x54, 0x51, 0x96, 0x92, 0x42, 0xe1, 0x61, 0x65, 0xd3, 0x22, 0x42, 0x82, 0x35, 0xa2, 0xaf, 0x8f, 0xdc, 0xd6, 0xc4, 0xc7, 0xb9, 0x8e, 0xb2, 0x99, 0x8c, 0x5e, 0x0a, 0xaf, 0x27, 0x97, 0x93, 0xca, 0xff, 0x59, 0xa2, 0x66, 0xca, 0x20, 0x68, 0xd9, 0x4e, 0xbf, 0x77, 0xba, 0xe8, 0x1f, 0xd0, 0xfb, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4825 = { .name = "ecdsa_secp224r1_sha512_4825", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4825_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4825_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4825_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 323 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4826 for ECDSA, tcId is 324 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4826_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4826_msg[] = { 0x31, 0x39, 0x32, 0x36, 0x36, 0x34, 0x31, 0x30, 0x39, 0x32, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4826_sig[] = { 0xcf, 0xfd, 0xb8, 0xd6, 0x4b, 0x5b, 0x84, 0xb4, 0x90, 0xff, 0x73, 0xd7, 0x7e, 0x51, 0xcc, 0x77, 0x97, 0xbf, 0x67, 0xc5, 0xee, 0x0a, 0x49, 0x99, 0xde, 0xf1, 0x72, 0x30, 0x3b, 0xaf, 0x4b, 0x34, 0xe1, 0xa3, 0x5e, 0x96, 0x06, 0xa4, 0x60, 0xb3, 0x95, 0x06, 0x3a, 0x55, 0x42, 0x64, 0xa9, 0xc4, 0x3c, 0xc3, 0x02, 0xab, 0x5a, 0xbf, 0x47, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4826 = { .name = "ecdsa_secp224r1_sha512_4826", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4826_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4826_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4826_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 324 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4827 for ECDSA, tcId is 325 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4827_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4827_msg[] = { 0x33, 0x37, 0x30, 0x33, 0x39, 0x31, 0x35, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4827_sig[] = { 0x66, 0xcd, 0xa5, 0x8a, 0x5a, 0x6d, 0xdb, 0x94, 0x76, 0xe3, 0x6d, 0xba, 0xd5, 0xdf, 0x54, 0x2b, 0xe8, 0x8d, 0x7e, 0x44, 0x7b, 0xdc, 0x3d, 0xfe, 0x1d, 0x9e, 0x8b, 0x2c, 0x0d, 0x99, 0xd3, 0x87, 0x48, 0x6a, 0x96, 0x4e, 0xba, 0xb4, 0xe2, 0x9b, 0xad, 0x58, 0x3e, 0x46, 0xa5, 0xa2, 0x00, 0x39, 0x1d, 0x10, 0x65, 0x76, 0x8a, 0x4e, 0x35, 0xfd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4827 = { .name = "ecdsa_secp224r1_sha512_4827", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4827_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4827_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4827_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 325 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4828 for ECDSA, tcId is 326 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4828_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4828_msg[] = { 0x38, 0x31, 0x35, 0x34, 0x35, 0x37, 0x37, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4828_sig[] = { 0x32, 0x00, 0x76, 0x19, 0x02, 0x82, 0x5b, 0xd3, 0x53, 0x90, 0x8a, 0xcc, 0xd2, 0xbe, 0x6b, 0x48, 0x26, 0x45, 0x64, 0x69, 0x71, 0xf9, 0x6d, 0xc4, 0x90, 0x70, 0x6a, 0x37, 0x3e, 0xd7, 0x78, 0x99, 0xef, 0xdb, 0xe4, 0x18, 0x37, 0x0f, 0xa7, 0x99, 0x8d, 0xf3, 0xb7, 0xc9, 0x24, 0xbe, 0xd6, 0x86, 0x45, 0x35, 0x27, 0x7f, 0x80, 0x5c, 0x89, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4828 = { .name = "ecdsa_secp224r1_sha512_4828", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4828_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4828_msg, .msglen = 8, .sig = ecdsa_secp224r1_sha512_4828_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 326 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4829 for ECDSA, tcId is 327 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4829_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4829_msg[] = { 0x31, 0x39, 0x35, 0x35, 0x33, 0x30, 0x33, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4829_sig[] = { 0xba, 0x0e, 0xff, 0x0e, 0xe4, 0x6a, 0xa9, 0xfc, 0xa5, 0xab, 0x8a, 0xd6, 0x4a, 0xee, 0x40, 0x37, 0x93, 0x1d, 0x3a, 0xd0, 0xb9, 0x53, 0xd4, 0x04, 0xef, 0x9f, 0x7b, 0xdc, 0xaf, 0xdf, 0x21, 0xdf, 0x0d, 0xcb, 0xe3, 0x9c, 0x2f, 0x5f, 0xa9, 0xef, 0x7e, 0x1a, 0x2b, 0xca, 0x87, 0xd1, 0x21, 0x3d, 0x1e, 0xca, 0x43, 0x89, 0x29, 0xad, 0x89, 0x82, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4829 = { .name = "ecdsa_secp224r1_sha512_4829", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4829_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4829_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4829_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 327 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4830 for ECDSA, tcId is 328 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4830_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4830_msg[] = { 0x31, 0x32, 0x36, 0x37, 0x38, 0x31, 0x30, 0x39, 0x30, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4830_sig[] = { 0xa2, 0x0c, 0x68, 0x83, 0xfc, 0x6e, 0xc1, 0xca, 0x4b, 0xb3, 0x78, 0xac, 0x88, 0xed, 0x67, 0x0a, 0x74, 0x2a, 0x62, 0x84, 0x11, 0x3d, 0x5f, 0xa3, 0x18, 0x2a, 0x18, 0x58, 0xe0, 0xa7, 0x3b, 0x91, 0x3b, 0x94, 0x16, 0x31, 0x75, 0xd2, 0x64, 0x22, 0x4c, 0xc7, 0x07, 0x36, 0xf2, 0xfb, 0x8e, 0x8d, 0x58, 0xe9, 0x14, 0xb1, 0x8c, 0x92, 0x13, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4830 = { .name = "ecdsa_secp224r1_sha512_4830", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4830_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4830_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4830_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 328 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4831 for ECDSA, tcId is 329 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4831_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4831_msg[] = { 0x31, 0x31, 0x31, 0x38, 0x30, 0x37, 0x32, 0x30, 0x38, 0x31, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4831_sig[] = { 0xf2, 0xf4, 0xaf, 0x95, 0x6b, 0x0c, 0x54, 0x09, 0x94, 0x9d, 0x37, 0x7e, 0x9b, 0xc6, 0x8e, 0x4f, 0x1a, 0xbe, 0xf7, 0x96, 0x9b, 0x51, 0x8f, 0x8b, 0xea, 0xcf, 0x27, 0xdb, 0xdf, 0x3a, 0x7b, 0x59, 0x93, 0xd2, 0x39, 0x3a, 0xde, 0x70, 0xa2, 0xcf, 0xc1, 0xe8, 0x67, 0x1a, 0x78, 0xca, 0x4f, 0xec, 0xb5, 0x64, 0x25, 0xa6, 0x61, 0xa2, 0xd2, 0xfc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4831 = { .name = "ecdsa_secp224r1_sha512_4831", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4831_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4831_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4831_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 329 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4832 for ECDSA, tcId is 330 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4832_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4832_msg[] = { 0x38, 0x33, 0x38, 0x31, 0x38, 0x36, 0x39, 0x32, 0x39, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4832_sig[] = { 0x33, 0x1a, 0x1a, 0x55, 0x34, 0x94, 0xf8, 0x52, 0x4a, 0xdb, 0x4e, 0x8a, 0x72, 0x2d, 0x55, 0x89, 0x65, 0xfb, 0x70, 0x3a, 0xe4, 0x32, 0xbf, 0x3c, 0xbd, 0xb2, 0x55, 0xc2, 0x5a, 0xb6, 0xe3, 0xde, 0xe6, 0xa2, 0x51, 0x6f, 0xc4, 0xe0, 0xac, 0x88, 0xe6, 0xdf, 0xc8, 0x1d, 0x2b, 0xc3, 0x7c, 0x98, 0x94, 0x9c, 0xc0, 0x3e, 0x52, 0x1d, 0x38, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4832 = { .name = "ecdsa_secp224r1_sha512_4832", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4832_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4832_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4832_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 330 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4833 for ECDSA, tcId is 331 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4833_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4833_msg[] = { 0x33, 0x31, 0x33, 0x31, 0x32, 0x38, 0x37, 0x32, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4833_sig[] = { 0x86, 0x71, 0x35, 0x55, 0x8e, 0x06, 0xe1, 0x97, 0x96, 0xeb, 0xce, 0x8e, 0x35, 0x55, 0xc6, 0x07, 0xa6, 0x60, 0x7d, 0x46, 0xf7, 0xc8, 0xda, 0x6b, 0x85, 0x52, 0xff, 0xc1, 0x8e, 0x82, 0x7e, 0x8b, 0x9a, 0x4f, 0x74, 0xef, 0xee, 0xc7, 0xd7, 0xba, 0x5c, 0x23, 0x42, 0x8f, 0xde, 0x02, 0x27, 0xdf, 0x55, 0xa1, 0xef, 0xc1, 0x79, 0xa3, 0x53, 0xb1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4833 = { .name = "ecdsa_secp224r1_sha512_4833", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4833_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4833_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4833_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 331 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4834 for ECDSA, tcId is 332 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4834_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4834_msg[] = { 0x31, 0x34, 0x33, 0x33, 0x31, 0x39, 0x32, 0x36, 0x35, 0x33, 0x38, }; static const unsigned char ecdsa_secp224r1_sha512_4834_sig[] = { 0x67, 0x46, 0x90, 0x3c, 0xa0, 0x95, 0xbf, 0xd3, 0xf6, 0x37, 0x8a, 0x70, 0x09, 0x27, 0x23, 0x48, 0x3c, 0xa1, 0x90, 0xb2, 0x39, 0x2d, 0x8b, 0x1a, 0xd3, 0x37, 0x96, 0x9f, 0xf3, 0x3b, 0xfa, 0xe0, 0x83, 0x5c, 0x23, 0xa8, 0x0e, 0xc9, 0xf3, 0x3c, 0xe9, 0xa9, 0x03, 0x5c, 0x19, 0x28, 0x36, 0xa0, 0xb2, 0xfa, 0xdd, 0x34, 0x7d, 0x80, 0x3f, 0x96, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4834 = { .name = "ecdsa_secp224r1_sha512_4834", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4834_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4834_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4834_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 332 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4835 for ECDSA, tcId is 333 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4835_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4835_msg[] = { 0x33, 0x34, 0x34, 0x39, 0x30, 0x38, 0x32, 0x33, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4835_sig[] = { 0x7f, 0xc0, 0xd8, 0x73, 0x9e, 0xcf, 0xe3, 0x49, 0xe5, 0x06, 0xe7, 0x12, 0x03, 0xa6, 0xe6, 0x0e, 0x62, 0x8a, 0x1b, 0xb0, 0xc6, 0x7d, 0x5e, 0x57, 0x4c, 0xb8, 0x83, 0x1c, 0xcf, 0x8b, 0xb1, 0x55, 0x71, 0x52, 0xc5, 0x75, 0x50, 0xa0, 0xfd, 0xe6, 0x57, 0x14, 0x56, 0xfa, 0x75, 0x27, 0x82, 0xf7, 0xf9, 0x2f, 0x7b, 0xb2, 0x35, 0xdd, 0xe3, 0x9f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4835 = { .name = "ecdsa_secp224r1_sha512_4835", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4835_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4835_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4835_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 333 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4836 for ECDSA, tcId is 334 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4836_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4836_msg[] = { 0x36, 0x38, 0x32, 0x39, 0x38, 0x33, 0x35, 0x39, 0x32, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4836_sig[] = { 0xb4, 0x48, 0x6e, 0x31, 0x39, 0xe0, 0xb1, 0x54, 0x28, 0x92, 0xdb, 0x3d, 0x3f, 0x51, 0xb0, 0x52, 0x48, 0x94, 0xe1, 0x9c, 0xb0, 0x0c, 0xd0, 0x7b, 0x03, 0xee, 0x9c, 0x97, 0xad, 0x97, 0x28, 0xd7, 0x7a, 0x8b, 0x7b, 0x4f, 0xa4, 0x35, 0xb3, 0x34, 0x58, 0x47, 0x86, 0x0c, 0x33, 0x2d, 0x65, 0xd8, 0x15, 0x2a, 0xa6, 0x50, 0x3a, 0xb1, 0x87, 0x55, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4836 = { .name = "ecdsa_secp224r1_sha512_4836", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4836_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4836_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4836_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 334 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4837 for ECDSA, tcId is 335 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4837_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4837_msg[] = { 0x33, 0x34, 0x34, 0x35, 0x31, 0x35, 0x38, 0x30, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4837_sig[] = { 0xaf, 0xbb, 0xdc, 0x8e, 0x50, 0xe8, 0x01, 0xec, 0xbd, 0x2e, 0x37, 0x05, 0x07, 0x97, 0x17, 0xf4, 0xf9, 0xd6, 0x9f, 0x3b, 0x3d, 0x85, 0x21, 0x5a, 0xee, 0xcb, 0x4f, 0xbc, 0xec, 0xea, 0xdd, 0x4e, 0x2c, 0xc9, 0xce, 0xa1, 0x0b, 0x56, 0xd1, 0x6a, 0x03, 0xfa, 0x55, 0x1f, 0xec, 0x3e, 0xb8, 0x08, 0xbd, 0x8d, 0x9f, 0x09, 0x26, 0xd1, 0x4e, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4837 = { .name = "ecdsa_secp224r1_sha512_4837", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4837_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4837_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4837_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 335 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4838 for ECDSA, tcId is 336 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4838_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4838_msg[] = { 0x31, 0x32, 0x36, 0x39, 0x37, 0x39, 0x38, 0x37, 0x36, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4838_sig[] = { 0x4a, 0x76, 0x2f, 0x7d, 0x14, 0x6f, 0x9e, 0xaf, 0xff, 0x5a, 0xd1, 0x1a, 0x69, 0x78, 0x26, 0x0c, 0x81, 0x8b, 0x80, 0x1c, 0x34, 0x88, 0xdd, 0x60, 0x41, 0x1f, 0x5c, 0xf6, 0x9e, 0xa7, 0x75, 0x12, 0x58, 0x56, 0x20, 0xef, 0x2c, 0xfa, 0xe8, 0xb8, 0xc9, 0xd8, 0x17, 0x12, 0x29, 0xa3, 0x21, 0x97, 0xe1, 0x94, 0x95, 0x61, 0xbb, 0x75, 0xa0, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4838 = { .name = "ecdsa_secp224r1_sha512_4838", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4838_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4838_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4838_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 336 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4839 for ECDSA, tcId is 337 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4839_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4839_msg[] = { 0x33, 0x39, 0x39, 0x32, 0x34, 0x32, 0x35, 0x35, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4839_sig[] = { 0x22, 0x7f, 0xe5, 0x2b, 0x57, 0x98, 0x33, 0xfe, 0xee, 0x16, 0xc2, 0x87, 0xd2, 0x92, 0x73, 0xe2, 0x25, 0x6d, 0xf6, 0x8a, 0xff, 0x0b, 0x94, 0xd2, 0x75, 0x2d, 0x87, 0x7b, 0xbd, 0x79, 0x93, 0x5e, 0x5f, 0xaa, 0x8e, 0x93, 0x56, 0x62, 0x2f, 0xea, 0x01, 0x35, 0xec, 0xf7, 0x96, 0xda, 0xf6, 0x03, 0x33, 0xd5, 0xab, 0x12, 0x5f, 0x71, 0xe5, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4839 = { .name = "ecdsa_secp224r1_sha512_4839", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4839_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4839_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4839_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 337 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4840 for ECDSA, tcId is 338 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4840_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4840_msg[] = { 0x31, 0x36, 0x30, 0x31, 0x39, 0x37, 0x37, 0x39, 0x37, 0x37, }; static const unsigned char ecdsa_secp224r1_sha512_4840_sig[] = { 0xcd, 0x53, 0x65, 0x98, 0x3e, 0xb1, 0x65, 0xdb, 0x39, 0xba, 0x0c, 0x66, 0xc3, 0xa4, 0x5b, 0x2c, 0xe1, 0x37, 0x0c, 0x9a, 0xd1, 0x4a, 0x9a, 0xa7, 0x6d, 0xd4, 0x63, 0x3a, 0xa8, 0xc7, 0x7c, 0xe4, 0x2a, 0xb1, 0xc8, 0x88, 0xa6, 0xb5, 0xd0, 0x4b, 0x71, 0x13, 0x9f, 0xd8, 0x82, 0x32, 0x86, 0x22, 0xe1, 0x5e, 0x80, 0x25, 0x2e, 0x5c, 0xf7, 0xda, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4840 = { .name = "ecdsa_secp224r1_sha512_4840", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4840_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4840_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4840_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 338 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4841 for ECDSA, tcId is 339 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4841_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4841_msg[] = { 0x31, 0x30, 0x38, 0x37, 0x38, 0x37, 0x35, 0x35, 0x31, 0x34, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4841_sig[] = { 0x54, 0xd6, 0xd4, 0x43, 0x73, 0xf7, 0xdf, 0xc9, 0x84, 0x55, 0xa2, 0x2c, 0xd3, 0x9a, 0x0b, 0x32, 0x0f, 0xab, 0xc3, 0x32, 0x15, 0x21, 0x6b, 0x37, 0x36, 0x5b, 0x5a, 0x16, 0x29, 0xcc, 0x69, 0x0f, 0x24, 0x67, 0xc0, 0x2e, 0x07, 0xbc, 0x41, 0x6a, 0xd4, 0x72, 0x04, 0x97, 0x5a, 0xf8, 0xc5, 0xc3, 0x34, 0x69, 0x73, 0xf2, 0xb0, 0x3d, 0xed, 0x3d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4841 = { .name = "ecdsa_secp224r1_sha512_4841", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4841_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4841_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4841_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 339 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4842 for ECDSA, tcId is 340 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4842_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4842_msg[] = { 0x37, 0x30, 0x30, 0x34, 0x32, 0x35, 0x32, 0x39, 0x39, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4842_sig[] = { 0x2f, 0x50, 0x48, 0xc9, 0xef, 0x9f, 0x30, 0xda, 0x7c, 0xb3, 0xfe, 0x46, 0x24, 0x55, 0x22, 0x00, 0xf9, 0xe5, 0x7a, 0x46, 0xd7, 0x9d, 0xb0, 0x48, 0x4a, 0x0d, 0x9c, 0xf2, 0x06, 0xda, 0xd3, 0xa4, 0x68, 0x27, 0x25, 0x85, 0x28, 0x69, 0xa1, 0xa4, 0x59, 0xbe, 0xc8, 0x65, 0x66, 0x1e, 0x1a, 0x38, 0xa9, 0xe5, 0x46, 0xee, 0xaa, 0xc7, 0xcb, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4842 = { .name = "ecdsa_secp224r1_sha512_4842", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4842_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4842_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4842_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 340 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4843 for ECDSA, tcId is 341 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4843_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4843_msg[] = { 0x31, 0x35, 0x36, 0x35, 0x33, 0x32, 0x35, 0x32, 0x38, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4843_sig[] = { 0xab, 0xbf, 0x0a, 0x02, 0x33, 0x2f, 0xbe, 0xa7, 0x79, 0x89, 0x9d, 0x31, 0xd3, 0xab, 0xd2, 0xd2, 0x2c, 0x9c, 0x02, 0xd4, 0x05, 0x8c, 0xed, 0x63, 0x9b, 0xf0, 0x6c, 0x45, 0xcc, 0xe0, 0x57, 0x0f, 0x38, 0x12, 0xe5, 0xcf, 0xcb, 0x23, 0x37, 0x6c, 0x55, 0x4c, 0x7f, 0xc3, 0x5d, 0xbc, 0xfe, 0xb6, 0x23, 0xa7, 0x95, 0x8c, 0x66, 0x4a, 0xc6, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4843 = { .name = "ecdsa_secp224r1_sha512_4843", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4843_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4843_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4843_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 341 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4844 for ECDSA, tcId is 342 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4844_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4844_msg[] = { 0x32, 0x33, 0x38, 0x32, 0x36, 0x33, 0x34, 0x32, 0x33, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4844_sig[] = { 0x1c, 0x30, 0xcb, 0x8b, 0xc2, 0x10, 0x87, 0xb7, 0x7e, 0xb1, 0x21, 0x6e, 0xe8, 0x62, 0x9e, 0x36, 0x76, 0xd9, 0x25, 0xf1, 0xae, 0x15, 0x07, 0x7c, 0xc6, 0x31, 0xda, 0x4f, 0xee, 0x99, 0x81, 0x57, 0xbd, 0xef, 0xb7, 0x7d, 0x10, 0x44, 0xe9, 0x83, 0xa6, 0xaf, 0xec, 0x7d, 0x91, 0xa2, 0x3d, 0x95, 0xc9, 0x37, 0xfc, 0x5c, 0x65, 0x48, 0xc9, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4844 = { .name = "ecdsa_secp224r1_sha512_4844", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4844_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4844_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4844_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 342 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4845 for ECDSA, tcId is 343 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4845_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4845_msg[] = { 0x31, 0x34, 0x34, 0x37, 0x38, 0x34, 0x37, 0x30, 0x36, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4845_sig[] = { 0x43, 0xee, 0x11, 0xa7, 0xab, 0x62, 0xe2, 0x12, 0x5e, 0x76, 0x5c, 0x2c, 0xe5, 0xd4, 0xf8, 0x47, 0x04, 0x18, 0x35, 0x39, 0x81, 0x05, 0x12, 0x26, 0x8d, 0x87, 0xf1, 0x95, 0x65, 0x89, 0x7e, 0x54, 0x02, 0x57, 0x77, 0x65, 0x9e, 0xe8, 0x02, 0xb3, 0x9c, 0x6b, 0xfd, 0x5c, 0xcc, 0x57, 0x06, 0xa9, 0xd1, 0xb3, 0x8f, 0x95, 0xc0, 0x78, 0xab, 0xaf, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4845 = { .name = "ecdsa_secp224r1_sha512_4845", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4845_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4845_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4845_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 343 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4846 for ECDSA, tcId is 344 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4846_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4846_msg[] = { 0x31, 0x34, 0x32, 0x36, 0x30, 0x32, 0x30, 0x35, 0x35, 0x34, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4846_sig[] = { 0xa1, 0xfe, 0x3f, 0x4d, 0x3f, 0x43, 0xaa, 0xa3, 0xdc, 0xaf, 0xa7, 0x9e, 0xd9, 0x9f, 0xbc, 0x04, 0x5c, 0x11, 0xc3, 0x52, 0xca, 0xac, 0xd8, 0x9f, 0x0f, 0x63, 0x84, 0x7e, 0xca, 0x2e, 0x37, 0xbd, 0x2c, 0x13, 0xb9, 0xfb, 0x3f, 0x8a, 0x55, 0xb7, 0xa6, 0x7e, 0xb0, 0x34, 0x24, 0x03, 0x95, 0xab, 0xd3, 0x9f, 0xec, 0xde, 0x75, 0x14, 0x13, 0x36, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4846 = { .name = "ecdsa_secp224r1_sha512_4846", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4846_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4846_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4846_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 344 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4847 for ECDSA, tcId is 345 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4847_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4847_msg[] = { 0x31, 0x39, 0x39, 0x33, 0x38, 0x33, 0x35, 0x32, 0x38, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4847_sig[] = { 0xbd, 0x29, 0x02, 0x86, 0xca, 0x08, 0x48, 0x5e, 0xa4, 0x13, 0x70, 0x10, 0xc6, 0x72, 0x03, 0xc2, 0x45, 0x5e, 0x7b, 0x66, 0x9d, 0x15, 0x3c, 0x6b, 0xe4, 0x00, 0x87, 0xc7, 0x97, 0xdd, 0x75, 0x02, 0xba, 0x36, 0x37, 0xf3, 0x3b, 0xae, 0xa5, 0xb2, 0x39, 0x86, 0x47, 0xad, 0x24, 0xc0, 0xfe, 0x35, 0x07, 0x2b, 0xd9, 0x63, 0x14, 0x9b, 0x5a, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4847 = { .name = "ecdsa_secp224r1_sha512_4847", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4847_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4847_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4847_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 345 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4848 for ECDSA, tcId is 346 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4848_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4848_msg[] = { 0x34, 0x32, 0x39, 0x32, 0x31, 0x35, 0x33, 0x35, 0x32, 0x33, }; static const unsigned char ecdsa_secp224r1_sha512_4848_sig[] = { 0xc9, 0x17, 0x26, 0x9a, 0x5a, 0x4c, 0xe8, 0x0b, 0x7f, 0xe5, 0x4a, 0x8b, 0xed, 0x49, 0x32, 0x6b, 0x50, 0x52, 0x7a, 0x4d, 0x2f, 0xb0, 0xa3, 0x09, 0x31, 0x82, 0xb5, 0xa5, 0xa1, 0x95, 0xec, 0x0e, 0x69, 0xe3, 0x17, 0x2e, 0x85, 0x4e, 0x87, 0xdd, 0x65, 0x1b, 0x44, 0x43, 0x3f, 0xcd, 0x7d, 0xcb, 0xb7, 0xbd, 0x59, 0x51, 0x5d, 0x2a, 0xfe, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4848 = { .name = "ecdsa_secp224r1_sha512_4848", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4848_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4848_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4848_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 346 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4849 for ECDSA, tcId is 347 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4849_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4849_msg[] = { 0x34, 0x34, 0x35, 0x39, 0x39, 0x30, 0x31, 0x34, 0x39, 0x36, }; static const unsigned char ecdsa_secp224r1_sha512_4849_sig[] = { 0x0b, 0x7b, 0x5a, 0xab, 0x83, 0x64, 0xdd, 0x4b, 0x11, 0x00, 0x1a, 0x0b, 0x98, 0x6d, 0x5a, 0xa4, 0xfb, 0x61, 0xee, 0x72, 0x02, 0x37, 0x41, 0x7a, 0x7f, 0x63, 0x72, 0x2f, 0x7f, 0x13, 0xb4, 0x11, 0xe6, 0x45, 0xe8, 0x19, 0xfe, 0xd1, 0xb9, 0x25, 0xeb, 0xe8, 0x07, 0xd9, 0x56, 0x0b, 0x44, 0xd0, 0xba, 0x1b, 0x75, 0xbd, 0x2f, 0xbd, 0x12, 0x94, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4849 = { .name = "ecdsa_secp224r1_sha512_4849", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4849_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4849_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4849_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 347 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4850 for ECDSA, tcId is 348 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4850_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4850_msg[] = { 0x31, 0x33, 0x39, 0x33, 0x39, 0x37, 0x31, 0x31, 0x37, 0x31, }; static const unsigned char ecdsa_secp224r1_sha512_4850_sig[] = { 0x50, 0x5b, 0x97, 0x4f, 0x8e, 0xcf, 0x07, 0xb6, 0x0f, 0xfd, 0xbd, 0x2b, 0x2d, 0xf9, 0x32, 0x4d, 0xe9, 0x2b, 0x39, 0x47, 0x6e, 0xb7, 0x63, 0xa4, 0xc2, 0x5f, 0x12, 0x6a, 0x1c, 0x36, 0xed, 0x1d, 0xee, 0x77, 0x2c, 0x72, 0x42, 0x05, 0xf7, 0x17, 0xc3, 0x83, 0xf4, 0x9a, 0x87, 0xa5, 0xbc, 0x3c, 0xaa, 0x0e, 0xf8, 0x13, 0x60, 0xf9, 0xd8, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4850 = { .name = "ecdsa_secp224r1_sha512_4850", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4850_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4850_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4850_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 348 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4851 for ECDSA, tcId is 349 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4851_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4851_msg[] = { 0x32, 0x33, 0x39, 0x30, 0x36, 0x39, 0x36, 0x34, 0x39, 0x35, }; static const unsigned char ecdsa_secp224r1_sha512_4851_sig[] = { 0x24, 0x21, 0x9e, 0x49, 0xb9, 0x8a, 0x9b, 0x64, 0xe5, 0x6d, 0x21, 0xc9, 0x08, 0xc8, 0x70, 0xeb, 0x88, 0xb4, 0x47, 0xd9, 0xf1, 0xdd, 0xb7, 0x35, 0x08, 0x3d, 0x6d, 0xf2, 0xbc, 0x4d, 0x76, 0x44, 0xfa, 0xef, 0xf1, 0xe1, 0x34, 0x44, 0x3b, 0x2b, 0xb3, 0xbb, 0x2a, 0x20, 0xe2, 0xa4, 0xa7, 0xc1, 0x93, 0x18, 0x06, 0x26, 0x12, 0x7c, 0xe9, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4851 = { .name = "ecdsa_secp224r1_sha512_4851", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4851_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4851_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4851_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 349 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4852 for ECDSA, tcId is 350 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4852_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4852_msg[] = { 0x31, 0x31, 0x34, 0x34, 0x36, 0x30, 0x35, 0x36, 0x32, 0x36, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4852_sig[] = { 0x08, 0x32, 0x46, 0x08, 0x1c, 0xf2, 0xf8, 0xc5, 0xe1, 0xcd, 0x42, 0xb6, 0x04, 0x50, 0xfc, 0x6c, 0xac, 0x3b, 0x0a, 0xb0, 0x3d, 0x38, 0xbd, 0xd2, 0x71, 0xcd, 0x73, 0x70, 0x8d, 0x11, 0x7e, 0xc3, 0x2d, 0xbf, 0x93, 0x93, 0x94, 0x49, 0x9f, 0x7d, 0xbc, 0x2a, 0xb7, 0x72, 0x90, 0xe9, 0x22, 0x2d, 0x6d, 0x60, 0xea, 0x02, 0xce, 0x45, 0xc5, 0x8a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4852 = { .name = "ecdsa_secp224r1_sha512_4852", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4852_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4852_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4852_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 350 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4853 for ECDSA, tcId is 351 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4853_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4853_msg[] = { 0x36, 0x38, 0x35, 0x30, 0x30, 0x34, 0x37, 0x35, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4853_sig[] = { 0x24, 0x91, 0x69, 0x61, 0xdd, 0x0d, 0x16, 0x8c, 0x28, 0x78, 0xca, 0x4f, 0xd0, 0x65, 0xb8, 0x13, 0x11, 0xc0, 0x3b, 0x7f, 0x23, 0xf8, 0x41, 0x6f, 0x4a, 0x23, 0xb1, 0x4b, 0x1e, 0x37, 0xe3, 0xc0, 0x3b, 0x23, 0x33, 0xb3, 0x3b, 0xbb, 0x2e, 0xbe, 0x05, 0xb0, 0x31, 0x04, 0x2a, 0xf1, 0x93, 0x15, 0xad, 0xfd, 0xcc, 0xdf, 0xc8, 0xd0, 0x78, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4853 = { .name = "ecdsa_secp224r1_sha512_4853", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4853_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4853_msg, .msglen = 9, .sig = ecdsa_secp224r1_sha512_4853_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 351 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4854 for ECDSA, tcId is 352 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4854_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4854_msg[] = { 0x32, 0x32, 0x32, 0x30, 0x35, 0x33, 0x36, 0x30, 0x36, 0x31, 0x39, }; static const unsigned char ecdsa_secp224r1_sha512_4854_sig[] = { 0x8d, 0xf5, 0x46, 0x8b, 0x12, 0x3b, 0x92, 0x47, 0x7a, 0x5c, 0x57, 0xea, 0x86, 0xc5, 0x4c, 0x5c, 0x9e, 0x41, 0xd1, 0x19, 0x37, 0x0d, 0xc1, 0x89, 0x22, 0xaa, 0x83, 0x03, 0x86, 0xbd, 0xf0, 0x6b, 0x75, 0xf4, 0xd4, 0x9d, 0x02, 0xc5, 0x80, 0x69, 0x26, 0xf5, 0xd0, 0x1b, 0x1a, 0x4f, 0x6a, 0x81, 0x46, 0x66, 0x4a, 0x03, 0xfa, 0x82, 0x07, 0x72, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4854 = { .name = "ecdsa_secp224r1_sha512_4854", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4854_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4854_msg, .msglen = 11, .sig = ecdsa_secp224r1_sha512_4854_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 352 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4855 for ECDSA, tcId is 353 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4855_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4855_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x36, 0x36, 0x35, 0x31, 0x32, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4855_sig[] = { 0xf6, 0x5b, 0xf1, 0x6f, 0x7c, 0xed, 0x97, 0xb0, 0xcd, 0xc2, 0x2b, 0x08, 0xc6, 0x2e, 0xf8, 0x11, 0x30, 0x68, 0x13, 0x13, 0x4b, 0x00, 0x1b, 0xc5, 0x11, 0x40, 0xe8, 0x28, 0x3a, 0x9b, 0x7c, 0x00, 0x8c, 0xda, 0xf8, 0x03, 0x36, 0x8d, 0xf9, 0xee, 0x50, 0xe2, 0x74, 0xc7, 0xa9, 0xf9, 0x36, 0x93, 0x44, 0xd9, 0x91, 0x8e, 0x0c, 0x08, 0xdb, 0xa9, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4855 = { .name = "ecdsa_secp224r1_sha512_4855", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4855_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4855_msg, .msglen = 10, .sig = ecdsa_secp224r1_sha512_4855_sig, .siglen = 56, .result = 1, .comment = "special case hash, tcId is 353 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4856 for ECDSA, tcId is 354 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4856_pubkey[] = { 0xea, 0xda, 0x93, 0xbe, 0x10, 0xb2, 0x44, 0x9e, 0x1e, 0x8b, 0xb5, 0x83, 0x05, 0xd5, 0x20, 0x08, 0x01, 0x3c, 0x57, 0x10, 0x7c, 0x1a, 0x20, 0xa3, 0x17, 0xa6, 0xcb, 0xa7, 0xec, 0xa6, 0x72, 0x34, 0x0c, 0x03, 0xd1, 0xd2, 0xe0, 0x96, 0x63, 0x28, 0x66, 0x91, 0xdf, 0x55, 0x06, 0x9f, 0xa2, 0x54, 0x90, 0xc9, 0xdd, 0x9f, 0x9c, 0x0b, 0xb2, 0xb5, }; static const unsigned char ecdsa_secp224r1_sha512_4856_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4856_sig[] = { 0x62, 0x39, 0x87, 0x74, 0x30, 0xe2, 0x68, 0xf1, 0xa3, 0xad, 0xa2, 0xc9, 0x03, 0x57, 0x24, 0x7c, 0x6c, 0xa6, 0x68, 0x7f, 0x49, 0x02, 0x3b, 0xed, 0x0f, 0xb5, 0xb5, 0x97, 0x35, 0x5c, 0x60, 0xc0, 0x9f, 0x0d, 0xac, 0xb9, 0xd7, 0x4b, 0x7c, 0xcd, 0xe7, 0x18, 0x06, 0xc5, 0x0f, 0xda, 0x87, 0x50, 0xc6, 0xec, 0xb7, 0xab, 0xba, 0x91, 0x0a, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4856 = { .name = "ecdsa_secp224r1_sha512_4856", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4856_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4856_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4856_sig, .siglen = 56, .result = -1, .comment = "Signature generated without truncating the hash, tcId is 354 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4857 for ECDSA, tcId is 355 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4857_pubkey[] = { 0x44, 0x08, 0xe5, 0xc9, 0x5e, 0x33, 0x2a, 0xb6, 0xc2, 0x82, 0x3a, 0x63, 0x95, 0x93, 0x91, 0xd6, 0x0a, 0x6d, 0x69, 0xc5, 0x9e, 0xb1, 0xf7, 0xbd, 0x27, 0x22, 0x06, 0xb9, 0xf5, 0x27, 0x8e, 0x90, 0x1f, 0xb4, 0x77, 0x3a, 0xee, 0xb2, 0xd8, 0x25, 0x5b, 0xa4, 0xdf, 0x3c, 0xf3, 0xdb, 0x7e, 0x05, 0x57, 0xdb, 0xc6, 0x13, 0x4c, 0x55, 0xf3, 0xa6, }; static const unsigned char ecdsa_secp224r1_sha512_4857_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4857_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xe9, 0x5c, 0x1f, 0x47, 0x0f, 0xc1, 0xec, 0x22, 0xd6, 0xba, 0xa3, 0xa3, 0xd5, 0xc1, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4857 = { .name = "ecdsa_secp224r1_sha512_4857", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4857_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4857_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4857_sig, .siglen = 56, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 355 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4858 for ECDSA, tcId is 356 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4858_pubkey[] = { 0x44, 0x08, 0xe5, 0xc9, 0x5e, 0x33, 0x2a, 0xb6, 0xc2, 0x82, 0x3a, 0x63, 0x95, 0x93, 0x91, 0xd6, 0x0a, 0x6d, 0x69, 0xc5, 0x9e, 0xb1, 0xf7, 0xbd, 0x27, 0x22, 0x06, 0xb9, 0xf5, 0x27, 0x8e, 0x90, 0x1f, 0xb4, 0x77, 0x3a, 0xee, 0xb2, 0xd8, 0x25, 0x5b, 0xa4, 0xdf, 0x3c, 0xf3, 0xdb, 0x7e, 0x05, 0x57, 0xdb, 0xc6, 0x13, 0x4c, 0x55, 0xf3, 0xa6, }; static const unsigned char ecdsa_secp224r1_sha512_4858_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4858_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4858 = { .name = "ecdsa_secp224r1_sha512_4858", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4858_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4858_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4858_sig, .siglen = 56, .result = -1, .comment = "r too large, tcId is 356 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4859 for ECDSA, tcId is 357 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4859_pubkey[] = { 0x31, 0x5a, 0x83, 0x00, 0x8d, 0xba, 0x00, 0xb3, 0x51, 0xc3, 0xf9, 0xfc, 0xa0, 0x81, 0x1c, 0x3a, 0xe1, 0x88, 0x4f, 0xa9, 0xa2, 0xa7, 0x5e, 0x6d, 0x5e, 0x71, 0xf2, 0x69, 0x50, 0x4b, 0xbe, 0x6a, 0x25, 0xbe, 0x25, 0x3b, 0x58, 0x2e, 0xfa, 0xb4, 0xb8, 0xb9, 0xe6, 0x13, 0x72, 0x76, 0x7a, 0x7a, 0x3a, 0x42, 0x3c, 0x09, 0x43, 0x12, 0x72, 0x96, }; static const unsigned char ecdsa_secp224r1_sha512_4859_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4859_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4859 = { .name = "ecdsa_secp224r1_sha512_4859", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4859_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4859_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4859_sig, .siglen = 56, .result = 1, .comment = "r,s are large, tcId is 357 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4860 for ECDSA, tcId is 358 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4860_pubkey[] = { 0x2f, 0x69, 0x83, 0xb6, 0xe9, 0xf8, 0xef, 0x96, 0xc2, 0xd9, 0x81, 0xf6, 0x9b, 0xe5, 0x4b, 0x06, 0x59, 0x1e, 0xd7, 0x3f, 0xe4, 0x0c, 0x8a, 0x54, 0x6b, 0x93, 0x6a, 0x79, 0x71, 0xbf, 0x57, 0x72, 0x6c, 0x26, 0xc8, 0x11, 0xd7, 0x62, 0x5a, 0x9d, 0x85, 0x19, 0x51, 0xc1, 0xff, 0xfe, 0x23, 0x6b, 0x0e, 0xb3, 0xb8, 0x96, 0xbc, 0x4c, 0x98, 0xef, }; static const unsigned char ecdsa_secp224r1_sha512_4860_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4860_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x50, 0x52, 0x69, 0x1b, 0x8d, 0xc8, 0x9d, 0xeb, 0xad, 0x36, 0x04, 0x66, 0xf2, 0xa3, 0x9e, 0x82, 0xe8, 0xae, 0x2a, 0xef, 0xb7, 0x7c, 0x3c, 0x92, 0xad, 0x7c, 0xd1, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4860 = { .name = "ecdsa_secp224r1_sha512_4860", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4860_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4860_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4860_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 358 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4861 for ECDSA, tcId is 359 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4861_pubkey[] = { 0xd1, 0xf5, 0x15, 0x97, 0x1c, 0xc9, 0x39, 0x11, 0x53, 0x56, 0x9c, 0x2b, 0xef, 0xa1, 0xf9, 0x15, 0xe2, 0x93, 0x11, 0x10, 0x75, 0x77, 0x60, 0xeb, 0xd7, 0xe6, 0x1f, 0x86, 0x41, 0xc3, 0xdb, 0x8b, 0xee, 0xa2, 0x0b, 0x13, 0x20, 0x53, 0x89, 0xdc, 0xc4, 0xba, 0x8a, 0x6a, 0xf4, 0xd6, 0xda, 0x26, 0x04, 0xca, 0xcd, 0x71, 0x84, 0xec, 0x9d, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4861_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4861_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbf, 0x19, 0xab, 0x4d, 0x3e, 0xbf, 0x5a, 0x1a, 0x49, 0xd7, 0x65, 0x90, 0x93, 0x08, 0xda, 0xa8, 0x8c, 0x2b, 0x7b, 0xe3, 0x96, 0x9d, 0xb5, 0x52, 0xea, 0x30, 0x56, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4861 = { .name = "ecdsa_secp224r1_sha512_4861", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4861_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4861_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4861_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 359 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4862 for ECDSA, tcId is 360 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4862_pubkey[] = { 0xe8, 0xf9, 0x0a, 0x71, 0x77, 0x14, 0xf0, 0x15, 0x8d, 0x95, 0x21, 0xf1, 0x8c, 0x14, 0xae, 0x8c, 0x83, 0xbf, 0x1e, 0xeb, 0xa1, 0x15, 0xc4, 0x6c, 0xbd, 0xab, 0xb2, 0x0b, 0x66, 0xf5, 0x0a, 0xc1, 0x34, 0x61, 0xc0, 0x2d, 0xa0, 0x2e, 0xdf, 0xe4, 0x29, 0x6a, 0x1f, 0x54, 0x3d, 0xde, 0x7b, 0x43, 0x59, 0xf9, 0x05, 0xe0, 0x41, 0x93, 0xd3, 0xcf, }; static const unsigned char ecdsa_secp224r1_sha512_4862_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4862_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4862 = { .name = "ecdsa_secp224r1_sha512_4862", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4862_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4862_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4862_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 360 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4863 for ECDSA, tcId is 361 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4863_pubkey[] = { 0x72, 0x3b, 0xc0, 0xc9, 0xb7, 0xce, 0x6e, 0xa7, 0x84, 0xec, 0x07, 0x50, 0x36, 0xce, 0xde, 0x90, 0x45, 0x2c, 0x76, 0x57, 0x6b, 0xd8, 0xfb, 0x5b, 0xe4, 0xdc, 0x0f, 0xb1, 0xcf, 0x40, 0x58, 0x20, 0xd9, 0x2f, 0x48, 0x55, 0x2b, 0x55, 0x1c, 0x7b, 0x11, 0xf4, 0x94, 0x06, 0xdc, 0x89, 0x2f, 0xd6, 0x59, 0x97, 0x1a, 0xe7, 0xf9, 0xe7, 0x4b, 0x59, }; static const unsigned char ecdsa_secp224r1_sha512_4863_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4863_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4863 = { .name = "ecdsa_secp224r1_sha512_4863", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4863_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4863_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4863_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 361 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4864 for ECDSA, tcId is 362 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4864_pubkey[] = { 0xa0, 0xdc, 0xce, 0x12, 0x70, 0x84, 0xf9, 0x55, 0xa4, 0xe4, 0x9a, 0x7c, 0x86, 0xb9, 0xb9, 0x1b, 0x05, 0xae, 0x7a, 0xfd, 0x6e, 0xb0, 0x72, 0x25, 0xa6, 0x54, 0x1d, 0x88, 0xf1, 0x0a, 0x1d, 0x4f, 0xef, 0x93, 0x93, 0x49, 0x67, 0xbb, 0x6c, 0x5d, 0x87, 0x92, 0xbb, 0xd4, 0x7a, 0xb3, 0xab, 0xb4, 0x06, 0x89, 0x9a, 0x00, 0xb1, 0xc9, 0x1b, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha512_4864_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4864_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4864 = { .name = "ecdsa_secp224r1_sha512_4864", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4864_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4864_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4864_sig, .siglen = 56, .result = 1, .comment = "small r and s, tcId is 362 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4865 for ECDSA, tcId is 363 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4865_pubkey[] = { 0xa0, 0xdc, 0xce, 0x12, 0x70, 0x84, 0xf9, 0x55, 0xa4, 0xe4, 0x9a, 0x7c, 0x86, 0xb9, 0xb9, 0x1b, 0x05, 0xae, 0x7a, 0xfd, 0x6e, 0xb0, 0x72, 0x25, 0xa6, 0x54, 0x1d, 0x88, 0xf1, 0x0a, 0x1d, 0x4f, 0xef, 0x93, 0x93, 0x49, 0x67, 0xbb, 0x6c, 0x5d, 0x87, 0x92, 0xbb, 0xd4, 0x7a, 0xb3, 0xab, 0xb4, 0x06, 0x89, 0x9a, 0x00, 0xb1, 0xc9, 0x1b, 0x4a, }; static const unsigned char ecdsa_secp224r1_sha512_4865_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4865_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4865 = { .name = "ecdsa_secp224r1_sha512_4865", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4865_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4865_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4865_sig, .siglen = 56, .result = -1, .comment = "r is larger than n, tcId is 363 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4866 for ECDSA, tcId is 364 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4866_pubkey[] = { 0xe1, 0x0a, 0xbc, 0x9f, 0xe1, 0x5b, 0xcc, 0x63, 0xf0, 0x09, 0xe1, 0x61, 0xaa, 0xee, 0x26, 0x60, 0x24, 0x15, 0xbc, 0xb4, 0x5b, 0xc6, 0xc9, 0x9c, 0xe7, 0xab, 0x2b, 0x10, 0xfb, 0xeb, 0xff, 0x4e, 0x4d, 0xe0, 0xdf, 0xaa, 0xf0, 0x45, 0x94, 0xdd, 0x60, 0x3c, 0xee, 0x80, 0xb5, 0xd9, 0xab, 0x78, 0xb6, 0x70, 0x76, 0x08, 0xa9, 0x5e, 0x57, 0x4d, }; static const unsigned char ecdsa_secp224r1_sha512_4866_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4866_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x6f, 0x00, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4866 = { .name = "ecdsa_secp224r1_sha512_4866", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4866_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4866_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4866_sig, .siglen = 56, .result = -1, .comment = "s is larger than n, tcId is 364 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4867 for ECDSA, tcId is 365 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4867_pubkey[] = { 0xfb, 0xfa, 0xbe, 0x6c, 0x64, 0x08, 0x56, 0xae, 0x5d, 0xcd, 0xc9, 0xe4, 0xb7, 0x06, 0xfb, 0x3d, 0xb2, 0x3d, 0xdc, 0xa4, 0x6b, 0x80, 0xb9, 0x05, 0x7a, 0xb9, 0xe4, 0x4f, 0x6b, 0x62, 0xd4, 0x69, 0x79, 0x77, 0xff, 0xe1, 0x9b, 0xf3, 0x18, 0x50, 0x83, 0xb1, 0xed, 0xe2, 0x16, 0x1a, 0xa5, 0x72, 0x54, 0x01, 0xa8, 0xf5, 0x78, 0x51, 0xfc, 0x82, }; static const unsigned char ecdsa_secp224r1_sha512_4867_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4867_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0xc9, 0x93, 0x26, 0x4c, 0x99, 0x32, 0x64, 0x11, 0xd2, 0xe5, 0x5b, 0x32, 0x14, 0xa8, 0xd6, 0x75, 0x28, 0x81, 0x2a, 0x55, 0xab, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4867 = { .name = "ecdsa_secp224r1_sha512_4867", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4867_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4867_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4867_sig, .siglen = 56, .result = 1, .comment = "small r and s^-1, tcId is 365 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4868 for ECDSA, tcId is 366 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4868_pubkey[] = { 0x91, 0xa8, 0x5b, 0x3c, 0x5e, 0x90, 0xb4, 0x09, 0xf6, 0xb8, 0xd3, 0xbc, 0xa9, 0x11, 0x7a, 0x54, 0xa4, 0x0f, 0x41, 0x62, 0xb3, 0x88, 0xbb, 0x93, 0x67, 0xfd, 0x64, 0x39, 0xf1, 0xce, 0xdf, 0x20, 0xab, 0x52, 0xeb, 0x71, 0x54, 0xb7, 0xea, 0x1f, 0x29, 0x34, 0xa9, 0xc8, 0x29, 0x29, 0x06, 0xe1, 0x8a, 0x0e, 0x57, 0x20, 0x02, 0xcd, 0x2f, 0x7c, }; static const unsigned char ecdsa_secp224r1_sha512_4868_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4868_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0x3e, 0x85, 0xd5, 0x64, 0x74, 0xb5, 0xc5, 0x5f, 0xbe, 0x86, 0x60, 0x84, 0x42, 0xa8, 0x4b, 0x2b, 0xf0, 0x93, 0xb7, 0xd7, 0x5f, 0x53, 0xa4, 0x72, 0x50, 0xe1, 0xc7, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4868 = { .name = "ecdsa_secp224r1_sha512_4868", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4868_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4868_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4868_sig, .siglen = 56, .result = 1, .comment = "smallish r and s^-1, tcId is 366 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4869 for ECDSA, tcId is 367 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4869_pubkey[] = { 0xd1, 0xca, 0x7a, 0x5c, 0x1a, 0xa0, 0x86, 0xb2, 0x95, 0x1c, 0x1a, 0xc1, 0x4e, 0x00, 0x5f, 0x00, 0x72, 0xfb, 0x28, 0x38, 0x39, 0x73, 0xa0, 0x51, 0x17, 0xf9, 0x65, 0x2c, 0xce, 0x52, 0x3c, 0x05, 0xeb, 0xe9, 0x49, 0x91, 0xc4, 0x7f, 0xec, 0xd2, 0x41, 0xd0, 0xa0, 0x7e, 0x86, 0xc8, 0x8a, 0xb3, 0xc6, 0x20, 0xea, 0xe7, 0x92, 0xab, 0xa3, 0xd1, }; static const unsigned char ecdsa_secp224r1_sha512_4869_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4869_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfb, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x02, 0xfd, 0x00, 0x43, 0xa4, 0xfd, 0x2d, 0xa3, 0x17, 0x24, 0x73, 0x08, 0xc7, 0x4d, 0xc6, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4869 = { .name = "ecdsa_secp224r1_sha512_4869", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4869_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4869_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4869_sig, .siglen = 56, .result = 1, .comment = "100-bit r and small s^-1, tcId is 367 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4870 for ECDSA, tcId is 368 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4870_pubkey[] = { 0x35, 0x65, 0xaf, 0x2a, 0x48, 0x1f, 0x93, 0x90, 0xe7, 0x1d, 0x76, 0x42, 0x71, 0x7d, 0x04, 0x27, 0xe0, 0x2e, 0x5e, 0x7d, 0xe8, 0xa3, 0xc0, 0xc1, 0xff, 0xd5, 0xf3, 0x3e, 0x94, 0x74, 0x54, 0x7e, 0x0d, 0x54, 0xdc, 0xaa, 0xe8, 0x54, 0x94, 0xc7, 0x4f, 0xaa, 0x23, 0x39, 0x4a, 0x05, 0x6e, 0x41, 0xc2, 0x83, 0x96, 0x38, 0xb8, 0x52, 0x3b, 0x72, }; static const unsigned char ecdsa_secp224r1_sha512_4870_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4870_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4870 = { .name = "ecdsa_secp224r1_sha512_4870", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4870_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4870_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4870_sig, .siglen = 56, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 368 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4871 for ECDSA, tcId is 369 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4871_pubkey[] = { 0x29, 0xc6, 0x94, 0x79, 0x0f, 0xbd, 0x23, 0x77, 0x7c, 0xfd, 0xe4, 0x34, 0xba, 0xdc, 0xb0, 0x61, 0xa3, 0x26, 0xa5, 0x53, 0x42, 0x64, 0xbc, 0xfe, 0x19, 0x3c, 0x71, 0x6c, 0x17, 0x8a, 0x94, 0x3f, 0x7b, 0xd4, 0xfb, 0x13, 0x25, 0x65, 0xba, 0x60, 0x23, 0x58, 0xb1, 0x34, 0x33, 0xa5, 0x21, 0x7a, 0xc0, 0x4c, 0xc0, 0x35, 0x56, 0x6c, 0x73, 0xf8, }; static const unsigned char ecdsa_secp224r1_sha512_4871_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4871_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x24, 0xd0, 0x54, 0x34, 0xab, 0xac, 0xd8, 0x59, 0xed, 0x74, 0x18, 0x5e, 0x75, 0xb7, 0x51, 0xc6, 0xd9, 0xf6, 0x0c, 0x79, 0x21, 0xda, 0xcf, 0xbb, 0x8e, 0x19, 0xcd, 0xba, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4871 = { .name = "ecdsa_secp224r1_sha512_4871", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4871_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4871_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4871_sig, .siglen = 56, .result = 1, .comment = "100-bit r and s^-1, tcId is 369 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4872 for ECDSA, tcId is 370 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4872_pubkey[] = { 0x8f, 0xd4, 0x3a, 0xac, 0x85, 0x56, 0xf4, 0x66, 0x5f, 0xd4, 0xc1, 0x3f, 0x4e, 0x15, 0x11, 0x40, 0xf4, 0x2a, 0x39, 0x57, 0x63, 0xc5, 0xda, 0x24, 0x7a, 0x39, 0x8f, 0x97, 0x96, 0x87, 0xd2, 0x4a, 0x9f, 0xcd, 0x6b, 0x20, 0xa5, 0x94, 0x51, 0xc3, 0x48, 0xa6, 0x36, 0x4d, 0x0f, 0xfa, 0xf0, 0xec, 0xfe, 0x16, 0x43, 0x13, 0xdb, 0x65, 0x94, 0xab, }; static const unsigned char ecdsa_secp224r1_sha512_4872_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4872_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x29, 0xbd, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4872 = { .name = "ecdsa_secp224r1_sha512_4872", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4872_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4872_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4872_sig, .siglen = 56, .result = 1, .comment = "r and s^-1 are close to n, tcId is 370 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4873 for ECDSA, tcId is 371 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4873_pubkey[] = { 0xc2, 0xae, 0x0e, 0x35, 0x7a, 0x43, 0xf9, 0x75, 0x49, 0xa7, 0x25, 0xae, 0x37, 0x04, 0x44, 0x90, 0x51, 0xc9, 0x6b, 0xf3, 0x63, 0x33, 0x55, 0xc3, 0x5b, 0x6e, 0xb7, 0xe9, 0x6a, 0x84, 0xdf, 0xb6, 0xd4, 0x51, 0x7d, 0x1d, 0xe4, 0x6b, 0x18, 0x78, 0x6a, 0x50, 0x61, 0x78, 0x72, 0x4b, 0xf4, 0xae, 0x4f, 0x9e, 0x41, 0x8c, 0x75, 0xab, 0x17, 0xef, }; static const unsigned char ecdsa_secp224r1_sha512_4873_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4873_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4873 = { .name = "ecdsa_secp224r1_sha512_4873", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4873_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4873_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4873_sig, .siglen = 56, .result = 1, .comment = "s == 1, tcId is 371 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4874 for ECDSA, tcId is 372 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4874_pubkey[] = { 0xc2, 0xae, 0x0e, 0x35, 0x7a, 0x43, 0xf9, 0x75, 0x49, 0xa7, 0x25, 0xae, 0x37, 0x04, 0x44, 0x90, 0x51, 0xc9, 0x6b, 0xf3, 0x63, 0x33, 0x55, 0xc3, 0x5b, 0x6e, 0xb7, 0xe9, 0x6a, 0x84, 0xdf, 0xb6, 0xd4, 0x51, 0x7d, 0x1d, 0xe4, 0x6b, 0x18, 0x78, 0x6a, 0x50, 0x61, 0x78, 0x72, 0x4b, 0xf4, 0xae, 0x4f, 0x9e, 0x41, 0x8c, 0x75, 0xab, 0x17, 0xef, }; static const unsigned char ecdsa_secp224r1_sha512_4874_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4874_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4874 = { .name = "ecdsa_secp224r1_sha512_4874", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4874_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4874_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4874_sig, .siglen = 56, .result = -1, .comment = "s == 0, tcId is 372 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4875 for ECDSA, tcId is 373 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4875_pubkey[] = { 0x96, 0x16, 0x17, 0xd9, 0x85, 0x5f, 0x20, 0x2f, 0xd6, 0x00, 0xb5, 0x84, 0xab, 0xe9, 0x4a, 0x46, 0x67, 0x49, 0x27, 0xcf, 0xdc, 0x63, 0x33, 0xc5, 0xbe, 0x56, 0xce, 0x7b, 0x89, 0xb4, 0x15, 0x0d, 0x9c, 0xcd, 0xfb, 0xd7, 0x7e, 0x76, 0x82, 0xca, 0x86, 0x2c, 0x0c, 0x3e, 0x96, 0xd8, 0x9c, 0x91, 0x8b, 0x7d, 0x3b, 0x7b, 0xbb, 0x92, 0xff, 0x43, }; static const unsigned char ecdsa_secp224r1_sha512_4875_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4875_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4875 = { .name = "ecdsa_secp224r1_sha512_4875", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4875_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4875_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4875_sig, .siglen = 56, .result = -1, .comment = "point at infinity during verify, tcId is 373 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4876 for ECDSA, tcId is 374 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4876_pubkey[] = { 0x8d, 0xb5, 0x3f, 0xe4, 0x16, 0x8d, 0xf4, 0x3e, 0xe5, 0x38, 0xbc, 0x9d, 0x75, 0x8b, 0x8c, 0x26, 0xfa, 0x43, 0x3f, 0xb0, 0x10, 0x1b, 0xcb, 0xad, 0x03, 0x95, 0x85, 0xde, 0x23, 0x10, 0xdf, 0xc2, 0x08, 0x35, 0x37, 0x9e, 0xa4, 0x06, 0x99, 0x30, 0x36, 0xfd, 0x4b, 0xb0, 0xf6, 0x7d, 0x14, 0x76, 0x0e, 0x1e, 0xb4, 0x14, 0xc3, 0x2d, 0xd1, 0xf3, }; static const unsigned char ecdsa_secp224r1_sha512_4876_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4876_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4876 = { .name = "ecdsa_secp224r1_sha512_4876", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4876_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4876_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4876_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 374 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4877 for ECDSA, tcId is 375 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4877_pubkey[] = { 0x0b, 0x7f, 0xa6, 0x19, 0x83, 0xe7, 0xa2, 0x27, 0xf7, 0x38, 0x84, 0x7d, 0x45, 0x7f, 0x3e, 0x8c, 0xf0, 0xa4, 0x08, 0x5c, 0x31, 0x2f, 0xb6, 0xdc, 0xec, 0x82, 0x25, 0x70, 0xee, 0x74, 0x34, 0xce, 0x2f, 0xf3, 0xfb, 0xcc, 0x1d, 0x09, 0x60, 0x37, 0x98, 0x76, 0xe9, 0xdd, 0x5b, 0xed, 0x28, 0xaa, 0xd5, 0x76, 0xee, 0xa2, 0x33, 0xa4, 0x4b, 0x0d, }; static const unsigned char ecdsa_secp224r1_sha512_4877_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4877_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4877 = { .name = "ecdsa_secp224r1_sha512_4877", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4877_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4877_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4877_sig, .siglen = 56, .result = 1, .comment = "edge case for signature malleability, tcId is 375 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4878 for ECDSA, tcId is 376 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4878_pubkey[] = { 0x55, 0xb2, 0x12, 0x91, 0x9c, 0xd6, 0x88, 0x6b, 0x13, 0xcd, 0x7a, 0x25, 0x56, 0x43, 0x0c, 0xe4, 0x42, 0xe8, 0x69, 0x42, 0xf1, 0xbf, 0x6e, 0x46, 0x18, 0xae, 0x36, 0x3e, 0x79, 0x5c, 0x66, 0x4a, 0xe9, 0x60, 0xee, 0x11, 0x06, 0x30, 0x8b, 0x7d, 0xba, 0x91, 0x24, 0x0a, 0xb0, 0xc3, 0xef, 0x8b, 0xeb, 0x7d, 0x0a, 0x4d, 0x7a, 0x10, 0x2a, 0x7f, }; static const unsigned char ecdsa_secp224r1_sha512_4878_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4878_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4878 = { .name = "ecdsa_secp224r1_sha512_4878", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4878_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4878_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4878_sig, .siglen = 56, .result = 1, .comment = "u1 == 1, tcId is 376 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4879 for ECDSA, tcId is 377 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4879_pubkey[] = { 0xc0, 0x28, 0x8a, 0x63, 0xce, 0x32, 0x26, 0x3f, 0x36, 0x51, 0x19, 0x8d, 0xab, 0x80, 0x1c, 0x89, 0x6f, 0xb9, 0x30, 0x83, 0x62, 0xfc, 0x40, 0xe3, 0x59, 0x59, 0xe1, 0x40, 0x10, 0xd0, 0x0b, 0xd1, 0xc2, 0x28, 0xcf, 0xb6, 0xa5, 0xfa, 0xa6, 0x47, 0x38, 0x78, 0x04, 0xe3, 0x4f, 0xa1, 0xa7, 0xf9, 0xfc, 0xc4, 0x72, 0xc0, 0x5e, 0xa2, 0xee, 0xda, }; static const unsigned char ecdsa_secp224r1_sha512_4879_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4879_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x50, 0x86, 0xa4, 0x32, 0x52, 0x11, 0xe6, 0x96, 0xeb, 0x6b, 0x31, 0xda, 0x8f, 0xf5, 0xc2, 0xc7, 0x28, 0xd3, 0x8d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4879 = { .name = "ecdsa_secp224r1_sha512_4879", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4879_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4879_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4879_sig, .siglen = 56, .result = 1, .comment = "u1 == n - 1, tcId is 377 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4880 for ECDSA, tcId is 378 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4880_pubkey[] = { 0x0c, 0x8e, 0x2c, 0xb5, 0xf6, 0xa9, 0x03, 0xe1, 0xcc, 0xcf, 0x3a, 0xc2, 0xd4, 0x65, 0xf1, 0xd0, 0xdc, 0x34, 0x52, 0x23, 0x7f, 0xd9, 0xe8, 0xa4, 0xdf, 0x5d, 0x53, 0x41, 0xd0, 0x44, 0xca, 0x8c, 0xee, 0xcb, 0x54, 0xa1, 0xb9, 0x51, 0x27, 0x09, 0x71, 0xe5, 0xab, 0x4e, 0xb2, 0x26, 0x11, 0x6c, 0x48, 0xc5, 0x53, 0x49, 0x9d, 0x1a, 0x48, 0x99, }; static const unsigned char ecdsa_secp224r1_sha512_4880_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4880_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4880 = { .name = "ecdsa_secp224r1_sha512_4880", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4880_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4880_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4880_sig, .siglen = 56, .result = 1, .comment = "u2 == 1, tcId is 378 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4881 for ECDSA, tcId is 379 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4881_pubkey[] = { 0x1f, 0xf6, 0xb9, 0x90, 0x17, 0x84, 0xd8, 0x8b, 0x25, 0x52, 0x7b, 0x37, 0x02, 0x62, 0x2a, 0x27, 0x34, 0xb8, 0x3d, 0x8a, 0x0f, 0xed, 0x0f, 0x74, 0x0b, 0xb7, 0x84, 0xe2, 0x0e, 0x83, 0xee, 0x0a, 0xa8, 0x29, 0x33, 0xdc, 0xdc, 0x63, 0x7a, 0x37, 0x60, 0x60, 0x6a, 0x04, 0x97, 0x4c, 0x2d, 0xc7, 0x5f, 0x12, 0x09, 0x5f, 0x8f, 0xda, 0xf0, 0x03, }; static const unsigned char ecdsa_secp224r1_sha512_4881_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4881_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x0f, 0x17, 0x40, 0x7b, 0x4a, 0xd4, 0x0d, 0x3e, 0x1b, 0x83, 0x92, 0xe8, 0x1c, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4881 = { .name = "ecdsa_secp224r1_sha512_4881", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4881_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4881_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4881_sig, .siglen = 56, .result = 1, .comment = "u2 == n - 1, tcId is 379 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4882 for ECDSA, tcId is 380 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4882_pubkey[] = { 0xb2, 0x1f, 0xac, 0xa1, 0x7b, 0x68, 0x05, 0x87, 0x52, 0xd9, 0x43, 0xa8, 0x1f, 0x85, 0x3b, 0x80, 0x05, 0x62, 0xdf, 0x8b, 0x21, 0x72, 0xe1, 0x50, 0x95, 0x3c, 0x62, 0x42, 0x01, 0xc2, 0xc0, 0xf5, 0xed, 0x3b, 0x34, 0x29, 0x56, 0xca, 0xcd, 0x26, 0xf9, 0x09, 0x75, 0x62, 0xd0, 0xfb, 0x0a, 0x3d, 0xda, 0xb9, 0x1c, 0x5a, 0xe7, 0xe9, 0x0c, 0x01, }; static const unsigned char ecdsa_secp224r1_sha512_4882_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4882_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc1, 0x52, 0xaa, 0xfe, 0xa3, 0xa8, 0x61, 0x2e, 0xc8, 0x3a, 0x7d, 0xc9, 0x44, 0x8e, 0x66, 0x00, 0xae, 0x6a, 0x77, 0x2d, 0x75, 0xad, 0x2c, 0xaf, 0x19, 0xf9, 0x39, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4882 = { .name = "ecdsa_secp224r1_sha512_4882", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4882_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4882_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4882_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 380 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4883 for ECDSA, tcId is 381 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4883_pubkey[] = { 0xf4, 0x92, 0x78, 0x41, 0x9e, 0x4f, 0x50, 0x68, 0x89, 0xb0, 0x16, 0x8b, 0x1f, 0xce, 0x1f, 0x87, 0xee, 0x5b, 0x61, 0xef, 0xa0, 0xe7, 0x3c, 0x78, 0x33, 0xee, 0xb2, 0x9c, 0xb1, 0xb3, 0x34, 0xf8, 0x1b, 0xe8, 0xf0, 0x5f, 0x3b, 0x2e, 0x98, 0xd3, 0x8b, 0x03, 0x0c, 0xff, 0x57, 0x94, 0x7b, 0x96, 0x13, 0x5e, 0xc4, 0x46, 0x5c, 0x5e, 0x53, 0xf3, }; static const unsigned char ecdsa_secp224r1_sha512_4883_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4883_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x4e, 0x15, 0x8e, 0xf8, 0x6c, 0xc5, 0x30, 0x54, 0xf1, 0x63, 0x5c, 0x74, 0xe6, 0x55, 0x08, 0x20, 0x60, 0x48, 0x92, 0x93, 0x15, 0xe0, 0x97, 0xa5, 0x9f, 0x15, 0x19, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4883 = { .name = "ecdsa_secp224r1_sha512_4883", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4883_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4883_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4883_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 381 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4884 for ECDSA, tcId is 382 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4884_pubkey[] = { 0x75, 0xc6, 0xa8, 0x86, 0xe2, 0x2b, 0xc0, 0x4b, 0x99, 0x6d, 0x4a, 0x19, 0x57, 0x5c, 0xe0, 0xc6, 0x68, 0x6b, 0x44, 0x9b, 0x6e, 0x05, 0xef, 0x13, 0x01, 0xbd, 0x8b, 0xa2, 0x33, 0xab, 0x29, 0xf6, 0x5d, 0xf2, 0xd4, 0x14, 0x4d, 0xa2, 0xb2, 0x1e, 0x90, 0x35, 0x9a, 0x06, 0x47, 0x65, 0xc9, 0x5e, 0x32, 0x5b, 0xb7, 0xe5, 0x4c, 0xa2, 0x8e, 0x40, }; static const unsigned char ecdsa_secp224r1_sha512_4884_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4884_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xe2, 0xac, 0x0b, 0x24, 0x51, 0x2e, 0x84, 0xf6, 0xfb, 0x01, 0x56, 0x20, 0xd6, 0x89, 0xd3, 0x0d, 0x14, 0x73, 0x6c, 0xf0, 0x0c, 0x18, 0x83, 0x87, 0x53, 0xc3, 0x81, 0x4f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4884 = { .name = "ecdsa_secp224r1_sha512_4884", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4884_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4884_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4884_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 382 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4885 for ECDSA, tcId is 383 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4885_pubkey[] = { 0xf5, 0x54, 0x01, 0x4c, 0xc1, 0x4f, 0x31, 0x9c, 0x18, 0xf5, 0xfa, 0x6c, 0xd7, 0x39, 0x24, 0x90, 0x75, 0xff, 0x35, 0xba, 0x3b, 0x2a, 0xfd, 0xab, 0x53, 0x29, 0xef, 0x0f, 0xd2, 0xc5, 0x01, 0xf2, 0x5a, 0x70, 0x4a, 0xdd, 0xbd, 0x85, 0xc0, 0xe0, 0x22, 0x74, 0x89, 0x56, 0xe5, 0x99, 0x8d, 0x99, 0xc3, 0x87, 0xfb, 0xfd, 0x34, 0x3c, 0x89, 0xe0, }; static const unsigned char ecdsa_secp224r1_sha512_4885_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4885_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x52, 0x21, 0xf3, 0xc2, 0xde, 0x0c, 0x6f, 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0x79, 0xb5, 0x7f, 0x57, 0x51, 0x2b, 0x81, 0x4f, 0x41, 0x3a, 0xeb, 0xaf, 0xe7, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4885 = { .name = "ecdsa_secp224r1_sha512_4885", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4885_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4885_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4885_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 383 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4886 for ECDSA, tcId is 384 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4886_pubkey[] = { 0xbc, 0xfa, 0x8d, 0xb7, 0x04, 0xac, 0xa5, 0x6f, 0xeb, 0x23, 0xbd, 0x4b, 0x40, 0x49, 0x21, 0x32, 0x33, 0xaa, 0x65, 0x20, 0x45, 0xa0, 0xa8, 0x1a, 0x2e, 0x0d, 0xa6, 0x4c, 0x09, 0x1b, 0x35, 0x9f, 0x7b, 0xe7, 0xae, 0x00, 0xa0, 0xe9, 0x77, 0x7d, 0x95, 0x10, 0xf8, 0x47, 0x43, 0x0b, 0x5d, 0xfd, 0xa8, 0x78, 0xe6, 0x6d, 0x4f, 0xb0, 0xd6, 0x2f, }; static const unsigned char ecdsa_secp224r1_sha512_4886_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4886_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x22, 0x1f, 0x3c, 0x2d, 0xe0, 0xc6, 0xfb, 0xc0, 0x7f, 0xf0, 0x41, 0x50, 0x6d, 0xc7, 0x1b, 0x5a, 0x31, 0x20, 0x63, 0xd8, 0x7b, 0xeb, 0x4c, 0x30, 0xc2, 0x89, 0x21, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4886 = { .name = "ecdsa_secp224r1_sha512_4886", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4886_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4886_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4886_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 384 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4887 for ECDSA, tcId is 385 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4887_pubkey[] = { 0x9f, 0xd4, 0xd8, 0x28, 0xae, 0x98, 0x05, 0x6b, 0xe5, 0x8f, 0xa6, 0x9e, 0xaf, 0x9c, 0xde, 0x98, 0xca, 0x0e, 0xd9, 0xb4, 0x15, 0xd6, 0x46, 0x3f, 0xa1, 0x86, 0x4d, 0x9f, 0xb2, 0xa5, 0xe4, 0x1f, 0x10, 0xe8, 0x78, 0x94, 0x50, 0x21, 0x7d, 0xaa, 0xfd, 0x25, 0x9f, 0x20, 0x4a, 0xed, 0x87, 0xb0, 0xe2, 0x61, 0x00, 0xf4, 0x3f, 0x7c, 0x5b, 0xad, }; static const unsigned char ecdsa_secp224r1_sha512_4887_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4887_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x44, 0x3e, 0x78, 0x5b, 0xc1, 0x8d, 0xf7, 0x80, 0xff, 0xe0, 0x82, 0xa0, 0xdb, 0x8e, 0x36, 0xb4, 0x62, 0x40, 0xc7, 0xb0, 0xf7, 0xd6, 0x98, 0x61, 0x85, 0x12, 0x42, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4887 = { .name = "ecdsa_secp224r1_sha512_4887", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4887_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4887_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4887_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 385 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4888 for ECDSA, tcId is 386 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4888_pubkey[] = { 0x61, 0x23, 0xa3, 0x39, 0x69, 0xf2, 0xe0, 0x36, 0xfc, 0x27, 0x88, 0x5f, 0x55, 0x75, 0x5d, 0x39, 0x1c, 0xb0, 0xc2, 0xd3, 0xfa, 0xfb, 0x0c, 0x40, 0x56, 0xc1, 0x99, 0x5d, 0xa0, 0x3b, 0xb4, 0x90, 0x04, 0x7e, 0x88, 0xfe, 0x7e, 0x60, 0x89, 0x12, 0xa6, 0x20, 0x5b, 0x65, 0xf9, 0x50, 0xa8, 0xa0, 0xa3, 0x60, 0x36, 0x2d, 0x33, 0x39, 0xe6, 0x2c, }; static const unsigned char ecdsa_secp224r1_sha512_4888_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4888_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xc2, 0xde, 0x0c, 0x6f, 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x4f, 0xd5, 0x01, 0x36, 0x87, 0x8b, 0x7e, 0x13, 0x41, 0x52, 0x1b, 0x2f, 0x88, 0x0b, 0x19, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4888 = { .name = "ecdsa_secp224r1_sha512_4888", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4888_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4888_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4888_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 386 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4889 for ECDSA, tcId is 387 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4889_pubkey[] = { 0xa1, 0x0b, 0x7a, 0xa7, 0x78, 0x5b, 0x2f, 0x27, 0x91, 0xb1, 0xd4, 0xc4, 0x3e, 0x12, 0x7a, 0xab, 0x56, 0x69, 0x61, 0x2d, 0x74, 0x0b, 0x38, 0xab, 0xaa, 0x0d, 0x30, 0x6e, 0xc1, 0x78, 0xf2, 0x16, 0xfa, 0xd3, 0x79, 0xad, 0x80, 0xba, 0xa0, 0xea, 0xc5, 0x7b, 0xf9, 0xa5, 0x6d, 0x44, 0x6d, 0x68, 0x55, 0x76, 0x37, 0x1b, 0x74, 0x76, 0x23, 0x82, }; static const unsigned char ecdsa_secp224r1_sha512_4889_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4889_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x9f, 0x56, 0xaa, 0x80, 0xae, 0x2b, 0xcf, 0x68, 0x9b, 0xe2, 0xc1, 0x1b, 0x5d, 0xb7, 0xe3, 0xa2, 0x89, 0x83, 0xb4, 0xa7, 0x59, 0x06, 0x92, 0xed, 0xcf, 0x5f, 0x8d, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4889 = { .name = "ecdsa_secp224r1_sha512_4889", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4889_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4889_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4889_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 387 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4890 for ECDSA, tcId is 388 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4890_pubkey[] = { 0xe0, 0x12, 0xc2, 0x3c, 0x68, 0x67, 0xe9, 0x55, 0x33, 0x13, 0xd0, 0x17, 0x9e, 0x9d, 0xb9, 0x53, 0xde, 0x7c, 0x36, 0x8c, 0xdb, 0x59, 0xab, 0xe0, 0x5f, 0x1c, 0x52, 0xba, 0xd3, 0x52, 0xa5, 0x7b, 0xb5, 0x9c, 0x45, 0x15, 0x93, 0x52, 0xc1, 0x14, 0xee, 0xb6, 0x96, 0xec, 0x3b, 0x79, 0xca, 0xa8, 0x35, 0xef, 0x5c, 0x2a, 0xe7, 0x1d, 0xdc, 0xfa, }; static const unsigned char ecdsa_secp224r1_sha512_4890_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4890_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0xad, 0x55, 0x01, 0x5c, 0x57, 0x9e, 0xd1, 0x37, 0xc5, 0x82, 0x36, 0xbb, 0x70, 0xb0, 0xa2, 0x32, 0x4e, 0x79, 0x10, 0x9e, 0x2f, 0xfc, 0x96, 0x42, 0x62, 0xf1, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4890 = { .name = "ecdsa_secp224r1_sha512_4890", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4890_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4890_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4890_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 388 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4891 for ECDSA, tcId is 389 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4891_pubkey[] = { 0xb9, 0xcc, 0xd7, 0xf0, 0xf3, 0x59, 0x49, 0x54, 0xaa, 0x72, 0x9b, 0xda, 0x4b, 0xe8, 0x83, 0xe1, 0x07, 0xe7, 0xf1, 0x22, 0x64, 0x65, 0xb6, 0x4c, 0x2c, 0xa7, 0x10, 0x57, 0x89, 0x82, 0x9d, 0x78, 0x70, 0x16, 0xc5, 0xc1, 0x18, 0xd3, 0xba, 0x33, 0x17, 0xa2, 0xda, 0x0a, 0x0d, 0xaa, 0xf5, 0x6d, 0x30, 0x04, 0xc1, 0x09, 0x62, 0x33, 0x3a, 0x9f, }; static const unsigned char ecdsa_secp224r1_sha512_4891_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4891_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xde, 0x03, 0xff, 0x82, 0x0a, 0x83, 0x6e, 0x39, 0xd3, 0xa8, 0x43, 0x52, 0x19, 0x28, 0x94, 0x44, 0xbb, 0xd2, 0x2d, 0xb7, 0xf7, 0x36, 0x8f, 0x84, 0x11, 0xc2, 0x7e, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4891 = { .name = "ecdsa_secp224r1_sha512_4891", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4891_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4891_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4891_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 389 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4892 for ECDSA, tcId is 390 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4892_pubkey[] = { 0x32, 0x1a, 0x17, 0xde, 0x02, 0x4f, 0xe8, 0x9c, 0x18, 0x64, 0xe1, 0x28, 0xb9, 0xe0, 0xaf, 0x3e, 0x6b, 0x48, 0x80, 0x0a, 0x70, 0xd6, 0xe8, 0x02, 0xb8, 0xb6, 0xdf, 0xfe, 0xb1, 0xa8, 0xae, 0x96, 0x91, 0x1d, 0xdb, 0xde, 0xb8, 0x39, 0x48, 0xa9, 0x92, 0xb1, 0xb0, 0xfe, 0x31, 0x66, 0x79, 0xc6, 0x48, 0x14, 0xb6, 0xa4, 0x5e, 0xc5, 0x6f, 0xe9, }; static const unsigned char ecdsa_secp224r1_sha512_4892_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4892_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xf1, 0x56, 0x05, 0x92, 0x28, 0x97, 0x42, 0x7b, 0x7d, 0x80, 0xab, 0x10, 0x6b, 0x44, 0x74, 0xd7, 0xfa, 0x96, 0x2e, 0x97, 0x0f, 0xfa, 0xd6, 0x66, 0x58, 0x0f, 0xd5, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4892 = { .name = "ecdsa_secp224r1_sha512_4892", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4892_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4892_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4892_sig, .siglen = 56, .result = 1, .comment = "edge case for u1, tcId is 390 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4893 for ECDSA, tcId is 391 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4893_pubkey[] = { 0x08, 0x84, 0x2f, 0x19, 0xb1, 0x14, 0xd1, 0x6b, 0xe2, 0x7b, 0xb4, 0xb6, 0x97, 0x13, 0x77, 0xed, 0x6b, 0x1d, 0x09, 0x15, 0xe1, 0x33, 0xa9, 0xeb, 0xf0, 0x16, 0x74, 0xee, 0x4c, 0x97, 0x73, 0x8b, 0x69, 0x12, 0xff, 0x71, 0x55, 0x3c, 0x4a, 0x74, 0x7c, 0x78, 0x2e, 0xdd, 0xd9, 0xd2, 0xa2, 0x0f, 0xbe, 0xae, 0x38, 0x86, 0x4d, 0x21, 0x78, 0x59, }; static const unsigned char ecdsa_secp224r1_sha512_4893_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4893_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xb2, 0x36, 0x4a, 0xe8, 0x50, 0x14, 0xb1, 0x49, 0xb8, 0x6c, 0x74, 0x1e, 0xb8, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4893 = { .name = "ecdsa_secp224r1_sha512_4893", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4893_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4893_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4893_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 391 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4894 for ECDSA, tcId is 392 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4894_pubkey[] = { 0x84, 0xd6, 0x51, 0x59, 0x6f, 0xd2, 0x34, 0x8f, 0x1b, 0xb5, 0xc8, 0xae, 0x9d, 0x22, 0xc8, 0xb2, 0x1c, 0x4f, 0x75, 0x09, 0x24, 0x0b, 0x60, 0x9a, 0xba, 0xd5, 0xcc, 0x24, 0x31, 0x96, 0xb6, 0x7b, 0x4c, 0xfa, 0xff, 0xaf, 0x0d, 0xce, 0x25, 0xab, 0x00, 0xbf, 0xea, 0xa1, 0xa6, 0x48, 0x21, 0x33, 0x2e, 0xfa, 0x6d, 0xed, 0xd8, 0x7c, 0xc9, 0xe7, }; static const unsigned char ecdsa_secp224r1_sha512_4894_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4894_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x85, 0x5f, 0x5b, 0x2d, 0xc8, 0xe4, 0x6e, 0xc4, 0x28, 0xa5, 0x93, 0xf7, 0x32, 0x19, 0xcf, 0x65, 0xda, 0xe7, 0x93, 0xe8, 0x34, 0x6e, 0x30, 0xcc, 0x37, 0x01, 0x30, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4894 = { .name = "ecdsa_secp224r1_sha512_4894", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4894_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4894_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4894_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 392 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4895 for ECDSA, tcId is 393 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4895_pubkey[] = { 0x8f, 0xbe, 0x39, 0xe7, 0x5b, 0xc4, 0xfd, 0x8a, 0x15, 0xe4, 0xb5, 0x2e, 0x4b, 0xbe, 0xbe, 0x20, 0x47, 0xd5, 0x43, 0x85, 0xa7, 0x11, 0x7e, 0x17, 0xa4, 0xd0, 0xb2, 0xb2, 0x07, 0xab, 0xdb, 0x40, 0x82, 0x45, 0x38, 0xe5, 0x78, 0x7c, 0x71, 0x8d, 0x65, 0x48, 0x58, 0x3f, 0x52, 0x3f, 0x6b, 0x5b, 0xbf, 0xa2, 0x39, 0xa7, 0xf6, 0x22, 0xc8, 0xa0, }; static const unsigned char ecdsa_secp224r1_sha512_4895_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4895_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x2d, 0xb5, 0xf6, 0x1a, 0xea, 0x81, 0x72, 0x76, 0xaf, 0x20, 0x64, 0xe1, 0x04, 0xc7, 0xa3, 0x0e, 0x32, 0x03, 0x4c, 0xb5, 0x26, 0xdd, 0x0a, 0xac, 0xfa, 0x56, 0x56, 0x6f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4895 = { .name = "ecdsa_secp224r1_sha512_4895", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4895_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4895_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4895_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 393 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4896 for ECDSA, tcId is 394 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4896_pubkey[] = { 0xc3, 0x36, 0xb3, 0x40, 0xbc, 0x99, 0xd4, 0x6c, 0x2c, 0x52, 0xdf, 0x54, 0x28, 0xb6, 0xa0, 0xc4, 0xeb, 0x2d, 0xa7, 0x6c, 0x42, 0x35, 0x30, 0xf7, 0x67, 0xcc, 0x76, 0x52, 0xf3, 0xab, 0x99, 0x81, 0xbd, 0x05, 0xd2, 0x95, 0x51, 0x23, 0x93, 0x5a, 0x37, 0x9c, 0xbb, 0x2d, 0x43, 0x61, 0xa1, 0x7d, 0x19, 0x87, 0x86, 0x73, 0xe1, 0xe1, 0x7d, 0xcc, }; static const unsigned char ecdsa_secp224r1_sha512_4896_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4896_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x84, 0xa6, 0xc7, 0x51, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0x87, 0x13, 0xf3, 0xcb, 0xa1, 0x29, 0x3e, 0x4f, 0x3e, 0x95, 0x59, 0x7f, 0xe6, 0xbd, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4896 = { .name = "ecdsa_secp224r1_sha512_4896", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4896_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4896_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4896_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 394 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4897 for ECDSA, tcId is 395 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4897_pubkey[] = { 0x81, 0x6f, 0xdc, 0xf3, 0x70, 0x82, 0x7e, 0x3f, 0x77, 0x71, 0x56, 0x4e, 0x1a, 0xa7, 0x3e, 0xd7, 0x3e, 0x62, 0x55, 0x6d, 0xea, 0xda, 0xd8, 0x97, 0x11, 0xce, 0xf6, 0x63, 0xed, 0xcd, 0xa0, 0xea, 0x42, 0x23, 0x5f, 0x4c, 0x9a, 0x8c, 0x13, 0xf7, 0x87, 0x35, 0x1f, 0xfe, 0x5c, 0xeb, 0x32, 0xf1, 0x5f, 0xc0, 0xcc, 0xb2, 0x4e, 0x0a, 0x40, 0x9c, }; static const unsigned char ecdsa_secp224r1_sha512_4897_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4897_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x6c, 0x75, 0x13, 0xe5, 0xf4, 0x8c, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x9d, 0x21, 0xfd, 0x1b, 0x31, 0x54, 0x4c, 0xb1, 0x3c, 0xa8, 0x6a, 0x75, 0xb2, 0x5e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4897 = { .name = "ecdsa_secp224r1_sha512_4897", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4897_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4897_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4897_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 395 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4898 for ECDSA, tcId is 396 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4898_pubkey[] = { 0x64, 0x29, 0xd2, 0xb7, 0xb0, 0x7a, 0xb0, 0xd5, 0xea, 0x35, 0x29, 0x02, 0xdf, 0x0e, 0xfc, 0x03, 0x6d, 0x72, 0x70, 0xa0, 0xa6, 0xed, 0x39, 0xf6, 0x35, 0xd0, 0x4f, 0x39, 0x4f, 0x79, 0x32, 0x88, 0x3b, 0xc4, 0x53, 0x94, 0x15, 0x13, 0x24, 0xaa, 0xb2, 0x6a, 0xe2, 0x9b, 0xbd, 0x73, 0x85, 0xfa, 0x6a, 0x42, 0xc3, 0xdb, 0x84, 0x43, 0x28, 0x97, }; static const unsigned char ecdsa_secp224r1_sha512_4898_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4898_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xd8, 0xea, 0x27, 0xcb, 0xe9, 0x18, 0x0f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3a, 0x43, 0xfa, 0x36, 0x62, 0xa8, 0x99, 0x62, 0x79, 0x50, 0xd4, 0xeb, 0x64, 0xbc, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4898 = { .name = "ecdsa_secp224r1_sha512_4898", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4898_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4898_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4898_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 396 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4899 for ECDSA, tcId is 397 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4899_pubkey[] = { 0x28, 0x8f, 0x38, 0xfd, 0x77, 0xdd, 0x16, 0x03, 0xff, 0x02, 0x75, 0xcb, 0x11, 0xcb, 0xa2, 0x80, 0xae, 0x34, 0x08, 0xaf, 0xfa, 0x6a, 0x76, 0x0f, 0x39, 0x6f, 0x1a, 0x1e, 0xc8, 0x4c, 0xa6, 0xfd, 0x77, 0x2c, 0x6a, 0xc6, 0xcc, 0x52, 0x3c, 0xc7, 0x2c, 0x2e, 0x7e, 0x95, 0xeb, 0x6a, 0x36, 0xa6, 0x6b, 0x5c, 0xca, 0x5a, 0x58, 0xba, 0x07, 0x8a, }; static const unsigned char ecdsa_secp224r1_sha512_4899_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4899_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3e, 0x5f, 0x48, 0xc0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x24, 0x96, 0x8c, 0x0e, 0xcf, 0x9e, 0xd7, 0x83, 0x74, 0x4a, 0x73, 0x37, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4899 = { .name = "ecdsa_secp224r1_sha512_4899", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4899_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4899_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4899_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 397 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4900 for ECDSA, tcId is 398 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4900_pubkey[] = { 0xc7, 0x69, 0xc1, 0x38, 0xf9, 0xd7, 0x1f, 0xff, 0xf1, 0x13, 0x27, 0x3b, 0x71, 0xa4, 0xaf, 0xde, 0x4f, 0x99, 0x96, 0xa1, 0xc4, 0xbe, 0x65, 0x8a, 0x39, 0x03, 0xcf, 0x7f, 0x43, 0x0e, 0x51, 0x2b, 0x86, 0x8b, 0x37, 0xbb, 0x96, 0xbc, 0x17, 0xa0, 0x9b, 0x0a, 0xb0, 0x1b, 0x26, 0x2f, 0x2e, 0x23, 0xf3, 0x4f, 0x00, 0x41, 0x8f, 0x6b, 0x63, 0xd6, }; static const unsigned char ecdsa_secp224r1_sha512_4900_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4900_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x3d, 0x87, 0xbb, 0x44, 0xc8, 0x33, 0xbb, 0x38, 0x4d, 0x0f, 0x22, 0x4c, 0xcd, 0xde, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4900 = { .name = "ecdsa_secp224r1_sha512_4900", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4900_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4900_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4900_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 398 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4901 for ECDSA, tcId is 399 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4901_pubkey[] = { 0x75, 0xf0, 0x07, 0xc1, 0x1b, 0x93, 0xe6, 0xf4, 0x6e, 0x9a, 0x81, 0x5c, 0xb7, 0x65, 0x99, 0x0a, 0x83, 0x05, 0xd3, 0xad, 0x8d, 0x22, 0xc7, 0x6f, 0xe6, 0xb2, 0x57, 0xcc, 0x71, 0xb5, 0xc1, 0x95, 0x1b, 0x5d, 0x46, 0x4c, 0x66, 0xdf, 0x7c, 0x29, 0x0c, 0xf0, 0xa4, 0xf1, 0x56, 0xbb, 0xf5, 0x2f, 0x1e, 0x41, 0xa7, 0x9d, 0xc6, 0x3a, 0xbc, 0xe5, }; static const unsigned char ecdsa_secp224r1_sha512_4901_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4901_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x64, 0x6c, 0x95, 0xd0, 0xa0, 0x29, 0x62, 0x93, 0x70, 0xd8, 0xe8, 0x3d, 0x71, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4901 = { .name = "ecdsa_secp224r1_sha512_4901", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4901_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4901_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4901_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 399 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4902 for ECDSA, tcId is 400 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4902_pubkey[] = { 0x12, 0x55, 0xfb, 0x94, 0xa0, 0xf2, 0x0e, 0x6f, 0xaa, 0x25, 0x05, 0xc3, 0x94, 0xcc, 0x3c, 0x39, 0xf0, 0x7d, 0xef, 0x41, 0x07, 0x12, 0x7d, 0xff, 0xc4, 0xda, 0xcb, 0x6e, 0xea, 0x73, 0xc1, 0x04, 0x45, 0x44, 0xa1, 0x49, 0x65, 0x60, 0xbd, 0x1b, 0x04, 0x9f, 0xf6, 0x15, 0xe6, 0x8a, 0xe0, 0xd4, 0x83, 0x22, 0x03, 0x27, 0x56, 0x98, 0x84, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4902_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4902_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x8b, 0x51, 0x70, 0x5c, 0x78, 0x1f, 0x09, 0xee, 0x94, 0xa2, 0xae, 0x2e, 0x15, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4902 = { .name = "ecdsa_secp224r1_sha512_4902", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4902_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4902_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4902_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 400 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4903 for ECDSA, tcId is 401 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4903_pubkey[] = { 0xf6, 0x56, 0xa6, 0x32, 0xa0, 0x80, 0x4c, 0xf6, 0x88, 0x44, 0x6b, 0x26, 0x12, 0x08, 0xf7, 0x93, 0x37, 0x3c, 0x5f, 0xf4, 0x45, 0x4b, 0xd1, 0xe0, 0xa8, 0x82, 0x11, 0x3f, 0x30, 0xa2, 0x5d, 0x6f, 0x58, 0x6e, 0x02, 0xdd, 0x4d, 0xcb, 0xf7, 0x3d, 0x96, 0xaf, 0x3e, 0x48, 0x3b, 0x7a, 0xcb, 0x5f, 0x8f, 0x4c, 0x06, 0x45, 0x0d, 0xec, 0x19, 0x82, }; static const unsigned char ecdsa_secp224r1_sha512_4903_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4903_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfd, 0x96, 0xda, 0xfb, 0x0d, 0x75, 0x40, 0xb9, 0x3b, 0x57, 0x90, 0x32, 0x70, 0x82, 0x63, 0x5c, 0xd8, 0x89, 0x5e, 0x1e, 0x79, 0x9d, 0x5d, 0x19, 0xf9, 0x2b, 0x59, 0x40, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4903 = { .name = "ecdsa_secp224r1_sha512_4903", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4903_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4903_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4903_sig, .siglen = 56, .result = 1, .comment = "edge case for u2, tcId is 401 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4904 for ECDSA, tcId is 402 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4904_pubkey[] = { 0x8f, 0xb5, 0x72, 0xde, 0x4d, 0xaf, 0x76, 0x70, 0x26, 0x24, 0xce, 0x4e, 0xd8, 0x19, 0xd0, 0x26, 0x76, 0x22, 0x24, 0xe8, 0xa5, 0x42, 0x15, 0xbf, 0x81, 0xb2, 0x02, 0xa3, 0xf0, 0x74, 0xd2, 0x0e, 0x1d, 0xa7, 0x23, 0x2d, 0x27, 0x94, 0x61, 0x73, 0x2b, 0xc1, 0xba, 0xe0, 0xc5, 0x41, 0x6a, 0xb9, 0xd6, 0x96, 0x30, 0x86, 0x22, 0xe7, 0xff, 0xe8, }; static const unsigned char ecdsa_secp224r1_sha512_4904_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4904_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0xec, 0x0c, 0xe3, 0xfa, 0x72, 0x5c, 0x10, 0x27, 0x47, 0x5a, 0x5f, 0x5b, 0xf4, 0xee, 0x98, 0x0d, 0xe6, 0x1c, 0x3b, 0x48, 0x75, 0xaf, 0xe8, 0xb6, 0x54, 0xb2, 0x4e, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4904 = { .name = "ecdsa_secp224r1_sha512_4904", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4904_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4904_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4904_sig, .siglen = 56, .result = 1, .comment = "point duplication during verification, tcId is 402 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4905 for ECDSA, tcId is 403 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4905_pubkey[] = { 0x8f, 0xb5, 0x72, 0xde, 0x4d, 0xaf, 0x76, 0x70, 0x26, 0x24, 0xce, 0x4e, 0xd8, 0x19, 0xd0, 0x26, 0x76, 0x22, 0x24, 0xe8, 0xa5, 0x42, 0x15, 0xbf, 0x81, 0xb2, 0x02, 0xa3, 0x0f, 0x8b, 0x2d, 0xf1, 0xe2, 0x58, 0xdc, 0xd2, 0xd8, 0x6b, 0x9e, 0x8c, 0xd4, 0x3e, 0x45, 0x1e, 0x3a, 0xbe, 0x95, 0x46, 0x29, 0x69, 0xcf, 0x79, 0xdd, 0x18, 0x00, 0x19, }; static const unsigned char ecdsa_secp224r1_sha512_4905_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4905_sig[] = { 0xc4, 0x45, 0x03, 0xda, 0xe8, 0x5d, 0xd5, 0x21, 0x07, 0x80, 0xf0, 0x29, 0x28, 0xb3, 0xd9, 0x27, 0x17, 0x1c, 0x57, 0x8f, 0x86, 0x03, 0xd1, 0x6b, 0x24, 0x06, 0x63, 0xc7, 0xec, 0x0c, 0xe3, 0xfa, 0x72, 0x5c, 0x10, 0x27, 0x47, 0x5a, 0x5f, 0x5b, 0xf4, 0xee, 0x98, 0x0d, 0xe6, 0x1c, 0x3b, 0x48, 0x75, 0xaf, 0xe8, 0xb6, 0x54, 0xb2, 0x4e, 0xe2, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4905 = { .name = "ecdsa_secp224r1_sha512_4905", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4905_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4905_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4905_sig, .siglen = 56, .result = -1, .comment = "duplication bug, tcId is 403 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4906 for ECDSA, tcId is 404 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4906_pubkey[] = { 0xe5, 0x46, 0x2d, 0x3a, 0x83, 0x8d, 0x4a, 0x14, 0xde, 0x96, 0xa7, 0xb0, 0xb1, 0x07, 0x1e, 0xb6, 0x22, 0xae, 0x6e, 0x71, 0xed, 0xe8, 0xf9, 0x5f, 0xf0, 0x1c, 0x21, 0x21, 0x36, 0x8e, 0x3a, 0x90, 0xd8, 0x58, 0x4e, 0x19, 0x46, 0x16, 0xd3, 0x21, 0x1a, 0x75, 0x41, 0xf6, 0xa0, 0x96, 0x03, 0x39, 0xca, 0xb2, 0x8e, 0x8b, 0xfd, 0x6b, 0x1d, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4906_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4906_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4906 = { .name = "ecdsa_secp224r1_sha512_4906", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4906_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4906_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4906_sig, .siglen = 56, .result = -1, .comment = "comparison with point at infinity , tcId is 404 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4907 for ECDSA, tcId is 405 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4907_pubkey[] = { 0x5d, 0x97, 0x67, 0x0c, 0x1f, 0x12, 0x1f, 0x7f, 0x1b, 0xa5, 0x41, 0x50, 0x56, 0x09, 0xf2, 0x01, 0x43, 0xb3, 0x12, 0xa7, 0xbb, 0x49, 0xd3, 0x76, 0x69, 0x0e, 0x18, 0x31, 0xc1, 0xb4, 0x56, 0x71, 0x41, 0xa7, 0xb5, 0x34, 0xe2, 0x1b, 0xd2, 0xf7, 0x06, 0xae, 0x03, 0x41, 0x69, 0xab, 0x9c, 0x3f, 0x85, 0x36, 0x14, 0x79, 0x04, 0xde, 0x8c, 0x5f, }; static const unsigned char ecdsa_secp224r1_sha512_4907_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4907_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4907 = { .name = "ecdsa_secp224r1_sha512_4907", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4907_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4907_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4907_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 405 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4908 for ECDSA, tcId is 406 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4908_pubkey[] = { 0xd2, 0x67, 0x52, 0x78, 0xda, 0x2d, 0x7d, 0xaa, 0x83, 0x73, 0xdd, 0x63, 0xb7, 0xaa, 0x46, 0xcb, 0x14, 0x76, 0x65, 0x71, 0xc2, 0xd8, 0x09, 0x8b, 0x83, 0xa1, 0x02, 0xa5, 0x69, 0x9b, 0x57, 0x2d, 0x4b, 0x95, 0x14, 0x97, 0x41, 0x8a, 0x37, 0x69, 0x30, 0x02, 0x2d, 0x48, 0xfe, 0x59, 0x96, 0x6b, 0x15, 0x8f, 0xa0, 0x83, 0x40, 0xe2, 0x4b, 0x98, }; static const unsigned char ecdsa_secp224r1_sha512_4908_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4908_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4908 = { .name = "ecdsa_secp224r1_sha512_4908", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4908_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4908_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4908_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 406 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4909 for ECDSA, tcId is 407 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4909_pubkey[] = { 0x5a, 0x5c, 0xd1, 0x16, 0x23, 0x88, 0x34, 0x87, 0x34, 0xda, 0xe2, 0x0e, 0x22, 0x35, 0xae, 0x2c, 0x46, 0x4a, 0xde, 0xf0, 0xa1, 0x96, 0xf9, 0xaa, 0xf0, 0x24, 0x82, 0xca, 0x2a, 0xe9, 0x4e, 0x8b, 0x9a, 0x02, 0x43, 0x75, 0x03, 0x64, 0x29, 0xb6, 0x32, 0xab, 0x48, 0x5e, 0x02, 0xc5, 0xa9, 0x66, 0x5b, 0x28, 0x9b, 0x8a, 0x47, 0xba, 0xde, 0x8f, }; static const unsigned char ecdsa_secp224r1_sha512_4909_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4909_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4909 = { .name = "ecdsa_secp224r1_sha512_4909", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4909_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4909_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4909_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 407 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4910 for ECDSA, tcId is 408 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4910_pubkey[] = { 0xca, 0xcd, 0x93, 0xeb, 0x11, 0xa8, 0x21, 0xde, 0x3d, 0x88, 0x2b, 0xab, 0x74, 0x11, 0xe7, 0xc7, 0x7f, 0x23, 0xc0, 0x8d, 0xa1, 0x74, 0x18, 0x9c, 0xc9, 0x87, 0xdc, 0x41, 0x71, 0x6f, 0xe3, 0x78, 0xab, 0x84, 0x21, 0x61, 0xbc, 0x16, 0xde, 0xf6, 0xe0, 0x37, 0xd4, 0xba, 0x9d, 0x30, 0xd8, 0xcb, 0x41, 0xad, 0x30, 0xcf, 0x06, 0x56, 0xe5, 0x0b, }; static const unsigned char ecdsa_secp224r1_sha512_4910_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4910_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4910 = { .name = "ecdsa_secp224r1_sha512_4910", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4910_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4910_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4910_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 408 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4911 for ECDSA, tcId is 409 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4911_pubkey[] = { 0xcf, 0x46, 0x96, 0x00, 0x60, 0x45, 0x3e, 0x55, 0x57, 0x7f, 0x1b, 0xee, 0x6a, 0x9c, 0x47, 0x09, 0xe7, 0xcd, 0xcb, 0xa4, 0x5c, 0xa8, 0x02, 0x0b, 0xb3, 0x53, 0x69, 0x31, 0xea, 0x4e, 0xc3, 0x33, 0x09, 0x21, 0x38, 0x64, 0xa1, 0x31, 0x8a, 0xee, 0x0a, 0x86, 0xd8, 0xb6, 0xf0, 0xc1, 0xb9, 0x74, 0x1c, 0xd6, 0xbd, 0x5d, 0xea, 0x4f, 0x40, 0x66, }; static const unsigned char ecdsa_secp224r1_sha512_4911_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4911_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4911 = { .name = "ecdsa_secp224r1_sha512_4911", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4911_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4911_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4911_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 409 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4912 for ECDSA, tcId is 410 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4912_pubkey[] = { 0x62, 0xf4, 0xea, 0xf3, 0x79, 0x7b, 0xdc, 0x3d, 0x5d, 0x8c, 0xfa, 0xa0, 0x7b, 0x5a, 0xf7, 0x06, 0x0e, 0x13, 0x1b, 0x18, 0x3c, 0xa4, 0xed, 0xed, 0x48, 0x19, 0xe5, 0x61, 0xbf, 0xf3, 0xea, 0xdd, 0x7b, 0x55, 0xdb, 0x2d, 0xc0, 0x1b, 0xd2, 0x05, 0x69, 0xe6, 0xc4, 0x7c, 0x92, 0x12, 0xf9, 0xb2, 0xd6, 0x79, 0x37, 0x95, 0xb5, 0x1e, 0x4f, 0x6c, }; static const unsigned char ecdsa_secp224r1_sha512_4912_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4912_sig[] = { 0x70, 0x6a, 0x46, 0xdc, 0x76, 0xdc, 0xb7, 0x67, 0x98, 0xe6, 0x0e, 0x6d, 0x89, 0x47, 0x47, 0x88, 0xd1, 0x6d, 0xc1, 0x80, 0x32, 0xd2, 0x68, 0xfd, 0x1a, 0x70, 0x4f, 0xa6, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4912 = { .name = "ecdsa_secp224r1_sha512_4912", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4912_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4912_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4912_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 410 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4913 for ECDSA, tcId is 411 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4913_pubkey[] = { 0xc4, 0xa4, 0xbf, 0x5a, 0xe0, 0x13, 0x85, 0x87, 0xf5, 0x0a, 0xb7, 0xa2, 0xc3, 0x36, 0xa4, 0x30, 0x52, 0x7a, 0x86, 0xf5, 0x9f, 0x97, 0x65, 0xc2, 0xf3, 0xf5, 0x48, 0x8d, 0xf9, 0x41, 0x9b, 0xf9, 0xdf, 0x5f, 0x12, 0x1d, 0xe3, 0xa3, 0x2d, 0xb1, 0x7b, 0x49, 0xc7, 0x2b, 0x60, 0x6b, 0x2b, 0xe5, 0xce, 0x56, 0xac, 0xb5, 0x65, 0xcc, 0x12, 0xb7, }; static const unsigned char ecdsa_secp224r1_sha512_4913_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4913_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x07, 0x8b, 0xa0, 0x3d, 0xa5, 0x6a, 0x06, 0x9f, 0x0d, 0xc1, 0xc9, 0x74, 0x0e, 0x14, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4913 = { .name = "ecdsa_secp224r1_sha512_4913", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4913_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4913_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4913_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 411 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4914 for ECDSA, tcId is 412 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4914_pubkey[] = { 0xe7, 0xcb, 0x5a, 0xe5, 0x4d, 0xbe, 0x61, 0x9a, 0xb5, 0x06, 0x9f, 0x14, 0x56, 0x62, 0x36, 0xb3, 0xc6, 0xb0, 0xb4, 0x4f, 0x1c, 0x4c, 0x53, 0x1e, 0x66, 0xd8, 0x9b, 0x3e, 0x64, 0xbe, 0x7f, 0xdc, 0x18, 0x78, 0x96, 0x29, 0xdf, 0xdd, 0xf7, 0x15, 0x8f, 0x8f, 0xf2, 0x7a, 0xbd, 0x55, 0x3b, 0xfa, 0xc3, 0xf7, 0xc8, 0x74, 0xbc, 0xcd, 0xc3, 0x1b, }; static const unsigned char ecdsa_secp224r1_sha512_4914_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4914_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6c, 0xee, 0xd4, 0xc0, 0x9e, 0x84, 0xc7, 0x7e, 0xbd, 0x91, 0x16, 0xe1, 0x73, 0x91, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4914 = { .name = "ecdsa_secp224r1_sha512_4914", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4914_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4914_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4914_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 412 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4915 for ECDSA, tcId is 413 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4915_pubkey[] = { 0x30, 0xdb, 0x5d, 0x82, 0x79, 0x31, 0x9c, 0xf5, 0xa3, 0xb6, 0x76, 0x8a, 0x0c, 0x5e, 0x5c, 0x84, 0x75, 0x2f, 0x63, 0x14, 0xf7, 0x35, 0xd6, 0x3f, 0x6c, 0x56, 0x50, 0xcd, 0xd3, 0x2f, 0xb5, 0x4f, 0x74, 0xd4, 0xa5, 0x08, 0x8e, 0x67, 0x74, 0xa1, 0x32, 0x01, 0x68, 0x36, 0x42, 0x79, 0x0d, 0x2e, 0x69, 0xe5, 0x5e, 0x4f, 0x47, 0x61, 0x29, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4915_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4915_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x04, 0x86, 0xf9, 0xbe, 0x96, 0x72, 0xd0, 0xc5, 0xd5, 0x0d, 0xdf, 0x45, 0xa2, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4915 = { .name = "ecdsa_secp224r1_sha512_4915", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4915_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4915_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4915_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 413 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4916 for ECDSA, tcId is 414 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4916_pubkey[] = { 0x7d, 0xb2, 0x7d, 0xa4, 0xd6, 0x7a, 0x2d, 0xe0, 0xc7, 0x88, 0x15, 0x80, 0x97, 0x19, 0xbd, 0xf6, 0x97, 0x63, 0x32, 0xc6, 0x7e, 0xf0, 0xf3, 0x82, 0x7d, 0xf4, 0xad, 0xc2, 0x2a, 0xb3, 0x7a, 0xec, 0x2e, 0xed, 0x0d, 0x5e, 0x67, 0xac, 0xfd, 0x6a, 0x19, 0x5f, 0x21, 0x03, 0x2d, 0x9a, 0xf7, 0x1c, 0xe7, 0x3e, 0x12, 0x0f, 0xdd, 0xa2, 0x9f, 0x1a, }; static const unsigned char ecdsa_secp224r1_sha512_4916_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4916_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x12, 0x1b, 0xe6, 0xfa, 0x59, 0xcb, 0x43, 0x17, 0x54, 0x37, 0x7d, 0x16, 0x88, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4916 = { .name = "ecdsa_secp224r1_sha512_4916", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4916_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4916_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4916_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 414 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4917 for ECDSA, tcId is 415 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4917_pubkey[] = { 0xd1, 0xc1, 0x9d, 0x46, 0xb5, 0x17, 0xbb, 0x3b, 0xd7, 0xbd, 0xf0, 0x74, 0xff, 0x97, 0x5c, 0x0d, 0xbd, 0x2b, 0xde, 0x10, 0xd1, 0xad, 0x21, 0x7e, 0x58, 0xeb, 0xc8, 0xc5, 0x5a, 0xc8, 0x98, 0xc0, 0x40, 0xa1, 0x85, 0x80, 0x4d, 0xdb, 0x03, 0x2b, 0x48, 0x10, 0x3d, 0x6c, 0x8d, 0x12, 0x04, 0x3d, 0x3a, 0x4f, 0xec, 0x93, 0xab, 0xa7, 0xa6, 0xd7, }; static const unsigned char ecdsa_secp224r1_sha512_4917_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4917_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4917 = { .name = "ecdsa_secp224r1_sha512_4917", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4917_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4917_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4917_sig, .siglen = 56, .result = 1, .comment = "extreme value for k and s^-1, tcId is 415 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4918 for ECDSA, tcId is 416 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4918_pubkey[] = { 0xd9, 0x5a, 0xc9, 0x6a, 0xe9, 0xdb, 0xfb, 0x80, 0x91, 0x18, 0x62, 0xe0, 0x0a, 0x4c, 0xad, 0xbc, 0xb2, 0x35, 0x9f, 0x49, 0x9b, 0x53, 0xbe, 0x00, 0x7f, 0x07, 0x11, 0xc0, 0x93, 0xd3, 0xda, 0x93, 0x1a, 0xcb, 0xb9, 0x24, 0x28, 0x00, 0xdc, 0x52, 0x16, 0x95, 0xb4, 0xf1, 0x9f, 0xf2, 0xdf, 0xfc, 0x36, 0x13, 0xf4, 0x0b, 0xdb, 0x15, 0xc3, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha512_4918_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4918_sig[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0xac, 0xde, 0xd4, 0x06, 0x10, 0x29, 0xd6, 0x3a, 0x46, 0xf4, 0x6f, 0x12, 0x94, 0x74, 0x11, 0xf2, 0xea, 0x56, 0x1a, 0x59, 0x20, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4918 = { .name = "ecdsa_secp224r1_sha512_4918", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4918_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4918_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4918_sig, .siglen = 56, .result = 1, .comment = "extreme value for k, tcId is 416 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4919 for ECDSA, tcId is 417 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4919_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4919_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4919_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4919 = { .name = "ecdsa_secp224r1_sha512_4919", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4919_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4919_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4919_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 417 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4920 for ECDSA, tcId is 418 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4920_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34, }; static const unsigned char ecdsa_secp224r1_sha512_4920_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4920_sig[] = { 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x50, 0x86, 0xa4, 0x32, 0x52, 0x11, 0xe6, 0x96, 0xeb, 0x6b, 0x31, 0xda, 0x8f, 0xf5, 0xc2, 0xc7, 0x28, 0xd3, 0x8d, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4920 = { .name = "ecdsa_secp224r1_sha512_4920", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4920_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4920_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4920_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 418 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4921 for ECDSA, tcId is 419 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4921_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha512_4921_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4921_sig[] = { 0x43, 0xf8, 0x00, 0xfb, 0xea, 0xf9, 0x23, 0x8c, 0x58, 0xaf, 0x79, 0x5b, 0xcd, 0xad, 0x04, 0xbc, 0x49, 0xcd, 0x85, 0x0c, 0x39, 0x4d, 0x33, 0x82, 0x95, 0x33, 0x56, 0xb0, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4921 = { .name = "ecdsa_secp224r1_sha512_4921", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4921_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4921_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4921_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 419 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4922 for ECDSA, tcId is 420 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4922_pubkey[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21, 0x42, 0xc8, 0x9c, 0x77, 0x4a, 0x08, 0xdc, 0x04, 0xb3, 0xdd, 0x20, 0x19, 0x32, 0xbc, 0x8a, 0x5e, 0xa5, 0xf8, 0xb8, 0x9b, 0xbb, 0x2a, 0x7e, 0x66, 0x7a, 0xff, 0x81, 0xcd, }; static const unsigned char ecdsa_secp224r1_sha512_4922_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4922_sig[] = { 0xbc, 0x07, 0xff, 0x04, 0x15, 0x06, 0xdc, 0x73, 0xa7, 0x50, 0x86, 0xa4, 0x32, 0x52, 0x11, 0xe6, 0x96, 0xeb, 0x6b, 0x31, 0xda, 0x8f, 0xf5, 0xc2, 0xc7, 0x28, 0xd3, 0x8d, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x27, 0xce, 0x20, 0x1a, 0x6b, 0x76, 0x95, 0x1f, 0x98, 0x2e, 0x7a, 0xe8, 0x98, 0x51, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4922 = { .name = "ecdsa_secp224r1_sha512_4922", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4922_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4922_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4922_sig, .siglen = 56, .result = -1, .comment = "testing point duplication, tcId is 420 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4923 for ECDSA, tcId is 421 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4923_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4923_sig[] = { 0xf7, 0x29, 0x15, 0xd6, 0xd9, 0x16, 0x01, 0x42, 0x79, 0x61, 0x61, 0x86, 0x86, 0x9a, 0x01, 0x22, 0x8f, 0xcd, 0x9f, 0x1b, 0x40, 0x78, 0x35, 0x30, 0x18, 0xb3, 0x99, 0xab, 0xb6, 0x7f, 0x2b, 0x91, 0xee, 0xeb, 0x91, 0x03, 0x81, 0xf5, 0xb4, 0x61, 0xa4, 0xa3, 0x9c, 0x64, 0x2a, 0xea, 0x47, 0x92, 0x01, 0x3d, 0x4e, 0xb6, 0x3d, 0xa1, 0x83, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4923 = { .name = "ecdsa_secp224r1_sha512_4923", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4923_pubkey, .pubkeylen = 56, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp224r1_sha512_4923_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 421 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4924 for ECDSA, tcId is 422 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4924_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4924_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp224r1_sha512_4924_sig[] = { 0xa5, 0xd1, 0x79, 0xc3, 0x36, 0xcc, 0xdc, 0x76, 0x0d, 0xfd, 0xdd, 0x91, 0x3c, 0xdf, 0x8e, 0xa4, 0x68, 0xd0, 0xf4, 0x68, 0x6f, 0x7b, 0x2d, 0x38, 0x25, 0x69, 0x8e, 0xd7, 0xa7, 0x7f, 0x12, 0x06, 0x0a, 0x4d, 0x1b, 0x94, 0xb0, 0xd1, 0xc4, 0x43, 0xea, 0xe3, 0xad, 0x6e, 0x21, 0xb7, 0xea, 0xcf, 0xdf, 0x6f, 0xbf, 0x39, 0xa2, 0xb2, 0x96, 0x58, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4924 = { .name = "ecdsa_secp224r1_sha512_4924", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4924_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4924_msg, .msglen = 3, .sig = ecdsa_secp224r1_sha512_4924_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 422 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4925 for ECDSA, tcId is 423 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4925_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4925_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp224r1_sha512_4925_sig[] = { 0xb7, 0xc6, 0x5d, 0xce, 0x56, 0xab, 0xe2, 0x4f, 0xb4, 0x59, 0x2e, 0xce, 0x5a, 0xc1, 0xe6, 0xee, 0x83, 0x53, 0x43, 0x1f, 0x74, 0x52, 0x40, 0x9a, 0xdd, 0x73, 0x68, 0x84, 0xe5, 0xfe, 0x5d, 0xb7, 0x98, 0x89, 0x31, 0x02, 0x6b, 0x93, 0x7d, 0xc4, 0xef, 0x98, 0x3f, 0xe4, 0x46, 0xca, 0x13, 0x4d, 0x29, 0xb9, 0x4a, 0xc7, 0x77, 0xcd, 0xe3, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4925 = { .name = "ecdsa_secp224r1_sha512_4925", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4925_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4925_msg, .msglen = 6, .sig = ecdsa_secp224r1_sha512_4925_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 423 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4926 for ECDSA, tcId is 424 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4926_pubkey[] = { 0x4c, 0x24, 0x66, 0x70, 0x65, 0x8a, 0x1d, 0x41, 0xf5, 0xd7, 0x7b, 0xce, 0x24, 0x6c, 0xbe, 0x38, 0x6a, 0xc2, 0x28, 0x48, 0xe2, 0x69, 0xb9, 0xd4, 0xcd, 0x67, 0xc4, 0x66, 0xdd, 0xd9, 0x47, 0x15, 0x3d, 0x39, 0xb2, 0xd4, 0x25, 0x33, 0xa4, 0x60, 0xde, 0xf2, 0x68, 0x80, 0x40, 0x8c, 0xaf, 0x2d, 0xd3, 0xdd, 0x48, 0xfe, 0x88, 0x8c, 0xd1, 0x76, }; static const unsigned char ecdsa_secp224r1_sha512_4926_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4926_sig[] = { 0x05, 0xc5, 0x63, 0xd3, 0xa4, 0xba, 0xd8, 0x74, 0xe4, 0x61, 0x0a, 0xdf, 0xa5, 0x77, 0x77, 0xa5, 0x9f, 0x99, 0x5b, 0xfa, 0x06, 0xef, 0x97, 0xbf, 0x12, 0x5a, 0x49, 0x88, 0x97, 0xed, 0x68, 0xf5, 0x46, 0xcf, 0x4b, 0xb4, 0x99, 0x85, 0x24, 0xc1, 0x83, 0x56, 0xf3, 0xaf, 0x16, 0x2d, 0x2b, 0xf2, 0x74, 0x4b, 0xe9, 0x33, 0x57, 0xbc, 0x4b, 0x4b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4926 = { .name = "ecdsa_secp224r1_sha512_4926", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4926_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4926_msg, .msglen = 20, .sig = ecdsa_secp224r1_sha512_4926_sig, .siglen = 56, .result = 1, .comment = "pseudorandom signature, tcId is 424 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4927 for ECDSA, tcId is 425 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4927_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4927_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4927_sig[] = { 0xc7, 0xa6, 0xf3, 0x58, 0xb7, 0xd9, 0x38, 0x15, 0x18, 0x9a, 0xe5, 0xd2, 0xc3, 0xab, 0x4d, 0x4e, 0x05, 0xf4, 0x31, 0x76, 0xa5, 0x2d, 0xd4, 0xfc, 0x5b, 0x48, 0xa3, 0x4a, 0xa2, 0x45, 0x85, 0x12, 0xbb, 0x8d, 0xbe, 0x6f, 0x1b, 0xd6, 0xeb, 0x01, 0xd2, 0xd7, 0x7d, 0x56, 0x24, 0xe8, 0x54, 0x7b, 0xf8, 0x7d, 0x85, 0xfc, 0x73, 0x1c, 0x0c, 0x86, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4927 = { .name = "ecdsa_secp224r1_sha512_4927", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4927_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4927_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4927_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 425 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4928 for ECDSA, tcId is 426 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4928_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4928_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4928_sig[] = { 0x5f, 0x56, 0xca, 0x58, 0x7d, 0x16, 0x66, 0x4a, 0x20, 0xda, 0xd1, 0x3d, 0xf8, 0x5a, 0x47, 0x59, 0x78, 0xe5, 0xce, 0xe8, 0x1a, 0x8d, 0x0f, 0x49, 0xfa, 0xaf, 0x61, 0x58, 0xb6, 0x4e, 0xf5, 0x9d, 0x79, 0x46, 0x1f, 0xe1, 0xa0, 0x9a, 0x58, 0x64, 0x90, 0x74, 0x35, 0xf7, 0x0b, 0xd7, 0x5f, 0x18, 0x3a, 0xfb, 0x11, 0x90, 0x3f, 0x56, 0x0b, 0x7c, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4928 = { .name = "ecdsa_secp224r1_sha512_4928", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4928_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4928_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4928_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 426 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4929 for ECDSA, tcId is 427 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4929_pubkey[] = { 0xae, 0xd6, 0xfc, 0xad, 0x24, 0x00, 0xc4, 0xd9, 0x4e, 0x55, 0xdb, 0xb6, 0xb0, 0x12, 0xce, 0x3d, 0x4c, 0x2b, 0x46, 0x84, 0x3f, 0xbe, 0x99, 0xd4, 0x28, 0x9e, 0x6e, 0xcf, 0x8a, 0x24, 0xa8, 0x9e, 0x71, 0x34, 0x3d, 0x7d, 0x15, 0x1d, 0x25, 0x8d, 0x2c, 0xb6, 0x90, 0x34, 0x9c, 0x2d, 0x56, 0xb3, 0x66, 0xdd, 0x10, 0xa6, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp224r1_sha512_4929_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4929_sig[] = { 0xdd, 0x94, 0xf5, 0xb5, 0x6e, 0x99, 0x47, 0xd0, 0x07, 0xe7, 0xc8, 0xef, 0xd8, 0x94, 0xa5, 0xc8, 0x82, 0xf1, 0xd0, 0xb5, 0xdd, 0x56, 0xc3, 0x2b, 0x5b, 0x26, 0x65, 0x21, 0xfb, 0xc8, 0x83, 0x74, 0x1b, 0xd2, 0x7c, 0x59, 0x95, 0x8a, 0xe1, 0x7b, 0xa6, 0xe4, 0xa4, 0x1a, 0xd1, 0xed, 0xec, 0xa9, 0xa3, 0xba, 0x31, 0xc8, 0xf2, 0x33, 0xb5, 0xac, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4929 = { .name = "ecdsa_secp224r1_sha512_4929", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4929_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4929_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4929_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 0's, tcId is 427 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4930 for ECDSA, tcId is 428 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4930_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha512_4930_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4930_sig[] = { 0x80, 0x71, 0xe6, 0x68, 0x2c, 0x6e, 0x8a, 0x32, 0x70, 0x6d, 0xc7, 0xe4, 0x11, 0x50, 0x39, 0x46, 0x54, 0x6b, 0x31, 0xff, 0xf2, 0x7d, 0xcc, 0xe1, 0x88, 0xae, 0x38, 0x9f, 0xdc, 0x39, 0x6c, 0x79, 0x7d, 0x44, 0xed, 0xf7, 0x94, 0x43, 0x2d, 0x1d, 0xa0, 0x91, 0xf8, 0xc7, 0x62, 0x97, 0x4d, 0x8c, 0xe1, 0xf0, 0x6e, 0x08, 0xca, 0x01, 0x36, 0x22, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4930 = { .name = "ecdsa_secp224r1_sha512_4930", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4930_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4930_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4930_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 428 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4931 for ECDSA, tcId is 429 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4931_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha512_4931_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4931_sig[] = { 0x79, 0x16, 0x24, 0xe5, 0xf2, 0x34, 0xb8, 0x95, 0x0d, 0x50, 0x9d, 0x0b, 0x45, 0x6e, 0xf6, 0xfa, 0x77, 0x8b, 0x19, 0xdc, 0xcd, 0x60, 0x9d, 0x49, 0x6b, 0x62, 0xa2, 0x11, 0x6c, 0x51, 0xe8, 0x46, 0xfa, 0x53, 0xd0, 0x3d, 0x42, 0xf7, 0x98, 0xe6, 0xbb, 0x90, 0x95, 0x4f, 0x9a, 0x48, 0xc1, 0x79, 0x4b, 0x47, 0xe8, 0x4a, 0xc9, 0x7b, 0x46, 0x0a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4931 = { .name = "ecdsa_secp224r1_sha512_4931", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4931_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4931_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4931_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 429 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4932 for ECDSA, tcId is 430 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4932_pubkey[] = { 0xbf, 0x19, 0xec, 0xfe, 0x43, 0xff, 0xe2, 0x89, 0xf6, 0x99, 0xf4, 0x79, 0x31, 0x61, 0x45, 0xb9, 0xa7, 0xf7, 0x37, 0x0b, 0x9e, 0xce, 0x5a, 0xb1, 0x21, 0x21, 0x74, 0xf1, 0x73, 0xd5, 0x28, 0x94, 0x9a, 0xe9, 0x14, 0x2f, 0x81, 0x8b, 0xad, 0xe7, 0x1a, 0x96, 0x04, 0x07, 0x96, 0x3b, 0xe0, 0xb6, 0x48, 0x2a, 0x6a, 0x60, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp224r1_sha512_4932_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4932_sig[] = { 0x00, 0x34, 0xbe, 0xfa, 0x1d, 0x25, 0xb7, 0x56, 0xce, 0x76, 0xb3, 0x83, 0xa6, 0xe8, 0x75, 0x37, 0x41, 0xc1, 0x2a, 0x59, 0x26, 0x6c, 0x2c, 0x79, 0x21, 0xff, 0x6e, 0x8b, 0xbc, 0x44, 0xe3, 0x82, 0x3e, 0x4d, 0x80, 0x7c, 0xbc, 0x92, 0xfa, 0x78, 0x6a, 0x89, 0xe6, 0x2a, 0x4b, 0x21, 0x7b, 0x5f, 0xb0, 0xc0, 0xf1, 0x86, 0x5d, 0x4a, 0x7e, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4932 = { .name = "ecdsa_secp224r1_sha512_4932", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4932_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4932_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4932_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 430 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4933 for ECDSA, tcId is 431 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4933_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha512_4933_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4933_sig[] = { 0x22, 0x4a, 0x38, 0xe7, 0x33, 0xeb, 0xd3, 0xfa, 0xc2, 0x74, 0xec, 0xc5, 0x0e, 0xce, 0xf2, 0xe7, 0xc3, 0x18, 0x9b, 0xe2, 0xb9, 0xd0, 0x93, 0xa8, 0xdc, 0xc6, 0xfa, 0x3a, 0x13, 0x4f, 0xa5, 0xa4, 0xf9, 0x23, 0xd2, 0x96, 0xb3, 0xc6, 0xdd, 0x46, 0x83, 0xd2, 0x49, 0xcc, 0xf0, 0xad, 0x27, 0x28, 0x90, 0xe4, 0x14, 0x9c, 0x9a, 0x0d, 0x74, 0x15, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4933 = { .name = "ecdsa_secp224r1_sha512_4933", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4933_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4933_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4933_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 431 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4934 for ECDSA, tcId is 432 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4934_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha512_4934_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4934_sig[] = { 0x33, 0x8d, 0x07, 0xd9, 0x90, 0x87, 0x9a, 0xd8, 0x44, 0xe2, 0x4c, 0x17, 0x88, 0xe3, 0x62, 0x26, 0x9d, 0x8a, 0xca, 0x70, 0x50, 0x03, 0x57, 0xd3, 0x85, 0x76, 0x82, 0x27, 0xf7, 0x45, 0xcc, 0x4e, 0xba, 0xaf, 0x1c, 0xd4, 0x28, 0x30, 0x02, 0x6a, 0x66, 0xe5, 0xb9, 0x55, 0x64, 0xcd, 0xbe, 0xe5, 0xed, 0xf8, 0x53, 0xbb, 0x2c, 0xc9, 0x12, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4934 = { .name = "ecdsa_secp224r1_sha512_4934", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4934_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4934_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4934_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 432 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4935 for ECDSA, tcId is 433 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4935_pubkey[] = { 0x26, 0xe5, 0xab, 0xf1, 0x35, 0xcb, 0x54, 0xea, 0xaa, 0x16, 0xb6, 0x9e, 0x4b, 0x0b, 0x29, 0x22, 0x75, 0x34, 0x4e, 0x88, 0xa0, 0x9d, 0xf6, 0xdf, 0x80, 0x00, 0x00, 0x00, 0xea, 0xb8, 0x91, 0xde, 0x54, 0xe3, 0xf2, 0x6f, 0xf5, 0x0a, 0xb9, 0x89, 0xf3, 0x33, 0xda, 0xc5, 0x51, 0x58, 0x3d, 0x46, 0x8a, 0xe6, 0x23, 0xc5, 0x96, 0x43, 0x4a, 0xf0, }; static const unsigned char ecdsa_secp224r1_sha512_4935_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4935_sig[] = { 0x68, 0x9f, 0xce, 0x4b, 0x33, 0xd8, 0x21, 0x2a, 0x66, 0x36, 0x40, 0xa1, 0xae, 0x0e, 0xfa, 0xa7, 0xa7, 0xd7, 0x71, 0x1b, 0xeb, 0xa7, 0x19, 0x37, 0x4f, 0xe6, 0x34, 0xee, 0x04, 0xbd, 0x99, 0x81, 0xfa, 0x52, 0x29, 0x30, 0x63, 0x07, 0x6f, 0x0f, 0xd7, 0x0f, 0xc3, 0x18, 0x75, 0xd5, 0x80, 0xef, 0x94, 0xf0, 0x20, 0xd2, 0xf9, 0x54, 0x40, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4935 = { .name = "ecdsa_secp224r1_sha512_4935", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4935_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4935_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4935_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 433 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4936 for ECDSA, tcId is 434 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4936_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4936_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4936_sig[] = { 0x2a, 0x42, 0x87, 0xe0, 0x15, 0x10, 0xe7, 0xfb, 0x5f, 0xed, 0x2e, 0x1c, 0xcc, 0x3f, 0x2a, 0x69, 0x29, 0xcf, 0x7d, 0x03, 0x85, 0x0e, 0x49, 0xd7, 0xae, 0x8a, 0x50, 0x4a, 0x35, 0x5c, 0x39, 0x15, 0xf3, 0xfa, 0x96, 0x37, 0xdc, 0x80, 0x01, 0x43, 0x8a, 0x8c, 0x04, 0xe1, 0x5d, 0x14, 0x93, 0x4c, 0xab, 0xd4, 0x30, 0xfe, 0xb0, 0xcb, 0x5b, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4936 = { .name = "ecdsa_secp224r1_sha512_4936", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4936_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4936_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4936_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 434 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4937 for ECDSA, tcId is 435 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4937_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4937_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4937_sig[] = { 0xb5, 0xbf, 0x79, 0x5a, 0x38, 0xad, 0xb0, 0x52, 0xb4, 0x01, 0x46, 0x8f, 0xfc, 0xab, 0x81, 0x10, 0x3d, 0x2d, 0x9f, 0xca, 0x2e, 0x15, 0xb8, 0xd0, 0x8a, 0xb9, 0x8c, 0xe8, 0x5e, 0xc0, 0xd2, 0xc6, 0xae, 0xc7, 0x18, 0x88, 0xc9, 0x41, 0xaf, 0x32, 0x4c, 0x72, 0x72, 0xbe, 0xc1, 0x92, 0xab, 0xb2, 0x92, 0xf9, 0xdf, 0x82, 0xa2, 0x4e, 0x8a, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4937 = { .name = "ecdsa_secp224r1_sha512_4937", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4937_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4937_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4937_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 435 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4938 for ECDSA, tcId is 436 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4938_pubkey[] = { 0xec, 0x62, 0x7f, 0x34, 0x55, 0x45, 0xd0, 0x3f, 0x8c, 0x6d, 0xbd, 0x08, 0xe5, 0x75, 0x52, 0x71, 0x16, 0x56, 0x7f, 0xe3, 0x75, 0xf9, 0xec, 0xaa, 0xff, 0xff, 0xff, 0xff, 0x41, 0xbf, 0x70, 0x56, 0x97, 0xd5, 0xf7, 0x16, 0xbc, 0xf7, 0x87, 0x18, 0xd5, 0x39, 0x3b, 0x63, 0xa9, 0x86, 0x91, 0xf4, 0xa1, 0xf2, 0x42, 0x46, 0x37, 0x55, 0x38, 0xfd, }; static const unsigned char ecdsa_secp224r1_sha512_4938_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4938_sig[] = { 0x10, 0x0e, 0xd0, 0x7f, 0x46, 0x71, 0x33, 0xbf, 0x10, 0x91, 0x7f, 0x7a, 0x15, 0xab, 0x2b, 0xfd, 0xa5, 0x19, 0xbd, 0xbc, 0x26, 0x53, 0xb9, 0x59, 0x55, 0xe2, 0x22, 0x11, 0xb3, 0x8a, 0x08, 0x1f, 0x7c, 0x2e, 0x2b, 0x77, 0x5d, 0x1d, 0xa8, 0x68, 0xd0, 0x38, 0x1c, 0x09, 0xba, 0x15, 0x59, 0xc9, 0x61, 0x3b, 0x5b, 0xe7, 0x15, 0x93, 0x63, 0xad, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4938 = { .name = "ecdsa_secp224r1_sha512_4938", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4938_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4938_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4938_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 436 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4939 for ECDSA, tcId is 437 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4939_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha512_4939_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4939_sig[] = { 0x54, 0xe6, 0xad, 0xd8, 0xac, 0x91, 0x0e, 0x52, 0xc6, 0x22, 0x8f, 0xe3, 0x98, 0x0d, 0x8f, 0x58, 0x62, 0x18, 0x33, 0x4d, 0x8d, 0x85, 0x9b, 0xa9, 0xa3, 0x32, 0x99, 0x17, 0x58, 0x36, 0xcc, 0x79, 0xec, 0x88, 0x51, 0x9e, 0xab, 0x4a, 0x6b, 0x26, 0x14, 0xc5, 0x01, 0x62, 0x8c, 0x9f, 0xee, 0x32, 0xfb, 0xaf, 0xd9, 0x3e, 0x32, 0x15, 0x84, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4939 = { .name = "ecdsa_secp224r1_sha512_4939", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4939_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4939_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4939_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 437 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4940 for ECDSA, tcId is 438 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4940_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha512_4940_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4940_sig[] = { 0x12, 0x30, 0xd5, 0x40, 0x9f, 0x37, 0x95, 0x84, 0xb4, 0xd5, 0x48, 0xb7, 0xbc, 0xcb, 0xa6, 0x4b, 0xaf, 0x81, 0xd5, 0x12, 0xa9, 0xf2, 0xe6, 0x39, 0x8c, 0x4e, 0x3a, 0x66, 0x19, 0x37, 0xa2, 0x98, 0xf8, 0xcb, 0xdf, 0xa8, 0x5b, 0x8e, 0x6f, 0xcf, 0x0a, 0x12, 0xbe, 0x49, 0x66, 0xd8, 0x02, 0x70, 0xca, 0xde, 0x85, 0xa0, 0xc3, 0x7e, 0xe6, 0xf3, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4940 = { .name = "ecdsa_secp224r1_sha512_4940", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4940_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4940_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4940_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 438 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4941 for ECDSA, tcId is 439 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4941_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0x00, 0x00, 0x00, 0x00, 0x76, 0x2d, 0x28, 0xf1, 0xfd, 0xc2, 0x19, 0x18, 0x4f, 0x81, 0x68, 0x1f, 0xbf, 0xf5, 0x66, 0xd4, 0x65, 0xb5, 0xf1, 0xf3, 0x1e, 0x87, 0x2d, 0xf5, }; static const unsigned char ecdsa_secp224r1_sha512_4941_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4941_sig[] = { 0x86, 0x2f, 0x43, 0xb0, 0x44, 0xfb, 0x32, 0xad, 0xb4, 0x5e, 0x00, 0x37, 0x8b, 0xa0, 0x83, 0xae, 0x76, 0x1c, 0x84, 0x45, 0x20, 0x54, 0xf1, 0x7b, 0x13, 0x41, 0xbf, 0x5b, 0x95, 0xd8, 0xd8, 0xe5, 0xe3, 0xa6, 0xcc, 0x2b, 0x0a, 0x06, 0xc7, 0x92, 0x25, 0x2c, 0xa1, 0x1a, 0x64, 0x22, 0x57, 0x72, 0x18, 0x31, 0x57, 0x85, 0x20, 0xf9, 0x6b, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4941 = { .name = "ecdsa_secp224r1_sha512_4941", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4941_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4941_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4941_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 439 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4942 for ECDSA, tcId is 440 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4942_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha512_4942_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4942_sig[] = { 0xcb, 0x5c, 0xab, 0xb1, 0xca, 0x01, 0xb8, 0x47, 0xa6, 0xbc, 0x70, 0x55, 0x8d, 0x1e, 0x5d, 0x3a, 0x20, 0x4d, 0x17, 0x41, 0xbb, 0xe8, 0x00, 0xf4, 0xb1, 0x59, 0xaf, 0x35, 0x35, 0x80, 0xcc, 0x85, 0xf2, 0x18, 0x39, 0x41, 0x30, 0xbd, 0xdf, 0x1c, 0x4e, 0xac, 0x04, 0xfe, 0x96, 0xf5, 0x9f, 0x14, 0xfb, 0x43, 0x66, 0x86, 0x95, 0x03, 0x98, 0xbe, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4942 = { .name = "ecdsa_secp224r1_sha512_4942", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4942_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4942_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4942_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 440 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4943 for ECDSA, tcId is 441 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4943_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha512_4943_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4943_sig[] = { 0xc9, 0xd8, 0x3d, 0xc0, 0x4c, 0xf4, 0xee, 0x89, 0xc4, 0x05, 0x04, 0x5d, 0x0f, 0xd1, 0xd7, 0x04, 0xf6, 0x27, 0xca, 0x5b, 0xbe, 0x35, 0x0f, 0x40, 0xb8, 0x26, 0xbb, 0xc1, 0x74, 0xfe, 0xdc, 0x9e, 0x55, 0x04, 0x5e, 0x97, 0x59, 0xf2, 0x12, 0x44, 0x60, 0xfd, 0xfb, 0x99, 0x1d, 0xc6, 0x20, 0xcf, 0xee, 0x6e, 0xff, 0xc0, 0xb4, 0xad, 0xaa, 0x9e, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4943 = { .name = "ecdsa_secp224r1_sha512_4943", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4943_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4943_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4943_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 441 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4944 for ECDSA, tcId is 442 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4944_pubkey[] = { 0x15, 0x01, 0x6e, 0x52, 0xb3, 0x64, 0x72, 0xd5, 0x36, 0x47, 0x76, 0x05, 0xfb, 0x80, 0x5d, 0xd3, 0x90, 0x30, 0x82, 0xa0, 0x62, 0xd1, 0xea, 0x30, 0xaf, 0x9e, 0x55, 0x5a, 0xff, 0xff, 0xff, 0xff, 0x89, 0xd2, 0xd7, 0x0e, 0x02, 0x3d, 0xe6, 0xe7, 0xb0, 0x7e, 0x97, 0xdf, 0x40, 0x0a, 0x99, 0x2b, 0x9a, 0x4a, 0x0e, 0x0c, 0xe1, 0x78, 0xd2, 0x0c, }; static const unsigned char ecdsa_secp224r1_sha512_4944_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4944_sig[] = { 0x46, 0xdd, 0x65, 0xb6, 0xe7, 0xf1, 0x0c, 0x08, 0x41, 0x84, 0x1b, 0x01, 0x03, 0x3a, 0x5b, 0xef, 0xd3, 0xa0, 0xe7, 0x8c, 0x85, 0xf1, 0xf3, 0x90, 0xbb, 0x3c, 0xdf, 0x25, 0xf3, 0x3a, 0xce, 0xa3, 0xd4, 0x7c, 0xf0, 0xdd, 0x52, 0x73, 0x73, 0x5b, 0x00, 0x41, 0x04, 0xf6, 0x51, 0x2e, 0xd6, 0x41, 0x05, 0x25, 0x09, 0x42, 0x2c, 0x03, 0x25, 0xa7, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4944 = { .name = "ecdsa_secp224r1_sha512_4944", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4944_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4944_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4944_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 442 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4945 for ECDSA, tcId is 443 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4945_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4945_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4945_sig[] = { 0xdd, 0xb4, 0xa7, 0xe4, 0x00, 0xa1, 0xe9, 0x81, 0x18, 0xf4, 0x74, 0x72, 0x2d, 0xa3, 0xf4, 0x21, 0xf6, 0x5a, 0x76, 0xee, 0xc6, 0x1f, 0x4f, 0x7b, 0x69, 0x9f, 0xaf, 0x07, 0xdb, 0x80, 0xcb, 0xa1, 0x99, 0x85, 0x9c, 0xdf, 0xe9, 0x16, 0xd6, 0xab, 0x3d, 0xeb, 0x91, 0xd7, 0x6a, 0xaf, 0x0e, 0xd5, 0x54, 0xc8, 0xf9, 0xed, 0x7e, 0x5a, 0xa5, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4945 = { .name = "ecdsa_secp224r1_sha512_4945", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4945_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4945_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4945_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 443 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4946 for ECDSA, tcId is 444 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4946_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4946_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4946_sig[] = { 0x4c, 0x26, 0x0b, 0x54, 0x62, 0x80, 0x60, 0x4e, 0x4c, 0x80, 0x38, 0x47, 0x21, 0xc9, 0xe8, 0x03, 0xef, 0x70, 0x4e, 0x7f, 0xb7, 0x01, 0x68, 0xe6, 0x73, 0x0f, 0xc1, 0xf3, 0xa8, 0xac, 0xea, 0xe2, 0x19, 0xac, 0x25, 0xc9, 0xf0, 0x42, 0x31, 0xb4, 0xe0, 0xc1, 0x71, 0x41, 0x3d, 0xb1, 0xd2, 0x6d, 0xf1, 0xc1, 0xe8, 0x43, 0x00, 0x62, 0xeb, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4946 = { .name = "ecdsa_secp224r1_sha512_4946", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4946_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4946_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4946_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 444 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4947 for ECDSA, tcId is 445 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4947_pubkey[] = { 0x00, 0x00, 0x00, 0x00, 0xf7, 0xe4, 0x71, 0x3d, 0x08, 0x51, 0x12, 0x11, 0x2c, 0x37, 0xcd, 0xf4, 0x60, 0x1f, 0xf6, 0x88, 0xda, 0x79, 0x60, 0x16, 0xb7, 0x1a, 0x72, 0x7a, 0xde, 0x5a, 0x9e, 0xc1, 0x65, 0x05, 0x4c, 0xc9, 0x87, 0xf9, 0xdc, 0x87, 0xe9, 0x99, 0x1b, 0x92, 0xe4, 0xfa, 0x64, 0x9c, 0xa6, 0x55, 0xee, 0xae, 0x9f, 0x2a, 0x30, 0xe1, }; static const unsigned char ecdsa_secp224r1_sha512_4947_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4947_sig[] = { 0xf4, 0x09, 0x8d, 0x2c, 0x02, 0x40, 0xe7, 0x8f, 0xce, 0xab, 0xb0, 0x18, 0x3d, 0xf0, 0xb3, 0x9e, 0x7a, 0xd3, 0xe7, 0xf5, 0xd6, 0xda, 0x15, 0x87, 0xfa, 0x09, 0x85, 0x3c, 0xd4, 0x24, 0x12, 0xb2, 0xab, 0xaa, 0x61, 0x4c, 0x95, 0xeb, 0x11, 0xf9, 0xb9, 0x34, 0x62, 0x82, 0xce, 0x3a, 0x1c, 0x93, 0xaa, 0xc3, 0x5c, 0xe7, 0xaa, 0x37, 0x2f, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4947 = { .name = "ecdsa_secp224r1_sha512_4947", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4947_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4947_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4947_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 445 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4948 for ECDSA, tcId is 446 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4948_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha512_4948_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4948_sig[] = { 0x48, 0xdd, 0xc4, 0x97, 0xf9, 0xa4, 0x73, 0x2c, 0x67, 0x7e, 0x46, 0xc0, 0xe2, 0xbd, 0xab, 0xec, 0x54, 0xfc, 0x9d, 0x27, 0xe4, 0x6a, 0xb5, 0x95, 0x05, 0x6d, 0xb4, 0xd9, 0xb8, 0x21, 0x9e, 0xbb, 0xfa, 0xeb, 0xc2, 0xfe, 0x43, 0x11, 0xef, 0xab, 0x0c, 0x35, 0xd4, 0x39, 0x27, 0x51, 0x35, 0x1b, 0xcc, 0x19, 0x71, 0xe8, 0xd0, 0x19, 0x41, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4948 = { .name = "ecdsa_secp224r1_sha512_4948", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4948_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4948_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4948_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 446 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4949 for ECDSA, tcId is 447 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4949_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha512_4949_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4949_sig[] = { 0xe1, 0xab, 0xaf, 0x51, 0xd2, 0x7a, 0x6d, 0x7d, 0x4c, 0x9b, 0x28, 0x07, 0x83, 0x25, 0xca, 0xc2, 0xd7, 0xce, 0x3d, 0x54, 0x03, 0x91, 0x6c, 0x68, 0x90, 0x37, 0x60, 0xb7, 0x2c, 0x45, 0xa9, 0x9e, 0x27, 0x70, 0xf7, 0x82, 0xfe, 0xe5, 0xca, 0x1d, 0x71, 0x3e, 0xae, 0xcf, 0x07, 0xe6, 0x2d, 0x53, 0xc6, 0x4b, 0x7c, 0xf9, 0x3d, 0xe9, 0x90, 0x0d, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4949 = { .name = "ecdsa_secp224r1_sha512_4949", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4949_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4949_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4949_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 447 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4950 for ECDSA, tcId is 448 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4950_pubkey[] = { 0xff, 0xff, 0xff, 0xff, 0xea, 0xdf, 0x7c, 0xee, 0x8d, 0x34, 0xd0, 0x4c, 0xf2, 0x2c, 0x8f, 0x7d, 0xe3, 0x56, 0x74, 0xfb, 0x2f, 0x50, 0x1d, 0x24, 0x2a, 0x76, 0xf7, 0x25, 0x86, 0xc4, 0x09, 0x30, 0x9d, 0x39, 0x8e, 0x60, 0xce, 0x1e, 0x0a, 0x4c, 0x9e, 0x05, 0xa9, 0xd3, 0x26, 0x27, 0x57, 0x7e, 0x8c, 0xe2, 0xcc, 0x7f, 0x3a, 0xfa, 0x2c, 0x3e, }; static const unsigned char ecdsa_secp224r1_sha512_4950_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4950_sig[] = { 0x86, 0x8c, 0xd1, 0x27, 0xc9, 0x9e, 0x11, 0x49, 0xf7, 0xfc, 0x8d, 0x87, 0x8c, 0xdf, 0xa9, 0x86, 0xb6, 0x2e, 0x99, 0xad, 0xde, 0xa2, 0x81, 0x14, 0x96, 0x11, 0xff, 0x15, 0x16, 0xe5, 0x95, 0x38, 0x20, 0x13, 0x5b, 0x7d, 0x46, 0x2c, 0xe5, 0x43, 0x4e, 0xf8, 0x59, 0x20, 0xe9, 0x73, 0xee, 0xc9, 0xe4, 0xd1, 0x4d, 0x7c, 0xb3, 0xcc, 0x2a, 0x3f, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4950 = { .name = "ecdsa_secp224r1_sha512_4950", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4950_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4950_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4950_sig, .siglen = 56, .result = 1, .comment = "x-coordinate of the public key is large, tcId is 448 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4951 for ECDSA, tcId is 449 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4951_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4951_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4951_sig[] = { 0xa3, 0x75, 0x92, 0x97, 0x18, 0xec, 0x4e, 0x6a, 0xda, 0x9c, 0x93, 0x70, 0xc5, 0x1d, 0xf6, 0xbd, 0xae, 0xe7, 0xeb, 0xab, 0x2a, 0x70, 0x67, 0x5d, 0x42, 0xa0, 0xb6, 0xb3, 0x9e, 0xaf, 0x48, 0x02, 0xef, 0xaf, 0x7c, 0xa0, 0x82, 0xff, 0xbf, 0x5e, 0xd7, 0x74, 0xaf, 0x43, 0x79, 0x2d, 0x9b, 0x3f, 0xd7, 0x11, 0xc6, 0xb1, 0xc3, 0x61, 0x12, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4951 = { .name = "ecdsa_secp224r1_sha512_4951", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4951_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4951_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4951_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 449 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4952 for ECDSA, tcId is 450 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4952_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4952_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4952_sig[] = { 0xd9, 0x7b, 0x32, 0xf3, 0xbf, 0x8b, 0xc1, 0x1e, 0xc2, 0x67, 0x2d, 0xd6, 0x32, 0x04, 0x18, 0xbe, 0xee, 0xd9, 0x95, 0x27, 0xa6, 0x3f, 0xe4, 0xc5, 0x21, 0x99, 0xec, 0x61, 0x68, 0xdd, 0x90, 0x06, 0xb0, 0x33, 0x19, 0xcc, 0xbe, 0x65, 0x1d, 0x0b, 0xda, 0xf8, 0x4c, 0x63, 0x35, 0x6f, 0x03, 0xcb, 0x00, 0x7a, 0x68, 0x65, 0xee, 0x3e, 0x02, 0x06, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4952 = { .name = "ecdsa_secp224r1_sha512_4952", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4952_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4952_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4952_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 450 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4953 for ECDSA, tcId is 451 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4953_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0x00, 0x00, 0x00, 0x00, 0x0e, 0x2a, 0xb0, 0xe8, 0x49, 0x5e, 0x85, 0x9e, 0xb2, 0xaf, 0xb0, 0x07, 0x69, 0xd6, 0xe7, 0xfe, 0x62, 0x6a, 0x11, 0x91, 0x67, 0xc0, 0xb6, 0xbc, }; static const unsigned char ecdsa_secp224r1_sha512_4953_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4953_sig[] = { 0x8e, 0xe5, 0x79, 0x4d, 0xc2, 0xe6, 0x6f, 0x25, 0x84, 0x91, 0x0e, 0xa1, 0xd8, 0x36, 0x1e, 0x5b, 0x53, 0xdb, 0x53, 0x5a, 0xdc, 0xf5, 0xc1, 0xc3, 0x5e, 0x12, 0x83, 0x09, 0x5d, 0x1d, 0x8b, 0x9b, 0x99, 0x6c, 0x0a, 0x48, 0x8e, 0x05, 0xaf, 0x14, 0x42, 0x1b, 0x86, 0xe9, 0x84, 0x1f, 0x0c, 0xba, 0x70, 0x60, 0x27, 0xfc, 0x82, 0x7d, 0x4d, 0x95, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4953 = { .name = "ecdsa_secp224r1_sha512_4953", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4953_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4953_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4953_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 451 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4954 for ECDSA, tcId is 452 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4954_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha512_4954_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4954_sig[] = { 0x79, 0x99, 0x72, 0x7c, 0x0c, 0xc0, 0x2d, 0x88, 0xef, 0x27, 0x40, 0x12, 0xa7, 0x62, 0xaf, 0xcb, 0xb1, 0x9e, 0x7f, 0xce, 0x19, 0x09, 0x1a, 0x02, 0xac, 0xd0, 0x05, 0x64, 0xdb, 0xfa, 0xcf, 0x67, 0x99, 0x9f, 0x22, 0xc4, 0x99, 0xd4, 0x8a, 0x60, 0xa6, 0xfe, 0x4b, 0xbb, 0x74, 0x61, 0x99, 0xc2, 0x99, 0x57, 0xa1, 0xec, 0x7a, 0x09, 0x00, 0xe0, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4954 = { .name = "ecdsa_secp224r1_sha512_4954", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4954_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4954_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4954_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 452 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4955 for ECDSA, tcId is 453 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4955_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha512_4955_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4955_sig[] = { 0x57, 0x97, 0xc2, 0x1c, 0x01, 0x62, 0xe4, 0x2f, 0x69, 0x69, 0x3c, 0x6c, 0x02, 0x44, 0xdf, 0xdf, 0x92, 0x18, 0xc0, 0x1e, 0x92, 0x35, 0x76, 0x01, 0x77, 0xb6, 0x1a, 0x54, 0x54, 0x52, 0xc8, 0x87, 0xb2, 0x7f, 0xb3, 0x42, 0xa8, 0xa0, 0x0d, 0x27, 0x57, 0x9c, 0x71, 0x95, 0xdd, 0xdb, 0x73, 0xdf, 0x39, 0x92, 0x33, 0xed, 0x0d, 0xea, 0x56, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4955 = { .name = "ecdsa_secp224r1_sha512_4955", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4955_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4955_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4955_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 453 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4956 for ECDSA, tcId is 454 in file ecdsa_secp224r1_sha512_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) static const unsigned char ecdsa_secp224r1_sha512_4956_pubkey[] = { 0xb0, 0x01, 0x3c, 0x6f, 0xbf, 0xf6, 0xf0, 0x9f, 0xec, 0xda, 0x1c, 0x26, 0x3e, 0xf6, 0x53, 0x99, 0xd4, 0xcf, 0x98, 0x9c, 0xa5, 0xfc, 0x4f, 0x8f, 0xff, 0x0f, 0xe9, 0xe1, 0xff, 0xff, 0xff, 0xff, 0xf1, 0xd5, 0x4f, 0x17, 0xb6, 0xa1, 0x7a, 0x61, 0x4d, 0x50, 0x4f, 0xf7, 0x96, 0x29, 0x18, 0x01, 0x9d, 0x95, 0xee, 0x6e, 0x98, 0x3f, 0x49, 0x45, }; static const unsigned char ecdsa_secp224r1_sha512_4956_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp224r1_sha512_4956_sig[] = { 0x0e, 0xb9, 0xdc, 0x5d, 0x67, 0xbb, 0x0d, 0x40, 0x09, 0x54, 0x4f, 0x86, 0x54, 0x97, 0x79, 0x07, 0xdf, 0xe7, 0x70, 0xe7, 0xfa, 0xe4, 0x57, 0x1d, 0x31, 0xd7, 0xb4, 0xfa, 0xab, 0x5c, 0xda, 0x53, 0xe8, 0x68, 0xbf, 0xf5, 0x19, 0x8b, 0xe4, 0xbe, 0x36, 0x81, 0xb1, 0x86, 0xcb, 0x0c, 0x13, 0x96, 0xd2, 0x72, 0xc7, 0x1f, 0x09, 0x3f, 0x8b, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp224r1_sha512_4956 = { .name = "ecdsa_secp224r1_sha512_4956", .sig_alg = ECDSA, .hash = SHA512, .curve = &secp224r1_str_params, .pubkey = ecdsa_secp224r1_sha512_4956_pubkey, .pubkeylen = 56, .msg = ecdsa_secp224r1_sha512_4956_msg, .msglen = 7, .sig = ecdsa_secp224r1_sha512_4956_sig, .siglen = 56, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 454 in file ecdsa_secp224r1_sha512_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP224R1) && defined(WITH_HASH_SHA512) */ /* Test 4957 for ECDSA, tcId is 1 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4957_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4957_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4957_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x90, 0x0e, 0x75, 0xad, 0x23, 0x3f, 0xcc, 0x90, 0x85, 0x09, 0xdb, 0xff, 0x59, 0x22, 0x64, 0x7d, 0xb3, 0x7c, 0x21, 0xf4, 0xaf, 0xd3, 0x20, 0x3a, 0xe8, 0xdc, 0x4a, 0xe7, 0x79, 0x4b, 0x0f, 0x87, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4957 = { .name = "ecdsa_secp256k1_sha256_4957", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4957_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4957_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4957_sig, .siglen = 64, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4958 for ECDSA, tcId is 2 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4958_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4958_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4958_sig[] = { 0x01, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x83, 0xb9, 0x0d, 0xea, 0xbc, 0xa4, 0xb0, 0x5c, 0x45, 0x74, 0xe4, 0x9b, 0x58, 0x99, 0xb9, 0x64, 0xa6, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4958 = { .name = "ecdsa_secp256k1_sha256_4958", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4958_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4958_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4958_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 2 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4959 for ECDSA, tcId is 3 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4959_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4959_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4959_sig[] = { 0x7e, 0xc1, 0x08, 0x63, 0x31, 0x05, 0x65, 0xa9, 0x08, 0x45, 0x7f, 0xa0, 0xf1, 0xb8, 0x7a, 0x79, 0xbc, 0x4f, 0xcf, 0x10, 0xb9, 0xe0, 0xe4, 0x32, 0x0a, 0xc0, 0x21, 0xc1, 0x06, 0xb3, 0x1d, 0xdc, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4959 = { .name = "ecdsa_secp256k1_sha256_4959", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4959_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4959_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4959_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 3 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4960 for ECDSA, tcId is 4 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4960_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4960_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4960_sig[] = { 0x01, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4960 = { .name = "ecdsa_secp256k1_sha256_4960", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4960_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4960_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4960_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 4 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4961 for ECDSA, tcId is 5 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4961_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4961_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4961_sig[] = { 0x7e, 0xc1, 0x08, 0x63, 0x31, 0x05, 0x65, 0xa9, 0x08, 0x45, 0x7f, 0xa0, 0xf1, 0xb8, 0x7a, 0x7b, 0x01, 0xa0, 0xf2, 0x2a, 0x0a, 0x98, 0x43, 0xf6, 0x4a, 0xed, 0xc3, 0x34, 0x36, 0x7c, 0xdc, 0x9b, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4961 = { .name = "ecdsa_secp256k1_sha256_4961", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4961_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4961_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4961_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 5 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4962 for ECDSA, tcId is 6 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4962_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4962_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4962_sig[] = { 0x00, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x01, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x7f, 0xc1, 0xe1, 0x97, 0xd8, 0xae, 0xbe, 0x20, 0x3c, 0x96, 0xc8, 0x72, 0x32, 0x27, 0x21, 0x72, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4962 = { .name = "ecdsa_secp256k1_sha256_4962", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4962_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4962_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4962_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 6 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4963 for ECDSA, tcId is 7 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4963_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4963_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4963_sig[] = { 0x00, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x01, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4963 = { .name = "ecdsa_secp256k1_sha256_4963", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4963_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4963_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4963_sig, .siglen = 66, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 7 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4964 for ECDSA, tcId is 8 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4964_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4964_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4964_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x90, 0x0e, 0x75, 0xad, 0x23, 0x3f, 0xcc, 0x90, 0x85, 0x09, 0xdb, 0xff, 0x59, 0x22, 0x64, 0x7e, 0xf8, 0xcd, 0x45, 0x0e, 0x00, 0x8a, 0x7f, 0xff, 0x29, 0x09, 0xec, 0x5a, 0xa9, 0x14, 0xce, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4964 = { .name = "ecdsa_secp256k1_sha256_4964", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4964_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4964_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4964_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 8 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4965 for ECDSA, tcId is 9 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4965_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4965_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4965_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4965 = { .name = "ecdsa_secp256k1_sha256_4965", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4965_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4965_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4965_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 9 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4966 for ECDSA, tcId is 10 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4966_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4966_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4966_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4966 = { .name = "ecdsa_secp256k1_sha256_4966", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4966_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4966_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4966_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 10 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4967 for ECDSA, tcId is 11 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4967_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4967_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4967_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4967 = { .name = "ecdsa_secp256k1_sha256_4967", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4967_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4967_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4967_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 11 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4968 for ECDSA, tcId is 12 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4968_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4968_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4968_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4968 = { .name = "ecdsa_secp256k1_sha256_4968", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4968_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4968_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4968_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 12 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4969 for ECDSA, tcId is 13 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4969_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4969_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4969_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4969 = { .name = "ecdsa_secp256k1_sha256_4969", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4969_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4969_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4969_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 13 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4970 for ECDSA, tcId is 14 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4970_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4970_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4970_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4970 = { .name = "ecdsa_secp256k1_sha256_4970", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4970_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4970_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4970_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 14 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4971 for ECDSA, tcId is 15 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4971_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4971_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4971_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4971 = { .name = "ecdsa_secp256k1_sha256_4971", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4971_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4971_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4971_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 15 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4972 for ECDSA, tcId is 16 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4972_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4972_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4972_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4972 = { .name = "ecdsa_secp256k1_sha256_4972", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4972_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4972_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4972_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 16 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4973 for ECDSA, tcId is 17 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4973_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4973_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4973_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4973 = { .name = "ecdsa_secp256k1_sha256_4973", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4973_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4973_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4973_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 17 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4974 for ECDSA, tcId is 18 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4974_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4974_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4974_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4974 = { .name = "ecdsa_secp256k1_sha256_4974", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4974_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4974_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4974_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 18 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4975 for ECDSA, tcId is 19 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4975_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4975_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4975_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4975 = { .name = "ecdsa_secp256k1_sha256_4975", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4975_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4975_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4975_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 19 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4976 for ECDSA, tcId is 20 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4976_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4976_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4976_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4976 = { .name = "ecdsa_secp256k1_sha256_4976", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4976_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4976_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4976_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 20 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4977 for ECDSA, tcId is 21 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4977_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4977_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4977_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4977 = { .name = "ecdsa_secp256k1_sha256_4977", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4977_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4977_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4977_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 21 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4978 for ECDSA, tcId is 22 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4978_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4978_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4978_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4978 = { .name = "ecdsa_secp256k1_sha256_4978", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4978_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4978_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4978_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 22 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4979 for ECDSA, tcId is 23 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4979_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4979_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4979_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4979 = { .name = "ecdsa_secp256k1_sha256_4979", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4979_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4979_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4979_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 23 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4980 for ECDSA, tcId is 24 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4980_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4980_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4980_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4980 = { .name = "ecdsa_secp256k1_sha256_4980", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4980_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4980_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4980_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 24 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4981 for ECDSA, tcId is 25 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4981_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4981_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4981_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4981 = { .name = "ecdsa_secp256k1_sha256_4981", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4981_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4981_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4981_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 25 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4982 for ECDSA, tcId is 26 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4982_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4982_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4982_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4982 = { .name = "ecdsa_secp256k1_sha256_4982", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4982_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4982_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4982_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 26 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4983 for ECDSA, tcId is 27 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4983_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4983_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4983_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4983 = { .name = "ecdsa_secp256k1_sha256_4983", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4983_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4983_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4983_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 27 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4984 for ECDSA, tcId is 28 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4984_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4984_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4984_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4984 = { .name = "ecdsa_secp256k1_sha256_4984", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4984_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4984_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4984_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 28 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4985 for ECDSA, tcId is 29 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4985_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4985_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4985_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4985 = { .name = "ecdsa_secp256k1_sha256_4985", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4985_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4985_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4985_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 29 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4986 for ECDSA, tcId is 30 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4986_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4986_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4986_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4986 = { .name = "ecdsa_secp256k1_sha256_4986", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4986_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4986_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4986_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 30 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4987 for ECDSA, tcId is 31 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4987_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4987_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4987_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4987 = { .name = "ecdsa_secp256k1_sha256_4987", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4987_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4987_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4987_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 31 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4988 for ECDSA, tcId is 32 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4988_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4988_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4988_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4988 = { .name = "ecdsa_secp256k1_sha256_4988", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4988_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4988_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4988_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 32 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4989 for ECDSA, tcId is 33 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4989_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4989_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4989_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4989 = { .name = "ecdsa_secp256k1_sha256_4989", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4989_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4989_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4989_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 33 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4990 for ECDSA, tcId is 34 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4990_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4990_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4990_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4990 = { .name = "ecdsa_secp256k1_sha256_4990", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4990_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4990_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4990_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 34 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4991 for ECDSA, tcId is 35 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4991_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4991_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4991_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4991 = { .name = "ecdsa_secp256k1_sha256_4991", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4991_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4991_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4991_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 35 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4992 for ECDSA, tcId is 36 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4992_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4992_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4992_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4992 = { .name = "ecdsa_secp256k1_sha256_4992", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4992_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4992_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4992_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 36 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4993 for ECDSA, tcId is 37 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4993_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4993_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4993_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4993 = { .name = "ecdsa_secp256k1_sha256_4993", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4993_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4993_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4993_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 37 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4994 for ECDSA, tcId is 38 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4994_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4994_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4994_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4994 = { .name = "ecdsa_secp256k1_sha256_4994", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4994_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4994_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4994_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 38 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4995 for ECDSA, tcId is 39 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4995_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4995_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4995_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4995 = { .name = "ecdsa_secp256k1_sha256_4995", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4995_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4995_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4995_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 39 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4996 for ECDSA, tcId is 40 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4996_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4996_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4996_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4996 = { .name = "ecdsa_secp256k1_sha256_4996", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4996_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4996_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4996_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 40 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4997 for ECDSA, tcId is 41 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4997_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4997_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4997_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4997 = { .name = "ecdsa_secp256k1_sha256_4997", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4997_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4997_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4997_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 41 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4998 for ECDSA, tcId is 42 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4998_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4998_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4998_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4998 = { .name = "ecdsa_secp256k1_sha256_4998", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4998_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4998_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4998_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 42 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 4999 for ECDSA, tcId is 43 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_4999_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_4999_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_4999_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_4999 = { .name = "ecdsa_secp256k1_sha256_4999", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_4999_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_4999_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_4999_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 43 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5000 for ECDSA, tcId is 44 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5000_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5000_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5000_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5000 = { .name = "ecdsa_secp256k1_sha256_5000", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5000_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5000_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5000_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 44 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5001 for ECDSA, tcId is 45 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5001_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5001_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5001_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5001 = { .name = "ecdsa_secp256k1_sha256_5001", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5001_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5001_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5001_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 45 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5002 for ECDSA, tcId is 46 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5002_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5002_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5002_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5002 = { .name = "ecdsa_secp256k1_sha256_5002", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5002_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5002_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5002_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 46 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5003 for ECDSA, tcId is 47 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5003_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5003_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5003_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5003 = { .name = "ecdsa_secp256k1_sha256_5003", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5003_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5003_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5003_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 47 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5004 for ECDSA, tcId is 48 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5004_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5004_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5004_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5004 = { .name = "ecdsa_secp256k1_sha256_5004", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5004_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5004_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5004_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 48 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5005 for ECDSA, tcId is 49 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5005_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5005_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5005_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5005 = { .name = "ecdsa_secp256k1_sha256_5005", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5005_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5005_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5005_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 49 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5006 for ECDSA, tcId is 50 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5006_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5006_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5006_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5006 = { .name = "ecdsa_secp256k1_sha256_5006", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5006_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5006_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5006_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 50 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5007 for ECDSA, tcId is 51 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5007_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5007_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5007_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5007 = { .name = "ecdsa_secp256k1_sha256_5007", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5007_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5007_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5007_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 51 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5008 for ECDSA, tcId is 52 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5008_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5008_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5008_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5008 = { .name = "ecdsa_secp256k1_sha256_5008", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5008_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5008_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5008_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 52 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5009 for ECDSA, tcId is 53 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5009_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5009_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5009_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5009 = { .name = "ecdsa_secp256k1_sha256_5009", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5009_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5009_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5009_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 53 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5010 for ECDSA, tcId is 54 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5010_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5010_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5010_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5010 = { .name = "ecdsa_secp256k1_sha256_5010", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5010_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5010_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5010_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 54 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5011 for ECDSA, tcId is 55 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5011_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5011_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5011_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5011 = { .name = "ecdsa_secp256k1_sha256_5011", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5011_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5011_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5011_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 55 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5012 for ECDSA, tcId is 56 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5012_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5012_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5012_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5012 = { .name = "ecdsa_secp256k1_sha256_5012", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5012_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5012_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5012_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 56 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5013 for ECDSA, tcId is 57 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5013_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5013_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5013_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5013 = { .name = "ecdsa_secp256k1_sha256_5013", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5013_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5013_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5013_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 57 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5014 for ECDSA, tcId is 58 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5014_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5014_msg[] = { 0x32, 0x35, 0x35, 0x38, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5014_sig[] = { 0xdd, 0x1b, 0x7d, 0x09, 0xa7, 0xbd, 0x82, 0x18, 0x96, 0x10, 0x34, 0xa3, 0x9a, 0x87, 0xfe, 0xcf, 0x53, 0x14, 0xf0, 0x0c, 0x4d, 0x25, 0xeb, 0x58, 0xa0, 0x7a, 0xc8, 0x5e, 0x85, 0xea, 0xb5, 0x16, 0x35, 0x13, 0x8c, 0x40, 0x1e, 0xf8, 0xd3, 0x49, 0x3d, 0x65, 0xc9, 0x00, 0x2f, 0xe6, 0x2b, 0x43, 0xae, 0xe5, 0x68, 0x73, 0x1b, 0x74, 0x45, 0x48, 0x35, 0x89, 0x96, 0xd9, 0xcc, 0x42, 0x7e, 0x06, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5014 = { .name = "ecdsa_secp256k1_sha256_5014", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5014_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5014_msg, .msglen = 5, .sig = ecdsa_secp256k1_sha256_5014_sig, .siglen = 64, .result = 1, .comment = "Edge case for Shamir multiplication, tcId is 58 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5015 for ECDSA, tcId is 59 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5015_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5015_msg[] = { 0x34, 0x32, 0x36, 0x34, 0x37, 0x39, 0x37, 0x32, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5015_sig[] = { 0x95, 0xc2, 0x92, 0x67, 0xd9, 0x72, 0xa0, 0x43, 0xd9, 0x55, 0x22, 0x45, 0x46, 0x22, 0x2b, 0xba, 0x34, 0x3f, 0xc1, 0xd4, 0xdb, 0x0f, 0xec, 0x26, 0x2a, 0x33, 0xac, 0x61, 0x30, 0x56, 0x96, 0xae, 0x6e, 0xdf, 0xe9, 0x67, 0x13, 0xae, 0xd5, 0x6f, 0x8a, 0x28, 0xa6, 0x65, 0x3f, 0x57, 0xe0, 0xb8, 0x29, 0x71, 0x2e, 0x5e, 0xdd, 0xc6, 0x7f, 0x34, 0x68, 0x2b, 0x24, 0xf0, 0x67, 0x6b, 0x26, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5015 = { .name = "ecdsa_secp256k1_sha256_5015", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5015_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5015_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5015_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 59 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5016 for ECDSA, tcId is 60 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5016_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5016_msg[] = { 0x37, 0x31, 0x33, 0x38, 0x36, 0x38, 0x34, 0x38, 0x39, 0x31, }; static const unsigned char ecdsa_secp256k1_sha256_5016_sig[] = { 0x28, 0xf9, 0x4a, 0x89, 0x4e, 0x92, 0x02, 0x46, 0x99, 0xe3, 0x45, 0xfe, 0x66, 0x97, 0x1e, 0x3e, 0xdc, 0xd0, 0x50, 0x02, 0x33, 0x86, 0x13, 0x5a, 0xb3, 0x93, 0x9d, 0x55, 0x08, 0x98, 0xfb, 0x25, 0xcd, 0x69, 0xc1, 0xa4, 0x2b, 0xe0, 0x5a, 0x6e, 0xe1, 0x27, 0x0c, 0x82, 0x14, 0x79, 0x25, 0x1e, 0x13, 0x4c, 0x21, 0x85, 0x8d, 0x80, 0x0b, 0xda, 0x6f, 0x4e, 0x98, 0xb3, 0x71, 0x96, 0x23, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5016 = { .name = "ecdsa_secp256k1_sha256_5016", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5016_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5016_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5016_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 60 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5017 for ECDSA, tcId is 61 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5017_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5017_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x33, 0x33, 0x31, 0x36, 0x36, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5017_sig[] = { 0xbe, 0x26, 0xb1, 0x8f, 0x95, 0x49, 0xf8, 0x9f, 0x41, 0x1a, 0x9b, 0x52, 0x53, 0x6b, 0x15, 0xaa, 0x27, 0x0b, 0x84, 0x54, 0x8d, 0x0e, 0x85, 0x9a, 0x19, 0x52, 0xa2, 0x7a, 0xf1, 0xa7, 0x7a, 0xc6, 0x8f, 0x3e, 0x2b, 0x05, 0x63, 0x2f, 0xc3, 0x37, 0x15, 0x57, 0x2a, 0xf9, 0x12, 0x46, 0x81, 0x11, 0x3f, 0x2b, 0x84, 0x32, 0x5b, 0x80, 0x15, 0x4c, 0x04, 0x4a, 0x54, 0x4d, 0xc1, 0xa8, 0xfa, 0x12, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5017 = { .name = "ecdsa_secp256k1_sha256_5017", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5017_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5017_msg, .msglen = 11, .sig = ecdsa_secp256k1_sha256_5017_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 61 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5018 for ECDSA, tcId is 62 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5018_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5018_msg[] = { 0x33, 0x39, 0x34, 0x39, 0x34, 0x30, 0x31, 0x32, 0x31, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5018_sig[] = { 0xb1, 0xa4, 0xb1, 0x47, 0x8e, 0x65, 0xcc, 0x3e, 0xaf, 0xdf, 0x22, 0x5d, 0x12, 0x98, 0xb4, 0x3f, 0x2d, 0xa1, 0x9e, 0x4b, 0xcf, 0xf7, 0xea, 0xcc, 0x0a, 0x2e, 0x98, 0xcd, 0x4b, 0x74, 0xb1, 0x14, 0xe8, 0x65, 0x5c, 0xe1, 0xcf, 0xb3, 0x3e, 0xbd, 0x30, 0xaf, 0x8c, 0xe8, 0xe8, 0xae, 0x4d, 0x6f, 0x7b, 0x50, 0xcd, 0x3e, 0x22, 0xaf, 0x51, 0xbf, 0x69, 0xe0, 0xa2, 0x85, 0x17, 0x60, 0xd5, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5018 = { .name = "ecdsa_secp256k1_sha256_5018", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5018_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5018_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5018_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 62 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5019 for ECDSA, tcId is 63 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5019_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5019_msg[] = { 0x31, 0x33, 0x34, 0x34, 0x32, 0x39, 0x33, 0x30, 0x37, 0x39, }; static const unsigned char ecdsa_secp256k1_sha256_5019_sig[] = { 0x32, 0x53, 0x32, 0x02, 0x12, 0x61, 0xf1, 0xbd, 0x18, 0xf2, 0x71, 0x2a, 0xa1, 0xe2, 0x25, 0x2d, 0xa2, 0x37, 0x96, 0xda, 0x8a, 0x4b, 0x1f, 0xf6, 0xea, 0x18, 0xca, 0xfe, 0xc7, 0xe1, 0x71, 0xf2, 0x40, 0xb4, 0xf5, 0xe2, 0x87, 0xee, 0x61, 0xfc, 0x3c, 0x80, 0x41, 0x86, 0x98, 0x23, 0x60, 0x89, 0x1e, 0xaa, 0x35, 0xc7, 0x5f, 0x05, 0xa4, 0x3e, 0xcd, 0x48, 0xb3, 0x5d, 0x98, 0x4a, 0x66, 0x48, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5019 = { .name = "ecdsa_secp256k1_sha256_5019", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5019_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5019_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5019_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 63 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5020 for ECDSA, tcId is 64 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5020_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5020_msg[] = { 0x33, 0x37, 0x30, 0x36, 0x32, 0x31, 0x31, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_secp256k1_sha256_5020_sig[] = { 0xa2, 0x3a, 0xd1, 0x8d, 0x8f, 0xc6, 0x6d, 0x81, 0xaf, 0x09, 0x03, 0x89, 0x0c, 0xbd, 0x45, 0x3a, 0x55, 0x4c, 0xb0, 0x4c, 0xdc, 0x1a, 0x8c, 0xa7, 0xf7, 0xf7, 0x8e, 0x53, 0x67, 0xed, 0x88, 0xa0, 0xdc, 0x1c, 0x14, 0xd3, 0x1e, 0x3f, 0xb1, 0x58, 0xb7, 0x3c, 0x76, 0x42, 0x68, 0xc8, 0xb5, 0x55, 0x79, 0x73, 0x4a, 0x7e, 0x2a, 0x2c, 0x9b, 0x5e, 0xe5, 0xd9, 0xd0, 0x14, 0x4e, 0xf6, 0x52, 0xeb, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5020 = { .name = "ecdsa_secp256k1_sha256_5020", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5020_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5020_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5020_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 64 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5021 for ECDSA, tcId is 65 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5021_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5021_msg[] = { 0x33, 0x34, 0x33, 0x36, 0x38, 0x38, 0x37, 0x31, 0x32, }; static const unsigned char ecdsa_secp256k1_sha256_5021_sig[] = { 0x2b, 0xde, 0xa4, 0x1c, 0xda, 0x63, 0xa2, 0xd1, 0x4b, 0xf4, 0x73, 0x53, 0xbd, 0x20, 0x88, 0x0a, 0x69, 0x09, 0x01, 0xde, 0x7c, 0xd6, 0xe3, 0xcc, 0x6d, 0x8e, 0xd5, 0xba, 0x0c, 0xdb, 0x10, 0x91, 0xc3, 0x15, 0x99, 0x43, 0x30, 0x36, 0x06, 0x40, 0x73, 0x83, 0x5b, 0x1e, 0x3e, 0xba, 0x83, 0x35, 0xa6, 0x50, 0xc8, 0xfd, 0x78, 0x6f, 0x94, 0xfe, 0x23, 0x5a, 0xd7, 0xd4, 0x1d, 0xc9, 0x4c, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5021 = { .name = "ecdsa_secp256k1_sha256_5021", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5021_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5021_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5021_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 65 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5022 for ECDSA, tcId is 66 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5022_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5022_msg[] = { 0x31, 0x33, 0x35, 0x31, 0x35, 0x33, 0x30, 0x33, 0x37, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5022_sig[] = { 0xd7, 0xcd, 0x76, 0xec, 0x01, 0xc1, 0xb1, 0x07, 0x9e, 0xba, 0x9e, 0x2a, 0xa2, 0xa3, 0x97, 0x24, 0x3c, 0x47, 0x58, 0xc9, 0x8a, 0x1b, 0xa0, 0xb7, 0x40, 0x4a, 0x34, 0x0b, 0x9b, 0x00, 0xce, 0xd6, 0xca, 0x8a, 0xff, 0xe1, 0xe6, 0x26, 0xdd, 0x19, 0x21, 0x74, 0xc2, 0x93, 0x7b, 0x15, 0xbc, 0x48, 0xf7, 0x7b, 0x5b, 0xdf, 0xe0, 0x1f, 0x07, 0x3a, 0x8a, 0xea, 0xf7, 0xf2, 0x4d, 0xc6, 0xc8, 0x5b, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5022 = { .name = "ecdsa_secp256k1_sha256_5022", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5022_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5022_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5022_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 66 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5023 for ECDSA, tcId is 67 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5023_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5023_msg[] = { 0x36, 0x35, 0x35, 0x33, 0x32, 0x30, 0x33, 0x31, 0x32, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5023_sig[] = { 0xa8, 0x72, 0xc7, 0x44, 0xd9, 0x36, 0xdb, 0x21, 0xa1, 0x0c, 0x36, 0x1d, 0xd5, 0xc9, 0x06, 0x33, 0x55, 0xf8, 0x49, 0x02, 0x21, 0x96, 0x52, 0xf6, 0xfc, 0x56, 0xdc, 0x95, 0xa7, 0x13, 0x9d, 0x96, 0x40, 0x0d, 0xf7, 0x57, 0x5d, 0x97, 0x56, 0x21, 0x0e, 0x9c, 0xcc, 0x77, 0x16, 0x2c, 0x6b, 0x59, 0x3c, 0x77, 0x46, 0xcf, 0xb4, 0x8a, 0xc2, 0x63, 0xc4, 0x27, 0x50, 0xb4, 0x21, 0xef, 0x4b, 0xb9, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5023 = { .name = "ecdsa_secp256k1_sha256_5023", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5023_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5023_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5023_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 67 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5024 for ECDSA, tcId is 68 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5024_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5024_msg[] = { 0x31, 0x35, 0x36, 0x34, 0x33, 0x34, 0x36, 0x36, 0x30, 0x33, }; static const unsigned char ecdsa_secp256k1_sha256_5024_sig[] = { 0x9f, 0xa9, 0xaf, 0xe0, 0x77, 0x52, 0xda, 0x10, 0xb3, 0x6d, 0x3a, 0xfc, 0xd0, 0xfe, 0x44, 0xbf, 0xc4, 0x02, 0x44, 0xd7, 0x52, 0x03, 0x59, 0x9c, 0xf8, 0xf5, 0x04, 0x7f, 0xa3, 0x45, 0x38, 0x54, 0xaf, 0x1f, 0x58, 0x3f, 0xec, 0x40, 0x40, 0xae, 0x7e, 0x68, 0xc9, 0x68, 0xd2, 0xbb, 0x4b, 0x49, 0x4e, 0xec, 0x3a, 0x33, 0xed, 0xc7, 0xc0, 0xcc, 0xf9, 0x5f, 0x7f, 0x75, 0xbc, 0x25, 0x69, 0xc7, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5024 = { .name = "ecdsa_secp256k1_sha256_5024", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5024_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5024_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5024_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 68 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5025 for ECDSA, tcId is 69 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5025_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5025_msg[] = { 0x34, 0x34, 0x32, 0x39, 0x35, 0x33, 0x39, 0x31, 0x31, 0x37, }; static const unsigned char ecdsa_secp256k1_sha256_5025_sig[] = { 0x88, 0x56, 0x40, 0x38, 0x4d, 0x0d, 0x91, 0x0e, 0xfb, 0x17, 0x7b, 0x46, 0xbe, 0x6c, 0x3d, 0xc5, 0xca, 0xc8, 0x1f, 0x0b, 0x88, 0xc3, 0x19, 0x0b, 0xb6, 0xb5, 0xf9, 0x9c, 0x26, 0x41, 0xf2, 0x05, 0x73, 0x8e, 0xd9, 0xbf, 0xf1, 0x16, 0x30, 0x6d, 0x9c, 0xaa, 0x0f, 0x8f, 0xc6, 0x08, 0xbe, 0x24, 0x3e, 0x0b, 0x56, 0x77, 0x79, 0xd8, 0xda, 0xb0, 0x3e, 0x8e, 0x19, 0xd5, 0x53, 0xf1, 0xdc, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5025 = { .name = "ecdsa_secp256k1_sha256_5025", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5025_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5025_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5025_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 69 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5026 for ECDSA, tcId is 70 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5026_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5026_msg[] = { 0x31, 0x30, 0x39, 0x35, 0x33, 0x32, 0x36, 0x31, 0x33, 0x35, 0x31, }; static const unsigned char ecdsa_secp256k1_sha256_5026_sig[] = { 0x2d, 0x05, 0x1f, 0x91, 0xc5, 0xa9, 0xd4, 0x40, 0xc5, 0x67, 0x69, 0x85, 0x71, 0x04, 0x83, 0xbc, 0x4f, 0x1a, 0x6c, 0x61, 0x1b, 0x10, 0xc9, 0x5a, 0x2f, 0xf0, 0x36, 0x3d, 0x90, 0xc2, 0xa4, 0x58, 0x92, 0x20, 0x6b, 0x19, 0x04, 0x5a, 0x41, 0xa7, 0x97, 0xcc, 0x2f, 0x3a, 0xc3, 0x0d, 0xe9, 0x51, 0x81, 0x65, 0xe9, 0x6d, 0x5b, 0x86, 0x34, 0x1e, 0xcb, 0x3b, 0xcf, 0xf2, 0x31, 0xb3, 0xfd, 0x65, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5026 = { .name = "ecdsa_secp256k1_sha256_5026", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5026_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5026_msg, .msglen = 11, .sig = ecdsa_secp256k1_sha256_5026_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 70 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5027 for ECDSA, tcId is 71 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5027_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5027_msg[] = { 0x35, 0x39, 0x38, 0x37, 0x33, 0x35, 0x30, 0x30, 0x34, 0x31, }; static const unsigned char ecdsa_secp256k1_sha256_5027_sig[] = { 0xf3, 0xac, 0x25, 0x23, 0x96, 0x74, 0x82, 0xf5, 0x3d, 0x50, 0x85, 0x22, 0x71, 0x2d, 0x58, 0x3f, 0x43, 0x79, 0xcd, 0x82, 0x41, 0x01, 0xff, 0x63, 0x5e, 0xa0, 0x93, 0x51, 0x17, 0xba, 0xa5, 0x4f, 0x27, 0xf1, 0x08, 0x12, 0x22, 0x73, 0x97, 0xe0, 0x2c, 0xea, 0x96, 0xfb, 0x0e, 0x68, 0x07, 0x61, 0x63, 0x6d, 0xab, 0x2b, 0x08, 0x0d, 0x1f, 0xc5, 0xd1, 0x16, 0x85, 0xcb, 0xe8, 0x50, 0x0c, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5027 = { .name = "ecdsa_secp256k1_sha256_5027", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5027_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5027_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5027_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 71 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5028 for ECDSA, tcId is 72 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5028_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5028_msg[] = { 0x33, 0x34, 0x36, 0x33, 0x30, 0x30, 0x36, 0x38, 0x37, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5028_sig[] = { 0x96, 0x44, 0x7c, 0xf6, 0x8c, 0x3a, 0xb7, 0x26, 0x6e, 0xd7, 0x44, 0x7d, 0xe3, 0xac, 0x52, 0xfe, 0xd7, 0xcc, 0x08, 0xcb, 0xdf, 0xea, 0x39, 0x1c, 0x18, 0xa9, 0xb8, 0xab, 0x37, 0x0b, 0xc9, 0x13, 0xf0, 0xa1, 0x87, 0x8b, 0x2c, 0x53, 0xf1, 0x6e, 0x70, 0xfe, 0x37, 0x7a, 0x5e, 0x9c, 0x6e, 0x86, 0xf1, 0x8a, 0xe4, 0x80, 0xa2, 0x2b, 0xb4, 0x99, 0xf5, 0xb3, 0x2e, 0x71, 0x09, 0xc0, 0x73, 0x85, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5028 = { .name = "ecdsa_secp256k1_sha256_5028", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5028_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5028_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5028_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 72 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5029 for ECDSA, tcId is 73 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5029_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5029_msg[] = { 0x39, 0x38, 0x31, 0x37, 0x33, 0x32, 0x30, 0x32, 0x38, 0x37, }; static const unsigned char ecdsa_secp256k1_sha256_5029_sig[] = { 0x53, 0x0a, 0x08, 0x32, 0xb6, 0x91, 0xda, 0x0b, 0x56, 0x19, 0xa0, 0xb1, 0x1d, 0xe6, 0x87, 0x7f, 0x3c, 0x09, 0x71, 0xba, 0xaa, 0x68, 0xed, 0x12, 0x27, 0x58, 0xc2, 0x9c, 0xaa, 0xf4, 0x6b, 0x72, 0x93, 0x76, 0x1b, 0xb0, 0xa1, 0x4c, 0xcf, 0x9f, 0x15, 0xb4, 0xb9, 0xce, 0x73, 0xc6, 0xec, 0x70, 0x0b, 0xd0, 0x15, 0xb8, 0xcb, 0x1c, 0xfa, 0xc5, 0x68, 0x37, 0xf4, 0x46, 0x3f, 0x53, 0x07, 0x4e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5029 = { .name = "ecdsa_secp256k1_sha256_5029", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5029_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5029_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5029_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 73 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5030 for ECDSA, tcId is 74 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5030_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5030_msg[] = { 0x33, 0x32, 0x32, 0x32, 0x30, 0x34, 0x31, 0x30, 0x34, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5030_sig[] = { 0x9c, 0x54, 0xc2, 0x55, 0x00, 0xbd, 0xe0, 0xb9, 0x2d, 0x72, 0xd6, 0xec, 0x48, 0x3d, 0xc2, 0x48, 0x2f, 0x36, 0x54, 0x29, 0x4c, 0xa7, 0x4d, 0xe7, 0x96, 0xb6, 0x81, 0x25, 0x5e, 0xd5, 0x8a, 0x77, 0x98, 0x8b, 0xac, 0x39, 0x4a, 0x90, 0xad, 0x89, 0xce, 0x36, 0x09, 0x84, 0xc0, 0xc1, 0x49, 0xdc, 0xbd, 0x26, 0x84, 0xbb, 0x64, 0x49, 0x8a, 0xce, 0x90, 0xbc, 0xf6, 0xb6, 0xaf, 0x1c, 0x17, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5030 = { .name = "ecdsa_secp256k1_sha256_5030", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5030_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5030_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5030_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 74 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5031 for ECDSA, tcId is 75 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5031_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5031_msg[] = { 0x36, 0x36, 0x36, 0x36, 0x33, 0x30, 0x37, 0x31, 0x30, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5031_sig[] = { 0xe7, 0x90, 0x9d, 0x41, 0x43, 0x9e, 0x2f, 0x6a, 0xf2, 0x91, 0x36, 0xc7, 0x34, 0x8c, 0xa2, 0x64, 0x1a, 0x2b, 0x07, 0x0d, 0x5b, 0x64, 0xf9, 0x1e, 0xa9, 0xda, 0x70, 0x70, 0xc7, 0xa2, 0x61, 0x8b, 0x42, 0xd7, 0x82, 0xf1, 0x32, 0xfa, 0x1d, 0x36, 0xc2, 0xc8, 0x8b, 0xa2, 0x7c, 0x3d, 0x67, 0x8d, 0x80, 0x18, 0x4a, 0x5d, 0x1e, 0xcc, 0xac, 0x75, 0x01, 0xf0, 0xb4, 0x7e, 0x3d, 0x20, 0x50, 0x08, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5031 = { .name = "ecdsa_secp256k1_sha256_5031", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5031_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5031_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5031_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 75 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5032 for ECDSA, tcId is 76 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5032_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5032_msg[] = { 0x31, 0x30, 0x33, 0x35, 0x39, 0x35, 0x31, 0x38, 0x39, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5032_sig[] = { 0x59, 0x24, 0x87, 0x32, 0x09, 0x59, 0x31, 0x35, 0xa4, 0xc3, 0xda, 0x7b, 0xb3, 0x81, 0x22, 0x7f, 0x8a, 0x4b, 0x6a, 0xa9, 0xf3, 0x4f, 0xe5, 0xbb, 0x7f, 0x8f, 0xbc, 0x13, 0x1a, 0x03, 0x9f, 0xfe, 0xe0, 0xe4, 0x4e, 0xe4, 0xbb, 0xe3, 0x70, 0x15, 0x5b, 0xf0, 0xbb, 0xde, 0xc2, 0x65, 0xbf, 0x9f, 0xe3, 0x1c, 0x07, 0x46, 0xfa, 0xab, 0x44, 0x6d, 0xe6, 0x2e, 0x36, 0x31, 0xea, 0xcd, 0x11, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5032 = { .name = "ecdsa_secp256k1_sha256_5032", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5032_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5032_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5032_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 76 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5033 for ECDSA, tcId is 77 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5033_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5033_msg[] = { 0x31, 0x38, 0x34, 0x36, 0x35, 0x39, 0x37, 0x31, 0x39, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5033_sig[] = { 0xee, 0xb6, 0x92, 0xc9, 0xb2, 0x62, 0x96, 0x9b, 0x23, 0x1c, 0x38, 0xb5, 0xa7, 0xf6, 0x06, 0x49, 0xe0, 0xc8, 0x75, 0xcd, 0x64, 0xdf, 0x88, 0xf3, 0x3a, 0xa5, 0x71, 0xfa, 0x3d, 0x29, 0xab, 0x0e, 0x21, 0x8b, 0x3a, 0x1e, 0xb0, 0x63, 0x79, 0xc2, 0xc1, 0x8c, 0xf5, 0x1b, 0x06, 0x43, 0x07, 0x86, 0xd1, 0xc6, 0x4c, 0xd2, 0xd2, 0x4c, 0x9b, 0x23, 0x2b, 0x23, 0xe5, 0xba, 0xc7, 0x98, 0x9a, 0xcd, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5033 = { .name = "ecdsa_secp256k1_sha256_5033", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5033_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5033_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5033_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 77 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5034 for ECDSA, tcId is 78 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5034_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5034_msg[] = { 0x33, 0x31, 0x33, 0x36, 0x30, 0x34, 0x36, 0x31, 0x38, 0x39, }; static const unsigned char ecdsa_secp256k1_sha256_5034_sig[] = { 0xa4, 0x00, 0x34, 0x17, 0x7f, 0x36, 0x09, 0x1c, 0x2b, 0x65, 0x36, 0x84, 0xa0, 0xe3, 0xeb, 0x5d, 0x4b, 0xff, 0x18, 0xe4, 0xd0, 0x9f, 0x66, 0x4c, 0x28, 0x00, 0xe7, 0xca, 0xfd, 0xa1, 0xda, 0xf8, 0x3a, 0x3e, 0xc2, 0x98, 0x53, 0x70, 0x4e, 0x52, 0x03, 0x1c, 0x58, 0x92, 0x7a, 0x80, 0x0a, 0x96, 0x83, 0x53, 0xad, 0xc3, 0xd9, 0x73, 0xbe, 0xba, 0x91, 0x72, 0xcb, 0xbe, 0xab, 0x4d, 0xd1, 0x49, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5034 = { .name = "ecdsa_secp256k1_sha256_5034", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5034_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5034_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5034_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 78 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5035 for ECDSA, tcId is 79 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5035_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5035_msg[] = { 0x32, 0x36, 0x36, 0x33, 0x37, 0x38, 0x34, 0x32, 0x35, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5035_sig[] = { 0xb5, 0xd7, 0x95, 0xcc, 0x75, 0xce, 0xa5, 0xc4, 0x34, 0xfa, 0x41, 0x85, 0x18, 0x0c, 0xd6, 0xbd, 0x21, 0x22, 0x3f, 0x3d, 0x5a, 0x86, 0xda, 0x66, 0x70, 0xd7, 0x1d, 0x95, 0x68, 0x0d, 0xad, 0xbf, 0xab, 0x1b, 0x27, 0x7e, 0xf5, 0xff, 0xe1, 0x34, 0x46, 0x08, 0x35, 0xe3, 0xd1, 0x40, 0x24, 0x61, 0xba, 0x10, 0x4c, 0xb5, 0x0b, 0x16, 0xf3, 0x97, 0xfd, 0xc7, 0xa9, 0xab, 0xfe, 0xfe, 0xf2, 0x80, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5035 = { .name = "ecdsa_secp256k1_sha256_5035", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5035_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5035_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5035_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 79 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5036 for ECDSA, tcId is 80 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5036_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5036_msg[] = { 0x31, 0x36, 0x35, 0x32, 0x31, 0x30, 0x30, 0x35, 0x32, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5036_sig[] = { 0x07, 0xdc, 0x24, 0x78, 0xd4, 0x3c, 0x12, 0x32, 0xa4, 0x59, 0x56, 0x08, 0xc6, 0x44, 0x26, 0xc3, 0x55, 0x10, 0x05, 0x1a, 0x63, 0x1a, 0xe6, 0xa5, 0xa6, 0xeb, 0x11, 0x61, 0xe5, 0x7e, 0x42, 0xe1, 0x4a, 0x59, 0xea, 0x0f, 0xdb, 0x72, 0xd1, 0x21, 0x65, 0xce, 0xa3, 0xbf, 0x1c, 0xa8, 0x6b, 0xa9, 0x75, 0x17, 0xbd, 0x18, 0x8d, 0xb3, 0xdb, 0xd2, 0x1a, 0x5a, 0x15, 0x78, 0x50, 0x02, 0x19, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5036 = { .name = "ecdsa_secp256k1_sha256_5036", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5036_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5036_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5036_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 80 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5037 for ECDSA, tcId is 81 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5037_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5037_msg[] = { 0x35, 0x37, 0x34, 0x38, 0x30, 0x38, 0x31, 0x36, 0x39, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5037_sig[] = { 0xdd, 0xd2, 0x0c, 0x4a, 0x05, 0x59, 0x6c, 0xa8, 0x68, 0xb5, 0x58, 0x83, 0x9f, 0xce, 0x9f, 0x65, 0x11, 0xdd, 0xd8, 0x3d, 0x1c, 0xcb, 0x53, 0xf8, 0x2e, 0x52, 0x69, 0xd5, 0x59, 0xa0, 0x15, 0x52, 0xa4, 0x6e, 0x8c, 0xb8, 0xd6, 0x26, 0xcf, 0x6c, 0x00, 0xdd, 0xed, 0xc3, 0xb5, 0xda, 0x7e, 0x61, 0x3a, 0xc3, 0x76, 0x44, 0x5e, 0xe2, 0x60, 0x74, 0x3f, 0x06, 0xf7, 0x90, 0x54, 0xc7, 0xd4, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5037 = { .name = "ecdsa_secp256k1_sha256_5037", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5037_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5037_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5037_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 81 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5038 for ECDSA, tcId is 82 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5038_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5038_msg[] = { 0x36, 0x33, 0x34, 0x33, 0x39, 0x31, 0x33, 0x34, 0x36, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5038_sig[] = { 0x9c, 0xde, 0x6e, 0x0e, 0xde, 0x0a, 0x00, 0x3f, 0x02, 0xfd, 0xa0, 0xa0, 0x1b, 0x59, 0xfa, 0xcf, 0xe5, 0xde, 0xc0, 0x63, 0x31, 0x8f, 0x27, 0x9c, 0xe2, 0xde, 0x7a, 0x9b, 0x10, 0x62, 0xf7, 0xb7, 0x28, 0x86, 0xa5, 0xb8, 0xc6, 0x79, 0xbd, 0xf8, 0x22, 0x4c, 0x66, 0xf9, 0x08, 0xfd, 0x62, 0x05, 0x49, 0x2c, 0xb7, 0x0b, 0x00, 0x68, 0xd4, 0x6a, 0xe4, 0xf3, 0x3a, 0x41, 0x49, 0xb1, 0x2a, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5038 = { .name = "ecdsa_secp256k1_sha256_5038", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5038_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5038_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5038_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 82 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5039 for ECDSA, tcId is 83 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5039_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5039_msg[] = { 0x31, 0x35, 0x34, 0x31, 0x31, 0x30, 0x33, 0x35, 0x39, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5039_sig[] = { 0xc5, 0x77, 0x10, 0x16, 0xd0, 0xdd, 0x63, 0x57, 0x14, 0x3c, 0x89, 0xf6, 0x84, 0xcd, 0x74, 0x04, 0x23, 0x50, 0x25, 0x54, 0xc0, 0xc5, 0x9a, 0xa8, 0xc9, 0x95, 0x84, 0xf1, 0xff, 0x38, 0xf6, 0x09, 0xab, 0x4b, 0xfa, 0x0b, 0xb8, 0x8a, 0xb9, 0x97, 0x91, 0xb9, 0xb3, 0xab, 0x9c, 0x4b, 0x02, 0xbd, 0x2a, 0x57, 0xae, 0x8d, 0xde, 0x50, 0xb9, 0x06, 0x40, 0x63, 0xfc, 0xf8, 0x53, 0x15, 0xcf, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5039 = { .name = "ecdsa_secp256k1_sha256_5039", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5039_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5039_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5039_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 83 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5040 for ECDSA, tcId is 84 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5040_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5040_msg[] = { 0x31, 0x30, 0x34, 0x37, 0x38, 0x35, 0x38, 0x30, 0x31, 0x32, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5040_sig[] = { 0xa2, 0x4e, 0xbc, 0x0e, 0xc2, 0x24, 0xbd, 0x67, 0xae, 0x39, 0x7c, 0xbe, 0x6f, 0xa3, 0x7b, 0x31, 0x25, 0xad, 0xbd, 0x34, 0x89, 0x1a, 0xbe, 0x2d, 0x7c, 0x73, 0x56, 0x92, 0x19, 0x16, 0xdf, 0xe6, 0x34, 0xf6, 0xeb, 0x63, 0x74, 0x73, 0x1b, 0xbb, 0xaf, 0xc4, 0x92, 0x4f, 0xb8, 0xb0, 0xbd, 0xcd, 0xda, 0x49, 0x45, 0x6d, 0x72, 0x4c, 0xda, 0xe6, 0x17, 0x8d, 0x87, 0x01, 0x4c, 0xb5, 0x3d, 0x8c, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5040 = { .name = "ecdsa_secp256k1_sha256_5040", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5040_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5040_msg, .msglen = 11, .sig = ecdsa_secp256k1_sha256_5040_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 84 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5041 for ECDSA, tcId is 85 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5041_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5041_msg[] = { 0x31, 0x30, 0x35, 0x33, 0x36, 0x32, 0x38, 0x35, 0x35, 0x36, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5041_sig[] = { 0x25, 0x57, 0xd6, 0x4a, 0x7a, 0xee, 0x2e, 0x09, 0x31, 0xc0, 0x12, 0xe4, 0xfe, 0xa1, 0xcd, 0x3a, 0x2c, 0x33, 0x4e, 0xda, 0xe6, 0x8c, 0xde, 0xb7, 0x15, 0x8c, 0xaf, 0x21, 0xb6, 0x8e, 0x5a, 0x24, 0x80, 0xf9, 0x32, 0x44, 0x95, 0x6f, 0xfd, 0xc5, 0x68, 0xc7, 0x7d, 0x12, 0x68, 0x4f, 0x7f, 0x00, 0x4f, 0xa9, 0x2d, 0xa7, 0xe6, 0x0a, 0xe9, 0x4a, 0x1b, 0x98, 0xc4, 0x22, 0xe2, 0x3e, 0xda, 0x34, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5041 = { .name = "ecdsa_secp256k1_sha256_5041", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5041_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5041_msg, .msglen = 11, .sig = ecdsa_secp256k1_sha256_5041_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 85 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5042 for ECDSA, tcId is 86 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5042_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5042_msg[] = { 0x39, 0x35, 0x33, 0x39, 0x30, 0x34, 0x31, 0x30, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5042_sig[] = { 0xc4, 0xf2, 0xec, 0xcb, 0xb6, 0xa2, 0x43, 0x50, 0xc8, 0x46, 0x64, 0x50, 0xb9, 0xd6, 0x1b, 0x20, 0x7e, 0xe3, 0x59, 0xe0, 0x37, 0xb3, 0xdc, 0xed, 0xb4, 0x2a, 0x3f, 0x2e, 0x6d, 0xd6, 0xae, 0xb5, 0xcd, 0x9c, 0x39, 0x4a, 0x65, 0xd0, 0xaa, 0x32, 0x2e, 0x39, 0x1e, 0xb7, 0x6b, 0x2a, 0x1a, 0x68, 0x7f, 0x86, 0x20, 0xa8, 0x8a, 0xde, 0xf3, 0xa0, 0x1e, 0xb8, 0xe4, 0xfb, 0x05, 0xb6, 0x47, 0x7a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5042 = { .name = "ecdsa_secp256k1_sha256_5042", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5042_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5042_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5042_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 86 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5043 for ECDSA, tcId is 87 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5043_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5043_msg[] = { 0x39, 0x37, 0x38, 0x38, 0x34, 0x38, 0x30, 0x33, 0x39, }; static const unsigned char ecdsa_secp256k1_sha256_5043_sig[] = { 0xef, 0xf0, 0x47, 0x81, 0xc9, 0xcb, 0xcd, 0x16, 0x2d, 0x0a, 0x25, 0xa6, 0xe2, 0xeb, 0xcc, 0xa4, 0x35, 0x06, 0xc5, 0x23, 0x38, 0x5c, 0xb5, 0x15, 0xd4, 0x9e, 0xa3, 0x8a, 0x1b, 0x12, 0xfc, 0xad, 0xea, 0x53, 0x28, 0xce, 0x6b, 0x36, 0xe5, 0x6a, 0xb8, 0x7a, 0xcb, 0x0d, 0xcf, 0xea, 0x49, 0x8b, 0xce, 0xc1, 0xbb, 0xa8, 0x6a, 0x06, 0x52, 0x68, 0xf6, 0xef, 0xf3, 0xc4, 0x1c, 0x4b, 0x0c, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5043 = { .name = "ecdsa_secp256k1_sha256_5043", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5043_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5043_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5043_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 87 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5044 for ECDSA, tcId is 88 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5044_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5044_msg[] = { 0x33, 0x36, 0x31, 0x30, 0x36, 0x37, 0x32, 0x34, 0x34, 0x32, }; static const unsigned char ecdsa_secp256k1_sha256_5044_sig[] = { 0xf5, 0x8b, 0x4e, 0x31, 0x10, 0xa6, 0x4b, 0xf1, 0xb5, 0xdb, 0x97, 0x63, 0x9e, 0xe0, 0xe5, 0xa9, 0xc8, 0xdf, 0xa4, 0x9d, 0xc5, 0x9b, 0x67, 0x98, 0x91, 0xf5, 0x20, 0xfd, 0xf0, 0x58, 0x4c, 0x87, 0xd3, 0x27, 0x01, 0xae, 0x77, 0x75, 0x11, 0x62, 0x4c, 0x1f, 0x8a, 0xbb, 0xf0, 0x2b, 0x24, 0x8b, 0x04, 0xe7, 0xa9, 0xeb, 0x27, 0x93, 0x8f, 0x52, 0x4f, 0x3e, 0x88, 0x28, 0xba, 0x40, 0x16, 0x4a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5044 = { .name = "ecdsa_secp256k1_sha256_5044", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5044_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5044_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5044_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 88 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5045 for ECDSA, tcId is 89 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5045_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5045_msg[] = { 0x31, 0x30, 0x35, 0x34, 0x32, 0x34, 0x30, 0x37, 0x30, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5045_sig[] = { 0xf8, 0xab, 0xec, 0xaa, 0x4f, 0x0c, 0x50, 0x2d, 0xe4, 0xbf, 0x59, 0x03, 0xd4, 0x84, 0x17, 0xf7, 0x86, 0xbf, 0x92, 0xe8, 0xad, 0x72, 0xfe, 0xc0, 0xbd, 0x7f, 0xcb, 0x78, 0x00, 0xc0, 0xbb, 0xe3, 0x4c, 0x7f, 0x9e, 0x23, 0x10, 0x76, 0xa3, 0x0b, 0x7a, 0xe3, 0x6b, 0x0c, 0xeb, 0xe6, 0x9c, 0xce, 0xf1, 0xcd, 0x19, 0x4f, 0x7c, 0xce, 0x93, 0xa5, 0x58, 0x8f, 0xd6, 0x81, 0x4f, 0x43, 0x7c, 0x0e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5045 = { .name = "ecdsa_secp256k1_sha256_5045", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5045_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5045_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5045_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 89 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5046 for ECDSA, tcId is 90 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5046_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5046_msg[] = { 0x35, 0x31, 0x37, 0x34, 0x34, 0x34, 0x38, 0x31, 0x39, 0x37, }; static const unsigned char ecdsa_secp256k1_sha256_5046_sig[] = { 0x5d, 0x5b, 0x38, 0xbd, 0x37, 0xad, 0x49, 0x8b, 0x22, 0x27, 0xa6, 0x33, 0x26, 0x8a, 0x8c, 0xca, 0x87, 0x9a, 0x5c, 0x7c, 0x94, 0xa4, 0xe4, 0x16, 0xbd, 0x0a, 0x61, 0x4d, 0x09, 0xe6, 0x06, 0xd2, 0x12, 0xb8, 0xd6, 0x64, 0xea, 0x99, 0x91, 0x06, 0x2e, 0xcb, 0xb8, 0x34, 0xe5, 0x84, 0x00, 0xe2, 0x5c, 0x46, 0x00, 0x7a, 0xf8, 0x4f, 0x60, 0x07, 0xd7, 0xf1, 0x68, 0x54, 0x43, 0x26, 0x9a, 0xfe, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5046 = { .name = "ecdsa_secp256k1_sha256_5046", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5046_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5046_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5046_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 90 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5047 for ECDSA, tcId is 91 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5047_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5047_msg[] = { 0x31, 0x39, 0x36, 0x37, 0x35, 0x36, 0x31, 0x32, 0x35, 0x31, }; static const unsigned char ecdsa_secp256k1_sha256_5047_sig[] = { 0x0c, 0x1c, 0xd9, 0xfe, 0x40, 0x34, 0xf0, 0x86, 0xa2, 0xb5, 0x2d, 0x65, 0xb9, 0xd3, 0x83, 0x4d, 0x72, 0xae, 0xbe, 0x7f, 0x33, 0xdf, 0xe8, 0xf9, 0x76, 0xda, 0x82, 0x64, 0x81, 0x77, 0xd8, 0xe3, 0x13, 0x10, 0x57, 0x82, 0xe3, 0xd0, 0xcf, 0xe8, 0x5c, 0x27, 0x78, 0xde, 0xc1, 0xa8, 0x48, 0xb2, 0x7a, 0xc0, 0xae, 0x07, 0x1a, 0xa6, 0xda, 0x34, 0x1a, 0x95, 0x53, 0xa9, 0x46, 0xb4, 0x1e, 0x59, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5047 = { .name = "ecdsa_secp256k1_sha256_5047", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5047_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5047_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5047_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 91 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5048 for ECDSA, tcId is 92 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5048_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5048_msg[] = { 0x33, 0x34, 0x34, 0x37, 0x32, 0x35, 0x33, 0x33, 0x34, 0x33, }; static const unsigned char ecdsa_secp256k1_sha256_5048_sig[] = { 0xae, 0x79, 0x35, 0xfb, 0x96, 0xff, 0x24, 0x6b, 0x7b, 0x5d, 0x56, 0x62, 0x87, 0x0d, 0x1b, 0xa5, 0x87, 0xb0, 0x3d, 0x6e, 0x13, 0x60, 0xba, 0xf4, 0x79, 0x88, 0xb5, 0xc0, 0x2c, 0xcc, 0x1a, 0x5b, 0x5f, 0x00, 0xc3, 0x23, 0x27, 0x20, 0x83, 0x78, 0x2d, 0x4a, 0x59, 0xf2, 0xdf, 0xd6, 0x5e, 0x49, 0xde, 0x06, 0x93, 0x62, 0x70, 0x16, 0x90, 0x0e, 0xf7, 0xe6, 0x14, 0x28, 0x05, 0x66, 0x64, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5048 = { .name = "ecdsa_secp256k1_sha256_5048", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5048_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5048_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5048_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 92 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5049 for ECDSA, tcId is 93 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5049_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5049_msg[] = { 0x33, 0x36, 0x38, 0x32, 0x36, 0x34, 0x33, 0x31, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5049_sig[] = { 0x00, 0xa1, 0x34, 0xb5, 0xc6, 0xcc, 0xbc, 0xef, 0xd4, 0xc8, 0x82, 0xb9, 0x45, 0xba, 0xeb, 0x49, 0x33, 0x44, 0x41, 0x72, 0x79, 0x5f, 0xa6, 0x79, 0x6a, 0xae, 0x14, 0x90, 0x67, 0x54, 0x70, 0x98, 0xa9, 0x91, 0xb9, 0xef, 0xa2, 0xdb, 0x27, 0x6f, 0xea, 0xe1, 0xc1, 0x15, 0xc1, 0x40, 0x77, 0x09, 0x01, 0x83, 0x9d, 0x87, 0xe6, 0x0e, 0x7e, 0xc4, 0x5a, 0x2b, 0x81, 0xcf, 0x3b, 0x43, 0x7b, 0xe6, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5049 = { .name = "ecdsa_secp256k1_sha256_5049", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5049_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5049_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5049_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 93 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5050 for ECDSA, tcId is 94 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5050_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5050_msg[] = { 0x33, 0x32, 0x36, 0x31, 0x31, 0x39, 0x38, 0x36, 0x30, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5050_sig[] = { 0x2e, 0x47, 0x21, 0x36, 0x3a, 0xd3, 0x99, 0x2c, 0x13, 0x9e, 0x5a, 0x1c, 0x26, 0x39, 0x5d, 0x2c, 0x2d, 0x77, 0x78, 0x24, 0xaa, 0x24, 0xfd, 0xe0, 0x75, 0xe0, 0xd7, 0x38, 0x11, 0x71, 0x30, 0x9d, 0x8b, 0xf0, 0x83, 0xb6, 0xbb, 0xe7, 0x1e, 0xcf, 0xf2, 0x2b, 0xae, 0xd0, 0x87, 0xd5, 0xa7, 0x7e, 0xae, 0xaf, 0x72, 0x6b, 0xf1, 0x4a, 0xce, 0x2c, 0x03, 0xfd, 0x6e, 0x37, 0xba, 0x6c, 0x26, 0xf2, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5050 = { .name = "ecdsa_secp256k1_sha256_5050", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5050_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5050_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5050_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 94 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5051 for ECDSA, tcId is 95 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5051_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5051_msg[] = { 0x39, 0x36, 0x37, 0x38, 0x37, 0x38, 0x31, 0x30, 0x39, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5051_sig[] = { 0x68, 0x52, 0xe9, 0xd3, 0xcd, 0x9f, 0xe3, 0x73, 0xc2, 0xd5, 0x04, 0x87, 0x79, 0x67, 0xd3, 0x65, 0xab, 0x14, 0x56, 0x70, 0x7b, 0x68, 0x17, 0xa0, 0x42, 0x86, 0x46, 0x94, 0xe1, 0x96, 0x0c, 0xcf, 0xf9, 0xb4, 0xd8, 0x15, 0xeb, 0xd4, 0xcf, 0x77, 0x84, 0x7b, 0x37, 0x95, 0x23, 0x34, 0xd0, 0x5b, 0x20, 0x45, 0xcb, 0x39, 0x8d, 0x4c, 0x21, 0xba, 0x20, 0x79, 0x22, 0xa7, 0xa4, 0x71, 0x4d, 0x84, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5051 = { .name = "ecdsa_secp256k1_sha256_5051", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5051_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5051_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5051_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 95 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5052 for ECDSA, tcId is 96 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5052_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5052_msg[] = { 0x34, 0x39, 0x35, 0x38, 0x38, 0x32, 0x33, 0x38, 0x32, 0x33, }; static const unsigned char ecdsa_secp256k1_sha256_5052_sig[] = { 0x18, 0x8a, 0x8c, 0x56, 0x48, 0xdc, 0x79, 0xea, 0xce, 0x15, 0x8c, 0xf8, 0x86, 0xc6, 0x2b, 0x54, 0x68, 0xf0, 0x5f, 0xd9, 0x5f, 0x03, 0xa7, 0x63, 0x5c, 0x5b, 0x4c, 0x31, 0xf0, 0x9a, 0xf4, 0xc5, 0x36, 0x36, 0x1a, 0x0b, 0x57, 0x1a, 0x00, 0xc6, 0xcd, 0x5e, 0x68, 0x6c, 0xcb, 0xfc, 0xfa, 0x70, 0x3c, 0x4f, 0x97, 0xe4, 0x89, 0x38, 0x34, 0x6d, 0x0c, 0x10, 0x3f, 0xdc, 0x76, 0xdc, 0x58, 0x67, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5052 = { .name = "ecdsa_secp256k1_sha256_5052", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5052_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5052_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5052_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 96 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5053 for ECDSA, tcId is 97 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5053_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5053_msg[] = { 0x38, 0x32, 0x34, 0x36, 0x33, 0x37, 0x38, 0x33, 0x37, }; static const unsigned char ecdsa_secp256k1_sha256_5053_sig[] = { 0xa7, 0x4f, 0x1f, 0xb9, 0xa8, 0x26, 0x3f, 0x62, 0xfc, 0x44, 0x16, 0xa5, 0xb7, 0xd5, 0x84, 0xf4, 0x20, 0x6f, 0x39, 0x96, 0xbb, 0x91, 0xf6, 0xfc, 0x8e, 0x73, 0xb9, 0xe9, 0x2b, 0xad, 0x0e, 0x13, 0x68, 0x15, 0x03, 0x2e, 0x8c, 0x7d, 0x76, 0xc3, 0xab, 0x06, 0xa8, 0x6f, 0x33, 0x24, 0x9c, 0xe9, 0x94, 0x01, 0x48, 0xcb, 0x36, 0xd1, 0xf4, 0x17, 0xc2, 0xe9, 0x92, 0xe8, 0x01, 0xaf, 0xa3, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5053 = { .name = "ecdsa_secp256k1_sha256_5053", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5053_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5053_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5053_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 97 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5054 for ECDSA, tcId is 98 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5054_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5054_msg[] = { 0x31, 0x31, 0x30, 0x32, 0x30, 0x38, 0x33, 0x33, 0x37, 0x37, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5054_sig[] = { 0x07, 0x24, 0x48, 0x65, 0xb7, 0x2f, 0xf3, 0x7e, 0x62, 0xe3, 0x14, 0x6f, 0x0d, 0xc1, 0x46, 0x82, 0xba, 0xdd, 0x71, 0x97, 0x79, 0x91, 0x35, 0xf0, 0xb0, 0x0a, 0xde, 0x76, 0x71, 0x74, 0x2b, 0xfe, 0xf2, 0x7f, 0x3d, 0xdc, 0x71, 0x24, 0xb1, 0xb5, 0x85, 0x79, 0x57, 0x3a, 0x83, 0x56, 0x50, 0xe7, 0xa8, 0xba, 0xd5, 0xee, 0xb9, 0x6e, 0x9d, 0xa2, 0x15, 0xcd, 0x7b, 0xf9, 0xa2, 0xa0, 0x39, 0xed, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5054 = { .name = "ecdsa_secp256k1_sha256_5054", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5054_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5054_msg, .msglen = 11, .sig = ecdsa_secp256k1_sha256_5054_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 98 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5055 for ECDSA, tcId is 99 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5055_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5055_msg[] = { 0x31, 0x33, 0x33, 0x38, 0x37, 0x31, 0x36, 0x34, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5055_sig[] = { 0xda, 0x7f, 0xdd, 0x05, 0xb5, 0xba, 0xda, 0xbd, 0x61, 0x9d, 0x80, 0x5c, 0x4e, 0xe7, 0xd9, 0xa8, 0x4f, 0x84, 0xdd, 0xd5, 0xcf, 0x9c, 0x5b, 0xf4, 0xd4, 0x33, 0x81, 0x40, 0xd6, 0x89, 0xef, 0x08, 0x28, 0xf1, 0xcf, 0x4f, 0xa1, 0xc3, 0xc5, 0x86, 0x2c, 0xfa, 0x14, 0x9c, 0x00, 0x13, 0xcf, 0x5f, 0xe6, 0xcf, 0x50, 0x76, 0xca, 0xe0, 0x00, 0x51, 0x10, 0x63, 0xe7, 0xde, 0x25, 0xbb, 0x38, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5055 = { .name = "ecdsa_secp256k1_sha256_5055", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5055_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5055_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5055_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 99 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5056 for ECDSA, tcId is 100 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5056_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5056_msg[] = { 0x33, 0x32, 0x32, 0x31, 0x34, 0x34, 0x31, 0x36, 0x32, }; static const unsigned char ecdsa_secp256k1_sha256_5056_sig[] = { 0xd3, 0x02, 0x7c, 0x65, 0x6f, 0x6d, 0x4f, 0xdf, 0xd8, 0xed, 0xe2, 0x20, 0x93, 0xe3, 0xc3, 0x03, 0xb0, 0x13, 0x3c, 0x34, 0x0d, 0x61, 0x5e, 0x77, 0x56, 0xf6, 0x25, 0x3a, 0xea, 0x92, 0x72, 0x38, 0xf6, 0x51, 0x0f, 0x9f, 0x37, 0x1b, 0x31, 0x06, 0x8d, 0x68, 0xbf, 0xee, 0xaa, 0x72, 0x0e, 0xb9, 0xbb, 0xdc, 0x80, 0x40, 0x14, 0x5f, 0xcf, 0x88, 0xd4, 0xe0, 0xb5, 0x8d, 0xe0, 0x77, 0x7d, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5056 = { .name = "ecdsa_secp256k1_sha256_5056", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5056_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5056_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5056_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 100 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5057 for ECDSA, tcId is 101 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5057_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5057_msg[] = { 0x31, 0x30, 0x36, 0x38, 0x36, 0x36, 0x35, 0x35, 0x35, 0x34, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5057_sig[] = { 0x0b, 0xf6, 0xc0, 0x18, 0x8d, 0xc9, 0x57, 0x1c, 0xd0, 0xe2, 0x1e, 0xec, 0xac, 0x5f, 0xbb, 0x19, 0xd2, 0x43, 0x49, 0x88, 0xe9, 0xcc, 0x10, 0x24, 0x45, 0x93, 0xef, 0x3a, 0x98, 0x09, 0x9f, 0x69, 0x48, 0x64, 0xa5, 0x62, 0x66, 0x1f, 0x92, 0x21, 0xec, 0x88, 0xe3, 0xdd, 0x0b, 0xc2, 0xf6, 0xe2, 0x7a, 0xc1, 0x28, 0xc3, 0x0c, 0xc1, 0xa8, 0x0f, 0x79, 0xec, 0x67, 0x0a, 0x22, 0xb0, 0x42, 0xee, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5057 = { .name = "ecdsa_secp256k1_sha256_5057", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5057_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5057_msg, .msglen = 11, .sig = ecdsa_secp256k1_sha256_5057_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 101 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5058 for ECDSA, tcId is 102 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5058_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5058_msg[] = { 0x36, 0x32, 0x31, 0x35, 0x35, 0x32, 0x34, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5058_sig[] = { 0xae, 0x45, 0x96, 0x40, 0xd5, 0xd1, 0x17, 0x9b, 0xe4, 0x7a, 0x47, 0xfa, 0x53, 0x8e, 0x16, 0xd9, 0x4d, 0xde, 0xa5, 0x58, 0x5e, 0x7a, 0x24, 0x48, 0x04, 0xa5, 0x17, 0x42, 0xc6, 0x86, 0x44, 0x3a, 0x6c, 0x8e, 0x30, 0xe5, 0x30, 0xa6, 0x34, 0xfa, 0xe8, 0x0b, 0x3c, 0xeb, 0x06, 0x29, 0x78, 0xb3, 0x9e, 0xdb, 0xe1, 0x97, 0x77, 0xe0, 0xa2, 0x45, 0x53, 0xb6, 0x88, 0x86, 0x18, 0x1f, 0xd8, 0x97, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5058 = { .name = "ecdsa_secp256k1_sha256_5058", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5058_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5058_msg, .msglen = 8, .sig = ecdsa_secp256k1_sha256_5058_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 102 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5059 for ECDSA, tcId is 103 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5059_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5059_msg[] = { 0x37, 0x30, 0x33, 0x30, 0x38, 0x31, 0x38, 0x37, 0x37, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5059_sig[] = { 0x1c, 0xf3, 0x51, 0x7b, 0xa3, 0xbf, 0x2a, 0xb8, 0xb9, 0xea, 0xd4, 0xeb, 0xb6, 0xe8, 0x66, 0xcb, 0x88, 0xa1, 0xde, 0xac, 0xb6, 0xa7, 0x85, 0xd3, 0xb6, 0x3b, 0x48, 0x3c, 0xa0, 0x2a, 0xc4, 0x95, 0x24, 0x9a, 0x79, 0x8b, 0x73, 0x60, 0x6f, 0x55, 0xf5, 0xf1, 0xc7, 0x0d, 0xe6, 0x7c, 0xb1, 0xa0, 0xcf, 0xf9, 0x5d, 0x7d, 0xc5, 0x0b, 0x3a, 0x61, 0x7d, 0xf8, 0x61, 0xba, 0xd3, 0xc6, 0xb1, 0xc9, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5059 = { .name = "ecdsa_secp256k1_sha256_5059", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5059_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5059_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5059_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 103 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5060 for ECDSA, tcId is 104 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5060_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5060_msg[] = { 0x35, 0x39, 0x32, 0x34, 0x35, 0x32, 0x33, 0x37, 0x34, 0x34, }; static const unsigned char ecdsa_secp256k1_sha256_5060_sig[] = { 0xe6, 0x9b, 0x52, 0x38, 0x26, 0x5e, 0xa3, 0x5d, 0x77, 0xe4, 0xdd, 0x17, 0x22, 0x88, 0xd8, 0xce, 0xa1, 0x98, 0x10, 0xa1, 0x02, 0x92, 0x61, 0x7d, 0x59, 0x76, 0x51, 0x9d, 0xc5, 0x75, 0x7c, 0xb8, 0x4b, 0x03, 0xc5, 0xbc, 0x47, 0xe8, 0x26, 0xbd, 0xb2, 0x73, 0x28, 0xab, 0xd3, 0x8d, 0x30, 0x56, 0xd7, 0x74, 0x76, 0xb2, 0x13, 0x0f, 0x3d, 0xf6, 0xec, 0x48, 0x91, 0xaf, 0x08, 0xba, 0x1e, 0x29, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5060 = { .name = "ecdsa_secp256k1_sha256_5060", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5060_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5060_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5060_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 104 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5061 for ECDSA, tcId is 105 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5061_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5061_msg[] = { 0x31, 0x34, 0x39, 0x35, 0x35, 0x38, 0x36, 0x36, 0x32, 0x31, }; static const unsigned char ecdsa_secp256k1_sha256_5061_sig[] = { 0x5f, 0x9d, 0x7d, 0x7c, 0x87, 0x0d, 0x08, 0x5f, 0xc1, 0xd4, 0x9f, 0xff, 0x69, 0xe4, 0xa2, 0x75, 0x81, 0x28, 0x00, 0xd2, 0xcf, 0x89, 0x73, 0xe7, 0x32, 0x58, 0x66, 0xcb, 0x40, 0xfa, 0x2b, 0x6f, 0x6d, 0x1f, 0x54, 0x91, 0xd9, 0xf7, 0x17, 0xa5, 0x97, 0xa1, 0x5f, 0xd5, 0x40, 0x40, 0x64, 0x86, 0xd7, 0x6a, 0x44, 0x69, 0x7b, 0x3f, 0x0d, 0x9d, 0x6d, 0xce, 0xf6, 0x66, 0x9f, 0x8a, 0x0a, 0x56, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5061 = { .name = "ecdsa_secp256k1_sha256_5061", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5061_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5061_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5061_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 105 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5062 for ECDSA, tcId is 106 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5062_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5062_msg[] = { 0x34, 0x30, 0x30, 0x35, 0x33, 0x31, 0x34, 0x34, 0x30, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5062_sig[] = { 0x0a, 0x7d, 0x5b, 0x19, 0x59, 0xf7, 0x1d, 0xf9, 0xf8, 0x17, 0x14, 0x6e, 0xe4, 0x9b, 0xd5, 0xc8, 0x9b, 0x43, 0x1e, 0x79, 0x93, 0xe2, 0xfd, 0xec, 0xab, 0x68, 0x58, 0x95, 0x7d, 0xa6, 0x85, 0xae, 0x0f, 0x8a, 0xad, 0x2d, 0x25, 0x46, 0x90, 0xbd, 0xc1, 0x3f, 0x34, 0xa4, 0xfe, 0xc4, 0x4a, 0x02, 0xfd, 0x74, 0x5a, 0x42, 0x2d, 0xf0, 0x5c, 0xcb, 0xb5, 0x46, 0x35, 0xa8, 0xb8, 0x6b, 0x96, 0x09, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5062 = { .name = "ecdsa_secp256k1_sha256_5062", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5062_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5062_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5062_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 106 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5063 for ECDSA, tcId is 107 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5063_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5063_msg[] = { 0x33, 0x30, 0x39, 0x36, 0x34, 0x35, 0x37, 0x35, 0x31, 0x32, }; static const unsigned char ecdsa_secp256k1_sha256_5063_sig[] = { 0x79, 0xe8, 0x8b, 0xf5, 0x76, 0xb7, 0x4b, 0xc0, 0x7c, 0xa1, 0x42, 0x39, 0x5f, 0xda, 0x28, 0xf0, 0x3d, 0x3d, 0x5e, 0x64, 0x0b, 0x0b, 0x4f, 0xf0, 0x75, 0x2c, 0x6d, 0x94, 0xcd, 0x55, 0x34, 0x08, 0x32, 0xce, 0xa0, 0x5b, 0xd2, 0xd7, 0x06, 0xc8, 0xf6, 0x03, 0x6a, 0x50, 0x7e, 0x2a, 0xb7, 0x76, 0x60, 0x04, 0xf0, 0x90, 0x4e, 0x2e, 0x5c, 0x58, 0x62, 0x74, 0x9c, 0x00, 0x73, 0x24, 0x5d, 0x6a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5063 = { .name = "ecdsa_secp256k1_sha256_5063", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5063_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5063_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5063_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 107 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5064 for ECDSA, tcId is 108 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5064_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5064_msg[] = { 0x32, 0x37, 0x38, 0x34, 0x30, 0x32, 0x35, 0x36, 0x32, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5064_sig[] = { 0x9d, 0x54, 0xe0, 0x37, 0xa0, 0x02, 0x12, 0xb3, 0x77, 0xbc, 0x88, 0x74, 0x79, 0x8b, 0x8d, 0xa0, 0x80, 0x56, 0x4b, 0xbd, 0xf7, 0xe0, 0x75, 0x91, 0xb8, 0x61, 0x28, 0x58, 0x09, 0xd0, 0x14, 0x88, 0x18, 0xb4, 0xe5, 0x57, 0x66, 0x7a, 0x82, 0xbd, 0x95, 0x96, 0x5f, 0x07, 0x06, 0xf8, 0x1a, 0x29, 0x24, 0x3f, 0xbd, 0xd8, 0x69, 0x68, 0xa7, 0xeb, 0xeb, 0x43, 0x06, 0x9d, 0xb3, 0xb1, 0x8c, 0x7f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5064 = { .name = "ecdsa_secp256k1_sha256_5064", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5064_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5064_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5064_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 108 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5065 for ECDSA, tcId is 109 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5065_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5065_msg[] = { 0x32, 0x36, 0x31, 0x38, 0x37, 0x38, 0x37, 0x34, 0x31, 0x38, }; static const unsigned char ecdsa_secp256k1_sha256_5065_sig[] = { 0x26, 0x64, 0xf1, 0xff, 0xa9, 0x82, 0xfe, 0xdb, 0xcc, 0x7c, 0xab, 0x1b, 0x8b, 0xc6, 0xe2, 0xcb, 0x42, 0x02, 0x18, 0xd2, 0xa6, 0x07, 0x7a, 0xd0, 0x8e, 0x59, 0x1b, 0xa9, 0xfe, 0xab, 0x33, 0xbd, 0x49, 0xf5, 0xc7, 0xcb, 0x51, 0x5e, 0x83, 0x87, 0x2a, 0x3d, 0x41, 0xb4, 0xcd, 0xb8, 0x5f, 0x24, 0x2a, 0xd9, 0xd6, 0x1a, 0x5b, 0xfc, 0x01, 0xde, 0xbf, 0xbb, 0x52, 0xc6, 0xc8, 0x4b, 0xa7, 0x28, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5065 = { .name = "ecdsa_secp256k1_sha256_5065", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5065_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5065_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5065_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 109 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5066 for ECDSA, tcId is 110 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5066_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5066_msg[] = { 0x31, 0x36, 0x34, 0x32, 0x36, 0x32, 0x35, 0x32, 0x36, 0x32, }; static const unsigned char ecdsa_secp256k1_sha256_5066_sig[] = { 0x58, 0x27, 0x51, 0x83, 0x44, 0x84, 0x4f, 0xd6, 0xa7, 0xde, 0x73, 0xcb, 0xb0, 0xa6, 0xbe, 0xfd, 0xea, 0x7b, 0x13, 0xd2, 0xde, 0xe4, 0x47, 0x53, 0x17, 0xf0, 0xf1, 0x8f, 0xfc, 0x81, 0x52, 0x4b, 0xb0, 0xa3, 0x34, 0xb1, 0xf4, 0xb7, 0x74, 0xa5, 0xa2, 0x89, 0xf5, 0x53, 0x22, 0x4d, 0x28, 0x6d, 0x23, 0x9e, 0xf8, 0xa9, 0x09, 0x29, 0xed, 0x2d, 0x91, 0x42, 0x3e, 0x02, 0x4e, 0xb7, 0xfa, 0x66, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5066 = { .name = "ecdsa_secp256k1_sha256_5066", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5066_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5066_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5066_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 110 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5067 for ECDSA, tcId is 111 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5067_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5067_msg[] = { 0x36, 0x38, 0x32, 0x34, 0x31, 0x38, 0x39, 0x34, 0x33, 0x36, }; static const unsigned char ecdsa_secp256k1_sha256_5067_sig[] = { 0x97, 0xab, 0x19, 0xbd, 0x13, 0x9c, 0xac, 0x31, 0x93, 0x25, 0x86, 0x92, 0x18, 0xb1, 0xbc, 0xe1, 0x11, 0x87, 0x5d, 0x63, 0xfb, 0x12, 0x09, 0x8a, 0x04, 0xb0, 0xcd, 0x59, 0xb6, 0xfd, 0xd3, 0xa3, 0xbc, 0xe2, 0x63, 0x15, 0xc5, 0xdb, 0xc7, 0xb8, 0xcf, 0xc3, 0x14, 0x25, 0xa9, 0xb8, 0x9b, 0xcc, 0xea, 0x7a, 0xa9, 0x47, 0x7d, 0x71, 0x1a, 0x4d, 0x37, 0x7f, 0x83, 0x3d, 0xcc, 0x28, 0xf8, 0x20, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5067 = { .name = "ecdsa_secp256k1_sha256_5067", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5067_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5067_msg, .msglen = 10, .sig = ecdsa_secp256k1_sha256_5067_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 111 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5068 for ECDSA, tcId is 112 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5068_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5068_msg[] = { 0x34, 0x38, 0x34, 0x32, 0x34, 0x35, 0x34, 0x32, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5068_sig[] = { 0x52, 0xc6, 0x83, 0x14, 0x4e, 0x44, 0x11, 0x9a, 0xe2, 0x01, 0x37, 0x49, 0xd4, 0x96, 0x4e, 0xf6, 0x75, 0x09, 0x27, 0x8f, 0x6d, 0x38, 0xba, 0x86, 0x9a, 0xdc, 0xfa, 0x69, 0x97, 0x0e, 0x12, 0x3d, 0x34, 0x79, 0x91, 0x01, 0x67, 0x40, 0x8f, 0x45, 0xbd, 0xa4, 0x20, 0xa6, 0x26, 0xec, 0x9c, 0x4e, 0xc7, 0x11, 0xc1, 0x27, 0x4b, 0xe0, 0x92, 0x19, 0x8b, 0x41, 0x87, 0xc0, 0x18, 0xb5, 0x62, 0xca, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5068 = { .name = "ecdsa_secp256k1_sha256_5068", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5068_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5068_msg, .msglen = 9, .sig = ecdsa_secp256k1_sha256_5068_sig, .siglen = 64, .result = 1, .comment = "special case hash, tcId is 112 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5069 for ECDSA, tcId is 113 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5069_pubkey[] = { 0x07, 0x31, 0x0f, 0x90, 0xa9, 0xea, 0xe1, 0x49, 0xa0, 0x84, 0x02, 0xf5, 0x41, 0x94, 0xa0, 0xf7, 0xb4, 0xac, 0x42, 0x7b, 0xf8, 0xd9, 0xbd, 0x6c, 0x76, 0x81, 0x07, 0x1d, 0xc4, 0x7d, 0xc3, 0x62, 0x26, 0xa6, 0xd3, 0x7a, 0xc4, 0x6d, 0x61, 0xfd, 0x60, 0x0c, 0x0b, 0xf1, 0xbf, 0xf8, 0x76, 0x89, 0xed, 0x11, 0x7d, 0xda, 0x6b, 0x0e, 0x59, 0x31, 0x8a, 0xe0, 0x10, 0xa1, 0x97, 0xa2, 0x6c, 0xa0, }; static const unsigned char ecdsa_secp256k1_sha256_5069_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5069_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x45, 0x51, 0x23, 0x19, 0x50, 0xb7, 0x5f, 0xc4, 0x40, 0x2d, 0xa1, 0x72, 0x2f, 0xc9, 0xba, 0xeb, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5069 = { .name = "ecdsa_secp256k1_sha256_5069", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5069_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5069_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5069_sig, .siglen = 64, .result = 1, .comment = "k*G has a large x-coordinate, tcId is 113 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5070 for ECDSA, tcId is 114 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5070_pubkey[] = { 0x07, 0x31, 0x0f, 0x90, 0xa9, 0xea, 0xe1, 0x49, 0xa0, 0x84, 0x02, 0xf5, 0x41, 0x94, 0xa0, 0xf7, 0xb4, 0xac, 0x42, 0x7b, 0xf8, 0xd9, 0xbd, 0x6c, 0x76, 0x81, 0x07, 0x1d, 0xc4, 0x7d, 0xc3, 0x62, 0x26, 0xa6, 0xd3, 0x7a, 0xc4, 0x6d, 0x61, 0xfd, 0x60, 0x0c, 0x0b, 0xf1, 0xbf, 0xf8, 0x76, 0x89, 0xed, 0x11, 0x7d, 0xda, 0x6b, 0x0e, 0x59, 0x31, 0x8a, 0xe0, 0x10, 0xa1, 0x97, 0xa2, 0x6c, 0xa0, }; static const unsigned char ecdsa_secp256k1_sha256_5070_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5070_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2c, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5070 = { .name = "ecdsa_secp256k1_sha256_5070", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5070_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5070_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5070_sig, .siglen = 64, .result = -1, .comment = "r too large, tcId is 114 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5071 for ECDSA, tcId is 115 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5071_pubkey[] = { 0xbc, 0x97, 0xe7, 0x58, 0x5e, 0xec, 0xad, 0x48, 0xe1, 0x66, 0x83, 0xbc, 0x40, 0x91, 0x70, 0x8e, 0x1a, 0x93, 0x0c, 0x68, 0x3f, 0xc4, 0x70, 0x01, 0xd4, 0xb3, 0x83, 0x59, 0x4f, 0x2c, 0x4e, 0x22, 0x70, 0x59, 0x89, 0xcf, 0x69, 0xda, 0xea, 0xdd, 0x4e, 0x4e, 0x4b, 0x81, 0x51, 0xed, 0x88, 0x8d, 0xfe, 0xc2, 0x0f, 0xb0, 0x17, 0x28, 0xd8, 0x9d, 0x56, 0xb3, 0xf3, 0x8f, 0x2a, 0xe9, 0xc8, 0xc5, }; static const unsigned char ecdsa_secp256k1_sha256_5071_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5071_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x3f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x3e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5071 = { .name = "ecdsa_secp256k1_sha256_5071", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5071_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5071_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5071_sig, .siglen = 64, .result = 1, .comment = "r,s are large, tcId is 115 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5072 for ECDSA, tcId is 116 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5072_pubkey[] = { 0x44, 0xad, 0x33, 0x9a, 0xfb, 0xc2, 0x1e, 0x9a, 0xbf, 0x7b, 0x60, 0x2a, 0x5c, 0xa5, 0x35, 0xea, 0x37, 0x81, 0x35, 0xb6, 0xd1, 0x0d, 0x81, 0x31, 0x0b, 0xdd, 0x82, 0x93, 0xd1, 0xdf, 0x32, 0x52, 0xb6, 0x3f, 0xf7, 0xd0, 0x77, 0x47, 0x70, 0xf8, 0xfe, 0x1d, 0x17, 0x22, 0xfa, 0x83, 0xac, 0xd0, 0x2f, 0x43, 0x4e, 0x4f, 0xc1, 0x10, 0xa0, 0xcc, 0x8f, 0x6d, 0xdd, 0xd3, 0x7d, 0x56, 0xc4, 0x63, }; static const unsigned char ecdsa_secp256k1_sha256_5072_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5072_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3e, 0x9a, 0x75, 0x82, 0x88, 0x60, 0x89, 0xc6, 0x2f, 0xb8, 0x40, 0xcf, 0x3b, 0x83, 0x06, 0x1c, 0xd1, 0xcf, 0xf3, 0xae, 0x43, 0x41, 0x80, 0x8b, 0xb5, 0xbd, 0xee, 0x61, 0x91, 0x17, 0x41, 0x77, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5072 = { .name = "ecdsa_secp256k1_sha256_5072", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5072_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5072_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5072_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 116 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5073 for ECDSA, tcId is 117 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5073_pubkey[] = { 0x12, 0x60, 0xc2, 0x12, 0x2c, 0x9e, 0x24, 0x4e, 0x1a, 0xf5, 0x15, 0x1b, 0xed, 0xe0, 0xc3, 0xae, 0x23, 0xb5, 0x4d, 0x7c, 0x59, 0x68, 0x81, 0xd3, 0xee, 0xba, 0xd2, 0x1f, 0x37, 0xdd, 0x87, 0x8c, 0x5c, 0x9a, 0x0c, 0x1a, 0x9a, 0xde, 0x76, 0x73, 0x7a, 0x88, 0x11, 0xbd, 0x6a, 0x7f, 0x92, 0x87, 0xc9, 0x78, 0xee, 0x39, 0x6a, 0xa8, 0x9c, 0x11, 0xe4, 0x72, 0x29, 0xd2, 0xcc, 0xb5, 0x52, 0xf0, }; static const unsigned char ecdsa_secp256k1_sha256_5073_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5073_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x24, 0x23, 0x8e, 0x70, 0xb4, 0x31, 0xb1, 0xa6, 0x4e, 0xfd, 0xf9, 0x03, 0x26, 0x69, 0x93, 0x9d, 0x4b, 0x77, 0xf2, 0x49, 0x50, 0x3f, 0xc6, 0x90, 0x5f, 0xeb, 0x75, 0x40, 0xde, 0xa3, 0xe6, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5073 = { .name = "ecdsa_secp256k1_sha256_5073", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5073_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5073_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5073_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 have a large Hamming weight, tcId is 117 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5074 for ECDSA, tcId is 118 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5074_pubkey[] = { 0x18, 0x77, 0x04, 0x5b, 0xe2, 0x5d, 0x34, 0xa1, 0xd0, 0x60, 0x0f, 0x9d, 0x5c, 0x00, 0xd0, 0x64, 0x5a, 0x2a, 0x54, 0x37, 0x9b, 0x6c, 0xee, 0xfa, 0xd2, 0xe6, 0xbf, 0x5c, 0x2a, 0x33, 0x52, 0xce, 0x82, 0x1a, 0x53, 0x2c, 0xc1, 0x75, 0x1e, 0xe1, 0xd3, 0x6d, 0x41, 0xc3, 0xd6, 0xab, 0x4e, 0x9b, 0x14, 0x3e, 0x44, 0xec, 0x46, 0xd7, 0x34, 0x78, 0xea, 0x6a, 0x79, 0xa5, 0xc0, 0xe5, 0x41, 0x59, }; static const unsigned char ecdsa_secp256k1_sha256_5074_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5074_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5074 = { .name = "ecdsa_secp256k1_sha256_5074", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5074_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5074_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5074_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 118 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5075 for ECDSA, tcId is 119 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5075_pubkey[] = { 0x18, 0x77, 0x04, 0x5b, 0xe2, 0x5d, 0x34, 0xa1, 0xd0, 0x60, 0x0f, 0x9d, 0x5c, 0x00, 0xd0, 0x64, 0x5a, 0x2a, 0x54, 0x37, 0x9b, 0x6c, 0xee, 0xfa, 0xd2, 0xe6, 0xbf, 0x5c, 0x2a, 0x33, 0x52, 0xce, 0x82, 0x1a, 0x53, 0x2c, 0xc1, 0x75, 0x1e, 0xe1, 0xd3, 0x6d, 0x41, 0xc3, 0xd6, 0xab, 0x4e, 0x9b, 0x14, 0x3e, 0x44, 0xec, 0x46, 0xd7, 0x34, 0x78, 0xea, 0x6a, 0x79, 0xa5, 0xc0, 0xe5, 0x41, 0x59, }; static const unsigned char ecdsa_secp256k1_sha256_5075_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5075_sig[] = { 0x01, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5075 = { .name = "ecdsa_secp256k1_sha256_5075", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5075_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5075_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5075_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 119 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5076 for ECDSA, tcId is 120 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5076_pubkey[] = { 0x45, 0x54, 0x39, 0xfc, 0xc3, 0xd2, 0xde, 0xec, 0xed, 0xde, 0xae, 0xce, 0x60, 0xe7, 0xbd, 0x17, 0x30, 0x4f, 0x36, 0xeb, 0xb6, 0x02, 0xad, 0xf5, 0xa2, 0x2e, 0x0b, 0x8f, 0x1d, 0xb4, 0x6a, 0x50, 0xae, 0xc3, 0x8f, 0xb2, 0xba, 0xf2, 0x21, 0xe9, 0xa8, 0xd1, 0x88, 0x7c, 0x7b, 0xf6, 0x22, 0x2d, 0xd1, 0x83, 0x46, 0x34, 0xe7, 0x72, 0x63, 0x31, 0x5a, 0xf6, 0xd2, 0x36, 0x09, 0xd0, 0x4f, 0x77, }; static const unsigned char ecdsa_secp256k1_sha256_5076_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5076_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5076 = { .name = "ecdsa_secp256k1_sha256_5076", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5076_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5076_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5076_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 120 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5077 for ECDSA, tcId is 121 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5077_pubkey[] = { 0x45, 0x54, 0x39, 0xfc, 0xc3, 0xd2, 0xde, 0xec, 0xed, 0xde, 0xae, 0xce, 0x60, 0xe7, 0xbd, 0x17, 0x30, 0x4f, 0x36, 0xeb, 0xb6, 0x02, 0xad, 0xf5, 0xa2, 0x2e, 0x0b, 0x8f, 0x1d, 0xb4, 0x6a, 0x50, 0xae, 0xc3, 0x8f, 0xb2, 0xba, 0xf2, 0x21, 0xe9, 0xa8, 0xd1, 0x88, 0x7c, 0x7b, 0xf6, 0x22, 0x2d, 0xd1, 0x83, 0x46, 0x34, 0xe7, 0x72, 0x63, 0x31, 0x5a, 0xf6, 0xd2, 0x36, 0x09, 0xd0, 0x4f, 0x77, }; static const unsigned char ecdsa_secp256k1_sha256_5077_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5077_sig[] = { 0x01, 0x02, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5077 = { .name = "ecdsa_secp256k1_sha256_5077", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5077_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5077_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5077_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 121 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5078 for ECDSA, tcId is 122 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5078_pubkey[] = { 0x2e, 0x1f, 0x46, 0x6b, 0x02, 0x4c, 0x0c, 0x3a, 0xce, 0x24, 0x37, 0xde, 0x09, 0x12, 0x7f, 0xed, 0x04, 0xb7, 0x06, 0xf9, 0x4b, 0x19, 0xa2, 0x1b, 0xb1, 0xc2, 0xac, 0xf3, 0x5c, 0xec, 0xe7, 0x18, 0x04, 0x49, 0xae, 0x35, 0x23, 0xd7, 0x25, 0x34, 0xe9, 0x64, 0x97, 0x2c, 0xfd, 0x3b, 0x38, 0xaf, 0x0b, 0xdd, 0xd9, 0x61, 0x9e, 0x5a, 0xf2, 0x23, 0xe4, 0xd1, 0xa4, 0x0f, 0x34, 0xcf, 0x9f, 0x1d, }; static const unsigned char ecdsa_secp256k1_sha256_5078_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5078_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5078 = { .name = "ecdsa_secp256k1_sha256_5078", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5078_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5078_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5078_sig, .siglen = 64, .result = 1, .comment = "small r and s, tcId is 122 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5079 for ECDSA, tcId is 123 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5079_pubkey[] = { 0x2e, 0x1f, 0x46, 0x6b, 0x02, 0x4c, 0x0c, 0x3a, 0xce, 0x24, 0x37, 0xde, 0x09, 0x12, 0x7f, 0xed, 0x04, 0xb7, 0x06, 0xf9, 0x4b, 0x19, 0xa2, 0x1b, 0xb1, 0xc2, 0xac, 0xf3, 0x5c, 0xec, 0xe7, 0x18, 0x04, 0x49, 0xae, 0x35, 0x23, 0xd7, 0x25, 0x34, 0xe9, 0x64, 0x97, 0x2c, 0xfd, 0x3b, 0x38, 0xaf, 0x0b, 0xdd, 0xd9, 0x61, 0x9e, 0x5a, 0xf2, 0x23, 0xe4, 0xd1, 0xa4, 0x0f, 0x34, 0xcf, 0x9f, 0x1d, }; static const unsigned char ecdsa_secp256k1_sha256_5079_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5079_sig[] = { 0x01, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5079 = { .name = "ecdsa_secp256k1_sha256_5079", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5079_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5079_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5079_sig, .siglen = 2, .result = 0, .comment = "incorrect size of signature, tcId is 123 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5080 for ECDSA, tcId is 124 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5080_pubkey[] = { 0x2e, 0x1f, 0x46, 0x6b, 0x02, 0x4c, 0x0c, 0x3a, 0xce, 0x24, 0x37, 0xde, 0x09, 0x12, 0x7f, 0xed, 0x04, 0xb7, 0x06, 0xf9, 0x4b, 0x19, 0xa2, 0x1b, 0xb1, 0xc2, 0xac, 0xf3, 0x5c, 0xec, 0xe7, 0x18, 0x04, 0x49, 0xae, 0x35, 0x23, 0xd7, 0x25, 0x34, 0xe9, 0x64, 0x97, 0x2c, 0xfd, 0x3b, 0x38, 0xaf, 0x0b, 0xdd, 0xd9, 0x61, 0x9e, 0x5a, 0xf2, 0x23, 0xe4, 0xd1, 0xa4, 0x0f, 0x34, 0xcf, 0x9f, 0x1d, }; static const unsigned char ecdsa_secp256k1_sha256_5080_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5080_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5080 = { .name = "ecdsa_secp256k1_sha256_5080", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5080_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5080_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5080_sig, .siglen = 64, .result = -1, .comment = "r is larger than n, tcId is 124 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5081 for ECDSA, tcId is 125 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5081_pubkey[] = { 0xdd, 0xa9, 0x5d, 0x7b, 0x06, 0x98, 0xde, 0x5d, 0x2d, 0x0b, 0x4f, 0x00, 0x34, 0xdb, 0xe3, 0x5b, 0x50, 0xf9, 0x78, 0xfc, 0xc5, 0x18, 0xa8, 0x4a, 0xbf, 0x9c, 0x99, 0xef, 0xd9, 0x6a, 0x25, 0x30, 0x5a, 0xdc, 0x08, 0xd6, 0xa6, 0x3d, 0xbe, 0x83, 0x1a, 0xb9, 0x9c, 0xd9, 0x14, 0x6e, 0x3c, 0x4c, 0x45, 0x49, 0x2a, 0xd1, 0x95, 0x21, 0x61, 0x25, 0x42, 0x25, 0x6d, 0x6a, 0xf6, 0x0e, 0x78, 0x88, }; static const unsigned char ecdsa_secp256k1_sha256_5081_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5081_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x49, 0x17, 0xc8, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5081 = { .name = "ecdsa_secp256k1_sha256_5081", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5081_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5081_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5081_sig, .siglen = 64, .result = -1, .comment = "s is larger than n, tcId is 125 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5082 for ECDSA, tcId is 126 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5082_pubkey[] = { 0x02, 0xef, 0x4d, 0x6d, 0x6c, 0xfd, 0x5a, 0x94, 0xf1, 0xd7, 0x78, 0x42, 0x26, 0xe3, 0xe2, 0xa6, 0xc0, 0xa4, 0x36, 0xc5, 0x58, 0x39, 0x61, 0x9f, 0x38, 0xfb, 0x44, 0x72, 0xb5, 0xf9, 0xee, 0x77, 0x7e, 0xb4, 0xac, 0xd4, 0xee, 0xbd, 0xa5, 0xcd, 0x72, 0x87, 0x5f, 0xfd, 0x2a, 0x2f, 0x26, 0x22, 0x9c, 0x2d, 0xc6, 0xb4, 0x65, 0x00, 0x91, 0x9a, 0x43, 0x2c, 0x86, 0x73, 0x9f, 0x3a, 0xe8, 0x66, }; static const unsigned char ecdsa_secp256k1_sha256_5082_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5082_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0xc5, 0x8b, 0x16, 0x2c, 0x58, 0xb1, 0x62, 0xc5, 0x8b, 0x16, 0x2c, 0x58, 0xb1, 0x62, 0xc5, 0x8a, 0x1b, 0x24, 0x29, 0x73, 0x85, 0x3e, 0x16, 0xdb, 0x75, 0xc8, 0xa1, 0xa7, 0x1d, 0xa4, 0xd3, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5082 = { .name = "ecdsa_secp256k1_sha256_5082", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5082_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5082_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5082_sig, .siglen = 64, .result = 1, .comment = "small r and s^-1, tcId is 126 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5083 for ECDSA, tcId is 127 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5083_pubkey[] = { 0x46, 0x4f, 0x4f, 0xf7, 0x15, 0x72, 0x9c, 0xae, 0x50, 0x72, 0xca, 0x3b, 0xd8, 0x01, 0xd3, 0x19, 0x5b, 0x67, 0xae, 0xc6, 0x5e, 0x9b, 0x01, 0xaa, 0xd2, 0x0a, 0x29, 0x43, 0xdc, 0xbc, 0xb5, 0x84, 0xb1, 0xaf, 0xd2, 0x9d, 0x31, 0xa3, 0x9a, 0x11, 0xd5, 0x70, 0xaa, 0x15, 0x97, 0x43, 0x9b, 0x3b, 0x2d, 0x19, 0x71, 0xbf, 0x2f, 0x1a, 0xbf, 0x15, 0x43, 0x2d, 0x02, 0x07, 0xb1, 0x0d, 0x1d, 0x08, }; static const unsigned char ecdsa_secp256k1_sha256_5083_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5083_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x9b, 0x4d, 0x34, 0x79, 0x52, 0xcc, 0xfc, 0xbc, 0x51, 0x03, 0xd0, 0xda, 0x26, 0x74, 0x77, 0xd1, 0x79, 0x14, 0x61, 0xcf, 0x2a, 0xa4, 0x4b, 0xf9, 0xd4, 0x31, 0x98, 0xf7, 0x95, 0x07, 0xbd, 0x87, 0x79, 0xd6, 0x9a, 0x13, 0x10, 0x8e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5083 = { .name = "ecdsa_secp256k1_sha256_5083", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5083_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5083_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5083_sig, .siglen = 64, .result = 1, .comment = "smallish r and s^-1, tcId is 127 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5084 for ECDSA, tcId is 128 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5084_pubkey[] = { 0x15, 0x7f, 0x8f, 0xdd, 0xf3, 0x73, 0xeb, 0x5f, 0x49, 0xcf, 0xcf, 0x10, 0xd8, 0xb8, 0x53, 0xcf, 0x91, 0xcb, 0xcd, 0x7d, 0x66, 0x5c, 0x35, 0x22, 0xba, 0x7d, 0xd7, 0x38, 0xdd, 0xb7, 0x9a, 0x4c, 0xde, 0xad, 0xf1, 0xa5, 0xc4, 0x48, 0xea, 0x3c, 0x9f, 0x41, 0x91, 0xa8, 0x99, 0x9a, 0xbf, 0xcc, 0x75, 0x7a, 0xc6, 0xd6, 0x45, 0x67, 0xef, 0x07, 0x2c, 0x47, 0xfe, 0xc6, 0x13, 0x44, 0x3b, 0x8f, }; static const unsigned char ecdsa_secp256k1_sha256_5084_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5084_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x33, 0xe6, 0x7e, 0x37, 0xb3, 0x2b, 0x44, 0x55, 0x80, 0xbf, 0x4e, 0xfc, 0x90, 0x6f, 0x90, 0x6f, 0x90, 0x6f, 0x90, 0x6f, 0x90, 0x6f, 0x90, 0x6f, 0x90, 0x6f, 0x90, 0x6e, 0xd8, 0xe4, 0x26, 0xf7, 0xb1, 0x96, 0x8c, 0x35, 0xa2, 0x04, 0x23, 0x6a, 0x57, 0x97, 0x23, 0xd2, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5084 = { .name = "ecdsa_secp256k1_sha256_5084", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5084_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5084_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5084_sig, .siglen = 64, .result = 1, .comment = "100-bit r and small s^-1, tcId is 128 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5085 for ECDSA, tcId is 129 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5085_pubkey[] = { 0x09, 0x34, 0xa5, 0x37, 0x46, 0x6c, 0x07, 0x43, 0x0e, 0x2c, 0x48, 0xfe, 0xb9, 0x90, 0xbb, 0x19, 0xfb, 0x78, 0xce, 0xcc, 0x9c, 0xee, 0x42, 0x4e, 0xa4, 0xd1, 0x30, 0x29, 0x1a, 0xa2, 0x37, 0xf0, 0xd4, 0xf9, 0x2d, 0x23, 0xb4, 0x62, 0x80, 0x4b, 0x5b, 0x68, 0xc5, 0x25, 0x58, 0xc0, 0x1c, 0x99, 0x96, 0xdb, 0xf7, 0x27, 0xfc, 0xca, 0xbb, 0xee, 0xdb, 0x96, 0x21, 0xa4, 0x00, 0x53, 0x5a, 0xfa, }; static const unsigned char ecdsa_secp256k1_sha256_5085_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5085_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x78, 0x32, 0x66, 0xe9, 0x0f, 0x43, 0xda, 0xfe, 0x5c, 0xd9, 0xb3, 0xb0, 0xbe, 0x86, 0xde, 0x22, 0xf9, 0xde, 0x83, 0x67, 0x7d, 0x0f, 0x50, 0x71, 0x3a, 0x46, 0x8e, 0xc7, 0x2f, 0xcf, 0x5d, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5085 = { .name = "ecdsa_secp256k1_sha256_5085", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5085_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5085_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5085_sig, .siglen = 64, .result = 1, .comment = "small r and 100 bit s^-1, tcId is 129 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5086 for ECDSA, tcId is 130 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5086_pubkey[] = { 0xd6, 0xef, 0x20, 0xbe, 0x66, 0xc8, 0x93, 0xf7, 0x41, 0xa9, 0xbf, 0x90, 0xd9, 0xb7, 0x46, 0x75, 0xd1, 0xc2, 0xa3, 0x12, 0x96, 0x39, 0x7a, 0xcb, 0x3e, 0xf1, 0x74, 0xfd, 0x0b, 0x30, 0x0c, 0x65, 0x4a, 0x0c, 0x95, 0x47, 0x8c, 0xa0, 0x03, 0x99, 0x16, 0x2d, 0x7f, 0x0f, 0x2d, 0xc8, 0x9e, 0xfd, 0xc2, 0xb2, 0x8a, 0x30, 0xfb, 0xab, 0xe2, 0x85, 0x85, 0x72, 0x95, 0xa4, 0xb0, 0xc4, 0xe2, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5086_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5086_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x25, 0x22, 0xbb, 0xd3, 0xec, 0xbe, 0x7c, 0x39, 0xe9, 0x3e, 0x7c, 0x26, 0x78, 0x32, 0x66, 0xe9, 0x0f, 0x43, 0xda, 0xfe, 0x5c, 0xd9, 0xb3, 0xb0, 0xbe, 0x86, 0xde, 0x22, 0xf9, 0xde, 0x83, 0x67, 0x7d, 0x0f, 0x50, 0x71, 0x3a, 0x46, 0x8e, 0xc7, 0x2f, 0xcf, 0x5d, 0x57, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5086 = { .name = "ecdsa_secp256k1_sha256_5086", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5086_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5086_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5086_sig, .siglen = 64, .result = 1, .comment = "100-bit r and s^-1, tcId is 130 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5087 for ECDSA, tcId is 131 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5087_pubkey[] = { 0xb7, 0x29, 0x1d, 0x14, 0x04, 0xe0, 0xc0, 0xc0, 0x7d, 0xab, 0x93, 0x72, 0x18, 0x9f, 0x4b, 0xd5, 0x8d, 0x2c, 0xea, 0xa8, 0xd1, 0x5e, 0xde, 0x54, 0x4d, 0x95, 0x14, 0x54, 0x5b, 0xa9, 0xee, 0x06, 0x29, 0xc9, 0xa6, 0x3d, 0x5e, 0x30, 0x87, 0x69, 0xcc, 0x30, 0xec, 0x27, 0x6a, 0x41, 0x0e, 0x64, 0x64, 0xa2, 0x7e, 0xea, 0xfd, 0x9e, 0x59, 0x9d, 0xb1, 0x0f, 0x05, 0x3a, 0x4f, 0xe4, 0xa8, 0x29, }; static const unsigned char ecdsa_secp256k1_sha256_5087_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5087_sig[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x40, 0xc1, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5087 = { .name = "ecdsa_secp256k1_sha256_5087", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5087_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5087_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5087_sig, .siglen = 64, .result = 1, .comment = "r and s^-1 are close to n, tcId is 131 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5088 for ECDSA, tcId is 132 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5088_pubkey[] = { 0xbb, 0x79, 0xf6, 0x18, 0x57, 0xf7, 0x43, 0xbf, 0xa1, 0xb6, 0xe7, 0x11, 0x1c, 0xe4, 0x09, 0x43, 0x77, 0x25, 0x69, 0x69, 0xe4, 0xe1, 0x51, 0x59, 0x12, 0x3d, 0x95, 0x48, 0xac, 0xc3, 0xbe, 0x6c, 0x1f, 0x9d, 0x9f, 0x88, 0x60, 0xdc, 0xff, 0xd3, 0xeb, 0x36, 0xdd, 0x6c, 0x31, 0xff, 0x2e, 0x72, 0x26, 0xc2, 0x00, 0x9c, 0x4c, 0x94, 0xd8, 0xd7, 0xd2, 0xb5, 0x68, 0x6b, 0xf7, 0xab, 0xd6, 0x77, }; static const unsigned char ecdsa_secp256k1_sha256_5088_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5088_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5088 = { .name = "ecdsa_secp256k1_sha256_5088", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5088_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5088_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5088_sig, .siglen = 64, .result = 1, .comment = "s == 1, tcId is 132 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5089 for ECDSA, tcId is 133 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5089_pubkey[] = { 0xbb, 0x79, 0xf6, 0x18, 0x57, 0xf7, 0x43, 0xbf, 0xa1, 0xb6, 0xe7, 0x11, 0x1c, 0xe4, 0x09, 0x43, 0x77, 0x25, 0x69, 0x69, 0xe4, 0xe1, 0x51, 0x59, 0x12, 0x3d, 0x95, 0x48, 0xac, 0xc3, 0xbe, 0x6c, 0x1f, 0x9d, 0x9f, 0x88, 0x60, 0xdc, 0xff, 0xd3, 0xeb, 0x36, 0xdd, 0x6c, 0x31, 0xff, 0x2e, 0x72, 0x26, 0xc2, 0x00, 0x9c, 0x4c, 0x94, 0xd8, 0xd7, 0xd2, 0xb5, 0x68, 0x6b, 0xf7, 0xab, 0xd6, 0x77, }; static const unsigned char ecdsa_secp256k1_sha256_5089_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5089_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc1, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5089 = { .name = "ecdsa_secp256k1_sha256_5089", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5089_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5089_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5089_sig, .siglen = 64, .result = -1, .comment = "s == 0, tcId is 133 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5090 for ECDSA, tcId is 134 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5090_pubkey[] = { 0xd5, 0x33, 0xb7, 0x89, 0xa4, 0xaf, 0x89, 0x0f, 0xa7, 0xa8, 0x2a, 0x1f, 0xae, 0x58, 0xc4, 0x04, 0xf9, 0xa6, 0x2a, 0x50, 0xb4, 0x9a, 0xda, 0xfa, 0xb3, 0x49, 0xc5, 0x13, 0xb4, 0x15, 0x08, 0x74, 0x01, 0xb4, 0x17, 0x1b, 0x80, 0x3e, 0x76, 0xb3, 0x4a, 0x98, 0x61, 0xe1, 0x0f, 0x7b, 0xc2, 0x89, 0xa0, 0x66, 0xfd, 0x01, 0xbd, 0x29, 0xf8, 0x4c, 0x98, 0x7a, 0x10, 0xa5, 0xfb, 0x18, 0xc2, 0xd4, }; static const unsigned char ecdsa_secp256k1_sha256_5090_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5090_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5d, 0x57, 0x6e, 0x73, 0x57, 0xa4, 0x50, 0x1d, 0xdf, 0xe9, 0x2f, 0x46, 0x68, 0x1b, 0x20, 0xa0, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5090 = { .name = "ecdsa_secp256k1_sha256_5090", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5090_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5090_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5090_sig, .siglen = 64, .result = -1, .comment = "point at infinity during verify, tcId is 134 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5091 for ECDSA, tcId is 135 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5091_pubkey[] = { 0x3a, 0x31, 0x50, 0x79, 0x8c, 0x8a, 0xf6, 0x9d, 0x1e, 0x6e, 0x98, 0x1f, 0x3a, 0x45, 0x40, 0x2b, 0xa1, 0xd7, 0x32, 0xf4, 0xbe, 0x83, 0x30, 0xc5, 0x16, 0x4f, 0x49, 0xe1, 0x0e, 0xc5, 0x55, 0xb4, 0x22, 0x1b, 0xd8, 0x42, 0xbc, 0x5e, 0x4d, 0x97, 0xef, 0xf3, 0x71, 0x65, 0xf6, 0x0e, 0x39, 0x98, 0xa4, 0x24, 0xd7, 0x2a, 0x45, 0x0c, 0xf9, 0x5e, 0xa4, 0x77, 0xc7, 0x82, 0x87, 0xd0, 0x34, 0x3a, }; static const unsigned char ecdsa_secp256k1_sha256_5091_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5091_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5d, 0x57, 0x6e, 0x73, 0x57, 0xa4, 0x50, 0x1d, 0xdf, 0xe9, 0x2f, 0x46, 0x68, 0x1b, 0x20, 0xa0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5d, 0x57, 0x6e, 0x73, 0x57, 0xa4, 0x50, 0x1d, 0xdf, 0xe9, 0x2f, 0x46, 0x68, 0x1b, 0x20, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5091 = { .name = "ecdsa_secp256k1_sha256_5091", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5091_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5091_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5091_sig, .siglen = 64, .result = 1, .comment = "edge case for signature malleability, tcId is 135 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5092 for ECDSA, tcId is 136 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5092_pubkey[] = { 0x3b, 0x37, 0xdf, 0x5f, 0xb3, 0x47, 0xc6, 0x9a, 0x0f, 0x17, 0xd8, 0x5c, 0x0c, 0x7c, 0xa8, 0x37, 0x36, 0x88, 0x3a, 0x82, 0x5e, 0x13, 0x14, 0x3d, 0x0f, 0xcf, 0xc8, 0x10, 0x1e, 0x85, 0x1e, 0x80, 0x0d, 0xe3, 0xc0, 0x90, 0xb6, 0xca, 0x21, 0xba, 0x54, 0x35, 0x17, 0x33, 0x0c, 0x04, 0xb1, 0x2f, 0x94, 0x8c, 0x6b, 0xad, 0xf1, 0x4a, 0x63, 0xab, 0xff, 0xdf, 0x4e, 0xf8, 0xc7, 0x53, 0x70, 0x26, }; static const unsigned char ecdsa_secp256k1_sha256_5092_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5092_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5d, 0x57, 0x6e, 0x73, 0x57, 0xa4, 0x50, 0x1d, 0xdf, 0xe9, 0x2f, 0x46, 0x68, 0x1b, 0x20, 0xa0, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5d, 0x57, 0x6e, 0x73, 0x57, 0xa4, 0x50, 0x1d, 0xdf, 0xe9, 0x2f, 0x46, 0x68, 0x1b, 0x20, 0xa1, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5092 = { .name = "ecdsa_secp256k1_sha256_5092", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5092_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5092_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5092_sig, .siglen = 64, .result = 1, .comment = "edge case for signature malleability, tcId is 136 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5093 for ECDSA, tcId is 137 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5093_pubkey[] = { 0xfe, 0xb5, 0x16, 0x3b, 0x0e, 0xce, 0x30, 0xff, 0x3e, 0x03, 0xc7, 0xd5, 0x5c, 0x43, 0x80, 0xfa, 0x2f, 0xa8, 0x1e, 0xe2, 0xc0, 0x35, 0x49, 0x42, 0xff, 0x6f, 0x08, 0xc9, 0x9d, 0x0c, 0xd8, 0x2c, 0xe8, 0x7d, 0xe0, 0x5e, 0xe1, 0xbd, 0xa0, 0x89, 0xd3, 0xe4, 0xe2, 0x48, 0xfa, 0x0f, 0x72, 0x11, 0x02, 0xac, 0xff, 0xfd, 0xf5, 0x0e, 0x65, 0x4b, 0xe2, 0x81, 0x43, 0x39, 0x99, 0xdf, 0x89, 0x7e, }; static const unsigned char ecdsa_secp256k1_sha256_5093_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5093_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xb8, 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5093 = { .name = "ecdsa_secp256k1_sha256_5093", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5093_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5093_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5093_sig, .siglen = 64, .result = 1, .comment = "u1 == 1, tcId is 137 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5094 for ECDSA, tcId is 138 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5094_pubkey[] = { 0x23, 0x8c, 0xed, 0x00, 0x1c, 0xf2, 0x2b, 0x88, 0x53, 0xe0, 0x2e, 0xdc, 0x89, 0xcb, 0xec, 0xa5, 0x05, 0x0b, 0xa7, 0xe0, 0x42, 0xa7, 0xa7, 0x7f, 0x93, 0x82, 0xcd, 0x41, 0x49, 0x22, 0x89, 0x76, 0x40, 0x68, 0x3d, 0x30, 0x94, 0x64, 0x38, 0x40, 0xf2, 0x95, 0x89, 0x0a, 0xa4, 0xc1, 0x8a, 0xa3, 0x9b, 0x41, 0xd7, 0x7d, 0xd0, 0xfb, 0x3b, 0xb2, 0x70, 0x0e, 0x4f, 0x9e, 0xc2, 0x84, 0xff, 0xc2, }; static const unsigned char ecdsa_secp256k1_sha256_5094_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5094_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xb8, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdd, 0x5e, 0x1b, 0xba, 0x77, 0xf5, 0x23, 0x84, 0x21, 0x93, 0xb3, 0xb8, 0x2e, 0x44, 0x8e, 0x05, 0xd5, 0xf1, 0x1e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5094 = { .name = "ecdsa_secp256k1_sha256_5094", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5094_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5094_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5094_sig, .siglen = 64, .result = 1, .comment = "u1 == n - 1, tcId is 138 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5095 for ECDSA, tcId is 139 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5095_pubkey[] = { 0x96, 0x1c, 0xf6, 0x48, 0x17, 0xc0, 0x6c, 0x0e, 0x51, 0xb3, 0xc2, 0x73, 0x6c, 0x92, 0x2f, 0xde, 0x18, 0xbd, 0x8c, 0x49, 0x06, 0xfc, 0xd7, 0xf5, 0xef, 0x66, 0xc4, 0x67, 0x85, 0x08, 0xf3, 0x5e, 0xd2, 0xc5, 0xd1, 0x81, 0x68, 0xcf, 0xbe, 0x70, 0xf2, 0xf1, 0x23, 0xbd, 0x74, 0x19, 0x23, 0x2b, 0xb9, 0x2d, 0xd6, 0x91, 0x13, 0xe2, 0x94, 0x10, 0x61, 0x88, 0x94, 0x81, 0xc5, 0xa0, 0x27, 0xbf, }; static const unsigned char ecdsa_secp256k1_sha256_5095_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5095_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xb8, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xb8, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5095 = { .name = "ecdsa_secp256k1_sha256_5095", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5095_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5095_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5095_sig, .siglen = 64, .result = 1, .comment = "u2 == 1, tcId is 139 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5096 for ECDSA, tcId is 140 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5096_pubkey[] = { 0x13, 0x68, 0x1e, 0xae, 0x16, 0x8c, 0xd4, 0xea, 0x7c, 0xf2, 0xe2, 0xa4, 0x5d, 0x05, 0x27, 0x42, 0xd1, 0x0a, 0x9f, 0x64, 0xe7, 0x96, 0x86, 0x7d, 0xbd, 0xcb, 0x82, 0x9f, 0xe0, 0xb1, 0x02, 0x88, 0x16, 0x52, 0x87, 0x60, 0xd1, 0x77, 0x37, 0x6c, 0x09, 0xdf, 0x79, 0xde, 0x39, 0x55, 0x7c, 0x32, 0x9c, 0xc1, 0x75, 0x35, 0x17, 0xac, 0xff, 0xe8, 0xfa, 0x2e, 0xc2, 0x98, 0x02, 0x6b, 0x83, 0x84, }; static const unsigned char ecdsa_secp256k1_sha256_5096_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5096_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xb8, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xa9, 0xd1, 0xc9, 0xe8, 0x99, 0xca, 0x30, 0x6a, 0xd2, 0x7f, 0xe1, 0x94, 0x5d, 0xe0, 0x24, 0x2b, 0x89, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5096 = { .name = "ecdsa_secp256k1_sha256_5096", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5096_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5096_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5096_sig, .siglen = 64, .result = 1, .comment = "u2 == n - 1, tcId is 140 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5097 for ECDSA, tcId is 141 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5097_pubkey[] = { 0x5a, 0xa7, 0xab, 0xfd, 0xb6, 0xb4, 0x08, 0x6d, 0x54, 0x33, 0x25, 0xe5, 0xd7, 0x9c, 0x6e, 0x95, 0xce, 0x42, 0xf8, 0x66, 0xd2, 0xbb, 0x84, 0x90, 0x96, 0x33, 0xa0, 0x4b, 0xb1, 0xaa, 0x31, 0xc2, 0x91, 0xc8, 0x00, 0x88, 0x79, 0x49, 0x05, 0xe1, 0xda, 0x33, 0x33, 0x6d, 0x87, 0x4e, 0x2f, 0x91, 0xcc, 0xf4, 0x5c, 0xc5, 0x91, 0x85, 0xbe, 0xde, 0x5d, 0xd6, 0xf3, 0xf7, 0xac, 0xaa, 0xe1, 0x8b, }; static const unsigned char ecdsa_secp256k1_sha256_5097_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5097_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xe9, 0x1e, 0x1b, 0xa6, 0xba, 0x89, 0x86, 0x20, 0xa4, 0x6b, 0xcb, 0x51, 0xdc, 0x0b, 0x8b, 0x4a, 0xd1, 0xdc, 0x35, 0xda, 0xd8, 0x92, 0xc4, 0x55, 0x2d, 0x18, 0x47, 0xb2, 0xce, 0x44, 0x46, 0x37, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5097 = { .name = "ecdsa_secp256k1_sha256_5097", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5097_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5097_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5097_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 141 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5098 for ECDSA, tcId is 142 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5098_pubkey[] = { 0x00, 0x27, 0x77, 0x91, 0xb3, 0x05, 0xa4, 0x5b, 0x2b, 0x39, 0x59, 0x0b, 0x2f, 0x05, 0xd3, 0x39, 0x2a, 0x6c, 0x81, 0x82, 0xce, 0xf4, 0xeb, 0x54, 0x01, 0x20, 0xe0, 0xf5, 0xc2, 0x06, 0xc3, 0xe4, 0x64, 0x10, 0x82, 0x33, 0xfb, 0x0b, 0x8c, 0x3a, 0xc8, 0x92, 0xd7, 0x9e, 0xf8, 0xe0, 0xfb, 0xf9, 0x2e, 0xd1, 0x33, 0xad, 0xdb, 0x45, 0x54, 0x27, 0x01, 0x32, 0x58, 0x4d, 0xc5, 0x2e, 0xef, 0x41, }; static const unsigned char ecdsa_secp256k1_sha256_5098_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5098_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xe3, 0x6b, 0xf0, 0xce, 0xc0, 0x6d, 0x9b, 0x84, 0x1d, 0xa8, 0x13, 0x32, 0x81, 0x2f, 0x74, 0xf3, 0x0b, 0xba, 0xec, 0x9f, 0x20, 0x23, 0x19, 0x20, 0x6c, 0x6f, 0x0b, 0x8a, 0x0a, 0x40, 0x0f, 0xf7, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5098 = { .name = "ecdsa_secp256k1_sha256_5098", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5098_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5098_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5098_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 142 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5099 for ECDSA, tcId is 143 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5099_pubkey[] = { 0x6e, 0xfa, 0x09, 0x2b, 0x68, 0xde, 0x94, 0x60, 0xf0, 0xbc, 0xc9, 0x19, 0x00, 0x5a, 0x5f, 0x6e, 0x80, 0xe1, 0x9d, 0xe9, 0x89, 0x68, 0xbe, 0x3c, 0xd2, 0xc7, 0x70, 0xa9, 0x94, 0x9b, 0xfb, 0x1a, 0xc7, 0x5e, 0x6e, 0x50, 0x87, 0xd6, 0x55, 0x0d, 0x5f, 0x9b, 0xeb, 0x1e, 0x79, 0xe5, 0x02, 0x93, 0x07, 0xbc, 0x25, 0x52, 0x35, 0xe2, 0xd5, 0xdc, 0x99, 0x24, 0x1a, 0xc3, 0xab, 0x88, 0x6c, 0x49, }; static const unsigned char ecdsa_secp256k1_sha256_5099_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5099_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xea, 0x26, 0xb5, 0x7a, 0xf8, 0x84, 0xb6, 0xc0, 0x6e, 0x34, 0x8e, 0xfe, 0x13, 0x9c, 0x1e, 0x4e, 0x9e, 0xc9, 0x51, 0x8d, 0x60, 0xc3, 0x40, 0xf6, 0xba, 0xc7, 0xd2, 0x78, 0xca, 0x08, 0xd8, 0xa6, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5099 = { .name = "ecdsa_secp256k1_sha256_5099", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5099_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5099_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5099_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 143 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5100 for ECDSA, tcId is 144 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5100_pubkey[] = { 0x72, 0xd4, 0xa1, 0x9c, 0x4f, 0x9d, 0x2c, 0xf5, 0x84, 0x8e, 0xa4, 0x04, 0x45, 0xb7, 0x0d, 0x46, 0x96, 0xb5, 0xf0, 0x2d, 0x63, 0x2c, 0x0c, 0x65, 0x4c, 0xc7, 0xd7, 0xee, 0xb0, 0xc6, 0xd0, 0x58, 0xe8, 0xc4, 0xcd, 0x99, 0x43, 0xe4, 0x59, 0x17, 0x4c, 0x7a, 0xc0, 0x1f, 0xa7, 0x42, 0x19, 0x8e, 0x47, 0xe6, 0xc1, 0x9a, 0x6b, 0xdb, 0x0c, 0x4f, 0x6c, 0x23, 0x78, 0x31, 0xc1, 0xb3, 0xf9, 0x42, }; static const unsigned char ecdsa_secp256k1_sha256_5100_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5100_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x5b, 0x1d, 0x27, 0xa7, 0x69, 0x4c, 0x14, 0x62, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9d, 0x9e, 0xf3, 0xb9, 0xfb, 0x58, 0x38, 0x54, 0x18, 0xd9, 0xc9, 0x82, 0x10, 0x50, 0x77, 0xd1, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5100 = { .name = "ecdsa_secp256k1_sha256_5100", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5100_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5100_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5100_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 144 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5101 for ECDSA, tcId is 145 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5101_pubkey[] = { 0x2a, 0x8e, 0xa2, 0xf5, 0x0d, 0xcc, 0xed, 0x0c, 0x21, 0x75, 0x75, 0xbd, 0xfa, 0x7c, 0xd4, 0x7d, 0x1c, 0x6f, 0x10, 0x00, 0x41, 0xec, 0x0e, 0x35, 0x51, 0x27, 0x94, 0xc1, 0xbe, 0x7e, 0x74, 0x02, 0x58, 0xf8, 0xc1, 0x71, 0x22, 0xed, 0x30, 0x3f, 0xda, 0x71, 0x43, 0xeb, 0x58, 0xbe, 0xde, 0x70, 0x29, 0x5b, 0x65, 0x32, 0x66, 0x01, 0x3b, 0x0b, 0x0e, 0xbd, 0x3f, 0x05, 0x31, 0x37, 0xf6, 0xec, }; static const unsigned char ecdsa_secp256k1_sha256_5101_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5101_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xd2, 0x7a, 0x76, 0x94, 0xc1, 0x46, 0x24, 0x4a, 0x5a, 0xd0, 0xbd, 0x06, 0x36, 0xd9, 0xe1, 0x2a, 0xbe, 0x68, 0x78, 0x97, 0xe8, 0xe9, 0x99, 0x8d, 0xdb, 0xd4, 0xe5, 0x9a, 0x78, 0x52, 0x0d, 0x0f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5101 = { .name = "ecdsa_secp256k1_sha256_5101", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5101_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5101_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5101_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 145 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5102 for ECDSA, tcId is 146 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5102_pubkey[] = { 0x88, 0xde, 0x68, 0x9c, 0xe9, 0xaf, 0x1e, 0x94, 0xbe, 0x6a, 0x20, 0x89, 0xc8, 0xa8, 0xb1, 0x25, 0x3f, 0xfd, 0xbb, 0x6c, 0x8e, 0x9c, 0x86, 0x24, 0x9b, 0xa2, 0x20, 0x00, 0x1a, 0x4a, 0xd3, 0xb8, 0x0c, 0x49, 0x98, 0xe5, 0x48, 0x42, 0xf4, 0x13, 0xb9, 0xed, 0xb1, 0x82, 0x5a, 0xcb, 0xb6, 0x33, 0x5e, 0x81, 0xe4, 0xd1, 0x84, 0xb2, 0xb0, 0x1c, 0x8b, 0xeb, 0xdc, 0x85, 0xd1, 0xf2, 0x89, 0x46, }; static const unsigned char ecdsa_secp256k1_sha256_5102_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5102_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xa4, 0xf4, 0xed, 0x29, 0x82, 0x8c, 0x48, 0x94, 0xb5, 0xa1, 0x7a, 0x0c, 0x6d, 0xb3, 0xc2, 0x56, 0xc2, 0x22, 0x14, 0x49, 0x22, 0x8a, 0x92, 0xdf, 0xf7, 0xd7, 0x6c, 0xa8, 0x20, 0x6d, 0xd8, 0xdd, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5102 = { .name = "ecdsa_secp256k1_sha256_5102", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5102_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5102_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5102_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 146 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5103 for ECDSA, tcId is 147 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5103_pubkey[] = { 0xfe, 0xa2, 0xd3, 0x1f, 0x70, 0xf9, 0x0d, 0x5f, 0xb3, 0xe0, 0x0e, 0x18, 0x6a, 0xc4, 0x2a, 0xb3, 0xc1, 0x61, 0x5c, 0xee, 0x71, 0x4e, 0x0b, 0x4e, 0x11, 0x31, 0xb3, 0xd4, 0xd8, 0x22, 0x5b, 0xf7, 0xb0, 0x37, 0xa1, 0x8d, 0xf2, 0xac, 0x15, 0x34, 0x3f, 0x30, 0xf7, 0x40, 0x67, 0xdd, 0xf2, 0x9e, 0x81, 0x7d, 0x5f, 0x77, 0xf8, 0xdc, 0xe0, 0x57, 0x14, 0xda, 0x59, 0xc0, 0x94, 0xf0, 0xcd, 0xa9, }; static const unsigned char ecdsa_secp256k1_sha256_5103_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5103_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x69, 0x4c, 0x14, 0x62, 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x09, 0xe6, 0x0e, 0x68, 0xb9, 0x0d, 0x0b, 0x5e, 0x6c, 0x5d, 0xdd, 0xd0, 0xcb, 0x69, 0x4d, 0x87, 0x99, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5103 = { .name = "ecdsa_secp256k1_sha256_5103", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5103_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5103_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5103_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 147 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5104 for ECDSA, tcId is 148 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5104_pubkey[] = { 0x72, 0x58, 0x91, 0x1e, 0x3d, 0x42, 0x33, 0x49, 0x16, 0x64, 0x79, 0xdb, 0xe0, 0xb8, 0x34, 0x1a, 0xf7, 0xfb, 0xd0, 0x3d, 0x0a, 0x7e, 0x10, 0xed, 0xcc, 0xb3, 0x6b, 0x6c, 0xee, 0xa5, 0xa3, 0xdb, 0x17, 0xac, 0x2b, 0x89, 0x92, 0x79, 0x11, 0x28, 0xfa, 0x3b, 0x96, 0xdc, 0x2f, 0xbd, 0x4c, 0xa3, 0xbf, 0xa7, 0x82, 0xef, 0x28, 0x32, 0xfc, 0x66, 0x56, 0x94, 0x3d, 0xb1, 0x8e, 0x73, 0x46, 0xb0, }; static const unsigned char ecdsa_secp256k1_sha256_5104_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5104_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x3d, 0x7f, 0x48, 0x7c, 0x07, 0xbf, 0xc5, 0xf3, 0x08, 0x46, 0x93, 0x8a, 0x3d, 0xce, 0xf6, 0x96, 0x44, 0x47, 0x07, 0xcf, 0x96, 0x77, 0x25, 0x4a, 0x92, 0xb0, 0x6c, 0x63, 0xab, 0x86, 0x7d, 0x22, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5104 = { .name = "ecdsa_secp256k1_sha256_5104", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5104_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5104_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5104_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 148 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5105 for ECDSA, tcId is 149 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5105_pubkey[] = { 0x4f, 0x28, 0x46, 0x1d, 0xea, 0x64, 0x47, 0x4d, 0x6b, 0xb3, 0x4d, 0x14, 0x99, 0xc9, 0x7d, 0x37, 0xb9, 0xe9, 0x56, 0x33, 0xdf, 0x1c, 0xee, 0xea, 0xac, 0xd4, 0x50, 0x16, 0xc9, 0x8b, 0x39, 0x14, 0xc8, 0x81, 0x88, 0x10, 0xb8, 0xcc, 0x06, 0xdd, 0xb4, 0x0e, 0x8a, 0x12, 0x61, 0xc5, 0x28, 0xfa, 0xa5, 0x89, 0x45, 0x5d, 0x5a, 0x6d, 0xf9, 0x3b, 0x77, 0xbc, 0x5e, 0x0e, 0x49, 0x3c, 0x74, 0x70, }; static const unsigned char ecdsa_secp256k1_sha256_5105_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5105_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x6c, 0x76, 0x48, 0xfc, 0x0f, 0xbf, 0x8a, 0x06, 0xad, 0xb8, 0xb8, 0x39, 0xf9, 0x7b, 0x4f, 0xf7, 0xa8, 0x00, 0xf1, 0x1b, 0x1e, 0x37, 0xc5, 0x93, 0xb2, 0x61, 0x39, 0x45, 0x99, 0x79, 0x2b, 0xa4, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5105 = { .name = "ecdsa_secp256k1_sha256_5105", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5105_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5105_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5105_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 149 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5106 for ECDSA, tcId is 150 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5106_pubkey[] = { 0x74, 0xf2, 0xa8, 0x14, 0xfb, 0x5d, 0x8e, 0xca, 0x91, 0xa6, 0x9b, 0x5e, 0x60, 0x71, 0x27, 0x32, 0xb3, 0x93, 0x7d, 0xe3, 0x28, 0x29, 0xbe, 0x97, 0x4e, 0xd7, 0xb6, 0x8c, 0x5c, 0x2f, 0x5d, 0x66, 0xef, 0xf0, 0xf0, 0x7c, 0x56, 0xf9, 0x87, 0xa6, 0x57, 0xf4, 0x21, 0x96, 0x20, 0x5f, 0x58, 0x8c, 0x0f, 0x1d, 0x96, 0xfd, 0x8a, 0x63, 0xa5, 0xf2, 0x38, 0xb4, 0x8f, 0x47, 0x87, 0x88, 0xfe, 0x3b, }; static const unsigned char ecdsa_secp256k1_sha256_5106_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5106_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x9b, 0xe3, 0x63, 0xa2, 0x86, 0xf2, 0x3f, 0x63, 0x22, 0xc2, 0x05, 0x44, 0x9d, 0x32, 0x0b, 0xaa, 0xd4, 0x17, 0x95, 0x3e, 0xcb, 0x70, 0xf6, 0x21, 0x4e, 0x90, 0xd4, 0x9d, 0x7d, 0x1f, 0x26, 0xa8, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5106 = { .name = "ecdsa_secp256k1_sha256_5106", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5106_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5106_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5106_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 150 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5107 for ECDSA, tcId is 151 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5107_pubkey[] = { 0x19, 0x5b, 0x51, 0xa7, 0xcc, 0x4a, 0x21, 0xb8, 0x27, 0x4a, 0x70, 0xa9, 0x0d, 0xe7, 0x79, 0x81, 0x4c, 0x3c, 0x8c, 0xa3, 0x58, 0x32, 0x82, 0x08, 0xc0, 0x9a, 0x29, 0xf3, 0x36, 0xb8, 0x2d, 0x6a, 0xb2, 0x41, 0x6b, 0x7c, 0x92, 0xff, 0xfd, 0xc2, 0x9c, 0x3b, 0x12, 0x82, 0xdd, 0x2a, 0x77, 0xa4, 0xd0, 0x4d, 0xf7, 0xf7, 0x45, 0x20, 0x47, 0x39, 0x3d, 0x84, 0x99, 0x89, 0xc5, 0xce, 0xe9, 0xad, }; static const unsigned char ecdsa_secp256k1_sha256_5107_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5107_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x29, 0x79, 0x8c, 0x5c, 0x45, 0xbd, 0xf5, 0x8b, 0x4a, 0x7b, 0x2f, 0xdc, 0x2c, 0x46, 0xab, 0x4a, 0xf1, 0x21, 0x8c, 0x7e, 0xeb, 0x9f, 0x0f, 0x27, 0xa8, 0x8f, 0x12, 0x67, 0x67, 0x4d, 0xe3, 0xb0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5107 = { .name = "ecdsa_secp256k1_sha256_5107", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5107_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5107_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5107_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 151 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5108 for ECDSA, tcId is 152 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5108_pubkey[] = { 0x62, 0x2f, 0xc7, 0x47, 0x32, 0x03, 0x4b, 0xec, 0x2d, 0xdf, 0x3b, 0xc1, 0x6d, 0x34, 0xb3, 0xd1, 0xf7, 0xa3, 0x27, 0xdd, 0x2a, 0x8c, 0x19, 0xba, 0xb4, 0xbb, 0x4f, 0xe3, 0xa2, 0x4b, 0x58, 0xaa, 0x73, 0x6b, 0x2f, 0x2f, 0xae, 0x76, 0xf4, 0xdf, 0xae, 0xcc, 0x90, 0x96, 0x33, 0x3b, 0x01, 0x32, 0x8d, 0x51, 0xeb, 0x3f, 0xda, 0x9c, 0x92, 0x27, 0xe9, 0x0d, 0x0b, 0x44, 0x99, 0x83, 0xc4, 0xf0, }; static const unsigned char ecdsa_secp256k1_sha256_5108_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5108_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x0b, 0x70, 0xf2, 0x2c, 0xa2, 0xbb, 0x3c, 0xef, 0xad, 0xca, 0x1a, 0x57, 0x11, 0xfa, 0x3a, 0x59, 0xf4, 0x69, 0x53, 0x85, 0xeb, 0x5a, 0xed, 0xf3, 0x49, 0x5d, 0x0b, 0x6d, 0x00, 0xf8, 0xfd, 0x85, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5108 = { .name = "ecdsa_secp256k1_sha256_5108", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5108_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5108_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5108_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 152 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5109 for ECDSA, tcId is 153 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5109_pubkey[] = { 0x1f, 0x7f, 0x85, 0xca, 0xf2, 0xd7, 0x55, 0x0e, 0x7a, 0xf9, 0xb6, 0x50, 0x23, 0xeb, 0xb4, 0xdc, 0xe3, 0x45, 0x03, 0x11, 0x69, 0x23, 0x09, 0xdb, 0x26, 0x99, 0x69, 0xb8, 0x34, 0xb6, 0x11, 0xc7, 0x08, 0x27, 0xf4, 0x5b, 0x78, 0x02, 0x0e, 0xcb, 0xba, 0xf4, 0x84, 0xfd, 0xd5, 0xbf, 0xaa, 0xe6, 0x87, 0x0f, 0x11, 0x84, 0xc2, 0x15, 0x81, 0xba, 0xf6, 0xef, 0x82, 0xbd, 0x7b, 0x53, 0x0f, 0x93, }; static const unsigned char ecdsa_secp256k1_sha256_5109_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5109_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x16, 0xe1, 0xe4, 0x59, 0x45, 0x76, 0x79, 0xdf, 0x5b, 0x94, 0x34, 0xae, 0x23, 0xf4, 0x74, 0xb3, 0xe8, 0xd2, 0xa7, 0x0b, 0xd6, 0xb5, 0xdb, 0xe6, 0x92, 0xba, 0x16, 0xda, 0x01, 0xf1, 0xfb, 0x0a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5109 = { .name = "ecdsa_secp256k1_sha256_5109", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5109_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5109_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5109_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 153 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5110 for ECDSA, tcId is 154 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5110_pubkey[] = { 0x49, 0xc1, 0x97, 0xdc, 0x80, 0xad, 0x1d, 0xa4, 0x7a, 0x43, 0x42, 0xb9, 0x38, 0x93, 0xe8, 0xe1, 0xfb, 0x0b, 0xb9, 0x4f, 0xc3, 0x3a, 0x83, 0xe7, 0x83, 0xc0, 0x0b, 0x24, 0xc7, 0x81, 0x37, 0x7a, 0xef, 0xc2, 0x0d, 0xa9, 0x2b, 0xac, 0x76, 0x29, 0x51, 0xf7, 0x24, 0x74, 0xbe, 0xcc, 0x73, 0x4d, 0x4c, 0xc2, 0x2b, 0xa8, 0x1b, 0x89, 0x5e, 0x28, 0x2f, 0xda, 0xc4, 0xdf, 0x7a, 0xf0, 0xf3, 0x7d, }; static const unsigned char ecdsa_secp256k1_sha256_5110_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5110_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x22, 0x52, 0xd6, 0x85, 0xe8, 0x31, 0xb6, 0xcf, 0x09, 0x5e, 0x4f, 0x05, 0x35, 0xee, 0xaf, 0x0d, 0xdd, 0x3b, 0xfa, 0x91, 0xc2, 0x10, 0xc9, 0xd9, 0xdc, 0x17, 0x22, 0x47, 0x02, 0xea, 0xf8, 0x8f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5110 = { .name = "ecdsa_secp256k1_sha256_5110", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5110_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5110_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5110_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 154 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5111 for ECDSA, tcId is 155 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5111_pubkey[] = { 0xd8, 0xcb, 0x68, 0x51, 0x7b, 0x61, 0x6a, 0x56, 0x40, 0x0a, 0xa3, 0x86, 0x86, 0x35, 0xe5, 0x4b, 0x6f, 0x69, 0x95, 0x98, 0xa2, 0xf6, 0x16, 0x77, 0x57, 0x65, 0x49, 0x80, 0xba, 0xf6, 0xac, 0xbe, 0x7e, 0xc8, 0xcf, 0x44, 0x9c, 0x84, 0x9a, 0xa0, 0x34, 0x61, 0xa3, 0x0e, 0xfa, 0xda, 0x41, 0x45, 0x3c, 0x57, 0xc6, 0xe6, 0xfb, 0xc9, 0x3b, 0xbc, 0x6f, 0xa4, 0x9a, 0xda, 0x6d, 0xc0, 0x55, 0x5c, }; static const unsigned char ecdsa_secp256k1_sha256_5111_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5111_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x75, 0x13, 0x5a, 0xbd, 0x7c, 0x42, 0x5b, 0x60, 0x37, 0x1a, 0x47, 0x7f, 0x09, 0xce, 0x0f, 0x27, 0x4f, 0x64, 0xa8, 0xc6, 0xb0, 0x61, 0xa0, 0x7b, 0x5d, 0x63, 0xe9, 0x3c, 0x65, 0x04, 0x6c, 0x53, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5111 = { .name = "ecdsa_secp256k1_sha256_5111", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5111_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5111_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5111_sig, .siglen = 64, .result = 1, .comment = "edge case for u1, tcId is 155 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5112 for ECDSA, tcId is 156 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5112_pubkey[] = { 0x03, 0x07, 0x13, 0xfb, 0x63, 0xf2, 0xaa, 0x6f, 0xe2, 0xca, 0xdf, 0x1b, 0x20, 0xef, 0xc2, 0x59, 0xc7, 0x74, 0x45, 0xda, 0xfa, 0x87, 0xda, 0xc3, 0x98, 0xb8, 0x40, 0x65, 0xca, 0x34, 0x7d, 0xf3, 0xb2, 0x27, 0x81, 0x8d, 0xe1, 0xa3, 0x9b, 0x58, 0x9c, 0xb0, 0x71, 0xd8, 0x3e, 0x53, 0x17, 0xcc, 0xcd, 0xc2, 0x33, 0x8e, 0x51, 0xe3, 0x12, 0xfe, 0x31, 0xd8, 0xdc, 0x34, 0xa4, 0x80, 0x17, 0x50, }; static const unsigned char ecdsa_secp256k1_sha256_5112_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5112_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xd5, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0x7c, 0x74, 0x93, 0x44, 0x74, 0xdb, 0x15, 0x7d, 0x2a, 0x8c, 0x3f, 0x08, 0x8a, 0xce, 0xd6, 0x2a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5112 = { .name = "ecdsa_secp256k1_sha256_5112", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5112_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5112_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5112_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 156 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5113 for ECDSA, tcId is 157 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5113_pubkey[] = { 0xba, 0xbb, 0x36, 0x77, 0xb0, 0x95, 0x58, 0x02, 0xd8, 0xe9, 0x29, 0xa4, 0x13, 0x55, 0x64, 0x0e, 0xaf, 0x1e, 0xa1, 0x35, 0x3f, 0x8a, 0x77, 0x13, 0x31, 0xc4, 0x94, 0x6e, 0x34, 0x80, 0xaf, 0xa7, 0x25, 0x2f, 0x19, 0x6c, 0x87, 0xed, 0x3d, 0x2a, 0x59, 0xd3, 0xb1, 0xb5, 0x59, 0x13, 0x7f, 0xed, 0x00, 0x13, 0xfe, 0xce, 0xfc, 0x19, 0xfb, 0x5a, 0x92, 0x68, 0x2b, 0x9b, 0xca, 0x51, 0xb9, 0x50, }; static const unsigned char ecdsa_secp256k1_sha256_5113_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5113_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xc1, 0x77, 0x7c, 0x88, 0x53, 0x93, 0x8e, 0x53, 0x62, 0x13, 0xc0, 0x24, 0x64, 0xa9, 0x36, 0x00, 0x0b, 0xa1, 0xe2, 0x1c, 0x0f, 0xc6, 0x20, 0x75, 0xd4, 0x6c, 0x62, 0x4e, 0x23, 0xb5, 0x2f, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5113 = { .name = "ecdsa_secp256k1_sha256_5113", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5113_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5113_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5113_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 157 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5114 for ECDSA, tcId is 158 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5114_pubkey[] = { 0x1a, 0xab, 0x20, 0x18, 0x79, 0x34, 0x71, 0x11, 0x1a, 0x8a, 0x0e, 0x9b, 0x14, 0x3f, 0xde, 0x02, 0xfc, 0x95, 0x92, 0x07, 0x96, 0xd3, 0xa6, 0x3d, 0xe3, 0x29, 0xb4, 0x24, 0x39, 0x6f, 0xba, 0x60, 0xbb, 0xe4, 0x13, 0x07, 0x05, 0x17, 0x47, 0x92, 0x44, 0x1b, 0x31, 0x8d, 0x3a, 0xa3, 0x1d, 0xfe, 0x85, 0x77, 0x82, 0x1e, 0x9b, 0x44, 0x6e, 0xc5, 0x73, 0xd2, 0x72, 0xe0, 0x36, 0xc4, 0xeb, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5114_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5114_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x30, 0xbb, 0xb7, 0x94, 0xdb, 0x58, 0x83, 0x63, 0xb4, 0x06, 0x79, 0xf6, 0xc1, 0x82, 0xa5, 0x0d, 0x3c, 0xe9, 0x67, 0x9a, 0xcd, 0xd3, 0xff, 0xbe, 0x36, 0xd7, 0x81, 0x3d, 0xac, 0xbd, 0xc8, 0x18, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5114 = { .name = "ecdsa_secp256k1_sha256_5114", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5114_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5114_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5114_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 158 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5115 for ECDSA, tcId is 159 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5115_pubkey[] = { 0x8c, 0xb0, 0xb9, 0x09, 0x49, 0x9c, 0x83, 0xea, 0x80, 0x6c, 0xd8, 0x85, 0xb1, 0xdd, 0x46, 0x7a, 0x01, 0x19, 0xf0, 0x6a, 0x88, 0xa0, 0x27, 0x6e, 0xb0, 0xcf, 0xda, 0x27, 0x45, 0x35, 0xa8, 0xff, 0x47, 0xb5, 0x42, 0x88, 0x33, 0xbc, 0x3f, 0x2c, 0x8b, 0xf9, 0xd9, 0x04, 0x11, 0x58, 0xcf, 0x33, 0x71, 0x8a, 0x69, 0x96, 0x1c, 0xd0, 0x17, 0x29, 0xbc, 0x00, 0x11, 0xd1, 0xe5, 0x86, 0xab, 0x75, }; static const unsigned char ecdsa_secp256k1_sha256_5115_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5115_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x2c, 0x37, 0xfd, 0x99, 0x56, 0x22, 0xc4, 0xfb, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0xce, 0xe7, 0x45, 0x11, 0x0c, 0xb4, 0x5a, 0xb5, 0x58, 0xed, 0x7c, 0x90, 0xc1, 0x5a, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5115 = { .name = "ecdsa_secp256k1_sha256_5115", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5115_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5115_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5115_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 159 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5116 for ECDSA, tcId is 160 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5116_pubkey[] = { 0x8f, 0x03, 0xcf, 0x1a, 0x42, 0x27, 0x2b, 0xb1, 0x53, 0x27, 0x23, 0x09, 0x3f, 0x72, 0xe6, 0xfe, 0xea, 0xc8, 0x5e, 0x17, 0x00, 0xe9, 0xfb, 0xe9, 0xa6, 0xa2, 0xdd, 0x64, 0x2d, 0x74, 0xbf, 0x5d, 0x3b, 0x89, 0xa7, 0x18, 0x9d, 0xad, 0x8c, 0xf7, 0x5f, 0xc2, 0x2f, 0x6f, 0x15, 0x8a, 0xa2, 0x7f, 0x9c, 0x2c, 0xa0, 0x0d, 0xac, 0xa7, 0x85, 0xbe, 0x33, 0x58, 0xf2, 0xbd, 0xa3, 0x86, 0x2c, 0xa0, }; static const unsigned char ecdsa_secp256k1_sha256_5116_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5116_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x7f, 0xd9, 0x95, 0x62, 0x2c, 0x4f, 0xb7, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5d, 0x88, 0x3f, 0xfa, 0xb5, 0xb3, 0x26, 0x52, 0xcc, 0xdc, 0xaa, 0x29, 0x0f, 0xcc, 0xb9, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5116 = { .name = "ecdsa_secp256k1_sha256_5116", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5116_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5116_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5116_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 160 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5117 for ECDSA, tcId is 161 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5117_pubkey[] = { 0x44, 0xde, 0x3b, 0x9c, 0x7a, 0x57, 0xa8, 0xc9, 0xe8, 0x20, 0x95, 0x27, 0x53, 0x42, 0x1e, 0x7d, 0x98, 0x7b, 0xb3, 0xd7, 0x9f, 0x71, 0xf0, 0x13, 0x80, 0x5c, 0x89, 0x7e, 0x01, 0x8f, 0x8a, 0xce, 0xa2, 0x46, 0x07, 0x58, 0xc8, 0xf9, 0x8d, 0x3f, 0xdc, 0xe1, 0x21, 0xa9, 0x43, 0x65, 0x9e, 0x37, 0x2c, 0x32, 0x6f, 0xff, 0x2e, 0x5f, 0xc2, 0xae, 0x7f, 0xa3, 0xf7, 0x9d, 0xaa, 0xe1, 0x3c, 0x12, }; static const unsigned char ecdsa_secp256k1_sha256_5117_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5117_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xff, 0xb3, 0x2a, 0xc4, 0x58, 0x9f, 0x6f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xbb, 0x10, 0x7f, 0xf5, 0x6b, 0x66, 0x4c, 0xa5, 0x99, 0xb9, 0x54, 0x52, 0x1f, 0x99, 0x72, 0xfa, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5117 = { .name = "ecdsa_secp256k1_sha256_5117", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5117_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5117_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5117_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 161 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5118 for ECDSA, tcId is 162 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5118_pubkey[] = { 0x6f, 0xb8, 0xb2, 0xb4, 0x8e, 0x33, 0x03, 0x12, 0x68, 0xad, 0x6a, 0x51, 0x74, 0x84, 0xdc, 0x88, 0x39, 0xea, 0x90, 0xf6, 0x66, 0x9e, 0xa0, 0xc7, 0xac, 0x32, 0x33, 0xe2, 0xac, 0x31, 0x39, 0x4a, 0x0a, 0xc8, 0xbb, 0xe7, 0xf7, 0x3c, 0x2f, 0xf4, 0xdf, 0x99, 0x78, 0x72, 0x7a, 0xc1, 0xdf, 0xc2, 0xfd, 0x58, 0x64, 0x7d, 0x20, 0xf3, 0x1f, 0x99, 0x10, 0x53, 0x16, 0xb6, 0x46, 0x71, 0xf2, 0x04, }; static const unsigned char ecdsa_secp256k1_sha256_5118_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5118_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x56, 0x22, 0xc4, 0xfb, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x92, 0x8a, 0x8f, 0x1c, 0x7a, 0xc7, 0xbe, 0xc1, 0x80, 0x8b, 0x9f, 0x61, 0xc0, 0x1e, 0xc3, 0x27, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5118 = { .name = "ecdsa_secp256k1_sha256_5118", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5118_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5118_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5118_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 162 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5119 for ECDSA, tcId is 163 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5119_pubkey[] = { 0xbe, 0xa7, 0x11, 0x22, 0xa0, 0x48, 0x69, 0x3e, 0x90, 0x5f, 0xf6, 0x02, 0xb3, 0xcf, 0x9d, 0xd1, 0x8a, 0xf6, 0x9b, 0x9f, 0xc9, 0xd8, 0x43, 0x1d, 0x2b, 0x1d, 0xd2, 0x6b, 0x94, 0x2c, 0x95, 0xe6, 0xf4, 0x3c, 0x7b, 0x8b, 0x95, 0xeb, 0x62, 0x08, 0x2c, 0x12, 0xdb, 0x9d, 0xbd, 0xa7, 0xfe, 0x38, 0xe4, 0x5c, 0xbe, 0x4a, 0x48, 0x86, 0x90, 0x7f, 0xb8, 0x1b, 0xdb, 0x0c, 0x5e, 0xa9, 0x24, 0x6c, }; static const unsigned char ecdsa_secp256k1_sha256_5119_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5119_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x44, 0x10, 0x41, 0x04, 0x10, 0x41, 0x04, 0x10, 0x41, 0x04, 0x10, 0x41, 0x04, 0x10, 0x41, 0x03, 0xb8, 0x78, 0x53, 0xfd, 0x3b, 0x7d, 0x3f, 0x8e, 0x17, 0x51, 0x25, 0xb4, 0x38, 0x2f, 0x25, 0xed, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5119 = { .name = "ecdsa_secp256k1_sha256_5119", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5119_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5119_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5119_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 163 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5120 for ECDSA, tcId is 164 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5120_pubkey[] = { 0xda, 0x91, 0x8c, 0x73, 0x1b, 0xa0, 0x6a, 0x20, 0xcb, 0x94, 0xef, 0x33, 0xb7, 0x78, 0xe9, 0x81, 0xa4, 0x04, 0xa3, 0x05, 0xf1, 0x94, 0x1f, 0xe3, 0x36, 0x66, 0xb4, 0x5b, 0x03, 0x35, 0x31, 0x56, 0xe2, 0xbb, 0x26, 0x94, 0xf5, 0x75, 0xb4, 0x51, 0x83, 0xbe, 0x78, 0xe5, 0xc9, 0xb5, 0x21, 0x0b, 0xf3, 0xbf, 0x48, 0x8f, 0xd4, 0xc8, 0x29, 0x45, 0x16, 0xd8, 0x95, 0x72, 0xca, 0x4f, 0x53, 0x91, }; static const unsigned char ecdsa_secp256k1_sha256_5120_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5120_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x27, 0x39, 0xce, 0x73, 0x9c, 0xe7, 0x39, 0xce, 0x73, 0x9c, 0xe7, 0x39, 0xce, 0x73, 0x9c, 0xe7, 0x05, 0x56, 0x02, 0x98, 0xd1, 0xf2, 0xf0, 0x8d, 0xc4, 0x19, 0xac, 0x27, 0x3a, 0x5b, 0x54, 0xd9, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5120 = { .name = "ecdsa_secp256k1_sha256_5120", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5120_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5120_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5120_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 164 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5121 for ECDSA, tcId is 165 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5121_pubkey[] = { 0x30, 0x07, 0xe9, 0x2c, 0x39, 0x37, 0xda, 0xde, 0x79, 0x64, 0xdf, 0xa3, 0x5b, 0x0e, 0xff, 0x03, 0x1f, 0x7e, 0xb0, 0x2a, 0xed, 0x0a, 0x03, 0x14, 0x41, 0x11, 0x06, 0xcd, 0xeb, 0x70, 0xfe, 0x3d, 0x5a, 0x75, 0x46, 0xfc, 0x05, 0x52, 0x99, 0x7b, 0x20, 0xe3, 0xd6, 0xf4, 0x13, 0xe7, 0x5e, 0x2c, 0xb6, 0x6e, 0x11, 0x63, 0x22, 0x69, 0x71, 0x14, 0xb7, 0x9b, 0xac, 0x73, 0x4b, 0xfc, 0x4d, 0xc5, }; static const unsigned char ecdsa_secp256k1_sha256_5121_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5121_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xb7, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x77, 0x76, 0x88, 0xe6, 0xa1, 0xfe, 0x80, 0x8a, 0x97, 0xa3, 0x48, 0x67, 0x12, 0x22, 0xff, 0x16, 0xb8, 0x63, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5121 = { .name = "ecdsa_secp256k1_sha256_5121", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5121_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5121_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5121_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 165 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5122 for ECDSA, tcId is 166 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5122_pubkey[] = { 0x60, 0xe7, 0x34, 0xef, 0x56, 0x24, 0xd3, 0xcb, 0xf0, 0xdd, 0xd3, 0x75, 0x01, 0x1b, 0xd6, 0x63, 0xd6, 0xd6, 0xae, 0xbc, 0x64, 0x4e, 0xb5, 0x99, 0xfd, 0xf9, 0x8d, 0xbd, 0xcd, 0x18, 0xce, 0x9b, 0xd2, 0xd9, 0x0b, 0x3a, 0xc3, 0x1f, 0x13, 0x9a, 0xf8, 0x32, 0xcc, 0xcf, 0x6c, 0xcb, 0xbb, 0x2c, 0x6e, 0xa1, 0x1f, 0xa9, 0x73, 0x70, 0xdc, 0x99, 0x06, 0xda, 0x47, 0x4d, 0x7d, 0x8a, 0x75, 0x67, }; static const unsigned char ecdsa_secp256k1_sha256_5122_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5122_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x64, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x06, 0xdd, 0x3a, 0x19, 0xb8, 0xd5, 0xfb, 0x87, 0x52, 0x35, 0x96, 0x3c, 0x59, 0x3b, 0xd2, 0xd3, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5122 = { .name = "ecdsa_secp256k1_sha256_5122", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5122_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5122_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5122_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 166 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5123 for ECDSA, tcId is 167 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5123_pubkey[] = { 0x85, 0xa9, 0x00, 0xe9, 0x78, 0x58, 0xf6, 0x93, 0xc0, 0xb7, 0xdf, 0xa2, 0x61, 0xe3, 0x80, 0xda, 0xd6, 0xea, 0x04, 0x6d, 0x1f, 0x65, 0xdd, 0xee, 0xed, 0xd5, 0xf7, 0xd8, 0xaf, 0x0b, 0xa3, 0x37, 0x69, 0x74, 0x4d, 0x15, 0xad, 0xd4, 0xf6, 0xc0, 0xbc, 0x3b, 0x0d, 0xa2, 0xae, 0xc9, 0x3b, 0x34, 0xcb, 0x8c, 0x65, 0xf9, 0x34, 0x0d, 0xdf, 0x74, 0xe7, 0xb0, 0x00, 0x9e, 0xee, 0xcc, 0xce, 0x3c, }; static const unsigned char ecdsa_secp256k1_sha256_5123_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5123_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x95, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0x7c, 0x74, 0x93, 0x44, 0x74, 0xdb, 0x15, 0x7d, 0x2a, 0x8c, 0x3f, 0x08, 0x8a, 0xce, 0xd6, 0x2c, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5123 = { .name = "ecdsa_secp256k1_sha256_5123", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5123_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5123_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5123_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 167 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5124 for ECDSA, tcId is 168 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5124_pubkey[] = { 0x38, 0x06, 0x6f, 0x75, 0xd8, 0x8e, 0xfc, 0x4c, 0x93, 0xde, 0x36, 0xf4, 0x9e, 0x03, 0x7b, 0x23, 0x4c, 0xc1, 0x8b, 0x1d, 0xe5, 0x60, 0x87, 0x50, 0xa6, 0x2c, 0xab, 0x03, 0x45, 0x40, 0x10, 0x46, 0xa3, 0xe8, 0x4b, 0xed, 0x8c, 0xfc, 0xb8, 0x19, 0xef, 0x4d, 0x55, 0x04, 0x44, 0xf2, 0xce, 0x4b, 0x65, 0x17, 0x66, 0xb6, 0x9e, 0x2e, 0x29, 0x01, 0xf8, 0x88, 0x36, 0xff, 0x90, 0x03, 0x4f, 0xed, }; static const unsigned char ecdsa_secp256k1_sha256_5124_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5124_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x2a, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0x3e, 0x3a, 0x49, 0xa2, 0x3a, 0x6d, 0x8a, 0xbe, 0x95, 0x46, 0x1f, 0x84, 0x45, 0x67, 0x6b, 0x17, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5124 = { .name = "ecdsa_secp256k1_sha256_5124", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5124_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5124_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5124_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 168 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5125 for ECDSA, tcId is 169 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5125_pubkey[] = { 0x98, 0xf6, 0x81, 0x77, 0xdc, 0x95, 0xc1, 0xb4, 0xcb, 0xfa, 0x52, 0x45, 0x48, 0x8c, 0xa5, 0x23, 0xa7, 0xd5, 0x62, 0x94, 0x70, 0xd0, 0x35, 0xd6, 0x21, 0xa4, 0x43, 0xc7, 0x2f, 0x39, 0xaa, 0xbf, 0xa3, 0x3d, 0x29, 0x54, 0x6f, 0xa1, 0xc6, 0x48, 0xf2, 0xc7, 0xd5, 0xcc, 0xf7, 0x0c, 0xf1, 0xce, 0x4a, 0xb7, 0x9b, 0x5d, 0xb1, 0xac, 0x05, 0x9d, 0xbe, 0xcd, 0x06, 0x8d, 0xbd, 0xff, 0x1b, 0x89, }; static const unsigned char ecdsa_secp256k1_sha256_5125_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5125_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0xbf, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x43, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5125 = { .name = "ecdsa_secp256k1_sha256_5125", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5125_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5125_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5125_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 169 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5126 for ECDSA, tcId is 170 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5126_pubkey[] = { 0x5c, 0x2b, 0xbf, 0xa2, 0x3c, 0x9b, 0x9a, 0xd0, 0x7f, 0x03, 0x8a, 0xa8, 0x9b, 0x49, 0x30, 0xbf, 0x26, 0x7d, 0x94, 0x01, 0xe4, 0x25, 0x5d, 0xe9, 0xe8, 0xda, 0x0a, 0x50, 0x78, 0xec, 0x82, 0x77, 0xe3, 0xe8, 0x82, 0xa3, 0x1d, 0x5e, 0x6a, 0x37, 0x9e, 0x07, 0x93, 0x98, 0x3c, 0xcd, 0xed, 0x39, 0xb9, 0x5c, 0x43, 0x53, 0xab, 0x2f, 0xf0, 0x1e, 0xa5, 0x36, 0x9b, 0xa4, 0x7b, 0x0c, 0x31, 0x91, }; static const unsigned char ecdsa_secp256k1_sha256_5126_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5126_sig[] = { 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc, 0x18, 0x5d, 0xdb, 0xca, 0x6d, 0xac, 0x41, 0xb1, 0xda, 0x03, 0x3c, 0xfb, 0x60, 0xc1, 0x52, 0x86, 0x9e, 0x74, 0xb3, 0xcd, 0x66, 0xe9, 0xff, 0xdf, 0x1b, 0x6b, 0xc0, 0x9e, 0xd6, 0x5e, 0xe4, 0x0c, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5126 = { .name = "ecdsa_secp256k1_sha256_5126", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5126_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5126_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5126_sig, .siglen = 64, .result = 1, .comment = "edge case for u2, tcId is 170 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5127 for ECDSA, tcId is 171 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5127_pubkey[] = { 0x2e, 0xa7, 0x13, 0x34, 0x32, 0x33, 0x9c, 0x69, 0xd2, 0x7f, 0x9b, 0x26, 0x72, 0x81, 0xbd, 0x2d, 0xdd, 0x5f, 0x19, 0xd6, 0x33, 0x8d, 0x40, 0x0a, 0x05, 0xcd, 0x36, 0x47, 0xb1, 0x57, 0xa3, 0x85, 0x35, 0x47, 0x80, 0x82, 0x98, 0x44, 0x8e, 0xdb, 0x5e, 0x70, 0x1a, 0xde, 0x84, 0xcd, 0x5f, 0xb1, 0xac, 0x95, 0x67, 0xba, 0x5e, 0x8f, 0xb6, 0x8a, 0x6b, 0x93, 0x3e, 0xc4, 0xb5, 0xcc, 0x84, 0xcc, }; static const unsigned char ecdsa_secp256k1_sha256_5127_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5127_sig[] = { 0x32, 0xb0, 0xd1, 0x0d, 0x8d, 0x0e, 0x04, 0xbc, 0x8d, 0x4d, 0x06, 0x4d, 0x27, 0x06, 0x99, 0xe8, 0x7c, 0xff, 0xc9, 0xb4, 0x9c, 0x5c, 0x20, 0x73, 0x0e, 0x1c, 0x26, 0xf6, 0x10, 0x5d, 0xdc, 0xda, 0xd6, 0x12, 0xc2, 0x98, 0x4c, 0x2a, 0xfa, 0x41, 0x6a, 0xa7, 0xf2, 0x88, 0x2a, 0x48, 0x6d, 0x4a, 0x84, 0x26, 0xcb, 0x6c, 0xfc, 0x91, 0xed, 0x5b, 0x73, 0x72, 0x78, 0xf9, 0xfc, 0xa8, 0xbe, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5127 = { .name = "ecdsa_secp256k1_sha256_5127", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5127_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5127_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5127_sig, .siglen = 64, .result = 1, .comment = "point duplication during verification, tcId is 171 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5128 for ECDSA, tcId is 172 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5128_pubkey[] = { 0x2e, 0xa7, 0x13, 0x34, 0x32, 0x33, 0x9c, 0x69, 0xd2, 0x7f, 0x9b, 0x26, 0x72, 0x81, 0xbd, 0x2d, 0xdd, 0x5f, 0x19, 0xd6, 0x33, 0x8d, 0x40, 0x0a, 0x05, 0xcd, 0x36, 0x47, 0xb1, 0x57, 0xa3, 0x85, 0xca, 0xb8, 0x7f, 0x7d, 0x67, 0xbb, 0x71, 0x24, 0xa1, 0x8f, 0xe5, 0x21, 0x7b, 0x32, 0xa0, 0x4e, 0x53, 0x6a, 0x98, 0x45, 0xa1, 0x70, 0x49, 0x75, 0x94, 0x6c, 0xc1, 0x3a, 0x4a, 0x33, 0x77, 0x63, }; static const unsigned char ecdsa_secp256k1_sha256_5128_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5128_sig[] = { 0x32, 0xb0, 0xd1, 0x0d, 0x8d, 0x0e, 0x04, 0xbc, 0x8d, 0x4d, 0x06, 0x4d, 0x27, 0x06, 0x99, 0xe8, 0x7c, 0xff, 0xc9, 0xb4, 0x9c, 0x5c, 0x20, 0x73, 0x0e, 0x1c, 0x26, 0xf6, 0x10, 0x5d, 0xdc, 0xda, 0xd6, 0x12, 0xc2, 0x98, 0x4c, 0x2a, 0xfa, 0x41, 0x6a, 0xa7, 0xf2, 0x88, 0x2a, 0x48, 0x6d, 0x4a, 0x84, 0x26, 0xcb, 0x6c, 0xfc, 0x91, 0xed, 0x5b, 0x73, 0x72, 0x78, 0xf9, 0xfc, 0xa8, 0xbe, 0x68, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5128 = { .name = "ecdsa_secp256k1_sha256_5128", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5128_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5128_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5128_sig, .siglen = 64, .result = -1, .comment = "duplication bug, tcId is 172 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5129 for ECDSA, tcId is 173 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5129_pubkey[] = { 0x8a, 0xa2, 0xc6, 0x4f, 0xa9, 0xc6, 0x43, 0x75, 0x63, 0xab, 0xfb, 0xcb, 0xd0, 0x0b, 0x20, 0x48, 0xd4, 0x8c, 0x18, 0xc1, 0x52, 0xa2, 0xa6, 0xf4, 0x90, 0x36, 0xde, 0x76, 0x47, 0xeb, 0xe8, 0x2e, 0x1c, 0xe6, 0x43, 0x87, 0x99, 0x5c, 0x68, 0xa0, 0x60, 0xfa, 0x3b, 0xc0, 0x39, 0x9b, 0x05, 0xcc, 0x06, 0xee, 0xc7, 0xd5, 0x98, 0xf7, 0x50, 0x41, 0xa4, 0x91, 0x7e, 0x69, 0x2b, 0x7f, 0x51, 0xff, }; static const unsigned char ecdsa_secp256k1_sha256_5129_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5129_sig[] = { 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc0, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x33, 0x32, 0xf2, 0x22, 0xf8, 0xfa, 0xef, 0xdb, 0x53, 0x3f, 0x26, 0x5d, 0x46, 0x1c, 0x29, 0xa4, 0x73, 0x73, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5129 = { .name = "ecdsa_secp256k1_sha256_5129", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5129_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5129_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5129_sig, .siglen = 64, .result = -1, .comment = "comparison with point at infinity , tcId is 173 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5130 for ECDSA, tcId is 174 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5130_pubkey[] = { 0x39, 0x14, 0x27, 0xff, 0x7e, 0xe7, 0x80, 0x13, 0xc1, 0x4a, 0xec, 0x7d, 0x96, 0xa8, 0xa0, 0x62, 0x20, 0x92, 0x98, 0xa7, 0x83, 0x83, 0x5e, 0x94, 0xfd, 0x65, 0x49, 0xd5, 0x02, 0xff, 0xf7, 0x1f, 0xdd, 0x66, 0x24, 0xec, 0x34, 0x3a, 0xd9, 0xfc, 0xf4, 0xd9, 0x87, 0x21, 0x81, 0xe5, 0x9f, 0x84, 0x2f, 0x9b, 0xa4, 0xcc, 0xca, 0xe0, 0x9a, 0x6c, 0x09, 0x72, 0xfb, 0x6a, 0xc6, 0xb4, 0xc6, 0xbd, }; static const unsigned char ecdsa_secp256k1_sha256_5130_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5130_sig[] = { 0xc6, 0x04, 0x7f, 0x94, 0x41, 0xed, 0x7d, 0x6d, 0x30, 0x45, 0x40, 0x6e, 0x95, 0xc0, 0x7c, 0xd8, 0x5c, 0x77, 0x8e, 0x4b, 0x8c, 0xef, 0x3c, 0xa7, 0xab, 0xac, 0x09, 0xb9, 0x5c, 0x70, 0x9e, 0xe5, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5130 = { .name = "ecdsa_secp256k1_sha256_5130", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5130_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5130_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5130_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 174 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5131 for ECDSA, tcId is 175 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5131_pubkey[] = { 0xe7, 0x62, 0xb8, 0xa2, 0x19, 0xb4, 0xf1, 0x80, 0x21, 0x9c, 0xc7, 0xa9, 0x05, 0x92, 0x45, 0xe4, 0x96, 0x1b, 0xd1, 0x91, 0xc0, 0x38, 0x99, 0x78, 0x9c, 0x7a, 0x34, 0xb8, 0x9e, 0x8c, 0x13, 0x8e, 0xc1, 0x53, 0x3e, 0xf0, 0x41, 0x9b, 0xb7, 0x37, 0x6e, 0x0b, 0xfd, 0xe9, 0x31, 0x9d, 0x10, 0xa0, 0x69, 0x68, 0x79, 0x1d, 0x9e, 0xa0, 0xee, 0xd9, 0xc1, 0xce, 0x63, 0x45, 0xae, 0xd9, 0x75, 0x9e, }; static const unsigned char ecdsa_secp256k1_sha256_5131_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5131_sig[] = { 0xc6, 0x04, 0x7f, 0x94, 0x41, 0xed, 0x7d, 0x6d, 0x30, 0x45, 0x40, 0x6e, 0x95, 0xc0, 0x7c, 0xd8, 0x5c, 0x77, 0x8e, 0x4b, 0x8c, 0xef, 0x3c, 0xa7, 0xab, 0xac, 0x09, 0xb9, 0x5c, 0x70, 0x9e, 0xe5, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb5, 0xf3, 0x0f, 0x30, 0x12, 0x7d, 0x33, 0xe0, 0x2a, 0xad, 0x96, 0x43, 0x89, 0x27, 0x02, 0x2e, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5131 = { .name = "ecdsa_secp256k1_sha256_5131", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5131_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5131_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5131_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 175 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5132 for ECDSA, tcId is 176 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5132_pubkey[] = { 0x9a, 0xed, 0xb0, 0xd2, 0x81, 0xdb, 0x16, 0x4e, 0x13, 0x00, 0x00, 0xc5, 0x69, 0x7f, 0xae, 0x0f, 0x30, 0x5e, 0xf8, 0x48, 0xbe, 0x6f, 0xff, 0xb4, 0x3a, 0xc5, 0x93, 0xfb, 0xb9, 0x50, 0xe9, 0x52, 0xfa, 0x6f, 0x63, 0x33, 0x59, 0xbd, 0xcd, 0x82, 0xb5, 0x6b, 0x0b, 0x9f, 0x96, 0x5b, 0x03, 0x77, 0x89, 0xd4, 0x6b, 0x9a, 0x81, 0x41, 0xb7, 0x91, 0xb2, 0xae, 0xfa, 0x71, 0x3f, 0x96, 0xc1, 0x75, }; static const unsigned char ecdsa_secp256k1_sha256_5132_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5132_sig[] = { 0xc6, 0x04, 0x7f, 0x94, 0x41, 0xed, 0x7d, 0x6d, 0x30, 0x45, 0x40, 0x6e, 0x95, 0xc0, 0x7c, 0xd8, 0x5c, 0x77, 0x8e, 0x4b, 0x8c, 0xef, 0x3c, 0xa7, 0xab, 0xac, 0x09, 0xb9, 0x5c, 0x70, 0x9e, 0xe5, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x98, 0xd6, 0x68, 0xea, 0xf0, 0xcf, 0x91, 0xf9, 0xbd, 0x73, 0x17, 0xd2, 0x54, 0x7c, 0xed, 0x5a, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5132 = { .name = "ecdsa_secp256k1_sha256_5132", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5132_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5132_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5132_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 176 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5133 for ECDSA, tcId is 177 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5133_pubkey[] = { 0x8a, 0xd4, 0x45, 0xdb, 0x62, 0x81, 0x62, 0x60, 0xe4, 0xe6, 0x87, 0xfd, 0x18, 0x84, 0xe4, 0x8b, 0x9f, 0xc0, 0x63, 0x6d, 0x03, 0x15, 0x47, 0xd6, 0x33, 0x15, 0xe7, 0x92, 0xe1, 0x9b, 0xfa, 0xee, 0x1d, 0xe6, 0x4f, 0x99, 0xd5, 0xf1, 0xcd, 0x8b, 0x6e, 0xc9, 0xcb, 0x0f, 0x78, 0x7a, 0x65, 0x4a, 0xe8, 0x69, 0x93, 0xba, 0x3d, 0xb1, 0x00, 0x8e, 0xf4, 0x3c, 0xff, 0x06, 0x84, 0xcb, 0x22, 0xbd, }; static const unsigned char ecdsa_secp256k1_sha256_5133_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5133_sig[] = { 0xc6, 0x04, 0x7f, 0x94, 0x41, 0xed, 0x7d, 0x6d, 0x30, 0x45, 0x40, 0x6e, 0x95, 0xc0, 0x7c, 0xd8, 0x5c, 0x77, 0x8e, 0x4b, 0x8c, 0xef, 0x3c, 0xa7, 0xab, 0xac, 0x09, 0xb9, 0x5c, 0x70, 0x9e, 0xe5, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x65, 0xe4, 0x45, 0xf1, 0xf5, 0xdf, 0xb6, 0xa6, 0x7e, 0x4c, 0xba, 0x8c, 0x38, 0x53, 0x48, 0xe6, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5133 = { .name = "ecdsa_secp256k1_sha256_5133", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5133_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5133_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5133_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 177 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5134 for ECDSA, tcId is 178 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5134_pubkey[] = { 0x1f, 0x57, 0x99, 0xc9, 0x5b, 0xe8, 0x90, 0x63, 0xb2, 0x4f, 0x26, 0xe4, 0x0c, 0xb9, 0x28, 0xc1, 0xa8, 0x68, 0xa7, 0x6f, 0xb0, 0x09, 0x46, 0x07, 0xe8, 0x04, 0x3d, 0xb4, 0x09, 0xc9, 0x1c, 0x32, 0xe7, 0x57, 0x24, 0xe8, 0x13, 0xa4, 0x19, 0x1e, 0x3a, 0x83, 0x90, 0x07, 0xf0, 0x8e, 0x2e, 0x89, 0x73, 0x88, 0xb0, 0x6d, 0x4a, 0x00, 0xde, 0x6d, 0xe6, 0x0e, 0x53, 0x6d, 0x91, 0xfa, 0xb5, 0x66, }; static const unsigned char ecdsa_secp256k1_sha256_5134_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5134_sig[] = { 0xc6, 0x04, 0x7f, 0x94, 0x41, 0xed, 0x7d, 0x6d, 0x30, 0x45, 0x40, 0x6e, 0x95, 0xc0, 0x7c, 0xd8, 0x5c, 0x77, 0x8e, 0x4b, 0x8c, 0xef, 0x3c, 0xa7, 0xab, 0xac, 0x09, 0xb9, 0x5c, 0x70, 0x9e, 0xe5, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x48, 0xc7, 0x9f, 0xac, 0xd4, 0x32, 0x14, 0xc0, 0x11, 0x12, 0x3c, 0x1b, 0x03, 0xa9, 0x34, 0x12, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5134 = { .name = "ecdsa_secp256k1_sha256_5134", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5134_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5134_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5134_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 178 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5135 for ECDSA, tcId is 179 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5135_pubkey[] = { 0xa3, 0x33, 0x1a, 0x4e, 0x1b, 0x42, 0x23, 0xec, 0x2c, 0x02, 0x7e, 0xdd, 0x48, 0x2c, 0x92, 0x8a, 0x14, 0xed, 0x35, 0x8d, 0x93, 0xf1, 0xd4, 0x21, 0x7d, 0x39, 0xab, 0xf6, 0x9f, 0xcb, 0x5c, 0xcc, 0x28, 0xd6, 0x84, 0xd2, 0xaa, 0xab, 0xcd, 0x63, 0x83, 0x77, 0x5c, 0xaa, 0x62, 0x39, 0xde, 0x26, 0xd4, 0xc6, 0x93, 0x7b, 0xb6, 0x03, 0xec, 0xb4, 0x19, 0x60, 0x82, 0xf4, 0xcf, 0xfd, 0x50, 0x9d, }; static const unsigned char ecdsa_secp256k1_sha256_5135_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5135_sig[] = { 0xc6, 0x04, 0x7f, 0x94, 0x41, 0xed, 0x7d, 0x6d, 0x30, 0x45, 0x40, 0x6e, 0x95, 0xc0, 0x7c, 0xd8, 0x5c, 0x77, 0x8e, 0x4b, 0x8c, 0xef, 0x3c, 0xa7, 0xab, 0xac, 0x09, 0xb9, 0x5c, 0x70, 0x9e, 0xe5, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0x2f, 0x27, 0x53, 0x48, 0xd8, 0x2a, 0xd2, 0xe4, 0xd7, 0x94, 0x9c, 0x81, 0x93, 0x80, 0x0d, 0x8c, 0x9c, 0x75, 0xdf, 0x58, 0xe3, 0x43, 0xf0, 0xeb, 0xba, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5135 = { .name = "ecdsa_secp256k1_sha256_5135", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5135_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5135_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5135_sig, .siglen = 64, .result = 1, .comment = "extreme value for k, tcId is 179 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5136 for ECDSA, tcId is 180 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5136_pubkey[] = { 0x3f, 0x39, 0x52, 0x19, 0x97, 0x74, 0xc7, 0xcf, 0x39, 0xb3, 0x8b, 0x66, 0xcb, 0x10, 0x42, 0xa6, 0x26, 0x0d, 0x86, 0x80, 0x80, 0x38, 0x45, 0xe4, 0xd4, 0x33, 0xad, 0xba, 0x3b, 0xb2, 0x48, 0x18, 0x5e, 0xa4, 0x95, 0xb6, 0x8c, 0xbc, 0x7e, 0xd4, 0x17, 0x3e, 0xe6, 0x3c, 0x90, 0x42, 0xdc, 0x50, 0x26, 0x25, 0xc7, 0xeb, 0x7e, 0x21, 0xfb, 0x02, 0xca, 0x9a, 0x91, 0x14, 0xe0, 0xa3, 0xa1, 0x8d, }; static const unsigned char ecdsa_secp256k1_sha256_5136_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5136_sig[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x54, 0xe8, 0xe4, 0xf4, 0x4c, 0xe5, 0x18, 0x35, 0x69, 0x3f, 0xf0, 0xca, 0x2e, 0xf0, 0x12, 0x15, 0xc0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5136 = { .name = "ecdsa_secp256k1_sha256_5136", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5136_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5136_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5136_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and edgecase s, tcId is 180 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5137 for ECDSA, tcId is 181 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5137_pubkey[] = { 0xcd, 0xfb, 0x8c, 0x0f, 0x42, 0x2e, 0x14, 0x4e, 0x13, 0x7c, 0x24, 0x12, 0xc8, 0x6c, 0x17, 0x1f, 0x5f, 0xe3, 0xfa, 0x3f, 0x5b, 0xbb, 0x54, 0x4e, 0x90, 0x76, 0x28, 0x8f, 0x3c, 0xed, 0x78, 0x6e, 0x05, 0x4f, 0xd0, 0x72, 0x1b, 0x77, 0xc1, 0x1c, 0x79, 0xbe, 0xac, 0xb3, 0xc9, 0x42, 0x11, 0xb0, 0xa1, 0x9b, 0xda, 0x08, 0x65, 0x2e, 0xfe, 0xaf, 0x92, 0x51, 0x3a, 0x3b, 0x0a, 0x16, 0x36, 0x98, }; static const unsigned char ecdsa_secp256k1_sha256_5137_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5137_sig[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb6, 0xdb, 0x6d, 0xb5, 0xf3, 0x0f, 0x30, 0x12, 0x7d, 0x33, 0xe0, 0x2a, 0xad, 0x96, 0x43, 0x89, 0x27, 0x02, 0x2e, 0x9c, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5137 = { .name = "ecdsa_secp256k1_sha256_5137", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5137_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5137_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5137_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 181 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5138 for ECDSA, tcId is 182 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5138_pubkey[] = { 0x73, 0x59, 0x8a, 0x6a, 0x1c, 0x68, 0x27, 0x8f, 0xa6, 0xbf, 0xd0, 0xce, 0x40, 0x64, 0xe6, 0x82, 0x35, 0xbc, 0x1c, 0x0f, 0x6b, 0x20, 0xa9, 0x28, 0x10, 0x8b, 0xe3, 0x36, 0x73, 0x0f, 0x87, 0xe3, 0xcb, 0xae, 0x61, 0x25, 0x19, 0xb5, 0x03, 0x2e, 0xcc, 0x85, 0xae, 0xd8, 0x11, 0x27, 0x1a, 0x95, 0xfe, 0x79, 0x39, 0xd5, 0xd3, 0x46, 0x01, 0x40, 0xba, 0x31, 0x8f, 0x4d, 0x14, 0xab, 0xa3, 0x1d, }; static const unsigned char ecdsa_secp256k1_sha256_5138_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5138_sig[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x98, 0xd6, 0x68, 0xea, 0xf0, 0xcf, 0x91, 0xf9, 0xbd, 0x73, 0x17, 0xd2, 0x54, 0x7c, 0xed, 0x5a, 0x5a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5138 = { .name = "ecdsa_secp256k1_sha256_5138", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5138_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5138_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5138_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 182 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5139 for ECDSA, tcId is 183 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5139_pubkey[] = { 0x58, 0xde, 0xbd, 0x9a, 0x7e, 0xe2, 0xc9, 0xd5, 0x91, 0x32, 0x47, 0x8a, 0x54, 0x40, 0xae, 0x4d, 0x5d, 0x7e, 0xd4, 0x37, 0x30, 0x83, 0x69, 0xf9, 0x2e, 0xa8, 0x6c, 0x82, 0x18, 0x3f, 0x10, 0xa1, 0x67, 0x73, 0xe7, 0x6f, 0x5e, 0xdb, 0xf4, 0xda, 0x0e, 0x4f, 0x1b, 0xdf, 0xfa, 0xc0, 0xf5, 0x72, 0x57, 0xe1, 0xdf, 0xa4, 0x65, 0x84, 0x29, 0x31, 0x30, 0x9a, 0x24, 0x24, 0x5f, 0xda, 0x6a, 0x5d, }; static const unsigned char ecdsa_secp256k1_sha256_5139_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5139_sig[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, 0x65, 0xe4, 0x45, 0xf1, 0xf5, 0xdf, 0xb6, 0xa6, 0x7e, 0x4c, 0xba, 0x8c, 0x38, 0x53, 0x48, 0xe6, 0xe7, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5139 = { .name = "ecdsa_secp256k1_sha256_5139", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5139_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5139_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5139_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 183 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5140 for ECDSA, tcId is 184 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5140_pubkey[] = { 0x8b, 0x90, 0x4d, 0xe4, 0x79, 0x67, 0x34, 0x0c, 0x5f, 0x8c, 0x35, 0x72, 0xa7, 0x20, 0x92, 0x4e, 0xf7, 0x57, 0x86, 0x37, 0xfe, 0xab, 0x19, 0x49, 0xac, 0xb2, 0x41, 0xa5, 0xa6, 0xac, 0x3f, 0x5b, 0x95, 0x09, 0x04, 0x49, 0x6f, 0x98, 0x24, 0xb1, 0xd6, 0x3f, 0x33, 0x13, 0xba, 0xe2, 0x1b, 0x89, 0xfa, 0xe8, 0x9a, 0xfd, 0xfc, 0x81, 0x1b, 0x5e, 0xce, 0x03, 0xfd, 0x5a, 0xa3, 0x01, 0x86, 0x4f, }; static const unsigned char ecdsa_secp256k1_sha256_5140_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5140_sig[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x48, 0xc7, 0x9f, 0xac, 0xd4, 0x32, 0x14, 0xc0, 0x11, 0x12, 0x3c, 0x1b, 0x03, 0xa9, 0x34, 0x12, 0xa5, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5140 = { .name = "ecdsa_secp256k1_sha256_5140", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5140_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5140_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5140_sig, .siglen = 64, .result = 1, .comment = "extreme value for k and s^-1, tcId is 184 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5141 for ECDSA, tcId is 185 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5141_pubkey[] = { 0xf4, 0x89, 0x2b, 0x6d, 0x52, 0x5c, 0x77, 0x1e, 0x03, 0x5f, 0x2a, 0x25, 0x27, 0x08, 0xf3, 0x78, 0x4e, 0x48, 0x23, 0x86, 0x04, 0xb4, 0xf9, 0x4d, 0xc5, 0x6e, 0xaa, 0x1e, 0x54, 0x6d, 0x94, 0x1a, 0x34, 0x6b, 0x1a, 0xa0, 0xbc, 0xe6, 0x8b, 0x1c, 0x50, 0xe5, 0xb5, 0x2f, 0x50, 0x9f, 0xb5, 0x52, 0x2e, 0x5c, 0x25, 0xe0, 0x28, 0xbc, 0x8f, 0x86, 0x34, 0x02, 0xed, 0xb7, 0xbc, 0xad, 0x8b, 0x1b, }; static const unsigned char ecdsa_secp256k1_sha256_5141_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5141_sig[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x0e, 0xb1, 0x0e, 0x5a, 0xb9, 0x5f, 0x2f, 0x27, 0x53, 0x48, 0xd8, 0x2a, 0xd2, 0xe4, 0xd7, 0x94, 0x9c, 0x81, 0x93, 0x80, 0x0d, 0x8c, 0x9c, 0x75, 0xdf, 0x58, 0xe3, 0x43, 0xf0, 0xeb, 0xba, 0x7b, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5141 = { .name = "ecdsa_secp256k1_sha256_5141", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5141_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5141_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5141_sig, .siglen = 64, .result = 1, .comment = "extreme value for k, tcId is 185 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5142 for ECDSA, tcId is 186 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5142_pubkey[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x48, 0x3a, 0xda, 0x77, 0x26, 0xa3, 0xc4, 0x65, 0x5d, 0xa4, 0xfb, 0xfc, 0x0e, 0x11, 0x08, 0xa8, 0xfd, 0x17, 0xb4, 0x48, 0xa6, 0x85, 0x54, 0x19, 0x9c, 0x47, 0xd0, 0x8f, 0xfb, 0x10, 0xd4, 0xb8, }; static const unsigned char ecdsa_secp256k1_sha256_5142_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5142_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x63, 0xcf, 0xd6, 0x6a, 0x19, 0x0a, 0x60, 0x08, 0x89, 0x1e, 0x0d, 0x81, 0xd4, 0x9a, 0x09, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5142 = { .name = "ecdsa_secp256k1_sha256_5142", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5142_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5142_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5142_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 186 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5143 for ECDSA, tcId is 187 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5143_pubkey[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0x48, 0x3a, 0xda, 0x77, 0x26, 0xa3, 0xc4, 0x65, 0x5d, 0xa4, 0xfb, 0xfc, 0x0e, 0x11, 0x08, 0xa8, 0xfd, 0x17, 0xb4, 0x48, 0xa6, 0x85, 0x54, 0x19, 0x9c, 0x47, 0xd0, 0x8f, 0xfb, 0x10, 0xd4, 0xb8, }; static const unsigned char ecdsa_secp256k1_sha256_5143_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5143_sig[] = { 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdd, 0x5e, 0x1b, 0xba, 0x77, 0xf5, 0x23, 0x84, 0x21, 0x93, 0xb3, 0xb8, 0x2e, 0x44, 0x8e, 0x05, 0xd5, 0xf1, 0x1e, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x63, 0xcf, 0xd6, 0x6a, 0x19, 0x0a, 0x60, 0x08, 0x89, 0x1e, 0x0d, 0x81, 0xd4, 0x9a, 0x09, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5143 = { .name = "ecdsa_secp256k1_sha256_5143", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5143_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5143_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5143_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 187 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5144 for ECDSA, tcId is 188 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5144_pubkey[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0xb7, 0xc5, 0x25, 0x88, 0xd9, 0x5c, 0x3b, 0x9a, 0xa2, 0x5b, 0x04, 0x03, 0xf1, 0xee, 0xf7, 0x57, 0x02, 0xe8, 0x4b, 0xb7, 0x59, 0x7a, 0xab, 0xe6, 0x63, 0xb8, 0x2f, 0x6f, 0x04, 0xef, 0x27, 0x77, }; static const unsigned char ecdsa_secp256k1_sha256_5144_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5144_sig[] = { 0xbb, 0x5a, 0x52, 0xf4, 0x2f, 0x9c, 0x92, 0x61, 0xed, 0x43, 0x61, 0xf5, 0x94, 0x22, 0xa1, 0xe3, 0x00, 0x36, 0xe7, 0xc3, 0x2b, 0x27, 0x0c, 0x88, 0x07, 0xa4, 0x19, 0xfe, 0xca, 0x60, 0x50, 0x23, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x63, 0xcf, 0xd6, 0x6a, 0x19, 0x0a, 0x60, 0x08, 0x89, 0x1e, 0x0d, 0x81, 0xd4, 0x9a, 0x09, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5144 = { .name = "ecdsa_secp256k1_sha256_5144", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5144_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5144_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5144_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 188 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5145 for ECDSA, tcId is 189 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5145_pubkey[] = { 0x79, 0xbe, 0x66, 0x7e, 0xf9, 0xdc, 0xbb, 0xac, 0x55, 0xa0, 0x62, 0x95, 0xce, 0x87, 0x0b, 0x07, 0x02, 0x9b, 0xfc, 0xdb, 0x2d, 0xce, 0x28, 0xd9, 0x59, 0xf2, 0x81, 0x5b, 0x16, 0xf8, 0x17, 0x98, 0xb7, 0xc5, 0x25, 0x88, 0xd9, 0x5c, 0x3b, 0x9a, 0xa2, 0x5b, 0x04, 0x03, 0xf1, 0xee, 0xf7, 0x57, 0x02, 0xe8, 0x4b, 0xb7, 0x59, 0x7a, 0xab, 0xe6, 0x63, 0xb8, 0x2f, 0x6f, 0x04, 0xef, 0x27, 0x77, }; static const unsigned char ecdsa_secp256k1_sha256_5145_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5145_sig[] = { 0x44, 0xa5, 0xad, 0x0b, 0xd0, 0x63, 0x6d, 0x9e, 0x12, 0xbc, 0x9e, 0x0a, 0x6b, 0xdd, 0x5e, 0x1b, 0xba, 0x77, 0xf5, 0x23, 0x84, 0x21, 0x93, 0xb3, 0xb8, 0x2e, 0x44, 0x8e, 0x05, 0xd5, 0xf1, 0x1e, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x92, 0x49, 0x24, 0x63, 0xcf, 0xd6, 0x6a, 0x19, 0x0a, 0x60, 0x08, 0x89, 0x1e, 0x0d, 0x81, 0xd4, 0x9a, 0x09, 0x52, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5145 = { .name = "ecdsa_secp256k1_sha256_5145", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5145_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5145_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5145_sig, .siglen = 64, .result = -1, .comment = "testing point duplication, tcId is 189 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5146 for ECDSA, tcId is 190 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5146_pubkey[] = { 0x78, 0x2c, 0x8e, 0xd1, 0x7e, 0x3b, 0x2a, 0x78, 0x3b, 0x54, 0x64, 0xf3, 0x3b, 0x09, 0x65, 0x2a, 0x71, 0xc6, 0x78, 0xe0, 0x5e, 0xc5, 0x1e, 0x84, 0xe2, 0xbc, 0xfc, 0x66, 0x3a, 0x3d, 0xe9, 0x63, 0xaf, 0x9a, 0xcb, 0x42, 0x80, 0xb8, 0xc7, 0xf7, 0xc4, 0x2f, 0x4e, 0xf9, 0xab, 0xa6, 0x24, 0x5e, 0xc1, 0xec, 0x17, 0x12, 0xfd, 0x38, 0xa0, 0xfa, 0x96, 0x41, 0x8d, 0x8c, 0xd6, 0xaa, 0x61, 0x52, }; static const unsigned char ecdsa_secp256k1_sha256_5146_sig[] = { 0xf8, 0x0a, 0xe4, 0xf9, 0x6c, 0xdb, 0xc9, 0xd8, 0x53, 0xf8, 0x3d, 0x47, 0xaa, 0xe2, 0x25, 0xbf, 0x40, 0x7d, 0x51, 0xc5, 0x6b, 0x77, 0x76, 0xcd, 0x67, 0xd0, 0xdc, 0x19, 0x5d, 0x99, 0xa9, 0xdc, 0xb3, 0x03, 0xe2, 0x6b, 0xe1, 0xf7, 0x34, 0x65, 0x31, 0x52, 0x21, 0xf0, 0xb3, 0x31, 0x52, 0x88, 0x07, 0xa1, 0xa9, 0xb6, 0xeb, 0x06, 0x8e, 0xde, 0x6e, 0xeb, 0xea, 0xaa, 0x49, 0xaf, 0x8a, 0x36, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5146 = { .name = "ecdsa_secp256k1_sha256_5146", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5146_pubkey, .pubkeylen = 64, .msg = (const unsigned char*)"", .msglen = 0, .sig = ecdsa_secp256k1_sha256_5146_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 190 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5147 for ECDSA, tcId is 191 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5147_pubkey[] = { 0x78, 0x2c, 0x8e, 0xd1, 0x7e, 0x3b, 0x2a, 0x78, 0x3b, 0x54, 0x64, 0xf3, 0x3b, 0x09, 0x65, 0x2a, 0x71, 0xc6, 0x78, 0xe0, 0x5e, 0xc5, 0x1e, 0x84, 0xe2, 0xbc, 0xfc, 0x66, 0x3a, 0x3d, 0xe9, 0x63, 0xaf, 0x9a, 0xcb, 0x42, 0x80, 0xb8, 0xc7, 0xf7, 0xc4, 0x2f, 0x4e, 0xf9, 0xab, 0xa6, 0x24, 0x5e, 0xc1, 0xec, 0x17, 0x12, 0xfd, 0x38, 0xa0, 0xfa, 0x96, 0x41, 0x8d, 0x8c, 0xd6, 0xaa, 0x61, 0x52, }; static const unsigned char ecdsa_secp256k1_sha256_5147_msg[] = { 0x4d, 0x73, 0x67, }; static const unsigned char ecdsa_secp256k1_sha256_5147_sig[] = { 0x10, 0x9c, 0xd8, 0xae, 0x03, 0x74, 0x35, 0x89, 0x84, 0xa8, 0x24, 0x9c, 0x0a, 0x84, 0x36, 0x28, 0xf2, 0x83, 0x5f, 0xfa, 0xd1, 0xdf, 0x1a, 0x9a, 0x69, 0xaa, 0x2f, 0xe7, 0x23, 0x55, 0x54, 0x5c, 0xac, 0x6f, 0x00, 0xda, 0xf5, 0x3b, 0xd8, 0xb1, 0xe3, 0x4d, 0xa3, 0x29, 0x35, 0x9b, 0x6e, 0x08, 0x01, 0x9c, 0x5b, 0x03, 0x7f, 0xed, 0x79, 0xee, 0x38, 0x3a, 0xe3, 0x9f, 0x85, 0xa1, 0x59, 0xc6, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5147 = { .name = "ecdsa_secp256k1_sha256_5147", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5147_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5147_msg, .msglen = 3, .sig = ecdsa_secp256k1_sha256_5147_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 191 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5148 for ECDSA, tcId is 192 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5148_pubkey[] = { 0x78, 0x2c, 0x8e, 0xd1, 0x7e, 0x3b, 0x2a, 0x78, 0x3b, 0x54, 0x64, 0xf3, 0x3b, 0x09, 0x65, 0x2a, 0x71, 0xc6, 0x78, 0xe0, 0x5e, 0xc5, 0x1e, 0x84, 0xe2, 0xbc, 0xfc, 0x66, 0x3a, 0x3d, 0xe9, 0x63, 0xaf, 0x9a, 0xcb, 0x42, 0x80, 0xb8, 0xc7, 0xf7, 0xc4, 0x2f, 0x4e, 0xf9, 0xab, 0xa6, 0x24, 0x5e, 0xc1, 0xec, 0x17, 0x12, 0xfd, 0x38, 0xa0, 0xfa, 0x96, 0x41, 0x8d, 0x8c, 0xd6, 0xaa, 0x61, 0x52, }; static const unsigned char ecdsa_secp256k1_sha256_5148_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5148_sig[] = { 0xd0, 0x35, 0xee, 0x1f, 0x17, 0xfd, 0xb0, 0xb2, 0x68, 0x1b, 0x16, 0x3e, 0x33, 0xc3, 0x59, 0x93, 0x26, 0x59, 0x99, 0x0a, 0xf7, 0x7d, 0xca, 0x63, 0x20, 0x12, 0xb3, 0x0b, 0x27, 0xa0, 0x57, 0xb3, 0x19, 0x39, 0xd9, 0xf3, 0xb2, 0x85, 0x8b, 0xc1, 0x3e, 0x34, 0x74, 0xcb, 0x50, 0xe6, 0xa8, 0x2b, 0xe4, 0x4f, 0xaa, 0x71, 0x94, 0x0f, 0x87, 0x6c, 0x1c, 0xba, 0x4c, 0x3e, 0x98, 0x92, 0x02, 0xb6, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5148 = { .name = "ecdsa_secp256k1_sha256_5148", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5148_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5148_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5148_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 192 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5149 for ECDSA, tcId is 193 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5149_pubkey[] = { 0x78, 0x2c, 0x8e, 0xd1, 0x7e, 0x3b, 0x2a, 0x78, 0x3b, 0x54, 0x64, 0xf3, 0x3b, 0x09, 0x65, 0x2a, 0x71, 0xc6, 0x78, 0xe0, 0x5e, 0xc5, 0x1e, 0x84, 0xe2, 0xbc, 0xfc, 0x66, 0x3a, 0x3d, 0xe9, 0x63, 0xaf, 0x9a, 0xcb, 0x42, 0x80, 0xb8, 0xc7, 0xf7, 0xc4, 0x2f, 0x4e, 0xf9, 0xab, 0xa6, 0x24, 0x5e, 0xc1, 0xec, 0x17, 0x12, 0xfd, 0x38, 0xa0, 0xfa, 0x96, 0x41, 0x8d, 0x8c, 0xd6, 0xaa, 0x61, 0x52, }; static const unsigned char ecdsa_secp256k1_sha256_5149_msg[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const unsigned char ecdsa_secp256k1_sha256_5149_sig[] = { 0x4f, 0x05, 0x3f, 0x56, 0x3a, 0xd3, 0x4b, 0x74, 0xfd, 0x8c, 0x99, 0x34, 0xce, 0x59, 0xe7, 0x9c, 0x2e, 0xb8, 0xe6, 0xec, 0xa0, 0xfe, 0xf5, 0xb3, 0x23, 0xca, 0x67, 0xd5, 0xac, 0x7e, 0xd2, 0x38, 0x4d, 0x4b, 0x05, 0xda, 0xa0, 0x71, 0x9e, 0x77, 0x3d, 0x86, 0x17, 0xdc, 0xe5, 0x63, 0x1c, 0x5f, 0xd6, 0xf5, 0x9c, 0x9b, 0xdc, 0x74, 0x8e, 0x4b, 0x55, 0xc9, 0x70, 0x04, 0x0a, 0xf0, 0x1b, 0xe5, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5149 = { .name = "ecdsa_secp256k1_sha256_5149", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5149_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5149_msg, .msglen = 20, .sig = ecdsa_secp256k1_sha256_5149_sig, .siglen = 64, .result = 1, .comment = "pseudorandom signature, tcId is 193 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5150 for ECDSA, tcId is 194 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5150_pubkey[] = { 0x6e, 0x82, 0x35, 0x55, 0x45, 0x29, 0x14, 0x09, 0x91, 0x82, 0xc6, 0xb2, 0xc1, 0xd6, 0xf0, 0xb5, 0xd2, 0x8d, 0x50, 0xcc, 0xd0, 0x05, 0xaf, 0x2c, 0xe1, 0xbb, 0xa5, 0x41, 0xaa, 0x40, 0xca, 0xff, 0x00, 0x00, 0x00, 0x01, 0x06, 0x04, 0x92, 0xd5, 0xa5, 0x67, 0x3e, 0x0f, 0x25, 0xd8, 0xd5, 0x0f, 0xb7, 0xe5, 0x8c, 0x49, 0xd8, 0x6d, 0x46, 0xd4, 0x21, 0x69, 0x55, 0xe0, 0xaa, 0x3d, 0x40, 0xe1, }; static const unsigned char ecdsa_secp256k1_sha256_5150_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5150_sig[] = { 0x6d, 0x6a, 0x4f, 0x55, 0x6c, 0xcc, 0xe1, 0x54, 0xe7, 0xfb, 0x9f, 0x19, 0xe7, 0x6c, 0x3d, 0xec, 0xa1, 0x3d, 0x59, 0xcc, 0x2a, 0xeb, 0x4e, 0xca, 0xd9, 0x68, 0xaa, 0xb2, 0xde, 0xd4, 0x59, 0x65, 0x53, 0xb9, 0xfa, 0x74, 0x80, 0x3e, 0xde, 0x0f, 0xc4, 0x44, 0x1b, 0xf6, 0x83, 0xd5, 0x6c, 0x56, 0x4d, 0x3e, 0x27, 0x4e, 0x09, 0xcc, 0xf4, 0x73, 0x90, 0xba, 0xdd, 0x14, 0x71, 0xc0, 0x5f, 0xb7, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5150 = { .name = "ecdsa_secp256k1_sha256_5150", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5150_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5150_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5150_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 194 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5151 for ECDSA, tcId is 195 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5151_pubkey[] = { 0x6e, 0x82, 0x35, 0x55, 0x45, 0x29, 0x14, 0x09, 0x91, 0x82, 0xc6, 0xb2, 0xc1, 0xd6, 0xf0, 0xb5, 0xd2, 0x8d, 0x50, 0xcc, 0xd0, 0x05, 0xaf, 0x2c, 0xe1, 0xbb, 0xa5, 0x41, 0xaa, 0x40, 0xca, 0xff, 0x00, 0x00, 0x00, 0x01, 0x06, 0x04, 0x92, 0xd5, 0xa5, 0x67, 0x3e, 0x0f, 0x25, 0xd8, 0xd5, 0x0f, 0xb7, 0xe5, 0x8c, 0x49, 0xd8, 0x6d, 0x46, 0xd4, 0x21, 0x69, 0x55, 0xe0, 0xaa, 0x3d, 0x40, 0xe1, }; static const unsigned char ecdsa_secp256k1_sha256_5151_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5151_sig[] = { 0xaa, 0xd5, 0x03, 0xde, 0x9b, 0x9f, 0xd6, 0x6b, 0x94, 0x8e, 0x9a, 0xcf, 0x59, 0x6f, 0x0a, 0x0e, 0x65, 0xe7, 0x00, 0xb2, 0x8b, 0x26, 0xec, 0x56, 0xe6, 0xe4, 0x5e, 0x84, 0x64, 0x89, 0xb3, 0xc4, 0xff, 0xf2, 0x23, 0xc5, 0xd0, 0x76, 0x54, 0x47, 0xe8, 0x44, 0x7a, 0x3f, 0x9d, 0x31, 0xfd, 0x06, 0x96, 0xe8, 0x9d, 0x24, 0x44, 0x22, 0x02, 0x2f, 0xf6, 0x1a, 0x11, 0x0b, 0x2a, 0x8c, 0x2f, 0x04, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5151 = { .name = "ecdsa_secp256k1_sha256_5151", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5151_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5151_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5151_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 195 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5152 for ECDSA, tcId is 196 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5152_pubkey[] = { 0x6e, 0x82, 0x35, 0x55, 0x45, 0x29, 0x14, 0x09, 0x91, 0x82, 0xc6, 0xb2, 0xc1, 0xd6, 0xf0, 0xb5, 0xd2, 0x8d, 0x50, 0xcc, 0xd0, 0x05, 0xaf, 0x2c, 0xe1, 0xbb, 0xa5, 0x41, 0xaa, 0x40, 0xca, 0xff, 0x00, 0x00, 0x00, 0x01, 0x06, 0x04, 0x92, 0xd5, 0xa5, 0x67, 0x3e, 0x0f, 0x25, 0xd8, 0xd5, 0x0f, 0xb7, 0xe5, 0x8c, 0x49, 0xd8, 0x6d, 0x46, 0xd4, 0x21, 0x69, 0x55, 0xe0, 0xaa, 0x3d, 0x40, 0xe1, }; static const unsigned char ecdsa_secp256k1_sha256_5152_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5152_sig[] = { 0x91, 0x82, 0xce, 0xbd, 0x3b, 0xb8, 0xab, 0x57, 0x2e, 0x16, 0x71, 0x74, 0x39, 0x72, 0x09, 0xef, 0x4b, 0x1d, 0x43, 0x9a, 0xf3, 0xb2, 0x00, 0xcd, 0xf0, 0x03, 0x62, 0x00, 0x89, 0xe4, 0x32, 0x25, 0xab, 0xb8, 0x83, 0x67, 0xd1, 0x5f, 0xe6, 0x2d, 0x1e, 0xff, 0xfb, 0x68, 0x03, 0xda, 0x03, 0x10, 0x9e, 0xe2, 0x2e, 0x90, 0xbc, 0x9c, 0x78, 0xe8, 0xb4, 0xed, 0x23, 0x63, 0x0b, 0x82, 0xea, 0x9d, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5152 = { .name = "ecdsa_secp256k1_sha256_5152", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5152_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5152_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5152_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is small, tcId is 196 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5153 for ECDSA, tcId is 197 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5153_pubkey[] = { 0x6e, 0x82, 0x35, 0x55, 0x45, 0x29, 0x14, 0x09, 0x91, 0x82, 0xc6, 0xb2, 0xc1, 0xd6, 0xf0, 0xb5, 0xd2, 0x8d, 0x50, 0xcc, 0xd0, 0x05, 0xaf, 0x2c, 0xe1, 0xbb, 0xa5, 0x41, 0xaa, 0x40, 0xca, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xf9, 0xfb, 0x6d, 0x2a, 0x5a, 0x98, 0xc1, 0xf0, 0xda, 0x27, 0x2a, 0xf0, 0x48, 0x1a, 0x73, 0xb6, 0x27, 0x92, 0xb9, 0x2b, 0xde, 0x96, 0xaa, 0x1e, 0x55, 0xc2, 0xbb, 0x4e, }; static const unsigned char ecdsa_secp256k1_sha256_5153_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5153_sig[] = { 0x38, 0x54, 0xa3, 0x99, 0x8a, 0xeb, 0xdf, 0x2d, 0xbc, 0x28, 0xad, 0xac, 0x41, 0x81, 0x46, 0x2c, 0xca, 0xc7, 0x87, 0x39, 0x07, 0xab, 0x7f, 0x21, 0x2c, 0x42, 0xdb, 0x0e, 0x69, 0xb5, 0x6e, 0xd8, 0xc1, 0x2c, 0x09, 0x47, 0x5c, 0x77, 0x2f, 0xd0, 0xc1, 0xb2, 0x06, 0x0d, 0x51, 0x63, 0xe4, 0x2b, 0xf7, 0x1d, 0x72, 0x7e, 0x4a, 0xe7, 0xc0, 0x3e, 0xeb, 0xa9, 0x54, 0xbf, 0x50, 0xb4, 0x3b, 0xb3, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5153 = { .name = "ecdsa_secp256k1_sha256_5153", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5153_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5153_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5153_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 197 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5154 for ECDSA, tcId is 198 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5154_pubkey[] = { 0x6e, 0x82, 0x35, 0x55, 0x45, 0x29, 0x14, 0x09, 0x91, 0x82, 0xc6, 0xb2, 0xc1, 0xd6, 0xf0, 0xb5, 0xd2, 0x8d, 0x50, 0xcc, 0xd0, 0x05, 0xaf, 0x2c, 0xe1, 0xbb, 0xa5, 0x41, 0xaa, 0x40, 0xca, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xf9, 0xfb, 0x6d, 0x2a, 0x5a, 0x98, 0xc1, 0xf0, 0xda, 0x27, 0x2a, 0xf0, 0x48, 0x1a, 0x73, 0xb6, 0x27, 0x92, 0xb9, 0x2b, 0xde, 0x96, 0xaa, 0x1e, 0x55, 0xc2, 0xbb, 0x4e, }; static const unsigned char ecdsa_secp256k1_sha256_5154_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5154_sig[] = { 0xe9, 0x4d, 0xbd, 0xc3, 0x87, 0x95, 0xfe, 0x5c, 0x90, 0x4d, 0x8f, 0x16, 0xd9, 0x69, 0xd3, 0xb5, 0x87, 0xf0, 0xa2, 0x5d, 0x2d, 0xe9, 0x0b, 0x6d, 0x8c, 0x5c, 0x53, 0xff, 0x88, 0x7e, 0x36, 0x07, 0x85, 0x6b, 0x8c, 0x96, 0x3e, 0x9b, 0x68, 0xda, 0xde, 0x44, 0x75, 0x0b, 0xf9, 0x7e, 0xc4, 0xd1, 0x1b, 0x1a, 0x0a, 0x38, 0x04, 0xf4, 0xcb, 0x79, 0xaa, 0x27, 0xbd, 0xea, 0x78, 0xac, 0x14, 0xe4, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5154 = { .name = "ecdsa_secp256k1_sha256_5154", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5154_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5154_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5154_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 198 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5155 for ECDSA, tcId is 199 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5155_pubkey[] = { 0x6e, 0x82, 0x35, 0x55, 0x45, 0x29, 0x14, 0x09, 0x91, 0x82, 0xc6, 0xb2, 0xc1, 0xd6, 0xf0, 0xb5, 0xd2, 0x8d, 0x50, 0xcc, 0xd0, 0x05, 0xaf, 0x2c, 0xe1, 0xbb, 0xa5, 0x41, 0xaa, 0x40, 0xca, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xf9, 0xfb, 0x6d, 0x2a, 0x5a, 0x98, 0xc1, 0xf0, 0xda, 0x27, 0x2a, 0xf0, 0x48, 0x1a, 0x73, 0xb6, 0x27, 0x92, 0xb9, 0x2b, 0xde, 0x96, 0xaa, 0x1e, 0x55, 0xc2, 0xbb, 0x4e, }; static const unsigned char ecdsa_secp256k1_sha256_5155_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5155_sig[] = { 0x49, 0xfc, 0x10, 0x2a, 0x08, 0xca, 0x47, 0xb6, 0x0e, 0x08, 0x58, 0xcd, 0x02, 0x84, 0xd2, 0x2c, 0xdd, 0xd7, 0x23, 0x3f, 0x94, 0xaa, 0xff, 0xbb, 0x2d, 0xb1, 0xdd, 0x2c, 0xf0, 0x84, 0x25, 0xe1, 0x5b, 0x16, 0xfc, 0xa5, 0xa1, 0x2c, 0xdb, 0x39, 0x70, 0x16, 0x97, 0xad, 0x8e, 0x39, 0xff, 0xd6, 0xbd, 0xec, 0x00, 0x24, 0x29, 0x8a, 0xfa, 0xa2, 0x32, 0x6a, 0xea, 0x09, 0x20, 0x0b, 0x14, 0xd6, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5155 = { .name = "ecdsa_secp256k1_sha256_5155", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5155_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5155_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5155_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key is large, tcId is 199 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5156 for ECDSA, tcId is 200 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5156_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x3f, 0xd2, 0x22, 0x48, 0xd6, 0x4d, 0x95, 0xf7, 0x3c, 0x29, 0xb4, 0x8a, 0xb4, 0x86, 0x31, 0x85, 0x0b, 0xe5, 0x03, 0xfd, 0x00, 0xf8, 0x46, 0x8b, 0x5f, 0x0f, 0x70, 0xe0, 0xf6, 0xee, 0x7a, 0xa4, 0x3b, 0xc2, 0xc6, 0xfd, 0x25, 0xb1, 0xd8, 0x26, 0x92, 0x41, 0xcb, 0xdd, 0x9d, 0xbb, 0x0d, 0xac, 0x96, 0xdc, 0x96, 0x23, 0x1f, 0x43, 0x07, 0x05, 0xf8, 0x38, 0x71, 0x7d, }; static const unsigned char ecdsa_secp256k1_sha256_5156_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5156_sig[] = { 0x41, 0xef, 0xa7, 0xd3, 0xf0, 0x5a, 0x00, 0x10, 0x67, 0x5f, 0xcb, 0x91, 0x8a, 0x45, 0xc6, 0x93, 0xda, 0x4b, 0x34, 0x8d, 0xf2, 0x1a, 0x59, 0xd6, 0xf9, 0xcd, 0x73, 0xe0, 0xd8, 0x31, 0xd6, 0x7a, 0xbb, 0xab, 0x52, 0x59, 0x6c, 0x1a, 0x1d, 0x94, 0x84, 0x29, 0x6c, 0xdc, 0x92, 0xcb, 0xf0, 0x7e, 0x66, 0x52, 0x59, 0xa1, 0x37, 0x91, 0xa8, 0xfe, 0x88, 0x45, 0xe2, 0xc0, 0x7c, 0xf3, 0xfc, 0x67, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5156 = { .name = "ecdsa_secp256k1_sha256_5156", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5156_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5156_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5156_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 200 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5157 for ECDSA, tcId is 201 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5157_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x3f, 0xd2, 0x22, 0x48, 0xd6, 0x4d, 0x95, 0xf7, 0x3c, 0x29, 0xb4, 0x8a, 0xb4, 0x86, 0x31, 0x85, 0x0b, 0xe5, 0x03, 0xfd, 0x00, 0xf8, 0x46, 0x8b, 0x5f, 0x0f, 0x70, 0xe0, 0xf6, 0xee, 0x7a, 0xa4, 0x3b, 0xc2, 0xc6, 0xfd, 0x25, 0xb1, 0xd8, 0x26, 0x92, 0x41, 0xcb, 0xdd, 0x9d, 0xbb, 0x0d, 0xac, 0x96, 0xdc, 0x96, 0x23, 0x1f, 0x43, 0x07, 0x05, 0xf8, 0x38, 0x71, 0x7d, }; static const unsigned char ecdsa_secp256k1_sha256_5157_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5157_sig[] = { 0xb6, 0x15, 0x69, 0x8c, 0x35, 0x8b, 0x35, 0x92, 0x0d, 0xd8, 0x83, 0xec, 0xa6, 0x25, 0xa6, 0xc5, 0xf7, 0x56, 0x39, 0x70, 0xcd, 0xfc, 0x37, 0x8f, 0x8f, 0xe0, 0xce, 0xe1, 0x70, 0x92, 0x14, 0x4c, 0xda, 0x0b, 0x84, 0xcd, 0x94, 0xa4, 0x1e, 0x04, 0x9e, 0xf4, 0x77, 0xae, 0xac, 0x15, 0x7b, 0x2a, 0x9b, 0xfa, 0x6b, 0x7a, 0xc8, 0xde, 0x06, 0xed, 0x38, 0x58, 0xc5, 0xee, 0xde, 0x6d, 0xdd, 0x6d, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5157 = { .name = "ecdsa_secp256k1_sha256_5157", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5157_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5157_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5157_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 201 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5158 for ECDSA, tcId is 202 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5158_pubkey[] = { 0x00, 0x00, 0x00, 0x01, 0x3f, 0xd2, 0x22, 0x48, 0xd6, 0x4d, 0x95, 0xf7, 0x3c, 0x29, 0xb4, 0x8a, 0xb4, 0x86, 0x31, 0x85, 0x0b, 0xe5, 0x03, 0xfd, 0x00, 0xf8, 0x46, 0x8b, 0x5f, 0x0f, 0x70, 0xe0, 0xf6, 0xee, 0x7a, 0xa4, 0x3b, 0xc2, 0xc6, 0xfd, 0x25, 0xb1, 0xd8, 0x26, 0x92, 0x41, 0xcb, 0xdd, 0x9d, 0xbb, 0x0d, 0xac, 0x96, 0xdc, 0x96, 0x23, 0x1f, 0x43, 0x07, 0x05, 0xf8, 0x38, 0x71, 0x7d, }; static const unsigned char ecdsa_secp256k1_sha256_5158_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5158_sig[] = { 0x87, 0xcf, 0x8c, 0x0e, 0xb8, 0x2d, 0x44, 0xf6, 0x9c, 0x60, 0xa2, 0xff, 0x54, 0x57, 0xd3, 0xaa, 0xa3, 0x22, 0xe7, 0xec, 0x61, 0xae, 0x5a, 0xec, 0xfd, 0x67, 0x8a, 0xe1, 0xc1, 0x93, 0x2b, 0x0e, 0xc5, 0x22, 0xc4, 0xee, 0xa7, 0xea, 0xfb, 0x82, 0x91, 0x4c, 0xbf, 0x5c, 0x1f, 0xf7, 0x67, 0x60, 0x10, 0x9f, 0x55, 0xdd, 0xdd, 0xcf, 0x58, 0x27, 0x4d, 0x41, 0xc9, 0xbc, 0x43, 0x11, 0xe0, 0x6e, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5158 = { .name = "ecdsa_secp256k1_sha256_5158", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5158_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5158_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5158_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key is small, tcId is 202 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5159 for ECDSA, tcId is 203 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5159_pubkey[] = { 0x25, 0xaf, 0xd6, 0x89, 0xac, 0xab, 0xae, 0xd6, 0x7c, 0x1f, 0x29, 0x6d, 0xe5, 0x94, 0x06, 0xf8, 0xc5, 0x50, 0xf5, 0x71, 0x46, 0xa0, 0xb4, 0xec, 0x2c, 0x97, 0x87, 0x6d, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x46, 0xa7, 0x6e, 0x52, 0x03, 0x22, 0xdf, 0xbc, 0x49, 0x1e, 0xc4, 0xf0, 0xcc, 0x19, 0x74, 0x20, 0xfc, 0x4e, 0xa5, 0x88, 0x3d, 0x8f, 0x6d, 0xd5, 0x3c, 0x35, 0x4b, 0xc4, 0xf6, 0x7c, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5159_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5159_sig[] = { 0x62, 0xf4, 0x8e, 0xf7, 0x1a, 0xce, 0x27, 0xbf, 0x5a, 0x01, 0x83, 0x4d, 0xe1, 0xf7, 0xe3, 0xf9, 0x48, 0xb9, 0xdc, 0xe1, 0xca, 0x1e, 0x91, 0x1d, 0x5e, 0x13, 0xd3, 0xb1, 0x04, 0x47, 0x1d, 0x82, 0xa1, 0x57, 0x0c, 0xc0, 0xf3, 0x88, 0x76, 0x8d, 0x3b, 0xa7, 0xdf, 0x7f, 0x21, 0x25, 0x64, 0xca, 0xa2, 0x56, 0xff, 0x82, 0x5d, 0xf9, 0x97, 0xf2, 0x1f, 0x72, 0xf5, 0x28, 0x0d, 0x53, 0x01, 0x1f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5159 = { .name = "ecdsa_secp256k1_sha256_5159", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5159_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5159_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5159_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 203 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5160 for ECDSA, tcId is 204 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5160_pubkey[] = { 0x25, 0xaf, 0xd6, 0x89, 0xac, 0xab, 0xae, 0xd6, 0x7c, 0x1f, 0x29, 0x6d, 0xe5, 0x94, 0x06, 0xf8, 0xc5, 0x50, 0xf5, 0x71, 0x46, 0xa0, 0xb4, 0xec, 0x2c, 0x97, 0x87, 0x6d, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x46, 0xa7, 0x6e, 0x52, 0x03, 0x22, 0xdf, 0xbc, 0x49, 0x1e, 0xc4, 0xf0, 0xcc, 0x19, 0x74, 0x20, 0xfc, 0x4e, 0xa5, 0x88, 0x3d, 0x8f, 0x6d, 0xd5, 0x3c, 0x35, 0x4b, 0xc4, 0xf6, 0x7c, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5160_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5160_sig[] = { 0xf6, 0xb0, 0xe2, 0xf6, 0xfe, 0x02, 0x0c, 0xf7, 0xc0, 0xc2, 0x01, 0x37, 0x43, 0x43, 0x44, 0xed, 0x7a, 0xdd, 0x6c, 0x4b, 0xe5, 0x18, 0x61, 0xe2, 0xd1, 0x4c, 0xbd, 0xa4, 0x72, 0xa6, 0xff, 0xb4, 0x9b, 0xe9, 0x37, 0x22, 0xc1, 0xa3, 0xad, 0x7d, 0x4c, 0xf9, 0x17, 0x23, 0x70, 0x0c, 0xb5, 0x48, 0x6d, 0xe5, 0x47, 0x9d, 0x8c, 0x1b, 0x38, 0xae, 0x4e, 0x8e, 0x5b, 0xa1, 0x63, 0x8e, 0x97, 0x32, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5160 = { .name = "ecdsa_secp256k1_sha256_5160", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5160_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5160_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5160_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 204 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5161 for ECDSA, tcId is 205 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5161_pubkey[] = { 0x25, 0xaf, 0xd6, 0x89, 0xac, 0xab, 0xae, 0xd6, 0x7c, 0x1f, 0x29, 0x6d, 0xe5, 0x94, 0x06, 0xf8, 0xc5, 0x50, 0xf5, 0x71, 0x46, 0xa0, 0xb4, 0xec, 0x2c, 0x97, 0x87, 0x6d, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x46, 0xa7, 0x6e, 0x52, 0x03, 0x22, 0xdf, 0xbc, 0x49, 0x1e, 0xc4, 0xf0, 0xcc, 0x19, 0x74, 0x20, 0xfc, 0x4e, 0xa5, 0x88, 0x3d, 0x8f, 0x6d, 0xd5, 0x3c, 0x35, 0x4b, 0xc4, 0xf6, 0x7c, 0x35, }; static const unsigned char ecdsa_secp256k1_sha256_5161_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5161_sig[] = { 0xdb, 0x09, 0xd8, 0x46, 0x0f, 0x05, 0xef, 0xf2, 0x3b, 0xc7, 0xe4, 0x36, 0xb6, 0x7d, 0xa5, 0x63, 0xfa, 0x4b, 0x4e, 0xdb, 0x58, 0xac, 0x24, 0xce, 0x20, 0x1f, 0xa8, 0xa3, 0x58, 0x12, 0x50, 0x57, 0x46, 0xda, 0x11, 0x67, 0x54, 0x60, 0x29, 0x40, 0xc8, 0x99, 0x9c, 0x8d, 0x66, 0x5f, 0x78, 0x6c, 0x50, 0xf5, 0x77, 0x2c, 0x0a, 0x3c, 0xdb, 0xda, 0x07, 0x5e, 0x77, 0xea, 0xbc, 0x64, 0xdf, 0x16, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5161 = { .name = "ecdsa_secp256k1_sha256_5161", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5161_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5161_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5161_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 1's, tcId is 205 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5162 for ECDSA, tcId is 206 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5162_pubkey[] = { 0xd1, 0x2e, 0x6c, 0x66, 0xb6, 0x77, 0x34, 0xc3, 0xc8, 0x4d, 0x26, 0x01, 0xcf, 0x5d, 0x35, 0xdc, 0x09, 0x7e, 0x27, 0x63, 0x7f, 0x0a, 0xca, 0x4a, 0x4f, 0xdb, 0x74, 0xb6, 0xaa, 0xdd, 0x3b, 0xb9, 0x3f, 0x5b, 0xdf, 0xf8, 0x8b, 0xd5, 0x73, 0x6d, 0xf8, 0x98, 0xe6, 0x99, 0x00, 0x6e, 0xd7, 0x50, 0xf1, 0x1c, 0xf0, 0x7c, 0x58, 0x66, 0xcd, 0x7a, 0xd7, 0x0c, 0x71, 0x21, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp256k1_sha256_5162_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5162_sig[] = { 0x59, 0x2c, 0x41, 0xe1, 0x65, 0x17, 0xf1, 0x2f, 0xca, 0xbd, 0x98, 0x26, 0x76, 0x74, 0xf9, 0x74, 0xb5, 0x88, 0xe9, 0xf3, 0x5d, 0x35, 0x40, 0x6c, 0x1a, 0x7b, 0xb2, 0xed, 0x1d, 0x19, 0xb7, 0xb8, 0xc1, 0x9a, 0x5f, 0x94, 0x26, 0x07, 0xc3, 0x55, 0x14, 0x84, 0xff, 0x0d, 0xc9, 0x72, 0x81, 0xf0, 0xcd, 0xc8, 0x2b, 0xc4, 0x8e, 0x22, 0x05, 0xa0, 0x64, 0x5c, 0x0c, 0xf3, 0xd7, 0xf5, 0x9d, 0xa0, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5162 = { .name = "ecdsa_secp256k1_sha256_5162", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5162_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5162_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5162_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 206 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5163 for ECDSA, tcId is 207 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5163_pubkey[] = { 0xd1, 0x2e, 0x6c, 0x66, 0xb6, 0x77, 0x34, 0xc3, 0xc8, 0x4d, 0x26, 0x01, 0xcf, 0x5d, 0x35, 0xdc, 0x09, 0x7e, 0x27, 0x63, 0x7f, 0x0a, 0xca, 0x4a, 0x4f, 0xdb, 0x74, 0xb6, 0xaa, 0xdd, 0x3b, 0xb9, 0x3f, 0x5b, 0xdf, 0xf8, 0x8b, 0xd5, 0x73, 0x6d, 0xf8, 0x98, 0xe6, 0x99, 0x00, 0x6e, 0xd7, 0x50, 0xf1, 0x1c, 0xf0, 0x7c, 0x58, 0x66, 0xcd, 0x7a, 0xd7, 0x0c, 0x71, 0x21, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp256k1_sha256_5163_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5163_sig[] = { 0xbe, 0x0d, 0x70, 0x88, 0x7d, 0x5e, 0x40, 0x82, 0x1a, 0x61, 0xb6, 0x80, 0x47, 0xde, 0x4e, 0xa0, 0x3d, 0xeb, 0xfd, 0xf5, 0x1c, 0xdf, 0x4d, 0x4b, 0x19, 0x55, 0x58, 0xb9, 0x59, 0xa0, 0x32, 0xb2, 0x82, 0x66, 0xb4, 0xd2, 0x70, 0xe2, 0x44, 0x14, 0xec, 0xac, 0xb1, 0x4c, 0x09, 0x1a, 0x23, 0x31, 0x34, 0xb9, 0x18, 0xd3, 0x73, 0x20, 0xc6, 0x55, 0x7d, 0x60, 0xad, 0x0a, 0x63, 0x54, 0x4a, 0xc4, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5163 = { .name = "ecdsa_secp256k1_sha256_5163", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5163_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5163_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5163_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 207 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5164 for ECDSA, tcId is 208 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5164_pubkey[] = { 0xd1, 0x2e, 0x6c, 0x66, 0xb6, 0x77, 0x34, 0xc3, 0xc8, 0x4d, 0x26, 0x01, 0xcf, 0x5d, 0x35, 0xdc, 0x09, 0x7e, 0x27, 0x63, 0x7f, 0x0a, 0xca, 0x4a, 0x4f, 0xdb, 0x74, 0xb6, 0xaa, 0xdd, 0x3b, 0xb9, 0x3f, 0x5b, 0xdf, 0xf8, 0x8b, 0xd5, 0x73, 0x6d, 0xf8, 0x98, 0xe6, 0x99, 0x00, 0x6e, 0xd7, 0x50, 0xf1, 0x1c, 0xf0, 0x7c, 0x58, 0x66, 0xcd, 0x7a, 0xd7, 0x0c, 0x71, 0x21, 0xff, 0xff, 0xff, 0xff, }; static const unsigned char ecdsa_secp256k1_sha256_5164_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5164_sig[] = { 0xfa, 0xe9, 0x2d, 0xfc, 0xb2, 0xee, 0x39, 0x2d, 0x27, 0x0a, 0xf3, 0xa5, 0x73, 0x9f, 0xaa, 0x26, 0xd4, 0xf9, 0x7b, 0xfd, 0x39, 0xed, 0x3c, 0xbe, 0xe4, 0xd2, 0x9e, 0x26, 0xaf, 0x3b, 0x20, 0x6a, 0x93, 0x64, 0x5c, 0x80, 0x60, 0x55, 0x95, 0xe0, 0x2c, 0x09, 0xa0, 0xdc, 0x4b, 0x17, 0xac, 0x2a, 0x51, 0x84, 0x6a, 0x72, 0x8b, 0x3e, 0x8d, 0x60, 0x44, 0x2e, 0xd6, 0x44, 0x9f, 0xd3, 0x34, 0x2b, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5164 = { .name = "ecdsa_secp256k1_sha256_5164", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5164_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5164_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5164_sig, .siglen = 64, .result = 1, .comment = "y-coordinate of the public key has many trailing 1's, tcId is 208 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5165 for ECDSA, tcId is 209 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5165_pubkey[] = { 0x6d, 0x4a, 0x7f, 0x60, 0xd4, 0x77, 0x4a, 0x4f, 0x0a, 0xa8, 0xbb, 0xde, 0xdb, 0x95, 0x3c, 0x7e, 0xea, 0x79, 0x09, 0x40, 0x7e, 0x31, 0x64, 0x75, 0x56, 0x64, 0xbc, 0x28, 0x00, 0x00, 0x00, 0x00, 0xe6, 0x59, 0xd3, 0x4e, 0x4d, 0xf3, 0x8d, 0x9e, 0x8c, 0x9e, 0xaa, 0xdf, 0xba, 0x36, 0x61, 0x2c, 0x76, 0x91, 0x95, 0xbe, 0x86, 0xc7, 0x7a, 0xac, 0x3f, 0x36, 0xe7, 0x8b, 0x53, 0x86, 0x80, 0xfb, }; static const unsigned char ecdsa_secp256k1_sha256_5165_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5165_sig[] = { 0x17, 0x6a, 0x25, 0x57, 0x56, 0x6f, 0xfa, 0x51, 0x8b, 0x11, 0x22, 0x66, 0x94, 0xeb, 0x98, 0x02, 0xed, 0x20, 0x98, 0xbf, 0xe2, 0x78, 0xe5, 0x57, 0x0f, 0xe1, 0xd5, 0xd7, 0xaf, 0x18, 0xa9, 0x43, 0xed, 0x6e, 0x20, 0x95, 0xf1, 0x2a, 0x03, 0xf2, 0xea, 0xf6, 0x71, 0x8f, 0x43, 0x0e, 0xc5, 0xfe, 0x28, 0x29, 0xfd, 0x16, 0x46, 0xab, 0x64, 0x87, 0x01, 0x65, 0x6f, 0xd3, 0x12, 0x21, 0xb9, 0x7d, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5165 = { .name = "ecdsa_secp256k1_sha256_5165", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5165_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5165_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5165_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 209 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5166 for ECDSA, tcId is 210 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5166_pubkey[] = { 0x6d, 0x4a, 0x7f, 0x60, 0xd4, 0x77, 0x4a, 0x4f, 0x0a, 0xa8, 0xbb, 0xde, 0xdb, 0x95, 0x3c, 0x7e, 0xea, 0x79, 0x09, 0x40, 0x7e, 0x31, 0x64, 0x75, 0x56, 0x64, 0xbc, 0x28, 0x00, 0x00, 0x00, 0x00, 0xe6, 0x59, 0xd3, 0x4e, 0x4d, 0xf3, 0x8d, 0x9e, 0x8c, 0x9e, 0xaa, 0xdf, 0xba, 0x36, 0x61, 0x2c, 0x76, 0x91, 0x95, 0xbe, 0x86, 0xc7, 0x7a, 0xac, 0x3f, 0x36, 0xe7, 0x8b, 0x53, 0x86, 0x80, 0xfb, }; static const unsigned char ecdsa_secp256k1_sha256_5166_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5166_sig[] = { 0x60, 0xbe, 0x20, 0xc3, 0xdb, 0xc1, 0x62, 0xdd, 0x34, 0xd2, 0x67, 0x80, 0x62, 0x1c, 0x10, 0x4b, 0xbe, 0x5d, 0xac, 0xe6, 0x30, 0x17, 0x1b, 0x2d, 0xae, 0xf0, 0xd8, 0x26, 0x40, 0x9e, 0xe5, 0xc2, 0xbd, 0x80, 0x81, 0xb2, 0x77, 0x62, 0xab, 0x6e, 0x8f, 0x42, 0x59, 0x56, 0xbf, 0x60, 0x4e, 0x33, 0x2f, 0xa0, 0x66, 0xa9, 0x9b, 0x59, 0xf8, 0x7e, 0x27, 0xdc, 0x11, 0x98, 0xb2, 0x6f, 0x5c, 0xaa, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5166 = { .name = "ecdsa_secp256k1_sha256_5166", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5166_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5166_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5166_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 210 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5167 for ECDSA, tcId is 211 in file ecdsa_secp256k1_sha256_p1363_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5167_pubkey[] = { 0x6d, 0x4a, 0x7f, 0x60, 0xd4, 0x77, 0x4a, 0x4f, 0x0a, 0xa8, 0xbb, 0xde, 0xdb, 0x95, 0x3c, 0x7e, 0xea, 0x79, 0x09, 0x40, 0x7e, 0x31, 0x64, 0x75, 0x56, 0x64, 0xbc, 0x28, 0x00, 0x00, 0x00, 0x00, 0xe6, 0x59, 0xd3, 0x4e, 0x4d, 0xf3, 0x8d, 0x9e, 0x8c, 0x9e, 0xaa, 0xdf, 0xba, 0x36, 0x61, 0x2c, 0x76, 0x91, 0x95, 0xbe, 0x86, 0xc7, 0x7a, 0xac, 0x3f, 0x36, 0xe7, 0x8b, 0x53, 0x86, 0x80, 0xfb, }; static const unsigned char ecdsa_secp256k1_sha256_5167_msg[] = { 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, }; static const unsigned char ecdsa_secp256k1_sha256_5167_sig[] = { 0xed, 0xf0, 0x3c, 0xf6, 0x3f, 0x65, 0x88, 0x83, 0x28, 0x9a, 0x1a, 0x59, 0x3d, 0x10, 0x07, 0x89, 0x5b, 0x9f, 0x23, 0x6d, 0x27, 0xc9, 0xc1, 0xf1, 0x31, 0x30, 0x89, 0xaa, 0xed, 0x6b, 0x16, 0xae, 0xe5, 0xb2, 0x29, 0x03, 0xf7, 0xeb, 0x23, 0xad, 0xc2, 0xe0, 0x10, 0x57, 0xe3, 0x9b, 0x04, 0x08, 0xd4, 0x95, 0xf6, 0x94, 0xc8, 0x3f, 0x30, 0x6f, 0x12, 0x16, 0xc9, 0xbf, 0x87, 0x50, 0x60, 0x74, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5167 = { .name = "ecdsa_secp256k1_sha256_5167", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5167_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5167_msg, .msglen = 7, .sig = ecdsa_secp256k1_sha256_5167_sig, .siglen = 64, .result = 1, .comment = "x-coordinate of the public key has many trailing 0's, tcId is 211 in file ecdsa_secp256k1_sha256_p1363_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5168 for ECDSA, tcId is 1 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5168_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5168_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5168_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x90, 0x0e, 0x75, 0xad, 0x23, 0x3f, 0xcc, 0x90, 0x85, 0x09, 0xdb, 0xff, 0x59, 0x22, 0x64, 0x7d, 0xb3, 0x7c, 0x21, 0xf4, 0xaf, 0xd3, 0x20, 0x3a, 0xe8, 0xdc, 0x4a, 0xe7, 0x79, 0x4b, 0x0f, 0x87, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5168 = { .name = "ecdsa_secp256k1_sha256_5168", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5168_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5168_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5168_sig, .siglen = 64, .result = 1, .comment = "signature malleability, tcId is 1 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5169 for ECDSA, tcId is 2 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5169_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5169_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5169_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5169 = { .name = "ecdsa_secp256k1_sha256_5169", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5169_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5169_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5169_sig, .siglen = 64, .result = 0, .comment = "Legacy:ASN encoding of r misses leading 0, tcId is 2 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5170 for ECDSA, tcId is 3 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5170_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5170_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5170_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5170 = { .name = "ecdsa_secp256k1_sha256_5170", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5170_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5170_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5170_sig, .siglen = 64, .result = 1, .comment = "valid, tcId is 3 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5171 for ECDSA, tcId is 4 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5171_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5171_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5171_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5171 = { .name = "ecdsa_secp256k1_sha256_5171", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5171_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5171_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5171_sig, .siglen = 64, .result = 0, .comment = "long form encoding of length of sequence, tcId is 4 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5172 for ECDSA, tcId is 5 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5172_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5172_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5172_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5172 = { .name = "ecdsa_secp256k1_sha256_5172", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5172_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5172_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5172_sig, .siglen = 64, .result = 0, .comment = "length of sequence contains leading 0, tcId is 5 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5173 for ECDSA, tcId is 68 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5173_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5173_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5173_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5173 = { .name = "ecdsa_secp256k1_sha256_5173", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5173_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5173_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5173_sig, .siglen = 64, .result = 0, .comment = "long form encoding of length of integer, tcId is 68 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5174 for ECDSA, tcId is 69 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5174_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5174_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5174_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5174 = { .name = "ecdsa_secp256k1_sha256_5174", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5174_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5174_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5174_sig, .siglen = 64, .result = 0, .comment = "long form encoding of length of integer, tcId is 69 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5175 for ECDSA, tcId is 70 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5175_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5175_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5175_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5175 = { .name = "ecdsa_secp256k1_sha256_5175", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5175_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5175_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5175_sig, .siglen = 64, .result = 0, .comment = "length of integer contains leading 0, tcId is 70 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5176 for ECDSA, tcId is 71 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5176_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5176_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5176_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5176 = { .name = "ecdsa_secp256k1_sha256_5176", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5176_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5176_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5176_sig, .siglen = 64, .result = 0, .comment = "length of integer contains leading 0, tcId is 71 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5177 for ECDSA, tcId is 93 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5177_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5177_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5177_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x00, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5177 = { .name = "ecdsa_secp256k1_sha256_5177", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5177_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5177_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5177_sig, .siglen = 66, .result = -1, .comment = "appending 0's to integer, tcId is 93 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5178 for ECDSA, tcId is 94 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5178_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5178_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5178_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5178 = { .name = "ecdsa_secp256k1_sha256_5178", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5178_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5178_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5178_sig, .siglen = 66, .result = -1, .comment = "appending 0's to integer, tcId is 94 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5179 for ECDSA, tcId is 95 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5179_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5179_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5179_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5179 = { .name = "ecdsa_secp256k1_sha256_5179", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5179_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5179_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5179_sig, .siglen = 64, .result = 0, .comment = "prepending 0's to integer, tcId is 95 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5180 for ECDSA, tcId is 96 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5180_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5180_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5180_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5180 = { .name = "ecdsa_secp256k1_sha256_5180", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5180_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5180_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5180_sig, .siglen = 64, .result = 0, .comment = "prepending 0's to integer, tcId is 96 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5181 for ECDSA, tcId is 98 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5181_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5181_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5181_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x05, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5181 = { .name = "ecdsa_secp256k1_sha256_5181", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5181_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5181_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5181_sig, .siglen = 66, .result = -1, .comment = "appending null value to integer, tcId is 98 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5182 for ECDSA, tcId is 99 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5182_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5182_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5182_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, 0x05, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5182 = { .name = "ecdsa_secp256k1_sha256_5182", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5182_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5182_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5182_sig, .siglen = 66, .result = -1, .comment = "appending null value to integer, tcId is 99 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5183 for ECDSA, tcId is 114 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5183_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5183_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5183_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5183 = { .name = "ecdsa_secp256k1_sha256_5183", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5183_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5183_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5183_sig, .siglen = 64, .result = -1, .comment = "dropping value of integer, tcId is 114 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5184 for ECDSA, tcId is 115 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5184_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5184_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5184_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5184 = { .name = "ecdsa_secp256k1_sha256_5184", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5184_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5184_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5184_sig, .siglen = 64, .result = -1, .comment = "dropping value of integer, tcId is 115 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5185 for ECDSA, tcId is 118 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5185_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5185_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5185_sig[] = { 0x02, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5185 = { .name = "ecdsa_secp256k1_sha256_5185", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5185_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5185_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5185_sig, .siglen = 65, .result = -1, .comment = "modify first byte of integer, tcId is 118 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5186 for ECDSA, tcId is 119 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5186_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5186_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5186_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6d, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5186 = { .name = "ecdsa_secp256k1_sha256_5186", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5186_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5186_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5186_sig, .siglen = 64, .result = -1, .comment = "modify first byte of integer, tcId is 119 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5187 for ECDSA, tcId is 120 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5187_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5187_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5187_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0xe5, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5187 = { .name = "ecdsa_secp256k1_sha256_5187", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5187_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5187_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5187_sig, .siglen = 64, .result = -1, .comment = "modify last byte of integer, tcId is 120 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5188 for ECDSA, tcId is 121 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5188_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5188_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5188_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0x3a, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5188 = { .name = "ecdsa_secp256k1_sha256_5188", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5188_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5188_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5188_sig, .siglen = 64, .result = -1, .comment = "modify last byte of integer, tcId is 121 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5189 for ECDSA, tcId is 122 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5189_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5189_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5189_sig[] = { 0x00, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5189 = { .name = "ecdsa_secp256k1_sha256_5189", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5189_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5189_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5189_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 122 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5190 for ECDSA, tcId is 123 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5190_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5190_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5190_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5190 = { .name = "ecdsa_secp256k1_sha256_5190", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5190_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5190_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5190_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 123 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5191 for ECDSA, tcId is 124 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5191_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5191_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5191_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x00, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5191 = { .name = "ecdsa_secp256k1_sha256_5191", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5191_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5191_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5191_sig, .siglen = 64, .result = -1, .comment = "truncated integer, tcId is 124 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5192 for ECDSA, tcId is 125 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5192_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5192_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5192_sig[] = { 0x00, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5192 = { .name = "ecdsa_secp256k1_sha256_5192", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5192_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5192_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5192_sig, .siglen = 65, .result = 0, .comment = "leading ff in integer, tcId is 125 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5193 for ECDSA, tcId is 126 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser] */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5193_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5193_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5193_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5193 = { .name = "ecdsa_secp256k1_sha256_5193", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5193_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5193_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5193_sig, .siglen = 64, .result = 0, .comment = "leading ff in integer, tcId is 126 in file ecdsa_secp256k1_sha256_test.json [!!!WARNING: this test has been patched from 'invalid' to 'acceptable' due to lax DER parser]", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5194 for ECDSA, tcId is 129 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5194_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5194_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5194_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5194 = { .name = "ecdsa_secp256k1_sha256_5194", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5194_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5194_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5194_sig, .siglen = 64, .result = -1, .comment = "replacing integer with zero, tcId is 129 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5195 for ECDSA, tcId is 130 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5195_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5195_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5195_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5195 = { .name = "ecdsa_secp256k1_sha256_5195", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5195_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5195_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5195_sig, .siglen = 64, .result = -1, .comment = "replacing integer with zero, tcId is 130 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5196 for ECDSA, tcId is 131 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5196_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5196_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5196_sig[] = { 0x01, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x83, 0xb9, 0x0d, 0xea, 0xbc, 0xa4, 0xb0, 0x5c, 0x45, 0x74, 0xe4, 0x9b, 0x58, 0x99, 0xb9, 0x64, 0xa6, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5196 = { .name = "ecdsa_secp256k1_sha256_5196", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5196_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5196_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5196_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 131 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5197 for ECDSA, tcId is 132 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5197_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5197_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5197_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x86, 0x43, 0xb0, 0x30, 0xef, 0x46, 0x1f, 0x1b, 0xcd, 0xf5, 0x3f, 0xde, 0x3e, 0xf9, 0x4c, 0xe2, 0x24, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5197 = { .name = "ecdsa_secp256k1_sha256_5197", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5197_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5197_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5197_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 132 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5198 for ECDSA, tcId is 133 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5198_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5198_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5198_sig[] = { 0x7e, 0xc1, 0x08, 0x63, 0x31, 0x05, 0x65, 0xa9, 0x08, 0x45, 0x7f, 0xa0, 0xf1, 0xb8, 0x7a, 0x7b, 0x01, 0xa0, 0xf2, 0x2a, 0x0a, 0x98, 0x43, 0xf6, 0x4a, 0xed, 0xc3, 0x34, 0x36, 0x7c, 0xdc, 0x9b, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5198 = { .name = "ecdsa_secp256k1_sha256_5198", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5198_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5198_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5198_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 133 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5199 for ECDSA, tcId is 134 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5199_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5199_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5199_sig[] = { 0x7e, 0xc1, 0x08, 0x63, 0x31, 0x05, 0x65, 0xa9, 0x08, 0x45, 0x7f, 0xa0, 0xf1, 0xb8, 0x7a, 0x79, 0xbc, 0x4f, 0xcf, 0x10, 0xb9, 0xe0, 0xe4, 0x32, 0x0a, 0xc0, 0x21, 0xc1, 0x06, 0xb3, 0x1d, 0xdc, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5199 = { .name = "ecdsa_secp256k1_sha256_5199", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5199_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5199_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5199_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 134 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5200 for ECDSA, tcId is 135 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5200_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5200_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5200_sig[] = { 0xfe, 0x7e, 0xc1, 0x08, 0x63, 0x31, 0x05, 0x65, 0xa9, 0x08, 0x45, 0x7f, 0xa0, 0xf1, 0xb8, 0x7a, 0x7c, 0x46, 0xf2, 0x15, 0x43, 0x5b, 0x4f, 0xa3, 0xba, 0x8b, 0x1b, 0x64, 0xa7, 0x66, 0x46, 0x9b, 0x5a, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5200 = { .name = "ecdsa_secp256k1_sha256_5200", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5200_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5200_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5200_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 135 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5201 for ECDSA, tcId is 136 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5201_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5201_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5201_sig[] = { 0x01, 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5201 = { .name = "ecdsa_secp256k1_sha256_5201", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5201_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5201_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5201_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 136 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5202 for ECDSA, tcId is 137 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5202_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5202_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5202_sig[] = { 0x7e, 0xc1, 0x08, 0x63, 0x31, 0x05, 0x65, 0xa9, 0x08, 0x45, 0x7f, 0xa0, 0xf1, 0xb8, 0x7a, 0x7b, 0x01, 0xa0, 0xf2, 0x2a, 0x0a, 0x98, 0x43, 0xf6, 0x4a, 0xed, 0xc3, 0x34, 0x36, 0x7c, 0xdc, 0x9b, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5202 = { .name = "ecdsa_secp256k1_sha256_5202", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5202_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5202_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5202_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 137 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5203 for ECDSA, tcId is 138 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5203_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5203_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5203_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x01, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x7f, 0xc1, 0xe1, 0x97, 0xd8, 0xae, 0xbe, 0x20, 0x3c, 0x96, 0xc8, 0x72, 0x32, 0x27, 0x21, 0x72, 0xfb, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5203 = { .name = "ecdsa_secp256k1_sha256_5203", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5203_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5203_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5203_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 138 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5204 for ECDSA, tcId is 139 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5204_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5204_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5204_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x82, 0x4c, 0x83, 0xde, 0x0b, 0x50, 0x2c, 0xdf, 0xc5, 0x17, 0x23, 0xb5, 0x18, 0x86, 0xb4, 0xf0, 0x79, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5204 = { .name = "ecdsa_secp256k1_sha256_5204", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5204_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5204_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5204_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 139 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5205 for ECDSA, tcId is 140 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5205_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5205_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5205_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x90, 0x0e, 0x75, 0xad, 0x23, 0x3f, 0xcc, 0x90, 0x85, 0x09, 0xdb, 0xff, 0x59, 0x22, 0x64, 0x7e, 0xf8, 0xcd, 0x45, 0x0e, 0x00, 0x8a, 0x7f, 0xff, 0x29, 0x09, 0xec, 0x5a, 0xa9, 0x14, 0xce, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5205 = { .name = "ecdsa_secp256k1_sha256_5205", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5205_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5205_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5205_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 140 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5206 for ECDSA, tcId is 141 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5206_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5206_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5206_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0xfe, 0x90, 0x0e, 0x75, 0xad, 0x23, 0x3f, 0xcc, 0x90, 0x85, 0x09, 0xdb, 0xff, 0x59, 0x22, 0x64, 0x80, 0x3e, 0x1e, 0x68, 0x27, 0x51, 0x41, 0xdf, 0xc3, 0x69, 0x37, 0x8d, 0xcd, 0xd8, 0xde, 0x8d, 0x05, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5206 = { .name = "ecdsa_secp256k1_sha256_5206", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5206_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5206_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5206_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 141 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5207 for ECDSA, tcId is 142 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5207_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5207_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5207_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x01, 0x6f, 0xf1, 0x8a, 0x52, 0xdc, 0xc0, 0x33, 0x6f, 0x7a, 0xf6, 0x24, 0x00, 0xa6, 0xdd, 0x9b, 0x81, 0x07, 0x32, 0xba, 0xf1, 0xff, 0x75, 0x80, 0x00, 0xd6, 0xf6, 0x13, 0xa5, 0x56, 0xeb, 0x31, 0xba, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5207 = { .name = "ecdsa_secp256k1_sha256_5207", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5207_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5207_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5207_sig, .siglen = 65, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 142 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5208 for ECDSA, tcId is 143 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5208_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5208_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5208_sig[] = { 0x81, 0x3e, 0xf7, 0x9c, 0xce, 0xfa, 0x9a, 0x56, 0xf7, 0xba, 0x80, 0x5f, 0x0e, 0x47, 0x85, 0x84, 0xfe, 0x5f, 0x0d, 0xd5, 0xf5, 0x67, 0xbc, 0x09, 0xb5, 0x12, 0x3c, 0xcb, 0xc9, 0x83, 0x23, 0x65, 0x90, 0x0e, 0x75, 0xad, 0x23, 0x3f, 0xcc, 0x90, 0x85, 0x09, 0xdb, 0xff, 0x59, 0x22, 0x64, 0x7e, 0xf8, 0xcd, 0x45, 0x0e, 0x00, 0x8a, 0x7f, 0xff, 0x29, 0x09, 0xec, 0x5a, 0xa9, 0x14, 0xce, 0x46, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5208 = { .name = "ecdsa_secp256k1_sha256_5208", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5208_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5208_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5208_sig, .siglen = 64, .result = -1, .comment = "Modified r or s, e.g. by adding or subtracting the order of the group, tcId is 143 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5209 for ECDSA, tcId is 144 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5209_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5209_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5209_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5209 = { .name = "ecdsa_secp256k1_sha256_5209", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5209_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5209_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5209_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 144 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5210 for ECDSA, tcId is 145 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5210_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5210_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5210_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5210 = { .name = "ecdsa_secp256k1_sha256_5210", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5210_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5210_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5210_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 145 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5211 for ECDSA, tcId is 146 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5211_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5211_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5211_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5211 = { .name = "ecdsa_secp256k1_sha256_5211", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5211_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5211_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5211_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 146 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5212 for ECDSA, tcId is 147 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5212_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5212_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5212_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5212 = { .name = "ecdsa_secp256k1_sha256_5212", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5212_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5212_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5212_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 147 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5213 for ECDSA, tcId is 148 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5213_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5213_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5213_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5213 = { .name = "ecdsa_secp256k1_sha256_5213", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5213_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5213_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5213_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 148 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5214 for ECDSA, tcId is 149 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5214_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5214_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5214_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5214 = { .name = "ecdsa_secp256k1_sha256_5214", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5214_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5214_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5214_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 149 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5215 for ECDSA, tcId is 150 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5215_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5215_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5215_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5215 = { .name = "ecdsa_secp256k1_sha256_5215", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5215_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5215_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5215_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 150 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5216 for ECDSA, tcId is 151 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5216_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5216_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5216_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5216 = { .name = "ecdsa_secp256k1_sha256_5216", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5216_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5216_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5216_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 151 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5217 for ECDSA, tcId is 154 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5217_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5217_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5217_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5217 = { .name = "ecdsa_secp256k1_sha256_5217", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5217_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5217_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5217_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 154 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5218 for ECDSA, tcId is 155 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5218_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5218_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5218_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5218 = { .name = "ecdsa_secp256k1_sha256_5218", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5218_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5218_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5218_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 155 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5219 for ECDSA, tcId is 156 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5219_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5219_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5219_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5219 = { .name = "ecdsa_secp256k1_sha256_5219", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5219_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5219_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5219_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 156 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5220 for ECDSA, tcId is 157 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5220_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5220_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5220_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5220 = { .name = "ecdsa_secp256k1_sha256_5220", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5220_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5220_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5220_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 157 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5221 for ECDSA, tcId is 158 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5221_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5221_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5221_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x40, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5221 = { .name = "ecdsa_secp256k1_sha256_5221", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5221_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5221_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5221_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 158 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5222 for ECDSA, tcId is 159 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5222_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5222_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5222_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b, 0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x42, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5222 = { .name = "ecdsa_secp256k1_sha256_5222", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5222_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5222_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5222_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 159 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5223 for ECDSA, tcId is 160 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5223_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5223_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5223_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x2f, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5223 = { .name = "ecdsa_secp256k1_sha256_5223", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5223_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5223_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5223_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 160 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5224 for ECDSA, tcId is 161 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5224_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5224_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5224_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xfc, 0x30, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5224 = { .name = "ecdsa_secp256k1_sha256_5224", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5224_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5224_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5224_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 161 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5225 for ECDSA, tcId is 164 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5225_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5225_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5225_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5225 = { .name = "ecdsa_secp256k1_sha256_5225", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5225_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5225_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5225_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 164 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5226 for ECDSA, tcId is 165 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5226_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5226_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5226_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const wycheproof_ecdsa_test ecdsa_secp256k1_sha256_5226 = { .name = "ecdsa_secp256k1_sha256_5226", .sig_alg = ECDSA, .hash = SHA256, .curve = &secp256k1_str_params, .pubkey = ecdsa_secp256k1_sha256_5226_pubkey, .pubkeylen = 64, .msg = ecdsa_secp256k1_sha256_5226_msg, .msglen = 6, .sig = ecdsa_secp256k1_sha256_5226_sig, .siglen = 64, .result = -1, .comment = "Signature with special case values for r and s, tcId is 165 in file ecdsa_secp256k1_sha256_test.json", }; #endif /* defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) */ /* Test 5227 for ECDSA, tcId is 166 in file ecdsa_secp256k1_sha256_test.json */ #if defined(WITH_SIG_ECDSA) && defined(WITH_CURVE_SECP256K1) && defined(WITH_HASH_SHA256) static const unsigned char ecdsa_secp256k1_sha256_5227_pubkey[] = { 0xb8, 0x38, 0xff, 0x44, 0xe5, 0xbc, 0x17, 0x7b, 0xf2, 0x11, 0x89, 0xd0, 0x76, 0x60, 0x82, 0xfc, 0x9d, 0x84, 0x32, 0x26, 0x88, 0x7f, 0xc9, 0x76, 0x03, 0x71, 0x10, 0x0b, 0x7e, 0xe2, 0x0a, 0x6f, 0xf0, 0xc9, 0xd7, 0x5b, 0xfb, 0xa7, 0xb3, 0x1a, 0x6b, 0xca, 0x19, 0x74, 0x49, 0x6e, 0xeb, 0x56, 0xde, 0x35, 0x70, 0x71, 0x95, 0x5d, 0x83, 0xc4, 0xb1, 0xba, 0xda, 0xa0, 0xb2, 0x18, 0x32, 0xe9, }; static const unsigned char ecdsa_secp256k1_sha256_5227_msg[] = { 0x31, 0x32, 0x33, 0x34, 0x30, 0x30, }; static const unsigned char ecdsa_secp256k1_sha256_5227_sig[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x